• Nenhum resultado encontrado

Assess and determine desktop deployment options. Capture and manage a desktop operating system image. Plan and implement User State Migration.

N/A
N/A
Protected

Academic year: 2021

Share "Assess and determine desktop deployment options. Capture and manage a desktop operating system image. Plan and implement User State Migration."

Copied!
22
0
0

Texto

(1)

Course 20415A:

Implementing a Desktop Infrastructure

Length: 5 Days

Published: January 14, 2013

Language(s): English

Audience(s): IT Professionals

Level: 300

Technology: Windows Server 2012

Type: Course

Delivery Method: Instructor-led (classroom) Show all items

Overview

About this Course

This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement a Windows 8 desktop infrastructure. The course provides guidance on planning and deploying desktops by using several technologies such as User State Migration Tool (USMT), Microsoft Deployment Toolkit (MDT), Virtual Desktop Infrastructure (VDI), and more. Additionally, the course describes how to protect desktops and monitor their health and performance.

Audience Profile

The course is primarily intended for IT Professionals who manage the desktop environments for organizations, and want to specialize in Windows8 desktop deployments. These IT professionals typically work in complex computing environments of large to enterprise-sized organizations. In addition. the secondary audience for this course includes IT professionals who want to take the 70-415: Implementing an Enterprise Desktop and Device Infrastructure exam as a stand-alone, or as part of the requirement for theMCSE: Desktop Infrastructure certification.

At Course Completion

After completing this course, students will be able to:

 Assess and determine desktop deployment options.  Plan an image management strategy.

 Implement desktop security.

 Capture and manage a desktop operating system image.  Plan and implement User State Migration.

(2)

 Plan and deploying desktops by using System Center 2012 Configuration Manager.  Plan and implement a Remote Desktop Services infrastructure.

 Manage user state virtualization for enterprise desktops.

 Plan and implement an updates infrastructure to support enterprise desktops.  Protect enterprise desktops from malware and data loss.

 Monitoring the performance and health of the desktop infrastructure. Course Details

Course OutlineModule 1: Assessing and Determining Desktop Deployment OptionsThis module describes the enterprise desktop lifecycle and explains how you can assess hardware and

infrastructure readiness. The module then describes how to identify and select the most appropriate deployment option based upon organizational requirements.Lessons

 Overview of the Enterprise Desktop Life Cycle

 Assessing Hardware and Infrastructure Readiness for a Desktop Deployment  Overview of Enterprise Desktop Deployment Methods

 Volume Activation Technologies for Enterprise Desktops Lab : Assessing and Determining Desktop Deployment Options

 Planning a Desktop Deployment Strategy  Collecting Infrastructure Data

 Implementing a Volume Activation Solution After completing this module, students will be able to:

 Describe the enterprise desktop life cycle.

 Explain how to assess hardware and infrastructure readiness for a desktop deployment.  Describe the available methods for deploying enterprise desktops.

 Describe volume activation technologies for enterprise desktops.

Module 2: Planning An Image Management StrategyThis modules describes Windows image formats and helps you to define an efficient image management strategy based upon business requirements.Lessons

 Overview of Windows Image Formats  Overview of Image Management Lab : Planning an Image Management Strategy

 Assessing Business Requirements to Support an Image Management Strategy After completing this module, students will be able to:

 Describe image formats used for Windows desktop deployments.

 Determine the type and content of images used in an image management strategy. Module 3: Implementing Desktop SecurityThis module describes how to deploy and manage a secure desktop by implementing centralized policies, BitLocker settings, and Encrypted File System (EFS) settings.Lessons

 Implementing a Centralized Desktop Security Solution  Planning and Implementing BitLocker

 Planning and Implementing Encrypted File System Lab : Configuring Desktop Security

(3)

 Configuring Desktop Security using Group Policy  Configuring Drive Encryption Using BitLocker Lab : Configuring File Encryption Using EFS

 Implementing a Centrally Managed EFS Solution  Implementing an EFS Recovery Solution

After completing this module, students will be able to:

 Implement a centralized secure desktop solution by using Group Policy settings.  Plan and implement device encryption by using BitLocker.

 Plan and implement a centrally managed EFS solution to secure file and folders on enterprise desktops.

Module 4: Capturing and Managing a Desktop Operating System ImageThis module describes how to use the Windows Assessment and Deployment Kit (ADK) and Windows Deployment Services (WDS) to create, capture, and manage a desktop operating system image.Lessons

 Overview of Windows ADK

 Managing the Windows Preinstallation Environment

 Building a Reference Image Using Windows SIM and Sysprep  Capturing and Servicing a Reference Image

 Configuring and Managing Windows Deployment Services Lab : Preparing the Imaging and Preinstallation Environment

 Installing Windows ADK

 Configuring a Custom Windows PE Environment

Lab : Building a Reference Image Using Windows SIM and Sysprep  Building a Custom Answer File Using Windows SIM

 Installing a Reference Computer Using a Custom Answer File  Generalizing a Reference Computer Using Sysprep

Lab : Capturing and Servicing a Reference Image  Capturing a Reference System Image  Servicing a Reference System Image

Lab : Configuring and Managing Windows Deployment Services  Planning the Windows Deployment Services Environment

 Installing and Configuring the Windows Deployment Services Server Role  Capturing a Reference Image Using WDS

 Deploying an Image Using WDS

After completing this module, students will be able to:

 Identify the purpose and key features of the Windows Assessment and Deployment Kit (Windows ADK).

 Describe the Windows Preinstallation (Windows PE) environment and how it can be customized to address specific image and deployment requirements.

 Describe the Windows Setup and preparation process and how it can be modified using answer files created with Windows SIM and the Sysprep utility.

 Use Deployment Image Servicing and Management (DISM) to capture and service a reference image.

 Configure and manage Windows Deployment Services (WDS) to help support an image capture and deployment solution.

(4)

the User State Migration Tool (USMT) to migrate appropriate user data and settings to a new desktop operating system.Lessons

 Overview of User State Migration

 Planning User State Migration by Using USMT  Migrating User State by Using USMT

Lab : Planning and Implementing User State Migration  Planning for User State Migration

 Creating and Customizing the USMT XML Files  Capturing and Restoring User State by Using USMT Lab : Migrating User State Using Hard-Link Migration

 Performing a Hard-Link Migration

After completing this module, students will be able to:

 Describe the concept of user state migration and identify the features available in USMT 5.0 to assist in the migration task.

 Plan the appropriate scenario, data to be migrated, and storage location for a user state migration task.

 Migrate user state by using USMT 5.0.

Module 6: Planning and Deploying Desktops Using the Microsoft Deployment ToolkitThis module describes how to use the Microsoft Deployment Toolkit (MDT) 2012 to deploy Windows operating systems in lite touch installation scenarios.Lessons

 Planning for the Lite Touch Installation Environment  Implementing MDT 2012 for Lite Touch Installation  Integrating Windows Deployment Services with MDT

Lab : Planning and Deploying Desktops Using the Microsoft Deployment Toolkit  Planning for the MDT Lite Touch Installation Environment

 Installing MDT 2012 and the Prerequisite Components  Creating and Configuring the MDT 2012 Deployment Share  Deploying and Capturing a Reference Operating System Image  Integrating WDS with MDT 2012 To Provide PXE Boot Capabilities After completing this module, students will be able to:

 Identify the process and components needed to plan a Lite Touch Installation (LTI) environment.

 Understand the process and tasks needed to implement MDT 2012 to support LTI.  Describe how Windows Deployment Services can be configured to integrate with MDT

2012.

Module 7: Planning and Deploying Desktops by Using System Center 2012 Configuration ManagerThis describes how to use System Center 2012 Configuration Manager to implement a zero touch installation for deploying enterprise desktops.Lessons

 Planning the Zero Touch Installation Environment  Preparing the Site for Operating System Deployment

 Building a Reference Image Using a Configuration Manager Task Sequence  Using MDT Task Sequences to Deploy Client Images

Lab : Preparing the Environment for Operating System Deployment  Planning the Operating System Deployment Infrastructure  Preparing the Zero Touch Installation Environment

(5)

Lab : Using MDT and Configuration Manager to Perform a Zero-Touch Installation  Performing a Zero Touch Installation

After completing this module, students will be able to:

 Identify the infrastructure and components required to support a Zero Touch Installation scenario.

 Describe the preparation tasks required to support operating system deployment using Configuration Manager 2012.

 Describe how Configuration Manager task sequences are used to build a reference image to be used in a zero touch installation solution.

 Configure a MDT task sequence to be used to deploy a client image.

Module 8: Planning and Implementing a Remote Desktop Services InfrastructureThis module describes how to plan and implement session virtualization deployment and a virtual desktop infrastructure (VDI) based upon Windows Server 2012 Remote Desktop Services.Lessons

 Overview of Remote Desktop Services

 Planning the Remote Desktop Services Environment  Configuring a Virtual Desktop Infrastructure Deployment  Configuring a Session-Based Desktop Deployment

 Extending the Remote Desktop Services Environment to the Internet Lab : Planning and Implementing a Remote Desktop Services Infrastructure

 Planning the Remote Desktop Services Environment  Configuring a Virtual Desktop Infrastructure Scenario  Configuring a Session-Based Desktop Scenario Lab : Extending Internet Access to the RDS Infrastructure

 Planning the RD Gateway Policies  Configuring the RD Gateway

After completing this module, students will be able to:

 Describe how Remote Desktop Services supports VDI and session virtualization deployment.

 Plan the appropriate infrastructure and role requirements for a Remote Desktop Services environment.

 Describe processes and tasks needed to configure a VDI deployment scenario.  Describe processes and tasks needed to configure a session-based desktop scenario.  Describe the components needed to extend remote desktop services to the Internet. Module 9: Managing User State Virtualization For Enterprise DesktopsThis module describes how to plan and configure user state virtualization to provide a consistent desktop client experience.Lessons

 Overview of User State Virtualization  Planning User State Virtualization

 Configuring Roaming Profiles, Folder Redirection, and Offline Files  Implementing Microsoft User Experience Virtualization

Lab : Deploying and Managing User State Virtualization  Planning User State Virtualization

 Implementing User State Virtualization After completing this module, students will be able to:

(6)

 Describe the components, benefits, and technologies that makes up USV.

 Describe the planning process used to assess and implement User State Virtualization.  Configure roaming profiles, folder redirection, and manage offline file settings.  Describe the planning and tasks required to implement Microsoft UE-V.

Module 10: Planning and Implementing an Updates Infrastructure to Support Enterprise DesktopsStudents will be able to plan and implement an updates infrastructure to support both physical and virtual enterprise desktops.Lessons

 Planning an Updates Infrastructure for the Enterprise

 Implementing Configuration Manager 2012 to Support Software Updates  Managing Updates for Virtual Machines and Images

 Using Windows Intune for Managing Software Updates Lab : Planning and Implementing an Updates Infrastructure

 Planning an Updates Infrastructure

 Implementing Software Updates Using Configuration Manager 2012  Implementing Software Updates for Virtual Machine Libraries After completing this module, students will be able to:

 Describe considerations and methods used for implementing an enterprise-based updates infrastructure.

 Describe how to use Configuration Manager 2012 to deploy and manage software updates.

 Describe how software updates can be managed for virtual machines and images.  Describe how Windows Intune can be configured to deploy and manage software

updates.

Module 11: Protecting Enterprise Desktops from Malware and Data LossThis module describes how to use System Center technologies such as Endpoint protection and Data Protection Manager (DPM) to protect enterprise desktops from malware and data loss.Lessons

 Overview of System Center 2012 Endpoint Protection

 Configuring Endpoint Protection Client Settings and Monitoring Status  Using Windows Intune Endpoint Protection

 Protecting Desktops by Using System Center 2012 Data Protection Manager Lab : Implementing Client Endpoint Protection

 Configuring the Endpoint Protection Point

 Configuring and Deploying Endpoint Protection Polices  Configuring Client Settings to Support Endpoint Protection  Monitoring Endpoint Protection

Lab : Configuring Data Protection for Client Computer Data  Configuring and Verifying Client Data Protection After completing this module, students will be able to:

 Describe how System Center 2012 Endpoint Protection is configured to provide malware protection for desktops.

 Configure the Endpoint Protection client settings and monitor Endpoint Protection status.  Describe how to integrate and configure Windows Intune to provide endpoint protection

(7)

 Describe how System Center 2012 DPM can be used to protect enterprise desktops. Module 12: Monitoring the Performance and Health of the Desktop InfrastructureThis module describes how to identify and monitor relevant services and components to ensure the health and performance of the enterprise desktop infrastructure.Lessons

 Performance and Health Monitoring for the Desktop Infrastructure  Monitoring the Virtual Desktop Infrastructure

Lab : Monitoring the Performance and Health of the Desktop Infrastructure  Configuring Performance and Reliability Monitoring for Desktops  Configuring Operations Manager for Monitoring Virtual Environments After completing this module, students will be able to:

 Describe methods used to monitor the performance and health of the physical desktop infrastructure.

 Describe methods used to monitor the health and performance of the virtual desktop infrastructure.

Prerequisites

Before attending this course, students must have:

 Solid understanding of TCP/IP and networking concepts

 Solid knowledge of Windows and Active Directory Domain Services (AD DS)—for example, domain user accounts, domain vs. local user accounts, user profiles, and group

membership

 Good understanding of scripts and batch files

 Solid understanding of security concepts such as authentication and authorization  Familiarity with the client administration capabilities of Windows Server

 General knowledge of management tools such as System Center 2012 Configuration Manager, System Center 2012 Operations Manager, and System Center 2012 Data Protection Manager.

 Familiarity with imaging, packaging, and operating system deployment concepts  Familiarity with certificates and Certification Authority (CA) implementation and

configuration

 Knowledge equivalent to Windows 2012 MCSA

 Experience administering Windows Server in an environment that typically has the following characteristics:

 2,500 to 50,000 or more users

 Multiple physical locations and multiple domain controllers

 Network services and resources such as messaging, databases, file and print, firewalls, Internet access, an intranet, and client computer management

(8)

 Deployment and management of both physical and virtual applications

Community

Have Questions?For advice about training and certification, connect with peers:  Visit the training and certification forum

For questions about a specific certification, chat with a Microsoft Certified Professional (MCP):  Visit our MCP newsgroups

To find out about recommended blogs, Web sites, and upcoming Live Meetings on popular topics, visit our community site:

 Visit the Microsoft Learning community

VERSÃO PORTUGUÊS

Curso 20415A:

Implementação de uma infraestrutura de desktop

Comprimento: 5 Dias

Publicado em: 14 jan 2013

Idioma (s): Inglês

Audiência (s): Profissionais de TI

Nível: 300

Tecnologia: Windows Server 2012

Tipo: Curso

Método de entrega: Conduzido por instrutor (sala de aula) Mostrar todos os itens Ocultar todos os itens

Visão global

Sobre este Curso

Este curso de 5 dias instrutor, fornece-lhe as habilidades e conhecimentos necessários para planejar, projetar e implementar uma infra-estrutura Windows área de trabalho 8. O curso fornece orientação sobre o planejamento e implantação de áreas de trabalho usando várias tecnologias, tais como User State Migration Tool (USMT), Microsoft Deployment Toolkit (MDT), Virtual Desktop Infrastructure (VDI), e muito mais. Além disso, o curso descreve como proteger desktops e monitorar sua saúde e desempenho.

Perfil público

(9)

desktop para as organizações, e quer se especializar no Windows 8 implantações. Esses profissionais de TI normalmente trabalham em ambientes complexos de grandes organizações para a iniciativa porte. Além disso. O público secundário para este curso inclui profissionais de TI que querem tomar a70-415: Implementando um Enterprise Desktop e exame de Infra-estrutura de dispositivos como um autônomo, ou como parte da exigência para o MCSE: Desktop Infrastructure certificação.

Na conclusão do curso

Após a conclusão deste curso, os alunos serão capazes de:

 Avaliar e determinar as opções de implantação de desktop.  Planejar uma estratégia de gestão de imagem.

 Implementar a segurança de desktop.

 Capturar e gerenciar uma imagem de sistema operacional de desktop.  Planejar e implementar de Migração de Estado do Usuário.

 Planejar e implantar áreas de trabalho usando o Microsoft Deployment Toolkit.

 Plano e implantação de desktops usando o System Center Configuration Manager 2012.  Planejar e implementar uma infra-estrutura de Serviços de Área de Trabalho Remota.  Gerenciar virtualização de estado do usuário para desktops corporativos.

 Planejar e implementar uma infra-estrutura para suportar atualizações de desktops corporativos.

 Proteja desktops corporativos de malware e perda de dados.  Monitorar o desempenho ea saúde da infra-estrutura de desktop. Detalhes do curso

CursoMóduloContorno1: Avaliar e determinar as opções de Desktop DeploymentEste módulo descreve o ciclo de vida do ambiente de trabalho da empresa e explica como você pode avaliar hardware e disponibilidade de infra-estrutura.O módulo então descreve como identificar e selecionar a opção de implantação mais adequado com base em requisitos organizacionais.Lições

 Visão Geral do Ciclo de Vida Enterprise Desktop

 Avaliando hardware e infra-estrutura de prontidão para um Desktop Deployment  Visão geral dos métodos de implantação Enterprise Desktop

 Volume Activation Technologies para desktops corporativos Laboratório: Avaliar e determinar as opções de Desktop Deployment

 Planejando uma estratégia de implantação de desktops  Coleta de dados de infra-estrutura

 Implementação de uma solução Volume Activation Depois de concluir este módulo, os alunos serão capazes de:

 Descrever o ciclo de vida empresarial desktop.

 Explique como avaliar hardware e disponibilidade de infra-estrutura para uma implantação de desktop.

 Descrever os métodos disponíveis para a implantação de desktops corporativos.  Descrever as tecnologias de ativação de volume para desktops corporativos.

Módulo2:.Planejar uma estratégia de Gestão de ImagemEste módulo descreve formatos de imagem do Windows e ajuda a definir uma estratégia de gestão eficiente de imagem com base em requisitos de negóciosLições

 Visão geral de formatos de imagem do Windows  Visão geral de Gestão de Imagem

Laboratório: Planejando uma estratégia de Gestão de Imagem

 Avaliar as necessidades de negócios para apoiar uma Estratégia de Gestão da Imagem Depois de concluir este módulo, os alunos serão capazes de:

(10)

 Determinar o tipo e conteúdo de imagens usado em uma estratégia de gestão de imagem. Módulo 3: Implementando asegurança.DesktopEste módulo descreve como implantar e gerenciar um ambiente de trabalho seguro através da implementação de políticas centralizadas, as

configurações do BitLocker, e do sistema de arquivos criptografados (EFS) definiçõesLições  Implementação de uma solução de segurança Centralized Desktop

 Planejamento e Implementação BitLocker

 Planejamento e implementação de sistema de arquivos criptografados Laboratório: Configuração de Segurança Área de Trabalho

 Segurança desktop Configurando a Diretiva de Grupo  Drive Encryption Configurando Usando BitLocker

Laboratório: criptografia de arquivos Configurando Usando o EFS  A implementação de um gerenciado centralmente Solução EFS  A implementação de uma solução de recuperação EFS

Depois de concluir este módulo, os alunos serão capazes de:

 Implementar uma solução centralizada de desktops segura usando a Diretiva de Grupo.  Planejar e implementar a criptografia de dispositivos usando o BitLocker.

 Planejar e implementar uma solução de gerenciamento centralizado EFS para proteger arquivos e pastas em desktops corporativos.

Módulo4:.Capturar e gerenciar uma Imagem de Sistema Operacional DesktopEste módulo descreve como usar o Windows e Avaliação de Implantação Kit (ADK) e Windows Deployment Services (WDS) para criar, capturar e gerenciar uma imagem de sistema operacional de desktopLições

 Visão geral do Windows ADK

 Gerenciando o ambiente Windows pré-instalação

 Construção de uma imagem de referência usando o Windows SIM e Sysprep  Capturar e Manutenção de uma imagem de referência

 Configurando e Gerenciando o Windows Deployment Services Laboratório: Preparando o ambiente de imagem e pré-instalação

 Instalar o Windows ADK

 Configurando um Custom ambiente Windows PE

Laboratório: Criando uma imagem de referência usando o Windows SIM e Sysprep  A construção de um arquivo de resposta personalizado usando o Windows SIM

 A instalação de um computador de referência usando um arquivo de resposta personalizado  Generalizando um computador de referência Usando o Sysprep

Laboratório: Capturar e Manutenção de uma imagem de referência  Capturando uma Imagem de Sistema de Referência

 A manutenção de um Sistema de Referência da Imagem

Laboratório: Configurando e Gerenciando o Windows Deployment Services  Planejando a implantação do Windows Ambiente Serviços

 Instalando e Configurando o Windows Deployment Services Papel  Capturando uma imagem de referência Usando WDS

 A implantação de uma imagem usando WDS

Depois de concluir este módulo, os alunos serão capazes de:

 Identificar a finalidade e características-chave da Avaliação Windows e Kit de Implantação (Windows ADK).

 Descreva o Windows pré-instalação ambiente Windows (Windows PE) e como ele pode ser customizado para atender imagem específica e requisitos de implantação.

 Descrever a instalação do Windows e processo de preparação e como ele pode ser modificado usando arquivos de resposta criados com o Windows SIM e do utilitário Sysprep.

 Use implantação de imagem Gerenciamento e Manutenção (DISM) para capturar e atender a uma imagem de referência.

(11)

 Configurar e gerenciar o Windows Deployment Services (WDS) para ajudar a apoiar uma solução de captura de imagem e implantação.

Módulo 5: Planejamento e Implementação de Migração de Estado do UsuárioEste módulo descreve como usar o User State Migration Tool (USMT) para migrar dados do usuário e configurações

apropriadas para um novo sistema operacional de desktopLições.  Visão geral de Migração do Estado do Usuário

 Planejamento de Migração de Estado do usuário com a USMT  Migrando Estado do usuário com a USMT

Laboratório: Planejamento e Implementação de Migração de Estado do Usuário  Planejamento para Migração do Estado do Usuário

 Criar e personalizar os arquivos XML USMT

 Capturar e restaurar o estado do usuário com a USMT Laboratório: User State Migrando Usando Hard-link Migração

 Executando uma Migração ligação Hard-

Depois de concluir este módulo, os alunos serão capazes de:

 Descrever o conceito de migração de estado do usuário e identificar os recursos disponíveis no USMT 5.0 para auxiliar na tarefa de migração.

 Planejar o cenário adequado, os dados a serem migrados, e local de armazenamento para uma tarefa de migração de estado do usuário.

 Migrar o estado do usuário usando USMT 5.0.

Módulo 6: Planejamento e Implantação de desktops usando o Microsoft Deployment ToolkitEste módulo descreve como usar o Microsoft Deployment Toolkit (MDT) 2012 para implantar sistemas operacionais Windows em cenários de instalação Lite TouchLições.

 Planejamento para o ambiente de instalação Lite Touch  Implementação MDT 2012 para Lite Touch Installation  Integrando o Windows Deployment Services com PQT

Laboratório: Planejamento e Implantação de desktops usando o Microsoft Deployment Toolkit  Planejamento para o ambiente de instalação MDT Lite Touch

 Instalando MDT 2012 e os componentes pré-requisito

 Criando e Configurando o compartilhamento de implantação MDT 2012  Implantando e Capturando uma imagem de referência do Sistema Operacional  Integrando WDS com MDT 2012 para fornecer recursos de inicialização PXE Depois de concluir este módulo, os alunos serão capazes de:

 Identificar o processo e componentes necessários para planejar uma instalação Lite Touch ambiente (LTI).

 Compreender o processo e as tarefas necessárias para implementar MDT 2012 para apoiar LTI.

 Descreva como o Windows Deployment Services pode ser configurado para se integrar com o MDT 2012.

Módulo7:.Planejamento e Implantação de áreas de trabalho usando o System Center

Configuration Manager 2012Este descreve como usar o System Center Configuration Manager 2012 para implementar uma instalação toque zero para implantação de desktops corporativosLições

 Planejando o ambiente de instalação Zero Touch

 Preparação do local para a implantação do Sistema Operacional

 Construção de uma imagem de referência usando uma seqüência de tarefas Configuration Manager

 Usando Task Sequences MDT para implantar imagens de cliente

Laboratório: Preparando o Ambiente para a implantação do Sistema Operacional  Planejamento da Operação de Infra-estrutura de implantação do sistema  Preparando o ambiente de instalação Zero Touch

(12)

Laboratório: Usando o MDT e Configuration Manager para executar uma instalação Zero-Touch  Executando uma instalação Zero Touch

Depois de concluir este módulo, os alunos serão capazes de:

 Identificar a infra-estrutura e componentes necessários para suportar um cenário de instalação Zero Touch.

 Descrever as tarefas de preparação necessários para suportar a implantação do sistema operacional usando o Configuration Manager 2012.

 Descreva como seqüências de tarefas do Configuration Manager são usados para construir uma imagem de referência para ser usado em uma solução zero toque instalação.

 Configurar uma seqüência de tarefas MDT a ser usado para implantar uma imagem do cliente.

Módulo8:.Planejamento e Implementação de um Remote Desktop Infrastructure ServicesEste módulo descreve como planejar e executar a implantação sessão de virtualização e uma

infraestrutura de desktop virtual (VDI) com base em Windows Server 2012 Remote Desktop ServicesLições

 Visão geral dos Serviços de Área de Trabalho Remota  Planejando o Remote Desktop Environment Serviços

 Configurando um Implantação de Infra-estrutura Virtual Desktop  Configurando uma implantação Desktop Session-Based

 Estendendo o Remote Desktop Environment Services para a Internet

Laboratório: Planejamento e Implementação de um Remote Desktop Services Infrastructure  Planejando o Remote Desktop Environment Serviços

 Configurando um cenário de Infra-estrutura Virtual Desktop  Configurando um cenário Desktop Session-Based

Laboratório: Acesso à Internet Estendendo à infra-estrutura RDS  Planejamento de Políticas de Gateway de RD

 Configurando o Gateway RD

Depois de concluir este módulo, os alunos serão capazes de:

 Descreva como Remote Desktop Services apoia VDI e implementação da virtualização de sessão.

 Planeje os requisitos adequados de infra-estrutura e do papel para um ambiente remoto Desktop Services.

 Descrever os processos e as tarefas necessárias para configurar um cenário de implantação de VDI.

 Descrever os processos e as tarefas necessárias para configurar um cenário de desktop baseado em sessão.

 Descrever os componentes necessários para estender os serviços de desktop remoto à Internet.

Módulo 9:Gerenciando.Virtualização de Estado do Usuário Para Desktops EmpresariaisEste módulo descreve como planejar e configurar a virtualização de estado do usuário para fornecer uma

experiência de cliente consistente mesaLições  Visão de Virtualização de Estado do Usuário  Planejamento Virtualização de Estado do Usuário

 Configurando perfis de roaming, redirecionamento de pastas e arquivos offline  Implementação de Virtualização Microsoft Experiência do Usuário

Laboratório: Implantação e Gerenciamento de Virtualização de Estado do Usuário  Planejamento Virtualização de Estado do Usuário

 Virtualização Estado implementar Usuário

Depois de concluir este módulo, os alunos serão capazes de:

 Descrever os componentes, benefícios e tecnologias que compõem USV.

(13)

de Estado do Usuário.

 Configurar perfis de roaming, redirecionamento de pasta, e gerenciar as configurações de arquivo offline.

 Descrever o planejamento e tarefas necessárias para implementar o Microsoft UE-V. Módulo10:.Planejando e implementando uma infra-estrutura de atualizações para apoiar osalunosdesktops corporativosserá capaz de planejar e implementar uma infra-estrutura para suportar atualizações de desktops corporativos físicos e virtuaisLições

 Planejando uma infra-estrutura de atualizações para a empresa

 Implementação do Configuration Manager 2012 para suportar atualizações de software  Atualizações Gerenciando para máquinas virtuais e imagens

 Usando o Windows Intune para gerenciamento de atualizações de software Laboratório: Planejamento e Implementação de uma infra-estrutura de Atualizações

 Planejando uma infra-estrutura Atualizações

 Execução atualizações de software usando o Configuration Manager 2012  Implementação de atualizações de software para Bibliotecas Virtual Machine Depois de concluir este módulo, os alunos serão capazes de:

 Descrever as considerações e os métodos utilizados para implementar uma empresa infra-estrutura baseada atualizações.

 Descrever como usar o Configuration Manager 2012 para implantar e gerenciar atualizações de software.

 Descreva como atualizações de software podem ser gerenciadas para máquinas virtuais e imagens.

 Descreva como o Windows Intune pode ser configurado para implantar e gerenciar atualizações de software.

Módulo 11:Proteger.Desktops corporativos da perda de malware e dadosEste módulo descreve como usar as tecnologias System Center, como Endpoint Protection e Data Protection Manager (DPM) para proteger desktops corporativos de perda de malware e dadosLições

 Visão geral do Sistema de Endpoint Protection Center 2012

 Configurar as definições Endpoint Protection Client e status de monitoramento  Usando o Windows Intune Endpoint Protection

 Proteger áreas de trabalho usando o System Center Data Protection Manager 2012 Laboratório: Endpoint Protection Implementação Cliente

 Configuração do ponto de Endpoint Protection

 Configuração e implantação Polícias Endpoint Protection

 Definindo as configurações de cliente para suportar Endpoint Protection  Endpoint Protection Monitoring

Laboratório: Protecção de Dados Configuração para dados do computador cliente  Configurando e Verificando Protecção de Dados Cliente

Depois de concluir este módulo, os alunos serão capazes de:

 Descreva como o System Center Endpoint Protection 2012 é configurado para fornecer proteção contra malware para desktops.

 Configurar o terminal configurações do cliente de Proteção e monitorar o status de Endpoint Protection.

 Descreva como integrar e configurar o Windows Intune para prestar serviços de proteção de endpoint.

 Descreva como o System Center DPM 2012 pode ser usado para proteger desktops corporativos.

Módulo12:.Monitorando o desempenho e Saúde do Desktop InfrastructureEste módulo descreve como identificar e controlar os serviços relevantes e componentes para assegurar a saúde eo desempenho da infra-estrutura de desktop empresarialLições

(14)

 Monitorando o Virtual Desktop Infrastructure

Laboratório: Monitorando o desempenho e Saúde do Desktop Infrastructure  Desempenho configurar e monitorar Confiabilidade para Desktops

 Configurando o gerenciador de Operações de Monitoramento de Ambientes Virtuais Depois de concluir este módulo, os alunos serão capazes de:

 Descrever os métodos usados para monitorar o desempenho ea saúde da infra-estrutura de desktop físico.

 Descrever os métodos utilizados para monitorar a saúde eo desempenho da infra-estrutura de desktop virtual.

Pré-requisitos

Antes de participar deste curso, os alunos devem ter:  Sólida compreensão do TCP / IP e conceitos de rede

 Sólidos conhecimentos de Windows e Active Directory Domain Services (AD DS), por exemplo, a adesão contas de domínio de usuário, domínio vs contas de usuários locais, perfis de usuário e grupo

 Bom entendimento de scripts e arquivos em lote

 Sólida compreensão dos conceitos de segurança, como autenticação e autorização  Familiaridade com os recursos de cliente de administração do Windows Server

 Conhecimento geral de ferramentas de gestão, tais como System Center Configuration Manager 2012, System Center Operations Manager 2012 eo System Center Data Protection Manager 2012.

 Familiaridade com as imagens, embalagens e conceitos operacionais de implantação do sistema

 Familiaridade com certificados e Autoridade de Certificação de implementação (CA) e configuração

 Conhecimento equivalente ao Windows 2012 MCSA

 Experimente administração do Windows Server em um ambiente que normalmente tem as seguintes características:

 2.500 a 50.000 ou mais utilizadores

 Vários locais físicos e controladores de domínio múltiplos

 Serviços de rede e recursos, tais como mensagens, bancos de dados de arquivos e de impressão, firewalls, acesso à Internet, intranet e gerenciamento de computador cliente  Suporte para Windows 8 clientes desktops

 Implantação e gerenciamento de aplicativos físicos e virtuais Comunidade

Para o conselhotiver dúvidassobre treinamento e certificação, se conectar comcolegas?:  Visite o fórum de formação e certificação

Para perguntas sobre uma certificação específica, conversar com um Microsoft Certified Professional (MCP):

 Visite newsgroups nossos MCP

Para saber mais sobre blogs, sites recomendados e futuras reuniões ao vivo sobre temas populares, visite o nosso site da comunidade:

 Visite o Microsoft comunidade de aprendizagem

(15)

Course 20416A:

Implementing Desktop Application Environments

Length: 5 Days

Published: January 14, 2013

Language(s): English

Audience(s): IT Professionals

Level: 300

Technology: Windows Server 2012

Type: Course

Delivery Method: Instructor-led (classroom) Show all items

Overview

About this Course

This five-day course provides students with the skills and knowledge to be able to design, deploy and manage a physical as well as a virtual Windows Server 2012 application management infrastructure. Students will also learn to design, deploy and manage Windows 8 Enterprise applications in a physical and virtual environment as well as in the cloud. Students should have experience with course 20415: Implementing a Desktop Infrastructure, and have their Windows 2012 Server certification (MCSA) or equivalent skills. This course also maps to and supports exam 70-416: Implementing Desktop Application Environments.

Audience Profile

This course is intended for IT Professionals who are interested in specializing in Windows 8 application deployments and managing the application environments for large organizations. People attending this training could be support technicians or currently in deployment roles and are considering taking the next step in their career or enhancing their skills in the areas of planning and deploying Windows 8 desktops.

A secondary audience for this course is IT professionals who are looking to take one or both exams: 70-415: Implementing an Enterprise Desktop and Device Infrastructure and 70-416: Implementing Desktop Application Environments as a stand-alone, or as part of the requirement for the MCSE: Desktop Infrastructurecertification.

At Course Completion

After completing this course, students will be able to:

 Design an application distribution strategy that is appropriate for an organizational environment.

 Diagnose and remediate application compatibility problems for desktop and presentation virtualization-based deployments.

(16)

 Deploy applications centrally using Configuration Manager.

 Configure self-service application deployment using Configuration Manager, Service Manager, and Windows 8 Application Store.

 Design and deploy Windows Server 2012 roles and features to support presentation virtualization.

 Prepare, deploy and manage applications for Remote Desktop, RemoteApp, and Remote Desktop Web Access.

 Design and deploy Windows Server 2012 roles and features to support application virtualization.

 Virtualize and deploy applications by using App-V and System Center 2012 Configuration Manager.

 Plan and configure the appropriate infrastructure to streamline the deployment of software updates to applications, and plan and configure application security.  Plan and implement application upgrades, supersedence, and application coexistence.  Monitor the deployment, performance, and utilization of applications and determine

whether current application hosting platforms are meeting business needs.

Course Details

Course OutlineModule 1: Designing an Application Distribution Strategy

This module explains how to design an application distribution strategy that is appropriate for an organizational environment.

Lessons

 Determining Business Requirements for Application Distribution  Overview of Application Distribution Strategies

Lab : Designing an Application Deployment Strategy

 Choosing an Appropriate Application Deployment Strategy for the Sydney Office  Choosing an Appropriate Application Deployment Strategy for the Melbourne Office  Choosing an Appropriate Application Deployment Strategy for the Brisbane Office  Choosing an Appropriate Application Deployment Strategy for the Wellington Office  Choosing an Appropriate Application Deployment Strategy for the Perth Office After completing this module, students will be able to:

 Determine business requirements for application distribution.

 Design an application distribution strategy appropriate for an organizational environment.

Module 2: Diagnosing and Remediating Application CompatibilityThis module explains how to diagnose and remediate application compatibility problems for desktop and presentation virtualization-based deployments.Lessons

(17)

 Evaluating and Implementing Remediation Solutions

 Resolving Compatibility Issues with the Application Compatibility Toolkit Lab : Diagnosing and Remediating Application Compatibility

 Installing and Configure ACT

 Analyzing Applications for Potential Compatibility Issues  Mitigating Application Compatibility Issues

 Automating the Deployment of Shims

After completing this module, students will be able to:

 Describe common compatibility issues, and determine whether an application is compatible with the Windows 8 operating system prior to deploying the application.  Determine an appropriate solution to remediate application compatibility issues.  Resolve application compatibility issues by using the Application Compatibility Toolkit.

Module 3: Deploying Applications by Using Group Policy and Windows IntuneThis module explains how to use Group Policy and Windows Intune to deploy applications to client devices.

Lessons

 Deploying Applications by Using Group Policy  Deploying Applications by Using Windows Intune

Lab : Centralizing Application Deployment by Using Group Policy and Windows Intune  Deploying an Application by Using Group Policy

 Performing Windows Intune Simulations After completing this module, students will be able to:

 Deploy applications centrally by using Group Policy.  Deploy applications to clients using Windows Intune.

Module 4: Deploying Applications by Using System Center Configuration ManagerThis module covers how to deploy applications centrally using Configuration Manager.Lessons

 Understanding Application Deployment by Using Configuration Manager 2012  Deploying Applications by Using Configuration Manager 2012

Lab : Deploying Applications by Using Configuration Manager 2012  Create a Configuration Manager 2012 Query

 Create Configuration Manager 2012 User and Device Collections After completing this module, students will be able to:

 Configure Configuration Manager 2012 to support application deployment.  Deploy applications by using Configuration Manager 2012.

Module 5: Configuring Self-Service Application DeploymentThis module explains how to

configure self-service application deployment using Configuration Manager, Service Manager, and Windows 8 Application Store.Lessons

(18)

 Configuring Self-Service with Windows Intune

 Self-Service Deployment with Configuration Manager 2012  Self-Service Deployment with Service Manager 2012 Lab : Configuring Self-Service Application Deployment

 Preparing System Center 2012 Configuration Manager to Support a Service Manager 2012 Self-Service Portal

 Configuring a Service Manager 2012 Self-Service Portal

 Verifying that Users Are Able to Provision Applications by Using the Self-Service Portal After completing this module, students will be able to:

 Plan and configure self-service application deployment.

 Configure self-service application deployment by using Windows Intune.  Plan self-service application deployment and configure self-service application

deployment using Configuration Manager.

 Describe Service Manager’s self-service catalog and how to deploy it.

Module 6: Designing and Implementing Presentation Virtualization Infrastructure

This module describes how to design and deploy Windows Server 2012 roles and features to support presentation virtualization.

Lessons

 Assessing Presentation Virtualization Requirements  Planning Presentation Virtualization Infrastructure  Deploying Presentation Virtualization Infrastructure

Lab : Deploying and Implementing Presentation Virtualization Infrastructure  Assessing Capacity Requirements for Presentation Virtualization  Deploying Highly Available Presentation Virtualization Infrastructure After completing this module, students will be able to:

 Assess presentation virtualization infrastructure requirements.

 Design a presentation virtualization infrastructure that meets business requirements.  Deploy a presentation virtualization infrastructure.

Module 7: Preparing, Configuring and Deploying Presentation Virtualization ApplicationsThis module explains how to prepare, deploy and manage applications for Remote Desktop, RemoteApp, and Remote Desktop Web Access.Lessons

 Determining Presentation Virtualization Application Strategies  Deploying Remote Desktop, RemoteApp, and RD Web Access Lab : Configuring Applications for Presentation Virtualization

 Configuring Access to RD Session Host Resources  Deploying RD Session Host Desktop Applications  Configuring and Deploying a RemoteApp Application  Verifying Applications by Using RD Web Access After completing this module students will be able to:

(19)

 Plan and deploy Remote Desktop Session Host servers as traditional, RemoteApp, and Remote Desktop Web Access.

Module 8: Designing and Deploying an Application Virtualization Environment

This module covers how to design and deploy Windows Server 2012 roles and features to support application virtualization.

Lessons

 Overview of Application Virtualization Models

 Deploying Application Virtualization Infrastructure Components  Configuring Application Virtualization Client Support

Lab : Planning and Deploying Application Virtualization Infrastructure  Planning the Deployment of App-V Roles and Features

 Deploying App-V Infrastructure  Configuring App-V Client Settings

After completing this module, students will be able to:

 Deploy the components needed to support various App-V models.  Deploy the App-V full infrastructure model.

 Deploy and configure the App-V client.

Module 9: Preparing, Sequencing, and Deploying Virtual Applications

This module describes how to virtualize and deploy applications by using App-V and System Center 2012 Configuration Manager.

Lessons

 Sequencing Applications with App-V  Deploying App-V Applications

Lab : Virtualizing Applications by Using App-V Sequencer and Deploy Sequenced Applications  Installing and Configuring App-V Sequencer

 Sequencing Applications

 Deploying App-V Applications by Using Configuration Manager After completing this module, students will be able to:

 Sequence applications.

 Use different methods to deploy an App-V application.

Module 10: Planning and Implementing Application Updates and Security

This module covers how to plan and configure the appropriate infrastructure to streamline the deployment of software updates to applications. It also describes how to plan and configure application security.

Lessons

 Planning Application Updates  Deploying Updates With WSUS

(20)

 Implementing Application Security

Lab : Planning and Deploying Application Updates

 Determining an Appropriate Update Deployment Strategy  Updating Deployed Applications

 Updating an App-V Application

 Deploying AppLocker Policy to Control Application Execution After completing this module, students will be able to:

 Plan for application updates.

 Use WSUS to manage application updates.

 Deploy application updates by using Configuration Manager 2012.

 Implement application security using Group Policy and System Center 2012 Endpoint Protection.

Module 11: Planning and Implementing Application Upgrade and SupersedenceThis module explains how to plan and implement application upgrades and supersedence. It also covers how to plan and implement application coexistence.Lessons

 Planning and Implementing Application Upgrades and Supersedence  Planning and Implementing Application Coexistence

Lab : Upgrading Applications

 Planning an Application Upgrade Strategy  Upgrading a Deployed Application  Replacing a Deployed Application

 Configuring Application Version Coexistence After completing this module, students will be able to:

 Plan and implement application upgrades and supersedence.  Plan and implement application coexistence.

Module 12: Monitoring Application Deployment, Utilization, and Performance This module describes how to monitor the deployment, performance, and utilization of

applications and determine whether current application hosting platforms are meeting business needs.

Lessons

 Planning and Implementing Application Monitoring Infrastructure  Application Metering, Inventory and Asset Intelligence

 Monitoring Application Resource Utilization Lab : Planning and Implementing Application Monitoring

 Planning Application Inventory  Generating Software Inventory  Metering Application Usage

 Monitoring Application Resource Utilization on RD Session Host Servers  Remediating Peak Resource Utilization

(21)

 Plan and perform application monitoring.

 Create an application inventory and perform metering.  Monitor application resource utilization.

Prerequisites

The attendee should have experience administering Windows Server in an environment that typically has the following characteristics:

 2,500 to 50,000 or more users

 Multiple physical locations and multiple domain controllers

 Network services and resources such as messaging, databases, file and print, firewalls, Internet access, an intranet, and client computer management

The attendee should have:

 Experience supporting Windows 8 client desktops and deploying and managing applications, both physical and virtual.

 An MCSA and 20415A or equivalent knowledge.

In addition to their professional experience, students who attend this training should already have the following technical knowledge, and should:

 Have solid understanding of TCP/IP and networking concepts.

 Have a solid understanding of Windows and Active Directory Domain Services (AD DS), for example, domain user accounts, domain vs. local user accounts, user profiles, and group membership.

 Understand how to use scripts and batch files.

 Have solid understanding of security concepts such as authentication and authorization.  Be able to perform a clean installation of Windows 8, upgrade to Windows 8, and migrate

user-related data and settings from Windows XP.

 Be able to configure disks, partitions, volumes, and device drivers to enable Windows 8 to function as desired.

 Be able to configure and troubleshoot permissions and other settings to allow access to resources and applications on Windows 8 Systems.

 Be able to configure settings to enable network connectivity.

 Be able to configure and troubleshoot a wireless network connection.  Be able to configure and troubleshoot Windows 8 security.

 Be able to configure mobile computers and devices.

 Understand the client administration capabilities of Windows Server and be familiar with management tools such as the Microsoft System Center suite of products.

(22)

 Understand the concepts of deployment, packaging, and imaging.  Have a familiarity with SQL Server concepts.

Students who attend this training can meet the prerequisites by attending the following courses, or obtaining equivalent knowledge and skills:

 20410A: Installing and Configuring Windows Server 2012  20411A: Administering Windows Server 2012

 20412A: Configuring Advanced Windows Server 2012 services  20415A: Implementing a Desktop Infrastructure

Community

Have Questions?For advice about training and certification, connect with peers:  Visit the training and certification forum

For questions about a specific certification, chat with a Microsoft Certified Professional (MCP):  Visit our MCP newsgroups

To find out about recommended blogs, Web sites, and upcoming Live Meetings on popular topics, visit our community site:

Referências

Documentos relacionados

Teste com voluntários da análise realizada pelo método ASTM D 1209-00 Este teste visou à obtenção de resultados de análise de cor pelo método ASTM D 1209-00 a

Conforme a norma constitucional exclui o caráter salarial de qualquer montante pago a título de participação nos lucros ou resultados, concedendo-lhe natureza jurídica

KREHER, LENA PETRA RFV Groß-Zimmern 1949 e.V... SALIBA,NADINE RFV

Ele relembra, neste aspecto, o papel de uma disciplina específica, chamada Heimatkunde (Heimat: localidade/pátria, Kunde: história/conhecimento), cujo conteúdo era

Para continuar em prova, os atletas devem chegar e sair do posto de controlo antes do seu encerramento, caso contrário, só poderão continuar se entregarem o

5.  36  Mas Marte, que da Deusa sustentava  Entre todas as partes em porfia,  Ou porque o amor antigo o obrigava, 

Os pacientes que ingeriram uma quantidade de glibenclamida que possa implicar em risco de vida, requerem atendimento médico de urgência para desintoxicação (por

Do lado de fora da bombona, podemos conectar uma extensão na ponta desse tubo (ladrão) para conectá-la a mais uma Minicisterna ou a uma cisterna (repetindo