Understand Server Protection
The "Understand Server Protection" module provides you with the instruction and Server hardware to develop your hands on skills. This module includes the following exercises: 1. Configuring Securing DNS Updates, 2. Configuring Read-only Domain Controllers, 3. Install and Configure MBSA, 4. Configure WSUS.
The Understand Server Protection module provides you with the instruction and Server hardware to develop your hands on skills. This module includes the following exercises:
Configuring Securing DNS Updates
Configuring Read-only Domain Controllers
Install and Configure MBSA
Exercise 1 - Configuring Securing DNS Updates
In this exercise, you will learn the following using Windows Server 2008 R2:
- Configuring securing DNS updates
- Configuring read-only domain controllers
- Installing and configuring MBSA and verifying the Baseline information
- Install and Configure Windows Server Update Services
Exercise 2 - Configuring Read-only Domain Controllers
A read-only domain controller (RODC) is a type of domain controller in the Windows Server® 2008 operating system. Using an RODC, organizations can deploy a domain controller in areas where physical security cannot be assured. An RODC hosts read-only partitions of the Active Directory® Domain Services (AD DS) database.
In this task, you will learn the steps to configure read-only domain controllers.
Exercise 3 - Install and Configure MBSA
To easily assess the security state of Windows machines, Microsoft offers the free Microsoft Baseline Security Analyzer (MBSA) scan tool.
Microsoft Baseline Security Analyzer (MBSA) 2.0 is an easy-to-use tool that helps small and medium businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems.
In this task, you will learn to download, install and configure MBSA and verify the Baseline information.
Exercise 4 - Configure WSUS
After installing WSUS and beginning synchronization, configure WSUS by following these steps:
- Fine-tune the WSUS configuration by editing the WSUS options.
- Configure computer groups to allow you to distribute updates to different sets of computers at different times.
- Configure client computers to retrieve updates from your WSUS server.
- After testing updates, approve or decline them.
- View reports to verify that updates are being distributed successfully and identify any problems.
IT & Cybersecurity certification hands on practice labs and practice exams for certifications and skill development.
See the full benefits of our immersive learning experience with interactive courses and guided career paths.