🇩🇪
Programm

  1. Assessing and Determining Desktop Deployment Options


    1. Overview of the Enterprise Desktop Life Cycle

    2. Assessing Hardware and Infrastructure Readiness for a Desktop Deployment

    3. Overview of Enterprise Desktop Deployment Methods

    4. Volume Activation Technologies for Enterprise Desktops


      1. Assessing and Determining Desktop Deployment Options




  2. Planning An Image Management Strategy


    1. Overview of Windows Image Formats

    2. Overview of Image Management


      1. Planning an Image Management Strategy




  3. Implementing Desktop Security


    1. Implementing a Centralized Desktop Security Solution

    2. Planning and Implementing BitLocker

    3. Planning and Implementing Encrypted File System


      1. Configuring Desktop Security

      2. Configuring File Encryption Using EFS




  4. Capturing and Managing a Desktop Operating System Image


    1. Overview of Windows ADK

    2. Managing the Windows Preinstallation Environment

    3. Building a Reference Image Using Windows SIM and Sysprep

    4. Capturing and Servicing a Reference Image

    5. Configuring and Managing Windows Deployment Services


      1. Preparing the Imaging and Preinstallation Environment

      2. Building a Reference Image Using Windows SIM and Sysprep

      3. Capturing and Servicing a Reference Image

      4. Configuring and Managing Windows Deployment Services




  5. Planning and Implementing User State Migration


    1. Overview of User State Migration

    2. Planning User State Migration by Using USMT

    3. Migrating User State by Using USMT


      1. Planning and Implementing User State Migration

      2. Migrating User State Using Hard-Link Migration




  6. Planning and Deploying Desktops Using the Microsoft Deployment Toolkit


    1. Planning for the Lite Touch Installation Environment

    2. Implementing MDT 2012 for Lite Touch Installation

    3. Integrating Windows Deployment Services with MDT


      1. Planning and Deploying Desktops Using the Microsoft Deployment Toolkit




  7. Planning and Deploying Desktops by Using System Center 2012 Configuration Manager


    1. Planning the Zero Touch Installation Environment

    2. Preparing the Site for Operating System Deployment

    3. Building a Reference Image Using a Configuration Manager Task Sequence

    4. Using MDT Task Sequences to Deploy Client Images


      1. Preparing the Environment for Operating System Deployment

      2. Using MDT and Configuration Manager to Perform a Zero-Touch Installation




  8. Planning and Implementing a Remote Desktop Services Infrastructure


    1. Overview of Remote Desktop Services

    2. Planning the Remote Desktop Services Environment

    3. Configuring a Virtual Desktop Infrastructure Deployment

    4. Configuring a Session-Based Desktop Deployment

    5. Extending the Remote Desktop Services Environment to the Internet


      1. Planning and Implementing a Remote Desktop Services Infrastructure

      2. Extending Internet Access to the RDS Infrastructure




  9. Managing User State Virtualization For Enterprise Desktops


    1. Overview of User State Virtualization

    2. Planning User State Virtualization

    3. Configuring Roaming Profiles, Folder Redirection, and Offline Files

    4. Implementing Microsoft User Experience Virtualization


      1. Deploying and Managing User State Virtualization




  10. Planning and Implementing an Updates Infrastructure to Support Enterprise Desktops


    1. Planning an Updates Infrastructure for the Enterprise

    2. Implementing Configuration Manager 2012 to Support Software Updates

    3. Managing Updates for Virtual Machines and Images

    4. Using Windows Intune for Managing Software Updates


      1. Planning and Implementing an Updates Infrastructure




  11. Protecting Enterprise Desktops from Malware and Data Loss


    1. Overview of System Center 2012 Endpoint Protection

    2. Configuring Endpoint Protection Client Settings and Monitoring Status

    3. Using Windows Intune Endpoint Protection

    4. Protecting Desktops by Using System Center 2012 Data Protection Manager


      1. Implementing Client Endpoint Protection

      2. Configuring Data Protection for Client Computer Data




  12. Monitoring the Performance and Health of the Desktop Infrastructure


    1. Performance and Health Monitoring for the Desktop Infrastructure

    2. Monitoring the Virtual Desktop Infrastructure


      1. Monitoring the Performance and Health of the Desktop Infrastructure




Ziele
This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement a Windows 8 desktop infrastructure. The course provides guidance on planning and deploying desktops by using several technologies such as User State Migration Tool (USMT), Microsoft Deployment Toolkit (MDT), Virtual Desktop Infrastructure (VDI), and more. Additionally, the course describes how to protect desktops and monitor their health and performance.
Voraussetzungen
This course requires that you meet the following prerequisites:

    • Solid understanding of TCP/IP and networking concepts

    • Solid knowledge of Windows and Active Directory Domain Services (AD DS) - for example, domain user accounts, domain vs. local user accounts, user profiles, and group membership

    • Good understanding of scripts and batch files

    • Solid understanding of security concepts such as authentication and authorization

    • Familiarity with the client administration capabilities of Windows Server

    • General knowledge of management tools such as System Center 2012 Configuration Manager, System Center 2012 Operations Manager, and System Center 2012 Data Protection Manager.

    • Familiarity with imaging, packaging, and operating system deployment concepts

    • Familiarity with certificates and Certification Authority (CA) implementation and configuration

    • Knowledge equivalent to Windows 2012 MCSA

    • Experience administering Windows Server in an environment that typically has the following characteristics:

    • 2,500 to 50,000 or more users

    • Multiple physical locations and multiple domain controllers

    • Network services and resources such as messaging, databases, file and print, firewalls, Internet access, an intranet, and client computer management

    • Support for Windows 8 client desktops

    • Deployment and management of both physical and virtual applications