Niche
Windows Server 2012

Implementing a Desktop Infrastructure
(Microsoft Training Course: 20415) - 5 days - £1850 exc VAT

Save up to 50% of the cost of some courses: check our Certification Packages or buy F1 Training Vouchers
 Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep 
Extended Classroom 02         03   
London International House Centre E1W 02        06 03   


> Target Audience
This course provides you with the skills and knowledge needed to plan, design, and implement a Windows 8 desktop infrastructure. It is primarily intended for IT Professionals who manage the desktop environments for organizations, and want to specialize in Windows 8 desktop deployments.
> Course outline
  1. Assessing and Determining Desktop Deployment Options
  2. Planning an Image Management Strategy
  3. Implementing Desktop Security
  4. Capturing and Managing a Desktop Operating System Image
  5. Planning and Implementing User State Migration
  6. Planning and Deploying Desktops using the Microsoft Deployment Toolkit
  7. Planning and Deploying Desktops by using System Center 2012 Configuration Manager
  8. Planning and Implementing a Remote Desktop Services Infrastructure
  9. Managing User State Virtualization for Enterprise Desktops
  10. Planning and Implementing an Updates Infrastructure to Support Enterprise Desktops
  11. Protecting Enterprise Desktops from Malware and Data Loss
  12. Monitoring the Performance and Health of the Desktop Infrastructure


Module 1: Assessing and Determining Desktop Deployment Options
  • Overview of the Enterprise Desktop Life Cycle
  • Assessing Hardware and Infrastructure Readiness for a Desktop Deployment
  • Enterprise Desktop Deployment Methods
  • Volume Activation Technologies for Enterprise Desktops
  • Lab: Assessing and Determining Desktop Deployment Options
  • Planning a Desktop Deployment Strategy
  • Collecting Infrastructure Data
  • Implementing a Volume Activation Solution
Skills
  • Describe the enterprise desktop life cycle
  • Assess hardware and infrastructure readiness for a desktop deployment
  • Describe the available methods for deploying enterprise desktops
  • Describe volume activation technologies for enterprise desktops
top
Module 2: Planning an Image Management Strategy
  • Overview of Windows Image Formats
  • Overview of Image Management
  • Lab: Planning an Image Management Strategy
  • Assessing Business Requirements to Support an Image Management Strategy
Skills
  • Describe image formats used for Windows desktop deployments
  • Determine the type and content of images used in an image management strategy
top
Module 3: Implementing Desktop Security
  • Implementing a Centralized Desktop Security Solution
  • Planning and Implementing BitLocker
  • Planning and Implementing Encrypted File System
  • Lab: Configuring Desktop Security
  • Configure Desktop Security using Group Policy
  • Configure Drive Encryption Using BitLocker
  • Lab: Configuring File Encryption Using EFS
  • Implement a Centrally Managed EFS Solution
  • Implementing an EFS Recovery Solution
Skills
  • Implement a centralized secure desktop solution by using Group Policy settings
  • Implement device encryption using BitLocker
  • Plan and implement a centrally managed EFS solution to secure file and folders on enterprise desktops
top
Module 4: Capturing and Managing a Desktop Operating System Image
  • Overview of Windows ADK and managing the Windows Preinstallation Environment
  • Building a Reference Image Using Windows SIM and Sysprep
  • Capturing and Servicing a Reference Image
  • Configuring and Managing WDS
  • Lab: Preparing the Imaging and Preinstallation Environment
  • Installing Windows ADK and configuring a Custom Windows PE Environment
  • Lab: Building a Reference Image Using Windows SIM and Sysprep
  • Building a Custom Answer File Using Windows SIM and installing a Reference Computer Using a Custom Answer File
  • Generalizing a Reference Computer Using Sysprep
  • Lab: Capturing and Servicing Reference Image
  • Lab: Configuring and Managing WDS
  • Planning the WDS Environment and installing and Configuring the WDS Server Role
  • Capturing a Reference Image Using WDS
  • Deploying an Image Using WDS
Skills
  • Identify the purpose and key features of the Windows ADK
  • Describe the Windows PE environment and how it can be customized to address specific image and deployment requirements
  • Describe the Windows Setup and preparation process and how it can be modified using answer files created with Windows SIM and the Sysprep utility
  • Use DISM to capture and service an image
  • Configure and manage WDS to help support an image capture and deployment solution
top
Module 5: Planning and Implementing User State Migration
  • Overview of User State Migration
  • Planning User State Migration by Using USMT
  • Migrating User State by Using USMT
  • Lab: Planning / Implementing User State Migration
  • Planning for User State Migration
  • Creating and Customizing the USMT XML Files
  • Capturing / Restoring User State Using USMT
  • Lab : Migrating User State Using Hard-Link Migration, Performing a Hard-Link Migration
Skills
  • Describe the concept of user state migration and identify the features available in USMT 5.0 to assist in the migration task
  • Plan appropriate scenario, data to migrate, & storage location for user state migration task
  • Migrate user state by using USMT 5.0
top
Module 6: Planning and Deploying Desktops using the Microsoft Deployment Toolkit
  • Planning the Lite Touch Installation Environment and implementing MDT 2012 for Lite Touch Installation
  • Integrating WDS with MDT
  • Lab: Planning /Deploying Desktops Using MDT
  • Planning for the MDT Lite Touch Installation Environment and installing MDT 2012 and the Prerequisite Components
  • Creating and Configuring the MDT 2012 Deployment Share
  • Deploying and Capturing a Reference Operating System Image
  • Integrating WDS with MDT 2012 To Provide PXE Boot Capabilities
Skills
  • Identify the process and components needed to plan a Lite Touch Installation (LTI) environment
  • Understand the process and tasks needed to implement MDT 2012 to support LTI
  • Describe how Windows Deployment Services can be configured to integrate with MDT 2012
top
Module 7: Planning and Deploying Desktops by using System Center 2012 Configuration Manager
  • Planning the Zero Touch Installation Environment
  • Preparing Site for Operating System Deployment
  • Building a Reference Image Using a Configuration Manager Task Sequence
  • Using MDT Task Sequences to Deploy Images
  • Lab: Preparing the Environment for Operating System Deployment
  • Planning the Operating System Deployment Infrastructure and preparing the Zero Touch Installation Environment
  • Configuring the Deployment Packages and System Images
  • Lab: Using MDT and Configuration Manager to Perform a Zero-Touch Installation
Skills
  • Identify the infrastructure and components to support a Zero Touch Installation scenario
  • Describe the preparation tasks required to support operating system deployment using Configuration Manager 2012
  • Describe how Configuration Manager task sequences are used to build a reference image to be used in a zero touch installation solution
  • Configure a MDT task sequence to be used to deploy a client image
top
Module 8: Planning and Implementing a Remote Desktop Services Infrastructure
  • Overview of Remote Desktop Services
  • Planning the Remote Desktop Services Environment
  • Configuring a VDI Deployment, and a Session-Based Desktop Deployment
  • Extending the Remote Desktop Services Environment to the Internet
  • Lab: Planning and Implementing a Remote Desktop Services Infrastructure
  • Planning the Remote Desktop Services Environment and configuring a VDI Scenario
  • Configuring a Session-Based Desktop Scenario
  • Lab: Extending Internet Access to the RDS Infrastructure
  • Planning the RD Gateway Policies
  • Configuring the RD Gateway
Skills
  • Describe how Remote Desktop Services supports VDI and session virtualization deployment
  • Plan the appropriate infrastructure and role requirements for a RDS environment
  • Describe processes and tasks needed to configure a VDI deployment scenario
  • Describe processes and tasks needed to configure a session-based desktop scenario
  • Describe the components needed to extend remote desktop services to the Internet
top
Module 9: Managing User State Virtualization for Enterprise Desktops
  • Overview of User State Virtualization
  • Planning USV, and configuring Roaming Profiles, Folder Redirection, and Offline Files
  • Implementing Microsoft User Experience Virtualization
  • Lab: Deploying and Managing USV
  • Planning / implementing User State Virtualization
Skills
  • Describe the components, benefits, and technologies that makes up USV
  • Describe the planning process used to assess and implement User State Virtualization
  • Configure roaming profiles, folder redirection, and manage offline file settings
  • Describe the planning and tasks required to implement Microsoft UE-V
top
Module 10: Planning and Implementing an Updates Infrastructure to Support Enterprise Desktops
  • Planning an Updates Infrastructure for Enterprise
  • Implementing Configuration Manager 2012 to Support Software Updates
  • Managing Updates for Virtual Machines / Images
  • Windows Intune for Managing Software Updates
  • Lab: Planning and Implementing an Updates Infrastructure
  • Planning an Updates Infrastructure
  • Implementing Software Updates Using Configuration Manager 2012
  • Implementing Software Updates for Virtual Machine Libraries
Skills
  • Describe methods used for implementing an enterprise-based updates infrastructure
  • Describe how to use Configuration Manager 2012 to deploy and manage software updates
  • Describe how software updates can be managed for virtual machines and images
  • Describe how Windows Intune can be configured to deploy and manage software updates
top
Module 11: Protecting Enterprise Desktops from Malware and Data Loss
  • Overview of System Center 2012 Endpoint Protection
  • Configuring Endpoint Protection Client Settings and Monitoring Status
  • Using Windows Intune Endpoint Protection
  • Protecting Desktops by Using System Center 2012 Data Protection Manager
  • Lab : Implementing Client Endpoint Protection
  • Configuring and Deploying Endpoint Protection Polices, and configuring Client Settings to Support Endpoint Protection
  • Monitoring Endpoint Protection
  • Lab : Configuring Data Protection for Client Computer Data
Skills
  • Describe how System Center 2012 Endpoint Protection is configured to provide malware protection for desktops
  • Configure the Endpoint Protection client settings and monitor Endpoint Protection status
  • Describe how to integrate and configure Intune to provide endpoint protection services
  • Describe how System Center 2012 DPM can be used to protect enterprise desktops
top
Module 12: Monitoring the Performance and Health of the Desktop Infrastructure
  • Performance and Health Monitoring for the Desktop Infrastructure
  • Monitoring the Virtual Desktop Infrastructure
  • Lab: Monitoring the Performance and Health of the Desktop Infrastructure
  • Configuring Performance / Reliability Monitoring for Desktops and configuring Operations Manager for Monitoring Virtual Environments
Skills
  • Describe methods used to monitor the performance and health of a physical desktop infrastructure / virtual desktop infrastructure
top
> Pre-Requisites
Before attending this course, students must have the following prerequisites:
  • Delegates must have obtained at least an MSCA qualification or have equivalent knowledge to attend this course. A full list of pre-requisites is available on request.
> Purpose
After completing this course, students will be able to assess and determine desktop deployment options; plan an image management strategy; implement desktop security; capture and manage a desktop operating system image; plan and implement User State Migration; plan and deploy desktops by using the Microsoft Deployment Toolkit; plan and deploying desktops by using System Center 2012 Configuration Manager; plan and implement a Remote Desktop Services infrastructure; manage user state virtualization for enterprise desktops; plan and implement an updates infrastructure to support enterprise desktops; protect enterprise desktops from malware and data loss; monitoring the performance and health of the desktop infrastructure.