Course 20415: Implementing a Desktop Infrastructure
January 14, 2013
About this course
This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement a Windows 8 desktop infrastructure. The course provides guidance on planning and deploying desktops by using several technologies such as User State Migration Tool (USMT), Microsoft Deployment Toolkit (MDT), Virtual Desktop Infrastructure (VDI), and more. Additionally, the course describes how to protect desktops and monitor their health and performance.Audience profileThe course is primarily intended for IT Professionals who manage the desktop environments for organizations, and want to specialize in Windows® 8 desktop deployments. These IT professionals typically work in complex computing environments of large to enterprise-sized organizations. In addition. the secondary audience for this course includes IT professionals who want to take the 70-415: Implementing an Enterprise Desktop and Device Infrastructure exam as a stand-alone, or as part of the requirement for the MCSE: Desktop Infrastructure certification.At course completionAfter completing this course, students will be able to:
- Assess and determine desktop deployment options.
- Plan an image management strategy.
- Implement desktop security.
- Capture and manage a desktop operating system image.
- Plan and implement User State Migration.
- Plan and deploy desktops by using the Microsoft Deployment Toolkit.
- Plan and deploying desktops by using System Center 2012 Configuration Manager.
- Plan and implement a Remote Desktop Services infrastructure.
- Manage user state virtualization for enterprise desktops.
- Plan and implement an updates infrastructure to support enterprise desktops.
- Protect enterprise desktops from malware and data loss.
- Monitoring the performance and health of the desktop infrastructure.
- Course details
Course OutlineModule 1: Assessing and Determining Desktop Deployment OptionsThis module describes the enterprise desktop lifecycle and explains how you can assess hardware and infrastructure readiness. The module then describes how to identify and select the most appropriate deployment option based upon organizational requirements.Lessons
- Overview of the Enterprise Desktop Life Cycle
- Assessing Hardware and Infrastructure Readiness for a Desktop Deployment
- Using MAP to Assess Deployment Readiness
- Overview of Enterprise Desktop Deployment Methods
- Volume Activation Technologies for Enterprise Desktops
Module 2: Planning An Image Management StrategyThis modules describes Windows image formats and helps you to define an efficient image management strategy based upon business requirements.LessonsAfter completing this module, students will be able to:
- Planning a Desktop Deployment Strategy
- Collecting Infrastructure Data
- Implementing a Volume Activation Solution
- Describe the enterprise desktop life cycle.
- Explain how to assess hardware and infrastructure readiness for a desktop deployment.
- Describe how to use MAP to assess deployment readiness.
- Describe the available methods for deploying enterprise desktops.
- Describe volume activation technologies for enterprise desktops.
- Overview of Windows Image Format
- Overview of Image Management
Module 3: Implementing Desktop SecurityThis module describes how to deploy and manage a secure desktop by implementing centralized policies, BitLocker settings, and Encrypted File System (EFS) settings.LessonsAfter completing this module, students will be able to:
- Assessing Business Requirements to Support an Image Management Strategy
- Describe image formats used for Windows desktop deployments.
- Determine the type and content of images used in an image management strategy.
- Implementing a Centralized Desktop Security Solution
- Planning and Implementing BitLocker
- Planning and Implementing EFS
- Configuring Desktop Security by Using Group Policy
- Configuring Drive Encryption by Using BitLocker and MBAM
Module 4: Capturing and Managing a Desktop Operating System ImageThis module describes how to use the Windows Assessment and Deployment Kit (ADK) and Windows Deployment Services (WDS) to create, capture, and manage a desktop operating system image.LessonsAfter completing this module, students will be able to:
- Implementing a Centrally Managed EFS Solution
- Verifying EFS Document Recovery
- Implement a centralized secure desktop solution by using Group Policy settings.
- Plan and implement device encryption by using BitLocker.
- Plan and implement a centrally managed EFS solution to secure files and folders on enterprise desktops.
- Overview of Windows ADK
- Managing Windows PE
- Building a Reference Image by Using Windows SIM and Sysprep
- Capturing and Servicing a Reference Image
- Configuring and Managing Windows DS
- Installing Windows ADK
- Configuring a Custom Windows PE Environment
- Building a Custom Answer File Using Windows SIM
- Installing a Reference Computer by Using a Custom Answer File
- Generalizing a Reference Computer by Using Sysprep
- Capturing a Reference System Image
- Servicing a Reference System Image
Module 5: Planning and Implementing User State MigrationThis modules describes how to use the User State Migration Tool (USMT) to migrate appropriate user data and settings to a new desktop operating system.LessonsAfter completing this module, students will be able to:
- Planning the Windows Deployment Services Environment
- Installing and Configuring the Windows Deployment Services Server Role
- Capturing a Reference Image by Using Windows DS
- Deploying an Image by Using Windows DS
- Identify the purpose and key features of the Windows ADK.
- Describe the Windows PE environment and how it can be customized to address specific image and deployment requirements.
- Describe the Windows Setup and preparation process and how it can be modified using answer files created with Windows SIM and the Sysprep utility.
- Use DISM to capture and service a reference image.
- Configure and manage Windows DS to help support an image capture and deployment solution.
- Overview of User State Migration
- Planning User State Migration by Using USMT
- Migrating User State by Using USMT
- Planning for User State Migration
- Creating and Customizing the USMT XML Files
- Capturing and Restoring User State by Using USMT
Module 6: Planning and Deploying Desktops Using the Microsoft Deployment ToolkitThis module describes how to use the Microsoft Deployment Toolkit (MDT) 2012 to deploy Windows operating systems in lite touch installation scenarios.LessonsAfter completing this module, students will be able to:
- Performing a Hard-Link Migration by Using USMT
- Describe user state migration.
- Plan user state migration.
- Migrate user state by using the USMT.
- Planning for the LTI Environment
- Implementing MDT 2012 for LTI
- Integrating Windows DS with MDT
Module 7: Planning and Deploying Desktops by Using System Center 2012 Configuration ManagerThis describes how to use System Center 2012 Configuration Manager to implement a zero touch installation for deploying enterprise desktops.LessonsAfter completing this module, students will be able to:
- Planning for the MDT LTI Environment
- Installing MDT 2012 and Prerequisites
- Creating and Configuring the MDT 2012 Deployment Share
- Deploying and Capturing a Reference Operating System Image
- Integrating Windows DS with MDT 2012 To Provide PXE-Boot Capabilities
- Plan for the LTI environment.
- Implement MDT 2012 for LTI.
- Integrate Windows Deployment Services (DS) with the MDT 2012.
- Planning the ZTI Environment
- Preparing the Site for Operating System Deployment
- Building a Reference Image by Using a Configuration Manager Task Sequence
- Deploying Client Images by Using MDT Task Sequences
- Planning the Operating System Deployment Infrastructure
- Preparing the ZTI Environment
- Configuring the Deployment Packages and System Images
Module 8: Planning and Implementing a Remote Desktop Services InfrastructureThis module describes how to plan and implement session virtualization deployment and a virtual desktop infrastructure (VDI) based upon Windows Server 2012 Remote Desktop Services.LessonsAfter completing this module, students will be able to:
- Performing a ZTI
- Plan the ZTI environment.
- Prepare the site for operating system deployment.
- Build a reference image by using a Configuration Manager task sequence.
- Deploy client images by using MDT task sequences.
- Overview of Remote Desktop Services
- Planning the Remote Desktop Services Environment
- Configuring a Virtual Machine–Based Desktop Infrastructure Deployment
- Configuring a Session-Based Desktop Deployment
- Extending the Remote Desktop Services Environment to the Internet
Module 9: Managing User State Virtualization For Enterprise DesktopsThis module describes how to plan and configure user state virtualization to provide a consistent desktop client experience.LessonsAfter completing this module, students will be able to:
- Planning the Remote Desktop Services Environment
- Configuring a Virtual Machine-Based Desktop Infrastructure Scenario
- Configuring a Session-Based Desktop Scenario
- Configuring the RD Gateway Role Service
- Describe Remote Desktop Services.
- Plan the Remote Desktop Services environment.
- Configure a virtual machine–based desktop deployment.
- Configure a session-based desktop deployment.
- Extend the Remote Desktop Services environment to the Internet.
- Overview of User State Virtualization
- Planning User State Virtualization
- Configuring Roaming Profiles, Folder Redirection, and Offline Files
- Implementing UE-V
Module 10: Planning and Implementing an Updates Infrastructure to Support Enterprise DesktopsStudents will be able to plan and implement an updates infrastructure to support both physical and virtual enterprise desktops.LessonsAfter completing this module, students will be able to:
- Planning User State Virtualization
- Implementing User State Virtualization
- Describe User State Virtualization.
- Plan User State Virtualization.
- Configure roaming profiles, Folder Redirection, and Offline Files.
- Implement UE-V.
- Planning an Updates Infrastructure for the Enterprise
- Supporting Software Updates with System Center 2012 Configuration Manager
- Managing Updates for Virtual Machines and Images
- Using Windows Intune for Managing Software Updates
Module 11: Protecting Enterprise Desktops from Malware and Data LossThis module describes how to use System Center technologies such as Endpoint protection and Data Protection Manager (DPM) to protect enterprise desktops from malware and data loss.LessonsAfter completing this module, students will be able to:
- Planning an Updates Infrastructure
- Preparing a System Center 2012 Configuration Manager Site to Support Software Updates
- Determining Software Update Compliance
- Deploying Software Updates to Clients
- Describe considerations and methods for implementing an enterprise-based updates infrastructure.
- Describe how to use Microsoft System Center 2012 Configuration Manager to deploy and manage software updates.
- Describe how to manage software updates for virtual machines and images.
- Describe how to configure Windows Intune to deploy and manage software updates.
- Overview of System Center 2012 Endpoint Protection
- Configuring System Center 2012 Endpoint Protection Client Settings and Monitoring Status
- Using Windows Intune Endpoint Protection
- Protecting Desktops by Using DPM
- Configuring the Endpoint Protection Point
- Configuring and Deploying Endpoint Protection Polices
- Configuring Client Settings to Support Endpoint Protection
- Monitoring Endpoint Protection
Module 12: Monitoring the Performance and Health of the Desktop InfrastructureThis module describes how to identify and monitor relevant services and components to ensure the health and performance of the enterprise desktop infrastructure.LessonsAfter completing this module, students will be able to:
- Configuring and Verifying Client Data Protection
- Describe System Center 2012 Endpoint Protection.
- Explain how to configure System Center 2012 Endpoint Protection client settings and monitoring status.
- Describe how to use Windows Intune Endpoint Protection.
- Describe how to protect desktops by using DPM.
- Performance and Health Monitoring for the Desktop Infrastructure
- Monitoring VDI
After completing this module, students will be able to:
- Configuring Performance and Reliability Monitoring of Desktops
- Configuring Operations Manager for Monitoring Virtual Environments
- Monitor the health and performance of the desktop infrastructure.
- Monitor the VDI.
Before attending this course, students must have:
- Solid understanding of TCP/IP and networking concepts
- Solid knowledge of Windows and Active Directory Domain Services (AD DS)—for example, domain user accounts, domain vs. local user accounts, user profiles, and group membership
- Good understanding of scripts and batch files
- Solid understanding of security concepts such as authentication and authorization
- Familiarity with the client administration capabilities of Windows Server
- General knowledge of management tools such as System Center 2012 Configuration Manager, System Center 2012 Operations Manager, and System Center 2012 Data Protection Manager.
- Familiarity with imaging, packaging, and operating system deployment concepts
- Familiarity with certificates and Certification Authority (CA) implementation and configuration
- Knowledge equivalent to Windows 2012 MCSA
- Experience administering Windows Server in an environment that typically has the following characteristics:
- 2,500 to 50,000 or more users
- Multiple physical locations and multiple domain controllers
- Network services and resources such as messaging, databases, file and print, firewalls, Internet access, an intranet, and client computer management
- Support for Windows 8 client desktops
- Deployment and management of both physical and virtual applications
Looking for training resources, events and advice from peers? Join the Microsoft Training and Certification Community.
Preparing for an exam now? Find your Microsoft Certification Study Group.
Talk to us on these social networks: