Course List



MOC 6419A Configuring, Managing and Maintaining Windows Server 2008 Servers Exam Prep 70-640 & 70-642


This five-day instructor-led course combines five days worth of instructor-led training content from the Network Infrastructure Technology Specialist, Active Directory Technology Specialist, and IT Professional Server Administrator courses of Windows Server 2008 to provide students with the knowledge and skills that are required to manage accounts and resources, maintain server resources, monitor server performance, and safeguard data in a Microsoft Windows Server 2008 environment. This course covers the core skills required by anyone working with Windows Server 2008 Servers


Module 1: Introduction to Managing Microsoft Windows Server 2008 Environment 

The module explains server roles, Active Directory, the Windows Server 2008 Administrative Tools and Remote Desktop. 


  • Server Roles
  • Overview of Active Directory
  • Using Windows Server 2008 Administrative Tools
  • Using Remote Desktop for Administration

Lab : Administering Windows Server 2008 

  • Install the DNS Server Role
  • Configuring Remote Desktop for Administration

After completing this module, students will be able to:

  • Describe server roles and how they are categorized.
  • Describe the characteristics of Active Directory components.
  • Describe common Windows Server 2008 Administrative Tools.
  • Describe how to use Remote Desktop for Administration

Module 2: Creating Active Directory Domain Services User and Computer Objects 

This module explains how to manage user accounts, create computer accounts and manage AD DS objects. 


  • Managing User Accounts
  • Creating Computer Accounts
  • Automating AD DS Object Management
  • Using Queries to Locate Objects in AD DS

Lab : Creating AD DS User and Computer Accounts

  • Creating and Configuring User Accounts
  • Creating and Configuring Computer Accounts
  • Automating the Management of AD DS Objects

After completing this module, students will be able to:

  • Configure AD DS user accounts.
  • Configure AD DS computer accounts.
  • Automate AD DS Object Management.
  • Use queries to search AD DS.

Module 3: Creating Groups and Organizational Units 

This module introduces groups and how to manage them. 


  • Introduction to AD DS Groups
  • Managing Group Accounts
  • Creating Organizational Units

Lab : Creating an OU Infrastructure 

  • Creating AD DS Groups
  • Planning an OU Hierarchy (Discussion)
  • Creating an OU Hierarchy

After completing this module, students will be able to:

  • Describe the options for creating groups.
  • Configure groups in AD DS.
  • Configure OUs in AD DS.

Module 4: Managing Access to Resources in Active Directory Domain Services 

The module explains how to manage access and assign and manage permissions. 


  • Managing Access Overview
  • Managing NTFS File and Folder Permissions
  • Assigning Permissions to Shared Resources
  • Determining Effective Permission

Lab : Managing Access to Resources

  • Planning a Shared Folder Implementation (Discussion)
  • Implementing a Shared Folder Implementation
  • Evaluating the Shared Folder Implementation

After completing this module, students will be able to:

  • Describe how access management works in AD DS.
  • Assign permissions to shared folders.
  • Configure permissions using NTFS.
  • Determine effective permissions.

Module 5: Configuring Active Directory Objects and Trusts 

This module explains how to delegate administrative access to AD DS objects and how to configure AD DS Trusts. 


  • Delegating Administrative Access to AD DS Objects
  • Configuring AD DS Trusts

Lab : Configuring Active Directory Delegation 

  • Delegating Control of AD DS Objects

Lab : Configuring Active Directory Trusts 

  • Configuring AD DS Trusts

After completing this module, students will be able to:

  • Delegate administrative access to Active Directory objects.
  • Configure Active Directory trusts.

Module 6: Creating and Configuring Group Policy 

This module explains how to configure and manage Group Policy Objects. 


  • Overview of Group Policy
  • Configuring the Scope of Group Policy Objects
  • Evaluating the Application of Group Policy Objects
  • Managing Group Policy Objects
  • Delegating Administrative Control of Group Policy

Lab : Creating and Configuring GPOs 

  • Creating and Configuring Group Policy Objects
  • Managing the Scope of GPO Application

Lab : Verifying and Managing GPOs

  • Verifying GPO Application
  • Managing GPOs
  • Delegating Administrative Control of GPOs

After completing this module, students will be able to:

  • Describe Group Policy.
  • Configure the application scope for Group Policy Objects.
  • Evaluate the application of Group Policy Objects.
  • Manage Group Policy Objects.
  • Delegate administrative control of Group Policy Objects.

Module 7: Configuring User and Computer Environments Using Group Policy 

This module explains how to configure user environments using group policy.

  • Configuring Group Policy Settings
  • Configuring Scripts and Folder Redirection Using Group Policy
  • Configuring Administrative Templates
  • Deploying Software Using Group Policy
  • Configuring Group Policy Preferences
  • Introduction to Group Policy Troubleshooting
  • Troubleshooting Group Policy Application
  • Troubleshooting Group Policy Settings

Lab : Configuring Scripts and Folder Redirection Using Group Policy

  • Configuring Logon Scripts and Folder Redirection

Lab : Configuring Administrative Templates 

  • Configure Administrative Templates

Lab : Deploying Software with Group Policy 

  • Deploy a Software Package with Group Policy
  • Verify Software Installation

Lab : Configuring Group Policy Preferences

  • Configure Group Policy Preferences
  • Verify Group Policy Preferences Application

Lab : Troubleshooting Group Policy Issues 

  • Troubleshoot Group Policy Scripts
  • Troubleshoot GPO Lab-7B
  • Troubleshoot GPO Lab-7C
  • Troubleshoot GPO Lab-7D

After completing this module, students will be able to:

  • Configure Group Policy settings.
  • Configure scripts and folder redirection by using Group Policy.
  • Configure administrative templates.
  • Configure Group Policy Preferences.
  • Deploy software by using Group Policy.
  • Troubleshoot Group Policy Application.
  • Troubleshoot Group Policy Settings.

Module 8: Implementing Security Using Group Policy

This module explains how to configure security policies, implement password policies, restrict access to software and user security templates.


  • Configuring Security Policies
  • Implementing Fine-Grained Password Policies
  • Restricting Group Membership and Access to Software
  • Managing Security Using Security Templates

Lab : Implementing Security Using Group Policies 

  • Configuring Account and Security Policy Settings
  • Implementing Fine-Grained Password Policies

Lab : Configuring and Verifying Security Policies 

  • Configuring Restricted Groups and Software Restriction Policies
  • Configuring Security Templates
  • Verifying the Security Configuration

After completing this module, students will be able to:

  • Configure security policies.
  • Implement fine-grained password policies.
  • Restrict group membership and access to applications by using security policies.
  • Apply security policies by using security templates.

Module 9: Configuring Server Security Compliance 

This module explains how to secure a windows infrastructure, configure an audit policy, manage WSUS and plan for a security update.


  • Securing a Windows Infrastructure
  • Configuring an Audit Policy
  • Overview of Windows Server Update Services (WSUS)
  • Managing WSUS

Lab : Manage Server Security

  • Configuring Windows Software Update Services
  • Configure Auditing

After completing this module, students will be able to:

  • Secure a server role within a windows infrastructure.
  • Configure an audit policy.
  • Describe the use of  Windows Server Update Services.
  • Manage updates using WSUS.
  • Plan for security update management by using Windows Server Update Services (WSUS).

Module 10: Configuring and Managing Storage Technologies 

This module explains how to manage storage using File Server Resource Manager, configure quota management, implement file screening and manage storage reports.


  • Windows Server 2008 Storage Management Overview
  • Managing Storage Using File Server Resource Manager
  • Configuring Quota Management
  • Implementing File Screening
  • Managing Storage Reports
  • Understanding Storage Area Networks

Lab : Installing the FSRM Role Service 

  • Installing the FSRM Role Service

Lab : Configuring Storage Quotas 

  • Configuring Storage Quotas

Lab : Configuring File Screening

  • Configuring File Screening

Lab : Generating Storage Reports

  • Generating Storage Reports

After completing this module, students will be able to:

  • Describe storage management solutions included in Windows Server 2008.
  • Manage storage using FSRM.
  • Configure quota management using FSRM.
  • Implement file screening using FSRM.
  • Manage storage reports.
  • Troubleshoot storage issues.

Module 11: Configuring and Managing Distributed File System 

This module explains how to configure DFS namespaces and replication.ù


  • Distributed Files System (DFS) Overview
  • Configuring DFS Namespaces
  • Configuring DFS Replication

Lab : Installing the Distributed File System Role Service and Creating a DFS Namespace 

  • Installing the Distributed File System Role Service
  • Creating a DFS Namespace

Lab : Configuring Folder Targets and Viewing Diagnostic Reports 

  • Configuring Folder Targets and Folder Replication
  • Viewing Diagnostic Reports for Replicated Folders

After completing this module, students will be able to:

  • Describe the distributed file system.
  • Manage DFS namespaces.
  • Configure DFS replication.

Module 12: Configuring Network Access Protection 

This module explains how to configure, monitor and troubleshoot NAP.


  • Overview of Network Access Protection
  • How NAP Works
  • Configuring NAP
  • Monitoring and Troubleshooting NAP

Lab : Configuring NAP for DHCP and VPN

  • Configuring NAP for DHCP Clients
  • Configuring NAP for VPN Clients

After completing this module, students will be able to:

  • Describe the benefits and uses of NAP.
  • Describe how NAP works in various access scenarios.
  • Configure NAP.
  • Monitor and troubleshoot NAP.

Module 13: Configuring Availability of Network Resources 

This module explains how to configure shadow copies and provide server and service availability.


  • Configuring Shadow Copies
  • Providing Server and Service Availability

Lab : Configuring Shadow Copying 

  • Configuring Shadow Copying

Lab : Configuring and Testing Network Load Balancing 

  • Configuring and Testing Network Load Balancing

After completing this module, students will be able to:

  • Configure shadow copies.
  • Provide server and service availability.

Module 14: Monitoring and Maintaining Windows Server 2008 Servers 

This module explains how to monitor and maintain Windows Server 2008 servers.


  • Planning Monitoring Tasks
  • Calculating a Server Baseline
  • Measuring Performance Objects
  • Selecting Appropriate Monitoring Tools
  • Planning Notification Methods
  • Overview of Windows Server 2008 Maintenance Tasks
  • Automating Windows Server 2008 Maintenance

Lab : Identifying Windows Server 2008 Monitoring Requirements 

  • Evaluating Performance Metrics
  • Monitoring Performance Metrics

Lab : Configuring Windows Server 2008 Monitoring

  • Configuring Data Collector Sets
  • Monitoring Extension Exercise
  • Automating Maintenance Tasks

After completing this module, students will be able to:

  • Plan monitoring tasks.
  • Determine an appropriate server baseline.
  • Determine objects and counters to monitor based on server role.
  • Analyze key performance counters. 
  • Select appropriate monitoring tools.
  • Identify appropriate notification methods.
  • Create a server management task schedule for Windows Server 2008.
  • List automated maintenance tools for Windows Server 2008.

Module 15: Managing Windows Server 2008 Backup and Restore 

This module explains how to back up and restore Windows Server 2008 servers.


  • Planning Backups with Windows Server 2008
  • Planning Backup Policy on Windows Server 2008
  • Planning a Server Restore Policy
  • Planning an EFS Restore Policy
  • Troubleshooting Windows Server 2008 Startup

Lab : Planning Windows Server 2008 Backup Policy 

  • Evaluating the Existing Backup Plan
  • Updating the Backup Policy
  • Reviewing Backup Policy and Plans
  • Implementing the Backup Policy

Lab : Planning Windows Server 2008 Restore 

  • Evaluating Backup Data
  • Planning a Restore
  • Investigating a Failed Restore
  • Restoring System State Data

After completing this module, students will be able to:

  • Create a backup and recovery plan by using Windows Server Backup.
  • Develop a backup policy for Windows Server Backup.
  • Create a server restore plan.
  • Create a plan for restoring Encrypting File System (EFS) files.
  • Verify the restore procedure.

At Course Completion 

After completing this course, students will be able to:

  • Describe the different administrative tools and tasks in Windows Server 2008.
  • Configure AD DS user and computer accounts.
  • Create Groups and Organizational Units.
  • Manage access to shared resources in an AD DS environment.
  • Configure Active Directory Objects and Trusts.
  • Create and configure Group Policy Objects.
  • Configure user and computer environments by using Group Policy.
  • Implement security by using Group Policy.
  • Configure and analyze server security and security update compliance.
  • Configure and manage storage technologies included with Windows Server 2008.
  • Configure and manage Distributed File System.
  • Configure Network Access Protection.
  • Configure availability of network resources.
  • Monitor and Maintain servers running Windows Server 2008.
  • Manage a Windows Server 2008 Backup and Restore.


This course is intended for Windows Server administrators who operate Windows Servers on a daily basis and want to learn the skills for configuring, managing, and maintaining the core technical areas of Windows Server 2008


Certificate of attendance


5 days




Galway - Call for dates

Back to Course List


Training with PFH



  • Pre-training evaluation - PFH will assess your training requirements and levels prior to attending training:
  • Instructor led tuition by highly qualified instructor
  • Comprehensive manual to accompany PFH public courses
  • Training can be customised to meet customer's specific requirements
  • Money back guarantee – If you are not happy with the quality of training received, PFH will refund payment
  • All PFH trainers are Certified which guarantees that the training you receive will be of the highest quality.



  • Each student will have their own PC
  • Comprehensive manual to accompany each training course
  • Complimentary coffee, tea, biscuits and fruit provided, along with light lunch provided for courses delivered in PFH
  • Certificates of Attendance provided to each student on completion of training
  • Air conditioned comfortable and spacious training rooms
  • Free parking



  • If a student feels they have not managed to reach their own personal course objectives, they are welcome to attend the:
  • Same public class within 6 months, at no charge
  • 60 day post training support – Students can call or email our instructors with any questions / problems they may be experiencing at home or work (or a maximum of 5 calls per course/delegate)



When you're learning new skills and meeting new people it's important that you do so in comfortable, modern surroundings.

You'll enjoy a rewarding training course here at PFH premises and benefit from our modern training facilities.

Facilities provided include:

  • Air-conditioned training rooms
  • High-spec student PC's plus an instructor PC
  • Internet access and wireless internet access 
  • Convenient locations in Cork and Galway 
  • Overhead projector, whiteboard and flipchart in each room 
  • Course materials 
  • Free parking 
  • Daily refreshments & lunch


Please note that the above facilities are available to rent for your specialised training event also. Please contact PFH Training for rates and information.

Read More -

Training Types



Instructor-led training is an effective means of delivering information, as it allows for real-time feedback, questions and answers, manipulation and changeable delivery to suit the needs of learners in a real-time environment. Few educational opportunities are considered more valuable than meeting and interfacing directly with an instructor. 


All of our trainers are MCPs [Microsoft Certified Professionals], ECDL certified and MOS Experts which guarantees that the training you receive will be of the highest quality.


PFH has a large portfolio of trainers who can deliver training at our training centres in Cork and Galway, or Nationwide at customer premises or another training centre.


PFH offers instructor led training on our Public Schedule at our training centres in Cork and Galway. 



PFH provides customised training for groups of 1 to 12 at either PFH's Training Centres at Cork or Galway or on-site at your premises. Content can be taken from any of our course oulines and customised to suit the exact requirmements of your group and scheduled on dates that suit your delegates.  Group rates apply contact us for rates.


This method of training ensures your delegates get trained on exactly the topics they require in the duration of time that you can allow to give them.



Seminar training can be offered where companies require a large number of people to receive initial overview training on the New Interface of an Operating System or Office Applications. 


Seminar Training is based solely on demonstrating the New Features and is non hands-on training.  The benefits of this type of training is that attendees can get an initial feel for the New Interface of any given application and it can save a lot of time and money during an initial roll out.  This type of training instils an element of confidence when people return to their desks to work with the New Interface or Application.


Depending on how the roll out is managed with the installations, training could be run in tandem with this, and groups may also benefit from the trainer doing some “floor walking”  following the seminars to assist people when they are back at their desks.


The number of attendees is optional and can range from 20-50 per session.  This is dependant on the size of your room!

All training/seminar can be customised specifically to suit group requirements.

Read More -