70-293_FORE.QXD 9/10/03 6

255_70-293_Fore.qxd 9/10/03 6:55 PM Page xlii

xlii

Foreword

Consult Microsoft online resources such as TechNet (https://traloihay.net), white papers on the Microsoft web site, and so forth, for better under-standing of difficult topics.

Participate in Microsoft’s product-specific and training and certification newsgroupsif you have specific questions that you still need answered.

Take one or more practice exams, such as the one included on the CD with thisbook.

Exam Overview

In this book, we have tried to follow Microsoft’s exam objectives as closely as possible.However, we have rearranged the order of some topics for a better flow, and included back-ground material to help you understand the concepts and procedures that are included in theobjectives. Following is a brief synopsis of the exam topics covered in the book:

Planning tools and documentation We begin with an overview of networkinfrastructure planning, introducing you to planning strategies and how to use plan-ning tools.We will review the fundamentals of network design, including analysis oforganizational needs.This includes such factors as information flow, managementmodel and organizational structure, and centralization vs. decentralization issues.Wediscuss management priorities, including availability and fault tolerance, security,scalability, performance and cost. Next, we address user priorities, which includeemail communications, scheduling and task management, project collaboration, datastorage and retrieval, Internet research, application services, print services andgraphics/audio/video services.This chapter also looks at legal and regulatory con-siderations, how to calculate Total Cost of Ownership (TCO) and how to plan forfuture growth.We discuss how to develop a test network environment, and how todocument the planning and network design process.

Planning server roles and server security You will first review server rolesand ensure that you have an understanding of the many roles a Windows Server2003 server can play on the network.We discuss domain controllers, file and printservers, DHCP, DNS and WINS servers,Web servers, database servers, mail servers,certification authorities and terminal services application servers.Then we delveinto how to plan a server security strategy. Here we examine how to choose theright operating system according to security needs, how to identify minimum secu-rity requirements for your organization and how to identify the correct configura-tions to satisfy those security requirements.You will learn how to plan baselinesecurity, first planning the secure baseline installation parameters and then enforcingdefault security settings on new computers, both client and server machines.We’llshow you how to customize server security, securing your servers according totheir roles.Then we’ll walk you through the process of creating custom securitytemplates and show you how to deploy security configurations.https://traloihay.net