getcertified4sure.com

The Secret of microsoft ms 70-646 exam




Exam Code: 70-646 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: PRO: Windows Server 2008, Server Administrator
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-646 Exam.

2021 Aug windows server 2008 administrator exam 70-646 answers:

Q111. - (Topic 12) 

You need to recommend a backup strategy for HyperV. 

What should you recommend? 

A. Take a snapshot of each VM, and then run a full backup of the HyperV hosts by using Windows Server Backup. 

B. Shut down the VMs, and then run a full backup of the HyperV hosts by using Windows Server Backup. Restart the VMs when the backup is complete. 

C. From each VM, run a full backup by using Windows Server Backup, and then run a full backup of the HyperV hosts by using Windows Server Backup. 

D. From each VM, run a full backup by using Windows Server Backup. Shut down the VMs, and then run a full backup of the HyperV hosts by using Windows Server Backup. Restart the VMs when the backup is complete. 

Answer: C 

Explanation: 

http://technet.microsoft.com/en-us/library/dd252619%28WS.10%29.aspx There are two basic methods you can use to perform a backup. You can: Perform a backup from the server running Hyper-V. We recommend that you use this method to perform a full server backup because it captures more data than the other method. If the backup application is compatible with Hyper-V and the Hyper-V VSS writer, you can perform a full server backup that helps protect all of the data required to fully restore the server, except the virtual networks. The data included in such a backup includes the configuration of virtual machines, snapshots associated with the virtual machines, and virtual hard disks used by the virtual machines. As a result, using this method can make it easier to recover the server if you need to, because you do not have to recreate virtual machines or reinstall Hyper-V. However, virtual networks are not included in a full server backup. You will need to reconfigure the virtual networking by recreating the virtual networks and then reattaching the virtual network adapters in each virtual machine to the appropriate virtual network. As part of your backup planning, make sure you document the configuration and all relevant settings of your virtual network if you want to be able to recreate it. 

Perform a backup from within the guest operating system of a virtual machine. Use this method when you need to back up data from storage that is not supported by the Hyper-V VSS writer. When you use this method, you run a backup application from the guest operating system of the virtual machine. If you need to use this method, you should use it in addition to a full server backup and not as an alternative to a full server backup. Perform a backup from within the guest operating system before you perform a full backup of the server running Hyper-V. For more information about storage considerations, see the following section. 


Q112. - (Topic 7) 

You need to recommend a solution for managing the service accounts for SQL1 and SQL2. The solution must meet the company's security requirements. 

What should you include in the recommendation? 

A. Configure the service accounts as standard user accounts and perform manual password changes as required. 

B. Configure the service accounts as managed service accounts. 

C. Configure the service accounts as standard user accounts and use a Password Settings object (PSO) to allow different password settings. 

D. Configure the service accounts as virtual accounts. 

Answer: A 

Explanation: 

req - passwords to change every 60 days. 

Service account passwords are set to never expire so can not meet the above requirement, 

so manual intervention is required. 


Q113. - (Topic 1) 

... 

Your network contains a Webbased Application that runs on Windows Server 2003. You plan to migrate the Webbased Application to Windows Server 2008 R2. You need to recommend a server configuration to support the Webbased Application. 

The server configuration must meet the following requirements: 

Ensure that the Application is available to all users if a single server fails Support the installation of .NET Applications Minimize software costs 

What should you recommend? 

A. Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure the servers in a Network Load Balancing cluster. 

B. Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in a Network Load Balancing cluster. 

C. Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster. 

D. Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in a failover cluster. 

Answer: B 

Explanation: 

Web Edition meets the requirements 

Windows Web Server 2008 R2 

Windows Web Server 2008 R2 is designed to function specifically as a Web application server. 

Other roles, such as Windows Deployment Server and Active Directory Domain Services (AD DS), are not supported on Windows Web Server 2008 R2. You deploy this server role either on a screened subnet to support a website viewable to external hosts or as an intranet server. As appropriate given its stripped-down role, Windows Web Server 2008 R2 does not support the high-powered hardware configurations that other editions of Windows Server 2008 R2 do. Windows Web Server 2008 R2 has the following properties: 

Supports a maximum of 32 GB of RAM and 4 sockets in symmetric multiprocessing (SMP) configuration You should plan to deploy Windows Web Server 2008 R2 in the Server Core configuration, which minimizes its attack surface, something that is very important on a server that interacts with hosts external to your network environment. You should plan to deploy the full version of Windows Web Server 2008 R2 only if your organization’s web applications rely on features that are not available in the Server Core version of Windows Web Server 2008 R2. Unlike the Server Core version of Windows Web Server 2008, Windows Web Server 2008 R2 supports a greater amount of Internet Information Services (IIS) functionality. 

Configuring Windows Network Load Balancing 

While DNS Round Robin is a simple way of distributing requests, Windows Server 2008 NLB is a much more robust form of providing high availability to applications. Using NLB, an administrator can configure multiple servers to operate as a single cluster and control the usage ot the cluster in near real-time. 

Why Failover Cluster will not work. 

Contrast DNS Round Robin and NLB with Failover Clustering, another availability technology in Windows Server 2008. Formerly known as server clustering, Failover Clustering creates a group of computers that all have access lo the same data store or disk resource or network share. The applicationsjunning on aJailoverCluster must be cluster-aware. Failover Clustering has had some changes since Windows Server 2003. Lesson 2 will cover these changes. 


Q114. - (Topic 1) 

A company has servers that run a Server Core installation of Windows Server 2008. 

You are designing the migration of the servers to Windows Server 2008 R2. After the migration, you will install the Remote Desktop Services server role and the Print and Document Services server role on the servers. 

You need to ensure that shared resources on the servers are available after the migration, and minimize administrative effort. 

What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.) 

A. Deploy new servers with a Server Core installation of Windows Server 2008 R2. Migrate the shared resources to the new servers. 

B. Upgrade the existing servers to a Server Core installation of Windows Server 2008 R2, and then upgrade the servers to a full installation of Windows Server 2008 R2. 

C. Move the shared resources off of the existing servers. Perform a clean installation of Windows Server 2008 R2 on the servers. Move the shared resources back onto the servers. 

D. Deploy new servers with Windows Server 2008 R2 installed. Migrate the shared resources to the new servers. 

Answer: D 

Explanation: 

The key here is minimize effort & remote desktop services. Server core wouldn't allow remote desktop services as it has no GUI so that would rule out answer A you also cant upgrade from core to full see http://www.windowsitpro.com/article/tips/can-i-upgrade-fromserver-core-2008-to-the-full-windows-server-2008- or http://serverfault.com/questions/92523/upgrade-fromwindows-2008-server-core-to-full-windows-2008-server upgrade considerations for server core installations of windows server 2008 so that rules our B 

You can use the server core installation option only by performing a clean installation. 

You cannot upgrade from earlier versions of windows to server core installations of 

windows server 2008. 

You cannot upgrade from non-server core installations of windows server 2008 to server 

core installations of windows server 2008. 

You cannot convert server core installations of windows server 2008 to non-server core 

installations of windows server 2008. 

You can upgrade server core installations of windows server 2008 only to windows server 

core r2 when it is released. 

Answer C is possible but again you're asked to minimize effort so D would be 1 step less 

thus reducing your effort and possible down time. 


Q115. - (Topic 11) 

You need to recommend a strategy for delegating administrative rights to Admin1. The strategy must support the company's planned changes. 

What should you include in the recommendation? 

A. the Authorization Manager snapin on Node1 and Node2 

B. the Authorization Manager snapin on the VMs 

C. the Network Configuration Operators local group on each VM 

D. the Network Configuration Operators local group on Node1 and Node2 

Answer: A 

Explanation: 

http://technet.microsoft.com/en-us/library/cc731364.aspx An authorization store can contain authorization policy information for many applications in a single policy store. All applications in one authorization store can access all of the groups defined at the store level. You must be assigned to the Authorization Manager Administrator user role to complete this procedure. By default, Administrators is the minimum Windows group membership assigned to this role. Review the details in "Additional considerations" in this topic 


70-646 torrent

Replace ms 70-646:

Q116. - (Topic 2) 

You need to recommend a solution for managing GPOs. The solution must meet the company's technical requirements. 

What should you include in the recommendation? 

A. Desktop Optimization Pack 

B. Forefront EndPoint Protection 

C. System Center Configuration Manager 

D. System Center Operations Manager 

Answer: A 

Explanation: 

http://technet.microsoft.com/en-us/library/ee532079.aspx Imagine a tool that could help you take control of Group Policy. What would this tool do? It could help you delegate who can review, edit, approve, and deploy Group Policy objects (GPOs). It might help prevent widespread failures that can result from editing GPOs in production environments. You could use it to track each version of each GPO, just as developers use version control to track source code. Any tool that provided these capabilities, cost little, and was easy to deploy would certainly be worth a closer look. Such a tool indeed exists, and it is an integral part of the Microsoft. Desktop Optimization Pack (MDOP) for Software Assurance. MDOP can help organizations reduce the cost of deploying applications, deliver applications as services, and better manage desktop configurations. Together, the MDOP applications shown in Figure 1 can give Software Assurance customers a highly cost-effective and flexible solution for managing desktop computers. 

Microsoft Advanced Group Policy Management (AGPM) is the MDOP application that can help customers overcome the challenges that can affect Group Policy management in any organization, particularly those with complex information technology (IT) environments. A robust delegation model, role-based administration, and change-request approval provide granular administrative control. For example, you can delegate Reviewer, Editor, and Approver roles to other users—even users who do not typically have access to production GPOs. (Editors can edit GPOs but cannot deploy them; Approvers can deploy GPO changes.) 

AGPM can also help reduce the risk of widespread failures. You can use AGPM to edit GPOs offline, outside of the production environment, and then audit changes and easily find differences between GPO versions. In addition, AGPM supports effective change control by providing version tracking, history capture, and quick rollback of deployed GPO changes. It even supports a management workflow by allowing you to create GPO template libraries and send GPO change e-mail notifications. 

This white paper describes the key features of AGPM, such as change control and role-based delegation. The paper then describes how Software Assurance customers can begin evaluating AGPM today. 

Offline Editing 

The AGPM archive provides offline storage for GPOs. As Figure 2 shows, changes that you make to GPOs in the archive do not affect the production environment until you deploy the GPOs. By limiting changes to the archive, you can edit GPOs and test them in a safe environment, without affecting the production environment. After reviewing and approving the changes, you can then deploy them with the knowledge that you can quickly roll them back if they have an undesired effect. 

GPMC Integration 

AGPM has a server component (the AGPM Service) and a client component (the AGPM snap-in), each of which you install separately. First, you install Microsoft Advanced Group Policy Management - Server on a system that has access to the policies that you want to manage. Then, you install the Microsoft Advanced Group Policy Management - Client on any system from which Group Policy administrators will review, edit, and deploy GPOs. The AGPM snap-in integrates completely with the Group Policy Management Console (GPMC), as Figure 3 shows. Click Change Control in the console tree to open AGPM in the details pane and to manage the AGPM archive on the Contents tab. Here, you can review, edit, and deploy controlled GPOs (that is, GPOs in the archive). You can also take control of uncontrolled GPOs (that is, GPOs that are not in the archive), approve pending changes, and manage GPO templates. On the Domain Delegation tab, AGPM Administrators (Full Control) delegate roles to AGPM users and configure e-mail notifications. Configure the AGPM Server connection on the AGPM Server tab. AGPM 3.0 introduced the Production Delegation tab, which AGPM Administrators can use to delegate permission to edit GPOs in the production environment. 

Change Control 

AGPM provides advanced change control features that can help you manage the lifecycle of GPOs. Many of the AGPM change control concepts will be familiar to administrators who have experience using common version-control tools, such as the version control feature in Microsoft Office SharePoint. Server 2007. The following steps are necessary to change and deploy a GPO: 

1.

 Check out the GPO from the archive. 

2.

 Edit the GPO as necessary. 

3.

 Check in the GPO to the archive. 

4.

 Deploy the GPO to production. 

Change control means more than locking a GPO to prevent multiple users from changing it at the same time. AGPM keeps a history of changes for each GPO, as shown in Figure 4. You can deploy any version of a GPO to production, so you can quickly roll back a GPO to an earlier version if necessary. AGPM can also compare different versions of a GPO, showing added, changed, or deleted settings. Therefore, you can easily review changes before approving and deploying them to the production environment. In addition, a complete history of each GPO enables you to audit not only changes but also all activities related to that GPO. 

Role-Based Delegation 

Group Policy already provides a rich delegation model that allows you to delegate administration to regional and task-oriented administrators. However, Group Policy also lets administrators approve their own changes. In contrast, AGPM provides a role-based delegation model that adds a review and approval step to the workflow, as shown in Figure 

5. 

An AGPM Administrator has full control of the AGPM archive. In addition to the AGPM 

Administrator role, AGPM defines three special roles to support its delegation model: 

• Reviewer. Reviewers can view and compare GPOs. They cannot edit or deploy GPOs. 

• Editor. Editors can view and compare GPOs. They can also check out GPOs from the 

archive, edit GPOs, and check in GPOs to the archive. Editors can request deployment of a 

GPO. 

• Approver. Approvers can approve the creation and deployment of GPOs. (When 

Approvers create or deploy a GPO, approval is automatic.) 

As an AGPM Administrator, you can delegate these roles to users and groups for all 

controlled GPOs within the domain (domain delegation). For example, you can delegate 

the Reviewer role to users, allowing them to review any controlled GPO in the domain. You 

can also delegate these roles to users for individual controlled GPOs. Rather than allow 

users to edit any controlled GPO in the domain, for example, you can give them permission 

to edit a specific controlled GPO by delegating the Editor role for that GPO only. 

Search and Filter 

AGPM 4.0 introduces the ability to filter the list of GPOs that it displays. For example, you can filter the list by name, status, or comment. You can even filter the list to show GPOs that were changed by a particular user or on a specific date. AGPM displays partial matches, and searches are not case sensitive. AGPM supports complex search strings using the format column: string, where column is the name of the column by which to search and string is the string to match. For example, to display GPOs that were checked in by Jerry, type state: “checked in” changed by: Jerry in the Search box. Figure 6 shows another example. You can also filter the list by GPO attributes by using the format attribute: string, where attribute is the name of the GPO attribute to match. To display all GPOs that use the Windows. Management Instrumentation (WMI) filter called MyWMIFilter, type wmi filter: mywmifilter in the Search box. When searching for GPOs, you can use special terms to search by date, dynamically. These special terms are the same terms that you can use when using Windows Explorer to search for files. For example, you can filter the list to display GPOs that were changed today, yesterday, this week, last week, and so on. 

Cross-Forest Management 

In addition to filtering, AGPM 4.0 also introduces cross-forest management. You can use the following process to copy a controlled GPO from a domain in one forest to a domain in a second forest: 

1.

 Export the GPO from a domain in the first forest to a CAB file, by using AGPM (Figure 7). 

2.

 On a computer in a domain in the first forest, copy the CAB file to a portable storage device. 

3.

 Insert the portable storage device into a computer in a domain in the second forest. 

4.

 Import the GPO into the archive in a domain in the second forest, by using AGPM. When you import the GPO into the second forest, you can import it as a new controlled GPO. You can also import it to replace the settings of an existing GPO that is checked out of the archive. The obvious benefit of cross-forest management is testing. Combined with offline editing and change control, cross-forest management enables you to test GPOs in a controlled test environment (the first forest). After verifying the GPO, you can move it into the production environment (the second forest). 

Windows Support Three versions of AGPM are available: AGPM 2.5, AGPM 3.0, and AGPM 4.0. Each is incompatible with the others and supports different Windows operating systems. For more information about choosing the right version of AGPM for your environment and about the Windows operating systems that each supports, see Choosing Which Version of AGPM to Install. 

AGPM 4.0 introduces support for Windows 7 and Windows Server. 2008 R2. Additionally, AGPM 4.0 still supports Windows Vista. with Service Pack 1 (SP1) and Windows Server 2008. Table 1 describes limitations in mixed environments that include newer and older Windows operating systems. 

Topic 3, Contoso, Ltd. 

Scenario: 

COMPANY OVERVIEW 

Contoso, Ltd. is a consulting company that has a main office and two branch offices. The main office is located in Johannesburg. The branch offices are located in Brisbane and Montreal. The Johannesburg office has 400 users. Each branch office has 100 users. 

PLANNED CHANGES 

Contoso plans to open a new branch office. The new office will have a 512-Kbps connection to the Montreal office and a 2-Mbps connection to the Internet. 

The new branch office will have a domain controller, a DirectAccess server, a file server, and a Web server. All branch office servers will be virtualized. 

Contoso plans to implement role-based access control for all new virtual machines (VMs) deployed on Hyper-V servers. 

In the new branch office, a user named User1 must be permitted to perform only the 

following actions on the Hyper-V server: 

. Start the VMs. 

. View the configuration of the VMs. 

EXISTING ENVIRONMENT 

All servers run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. 

The main office has multiple file servers. Each branch office has one file server. Each file 

server has two hard disks. One disk has the server' s operating system installed and the 

other disk stores data files. File server backups are performed regularly. 

The main office has a Windows Server Update Services (WSUS) server. All client 

computers are configured to receive updates from the WSUS server. 

The main office connects to each branch office by using a 512-Kbps WAN link. 

Existing Active Directory/Directory Services 

The network contains a single Active Directory domain named contoso.com. An Active Directory site exists for each office. Each Active Directory site contains three subnets. Each 

subnet contains client computers. 

The main office has two domain controllers. Each branch office has one domain controller. 

REQUIREMENTS 

Storage Requirements 

Contoso must meet the following storage requirements: 

...... 

Improve data availability on the file servers. 

Improve the performance of the file servers. 

Limit each user's storage space on the file servers to 2 GB. 

Prevent users from storing audio and video files on the file servers. 

Provide additional storage on the file servers without causing downtime. 

Enable users to access the previous versions of all the files stored on the file 

servers. 

Technical Requirements 

Contoso must meet the following technical requirements: 

...... 

Minimize the potential attack surface. 

Minimize WAN link utilization between the offices. 

Minimize the number of server licenses purchased. 

Minimize server downtime caused by Applying updates. 

Minimize the amount of administrative effort required to approve the updates. 

Minimize the amount of time it takes for users in the branch offices to access files 

on the file servers in the main office. 

Problem Statements 

Users in the accounting department use a custom Application named App1. The configurations for App1 can only be changed by editing the registry. Currently, a technician must visit each client computer in the accounting department to change the App1 configurations. 


Q117. - (Topic 5) 

You need to recommend changes to the network that address the user problems statement. 

What should you recommend? 

A. Deploy DirectAccess. 

B. Configure folder redirection. 

C. Create a volume mount point. 

D. Implement additional DFS targets. 

Answer: D 

Explanation: 

Direct Access is a remote access solution and does not address the problem. Folder redirection does not address the problem Volume mount point would not solve this problem either 

The Distributed File System is used to build a hierarchical view of multiple file servers and shares on the network. Instead of having to think of a specific machine name for each set of files, the user will only have to remember one name; which will be the 'key' to a list of shares found on multiple servers on the network. Think of it as the home of all file shares with links that point to one or more servers that actually host those shares. DFS has the capability of routing a client to the closest available file server by using Active Directory site metrics 

Dfs target (or replica): This can be referred to as either a root or a link. If you have two identical shares, normally stored on different servers, you can group them together as Dfs Targets under the same link. 


Q118. - (Topic 15) 

You need to recommend a solution that meets the company's Application compatibility and provisioning requirements. What should you recommend? 

A. Create a MED-V workspace. 

B. Publish a RemoteApp program. 

C. Package an Application by using the App-V Sequencer. 

D. Create an Application compatibility shim by using the Application Compatibility Toolkit (ACT) 

Answer: A 

Explanation: 

MED-V Usage Scenarios The key usage scenario for MED-V is resolving application-to-operating system Incompatibility to accelerate the upgrade path to a new operating system. Businesses that need to continue to run legacy line-of business applications on users’ desktop computers can do so by using Virtual PC. Incompatibility between legacy applications and newer versions of Microsoft Windows can often be a primary blocking issue preventing an enterprise from upgrading to the latest version of Windows, such as Windows Vista, to take advantage of the many new features and enhancements offered by this version. By delivering those applications in a Virtual PC that runs a previous version of the operating system (for example, Windows XP or Windows 2000), MED-V allows administrators to break the tight dependency between a computer’s underlying hardware and the operating system, and it can help remove such blocking issues so that your users can benefit from having the latest version of Windows deployed on their desktop computers. From the user’s perspective, with MED-V, these applications are accessible from the Start menu and appear side by side with regular applications—so there is minimal change to the user experience. 

http://technet.microsoft.com/en-us/library/gg699692.aspx Microsoft Enterprise Desktop Virtualization (MED-V), a core component of the Microsoft Desktop Optimization Pack (MDOP) for Microsoft Software Assurance, is the most robust and scalable solution for virtualizing Internet Explorer 7 and Internet Explorer 6. It provides a centrally managed solution that is intended for enterprise customers. If you use MED-V for virtualization, you can run Windows. 7 and still run older applications seamlessly, directly from a Windows 7 desktop. Users continue to work as they always have and as they launch their browser, MED-V determines whether to leave the URL in Internet Explorer 8 or whether it should redirect and display it in Internet Explorer 6 or Internet Explorer 7 on the MED-V workspace. The MEDV policy that is created and managed by the administrator determines the who, what, and how of applications from the MED-V workspace. By using MED-V, you retain the productivity benefits of the newest operating system, yet you can use older applications that might be best suited for your work. 


Q119. - (Topic 1) 

Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. Users store all of their files in their Documents folder. Many users store large files. 

You plan to implement roaming user profiles for all users by using Group Policy. You need to recommend a solution that minimizes the amount of time it takes users to log on and log off of the computers that use the roaming user profiles. 

What should you recommend? 

A. Modify the Group Policy object (GPO) to include folder redirection. 

B. Modify the Group Policy object (GPO) to include Background Intelligent Transfer Service (BITS) settings. 

C. On the server that hosts the roaming user profiles, enable caching on the profiles share. 

D. On any server, install and configure the Background Intelligent Transfer Service (BITS) server extensions. 

Answer: A 

Explanation: 

MCITP Self-Paced Training Kit Exam 70-646 Windows Server Administration: Planning and Managing Group Policy Planning your Group Policy is in part planning your organizational structure. If you have a huge number of OUs—some inheriting policies, others blocking inheritance, several OUs linking to the same GPO, and several GPOs linking to the same OU—you have a recipe for disaster. While too few OUs and GPOs is also a mistake, most of us err on the side of having too many. Keep your structures simple. Do not link OUs and GPOs across site boundaries. Give your OUs and GPOs meaningful names. When you are planning Group Policy you need to be aware of the Group Policy settings that are provided with Windows Server 2008. These are numerous and it is not practical to memorize all of them, but you should know what the various categories are. Even if you do not edit any policies, exploring the Group Policy structure in Group Policy Management Editor is worthwhile. You will develop a feel for what is available and whether you need to generate custom policies by creating ADMX files. You also need a good understanding of how Group Policy is processed at the client. This happens in the following two phases: Core processing When a client begins to process Group Policy, it must determine whether it can reach a DC, whether any GPOs have been changed, and what policy settings must be processed. The core Group Policy engine performs the processing of this in the initial phase. Client-side extension (CSE) processing In this phase, Group Policy settings are placed in various categories, such as Administrative Templates, Security Settings, Folder Redirection, Disk Quota, and Software Installation. A specific CSE processes the settings in each category, and each CSE has its own rules for processing settings. The core Group Policy engine calls the CSEs that are required to process the settings that apply to the client. CSEs cannot begin processing until core Group Policy processing is completed. It is therefore important to plan your Group Policy and your domain structure so that this happens as quickly and reliably as possible. The troubleshooting section later in this lesson discusses some of the problems that can delay or prevent core Group Policy processing. 


Q120. - (Topic 12) 

You need to recommend a solution for improving the automated deployment of servers. The solution must meet the company's technical requirements. 

What should you include in the recommendation? 

A. an offline domain join 

B. native-boot virtual hard disks (VHDs) 

C. the Offline servicing of images 

D. the Online servicing of images 

Answer: A 

Explanation: 

http://technet.microsoft.com/en-us/library/offline-domain-join-djoin-step-by-step%28WS.10%29.aspx Offline domain join is a new process that computers that run Windows. 7 or Windows Server. 2008 R2 can use to join a domain without contacting a domain controller. This makes it possible to join computers to a domain in locations where there is no connectivity to a corporate network. 

Topic 13, Wingtip Toys 

Scenario 

COMPANY OVERVIEW 

Wingtip Toys is an international company that has a main office and several branch offices. The main office is located in Moscow. The branch offices are located throughout Europe. The main office has 500 users. Each branch office has 4 to 70 users. 

PLANNED CHANGES 

Wingtip Toys opens a new branch office that contains a file server. You plan to promote the file server to a Read-only Domain Controller (RODC). 

Wingtip Toys plans to hire a consulting firm to manage its Web site. The consulting firm must only be permitted to manage the Web site and must be prevented from accessing to all other server resources. 

Wingtip Toys plans to purchase a high-resolution printer that will be connected to a print server in the main office. Users must be charged for each page that they print on the printer. 

You plan to present additional storage to a two node failover cluster in the main office. The storage will be used by the file server instance. 

EXISTING ENVIRONMENT 

All servers run either Windows Server 2008 or Windows Server 2008 R2. All client computers run either Windows Vista Enterprise or Windows 7 Enterprise. 

Existing Network Infrastructure 

The network contains an internal network and a perimeter network. 

The company Web site is hosted on a standalone server in the perimeter network. 

The main office connects to each branch office by using a 1-Mbps WAN link. 

Existing Active Directory Environment 

The network contains a single Active Directory domain named wingtiptoys.com. An Active Directory site exists for each office. Each Active Directory site contains a single subnet. 

The main office has two domain controllers. Each branch office has a single domain controller. 

REQUIREMENTS 

Technical Requirements 

Wingtip Toys must meet the following technical requirements: Minimize network utilization. Minimize WAN link utilization. Ensure that the file servers can access additional storage as a local drive. Ensure that changes to the network are transparent to users whenever possible. Ensure that new storage solutions are supported by Windows Failover Clustering. Ensure that each user can access his Documents folder from any client computer. Automatically organize the files on the file servers according to the contents of the files. Ensure that storage can be provisioned without causing any downtime of the file servers. Ensure that the data on the file servers is protected by using Windows BitLocker Drive Encryption (BitLocker). 

Problem Statements 

All users store their documents and other data in the Documents folder on their respective client computers. The users report that when they log on to a computer that is not their own, their documents are unavailable. 

....... . .