Звезды и С - Главная Звезды и С - Citrix Звезды и С - Microsoft Звезды и С - О нас

Спец. предложения|Обучение|Вебинары|Сертификация|Тестирование|О нас|Работа с сайтом|Новости|Поиск

Специальные предложения
Software Assurance - Бесплатные курсы обучения по ваучерам
Авторские курсы Microsoft
Microsoft Windows Server 2012 R2 / 2016
Microsoft Windows 10 / 8.1
Облачные технологии: Microsoft Windows Azure, Private Cloud, Office 365
Microsoft Exchange Server 2013 / 2016
Microsoft System Center
Microsoft Lync Server 2013 / Skype for business 2015
Microsoft SQL Server 2014 / 2016
Microsoft SharePoint 2013 / 2016
Microsoft Visual Studio 2013 / 2016
Microsoft On-Demand
Расписание курсов Microsoft и Citrix в графическом формате
Корпоративное обучение пользователей Microsoft Office
Более ранние версии программных продуктов Microsoft
Microsoft Windows Server 2008
Microsoft Windows Server 2003
Security on Microsoft Windows
Windows 7
Microsoft Windows XP
Microsoft Exchange Server 2010
Microsoft Exchange Server 2007
Microsoft SQL Server 2008
Microsoft SQL Server 2005
Microsoft SharePoint 2007, Project 2007
Microsoft Office Communications Server 2007
Microsoft Office PerformancePoint Server 2007
System Center
Microsoft SharePoint 2010
Авторские курсы A. Кибкало
Microsoft SharePoint 2013
Microsoft SQL Server 2012
Microsoft Visual Studio 2010
Microsoft SharePoint 2010
Microsoft SQL Server 2008
Microsoft Visual Studio 2008
Microsoft SQL Server 2005
Microsoft Visual Studio 2005
Microsoft SQL Server 2000
MS Visual C++ Development
MS Visual Basic Development
MS Solutions Framework
MS Internet/Intranet Application Development
Microsoft SharePoint Portal Server 2007, Project 2007
Microsoft BizTalk Server 2009
Отмененные курсы
Microsoft Forefront
Microsoft BizTalk Server
Microsoft Dynamics
Cisco, VMware, Red Hat, ITIL, ets
Вечернее обучение
Условия обучения

Курс M2827: Deploying Microsoft Windows Rights Management Services

Цена для физических лиц, р.: 15900
Цена для юридических лиц, р.: 17900
Цена вебинара для физических лиц, р.: 9000
Цена вебинара для юридических лиц, р.: 9000
Цена персонального обучения для физических лиц, р.: 12600

Продолжительность курса (дней): 3

Даты (день):

Даты (вечер):

Курс готовит к тестам:

Цель: This three-day instructor-led course is designed to provide students with the knowledge and skills necessary to deploy and manage Windows Rights Management Services for the protection of digital information in a Windows Server 2003 environment. Significant focus is placed on understanding the underlying architecture and security concepts of the Rights Management Services platform. Topics also include interoperability between organizations, defining and deploying policies, and management of the RMS Server as well as using some of the applications included in the Rights Management Services Toolkit.

Необходимая подготовка: Новая страница 1
Before attending this course, students must have:
A good understanding of Windows Server 2000 and/or 2003 and Active Directory.
A general knowledge of Public Key Infrastructure (PKI) concepts and SQL Server 2000 is also helpful.

Предварительный тест:


План курса:

Новая страница 1
Module 1: Why Rights Management?

Microsoft Windows Rights Management Services (RMS) provides core services to help protect enterprise data. This module introduces the Windows RMS, the business drivers behind RMS, and the technology that is used in an RMS deployment.


Rights Management Overview
Public Key Technology Overview

After completing this module, students will be able to:

Describe business reasons for using RMS.
Explain what RMS does to protect enterprise data.
Describe usage scenarios that can benefit from an RMS implementation.
Describe the components and technology that supports an RMS implementation.
Describe how RMS utilizes a public key technology to protect information.


Module 2: RMS Architecture

This module covers the basic architecture and concepts of the Windows Rights Management Services product. This module also explains all the prerequisite software and services that must be in place in order for the Rights Management environment to function. Finally, a discussion is presented on how various Active Directory designs can impact your RMS design and deployment.


Introduction to RMS
RMS Components
Lab A: Verifying Active Directory
Client Side Components
RMS Architecture and Active Directory

After completing this module, students will be able to:

Describe how RMS works including how the publishing and use licenses are used in a RMS environment.
Describe the RMS Infrastructure components.
Describe the RMS client-side components.
Describe how Active Directory contributes to the RMS infrastructure.


Module 3: RMS Installation and Provisioning

This module covers the steps necessary to successfully install and provision RMS server.


Installing RMS Server
Lab A: Creating the RMS Service Account
Provisioning RMS Server
Provisioning Configuration Overview
Configuring Offline Enrollment
Configuring the RMS Service Connection Point
Best Practices: Server Installation
Lab B: Installing and Provisioning RMS

After completing this module, students will be able to:

Describe the hardware and software requirements in order to install RMS Server.
Describe the steps required to successfully install RMS Server.
Define and describe the RMS Server provisioning process.
Explain the various configuration options available for provisioning an RMS Server.
Install and provision RMS.


Module 4: Rights Management Client

This module covers all of the steps and components necessary for a user to interact with Windows Rights Management Services. This module also covers RM Client deployment and configuration. It also explains the Information Rights Management (IRM) features in Office 2003 and how to manage those features through Group Policy. For users that want to participate in an RMS environment to read protected content, but who do not have Office 2003, the Rights Management Add-on for IE (RMA) will be discussed.


RM Client Components
Machine Activation
User Certification
Lab A: Installing the RMS Client
Integrating Microsoft Office 2003 and IRM
Rights Management Add-on for Internet Explorer
Best Practices: RM Client Deployment
Lab B: RMS Application Deployment

After completing this module, students will be able to:

Understand the components that make up the RM client.
Explain the process of machine activation.
Explain the process of user certification in an RMS environment.
Describe the features of Microsoft Office 2003 that relate to IRM.
Describe the Rights Management Add-on for Internet Explorer.
Install the RMS client
Manage and deploy RMS-enabled applications using Group Policy.


Module 5: Content Protection and Consumption

This module explains the process of protecting content using RMS as well as the consumption process. It covers the concepts of Publishing Licenses and Use Licenses. This module also discusses how these operations differ in both online and offline modes.


Content Protection Requirements
Publishing RMS-Protected Content
Consuming RMS-Protected Content
Offline Protection
Lab A: Creating and Consuming by Using Word 2003
LAB B: Creating and Consuming by Using Outlook 2003
LAB C: Consuming Content by Using the Rights Management Add-On for Internet Explorer
LAB D: Using Active Directory Security Groups

After completing this module, students will be able to:

Describe the requirements related to protecting content using RMS.
Describe the process of publishing RMS content.
Describe the process of consuming RMS content.
Describe how RMS content can be protected off-line.
Create and consume RMS-protected content using Microsoft Word.
Create and consume RMS-protected email using Microsoft Outlook.
Create and consume RMS-protected content using Microsoft Excel.
Implement RMS using Active Directory Security Groups.


Module 6: Rights Policy Templates

This module discusses Rights Policy Templates. This module provides an introduction to Rights Policy Templates and the process of distributing Rights Policy Templates. It also addresses the policies that make up a Rights Policy Template, including Users and Groups, Expiration Policy and Extended Policy. Also covered are: Applying Rights Policy Templates and retiring Rights Policy Templates.


Overview of Rights Policy Templates
Creating Rights Policy Templates
Distributing Rights Policy Templates
Working with Rights Policy Templates
Best Practices
Lab A: Creating and Using Rights Policy Template
LAB B: Modifying Existing Templates
LAB C: Assigning Different Rights to Different Users

After completing this module, students will be able to:

Describe how Rights Policy Templates are used in the RMS environment.
Explain how to define a Rights Policy Template.
Explain how to distribute a Rights Policy Template.
Describe some of the management tasks related to Rights Policy Templates.
Create and distribute Rights Policy Templates.
Assign rights to different users using Rights Policy Templates.
Modify existing templates.


Module 7: Managing Trust

In this module, we will cover some of the elements of Trusted User Domains, Trusted Publishing Domains and the related trust decisions. We will address the kinds of trust relationships that an RMS deployment can have with other RMS deployments as well as with other components of the same infrastructure.

We will also cover the Exclusion policies which may be defined by an Administrator. This module will also include an over view of how Revocation works and when an administrator may choose to revoke trusted entities.

And finally we will take a look at the Super Users group and how this group may be used to recover protected content.


Overview of Managing Trust
Trusted User Domains
LAB A: Defining Trusted User Domains
Configuring Exclusion Policies
Revocation Overview
The Super Users Group
LAB B: Excluding Users and Applications
LAB C: Configuring the Super Users Group

After completing this module, students will be able to:

Describe trust policies related to trusted user domains and trusted publishing domains.
Describe exclusion policies related to lockbox version, Windows version, RAC exclusion, and application exclusion.
Explain how revocation works.
Describe the Super Users group and how it related to RMS.
Define trusted user domains.
Exclude user and applications.
Utilize the Super Users group.


Module 8: Deploying and Maintaining RMS Infrastructure

In this module we will examine adding Servers to your RMS infrastructure as well as the details of managing clusters. This will include replacing RMS Servers, decommissioning RMS Servers, unprovisioning and uninstalling RMS servers. We will also look at the essentials of the logging settings and disaster recovery.


Adding Servers to the RMS Infrastructure
Subordinate Licensing Servers
Managing Clusters
RMS Logging
RMS Disaster Recovery

After completing this module, students will be able to:

Calculate the number of required RMS servers.
Describe how to add servers to an existing RMS root cluster.
Describe how to add Subordinate Licensing Servers.
Describe how to Replace, Decommission, Unprovision, and Uninstall RMS servers.
Explain the RMS Logging function.
Describe procedures used in RMS disaster recovery.


Module 9 Troubleshooting

This module will focus on troubleshooting some RMS operations. We will look at common issues and the tools available to help diagnose and troubleshoot these issues.


Troubleshooting RMS
RMS Administration Toolkit
LAB A: Using RMS Toolkit Applications

After completing this module, students will be able to:

Describe troubleshooting procedures related to various RMS functions such as Domain Name System (DNS) issues, Service Connection Point (SCP) issues, Provisioning, Internet access, client certification, and consuming content.
Describe the various tools available in the RMS Administration Toolkit.


Module 10: Extranet Considerations

In this module examples are discussed of how companies may choose to extend their RMS infrastructure outside the boarders of their corporate network. This module examines the permissions required for extranet clients to access the RMS pipelines as well as some firewall options.


Integrating an Extranet with RMS
RMS and Firewall Options

After completing this module, students will be able to:

Describe the various extranet scenarios that can use RMS.
Describe the need for access to the licensing pipeline from the extranet scenario.
Describe the process related to RMS Service Discovery for Extranet clients.
Describe how RMS can be implemented in a perimeter network and Intranet scenario.
Describe how ISA Server can be used to provide RMS services to extranet clients.

  Спец. предложения|Обучение|Вебинары|Сертификация|Тестирование|О нас|Работа с сайтом|Новости|Поиск

   Тел: +74953633686 email: info@stars-s.ru

   125040, Москва, Ленинградский проспект, д. 5, стр. 2, под. 5, офис "Звезды и С"

  © Учебный центр "Звезды и С", 1991-2019