Exam 70-299:

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Published:February 13, 2004
Language(s):English, French, German, Japanese, Spanish, Chinese (Simplified)
Audience(s):IT Professionals
Technology:Microsoft Windows Server 2003
Type:Proctored Exam

How To Get It: Schedule your exam through the following exam provider:

Take exam

Preparing for an Exam
This exam is scheduled to retire on July 31, 2013.
 
The Microsoft Certification website and this preparation guide contain a variety of resources to help you prepare for an exam. Preparing for and Taking an Exam — FAQ provides answers to frequently asked questions about exam registration ,preparation ,scoring ,and policies , including:
  • The most effective way to prepare to take an exam.
  • The relationship between Microsoft training materials and exam content.
  • Microsoft policy concerning the incorporation of service pack and revision updates into exam content.
  • Exam question types and formats.
  • Exam time limits and number of questions asked.
We recommend that you review this preparation guide in its entirety and familiarize yourself with the FAQs and resources on the Microsoft Certification website before you schedule your exam.
Audience Profile
The Microsoft Certified Systems Administrator (MCSA) on Windows Server 2003 credential is intended for IT professionals who work in the typically complex computing environment of medium to large companies. An MCSA candidate should have 6 to 12 months of experience administering client and network operating systems in environments that have the following characteristics:
  • 250 to 5,000 or more users
  • Three or more physical locations
  • Three or more domain controllers
  • Network services and resources such as messaging, database, file and print, proxy server, firewall, public key infrastructure (PKI), Internet, intranet, remote access, and client computer management
  • Connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet
Credit Toward CertificationWhen you pass Exam 70-299: Implementing and Administering Security in a Microsoft Windows Server 2003 Network, you complete the requirements for the following certification(s):Exam 70-299: Implementing and Administering Security in a Microsoft Windows Server 2003 Network: counts as credit toward the following certification(s):
Note This preparation guide is subject to change at any time without prior notice and at the sole discretion of Microsoft. Microsoft exams might include adaptive testing technology and simulation items. Microsoft does not identify the format in which exams are presented. Please use this preparation guide to prepare for the exam, regardless of its format.
Skills Being MeasuredThis exam measures your ability to accomplish the technical tasks listed below.The percentages indicate the relative weight of each major topic area on the exam.The higher the percentage, the more questions you are likely to see on that content area on the exam.

The information after “This objective may include but is not limited to” is intended to further define or scope the objective by describing the types of skills and topics that may be tested for the objective. However, it is not an exhaustive list of skills and topics that could be included on the exam for a given skill area. You may be tested on other skills and topics related to the objective that are not explicitly listed here.
Implementing, Managing, and Troubleshooting Security Policies
  • Plan security templates based on computer role. Computer roles include SQL Server computer, Microsoft Exchange Server computer, domain controller, Internet Authentication Service (IAS) server, and Internet Information Services (IIS) server.
  • Configure security templates.
    • Configure registry and file system permissions.
    • Configure account policies.
    • Configure .pol files.
    • Configure audit policies.
    • Configure user rights assignment.
    • Configure security options.
    • Configure system services.
    • Configure restricted groups.
    • Configure event logs.
  • Deploy security templates.
    • Deploy security templates by using command-line tools and scripting.
    • Plan the deployment of security templates.
    • Deploy security templates by using Active Directory-based Group Policy objects (GPOs).
  • Troubleshoot security template problems.
    • Troubleshoot security templates in a mixed operating system environment.
    • Troubleshoot security policy inheritance.
    • Troubleshoot removal of security template settings.
  • Configure additional security based on computer roles. Server computer roles include SQL Server computer, Exchange Server computer, domain controller, Internet Authentication Service (IAS) server, and Internet Information Services (IIS) server. Client computer roles include desktop, portable, and kiosk.
    • Plan and configure security settings.
    • Plan network zones for computer roles.
    • Plan and configure software restriction policies.
    • Plan security for infrastructure services. Services include DHCP and DNS.
    • Plan and configure auditing and logging for a computer role. Considerations include Windows Events, Internet Information Services (IIS), firewall log files, Netlog, and RAS log files.
    • Analyze security configuration. Tools include Microsoft Baseline Security Analyzer (MBSA), the MBSA command-line tool, and Security Configuration and Analysis.
Implementing, Managing, and Troubleshooting Patch Management Infrastructure
  • Plan the deployment of service packs and hotfixes.
    • Plan rollback strategy.
    • Evaluate the applicability of service packs and hotfixes.
    • Test the compatibility of service packs and hotfixes for existing applications.
    • Plan patch deployment environments for both the pilot and production phases.
    • Plan the batch deployment of multiple hotfixes.
  • Assess the current status of service packs and hotfixes. Tools include MBSA and the MBSA command-line tool.
    • Assess current patch levels by using the MBSA GUI tool.
    • Assess current patch levels by using the MBSA command-line tool with scripted solutions.
  • Deploy service packs and hotfixes.
    • Deploy service packs and hotfixes on new servers and client computers. Considerations include slipstreaming, custom scripts, and isolated installation or test networks.
    • Deploy service packs and hotfixes on existing servers and client computers.
Implementing, Managing, and Troubleshooting Security for Network Communications
  • Plan IPSec deployment.
    • Decide which IPSec mode to use.
    • Plan authentication methods for IPSec.
    • Test the functionality of existing applications and services.
  • Configure IPSec policies to secure communication between networks and hosts. Hosts include domain controllers, Internet Web servers, databases, e-mail servers, and client computers.
    • Configure IPSec authentication.
    • Configure appropriate encryption levels. Considerations include the selection of perfect forward secrecy (PFS) and key lifetimes.
    • Configure the appropriate IPSec protocol. Protocols include Authentication Header (AH) and Encapsulating Security Payload (ESP).
    • Configure IPSec inbound and outbound filters and filter actions.
  • Deploy and manage IPSec policies.
    • Deploy IPSec policies by using Local policy objects or Group Policy objects (GPOs).
    • Deploy IPSec policies by using commands and scripts. Tools include IPSecPol and NetSh.
    • Deploy IPSec certificates. Considerations include deployment of certificates and renewing certificates on managed and unmanaged client computers.
  • Troubleshoot IPSec.
    • Monitor IPSec policies by using IP Security Monitor.
    • Configure IPSec logging. Considerations include Oakley logs and IPSec driver logging.
    • Troubleshoot IPSec across networks. Considerations include network address translation, port filters, protocol filters, firewalls, and routers.
    • Troubleshoot IPSec certificates. Considerations include enterprise trust policies and certificate revocation list (CRL) checking.
  • Plan and implement security for wireless networks.
    • Plan the authentication methods for a wireless network.
    • Plan the encryption methods for a wireless network.
    • Plan wireless access policies.
    • Configure wireless encryption.
    • Install and configure wireless support for client computers.
  • Deploy, manage, and configure SSL certificates, including uses for HTTPS, LDAPS, and wireless networks. Considerations include renewing certificates and obtaining self-issued certificates instead of publicly issued certificates.
    • Configure SSL to secure communication channels. Communication channels include client computer to Web server, Web server to SQL Server computer, client computer to Active Directory domain controller, and e-mail server to client computer.
    • Obtain self-issued certificates and publicly issued certificates.
    • Install certificates for SSL.
    • Renew certificates.
  • Configure security for remote access users.
    • Configure authentication for secure remote access. Authentication types include PAP, CHAP, MS-CHAP, MS-CHAP v2, EAP-MD5, EAP-TLS, and multifactor authentication that combines smart cards and EAP.
    • Configure and troubleshoot virtual private network (VPN) protocols. Considerations include Internet service provider (ISP), client operating system, network address translation devices, Routing and Remote Access servers, and firewall servers.
    • Manage client configuration for remote access security. Tools include remote access policy and the Connection Manager Administration Kit.
Planning, Configuring, and Troubleshooting Authentication, Authorization, and PKI
  • Plan and configure authentication.
    • Plan, configure, and troubleshoot trust relationships.
    • Plan and configure authentication protocols.
    • Plan and configure multifactor authentication.
    • Plan and configure authentication for Web users.
    • Plan and configure delegated authentication.
  • Plan group structure.
    • Decide which types of groups to use.
    • Plan security group scope.
    • Plan nested group structure.
  • Plan and configure authorization.
    • Configure access control lists (ACLs).
    • Plan and troubleshoot the assignment of user rights.
    • Plan requirements for digital signatures.
  • Install, manage, and configure Certificate Services.
    • Deploy and revoke certificates to users, computers, and CAs.
    • Backup and restore the CA.
    • Install and configure root, intermediate, and issuing certification authorities (CAs). Considerations include renewals and hierarchy.
    • Configure certificate templates.
    • Configure, manage, and troubleshoot the publication of certificate revocation lists (CRLs).
    • Configure archival and recovery of keys.
Preparation Tools and ResourcesTo help you prepare for this exam, Microsoft Learning recommends that you have hands-on experience with the product and that you use the following training resources. These training resources do not necessarily cover all of the topics listed in the "Skills Measured" tab.
Learning Plans and Classroom Training
Microsoft E-Learning There is no Microsoft E-Learning training currently available.
Microsoft Press Books There are no Microsoft Press books currently available.
Practice Tests
Microsoft Online Resources
  • TechNet: Designed for IT professionals, this site includes How-tos, best practices, downloads, technical chats, and much more.
  • MSDN: The Microsoft Developer Network (MSDN) is a reference for developers, featuring code samples, technical articles, newsgroups, chats, and more.
  • Training & Certification Newsgroups: A newsgroup exists for every Microsoft certification. By participating in the ongoing dialogue, you take advantage of a unique opportunity to exchange ideas with and ask questions of others, including more than 750 Microsoft Most Valuable Professionals (MVPs) worldwide.
Have Questions? For advice about training and certification, connect with peers: For questions about a specific certification, chat with a Microsoft Certified Professional (MCP): To find out about recommended blogs, Web sites, and upcoming Live Meetings on popular topics, visit our community site: