The advantages surpassing others
When you scan the Microsoft and find the contents about 70-744 real dumps here now, we will congratulate you that you have found a way out in your current tedious life. If you have a strong desire to sail through 70-744, don't be confused, pay attention to 70-744 exam dumps. On the basis of the 70-744 practice training, you can quickly remember and acquire the 70-744 questions & answers dumps in practical training, thus you don't put any time and energy for 70-744 preparation. Microsoft provides you with the most comprehensive and latest 70-744 exam dumps which cover important knowledge points. With the 70-744 training material (Securing Windows Server 2016), you just need to take 20-30 h to practice the exam, and the effect of reviewing is good.
Microsoft 70-744 Dumps Instant Download: Upon successful payment, Our systems will automatically send the product you have purchased to your mailbox by email. (If not received within 12 hours, please contact us. Note: don't forget to check your spam.)
3. Welfare after buying Microsoft 70-744 training dumps
If you want to buy 70-744 Securing Windows Server 2016 training dumps, it is set with easy procedure. It just takes two steps to complete your purchase, we will send Securing Windows Server 2016 dumps to your email at once, then you can download the attachments at will. After you buying 70-744 real dumps, you will enjoy one year free update of 70-744 traning material, that is to say, you can get the latest 70-744 exam dumps synchronously. In case, you fail in the 70-744 exam, you may think your money spent on 70-744 real dumps is wasted, but Microsoft is not that style. We will turn back you full refund. In addition, we can also replace with other exam dumps for you.
Choose 70-744 training dumps, may you a better and colorful life!
Securing Windows Server 2016 70-744 Exam
Securing Windows Server 2016 70-744 Exam which is related to Microsoft Certified System Engineer MCSE Certification. This exam validates the ability to determine hardware and firmware requirements for secure boot and encryption key functionality, deploy BitLocker without a trusted platform module TPM configure the network unlock feature and BitLocker group policy settings. It also deals with the ability to install and configure the host guardian service HGS and implement an enhanced security administrative environment ESAE administrative force design approach. IT Managers, System Administrators and Senior Systems Engineers usually hold or pursue this certification and you can expect the same job role after completion of this certification.
Reference: https://www.microsoft.com/en-us/learning/exam-70-744.aspx
Microsoft 70-744 Exam Syllabus Topics:
Topic | Details |
---|---|
Implement Server Hardening Solutions (25-30%) | |
Configure disk and file encryption | -This objective may include but is not limited to: Determine hardware and firmware requirements for secure boot and encryption key functionality; deploy BitLocker encryption; deploy BitLocker without a Trusted Platform Module (TPM); deploy BitLocker with a TPM only; configure the Network Unlock feature; configure BitLocker Group Policy settings; enable Bitlocker to use secure boot for platform and BCD integrity validation; configure BitLocker on Cluster Shared Volumes (CSVs) and Storage Area Networks (SANs); implement BitLocker Recovery Process using self-recovery and recovery password retrieval solutions; configure Bitlocker for virtual machines (VMs) in Hyper-V; determine usage scenarios for Encrypting File System (EFS); configure the EFS recovery agent; manage EFS and BitLocker certificates, including backup and restore |
Implement malware protection | -This objective may include but is not limited to: Implement antimalware solution with Windows Defender; integrate Windows Defender with WSUS and Windows Update; configure Windows Defender using Group Policy; configure Windows Defender scans using Windows PowerShell; implement AppLocker rules; implement AppLocker rules using Windows PowerShell; implement Control Flow Guard; implement Code Integrity (Device Guard) Policies; create Code Integrity policy rules; create Code Integrity file rules |
Protect credentials | -This objective may include but is not limited to: Determine requirements for implementing Credential Guard; configure Credential Guard using Group Policy, WMI, command prompt, and Windows PowerShell; implement NTLM blocking |
Create security baselines | -This objective may include but is not limited to: Install and configure Microsoft Security Compliance Toolkit; create, view, and import security baselines; deploy configurations to domain and non-domain joined servers |
Secure a Virtualization Infrastructure (5-10%) | |
Implement a Guarded Fabric solution | -This objective may include but is not limited to: Install and configure the Host Guardian Service (HGS); configure Admin-trusted attestation; configure TPM-trusted attestation; configure the Key Protection Service using HGS; migrate Shielded VMs to other guarded hosts; troubleshoot guarded hosts |
Implement Shielded and encryption-supported VMs | -This objective may include but is not limited to: Determine requirements and scenarios for implementing Shielded VMs; create a shielded VM using only a Hyper-V environment; enable and configure vTPM to allow an operating system and data disk encryption within a VM; determine requirements and scenarios for implementing encryption-supported VMs; troubleshoot Shielded and encryption-supported VMs |
Secure a Network Infrastructure (10-15%) | |
Configure Windows Firewall | -This objective may include but is not limited to: Configure Windows Firewall with Advanced Security; configure network location profiles; configure and deploy profile rules; configure firewall rules for multiple profiles using Group Policy; configure connection security rules using Group Policy, the GUI management console, or Windows PowerShell; configure Windows Firewall to allow or deny applications, scopes, ports, and users using Group Policy, the GUI management console, or Windows PowerShell; configure authenticated firewall exceptions; import and export settings |
Implement a Software Defined Datacenter Firewall | -This objective may include but is not limited to: Determine requirements and scenarios for Datacenter Firewall implementation with Software Defined Networking; determine usage scenarios for Datacenter Firewall policies and network security groups; Configure Datacenter Firewall Access Control Lists |
Secure network traffic | -This objective may include but is not limited to: Configure IPsec transport and tunnel modes; configure IPsec authentication options; configure connection security rules; implement isolation zones; implement domain isolation; implement server isolation zones; determine SMB 3.1.1 protocol security scenarios and implementations; enable SMB encryption on SMB Shares; configure SMB signing via Group Policy; disable SMB 1.0; secure DNS traffic using DNSSEC and DNS policies; install and configure Microsoft Message Analyzer (MMA) to analyze network traffic |
Manage Privileged Identities (25-30%) | |
Implement Just-In-Time (JIT) Administration | -This objective may include but is not limited to: Create a new administrative (bastion) forest in an existing Active Directory environment using Microsoft Identity Manager (MIM); configure trusts between production and bastion forests; create shadow principals in bastion forest; configure the MIM Web portal; request privileged access using the MIM Web portal; determine requirements and usage scenarios for Privileged Access Management (PAM) solutions; create and Implement MIM policies; implement Just-in-Time administration principals using time-based policies; request privileged access using Windows PowerShell |
Implement Just-Enough-Administration (JEA) | -This objective may include but is not limited to: Enable a JEA solution on Windows Server 2016; create and configure session configuration files; create and configure role capability files; create a JEA endpoint; connect to a JEA endpoint on a server for administration; view logs; download WMF 5.1 to a Windows Server 2008 R2; configure a JEA endpoint on a server using Desired State Configuration (DSC) |
Implement Privileged Access Workstations (PAWs) and User Rights Assignments | -This objective may include but is not limited to: Implement a PAWS solution; configure User Rights Assignment group policies; configure security options settings in Group Policy; enable and configure Remote Credential Guard for remote desktop access; Implement an Enhanced Security Administrative Environment (ESAE) administrative forest design approach; Determine usage scenarios and requirements for implementing ESAE forest design architecture to create a dedicated administrative forest |
Implement Local Administrator Password Solution (LAPS) | -This objective may include but is not limited to: Install and configure the LAPS tool; secure local administrator passwords using LAPS; manage password parameters and properties using LAPS |
Implement Threat Detection Solutions (15-20%) | |
Configure advanced audit policies | -This objective may include but is not limited to: Determine the differences and usage scenarios for using local audit policies and advanced auditing policies; implement auditing using Group Policy and AuditPol.exe; implement auditing using Windows PowerShell; create expression-based audit policies; configure the Audit PNP Activity policy; configure the Audit Group Membership policy; enable and configure Module, Script Block, and Transcription logging in Windows PowerShell |
Install and configure Microsoft Advanced Threat Analytics (ATA) | -This objective may include but is not limited to: Determine usage scenarios for ATA; determine deployment requirements for ATA; install and configure ATA Gateway on a dedicated server; install and configure ATA Lightweight Gateway directly on a domain controller; configure alerts in ATA Center when suspicious activity is detected; review and edit suspicious activities on the attack time line |
Determine threat detection solutions using Operations Management Suite (OMS) | -This objective may include but is not limited to: Determine usage and deployment scenarios for OMS; determine security and auditing functions available for use; determine Log Analytics usage scenarios |
Implement Workload-Specific Security (5-10%) | |
Secure application development and server workload infrastructure | -This objective may include but is not limited to: Determine usage scenarios, supported server workloads, and requirements for deployments; determine usage scenarios and requirements for Windows Server and Hyper-V containers; install and configure containers |
Implement a secure file services infrastructure and Dynamic Access Control (DAC) | -This objective may include but is not limited to: Install the File Server Resource Manager (FSRM) role service; configure quotas; configure file screens; configure storage reports; configure file management tasks; configure File Classification Infrastructure (FCI) using FSRM; implement work folders; configure file access auditing; configure user and device claim types; implement policy changes and staging; perform access-denied remediation; create and configure Central Access rules and policies; create and configure resource properties and lists |
2. Save your time and improve your reviewing efficiency for 70-744 exam
All of us want to spend less money and little time for 70-744 exam. Here, MCSA: Windows Server 2016 70-744 training material will help you to come true the thoughts. When you visit 70-744 exam dumps, you can find we have three different versions of dumps references. The PDF version is the common file for customers, it is very convenient for you to print into papers. If you want to use pen to mark key points, pdf is the best choice. The PC version and On-line version is more intelligent and interactive, you can improve your study efficiency and experience the simulate exam. Besides, you can assess your 70-744 testing time and do proper adjustment at the same time. With the help of 70-744 practical training, you can pass the 70-744 test with high efficiency and less time.
Schedule exam
Languages: English, Spanish, Chinese (Simplified), Chinese (Traditional), French, German, Japanese, Portuguese (Brazil)
Candidates for this exam secure Windows Server 2016 environments. Candidates are familiar with the methods and technologies used to harden server environments and secure virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric.
Microsoft Securing Windows Server 2016 Exam Certification Details:
Passing Score | 700 / 1000 |
Sample Questions | Microsoft Securing Windows Server 2016 Sample Questions |
Duration | 150 mins |
Exam Code | 70-744 |
Exam Name | Microsoft Certified Solutions Expert (MCSE) - Core Infrastructure |
Number of Questions | 40-60 |
Schedule Exam | Pearson VUE |
Books / Training | 20744A: Securing Windows Server 2016 INF 259x: Windows Server 2016 Security Features |
Exam Price | $165 (USD) |
1. High quality of Microsoft 70-744 training dumps
More than ten years development and innovation, Microsoft is continuously strong and increasingly perfecting, MCSA: Windows Server 2016 70-744 training dumps are the effort of several IT specialist who keep trying and hard work. So 70-744 exam dumps is reliable and accuracy of high-quality, and deserve IT exam candidates to refer for the coming 70-744 test. If you think what we said are exaggerated, please inquiry the customer who have used 70-744 exam dumps or visit Microsoft to have try about the 70-744 free demo, then you can confirm that we are sincere and our products are good and worthy. Actually, our customers' feedback is good, from which we are more confident say 70-744 (Securing Windows Server 2016) dumps can guarantee you pass the exam with 99.8% passing rate.