2830B-ENU_LabManual.pdf

(7419 KB) Pobierz
Microsoft Word - 2830B_TP.doc
Lab Instructions and Answer Key for
Course: 2830B Designing Security for
Microsoft® Networks
375483638.007.png 375483638.008.png
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft
makes no representations and warranties, either expressed, implied, or statutory, regarding these
manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or
product does not imply endorsement of Microsoft of the manufacturer or product. Links may be provided to
third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the
contents of any linked site or any link contained in a linked site, or any changes or updates to such sites.
Microsoft is not responsible for webcasting or any other form of transmission received from any linked site.
Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply
endorsement of Microsoft of the site or the products contained therein.
© 2008 Microsoft Corporation. All rights reserved.
Microsoft, Microsoft Press, Active Directory, ActiveSync, BizTalk, Forefront, Internet Explorer, Outlook,
PowerPoint, SharePoint, SQL Server, Visual Studio, Windows, Windows Media, Windows Mobile, Windows NT,
Windows PowerShell, Windows Server and Windows Vista are either registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries.
All other trademarks are property of their respective owners.
Version 1.2
375483638.009.png
Lab Instructions for Module 2: Creating
a Plan for Network Security
Table of Contents
Lab: Creating a Plan for Network Security
1
375483638.010.png 375483638.001.png 375483638.002.png
Lab Instructions for Module 2: Creating a Plan for Network Security
1
Lab: Creating a Plan for Network Security
After completing this lab, you will be able to:
Identify reasons why security policies fail.
Use MSF to guide project planning.
Determine members of a security design team.
Estimated time to complete this lab: 45 minutes
Lab Setup
Note: You only need to complete these steps once per course.
Before you begin the lab, you must:
1. Place the Student Materials CD in the CD-ROM drive.
2. Browse to the Webfiles folder on the CD, open the Downloads folder.
3. Double-click Allfiles.exe .
4. In the WinRAR self-extracting archive dialog box, click Install .
Note: The files will be copied to C:\Program Files\Microsoft Learning\2830 on your
computer.
375483638.003.png 375483638.004.png 375483638.005.png
2 Lab Instructions for Module 2: Creating a Plan for Network Security
Note: The files will be copied to C:\Program Files\Microsoft Learning\2830 on your
computer.
Lab Scenario
You are a consultant hired by Contoso Pharmaceuticals to help the company to design
security for its network.
375483638.006.png
Zgłoś jeśli naruszono regulamin