Published: November 3, 2016
Languages: English
Audiences: IT professionals
Technology: Windows Server 2016
Credit toward certification: MCSE
Skills measured
This exam measures your ability to accomplish the technical tasks listed
below. The percentages indicate the relative weight of each major topic area on
the exam. The higher the percentage, the more questions you are likely to see on
that content area on the exam. View video tutorials about the variety of
question types on Microsoft exams.
Please note that the questions may test on, but will not be limited to, the
topics described in the bulleted text.
Do you have feedback about the relevance of the skills measured on this exam?
Please send Microsoft your comments. All feedback will be reviewed and
incorporated as appropriate while still maintaining the validity and reliability
of the certification process. Note that Microsoft will not respond directly to
your feedback. We appreciate your input in ensuring the quality of the Microsoft
Certification program.
If you have concerns about specific questions on this exam, please submit an
exam challenge.
If you have other questions or feedback about Microsoft Certification exams or
about the certification program, registration, or promotions, please contact
your Regional Service Center.
Implement server hardening solutions (25–30%)
Configure disk and file encryption
Determine hardware and firmware requirements for secure boot and encryption key
functionality; deploy BitLocker encryption; deploy BitLocker without a Trusted
Platform Module (TPM); deploy BitLocker with a TPM only; configure the Network
Unlock feature; configure BitLocker Group Policy settings; enable Bitlocker to
use secure boot for platform and BCD integrity validation; configure BitLocker
on Clustered Shared Volumes (CSVs) and Storage Area Networks (SANs); implement
BitLocker Recovery Process using self-recovery and recovery password retrieval
solutions; configure BitLocker for virtual machines (VMs) in Hyper-V; determine
usage scenarios for Encrypting File System (EFS); configure the EFS recovery
agent; manage EFS and BitLocker certificates, including backup and restore
Implement server patching and updating solutions
Install and configure Windows Server Update Services (WSUS), manage updates
using WSUS, create computer groups, configure update approvals and deployments,
configure automatic updates, configure WSUS reporting, troubleshoot WSUS
configuration and deployments
Implement malware protection
Implement antimalware solution with Windows Defender, integrate Windows Defender
with WSUS and Windows Update, configure Windows Defender using Group Policy,
configure Windows Defender scans using Windows PowerShell, implement AppLocker
rules, implement AppLocker rules using Windows PowerShell, implement Control
Flow Guard, implement Code Integrity (Device Guard) Policies, create Code
Integrity policy rules, create Code Integrity file rules
Protect credentials
Determine requirements for implementing Credential Guard; configure Credential
Guard using Group Policy, WMI, command prompt, and Windows PowerShell; implement
NTLM blocking
Create security baselines
Install and configure Security Compliance Manager (SCM); create, view, and
import security baselines; deploy configurations to domain and non-domain joined
servers
Secure a virtualization infrastructure (5–10%)
Implement a Guarded Fabric solution
Install and configure the Host Guardian Service (HGS), configure Admin-trusted
attestation, configure TPM-trusted attestation, configure the Key Protection
Service using HGS, migrate Shielded VMs to other guarded hosts, configure Nano
Server as TPM attested guarded host, troubleshoot guarded hosts
Implement Shielded and encryption-supported VMs
Determine requirements and scenarios for implementing Shielded VMs, create a
Shielded VM using only a Hyper-V environment, enable and configure vTPM to allow
an operating system and data disk encryption within a VM, determine requirements
and scenarios for implementing encryption-supported VMs, troubleshoot Shielded
and encryption-supported VMs
Secure a network infrastructure (10–15%)
Configure Windows Firewall
Configure Windows Firewall with Advanced Security; configure network location
profiles; configure and deploy profile rules; configure firewall rules for
multiple profiles using Group Policy; configure connection security rules using
Group Policy, the GUI management console, or Windows PowerShell; configure
Windows Firewall to allow or deny applications, scopes, ports, and users using
Group Policy, the GUI management console, or Windows PowerShell; configure
authenticated firewall exceptions; import and export settings
Implement a software-defined Distributed Firewall
Determine requirements and scenarios for Distributed Firewall implementation
with software-defined networking, determine usage scenarios for Distributed
Firewall policies and network security groups
Secure network traffic
Configure IPsec transport and tunnel modes, configure IPsec authentication
options, configure connection security rules, implement isolation zones,
implement domain isolation, implement server isolation zones, determine SMB
3.1.1 protocol security scenarios and implementations, enable SMB encryption on
SMB Shares, configure SMB signing via Group Policy, disable SMB 1.0, secure DNS
traffic using DNSSEC and DNS policies, install and configure Microsoft Message
Analyzer (MMA) to analyze network traffic
Manage privileged identities (25–30%)
Implement an Enhanced Security Administrative Environment (ESAE) administrative
forest design approach
Determine usage scenarios and requirements for implementing ESAE forest design
architecture to create a dedicated administrative forest, determine usage
scenarios and requirements for implementing clean source principals in an Active
Directory architecture
Implement Just-in-Time (JIT) Administration
Create a new administrative (bastion) forest in an existing Active Directory
environment using Microsoft Identity Manager (MIM), configure trusts between
production and bastion forests, create shadow principals in bastion forest,
configure the MIM web portal, request privileged access using the MIM web
portal, determine requirements and usage scenarios for Privileged Access
Management (PAM) solutions, create and implement MIM policies, implement
Just-in-Time administration principals using time-based policies, request
privileged access using Windows PowerShell
Implement Just-Enough-Administration (JEA)
Enable a JEA solution on Windows Server 2016; create and configure session
configuration files, create and configure role capability files, create a JEA
endpoint, connect to a JEA endpoint on a server for administration, view logs,
download WMF 5.1 to a Windows Server 2008 R2, configure a JEA endpoint on a
server using Desired State Configuration (DSC)
Implement Privileged Access Workstations (PAWs) and User Rights Assignments
Implement a PAWS solution, configure User Rights Assignment group policies,
configure security options settings in Group Policy, enable and configure Remote
Credential Guard for remote desktop access
Implement Local Administrator Password Solution (LAPS)
Install and configure the LAPS tool, secure local administrator passwords using
LAPS, manage password parameters and properties using LAPS
Implement threat detection solutions (15–20%)
Configure advanced audit policies
Determine the differences and usage scenarios for using local audit policies and
advanced auditing policies; implement auditing using Group Policy and
AuditPol.exe; implement auditing using Windows PowerShell; create
expression-based audit policies; configure the Audit PNP Activity policy;
configure the Audit Group Membership policy; enable and configure Module, Script
Block, and Transcription logging in Windows PowerShell
Install and configure Microsoft Advanced Threat Analytics (ATA)
Determine usage scenarios for ATA; determine deployment requirements for ATA,
install and configure ATA Gateway on a dedicated server, install and configure
ATA Lightweight Gateway directly on a domain controller, configure alerts in ATA
Center when suspicious activity is detected, review and edit suspicious
activities on the attack time line
Determine threat detection solutions using Operations Management Suite (OMS)
Determine usage and deployment scenarios for OMS, determine security and
auditing functions available for use; determine Log Analytics usage scenarios
Implement workload-specific security (5–10%)
Secure application development and server workload infrastructure
Determine usage scenarios, supported server workloads, and requirements for Nano
Server deployments; install and configure Nano Server; implement security
policies on Nano Servers using Desired State Configuration (DSC); determine
usage scenarios and requirements for Windows Server and Hyper-V containers;
install and configure Hyper-V containers
Implement a secure file services infrastructure and Dynamic Access Control (DAC)
Install the File Server Resource Manager (FSRM) role service, configure quotas,
configure file screens, configure storage reports, configure file management
tasks, configure File Classification Infrastructure (FCI) using FSRM, implement
work folders, configure file access auditing, configure user and device claim
types, implement policy changes and staging, perform access-denied remediation,
create and configure Central Access rules and policies, create and configure
resource properties and lists