Monday, 3 August 2015

T-Mobile caught in crossfire of injected ad war with Flash Networks

T-Mobile, Citizens Bank, thousands of other innocent companies and millions of users are stuck between shady ad networks and Google, publishers, and legitimate advertisers

LAS VEGAS - An ongoing conflict between website owners and ad injectors who place unwanted ads on those websites has just flared up into full-blown war, with advertisers and carriers caught in the crossfire.

Take, for example, T-Mobile, which is proudly named as a customer by Flash Networks, a company that brags about creating "new monetization opportunities" for mobile operators when it "inserts the most relevant engagement display into the selected webpages."

This seems to have been a surprise to T-Mobile. Cynthia Lee, the company's senior digital media manager, adamantly denied that T-Mobile was using Flash Networks to inject ads into webpages it was serving up to mobile customers.

"It's completely against our strategy," she said. "Consumer experiences and customer privacy are at the top of our list and a pillar of how we execute our media."

T-Mobile does buy advertising in an automated, programmatic way, she said, and may have indirectly and accidentally bought an ad on this network.

"As a company, we're trying to improve on that," she said. "We're working on it with the industry."

In addition to T-Mobile, Flash Networks also lists Orange, Vodafone, Tlecom Italia, SwissCom, Telekom Austria, TurkCell, nTelos Wireless and Bharti Airtel as customers.
"This is a sketchy and morally suspect practice that is unfortunately all-to-common among ISPs."

Ken Smith, senior consultant at SecureState
At least one of those companies is an actual customer -- an Indian blogger discovered that his Internet Service Provider, Bharti Airtel, was inserting unwanted JavaScript into his website. He posted screenshots on GitHub, and got a cease-and-desist letter from Flash Networks in response.

Bharti Airtel issued a statement that they had no relation to the cease-and-desist notice -- and said that the injected code was only there "to help customers understand their data consumption in terms of volume of data used."

They did not explain why this required injecting Javascript into other companies' webpages.

Ken Ruck, Flash Networks' vice president of monetization agreed to an interview, then canceled, and the company sent a canned statement instead, saying that they do not discuss customers with the media.

The Flash Networks Layer 8 platform allows operators "to monetize a never before seen scale of new monetization opportunities," the company said in its statement.

"The Layer8 solution is not malware and not intended for ad injection," said a spokesperson, who then went on to add that the company's "injected code... can be used to offer ringtones, ebooks, and local offers."

Up to 30 percent of Web users are currently seeing extra ads on websites, injected by their mobile carriers, Internet providers, WiFi hotspots, malware, toolbars, and browser extensions, according to new research from Namogoo Technologies. This is up from 5 percent during the first nine months of 2014, when Google ran its own analysis.

In the below screenshot, for example, the Ad Options ad network has inserted an unwanted ad on the home page of the Citizens Bank website.
citizens bank malvertising

And below, another ad network -- OMG Music! -- has inserted an ad on Andover Bank's website. Ironically, it's an ad for Citizens Bank.
andover bank malvertising

Namagoo

According to a recent report by Google, a single injected ad is typically funneled through several different ad networks, so that the advertisers are not even aware that this is happening.

That is the case with Citizens Bank, which confirmed that it did not deliberately purchase the injected ads, and is investigating the situation.

Not only are the ads on these networks intrusive and unwanted, but because the networks are not well policed, more likely to be malicious or subject to click fraud.

Google steps in

Search engines are victims, too. Ad injectors insert their ads right into search results, getting top placement without having to pay the search engines a dime.

But in going after the search engines, the ad injectors may have taken a step too far. Picking a fight with Google is seldom a good idea.

Three months ago, Google released the results of a study that found more than 50,000 browser extensions and 34,000 software applications that took over browsers and injected ads. A third of these also took the opportunity to steal account credentials, hijack search results, and spy on users' activities.

Google has already removed 192 deceptive Chrome extensions from the Chrome Web Store and added new safeguards to the browser. It also has begun notifying advertisers when their ads are injected and updated their AdWords policies to make it harder to promote unwanted software.

The ad injectors can put their ads right into the middle of a webpage, or create new links where they find keywords, or anywhere there is blank space, or replace existing legitimate ads, or layer new ads on top of the page blocking the view of legitimate content.

Browser-based ad injectors get an extra bonus, with full access to even encrypted websites, or pages served via VPNs.

Injections aided and abetted by network operators typically have access to the underlying code only for unencrypted webpages, though some carriers have been known to go as far as interfere with the encryption, as Gogo Inflight Wi-Fi was caught doing earlier this year.
How is this legal?

Users routinely use tools that change the way that websites are presented. They might want a page reformatted so that it's easier to print, or translated into a foreign language.

A user might deliberately choose to install a tool that, say, shows prices from competitors whenever they're on a major shopping website.

Or they might accidentally install a tool that came bundled with an application that they actually wanted -- and agreed to the terms and conditions without reading them.

"The ad injection is not criminal," said Elias Manousos, CEO at security vendor RiskIQ, which tracks malvertising and other external Web-based threats.

It's when the ad injectors are installed by malware that it's illegal, he said. Otherwise, there's no law on the books that protect the consumers.

"There are deceptive trade practices that the FTC enforces, but it's pretty weak," he said. And if a particular injected ad is illegal in a particular state, it's hard to prove because it's difficult to catch anyone in the act.

The advertising networks are interlinked in a byzantine web of relationships that make it hard to locate the exact point at which an ad went from a legitimate ad to an injected ad.

"The ad ecosystem is very, very private about who their customers are and who their publishers are," said Manousos. "So it's very easy to turn a blind eye to where the problems are coming from and it allows them to monetize their unethical installs."

He estimated the size of the injected ad industry at between $1 billion and $4 billion globally.

"Our approach is to help customers find who the bad actors are, and eliminate them," he said.

According to Google, 77 percent of all injected ads get funneled through three major intermediaries that connect the legitimate ad networks with the less savory ones: DealTime, PriceGrabber, and BizRate.

"They serve as the single critical bottleneck before ad injection traffic enters the ad ecosystem and becomes indistinguishable from legitimate consumer interest," wrote Google research scientist Kurt Thomas in a recent research paper about ad injection. "We have begun to reach out to these major intermediaries as well as the brands impacted by ad injection to alert them of the possibility of receiving ad injection traffic."

Google also identified Sears, Walmart, Target and Ebay as some of the companies most victimized by ad injectors. Ironically, Ebay also owns Dealtime.

As of deadline, Ebay has not responded to a request for comment.
What can you do?

According to Google research scientist Kurt Thomas, website owners can protect their sites in a few ways.

Tips for dealing with ad injection

Browser-based content security policies can be used to detect if webpages are being modified, said RiskIQ's Manousos.

"But a lot of the ad injection companies have found ways around [content security policies]," he added. "Just like anything, it's a cat-and-mouse game."

Meanwhile, corporate employees have yet another reason to be careful when using public networks.

"You should use VPNs, because VPNs will totally protect against this attack," said Manousos. "It creates a secure tunnel regardless of what WiFi access point you're connected to."

RiskIQ offers a solution that can help a website or corporate network detect if ad injection is going on, he said.

Injected ads pose risks to enterprises because attackers can purchase highly targeted placements, zeroing in on individual companies or even individual employees, and hijacking websites that company employees are most likely to visit.

The company doesn't currently block the injection itself, however, though it is considering offering such a service.

Another company that can help is Shape Security.

Shape Security works by constantly rewriting the underlying code of the webpage, making it a hard-to-hit moving target not only for would-be ad injectors but other automated attacks. The company calls this polymorphism.

"If you can break that automation, you can make the ecosystem for attacking websites much more difficult for attackers," said company vice president Shuman Ghosemajumder.

Google's crack down on browser extensions is a good start but it doesn't address all sources of client-side injected ads and malware, said Chemi Katz, cofounder and CEO of Namagoo Technologies, which offers a service to enterprises that protects websites from all unwanted changes.

"While Google is aware of 192 unique signatures, we are aware of over 25,000 different ones," he said.

Namogoo handles both browser-based and network-based injections, said Katz.

Namogoo's Katz declined to explain how his company's service works, other than to say that website owners only need to add a line of code to be protected.

"The technology comes as part of the page," he said. "It runs silently and identifies any anomalies and blocks them."

It works to protect against injections from malware, browsers and toolbars, as well as from Internet access providers, he said.

And that includes Flash Networks' Layer8, said Namogoo COO Ohad Greenshpan. "Our technology serves publishers and provide them the technology to serve their pages as they intended."

Advertisers need to protect themselves as well. Though the ads can seem like a bargain, disreputable networks are least likely to be protecting against click fraud, and there can be reputation damage when ads are injected into sites where they clearly don't belong, or are overly intrusive.

"If you want to really stop the problem, you have to stop the flow of money," said RiskIQ's Manousos.

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com

Saturday, 25 July 2015

WordPress gets a patch for critical XSS flaw

WordPress 4.2.3 fixes a cross-site scripting flaw that could be used to compromise websites

Developers of the popular WordPress blogging platform have released a critical security update to fix a vulnerability that can be exploited to take over websites.

WordPress 4.2.3, released Thursday, resolves a cross-site scripting (XSS) vulnerability that could allow users with the Contributor or Author roles to compromise a website, said Gary Pendergast, a member of the WordPress team, in a blog post.

While this is not as critical as a flaw that can be exploited without authentication, it still poses a high risk for many websites because the compromise of a single non-administrator user account can turn into a complete website takeover.

The new update also fixes a low-severity flaw that allows users with the Subscriber permission to create post drafts through the Quick Draft feature, as well as 20 other non-security bugs.

Website administrators are advised to install the new version as soon as possible from their WordPress dashboards. Websites configured for automatic background updates have already started to be patched.

WordPress websites are a common target for attackers, even those that don't hold particularly valuable information in their databases. Hackers can use them for various purposes in their malicious activities, for example to host malware or to launch distributed denial-of-service (DDoS) attacks.


Best Citrix Training and Citrix Certification and more Cisco exams log in to Certkingdom.com


Saturday, 11 July 2015

Why the open source business model is a failure

Most open source companies can't thrive by selling maintenance and support subscriptions. But the cloud may be the key to revenue generation.

Open source software companies must move to the cloud and add proprietary code to their products to succeed. The current business model is recipe for failure.

That's the conclusion of Peter Levine, a partner at Andreessen Horowitz, the Silicon Valley venture capital firm that backed Facebook, Skype, Twitter and Box as startups. Levine is also former CEO of XenSource, a company that commercialized products based on the open source Xen hypervisor.
INSIDER: 4 open-source monitoring tools that deserve a look

Levine says the conventional open source business model is flawed: Open source companies that charge for maintenance, support, warranties and indemnities for an application or operating system that is available for free simply can't generate enough revenue.

"That means open source companies have a problem investing in innovation, making them dependent on the open source community to come up with innovations," he says.

Why is that a problem? After all, the community-based open source development model has proved itself to be more than capable of coming up with innovative and very useful pieces of software.
Revenue limits

The answer is that without adequate funding, open source businesses can't differentiate their products significantly from the open source code their products are based on, Levine maintains. Because of that there's less incentive for potential customers to pay for their products rather than continue using the underlying code for nothing. At the very least it limits the amount that open source businesses can hope to charge – putting a cap on their potential revenues. It's a vicious circle.

"If we look at Red Hat's market, 50 percent of potential customers may use Fedora (the free Linux distribution,) and 50 percent use Red Hat Enterprise Linux (the version which is supported and maintained by Red Hat on a subscription basis.) So a large part of the potential market is carved off – why should people pay the 'Red Hat tax'?" Levine asks.

You could argue that this is actually good for businesses, because the availability of open source software at no cost provides competition to open source companies' offerings based on the same code, ensuring that these offerings are available at a very reasonable price.

But if open source businesses can't monetize their products effectively enough to invest in innovation, then potential corporate clients can't benefit from the fruits of that innovation, and that's not so good for customers.
Uneven playing field

The problem is compounded when you consider that open source companies' products are not just competing with the freely available software on which their products are built. It's often the case that they also have to compete with similar products sold by proprietary software companies. And that particular playing field is often an uneven one, because the low revenues that open source companies can generate from subscriptions mean that they can't match the huge sales and marketing budgets of competitors with proprietary product offerings.

It's an important point because although sales and marketing activities are costly, they’re also effective. If they weren't, companies wouldn't waste money on them.

So it follows that open source companies miss out on sales even when they have a superior offering, because having the best product isn't enough. It's also necessary to convince customers to buy it, through clever marketing and persuasive sales efforts.

The problem, summed up by Tony Wasserman, a professor of software management practice at Carnegie Mellon University, is that when you’re looking to acquire new software, "open source companies won't take you out to play golf."


The result, says Levine, is that open source companies simply can't compete with proprietary vendors on equal terms. "If you look at Red Hat, MySQL, KVM … in every case where there’s a proprietary vendor competing, they have more business traction and much more revenue than their open source counterparts."

As an illustration of the scale of the problem, Red Hat is generally held up as the poster child of open source companies. It offers an operating system and a server virtualization system, yet its total revenues are about a third of specialist virtualization vendor VMware, and about 1/40th of Microsoft’s.
Hybrid future

This is why Levine has concluded that the way for open source companies to make money out of open source software is to abandon the standard open source business model of selling support and maintenance subscriptions, and instead to use open source software as a platform on which to build software as a service (SaaS) offerings.

"I can run a SaaS product by using Fedora as a base, but then building proprietary stuff on top and selling the service. So the monetization goes to the SaaS product, not to an open source product," says Levine. "I think we’ll start to see an increasing number of SaaS offerings that are a hybrid of open source and proprietary software."

[Related: Can LibreOffice successfully compete with Microsoft Office?]

He adds that many SaaS companies – including Salesforce, Digital Ocean and Github (two companies Andreessen Horowitz has invested in) – already use a mix of open source and proprietary software to build their services.

And Levine says that Facebook is the biggest open source software company of them all. "I was shocked when I realized this, and Google probably is the second biggest," he says.

Facebook has developed and uses open source software for the infrastructure on which its social network is built, and adds its own proprietary software on top to produce a service it can monetize. Google also generates a large volume of open source infrastructure code, although its search and advertising software is proprietary, he adds.

While the existence of free-to-download software undoubtedly makes it harder for open source businesses to monetize the same software by adding support, maintenance and so on, it's also the case that these low-cost alternatives must make life more difficult than otherwise for proprietary vendors trying to sell their products into the same market.

That's because these low-cost alternatives necessarily make the market for proprietary software smaller even if proprietary companies have higher revenues that they can use to innovate, differentiate their products, and market them.

This could help explain why some proprietary software companies are moving their products to the cloud, or at least creating SaaS alternatives. A mature product like Microsoft's Office suite can largely be functionally replicated by an open source alternative like LibreOffice, but Microsoft's cloud-based Office 365 product takes the base Office functionality and adds extra services such as file storage, Active Directory integration and mobile apps on top.

That's much harder for anyone to replicate, open source or not. And it suggests that in the future it will be all software companies, not just open source shops that move to the cloud to offer their software as a service.
Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, 22 June 2015

Why are there still so many website vulnerabilities?

The cracks in the armor of most enterprise websites are many including recurring holes in OpenSSL, PHP, and WordPress and are largely due to a combination of extensive customizations paired with a shortage of testing and fixing of vulnerabilities when compared with that of long-standing commercial OS software.

CSO Magazine traverses the treacherous terrain of the massive security craters present in today’s websites. Find out what it takes to fix these holes from the start and throughout the development life cycle.
So many Website security punctures and protrusions

“The primary cause for constant and recurring website (and web application) vulnerabilities is the heavily-modified to fully custom-developed nature of these technologies,” says David J. Venable, CISSP, director, Masergy Communications & former intelligence collector, the NSA. The result is largely untested sites and applications that do not undergo the same rigorous and thorough testing that most commercial software packages such as operating systems and server packages do.
Lost in the clouds: Your private data has been indexed by Google

In fact, more vulnerabilities appear in websites and web applications than just about anywhere else in the enterprise. These security holes crop up in .PHP sites, third-party and homegrown software, and WordPress code and installations as well as in OpenSSL, Single Sign-On, and SQL and LDAP implementations and technologies.

PHP sites that use third-party software present inherent vulnerabilities due to the fact that third-party application development is out of the hands of the afflicted enterprise. “You can design your site so that all of your home-baked code is perfectly secure, but then if you rely on third-party software for anything, you inherit any vulnerability that might exist in it,” says Joe Sremack, director, Berkeley Research Group.
ADVERTISING

WordPress is a growing problem as sites that represent small to midsize enterprises increasingly incorporate it along with its countless plug-ins that require constant updating. “Companies want the WordPress functionality but unfortunately the risk also comes with it,” says Sremack.

OpenSSL is continuously running into trouble. As people innovate improvements to the technology, those innovations create new vulnerabilities that attackers discover and exploit. Attackers continue to exploit OpenSSL vulnerabilities new and old as part of large breaches a few times a year. Many seemingly new holes were actually old ones that had not yet been uncovered, says Sremack.
"Enterprises must adhere to security best practices such as those from the Open Web Application Security Project (OWASP) from the very start of the development process."

David J. Venable, CISSP, Director, Masergy Communications, & former intelligence collector, the NSA

Even when a coder produces an otherwise secure website, they are largely developing based on the vulnerabilities they are aware of, not the ones that no one has yet confirmed. There are always new vulnerabilities that appear for the first time in the wild.

Injection vulnerabilities are still common and attackers have adjusted how they approach these with the growing popularity of single sign-on. “Single sign-on is very popular at hotels where people check their accounts and the points they earn. New LDAP injection techniques attack vulnerabilities and pass parameters into the code to take over their web sessions,” explains Sremack.

Another website attack vector is the local and remote file inclusions. “A website’s code can call files either on a local server or on a remote public server. Using injection techniques, attackers can cause the site to display information from a password file or a list of usernames on the web server or to execute code that they want to run,” says Sremack. So the code calls that reach out from the website are also a way in for the attacker.
Fixing Website security holes

“Enterprises must adhere to security best practices such as those from the Open Web Application Security Project (OWASP) from the very start of the development process,” says Venable. All testing including web application assessments, pen tests, and static analysis should occur pre-production, after any code changes, and on at least an annual basis, according to Venable. Surround websites and web applications with WAFs and IDS and install a 24/7 monitoring team to identify and remediate attacks in real-time.

“During development, engage with the security team to perform regular tests of affected code and functionality,” says Sremack. If the enterprise is updating a current website, use the security team to test and ensure added capabilities have not added vulnerabilities. Teams inside development should also run scans and tests to isolate vulnerabilities and fix them.

“Rather than design around security, test using the same tools such as Grabber, W3AF, and Zed Attack Proxy that attackers use to break into your website,” says Sremack. Anyone, even with little knowledge of security or security tools can use these applications and gain insights into website vulnerabilities based on the outcomes of the tests, though the enterprise will need to dedicate a staff to this over time.

“Developers should specifically look at how they create and maintain web sessions, specifically checking any inputs that the sessions pass through the website, whether through URLs or input fields,” says Sremack, “then monitor any third-party code for vulnerabilities and watch for exploit announcements from the vendor.”
Final thoughts

The larger the site, the greater its functionality and visibility, and the more it uses third-party software, the more that the process of reducing inherent vulnerabilities in the site will be costly.

The enterprise must monitor and update the site several times a day to keep up with every new attack that cyber mercenaries will level against them using every new vulnerability they find, says Sremack. This process has to include change management, testing, and proper implementation as well as a new specialized security team and a designated testing site.

The more feature rich the site, the more it better be worth to the company in order to make it worth securing. “But there are a lot of open source freeware tools that any programmer can run that will help the developers to stay on top of new vulnerabilities and threats, even for homegrown code,” says Sremack. So all is not lost.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, 18 June 2015

How green is Amazon’s cloud?

Report gives Amazon a ‘D’ for energy efficiency; Google gets a ‘B’

Amazon Web Services has been under fire in recent weeks from a group of activist customers who are calling for the company to be more transparent in its usage of renewable energy.

In response, rather than divulge additional details about the source of power for its massive cloud infrastructure, the company has argued that using the cloud is much more energy efficient than customers powering their own data center operations.

But the whole discussion has raised the question: How green is the cloud?
In early June a pact of 19 AWS customers – including Hootsuite, Change.org and Tumblr - wrote Amazon Senior Vice President Andy Jassy requesting increased transparency in the company’s efforts to use clean energy.

The letter was in response to a report from environmental activist group Greenpeace, which singled out Amazon Web Services, saying “no company could do more” to help tech companies be more energy friendly than AWS. The company’s cloud platform hosts so many popular websites that any steps it takes to increase efficiency would benefit many other companies.

“Amazon Web Services is holding many of our favorite sites hostage to dirty energy,” the report notes. Specifically, it says AWS’s US East region, located in Virginia, houses 60% of the company’s servers and uses a mix of about one-third coal, one-third nuclear, one-fifth gas and only 2% renewable energy.

In response, the next week AWS announced plans to build an 80 megawatt solar farm in Virginia. Company officials are on the defensive again this week, releasing figures saying that overall, its cloud platform runs on 25% renewable energy, with a goal of using 40% renewable energy by 2016, and eventually 100% green power.

Greenpeace says that’s not enough. “It remains impossible for its customers or the public to benchmark any progress toward that goal, since the company refuses to disclose any of its energy data,” the report states.
amazon aws going green renewable

AWS officials argue that the simple fact that so many customers use the company’s cloud is saving energy. AWS is more efficient at running data centers compared to its customers, even if it uses fossil fuels to power those data centers, AWS Distinguished Engineer James Hamilton contends in a blog post.

AWS says customers use 77% fewer servers and 84% less power by running their workloads in its cloud compared to their own data centers. That creates an 88% reduction in carbon emissions for customers who use Amazon’s cloud, AWS Evangelist Jeff Barr’s blog post says.

Furthermore, the company’s US-West location in Oregon, its EU region in Frankfurt and its GovCloud region in the U.S. are what the company calls “carbon-neutral” – which refers to the practice of offsetting the amount of carbon the site is responsible for with the purchase of a corresponding number of carbon credits that fund green projects. And AWS is building a 150 megawatt wind farm in Indiana.

AWS isn’t alone in having work to do to become more environmentally-friendly. Competitor Google received higher grades from Greenpeace – the report gives Google a grade of B, while AWS got a D. Google has also committed to using 100% renewable energy too, although with no specific timeline. Google says about 35% of its operations are currently powered from green sources.

Microsoft, meanwhile stands somewhere in the middle between AWS and Google, receiving a C grade from Greenpeace. The company has committed to being 100% carbon-neutral.

“We know that 100% renewable energy is an ambitious goal that won’t be possible overnight,” the group of Amazon customers wrote. “While you pursue this journey, we would suggest some steps that will give us full confidence in AWS’ commitment to renewable energy.” Now there is more pressure than ever for the cloud to be green.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, 9 June 2015

Apple shows iOS 9's major upgrades, from multitasking to picture-in-picture

Apple shows iOS 9's major upgrades, from multitasking to picture-in-picture

Side-by-side apps, video overlays, and much more are coming to iPads when Apple's mobile OS releases this fall.

Major changes are coming to our iPads, from the way we select text, to the way we interact with our favorite apps and play videos.

Speaking at Apple's Worldwide Developer Conference on Monday, Senior Vice President Craig Federighi showcased an updated version of iOS 9 that included a few new features designed specifically with tablet users in mind.

Let’s start with QuickType, an enhancement to the iPad’s onscreen keyboard that includes new shortcuts and turns into a trackpad when you place two fingers on it. The trackpad can be used to select text, move objects around, and generally combine the convenience of touch controls and the precision of a mouse.

iPads will also get access to true, onscreen multitasking, which allows two apps to run side-by-side on the screen at the same time. The new feature, which Apple calls Split View, opens two resizable virtual windows on the screen. Users will be able to control each app independently, transferring information from one to the other using simple gestures, and quickly change the program running inside each panel using a brand-new app switcher. Note: While multitasking will work on most recent iPad models, Split View will be available only on the iPad Air 2.

Finally, a new picture-in-picture feature allows users to play a video from one app while using a different app. The video appears in a tiny window can be moved around, or even pushed temporarily off-screen to allow you to focus on your work while your favorite movie or game keeps playing along. The window also includes a set of simple controls that let you pause the video or close and dismiss it without leaving the current app.

The new iPad features will arrive with iOS 9 this fall, with a public beta program open to all starting in July.




Wednesday, 3 June 2015

Exam 70-411 Administering Windows Server 2012

Exam 70-411 Administering Windows Server 2012
Published: 17 September 2012
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows Server 2012 R2
Credit towards certification: MCP, MCSA, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

As of January 2014, this exam includes content covering Windows Server 2012 R2.

Deploy, manage and maintain servers (15–20%)

Deploy and manage server images
Install the Windows Deployment Services (WDS) role; configure and manage boot, install and discover images; update images with patches, hotfixes and drivers; install features for offline images; configure driver groups and packages

Implement patch management
Install and configure the Windows Server Update Services (WSUS) role, configure group policies for updates, configure client-side targeting, configure WSUS synchronisation, configure WSUS groups, manage patch management in mixed environments

Monitor servers
Configure Data Collector Sets (DCS), configure alerts, monitor real-time performance, monitor virtual machines (VMs), monitor events, configure event subscriptions, configure network monitoring, schedule performance monitoring

Preparation resources
Windows Deployment Services overview
Windows Server Update Services overview
Update management in Windows Server 2012: Revealing cluster-aware updating and the new generation of WSUS

Configure File and Print Services (15–20%)

Configure Distributed File System (DFS)
Install and configure DFS namespaces, configure DFS Replication Targets, configure Replication Scheduling, configure Remote Differential Compression settings, configure staging, configure fault tolerance, clone a DFS database, recover DFS databases, optimise DFS replication

Configure File Server Resource Manager (FSRM)
Install the FSRM role service, configure quotas, configure file screens, configure reports, configure file management tasks

Configure file and disk encryption
Configure BitLocker encryption; configure the Network Unlock feature; configure BitLocker policies; configure the EFS recovery agent; manage EFS and BitLocker certificates, including backup and restore

Configure advanced audit policies
Implement auditing using Group Policy and AuditPol.exe, create expression-based audit policies, create removable device audit policies

Preparation resources
DFS namespaces and DFS replication overview
DFS replication improvements in Windows Server 2012
File Server Resource Manager overview

Configure network services and access (15–20%)

Configure DNS zones
Configure primary and secondary zones, configure stub zones, configure conditional forwards, configure zone and conditional forward storage in Active Directory, configure zone delegation, configure zone transfer settings, configure notify settings

Configure DNS records
Create and configure DNS Resource Records (RR), including A, AAAA, PTR, SOA, NS, SRV, CNAME and MX records; configure zone scavenging; configure record options, including Time To Live (TTL) and weight; configure round robin; configure secure dynamic updates

Configure virtual private networks (VPN) and routing
Install and configure the Remote Access role, implement Network Address Translation (NAT), configure VPN settings, configure remote dial-in settings for users, configure routing, configure Web Application proxy in passthrough mode

Configure DirectAccess
Implement server requirements, implement client configuration, configure DNS for Direct Access, configure certificates for Direct Access

Preparation resources
How the Domain Name System (DNS) works
DNS overview
DNS server operations guide

Configure a Network Policy Server (NPS) infrastructure (10–15%)

Configure Network Policy Server
Configure a RADIUS server, including RADIUS proxy; configure RADIUS clients; configure NPS templates; configure RADIUS accounting; configure certificates

Configure NPS policies
Configure connection request policies, configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing), import and export NPS policies

Configure Network Access Protection (NAP)
Configure System Health Validators (SHVs), configure health policies, configure NAP enforcement using DHCP and VPN, configure isolation and remediation of non-compliant computers using DHCP and VPN, configure NAP client settings

Preparation resources
Network Policy and Access Services overview
Network Policy Server operations guide
Policies in NPS

Configure and manage Active Directory (10–15%)

Configure service authentication
Create and configure Service Accounts, create and configure Group Managed Service Accounts, configure Kerberos delegation, manage Service Principal Names (SPNs), configure virtual accounts

Configure domain controllers
Transfer and seize operations master roles, install and configure a read-only domain controller (RODC), configure domain controller cloning

Maintain Active Directory
Back up Active Directory and SYSVOL, manage Active Directory offline, optimise an Active Directory database, clean up metadata, configure Active Directory snapshots, perform object- and container-level recovery, perform Active Directory restore, configure and restore objects by using the Active
Directory Recycle Bin

Configure account policies
Configure domain and local user password policy settings, configure and apply Password Settings Objects (PSOs), delegate password settings management, configure account lockout policy settings, configure Kerberos policy settings

Preparation resources
Group managed service accounts overview
Step-by-step: Safely cloning an Active Directory domain controller with Windows Server 2012
Administering Active Directory backup and recovery

Configure and manage Group Policy (15–20%)

Configure Group Policy processing
Configure processing order and precedence, configure blocking of inheritance, configure enforced policies, configure security filtering and Windows Management Instrumentation (WMI) filtering, configure loopback processing, configure and manage slow-link processing and Group Policy caching, configure client-side extension (CSE) behaviour, force Group Policy Update

Configure Group Policy settings
Configure settings, including software installation, folder redirection, scripts, and administrative template settings; import security templates; import custom administrative template file; configure property filters for administrative templates

Manage Group Policy objects (GPOs)
Back up, import, copy and restore GPOs; create and configure Migration Table; reset default GPOs; delegate Group Policy management

Configure Group Policy preferences (GPP)
Configure GPP settings, including printers, network drive mappings, power options, custom registry settings, Control Panel settings, Internet Explorer settings, file and folder deployment and shortcut deployment; configure item-level targeting

Preparation resources
Group Policy in Windows Server 2012: Overview
Work with WMI filters
Back up, restore, import and copy Group Policy objects



QUESTION 1
You work as the network administrator for a Microsoft Windows Server 2008 domain named
Certkingdom.com. Certkingdom.com has a Development division which utilizes two organizational units
(OU) named DevelopUsers and DevelopComputers for user and computer account storage. The
Development division user and computer accounts are configured as members of global security
groups named DevUsers and DevComputers.

During the course of the week you configure two Password Settings objects for Development
division members named CredSettings01 and CredSettings02. You additionally configure a
minimum password length of 10 for CredSettings01 and 9 for CredSettings02. CertKingdom.com
wants you to determine the required password length minimum for Development division users.
What minimum password length should be configured for CredSettings01 applied to DevUsers?

A. You should configure the minimum password length to 9.
B. You should configure the minimum password length to 10.
C. You should configure the minimum password length to 5.
D. You should configure the minimum password length to 4.

Answer: B

Explanation:


QUESTION 2
You administrate an Active Directory domain named CertKingdom.com. The domain has a Microsoft
Windows Server 2012 R2 server named CertKingdom-SR01 that hosts the File Server Resource
Manager role service.
You are configuring quota threshold and want to receive an email alert when 80% of the quota has
been reached.
Where would you enable the email alert?

A. You should consider creating a Data Collector Set (DCS).
B. You should use Windows Resource Monitor.
C. You should use the File Server Resource Manager.
D. You should use Disk Quota Tools.
E. You should use Performance Logs and Alerts.

Answer: C

Explanation:
To make use of email alerts, you need to configure the SMTP Server address details in the File
Server Resource Manager options.


QUESTION 3
You work as a network administrator at CertKingdom.com. CertKingdom.com has an Active Directory
Domain Services (AD DS) domain name CertKingdom.com. All servers in the CertKingdom.com domain
have Microsoft Windows Server 2012 R2 installed.
The computer accounts for all file servers are located in an organizational unit (OU) named
DataOU.
You are required to track user access to shared folders on the file servers.
Which of the following actions should you consider?

A. You should configure auditing of Account Logon events for the DataOU.
B. You should configure auditing of Object Access events for the DataOU.
C. You should configure auditing of Global Object Access Auditing events for the DataOU.
D. You should configure auditing of Directory Service Access events for the DataOU.
E. You should configure auditing of Privilege Use events for the DataOU.

Answer: B

Explanation:


QUESTION 4
You are the administrator of an Active Directory Domain Services (AD DS) domain named
CertKingdom.com. The domain has a Microsoft Windows Server 2012 R2 server named CertKingdomSR05
that hosts the File and Storage Services server role.
CertKingdom-SR05 hosts a shared folder named userData. You want to receive an email alert when
a multimedia file is saved to the userData folder.
Which tool should you use?

A. You should use File Management Tasks in File Server Resource Manager.
B. You should use File Screen Management in File Server Resource Manager.
C. You should use Quota Management in File Server Resource Manager.
D. You should use File Management Tasks in File Server Resource Manager.
E. You should use Storage Reports in File Server Resource Manager.

Answer: B

Explanation:


QUESTION 5
You work as a Network Administrator at CertKingdom.com. CertKingdom.com has an Active Directory
Domain Services (AD DS) domain named CertKingdom.com. All servers in the CertKingdom.com domain
have Microsoft Windows Server 2012 R2 installed and all client computers have Windows 8 Pro
installed.
BitLocker Drive Encryption (Bitlocker) is enabled on all client computers. CertKingdom.com wants you
to implement BitLocker Network Unlock.
Which of the following servers would you required to implement BitLocker Network Unlock?

A. A Domain Controller.
B. A DHCP server.
C. A DNS Server.
D. A Windows Deployment Server.
E. An Application Server.
F. A Web Server.
G. A File and Print Server.
H. A Windows Server Update Services server.

Answer: D

Explanation:
BitLocker Network Unlock requires a Windows Server 2012 R2 server running the Windows
Deployment Services (WDS) role in the environment.