Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Microsoft 70-246: Monitoring and Operating a Private Cloud with System
Chapter1
Course Overview (1:54)
Instructor Introduction (0:59)
Chapter 2
System Center 2012 Overview Part1 (6:32)
System Center 2012 Overview Part2 (2:41)
Virtual Machine Manager Part1 (0:23)
Virtual Machine Manager Part2 (5:49)
Virtual Machine Manager Part3 (5:06)
Virtual Machine Manager Part4 (6:28)
Virtual Machine Manager Part5 (2:30)
Operations Manager Part1 (5:54)
Operations Manager Part2 (5:24)
Operations Manager Part3 (3:44)
Orchestrator Part1 (4:38)
Orchestrator Part2 (5:39)
Orchestrator Part3 (7:01)
Server Manager Part1 (5:27)
Server Manager Part2 (6:17)
Configuration Manager (0:44)
Data Protection Manager Part1 (0:52)
Data Protection Manager Part2 (5:37)
Data Protection Manager Part3 (4:02)
Data Protection Manager Part4 (4:08)
Hyper V (1:34)
System Center 2012 Review (1:45)
Chapter Review (1:06)
Chapter 3
Configure Data Center Process Automation (1:27)
Runbooks (1:13)
Implementing Workflows (0:27)
Creating Groups for Incident Templates (7:50)
Operations Manager Incident Template Creation Part1 (5:31)
Operations Manager Incident Template Creation Part2 (2:12)
Connection Building for Operations Manager Alert (4:01)
Incident Validation Part1 (4:54)
Incident Validation Part2 (3:14)
Runbook Characteristics (2:48)
Configuring Network Resources for Runbooks Deployment (5:59)
Creating the Business Unit (7:51)
Configuring Business Unit Security Part1 (5:10)
Configuring Business Unit Security Part2 (5:57)
Configuring Business Unit Security Part3 (5:51)
Configuring Business Unit Security Part4 (5:51)
Configuring Business Unit Security Part5 (3:43)
Incident Testing in Orchestrator (6:10)
Configuring Orchestrator Connections (5:30)
Adding Activities to Runbooks Part1 (7:06)
Adding Activities to Runbooks Part2 (5:52)
Adding Activities to Runbooks Part3 (6:20)
Adding Activities to Runbooks Part4 (5:17)
Creating a Remediation Runbook Part1 (6:55)
Creating a Remediation Runbook Part2 (6:25)
Creating a Remediation Runbook Part3 (6:38)
Creating a Remediation Runbook Part4 (3:43)
Creating a Remediation Runbook Part5 (7:11)
Creating a Remediation Runbook Part6 (3:14)
Implementing Service Offerings (0:32)
Creating a Business Unit Group (5:07)
Creating the Queue Object (5:18)
Create Business Unit User Roll Part1 (5:08)
Create Business Unit User Roll Part2 (7:34)
Creating Notifications Channel (2:51)
Configuring Notification Subscriptions (6:56)
Publishing Incident Service Offering Part1 (4:01)
Publishing Incident Service Offering Part2 (7:26)
Creating a Service Offering (6:30)
Creating and Submitting an Incident Request Part1 (2:01)
Creating and Submitting an Incident Request Part2 (5:11)
Creating and Submitting an Incident Request Part3 (2:41)
Creating a Minor Change Request Part1 (3:26)
Creating a Minor Change Request Part2 (4:56)
Chapter Review (1:19)
Chapter 4
Deploying Resource Monitoring (2:23)
Deploying End to End Monitoring (1:20)
Configuring End to End Monitoring (0:45)
Deploying Operations Manager Core Components Part1 (6:14)
Deploying Operations Manager Core Components Part2 (6:35)
Configuring End to End Monitoring Part1 (6:45)
Configuring End to End Monitoring Part2 (7:02)
Configuring End to End Monitoring Part3 (5:39)
Configuring End to End Monitoring Part4 (5:37)
Configuring End to End Monitoring Part5 (3:57)
Configuring End to End Monitoring Part6 (6:11)
Configuring End to End Monitoring Part7 (3:24)
Configuring End to End Monitoring Part8 (1:44)
Create Monitoring Reports and Dashboards Part1 (4:56)
Create Monitoring Reports and Dashboards Part2 (3:35)
Create Monitoring Reports and Dashboards Part3 (3:55)
Create Monitoring Reports and Dashboards Part4 (4:02)
Chapter Review (0:45)
Chapter 5
Monitor Resources (1:14)
Monitor Network Devices Part1 (1:06)
Monitor Network Devices Part2 (4:01)
Monitor Virtualization Layer (3:40)
Monitor Application Health (2:51)
Monitoring Distributed Applications Part1 (5:15)
Monitoring Distributed Applications Part2 (3:58)
Chapter Review (0:33)
Chapter 6
Configure and Maintain Service Management (1:18)
Implementing Service Level Management (1:02)
Configuring SLA Management (5:41)
Creating Service Level Metrics Part1 (3:19)
Creating Service Level Metrics Part2 (1:24)
Monitor and Review Warnings (1:19)
Manage the Analysis Library Part1 (1:40)
Manage the Analysis Library Part2 (5:34)
Manage the Analysis Library Part3 (6:23)
Manage the Analysis Library Part4 (2:29)
Configuring Performance Point Analytics Part1 (5:44)
Configuring Performance Point Analytics Part2 (5:53)
Configuring Performance Point Analytics Part3 (2:17)
Scorecards and Dashboards Part1 (5:12)
Scorecards and Dashboards Part2 (4:40)
Scorecards and Dashboards Part3 (2:59)
Chapter Review (0:41)
Chapter 7
Manage Configuration and Protection (1:24)
Manage Compliance and Protection (0:24)
Governance Risk Compliance Part1 (4:26)
Governance Risk Compliance Part2 (5:18)
Governance Risk Compliance Part3 (3:28)
Creating Authority Documents, Control Objectives & Activities Part1 (2:30)
Creating Authority Documents, Control Objectives & Activities Part2 (6:10)
Creating Authority Documents, Control Objectives & Activities Part3 (5:12)
Creating Authority Documents, Control Objectives & Activities Part4 (5:37)
Creating Authority Documents, Control Objectives & Activities Part5 (2:57)
Assigning Baselines Part1 (4:39)
Assigning Baselines Part2 (3:39)
Assigning Baselines Part3 (5:56)
Implementing Backup and Recovery (1:17)
Deploying the DPM Agent (4:44)
Create a Protection Group (6:47)
Configure the Manual Recovery of Key Data Part1 (3:58)
Configure the Manual Recovery of Key Data Part2 (6:33)
Configure the Manual Recovery of Key Data Part3 (1:17)
Configure Self-Service Recovery of Key Data Part1 (6:54)
Configure Self-Service Recovery of Key Data Part2 (5:36)
Configuring Automatic Protection of Key Data Part1 (5:44)
Configuring Automatic Protection of Key Data Part2 (6:31)
Configuring Automatic Protection of Key Data Part3 (4:45)
Configuring Automatic Protection of Key Data Part4 (3:21)
Configuring Automatic Protection of Key Data Part5 (4:17)
Manage Updates (0:31)
Monitoring Protection Status Part1 (5:44)
Monitoring Protection Status Part2 (2:08)
Monitoring Protection Status Part3 (2:03)
Updating Distributed Applications with DPM (2:33)
Chapter Review (1:04)
Course Review (4:02)
Runbook Characteristics
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock