We may earn an affiliate commission when you visit our partners.
Robert McMillen

This course will teach you how to create a desired state configuration for JEA and JIT to keep your Active Directory network safe from internal and external administrative threats.

Read more

This course will teach you how to create a desired state configuration for JEA and JIT to keep your Active Directory network safe from internal and external administrative threats.

The modern Windows network has issues with locking down security. In this course, Implement JIT and JEA Administration in Windows Server 2019, you’ll learn how to create an environment to protect administrative access to only authorized users and only when they need it and will learn about two different ways to accomplish this secure goal. First, you’ll learn about Just Enough Administration. This includes creating configuration and capability files to configure the JEA environment. Next, you’ll explore Just In Time administration. This type of security involves separating administrative access using bastion forests and domains. Finally, you’ll configure a bastion forest and create the necessary links and trusts to work between this forest and your production forest. You’ll learn this by utilizing shadow principles using Microsoft Identity Manager. By the end of this course, you'll be able to secure your on-premise or cloud environment more completely with JEA and JIT.

Enroll now

What's inside

Syllabus

Course Overview
Preparing Endpoints for Just Enough Administration
Deploying Just Enough Administration for Secure Management
Configuring the Bastion Forest Using Microsoft Identity Manager (MIM) Specifications
Read more
Installing and Configuring Microsoft Identity Manager Portal and Policies
Utilizing Microsoft Identity Manager Using the Web Portal and PowerShell

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Helps learners develop skills that are usable in multiple ways by multiple audiences
Explores foundational- to intermediate-level concepts of administrative access and control
Strengthens an existing foundation for working with Windows environments
Teaches learners about two methods for controlling and protecting administrative access
Includes hands-on labs, which allows for practical application of concepts
Includes readings, discussion, and video as part of the learning materials

Save this course

Save Implement JIT and JEA Administration in Windows Server 2019 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Implement JIT and JEA Administration in Windows Server 2019 with these activities:
Organize and Review Resources
Prior to starting the course, collect study materials like slide decks, notes, textbooks, and any supplemental material from the course webpage.
Show steps
  • Create folders for the class on your computer
  • Transfer prepared materials into appropriate folders
  • Annotate notes and slides with questions for later
Review Computer Networks Concepts
Review networking concepts, protocols, and architectures covered in previous courses. This will help deepen understanding of the content.
Browse courses on Computer Networks
Show steps
  • Review class notes or online resources on network architectures
  • Use a whiteboard or pen and paper to draw network diagrams
  • Practice configuring basic network devices (e.g., routers, switches)
Meet with a Study Buddy
Collaborating with a peer can enhance your understanding of JIT and JEA concepts and provide support throughout the course.
Show steps
  • Find a classmate or colleague who is also taking the course.
  • Schedule regular study sessions to discuss course material, ask questions, and share insights.
  • Work together on practice problems or projects related to JIT and JEA.
16 other activities
Expand to see all activities and additional details
Show all 19 activities
Review Powershell cmdlets
Ensure your PowerShell skills are sharp to effectively implement JEA and JIT.
Browse courses on Powershell
Show steps
  • Review PowerShell documentation on cmdlets
  • Practice using common cmdlets in a test environment
Follow a tutorial on JIT administration
Enhance your understanding of JIT by following a guided tutorial.
Show steps
  • Identify a reputable tutorial on JIT administration
  • Follow the tutorial step-by-step in a test environment
Study Powershell Cmdlets
Drills on Powershell will strengthen your understanding of the tool in the context of JIT and JEA administration.
Show steps
  • Review basic cmdlets in Windows and Microsoft Active Directory environments.
  • Test drive different use cases for JIT and JEA management.
  • Troubleshoot any issues you encounter.
Practice JIT and JEA in a Lab Environment
Gain hands-on experience and confidence in implementing JIT and JEA security measures by practicing in a dedicated lab environment.
Show steps
  • Set up a lab environment that includes Windows Server and Active Directory.
  • Configure JIT and JEA policies in your lab environment.
  • Test your JIT and JEA policies to make sure that they are working as expected.
Compile a list of JEA resources
Expand your JEA knowledge by compiling a list of resources.
Show steps
  • Search for JEA resources (e.g., articles, documentation, tutorials)
  • Organize the resources into a central location (e.g., a digital notebook or shared document)
Explore Online Tutorials on JEA and JIT
Find tutorials and videos that cover Just Enough Administration (JEA) and Just In Time (JIT) concepts to supplement classroom learning.
Show steps
  • Search for online tutorials on JEA and JIT
  • Follow the tutorials and practice implementing JEA/JIT in a lab environment
Practice creating JEA endpoints
Enhance your JEA skills by practicing creating endpoints.
Show steps
  • Review documentation on creating JEA endpoints
  • Create JEA endpoints in a test environment
  • Test the JEA endpoints to ensure they are working as expected
Follow a tutorial on Bastion Forest
This tutorial will familiarize you with the key concepts and steps involved in setting up a bastion forest in your own environment.
Show steps
  • Find a tutorial that covers the topic of bastion forests in detail.
  • Follow the steps in the tutorial to set up a bastion forest in your own environment.
  • Test your bastion forest to make sure that it is working as expected.
Run Command-Line Simulations and Scenarios
Conduct regular command-line simulations by creating scripts and scenarios that involve JEA/JIT. Practice troubleshooting and resolving issues to strengthen your practical skills.
Browse courses on Command-Line Interface
Show steps
  • Develop command-line scripts to automate JEA/JIT tasks, such as user permission configuration
  • Create scenarios that mimic real-world administrative tasks
  • Troubleshoot and debug scripts to resolve any issues
Create a JEA configuration script
Apply your understanding of JEA by creating a configuration script.
Show steps
  • Design a configuration script based on your system requirements
  • Write the JEA configuration script
  • Test the configuration script in a test environment
Design Just Enough Administration Policies
This exercise will let you apply the principles you've learned about JEA to create policies that fit your organization's specific security needs.
Show steps
  • Identify the roles and permissions that are needed for each type of administrative task.
  • Create JEA configuration files that define these roles and permissions.
  • Test your JEA policies to make sure that they are working as expected.
Attend Workshops on JEA or JIT Administration
Attend workshops to gain hands-on experience with JEA/JIT. This will provide practical knowledge and enhance your understanding.
Show steps
  • Research upcoming workshops on JEA or JIT administration
  • Register for a workshop that aligns with your skill level and interests
Create a JIT and JEA Resource Collection
Organize and store valuable resources related to JIT and JEA for future reference and deeper exploration.
Show steps
  • Gather articles, tutorials, documentation, and other resources on JIT and JEA.
  • Organize the resources into a structured collection, such as a digital folder or shared online space.
  • Annotate the resources with notes or summaries to highlight key points and your own insights.
Contribute to an open-source JEA project
Enhance your JEA skills and contribute to the community by working on an open-source project.
Show steps
  • Identify an open-source JEA project to contribute to
  • Review the project's documentation and codebase
  • Identify an area to contribute to and make a pull request
Participate in Security Challenges or Hackathons
Engage in online security challenges or hackathons that involve JEA/JIT to test your skills, learn from others, and enhance your practical knowledge.
Show steps
  • Find and register for security challenges or hackathons
  • Form a team or participate individually
  • Apply JEA/JIT concepts to solve security challenges
Contribute to Open-Source Projects Related to JEA or JIT
Dive deeper by contributing to open-source projects focused on JEA/JIT. This will provide an opportunity to enhance your technical skills and make a valuable contribution to the community.
Show steps
  • Identify open-source projects related to JEA or JIT
  • Review the project documentation and identify areas where you can contribute

Career center

Learners who complete Implement JIT and JEA Administration in Windows Server 2019 will develop knowledge and skills that may be useful to these careers:
IT Security Specialist
IT Security Specialists plan, implement, and manage information security measures to protect an organization's computer networks and systems. Gaining an understanding of Just Enough Administration (JEA) and Just In Time (JIT) Administration can provide IT Security Specialists with the practical skills needed to secure networks and systems more effectively. JEA and JIT can be useful for controlling and monitoring user access to administrative tasks, reducing the risk of unauthorized access and security breaches.
Network Administrator
Network Administrators are responsible for managing and maintaining computer networks, including security and performance. Implementing JEA and JIT Administration can be a valuable asset to Network Administrators, as these tools can help to improve network security and reduce the risk of cyber attacks. JEA can be used to restrict user access to specific network resources, while JIT can be used to grant temporary access to resources when needed.
Security Administrator
Security Administrators plan, implement, and manage security measures to protect an organization's computer networks and systems. JEA and JIT Administration are important tools for Security Administrators to have in their toolkit, as they can be used to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate security tasks.
Cybersecurity Analyst
Cybersecurity Analysts protect computer networks and systems from cyber attacks. They implement and manage security measures to prevent unauthorized access, data breaches, and other malicious activity. JEA and JIT Administration can be useful for Cybersecurity Analysts, as these tools can help to improve security and reduce the risk of cyber attacks. JEA can be used to restrict user access to specific resources, while JIT can be used to grant temporary access when needed.
Cloud Security Architect
Cloud Security Architects design and implement security measures for cloud computing environments. They work to protect cloud-based applications, data, and infrastructure from unauthorized access, data breaches, and other malicious activity. JEA and JIT Administration can be useful for Cloud Security Architects, as these tools can help to improve security and reduce the risk of cyber attacks in the cloud. JEA can be used to restrict user access to specific cloud resources, while JIT can be used to grant temporary access when needed.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for developing and implementing an organization's information security strategy. They work to protect the organization's information assets from unauthorized access, disclosure, use, modification, disruption, or destruction. JEA and JIT Administration can be useful for CISOs, as these tools can help to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate security tasks.
IT Manager
IT Managers plan, direct, and coordinate IT activities within an organization. They are responsible for ensuring that IT systems and services are running smoothly and securely. JEA and JIT Administration can be useful for IT Managers, as these tools can help to improve IT security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate IT tasks.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information assets. They work to identify and mitigate security risks, and to ensure that the organization's information is protected from unauthorized access, disclosure, use, modification, disruption, or destruction. JEA and JIT Administration can be useful for Information Security Analysts, as these tools can help to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate security tasks.
Risk Management Analyst
Risk Management Analysts identify, assess, and mitigate risks to an organization. They work to develop and implement risk management plans, and to ensure that the organization is prepared for potential risks. JEA and JIT Administration can be useful for Risk Management Analysts, as these tools can help to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate risk management tasks.
IT Auditor
IT Auditors evaluate an organization's IT systems and processes to ensure that they are operating in accordance with applicable laws and regulations. They also work to identify and mitigate security risks. JEA and JIT Administration can be useful for IT Auditors, as these tools can help to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate audit tasks.
Privacy Analyst
Privacy Analysts work to ensure that an organization is in compliance with applicable privacy laws and regulations. They may also be responsible for developing and implementing privacy programs. JEA and JIT Administration can be useful for Privacy Analysts, as these tools can help to improve security and reduce the risk of privacy breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate privacy tasks.
Security Consultant
Security Consultants provide security advice and services to organizations. They work to help organizations improve their security posture and reduce the risk of data breaches. JEA and JIT Administration can be useful for Security Consultants, as these tools can help to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate security tasks.
Compliance Analyst
Compliance Analysts work to ensure that an organization is in compliance with applicable laws and regulations. They may also be responsible for developing and implementing compliance programs. JEA and JIT Administration can be useful for Compliance Analysts, as these tools can help to improve security and reduce the risk of non-compliance. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate compliance tasks.
Database Administrator
Database Administrators are responsible for managing and maintaining databases. They work to ensure that databases are running smoothly and securely, and that data is protected from unauthorized access, disclosure, use, modification, disruption, or destruction. JEA and JIT Administration can be useful for Database Administrators, as these tools can help to improve database security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate database tasks.
Security Engineer
Security Engineers design, implement, and manage security measures to protect an organization's computer networks and systems. Gaining an understanding of Just Enough Administration (JEA) and Just In Time (JIT) Administration can provide Security Engineers with the practical skills needed to secure networks and systems more effectively. JEA and JIT can be useful for controlling and monitoring user access to administrative tasks, reducing the risk of unauthorized access and security breaches.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Implement JIT and JEA Administration in Windows Server 2019.
Provides a comprehensive overview of Just-in-Time Administration in Active Directory. It covers the benefits of JIT, as well as the challenges of implementing it. The book also includes detailed instructions on how to configure JIT environments.
Provides a comprehensive overview of network security, covering topics such as network security threats, security protocols, and security tools.
Provides a comprehensive overview of Windows Server 2019 administration, covering topics such as installing and configuring Windows Server, managing users and groups, and securing Windows Server environments.
Provides a comprehensive overview of Active Directory, covering topics such as planning and deploying Active Directory environments, managing user and group accounts, and implementing security best practices.
Provides a comprehensive overview of Active Directory security and administration, covering topics such as planning and securing Active Directory environments, managing user and group accounts, and implementing security best practices.
Provides a collection of recipes for managing Active Directory environments, covering topics such as planning and deploying Active Directory environments, managing user and group accounts, and implementing security best practices.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Implement JIT and JEA Administration in Windows Server 2019.
Implementing Privileged Access Workstations (PAWs) and...
Most relevant
Windows 11 Desktop Administration: Installation and...
Most relevant
Windows Endpoint Administration: Manage Identity and...
Most relevant
Install and Configure Active Directory Domain Services in...
Most relevant
Microsoft 365 Administration: Deploying and Managing an...
Most relevant
Windows Server 2022: Manage Workloads in Hybrid...
Most relevant
Windows Server 2022: Deploy and Manage Active Directory...
Most relevant
Securing SSRS Reporting Solutions
Most relevant
Implementing Windows Server 2019 DNS
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser