We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Implement JIT and JEA Administration in Windows Server 2019

Robert McMillen

This course will teach you how to create a desired state configuration for JEA and JIT to keep your Active Directory network safe from internal and external administrative threats.

Read more

This course will teach you how to create a desired state configuration for JEA and JIT to keep your Active Directory network safe from internal and external administrative threats.

The modern Windows network has issues with locking down security. In this course, Implement JIT and JEA Administration in Windows Server 2019, you’ll learn how to create an environment to protect administrative access to only authorized users and only when they need it and will learn about two different ways to accomplish this secure goal. First, you’ll learn about Just Enough Administration. This includes creating configuration and capability files to configure the JEA environment. Next, you’ll explore Just In Time administration. This type of security involves separating administrative access using bastion forests and domains. Finally, you’ll configure a bastion forest and create the necessary links and trusts to work between this forest and your production forest. You’ll learn this by utilizing shadow principles using Microsoft Identity Manager. By the end of this course, you'll be able to secure your on-premise or cloud environment more completely with JEA and JIT.

Enroll now

What's inside

Syllabus

Course Overview
Preparing Endpoints for Just Enough Administration
Deploying Just Enough Administration for Secure Management
Configuring the Bastion Forest Using Microsoft Identity Manager (MIM) Specifications
Read more
Installing and Configuring Microsoft Identity Manager Portal and Policies
Utilizing Microsoft Identity Manager Using the Web Portal and PowerShell

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Helps learners develop skills that are usable in multiple ways by multiple audiences
Explores foundational- to intermediate-level concepts of administrative access and control
Strengthens an existing foundation for working with Windows environments
Teaches learners about two methods for controlling and protecting administrative access
Includes hands-on labs, which allows for practical application of concepts
Includes readings, discussion, and video as part of the learning materials

Save this course

Save Implement JIT and JEA Administration in Windows Server 2019 to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Implement JIT and JEA Administration in Windows Server 2019. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Implement JIT and JEA Administration in Windows Server 2019 will develop knowledge and skills that may be useful to these careers:
IT Security Specialist
IT Security Specialists plan, implement, and manage information security measures to protect an organization's computer networks and systems. Gaining an understanding of Just Enough Administration (JEA) and Just In Time (JIT) Administration can provide IT Security Specialists with the practical skills needed to secure networks and systems more effectively. JEA and JIT can be useful for controlling and monitoring user access to administrative tasks, reducing the risk of unauthorized access and security breaches.
Network Administrator
Network Administrators are responsible for managing and maintaining computer networks, including security and performance. Implementing JEA and JIT Administration can be a valuable asset to Network Administrators, as these tools can help to improve network security and reduce the risk of cyber attacks. JEA can be used to restrict user access to specific network resources, while JIT can be used to grant temporary access to resources when needed.
Security Administrator
Security Administrators plan, implement, and manage security measures to protect an organization's computer networks and systems. JEA and JIT Administration are important tools for Security Administrators to have in their toolkit, as they can be used to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate security tasks.
Cybersecurity Analyst
Cybersecurity Analysts protect computer networks and systems from cyber attacks. They implement and manage security measures to prevent unauthorized access, data breaches, and other malicious activity. JEA and JIT Administration can be useful for Cybersecurity Analysts, as these tools can help to improve security and reduce the risk of cyber attacks. JEA can be used to restrict user access to specific resources, while JIT can be used to grant temporary access when needed.
Cloud Security Architect
Cloud Security Architects design and implement security measures for cloud computing environments. They work to protect cloud-based applications, data, and infrastructure from unauthorized access, data breaches, and other malicious activity. JEA and JIT Administration can be useful for Cloud Security Architects, as these tools can help to improve security and reduce the risk of cyber attacks in the cloud. JEA can be used to restrict user access to specific cloud resources, while JIT can be used to grant temporary access when needed.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for developing and implementing an organization's information security strategy. They work to protect the organization's information assets from unauthorized access, disclosure, use, modification, disruption, or destruction. JEA and JIT Administration can be useful for CISOs, as these tools can help to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate security tasks.
IT Manager
IT Managers plan, direct, and coordinate IT activities within an organization. They are responsible for ensuring that IT systems and services are running smoothly and securely. JEA and JIT Administration can be useful for IT Managers, as these tools can help to improve IT security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate IT tasks.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information assets. They work to identify and mitigate security risks, and to ensure that the organization's information is protected from unauthorized access, disclosure, use, modification, disruption, or destruction. JEA and JIT Administration can be useful for Information Security Analysts, as these tools can help to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate security tasks.
Risk Management Analyst
Risk Management Analysts identify, assess, and mitigate risks to an organization. They work to develop and implement risk management plans, and to ensure that the organization is prepared for potential risks. JEA and JIT Administration can be useful for Risk Management Analysts, as these tools can help to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate risk management tasks.
IT Auditor
IT Auditors evaluate an organization's IT systems and processes to ensure that they are operating in accordance with applicable laws and regulations. They also work to identify and mitigate security risks. JEA and JIT Administration can be useful for IT Auditors, as these tools can help to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate audit tasks.
Privacy Analyst
Privacy Analysts work to ensure that an organization is in compliance with applicable privacy laws and regulations. They may also be responsible for developing and implementing privacy programs. JEA and JIT Administration can be useful for Privacy Analysts, as these tools can help to improve security and reduce the risk of privacy breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate privacy tasks.
Security Consultant
Security Consultants provide security advice and services to organizations. They work to help organizations improve their security posture and reduce the risk of data breaches. JEA and JIT Administration can be useful for Security Consultants, as these tools can help to improve security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate security tasks.
Compliance Analyst
Compliance Analysts work to ensure that an organization is in compliance with applicable laws and regulations. They may also be responsible for developing and implementing compliance programs. JEA and JIT Administration can be useful for Compliance Analysts, as these tools can help to improve security and reduce the risk of non-compliance. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate compliance tasks.
Database Administrator
Database Administrators are responsible for managing and maintaining databases. They work to ensure that databases are running smoothly and securely, and that data is protected from unauthorized access, disclosure, use, modification, disruption, or destruction. JEA and JIT Administration can be useful for Database Administrators, as these tools can help to improve database security and reduce the risk of data breaches. These technologies can be used to control and monitor user access to sensitive data and resources, and to automate database tasks.
Security Engineer
Security Engineers design, implement, and manage security measures to protect an organization's computer networks and systems. Gaining an understanding of Just Enough Administration (JEA) and Just In Time (JIT) Administration can provide Security Engineers with the practical skills needed to secure networks and systems more effectively. JEA and JIT can be useful for controlling and monitoring user access to administrative tasks, reducing the risk of unauthorized access and security breaches.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Implement JIT and JEA Administration in Windows Server 2019.
Provides a comprehensive overview of Just-in-Time Administration in Active Directory. It covers the benefits of JIT, as well as the challenges of implementing it. The book also includes detailed instructions on how to configure JIT environments.
Provides a comprehensive overview of network security, covering topics such as network security threats, security protocols, and security tools.
Provides a comprehensive overview of Windows Server 2019 administration, covering topics such as installing and configuring Windows Server, managing users and groups, and securing Windows Server environments.
Provides a comprehensive overview of Active Directory, covering topics such as planning and deploying Active Directory environments, managing user and group accounts, and implementing security best practices.
Provides a comprehensive overview of Active Directory security and administration, covering topics such as planning and securing Active Directory environments, managing user and group accounts, and implementing security best practices.
Provides a collection of recipes for managing Active Directory environments, covering topics such as planning and deploying Active Directory environments, managing user and group accounts, and implementing security best practices.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Implement JIT and JEA Administration in Windows Server 2019.
Implementing Privileged Access Workstations (PAWs) and...
Most relevant
Windows 11 Desktop Administration: Installation and...
Most relevant
Windows Endpoint Administration: Manage Identity and...
Most relevant
Install and Configure Active Directory Domain Services in...
Most relevant
Microsoft 365 Administration: Deploying and Managing an...
Most relevant
Windows Server 2022: Manage Workloads in Hybrid...
Most relevant
Windows Server 2022: Deploy and Manage Active Directory...
Most relevant
Securing SSRS Reporting Solutions
Most relevant
Implementing Windows Server 2019 DNS
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser