Book description
Designed to help network administrators develop real-world, job-role-specific skills—this Training Guide focuses on deploying and managing Windows 8 clients in the enterprise. Build hands-on expertise through a series of lessons, exercises, and suggested practices—and help maximize your performance on the job.
This Microsoft Training Guide:
Provides in-depth, hands-on training you take at your own pace
Focuses on job-role-specific expertise for deploying and managing Windows 8 clients
Features pragmatic lessons, exercises, and practices
Creates a foundation of skills which, along with real-world experience, can be measured by Microsoft Certification exams such as 70-687
Table of contents
- Training Guide: Configuring Windows® 8
- Introduction
- 1. Evaluating Windows 8
-
2. Installing and Migrating to Windows 8
- Before you begin
- Lesson 1: Installing Windows 8 on a new or formatted system
- Lesson 2: Upgrading or migrating from a previous version of Windows
- Lesson 3: Installing Windows 8 on startup VHD files
- Practice exercises
- Suggested practice exercises
- Answers
-
3. Handling Hardware and Device Drivers
- Before you begin
- Lesson 1: Managing drivers
- Lesson 2: Managing hardware devices
- Lesson 3: Managing enterprise hardware policies
- Practice exercises
- Suggested practice exercises
- Answers
-
4. Installing and Configuring Applications
- Before you begin
- Lesson 1: Managing traditional desktop applications
-
Lesson 2: Managing Windows 8 native applications
- Installing, updating, and uninstalling Windows 8 native applications
- Reinstalling apps that have been removed
- Acquiring desktop apps in the Windows Store
- Disabling and controlling access to the Windows Store app
- Managing access to hardware and installed applications
- Controlling applications by using AppLocker
- Sideloading apps in Windows 8
- Inventorying and removing apps
- Lesson summary
- Lesson review
- Practice exercises
- Suggested practice exercises
- Answers
-
5. Managing Internet Explorer
- Before you begin
- Lesson 1: Configuring Internet Explorer 10
- Lesson 2: Understanding and configuring browser security settings
- Lesson 3: Managing Internet Explorer add-ons
- Practice exercises
- Suggested practice exercises
- Answers
-
6. Using Hyper-V
- Before you begin
- Lesson 1: Learning about Hyper-V for Windows 8
- Lesson 2: Creating and using Hyper-V virtual machines
- Lesson 3: Configuring virtual machine networking and storage
- Practice exercises
- Suggested practice exercises
- Answers
-
7. Administering Windows Networking
- Before you begin
- Lesson 1: Configuring networking
- Lesson 2: Troubleshooting networking
- Practice exercises
- Suggested practice exercises
- Answers
-
8. Configuring security
- Before you begin
- Lesson 1: Managing Windows Firewall and exceptions
- Lesson 2: Configuring network discovery and wireless security
- Lesson 3: Using Secure Boot and SmartScreen Filter
- Practice exercises
- Suggested practice exercises
- Answers
- 9. Working with Remote Management Tools
- 10. Sharing Resources
-
11. File System and Storage Management
- Before you begin
- Lesson 1: Managing disks and storage
-
Lesson 2: Working with file systems
- Security within the file system
- Inheritance and cumulative effectiveness
- Taking ownership
- Understanding share-level permissions
- Auditing access to securable objects by using SACLs
- Understanding Encrypting File System
- BitLocker
- Working with quotas
- Working with quotas for user accounts
- Lesson summary
- Lesson review
- Lesson 3: Introducing Storage Spaces
- Practice exercises
- Suggested practice exercises
- Answers
-
12. Administering Authentication and Authorization
- Before you begin
-
Lesson 1: Determining who’s who through authentication
- What is authentication and what does it do?
- How does Windows authenticate users accessing the system?
- User name and password-based authentication
- Smart card authentication
- Biometric authentication
- Managing credentials in Windows 8 by using Credential Manager
- Configuring a Microsoft account for use with Windows
- Logging on by using a picture password
- Using a personal identification number (PIN) for authentication
- Lesson summary
- Lesson review
- Lesson 2: Managing authorization and access rights
- Practice exercises
- Suggested practice exercises
- Answers
-
13. Managing and securing mobility
- Before you begin
-
Lesson 1: Managing BitLocker and other policy-based mobility tools
- Configuring BitLocker policies
- Managing BitLocker at the command line
- Using BitLocker on computers without TPM
- Using BitLocker on removable media (BitLocker To Go)
- Configuring policy settings for offline files
- Configuring offline file synchronization
- Configuring policy settings for device power
- Lesson summary
- Lesson review
- Lesson 2: Working with location-based settings and connection methods
- Practice exercises
- Suggested practice exercises
- Answers
-
14. Monitoring and Maintaining Windows
- Before you begin
- Lesson 1: Managing Windows Update
- Lesson 2: Monitoring, optimizing, and troubleshooting system health and performance
- Practice exercises
- Suggested practice exercises
- Answers
-
15. System Protection and Recovery
- Before you begin
- Lesson 1: Working with backup and restoration
- Lesson 2: Advanced settings and features for Windows recovery
- Lesson 3: Advanced recovery and restoration options
- Practice exercises
- Suggested practice exercises
- Answers
- A. Training Guide: Configuring Windows 8 and Exam 70-687
- Index
- About the Authors
- Copyright
Product information
- Title: Training Guide: Configuring Windows® 8
- Author(s):
- Release date: January 2013
- Publisher(s): Microsoft Press
- ISBN: 9780735673212
You might also like
book
CompTIA® A+ 220-701 and 220-702 Cert Guide, Second edition
Learn, prepare, and practice for CompTIA A+ 220-701 and 220-702 exam success with this CompTIA Cert …
book
Microsoft® Windows® XP Unleashed
Windows XP Unleashed guides the advanced reader through nearly every Windows XP topic imaginable giving ideas …
book
Microsoft® Windows® 2000 Security Handbook
Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing …
book
CompTIA® A+® Training Kit (Exam 220-801 and Exam 220-802)
Ace your preparation for the CompTIA A+ Exams 220-801 and 220-802 with this 2-in-1 Training Kit …