Training Guide: Configuring Windows® 8

Book description

Designed to help network administrators develop real-world, job-role-specific skills—this Training Guide focuses on deploying and managing Windows 8 clients in the enterprise. Build hands-on expertise through a series of lessons, exercises, and suggested practices—and help maximize your performance on the job.

This Microsoft Training Guide:

  • Provides in-depth, hands-on training you take at your own pace

  • Focuses on job-role-specific expertise for deploying and managing Windows 8 clients

  • Features pragmatic lessons, exercises, and practices

  • Creates a foundation of skills which, along with real-world experience, can be measured by Microsoft Certification exams such as 70-687

  • Table of contents

    1. Training Guide: Configuring Windows® 8
    2. Introduction
      1. System requirements
        1. Hardware requirements
          1. Virtualization hardware requirements
          2. Physical hardware requirements
        2. Software requirements
        3. Practice setup instructions
        4. Acknowledgments
            1. Scott Lowe
            2. Derek Schauland
            3. Rick Vanover
        5. Errata & book support
        6. We want to hear from you
        7. Stay in touch
    3. 1. Evaluating Windows 8
      1. Before you begin
      2. Lesson 1: What’s new in Windows 8
        1. Navigating the Windows 8 user interface
          1. Managing the Start screen
          2. Adding Windows administrative programs to the Start screen
          3. Understanding charms
          4. Switching between applications
          5. Closing applications
        2. Introducing some new features
          1. Internet Explorer 10
          2. Adding applications from the Windows Store
          3. Hyper-V
          4. Cloud connectivity
          5. Windows To Go
          6. Mobile broadband
          7. Secure Boot and Trusted Boot
          8. Refresh your PC and reset your PC
        3. Lesson summary
        4. Lesson review
      3. Lesson 2: Understanding product editions, architectures, and hardware requirements
        1. Windows 8 product edition differences
        2. Windows 8 product architecture differences
        3. Windows 8 hardware requirements
        4. Lesson summary
        5. Lesson review
      4. Practice exercises
        1. Exercise 1: Add an Internet Explorer shortcut to the Start screen
        2. Exercise 2: Configure user settings to synchronize between Windows 8 devices
      5. Suggested practice exercises
      6. Answers
        1. Lesson 1
        2. Lesson 2
    4. 2. Installing and Migrating to Windows 8
      1. Before you begin
      2. Lesson 1: Installing Windows 8 on a new or formatted system
        1. Starting the installation
        2. Configuring your account
        3. Joining an Active Directory domain
        4. Installing Windows 8 with Windows To Go
        5. Lesson summary
        6. Lesson review
      3. Lesson 2: Upgrading or migrating from a previous version of Windows
        1. Running the Setup Wizard
        2. Configuring your account
        3. Upgrading from Windows Vista
        4. Upgrading from Windows XP
        5. Moving and transferring files by using Windows Easy Transfer
          1. Using removable media
            1. Using an Easy Transfer cable
            2. Using a network connection
            3. Using an external hard disk or USB flash drive
          2. Using the User State Migration Tool
          3. Migrating user data
        6. Lesson summary
        7. Lesson review
      4. Lesson 3: Installing Windows 8 on startup VHD files
        1. Creating a VHD from an existing installation
        2. Creating the VHD during the installation by using DiskPart
        3. Starting the system from the VHD
        4. Removing VHD installations
        5. Lesson summary
        6. Lesson review
      5. Practice exercises
        1. Exercise 1: Install Windows 8
        2. Exercise 2: Configure Windows 8 to start from a VHD
        3. Exercise 3: Set up a Windows To Go workspace
      6. Suggested practice exercises
      7. Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
    5. 3. Handling Hardware and Device Drivers
      1. Before you begin
      2. Lesson 1: Managing drivers
        1. Driver installation methods
        2. Driver types
        3. Using Device Manager
          1. Opening Device Manager
          2. Viewing device and driver information
            1. The General tab
            2. The Advanced tab
            3. The Driver tab
            4. The Details tab
            5. The Events tab
            6. The Resources tab
          3. Managing drivers
            1. Driver Details
            2. Update Driver
            3. Roll Back Driver
          4. Displaying hidden devices
        4. Using the System Information utility
          1. Viewing conflicting or shared resources
          2. System Information highlights
        5. Discovering the Driver Verifier utility
        6. Adding device drivers to the driver store
        7. Lesson summary
        8. Lesson review
      3. Lesson 2: Managing hardware devices
        1. Enabling and disabling hardware devices
        2. Monitoring USB devices
        3. Lesson summary
        4. Lesson review
      4. Lesson 3: Managing enterprise hardware policies
        1. Managing enterprise hardware installation policies
          1. Identifying hardware strings and classes
          2. Disabling installation of removable devices
          3. Managing installation of specific devices based on device ID or group
            1. Restricting Device Installation Based on Class
            2. Allowing Device Installation Based on Class
            3. Restricting Device Installation Based on Hardware ID
            4. Allowing Device Installation Based on Hardware ID
          4. Creating an administrative override for device installation
        2. Lesson summary
        3. Lesson review
      5. Practice exercises
        1. Exercise 1: Locate hardware ID for a USB thumb drive
        2. Exercise 2: Create Group Policy to prevent the installation of hardware devices
      6. Suggested practice exercises
      7. Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
    6. 4. Installing and Configuring Applications
      1. Before you begin
      2. Lesson 1: Managing traditional desktop applications
        1. Using Windows Installer in Windows 8
        2. Running Windows Installer packages and MSIExec
        3. Managing compatibility with Application Compatibility Toolkit and App-V
          1. Testing for application compatibility
          2. Virtualizing incompatible applications
        4. Controlling program settings for traditional applications
          1. Using the Program Compatibility troubleshooter
          2. Manually troubleshooting compatibility
          3. Configuring default programs and file associations
        5. Lesson summary
        6. Lesson review
      3. Lesson 2: Managing Windows 8 native applications
        1. Installing, updating, and uninstalling Windows 8 native applications
        2. Reinstalling apps that have been removed
        3. Acquiring desktop apps in the Windows Store
        4. Disabling and controlling access to the Windows Store app
        5. Managing access to hardware and installed applications
        6. Controlling applications by using AppLocker
          1. Defining rules
          2. Enforcing rules
        7. Sideloading apps in Windows 8
          1. Adding sideloaded apps to a user account
          2. Adding sideloaded apps to an image
        8. Inventorying and removing apps
          1. Using Windows PowerShell
          2. Using DISM at the command line
        9. Lesson summary
        10. Lesson review
      4. Practice exercises
        1. Exercise 1: Install line-of-business applications
        2. Exercise 2: Prevent access to the Windows Store
      5. Suggested practice exercises
      6. Answers
        1. Lesson 1
        2. Lesson 2
    7. 5. Managing Internet Explorer
      1. Before you begin
      2. Lesson 1: Configuring Internet Explorer 10
        1. Managing two Internet Explorer experiences
          1. Configuring the startup Internet Explorer
          2. Controlling Internet Explorer Start screen tile behavior
          3. Configuring Internet Explorer 10 (touch optimized)
        2. Managing Internet Explorer settings by using Group Policy
          1. Managing link behavior by using Group Policy
          2. Controlling Internet Explorer Start screen tile behavior by using Group Policy
        3. Lesson summary
        4. Lesson review
      3. Lesson 2: Understanding and configuring browser security settings
        1. Managing new Internet Explorer 10 security settings
          1. Understanding enhanced memory protection
          2. Understanding the HTML5 sandbox attribute
          3. Using Enhanced Protected Mode
          4. Understanding Protected Mode (non-enhanced)
          5. Disabling Protected Mode
        2. Adding trusted sites to Internet Explorer
        3. Managing Internet Explorer security settings by using Group Policy
          1. Enabling Enhanced Protected Mode by using Group Policy
          2. Password display
        4. Lesson summary
        5. Lesson review
      4. Lesson 3: Managing Internet Explorer add-ons
        1. Understanding add-ons
        2. Managing ActiveX controls
          1. Controlling ActiveX opt-in
          2. Managing ActiveX behavior
        3. Managing other add-ons
          1. Enabling or disabling add-ons
          2. Starting Internet Explorer without add-ons
        4. Managing Internet Explorer add-ons by using Group Policy
          1. Running ActiveX and Enhanced Protected Mode
          2. Preventing the installation of add-ons
          3. Specify approved add-ons
        5. Lesson summary
        6. Lesson review
      5. Practice exercises
        1. Exercise 1: Configure ActiveX (Internet zone)
        2. Exercise 2: Disable the Map With Bing accelerator
      6. Suggested practice exercises
      7. Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
    8. 6. Using Hyper-V
      1. Before you begin
      2. Lesson 1: Learning about Hyper-V for Windows 8
        1. Introducing Hyper-V for Windows 8
        2. When to use Hyper-V
          1. Test environments for system administrators
          2. Application compatibility situations
          3. Test environments for desktop support technicians
          4. Environments for application developers
        3. Data management and licensing
        4. Enabling Hyper-V
        5. What you need to know to succeed
          1. Hyper-V operating systems
          2. Guest enlightenment
          3. Windows PowerShell extension
          4. Virtualized media
          5. Windows Server 2012 Hyper-V technology and Windows 8
        6. Lesson summary
        7. Lesson review
      3. Lesson 2: Creating and using Hyper-V virtual machines
        1. Planning your virtual machines
          1. Establishing names and locations
          2. Understanding memory availability
          3. Planning installation options
        2. Creating a new virtual machine
        3. Using a Hyper-V virtual machine
          1. State-changing tasks
          2. Migrating a virtual machine to another storage resource
        4. Lesson summary
        5. Lesson review
      4. Lesson 3: Configuring virtual machine networking and storage
        1. Introducing storage and networking for Hyper-V
          1. Networking technologies
          2. Storage
        2. Hyper-V virtual switch
          1. Assigning a virtual switch to a virtual machine
          2. Assigning storage to a virtual machine
          3. Windows 8 storage considerations for Hyper-V
        3. Lesson summary
        4. Lesson review
      5. Practice exercises
        1. Exercise 1: Create a virtual machine
        2. Exercise 2: Customize a virtual machine
      6. Suggested practice exercises
      7. Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
    9. 7. Administering Windows Networking
      1. Before you begin
      2. Lesson 1: Configuring networking
        1. What’s new in networking in Windows 8
          1. Enhancements in SMB 3
          2. Viewing network connections
          3. Controlling metered connections
        2. Installing a network adapter
        3. Managing network settings
          1. Using the Network and Sharing Center
            1. Using the Taskbar
            2. Using Control Panel
            3. Using the Start Screen
          2. Managing network profiles
          3. Configuring IP settings
          4. Understanding the dual TCP/IP stack in Windows 8
          5. Configuring name resolution
          6. Adding a second default gateway
        4. Connecting to a wireless network
          1. Managing a wireless network
            1. Connection Properties
            2. Security Properties
        5. Lesson summary
        6. Lesson review
      3. Lesson 2: Troubleshooting networking
        1. Updating the Task Manager view for networking
        2. Viewing Windows 8 network settings
          1. Viewing network settings by using Network and Sharing Center
          2. Viewing network settings by using the command prompt
          3. Viewing wireless network details
        3. Using the network troubleshooters
        4. Using command-line tools
          1. Using ipconfig
          2. Using netstat
        5. Lesson summary
        6. Lesson review
      4. Practice exercises
        1. Exercise 1: Disable Network Discovery on the Private network profile
        2. Exercise 2: Manually configure IP settings for one of your network adapters
        3. Exercise 3: Use the netstat command
      5. Suggested practice exercises
      6. Answers
        1. Lesson 1
        2. Lesson 2
    10. 8. Configuring security
      1. Before you begin
      2. Lesson 1: Managing Windows Firewall and exceptions
        1. Choosing Windows Firewall
          1. Configuring Windows Firewall to allow specific apps
          2. Removing an app from a Windows Firewall configuration
        2. Choosing Windows Firewall with Advanced Security
          1. Viewing the initial configuration
          2. Modifying a firewall profile
          3. Configuring IPsec settings
          4. Configuring inbound rules
          5. Allowing the secure connection
          6. Configuring outbound rules
          7. Configuring connection security rules
        3. Monitoring rules configured in Windows Firewall
        4. Lesson summary
        5. Lesson review
      3. Lesson 2: Configuring network discovery and wireless security
        1. Creating network discovery profiles
        2. Managing wireless security
        3. Understanding types of wireless security
        4. Wireless networking risks
        5. Reducing security issues on a wireless network
        6. Lesson summary
        7. Lesson review
      4. Lesson 3: Using Secure Boot and SmartScreen Filter
        1. Ensuring that Windows has been signed using Secure Boot
        2. Staying safe by using SmartScreen Filter
        3. Lesson summary
        4. Lesson review
      5. Practice exercises
        1. Exercise 1: Configure inbound firewall rules for programs
        2. Exercise 2: Configure outbound firewall rules for ports
        3. Exercise 3: Configure firewall exceptions
      6. Suggested practice exercises
      7. Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
    11. 9. Working with Remote Management Tools
      1. Before you begin
      2. Lesson 1: Working with Remote Assistance
        1. Initiating Remote Assistance
        2. Providing remote assistance
        3. Lesson summary
        4. Lesson review
      3. Lesson 2: Configuring and using Remote Desktop
        1. Configuring Remote Desktop
        2. Opening the Remote Desktop application
          1. General
          2. Display
          3. Local Resources
          4. Programs
          5. Experience
          6. Advanced
        3. Lesson summary
        4. Lesson review
      4. Lesson 3: Configuring, managing, and troubleshooting connections
        1. Troubleshooting network problems
        2. Using Troubleshooter
        3. Connecting to VPNs in Windows 8
          1. General
          2. Options
          3. Security
          4. Networking
          5. Sharing
        4. Lesson summary
        5. Lesson review
      5. Lesson 4: Using other management tools remotely
        1. Netsh
        2. Windows Remote Shell
        3. Windows PowerShell
          1. What can Windows PowerShell do for administrators that the GUI cannot?
          2. Putting Windows PowerShell to work
        4. Microsoft Management Console
          1. Adding snap-ins
          2. Using the MMC to manage resources
        5. Lesson summary
        6. Lesson review
      6. Practice exercises
        1. Exercise 1: Configure a Remote Desktop session that launches PowerShell.exe and connect to a remote computer
        2. Exercise 2: Help another user initiate a Remote Assistance session
        3. Exercise 3: Work with Windows PowerShell to obtain information about a remote system
      7. Suggested practice exercises
      8. Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
        4. Lesson 4
    12. 10. Sharing Resources
      1. Before you begin
      2. Lesson 1: Sharing files and folders
        1. Configuring the Network and Sharing Center
          1. Using the taskbar
          2. Using Control Panel
          3. Using the Start screen
        2. Sharing files and folders
          1. Enabling folder sharing using the Windows 8 interface
          2. Enabling folder sharing using the traditional interface
          3. Sharing a folder: simple method
          4. Sharing a folder: advanced method
        3. Understanding NTFS permissions
          1. Modifying file or folder permissions
          2. Creating advanced security settings
          3. Identifying permissions
          4. Taking ownership of a resource
          5. Resolving permissions conflicts
        4. Lesson summary
        5. Lesson review
      3. Lesson 2: Sharing printers
        1. Configuring shared printers
        2. Configuring printing permissions
        3. Lesson summary
        4. Lesson review
      4. Practice exercises
        1. Exercise 1: Enable file sharing for a network adapter in your lab server
        2. Exercise 2: Test each other
      5. Suggested practice exercises
      6. Answers
        1. Lesson 1
        2. Lesson 2
    13. 11. File System and Storage Management
      1. Before you begin
      2. Lesson 1: Managing disks and storage
        1. Using disk management
          1. Disk types
          2. Partition types
          3. Volume types
          4. Actions available by using Disk Management
        2. Disk Defragmenter and Disk Cleanup
          1. Using Disk Cleanup to perform regular maintenance
          2. More Options for cleanup
        3. Using Microsoft Drive Optimizer to organize data
          1. Check Disk (chkdsk)
          2. The DiskPart utility
        4. Lesson summary
        5. Lesson review
      3. Lesson 2: Working with file systems
        1. Security within the file system
        2. Inheritance and cumulative effectiveness
        3. Taking ownership
        4. Understanding share-level permissions
        5. Auditing access to securable objects by using SACLs
        6. Understanding Encrypting File System
        7. BitLocker
        8. Working with quotas
        9. Working with quotas for user accounts
        10. Lesson summary
        11. Lesson review
      4. Lesson 3: Introducing Storage Spaces
        1. What is Storage Spaces?
        2. Creating storage spaces
          1. Storage virtualization makes this work
          2. Benefits of Storage Spaces
        3. Lesson summary
        4. Lesson review
      5. Practice exercises
        1. Exercise 1: Use disk optimizer
        2. Exercise 2: Configure Storage Spaces
      6. Suggested practice exercises
      7. Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
    14. 12. Administering Authentication and Authorization
      1. Before you begin
      2. Lesson 1: Determining who’s who through authentication
        1. What is authentication and what does it do?
        2. How does Windows authenticate users accessing the system?
        3. User name and password-based authentication
        4. Smart card authentication
        5. Biometric authentication
        6. Managing credentials in Windows 8 by using Credential Manager
        7. Configuring a Microsoft account for use with Windows
        8. Logging on by using a picture password
          1. Creating a picture password
          2. Removing a picture password
          3. Using the picture password
        9. Using a personal identification number (PIN) for authentication
        10. Lesson summary
        11. Lesson review
      3. Lesson 2: Managing authorization and access rights
        1. Getting started with user rights
        2. Working in groups
        3. Understanding rights vs. permissions
        4. Assigning user rights
        5. Local Security Policy console
        6. Running tasks as administrator and user account control
        7. Run As
        8. Using and managing certificates
          1. How do certificates work?
          2. Managing certificates in Windows 8
        9. Lesson summary
        10. Lesson review
      4. Practice exercises
        1. Exercise 1: Configure a Microsoft account for authentication
        2. Exercise 2: Configure a picture password and PIN for sign-in
        3. Exercise 3: Run applications with elevated privileges
      5. Suggested practice exercises
      6. Answers
        1. Lesson 1
        2. Lesson 2
    15. 13. Managing and securing mobility
      1. Before you begin
      2. Lesson 1: Managing BitLocker and other policy-based mobility tools
        1. Configuring BitLocker policies
        2. Managing BitLocker at the command line
        3. Using BitLocker on computers without TPM
        4. Using BitLocker on removable media (BitLocker To Go)
        5. Configuring policy settings for offline files
        6. Configuring offline file synchronization
        7. Configuring policy settings for device power
        8. Lesson summary
        9. Lesson review
      3. Lesson 2: Working with location-based settings and connection methods
        1. Connecting to devices by using Wi-Fi Direct
          1. Securing Wi-Fi to a device
          2. How does Windows 8 use Wi-Fi Direct?
        2. Using airplane mode and location-based services in Windows 8
        3. Lesson summary
        4. Lesson review
      4. Practice exercises
        1. Exercise 1: Configure BitLocker and BitLocker To Go
        2. Exercise 2: Configure subfolder availability for offline files
        3. Exercise 3: Configure actions for the power button
      5. Suggested practice exercises
      6. Answers
        1. Lesson 1
        2. Lesson 2
    16. 14. Monitoring and Maintaining Windows
      1. Before you begin
      2. Lesson 1: Managing Windows Update
        1. Accessing Windows Update settings by using Control Panel
          1. Using the Power User menu
          2. Using the Start screen
          3. Using the Windows 8 desktop
        2. Configuring update settings
        3. Identifying new updates
        4. Managing Windows Update in Windows 8 native interface
        5. Viewing update history
        6. Rolling back updates
        7. Configuring Windows Update policies
        8. Lesson summary
        9. Lesson review
      3. Lesson 2: Monitoring, optimizing, and troubleshooting system health and performance
        1. Managing and monitoring the system by using Task Manager
          1. Processes
            1. Ending a Process
          2. Performance
          3. App history
            1. Switching to a Windows 8 Native app
            2. Deleting app Usage History
          4. Startup
          5. Users
          6. Details
            1. Ensuring Licensing Compliance Through Affinity Settings
          7. Services
        2. Using Windows Action Center
        3. Configuring and analyzing event logs
          1. Filtering events
          2. Saving events to an archive
        4. Monitoring system resources by using Performance Monitor
          1. Performing system diagnostics by using Performance Monitor
        5. Lesson summary
        6. Lesson review
      4. Practice exercises
        1. Exercise 1: Enable automatic updates on your computer
        2. Exercise 2: Manually end a process in Windows
        3. Exercise 3: Create an event log filter
      5. Suggested practice exercises
      6. Answers
        1. Lesson 1
        2. Lesson 2
    17. 15. System Protection and Recovery
      1. Before you begin
      2. Lesson 1: Working with backup and restoration
        1. Backing up Windows 8
        2. Creating additional images
        3. Protecting files and data by using File History
          1. Excluding items from File History
          2. Restoring files, folders, and entire computers
        4. Restoring an entire computer
        5. Using System Restore for less invasive troubleshooting
          1. Understanding how System Restore works
          2. Configuring System Restore
          3. Creating restore points
          4. Using System Restore
        6. Two new methods of restoration and recovery
          1. Making your computer like new again by using Refresh
          2. When the refresh process doesn’t go far enough
        7. Lesson summary
        8. Lesson review
      3. Lesson 2: Advanced settings and features for Windows recovery
        1. MSConfig
        2. Task Manager Startup
        3. Recovering from a bad driver installation
        4. Lesson summary
        5. Lesson review
      4. Lesson 3: Advanced recovery and restoration options
        1. Creating a system repair or recovery disc
        2. Using Windows Recovery Environment
        3. Lesson summary
        4. Lesson review
      5. Practice exercises
        1. Exercise 1: Back up files in Windows 8
        2. Exercise 2: Recover files by using File History
        3. Exercise 3: Bring your computer back to new with a reset
        4. Exercise 4: Use Advanced Startup to troubleshoot problems with Windows 8
      6. Suggested practice exercises
      7. Answers
        1. Lesson 1
        2. Lesson 2
        3. Lesson 3
    18. A. Training Guide: Configuring Windows 8 and Exam 70-687
    19. Index
    20. About the Authors
    21. Copyright

    Product information

    • Title: Training Guide: Configuring Windows® 8
    • Author(s): Derek Schauland Scott Lowe and Rick W. Vanover
    • Release date: January 2013
    • Publisher(s): Microsoft Press
    • ISBN: 9780735673212