Upload
anand919
View
31
Download
2
Embed Size (px)
DESCRIPTION
Installing and Configuring Windows 7 Client
Citation preview
3/11/2014
1
Installing and Configuring Windows 7 Client
Welcome!
Thank you for taking our training. Weve worked together with our Microsoft Certified Partners for Learning Solutions and Microsoft IT Academies to bring you a world-class learning experience, including:
Microsoft Certified Trainers + Instructors. Your instructor is a premier technical and instructional expert who meets ongoing certification requirements.
Customer Satisfaction Guarantee. Our Certified Partners for Learning Solutions offer a satisfaction guarantee and we hold them accountable for it. At the end of class, please complete an evaluation of todays experience. We value your feedback!
Certification Exam Benefits. After training, consider taking a Microsoft Certification exam. Independent research by IDC concluded that 75% of managers believe certifications are important to team performance*. Ask your instructor about available exam promotions and discounts.
We wish you a great learning experience and ongoing career success!
* IDC, Value of Certification: Team Certification and Organizational Performance, November 2006
3/11/2014
2
Introduction
Name
Company affiliation
Title/function
Job responsibility
Operating system, networking, security experience
Windows experience
Your expectations for the course
Course Companion CD
Course Material
http://www.microsoft.com/learning/
Lessons
Labs
Module Reviews and Takeaways
Lab Answers
A succinct classroom learning guide that provides critical technical information to optimize your in-class learning experience.
Online Resources
Student Course Files
Searchable, easy-to-navigate digital content with integrated premiumon-line resources designed to
supplement the Course Handbook.
Course Handbook
3/11/2014
3
How to Use the Course Material
http://www.microsoft.com/learning/
Use the handbook content as the primary resource for reference during
the class.
Use the troubleshooting tips and best practices in the Module Reviews and
Takeaways section as on-the-job references.
During the class, refer to the Companion CD while performing labs
or as suggested by the instructor.
Use the CD as your extended learning resource on the job.
Course Handbook Course Companion CD
Facilities
Class hours
Building hours
Parking
Restrooms
Meals
Phones
Messages
Smoking
Recycling
3/11/2014
4
6293: Supporting Windows 7 Clients in the Enterprise6293: Supporting Windows 7 Clients in the Enterprise
6294: Planning and Managing Windows 7 Desktop Deployments and Environments6294: Planning and Managing Windows 7 Desktop Deployments and Environments
6292: Installing and Configuring Windows 7 Client6292: Installing and Configuring Windows 7 Client
Microsoft Learning
http://www.microsoft.com/learning/
Microsoft Certification Program
Exam number and title
Core exam for the following track
Elective exam for the following track
70-680: TS: Windows 7, Configuring
MCTS MCITP
http://www.microsoft.com/learning/
3/11/2014
5
About This Course
Audience
Course Prerequisites
Course Objectives
Course Outline
Module 1: Installing, Upgrading, and Migrating to Windows 7
Module 2: Configuring Disks and Device Drivers
Module 3: Configuring File Access and Printers on Windows 7 Clients
Module 4: Configuring Network Connectivity
Module 5: Configuring Wireless Network Connections
Module 6: Securing Windows 7 Desktops
Module 7: Optimizing and Maintaining Windows 7 Client Computers
Module 8: Configuring Mobile Computing and Remote Access in Windows 7
3/11/2014
6
Virtual Machine Environment
Base09C-
RC.vhd
Base10A-WS08R2-
HV.vhd
Parent
6292A-LON-CL1-
ALLFILES.vhd
Parent
WS08R2-LON-
DC1.vhd
Differencing
Parent
6292A-LON-DC1.vhd
Differencing
Win7-OFC.vhd
DifferencingDifferencing
Parent
6292A-LON-CL2.vhd
Differencing
Stand Alone
6292A-LON-CL3.vhdBase10D-W7-
Office07-HV.vhd
Parent
Base09F-Vista-
Office07SP2-
HV.vhd
Parent
Differencing
6292A-LON-VS1.vhd
6292A-LON-CL1-
Disk1.vhd6292A-LON-CL1-
Disk2.vhd
Differencing
6292A-LON-CL1.vhd
Virtual Machine Environment
Virtual machine Used as:
6292A-LON-DC1 Domain controller in the Contoso.com domain
6292A-LON-CL1 Windows 7 computer in the Contoso.com domain
6292A-LON-CL2 Windows 7 computer in the Contoso.com domain
6292A-LON-CL3 Virtual machine with no operating system installed
6292A-LON-VS1 Windows Vista computer in the Contoso.com domain
3/11/2014
7
Demonstration: Using Hyper-V Manager
In this demonstration, you will learn how to:
Open Hyper-V Manager
Navigate the various sections/panes within Hyper-V Manager
Virtual Machines, Snapshots, and Actions: Server specific and Virtual Machine specific
Identify the virtual machines (VMs) used in the labs for this course
Take a Snapshot and Apply a Snapshot
Connect to a VM
Start and log on to a VM
Switch between the full screen and window modes
Revert to the previous Snapshot
Shut down a VM
Understand the difference between Shut Down and Turn off
Close Hyper-V Manager
Module 1
Installing, Upgrading, and Migrating to Windows 7
3/11/2014
8
Module Overview
Preparing to Install Windows 7
Performing a Clean Installation of Windows 7
Upgrading and Migrating to Windows 7
Performing Image-Based Installation of Windows 7
Configuring Application Compatibility
Lesson 1: Preparing to Install Windows 7
Key Features of Windows 7
Editions of Windows 7
Hardware Requirements for Installing Windows 7
Advantages of Using 64-Bit Editions of Windows 7
Options for Installing Windows 7
3/11/2014
9
Improved user interface and accessibility features
Windows Search
BranchCacheTM, DirectAccess, and VPN Reconnect
Productivity
Windows Virtual PC and Windows XP Mode
Manageability
Microsoft Windows PowerShell 2.0
Group Policy Scripting
Windows Troubleshooting Packs
Problem Steps Recorder
Improvements to System Restore Tool and Reliability Monitor
AppLockerTM
Improvements in auditing
Group policy preferences
Reduce help desk calls
Automation FlexibilityWindows Imaging (WIM) format and image-based deployment
Modularization
Network deployment by using Windows Deployment Services with Multicast with multiple stream transfer and Dynamic driver provisioning
The new Deployment Image Servicing and Management (DISM) and improvements in User State Migration Tool (USMT) 4.0
Deployment
Application recovery and error reporting
Detection and recovery from hard disk and memory failures
Auto-tuning network stack for more efficient bandwidth utilization
Reliability and performance
Defragmentation runs in the background
Data protection at document, file, directory,computer and network levels
Rights Management Services (RMS)
Encrypting File System (EFS)
Windows BitLockerTM Drive Encryption and Windows BitLocker To GoTM
Internet Protocol Security (IPsec)
Multi-tiered data protection
Fundamentally secured platform
New features and improvements to protect against worms, viruses, and malware
Administrators work at user privilege level
Streamlined User Account Control (UAC)
SecurityUsability
Clearer ways to organize, search for, and view information
New communication, mobility, and networking features
Key Features of Windows 7
Improvements to the user interface
Accessibility features
BranchCacheTM, DirectAccess, and VPN Reconnect
Enhanced user productivity
Reliable and consistent performance using new hardware features
Improved application recovery and error reporting
Detection and recovery from some hard disk and memory failures
Auto-tuning network stack for more efficient bandwidth utilization
Greater reliability and performance
Improved data protection at document, file, directory and computer levels
Rights Management Services (RMS)
Windows BitLockerTM Drive Encryption and Windows BitLocker To GoTM
Internet Protocol Security (IPsec)
Multi-tiered data protection
Built on a fundamentally secure platform based on Windows Vista foundation
New features and improvements to protect against worms, viruses, and malware
Administrators work at user privilege level
Streamlined User Account Control (UAC)
Enhanced securityImproved Usability
Clearer ways to organize, search for, and view information
New communication, mobility, and networking features
The key features of Windows 7are categorized as follows:
Reliability and performance
Deployment
Usability
Security
Productivity
Manageability
Multi-tiered data protection
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
10
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Windows 7 Ultimate
Windows 7Enterprise
Windows 7 Professional
Windows 7 Home
Premium
Windows 7 Home Basic
Windows 7 Starter
Editions of Windows 7
Windows 7 Ultimate
Targeted for technical enthusiasts who want all Windows 7 features, without a Volume License agreement
Includes all the same features as the Windows 7 Enterprise
Not licensed for VDI scenarios
Windows 7 Enterprise
Business-focused edition, targeted for managed environments, mainly large enterprises
Includes all features available in Windows 7 Professional edition
Additionally, it includes:
BitLocker and BitLocker To Go
AppLocker
DirectAccess
BranchCache
All worldwide interface languages
Enterprise Search Scopes
Virtual Desktop Infrastructure (VDI) enhancements and ability to boot from a VHD
Windows 7 Professional
Business-focused edition for small and lower mid-market companies and users who have networking, backup, and security needs and multiple PCs or servers
Includes all features available in Windows 7 Home Premium edition
Additionally, it includes:
Core business features, such as Domain Join and Group Policy
Data protection with advanced network backup and Encrypted File System
Ability to print to the right printer at home or work with Location Aware Printing
Remote Desktop host and Offline folders
Windows Virtual PC and Windows XP Mode.
Windows 7 Home Premium
The standard edition for customer. It provides full functionality on the latest hardware, easy ways to connect, and a visually rich environment
Includes all features available in Windows 7 Home Basic edition
Additionally, it includes:
Windows Aero Glass, advanced windows navigation and Aero background
Windows Touch (Multi-touch and handwriting support)
Ability to create a HomeGroup, which ease sharing across all PCs and devices
DVD Video playback and authoring
Windows Media Center, Snipping Tool, Sticky Notes, Windows Journal and Windows Sideshow
Windows 7 Home Basic
Targeted for value PCs in emerging markets, meant for accessing the internet and running basic productivity applications
Includes all features available in Windows 7 Starter edition
Additionally, it includes:
No limit on number of programs you can run
Live Thumbnail previews and enhanced visual experiences
Advanced networking support (ad-hoc wireless networks and internet connection sharing)
Windows 7 Starter
Targeted specifically for small form factor PCs in all markets
Only 32-bit
Features include:
Improved Windows Taskbar and Jump Lists
Windows Search
Ability to join a HomeGroup
Action Center, Device Stage, Fax and Scan
Enhanced media streaming, including Play To
Broad applications and device compatibility
No limitation on how many applications can run simultaneously
Secured, reliable and supported operating system
Windows 7 Home Basic
Value edition in emerging markets
Windows 7 Professional
Windows 7 Home
Premium
Standard consumer edition
Does not include business features
Consumers Businesses
Windows 7 Ultimate
Enthusiasts
All features of Windows features
Specialized
Windows 7 Starter
Entry-level edition in all markets
Emerging Markets
Business-focused edition for small and lower mid-market
Include business features
Windows 7 Enterprise
Business-focused edition for large
enterprises
Enterprises
Entry Level PCs
3/11/2014
11
Hardware Requirements for Installing Windows 7
Hardware Minimum Requirements
CPU 1 GHz or faster
RAM 1 GB for 32-bit or 2 GB for 64-bit
GPU Aero Capable
Video RAM 128 MB
HDD Free 16 GB for 32-bit or 20 GB for 64-bit
Optical Drive DVD
Advantages of Using 64-Bit Editions of Windows 7
Take advantage of 64-bit processors:
Limitation:
Improved performance
More memory
Improved device support
Improved security
Does not support the 16-bit Windows on Windows (WOW) environment
3/11/2014
12
Clean installation
Install Windows 7 on a new partition Replace an existing operating system on a partition
Upgrade installation
Replace an existing version of Windows with Windows 7 All users applications, files, and settings are retained
Migration Move files and settings from an old operating system to
Windows 7 Side-by-side or wipe and load
Options for Installing Windows 7
Lesson 2: Performing a Clean Installation of Windows 7
Discussion: Considerations for a Clean Installation
Methods for Performing Clean Installation
Discussion: Common Installation Errors
Demonstration: Configuring the Computer Name and Domain/Word Group Settings
3/11/2014
13
Discussion: Considerations for a Clean Installation
When do you typically perform a clean installation of Windows?
5 min
Start the computer by using Windows PE
Connect to a network share containing Windows 7 files
Run setup.exe from the network share and complete the wizard
Running setup.exe Running setup.exe from a network share
Insert the product DVD
Start the computer by using the product DVD
Complete the wizard
Running setup.exe Running setup.exe from DVD
Create a WIM file from a reference computer
Start the computer by using Windows PE
Apply the WIM file to the target computer
Install by using an Install by using an image
ImageX, Windows Deployment Service, Microsoft Deployment Toolkit
Methods for Performing Clean Installation
Running setup.exe Running setup.exe from DVD
Installing by using an Installing by using an image
Running setup.exe Running setup.exe from a network share
3/11/2014
14
Discussion: Common Installation Errors
What potential issues might you encounter when installing Windows?
5 min
Demonstration: Configuring the Computer Name and Domain/Workgroup Settings
5 min
In this demonstration, you will see how to configure domain and workgroup settings.
3/11/2014
15
Lesson 3: Upgrading and Migrating to Windows 7
Considerations for Upgrading and Migrating to Windows 7
Identifying the Valid Upgrade Paths
Determining the Feasibility of an Upgrade Using Windows Upgrade Advisor
Process for Upgrading to Windows 7
Tools for Migrating User Data and Settings
Process for Migrating to Windows 7
Migrating User Settings and Data by Using WET
Considerations for Upgrading and Migrating to Windows 7
Upgrade:
Does not require the reinstallation of applications
Does not require additional storage space
Does not require replacing existing computer hardware
Is the recommended solution in home or small offices scenarios
Migrate:
Requires a reinstallation of applications
Typically, requires more storage space
Typically, requires replacing existing computer hardware
Is the recommended solution to achieve a standardized environment in a large enterprise scenario
3/11/2014
16
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Identifying the Valid Upgrade Paths
Windows 95Windows 98Windows MEWindows NT4Windows 2000
Windows Vista SP1, SP2 Windows 7
Only clean install
Clean install
In-place upgrade Clean install Migration
MigrationMigrationWindows XPWindows Vista RTM
Windows Anytime Upgrade enables you to upgrade to a higher edition of Windows 7
3/11/2014
17
Determining the Feasibility of an Upgrade Using Windows Upgrade Advisor
Windows Upgrade Advisor is a downloadable application that helps Windows users identify which edition of
Windows 7 meets their needs
Use Windows Upgrade Advisor to:
Provide suggestions about necessary hardware updates to install and run the appropriate edition and features of Windows 7
Provide upgrade guidance to Windows 7
RequirementsRequirements
.NET 2.0
MSXML 6
20 MB free HDD
Administrator privileges
Internet connection
Keep operating system up to date to protect against any security threats:
Update can also be done during upgrade (Dynamic Update)
Update
Determine any relevant updates1
Apply all relevant updates to the computer
2
After the upgrade:
Verify
Log on to the computer1
Verify all applications and hardware devices function correctly
2
Follow Windows Upgrade Advisor recommendations if any
3
To perform an upgrade to Windows 7, run setup.exe from:
Windows 7 product DVD
Network shareUpgrade
Protect against data loss, backup data and settings by using appropriate backup media:
CD/DVD disc
Network share
Any other backup mediaBack upEvaluate
Evaluate whether your computer meets the necessary requirements to run Windows 7:
Use the following tools:
Hardware requirements
Application compatibility
Standard User Analyzer Tool
Microsoft Assessment and Planning Toolkit
Windows Upgrade Advisor
Application Compatibility Toolkit
Evaluate
Back Up
UpgradeVerify
Update
Process for Upgrading to Windows 7
3/11/2014
18
User State Migration Tool (USMT) 4.0
Windows Easy Transfer (WET)Application
Settings
User Preferences
User Data
Earlier Version of Windows
Windows 7
What to migrateIdentify which components are to be migrated
to the new operating system
Use one of the following migration tools:
Windows Easy Transfer (WET)
User State Migration Tool (USMT) 4.0
Tools for Migrating User Data and Settings
Back up user state, including:
Use one of the following migration tools:
User settings
Application settings
User data
Back up
Windows Easy Transfer
User State Migration Tool
Run the Windows 7 installation (setup.exe) from:
product DVD
Network shareInstallInstall
Windows 7
Keep your computer secure by keeping up with current updates:
Update
Select check for updates during installation
Check for updates after installation
After installing Windows 7, reinstall all applications:
InstallInstallApplications
Install the compatible version of the applications
After installing applications, restore user state by using:
Restore
Windows Easy Transfer
User State Migration Tool
Process for Migrating to Windows 7
Back Up
Install Windows 7
UpdateInstall Applications
Restore
3/11/2014
19
Transfer files and settings by using a network
Click A Network
Click This is my old computer
Start WET on the source computer
Click Next
On the destination computer, enter WETkey and then click Next
WET creates WET key
3
4
1
2
6
5
Click Transfer and proceed with the wizard
7
Source Computer
Destination Computer
On destination computer:
Prepare for the migration on the destination computer
Click Next
Select transfer method
Close all active programs
Start Windows Easy Transfer
Click I need to install now (if source computer does not have WET)
Click This is my new computer
3
4
1
2
6
5
Select destination media and save WET files7
Destination Computer
To migrate by using WET:
WET is the recommended tool for scenarios in which you have a small number of computers to migrate
Store the Windows 7 WET files to be Used on the Source Computer
Migrate Files and Settings from the Source Computer to the Destination Computer by using:
Windows Easy Transfer cable
Network
Removable media or a network share
1
2
Migrating User Settings and Data by Using WET
Lesson 4: Performing an Image-Based Installation of Windows 7
What Is Windows Imaging File Format?
Tools for Performing an Image-Based Installation
Image-Based Installation Process
Demonstration: Building an Answer File by Using Windows SIM
Building a Reference Installation by Using SysPrep
Demonstration: Creating Bootable Windows PE Media
Capturing and Applying the Installation Image by Using ImageX
Demonstration: Modifying Images by Using DISM
Migrating User Data and Settings by Using USMT 4.0
Configuring VHDs
3/11/2014
20
What Is Windows Imaging File Format?
Provides the following benefits:
One image for many hardware configurations
Compression and single instancing
Multiple images in one file
Offline servicing of the image file
Installation on partitions of any size
Nondestructive deployments
Modification of image files using APIs
Bootable image support for Windows PE
A file-based image technology used to install the Windows operating system
Tools for Performing Image-Based Installation
Windows Setup (setup.exe)
Answer File
Catalog
Windows Automated Installation Kit (Windows AIK)
Windows System Image Manager (Windows SIM)
Windows Preinstallation Environment (Windows PE)
ImageX
User State Migration Tool (USMT)
Deployment Image Servicing and Management (DISM)
Sysprep
Diskpart
Windows Deployment Services (WDS)
Virtual Hard Disk (VHD)
3/11/2014
21
Image-Based Installation Process
Build an Answer File1
Build a reference installation2
Create a bootable Windows PE Media3
Capture the installation image4
Deploy the installation image5
Demonstration: Building an Answer File by Using Windows SIM
10 min
In this demonstration, you will learn how to create an answer file by using Windows SIM.
3/11/2014
22
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Prepares an installation of Windows for duplication, auditing, and delivery
Building a Reference Installation by Using SysPrep
Use Sysprep to:
Remove system-specific data from the Windows operating system
Configure Windows to start in audit mode
Configure the Windows operating system to start the Windows Welcome phase
Reset Windows Product Activation
Sysprep.exe [/quiet] [/generalize] [/audit | oobe] Sysprep.exe [/quiet] [/generalize] [/audit | oobe] [/reboot | /shutdown | /quit] [/unattend:answerfile]
3/11/2014
23
Demonstration: Creating Bootable Windows PE Media
5 min
In this demonstration, you will see how to create bootable Windows PE media that can be used for imaging computers.
A command-line tool that is used to capture, modify, and apply file-based WIM images
Capturing and Applying the Installation Image by Using ImageX
Use ImageX to:
View the contents of a WIM file
Capture and apply images
Mount images for offline image editing
Store multiple images in a single file
Compress the image files
Implement scripts for image creation
ImageX [/flags EditionID] [{/dir | /info | /capture | /apply | /append | /delete | /export | /mount | /mountrw | /unmount | /split} [Parameters]
3/11/2014
24
Demonstration: Modifying Images by Using DISM
5 min
In this demonstration, you will see how to modify an image by using DISM.
Migrating User Settings and Data by Using USMT 4.0
A scriptable command-line tool that provides a highly-customizable user-profile migration
experience for IT professionals
Scanstate [StorePath] [/i:[path\]FileName] [Options]Loadstate [StorePath] [/i:[path\]FileName] [Options]
USMT components:
ScanState and LoadState
Config.xml and Migration .xml files
Component manifests for Windows Vista, Windows 7, and down-level manifests for Windows XP
USMT internal files
3/11/2014
25
Configuring VHDs
Create VHD
DiskPart Tool
Disk Management MMC
Attach VHD to the host computer
Prepare VHD
Install Windows 7 to the VHD
Deploy VHD
Copy VHD to computer to run in VM
Copy VHD to computer to run in Native Boot
Add a Native Boot VHD to the Boot Menu
Use WDS to deploy VHD images for native boot
A native-boot VHD is a VHD that can be used as the running operating system on a computer without a
parent operating system
Lesson 5: Configuring Application Compatibility
Common Application Compatibility Problems
Common Mitigation Methods
Updating Shims
3/11/2014
26
Common Application Compatibility Problems
Common Application Compatibility problems may relate to the following areas:
Setup and installation of applications
User Account Control
Windows Resource Protection (WRP)
Internet Explorer Protected Mode
64-bit architecture
Windows Filtering Platform (WFP)
Operating system version changes
Kernel-mode drivers
Deprecated components
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
27
Common Mitigation Methods
Common mitigation methods include:
Modifying the application configuration
Applying updates or service packs
Upgrading the application
Modifying the security configuration
Running the application in a virtualized environment
Using application compatibility features built into the operating system
Selecting another application
Updating Shims
A shim is software, added to an existing application or other program, to provide some form of enhancement or stability
In the application compatibility context, a shim refers to a compatibility fix
Use the Compatibility Administrator Tool to:
To deploy a compatibility fix:
Search for a compatibility fix for an existing application
Create a new compatibility fix
Store the compatibility fix database locally or in a network location
Use the Sdbinst.exe command-line tool to install the compatibility fix
3/11/2014
28
Lab: Installing and Configuring Windows 7
Exercise 1: Migrating Settings by Using Windows Easy Transfer
Exercise 2: Configuring a Reference Image
Exercise 3: Deploying a Windows 7 Image
Logon information
Virtual machines6292A-LON-DC16292A-LON-CL16292A-LON-VS1
User name Contoso\Administrator
Password Pa$$w0rd
Estimated time: 90 minutes
Lab Scenario
The first batch of Windows 7 computers has arrived. As part of the deployment process, you need to migrate user settings from existing Windows XP computers to the new Windows 7 computers.
You are rolling out Windows 7 to the computers in your organization. To do this you are creating a reference image of Windows 7 that can be applied to other computers. The image is generalized by using Sysprep.
You are performing a manual test of the deployment process for new images. Eventually, this process will be automated. In this test run, you are ensuring that you have the correct syntax for all of the commands used to start the capture of user settings from the old computer, apply the reference image to the new computer, and then apply user settings to the new computer.
3/11/2014
29
Lab Review
Why do you use Sysprep before capturing an image?
Why is Windows PE required as part of the imaging process?
Module Review and Takeaways
Review Questions
Common Issues and Troubleshooting Tips
Best Practices
Tools
3/11/2014
30
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Module 2
Configuring Disks and Device Drivers
3/11/2014
31
Module Overview
Partitioning Disks in Windows 7
Managing Disk Volumes
Maintaining Disks in Windows 7
Installing and Configuring Device Drivers
Lesson 1: Partitioning Disks in Windows 7
What Is an MBR Disk?
What Is a GPT Disk?
Disk Management Tools
Demonstration: Converting an MBR Partition to a GPT Partition
3/11/2014
32
What Is an MBR Disk?
Is created when the disk is partitioned
Is on the first sector of the hard disk
Contains a four partition entry table
Limits the number & size of partitions
Master Boot Record (MBR) DiskThe MBR contains the partition table for the disk and a small
amount of executable code called the master boot code.
What Is a GPT Disk?
GUID Partition Table(GPT)Contains an array of partition entries describing the start and end LBA of each partition on disk
Supports more partitions
Supports larger partitions
Enhances reliability
Supports boot disks on 64-bit Windows operating systems, UEFI systems
3/11/2014
33
Diskpart.exe
Scriptable command line utility
Create scripts to automate disk-related tasks
Always runs locally
Disk Management Snap-in
Graphical user interface
Manage disks and volumes, both basic and dynamic, locally or on remote computers
Simple partition creation
Disk Management Tools
Use diskpart.exe to convert partition styles
MBR GPT
Disk Management Snap-in
Graphical user interface
Manage disks and volumes, both basic and dynamic, locally or on remote computers
Simple partition creation
Diskpart.exe
Scriptable command line utility
Create scripts to automate disk-related tasks
Always runs locally
Use diskpart.exe to convert partition styles
MBR GPT
Disk Management Tools
Disk Management Snap-in
Graphical user interface
Manage disks and volumes, both basic and dynamic, locally or on remote computers
Simple partition creation
Diskpart.exe
Scriptable command line utility
Create scripts to automate disk-related tasks
Always runs locally
Use diskpart.exe to convert partition styles
MBR GPT
3/11/2014
34
Demonstration: Converting an MBR Partition to a GPT Partition
In this demonstration, you will see how to:
Convert a Disk to GPT by using Diskpart.exe
Convert Disk 3 to GPT by using Disk Management
Verify the Disk Type
10 min
Lesson 2: Managing Disk Volumes
What Is a Simple Volume?
Demonstration: Creating a Simple Volume
What Are Spanned and Striped Volumes?
Demonstration: Creating Spanned and Striped Volumes
Purpose of Resizing a Volume
Demonstration: Resizing a Volume
3/11/2014
35
What Is a Simple Volume?
Simple VolumeDynamic volume that encompasses available
free-space from a single, dynamic, hard disk drive
Can be extended on same disk
Can be extended across disks creating a Can be extended across disks creating a spanned volume
Not fault tolerant
Volume I/O performance the same as Disk Volume I/O performance the same as Disk I/O performance
Demonstration: Creating a Simple Volume
In this demonstration, you will see how to create a simple volume by using Disk Management and Diskpart.exe.
10 min
3/11/2014
36
Spanned
A spanned volume joins areas of unallocated space disks into a single logical disk.
Striped
A striped volume maps stripes of data cyclically across the disks.
Striped
Requires multiple dynamic disks
Allocated space from each disk must be identical
Well suited for isolating the paging file
No fault tolerance
Up to 32 disks can be combined into single striped volume
Provides for faster throughput
Spanned
Requires dynamic disks
Space allocated from multiple dynamic disks
Up to 32 disks can be combined into single spanned volume
No fault tolerance
No performance improvement compared to simple volumes
Can shrink or extend
What Are Spanned and Striped Volumes?
Striped
Requires multiple dynamic disks
Allocated space from each disk must be identical
Well suited for isolating the paging file
No fault tolerance
Up to 32 disks can be combined into single striped volume
Provides for faster throughput
Spanned
Requires dynamic disks
Space allocated from multiple dynamic disks
Up to 32 disks can be combined into single spanned volume
No fault tolerance
No performance improvement compared to simple volumes
Can shrink or extend
What Are Spanned and Striped Volumes?
3/11/2014
37
Demonstration: Creating Spanned and Striped Volumes
In this demonstration, you will see how to:
Create a spanned volume
Create a striped volume
10 min
Purpose of Resizing a Volume
Before shrinking:
Defragment the disk
Reduce shadow copy disk space consumption
Ensure that no page files are stored on the volume to be shrunk
Resize a volume to create additional, unallocated space to use for data or programs on a new volume.
Shrink simple and spanned dynamic disks to:
Extend the simple volume on the same disk
Extend a simple volume to include unallocated space on other disks on the same computer
3/11/2014
38
Demonstration: Resizing a Volume
In this demonstration, you will see how to:
Shrink a volume by using Diskpart.exe
Extend a volume by Disk Management
5 min
Lesson 3: Maintaining Disks in Windows 7
What Is Disk Fragmentation?
Defragmenting a Disk
What Are Disk Quotas?
Demonstration: Configuring Disk Quotas (Optional)
3/11/2014
39
What Is Disk Fragmentation?
Disk fragmentation can:
Consist of both fragmented files and fragmented free space
Lead to poor performance of the disk subsystem
Disk fragmentation is the non-contiguous storage of data on a volume
Defragmenting a Disk
Rearrange data and reunite fragmented files
Scheduled to run automatically by default
Can be run from the command-lineC:>
3/11/2014
40
What Are Disk Quotas?
A disk quota is a way for you to limit use of disk space on a volume for each user to conserve disk space.
Disk quotas help you:
Track and restrict disk consumption
Proactively monitor available space
Determine who is consuming available space
Plan for storage capacity increases
Demonstration: Configuring Disk Quotas (Optional)
In this demonstration, you will see how to:
Create quotas in a Volume
Test a quota
Review quota alerts and event-log messages
12 min
3/11/2014
41
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
42
Lesson 4: Installing and Configuring Device Drivers
Overview of Device Drivers in Windows 7
Installing Devices and Drivers
Device Driver Management Tools
Options for Updating Drivers
Managing Signed Drivers
Discussion: Options for Recovering from a Driver Problem
Demonstration: Managing Drivers
Overview of Device Drivers in Windows 7
A driver is a small software program that allows a hardware device to communicate with a computer.
Drivers developed for the 32-bit versions do not work with the 64-bit versions, and vice versa.
Device drivers that ship with Windows 7 have a Microsoft digital signature.
The driver store is the driver repository.
Device metadata packages contain device experience XML documents that represent:
The properties of the device
The device functions
Applications and services that support the device.
3/11/2014
43
Installing Devices and Drivers
Improve end-user device driver installation by:
Configuring client computers to automatically search a specified list of folders
Search folders specified by the DevicePath registry entry
Staging driver packages in the protected driver store
Add to the Driver Store by using the Plug-and-Play utility (Pnputil.exe) at a Command Prompt
Device Manager
Helps install and update drivers for hardware devices, change the hardware settings for those devices, and troubleshoot problems
Use Device Manager to manage devices only on a local computer
this location are usually
Devices and Printers
Provides a place to manage devices
Devices that display in this location are usually external devices that you connect or disconnect from the computer through a port or network connection
Device Manager Device StageDevices and PrintersDevice Stage
Provides users with a way to access devices and advanced options for managing them
Devices in use are shown on the taskbar with a photo-realistic icon
Device Driver Management Tools
3/11/2014
44
Device Manager Device StageDevices and Printers
Device Driver Management Tools
Options for Updating Drivers
Dynamic Update
Windows Update
Manufacturers media or Web site
Device Manager
Compatibility Report
Works with Windows Update to download critical fixes and device drivers required for the setup process
Updates the driver software for the device manually
Use the media or browse to the device manufacturers Web site to obtain an updated driver
Use this report to load a new or updated driver during Use this report to load a new or updated driver during an upgrade
Delivers software updates and drivers, and provides automatic updating options
3/11/2014
45
Managing Signed Drivers
Benefits of signing and staging driver packages Benefits of signing and staging driver packages
Maintaining signed drivers
Improved security
Reduced support costs
Better user experience
Use Sigverif.exe to check for unsigned device drivers
Use a Command Prompt to run the driverquery command with the /si switch to obtain a basic list of signed and unsigned device drivers
Use Group Policy to deploy certificates to client computers
Discussion: Options for Recovering from a Driver Problem
1. How often have new devices and their associated drivers introduced reliability problems on computers that you manage?
2. What are possible ways of recovering from a driver problem? Describe a situation in which you might use each recovery method to resolve a driver problem.
15 min
3/11/2014
46
Demonstration: Managing Drivers
In this demonstration, you will see how to:
Update a device driver
Roll back a device driver
Install a driver into the driver store
12 min
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
47
Lab: Configuring Disks and Device Drivers
Exercise 1: Configuring Disks
Exercise 2: Configuring Disk Quotas (Optional)
Exercise 3: Updating a Device Driver
Logon information
Virtual machine6292A-LON-DC16292A-LON-CL1
User name Contoso\Administrator
Password Pa$$w0rd
Estimated time: 30 minutes
Lab Scenario
A Windows 7 computer is used for rendering large engineering drawings. It requires expanded disk space and fast disks. Initially a simple volume is requested, but then an application requires a separate drive letter and the simple volume must be shrunk. Then, more disk space is required, so a spanned volume is created. Finally, a striped volume is created to enhance performance.
Some of the employees at the engineering company work on a shift basis. Disk quotas need to be created for people who share computers on a shift basis and to see which user is using how much disk space allocated.
As the volume of work increases, some of the devices are not functioning as required. Your task is to perform an update of the drivers for those devices.
3/11/2014
48
Lab Review
1. In Exercise 1, you used the assign command in diskpart to assign a drive letter to a newly created volume. Instead of assigning a drive letter, what else can you do?
2. In Exercise 2, you used local disk quotas to manage disk consumption. Although this is a useful local management tool, in an enterprise network based on Windows Server 2008, what other disk space management tools can you use?
3. In Exercise 3, you used driver roll back to reverse a driver update you made. If your computer will not start properly, how can you address a driver-related problem?
Module Review and Takeaways
Review Questions
Common Issues
Best Practices
Tools
3/11/2014
49
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
50
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
51
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Module 3
Configuring File Access and Printers on Windows 7
Clients
3/11/2014
52
Module Overview
Overview of Authentication and Authorization
Managing File Access in Windows 7
Managing Shared Folders
Configuring File Compression
Managing Printing
Lesson 1: Overview of Authentication and Authorization
What Are Authentication and Authorization?
Authentication and Authorization Process
New Authentication Features in Windows 7
3/11/2014
53
What Are Authentication and Authorization?
User Resource
Who are you?
Authentication: Verifying the identity of something or someone
Are you on the list?
Authorization: Determining whether something or someone has permission to access a resource
What does the list say you can do?
Access: Determining what actions something or someone can perform on the resource based on permission levels
Authentication and Authorization Process
Windows Authentication
MethodDescription
Kerberos version 5 protocol
Used by Windows 7 clients and servers running Microsoft Windows Server 2000 or later
NTLMUsed for backward compatibility with computers running pre-Windows 2000 operating systems and some applications
Certificate mapping Certificates are used as authentication credentials
Windows authentication methods include:
3/11/2014
54
New Authentication Features in Windows 7
Biometrics
Windows Biometric Framework (WBF) provides support for fingerprint biometric devices through a new set of components
A common API facilitates development of applications A common API facilitates development of applications using biometrics
Through a new Control Panel item, users can control the availability and use of biometric devices
Device Manager support for managing drivers for biometric devices
Group Policy settings to enable, disable, or limit the use of biometric data for a local computer or domain
Smart Cards
Smart card-related Plug and Play
Kerberos support for Smart card logon
Encrypt removable media using BitLocker and using the Smart card option to unlock the drive
Document and e-mail signing
Used with line-of-business applications to enable certificate use with no additional middleware
Online Identity Integration
A new group policy setting is available that controls the ability of online IDs to authenticate to a computer
Online IDs can be used to identify individuals within a network
Users must link their Windows user account to an online ID to facilitate authentication
Authentication occurs through the use of certificates
Does not affect domain accounts or local user accounts from logging on to the computer
Notes Over-flow Slide
General information
If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.
The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.
Printing Hidden Slides
Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides
Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides
3/11/2014
55
New Authentication Features in Windows 7
New Authentication
FeaturesDescription
Smart cards
Several new authentication features are available for use with Smart cards, including:
Kerberos support for Smart card logon
Encrypt removable media using BitLocker and using the Smart card option to unlock the drive
Document and e-mail signing
BiometricsWindows Biometric Framework (WBF) provides support for fingerprint biometric devices through a new set of components
Online Identity Integration
A new group policy setting is available that controls the ability of online IDs to authenticate to a computer
Lesson 2: Managing File Access in Windows 7
What Are NTFS Permissions?
What Is Permission Inheritance?
Demonstration: Configuring NTFS Permissions for Files and Folders
Impact of Copying and Moving Files and Folders on Set Permissions
What Are Effective Permissions?
Discussion: Determining Effective Permissions
3/11/2014
56
NTFS file and folder permissions
What Are NTFS Permissions?
Define the type of access granted to a user, group, or computer for a file or folder
What Is Permission Inheritance?
Explicit Permission: User creates a file or folder and assigns permissions
Allow Read;Deny Write
Inherited Permission: File or folder permissions for a child object default from its parent
Allow Read; Allow Write
When Permission Inheritance is blocked
Perform one of the following:
Copy existing group or user permissions to the child file or folder
Start with blank permissions on the child file or folder and configure a unique set of permissions
3/11/2014
57
What Is Permission Inheritance?
Explicit Permission: User creates a file or folder and assigns permissions
Allow Read;Deny Write
Inherited Permission: File or folder permissions for a child object default from its parent
Allow Read; Allow Write
Demonstration: Configuring NTFS Permissions for Files and Folders
In this demonstration, you will see how to:
Create a folder and a document file
Grant selected users Write access to the file
Deny selected users Write access to the file
Verify the Deny permissions on the file
10 min
3/11/2014
58
Notes Over-flow Slide
General information
If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.
The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.
Printing Hidden Slides
Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides
Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides
Impact of Copying and Moving Files and Folders on Set Permissions
NTFS Partition C:\Copy or Move
NTFS Partition E:\
When you copy or move a file or folder to a different NTFS partition
Full Control Allow ReadDeny Write
The file or folder inherits permissions from the destination folder
NTFS Partition C:\
Allow ReadDeny Write
The file or folder inherits permissions from the new parent folder
When you copy or move a file or folder within an NTFS partition
Copy or Move
When moving a file or folder that has explicitly assigned When moving a file or folder that has explicitly assigned permissions, those permissions are retained in addition to the newly inherited permissions
Allow ReadDeny Write
3/11/2014
59
Impact of Copying and Moving Files and Folders on Set Permissions
When you copy or move a file or folder to a different NTFS partition
The file or folder inherits permissions from the destination folder
When you copy or move a file or folder within an NTFS partition
The file or folder inherits permissions from the new parent folder
When moving a file or folder that has explicitly assigned permissions, those permissions are retained in addition to the newly inherited permissions
What Are Effective Permissions?
When determining effective permissions:
User and group permissions are combined
Deny permissions override allow permissions
The Effective Permissions feature:
Calculates and displays the permissions granted to a user or group
Determines all domain and local groups in which the user is a member
Takes into account permissions inherited from the parent object
Effective permissions are a file or folders final, combined permission set that is determined by Windows 7 when a file or folder contains both user and group permissions.
3/11/2014
60
Discussion: Determining Effective Permissions
Users Group
Sales Group
User1
Users group hasWrite for Folder1
Sales group hasRead for Folder1
1
Users group hasRead for Folder1
Sales group hasWrite for Folder2
2
Users group hasModify for Folder1
File2 must only be available to Sales group with Read permission
3
NTFS Partition
File2
Folder1
Folder2
File1
Lesson 3: Managing Shared Folders
What Are Shared Folders?
Methods of Sharing Folders
Discussion: Combining NTFS and Share Permissions
The Network and Sharing Center
3/11/2014
61
What Are Shared Folders?
The default shared folders permission is Full Control for the user that shared the folder
You can share folders, but you cannot share individual files
Folders can be shared:
In the MMC console using the Shares snap-in
In Windows Explorer
Through the command line using the Net Share command
Through Computer Management
Shared folders are folders that allow network access totheir content
Methods of Sharing Folders
Basic Sharing
Advanced Sharing
Public Folder Sharing
Access controlled by permissions
Public Folder SharingPublic Folder Sharing
Files shared with same network
Files shared with same computer
Multiple default Public folders for each computer
Basic Sharing
Allows you to share folders quickly
You configure permissions
Advanced SharingAdvanced Sharing
Configure caching
Configure permissions
Choose share name
Configure simultaneous connections
3/11/2014
62
Methods of Sharing Folders
Basic Sharing
Allows you to share folders quickly
You configure permissions
Advanced Sharing
Configure permissions, simultaneous connections, and caching
Choose share name
Public Sharing
Multiple default Public folders for each computer
Files shared with same computer and with same network
Access controlled by permissions
Discussion: Combining NTFS and Share Permissions
1. If a user is assigned Full Control NTFS permission to a file but is accessing the file through a share with Read permission, what will be the effective permission the user will have on the file?
2. If you want a user to view all files in a shared folder but you can modify only certain files in the folder, what permissions would you give?
3. Identify a scenario at your organization in which you may have to combine NTFS and Share permissions. What is the reason for combining permissions?
10 min
When you create a shared folder on an NTFS formatted partition, both the shared folder permissions and the NTFS file system permissions are combined to secure file resources.
By default, the Everyone group is granted the shared folder permission Read
file and subfolder in a shared folder and the appropriate shared Users must have the appropriate NTFS permissions for each file and subfolder in a shared folder and the appropriate shared folder permissions to access those resources
The share permissions on a folder apply to that folder, to all files in that folder, to sub folders, and to all files in those subfolders
When NTFS and shared folder permissions are combined, the resulting effective permission is the most restrictive one of the two permission sets
3/11/2014
63
Discussion: Combining NTFS and Share Permissions
1. If a user is assigned Full Control NTFS permission to a file but is accessing the file through a share with Read permission, what will be the effective permission the user will have on the file?
2. If you want a user to view all files in a shared folder but you can modify only certain files in the folder, what permissions will you give?
3. Identify a scenario at your organization in which you may have to combine NTFS and Share permissions. What is the reason for combining permissions?
10 min
The Network and Sharing Center
Provides centralized control of network features
Network Map
Network Location private, public, domain
Network Discovery
Controls sharing capabilities related to various network resources:
File sharing
Public folder sharing
Printer sharing
Media sharing
The Network and Sharing Center provides services to view, configure, and troubleshoot your network access and sharing
capabilities
3/11/2014
64
Notes Over-flow Slide
General information
If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.
The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.
Printing Hidden Slides
Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides
Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides
The Network and Sharing Center
Provides centralized control of network features
Network Map
Network Location private, public, domain
Network Discovery
Controls sharing capabilities related to various network resources:
File sharing
Public folder sharing
Printer sharing
Media sharing
The Network and Sharing Center provides services to view, configure, and troubleshoot your network access and sharing
capabilities
3/11/2014
65
Lesson 4: Configuring File Compression
What Is NTFS File Compression?
Impact of Moving and Copying Compressed Files and Folders
What Are Compressed (Zipped) Folders?
Demonstration: Compressing Files and Folders
What Is NTFS File Compression?
NTFS file compression is the method used by the NTFS file system to compress files, folders, and volumes
Uses compression to save disk space
Does not use compression for system files and folders
Compression is configured asan NTFS attribute
NTFS calculates disk spacebased on uncompressed file size
Applications that open a compressed file only see theuncompressed data
File prior to compression
File after compressionFile after
compression
3/11/2014
66
What Is NTFS File Compression?
NTFS file compression is the method used by the NTFS file system to compress files, folders, and volumes
Uses compression to save disk space
Does not use compression for system files and folders
Compression is configured asan NTFS attribute
NTFS calculates disk spacebased on uncompressed file size
Applications that open a compressed file only see theuncompressed data
File prior to compression
File after compressionFile after
compression
Discussion: Impact of Moving and Copying Compressed Files and Folders
From NTFS Partition To FAT PartitionD
To NTFS PartitionsFrom NTFS PartitionsC
Within an NTFS PartitionBWithin an NTFS PartitionA
Inherits compression state of the target folder
Retains its original compression state
No Compression
Copy Move
Copy
Move
Copy
Move
Inherits compression state of the target folder
3/11/2014
67
Discussion: Impact of Moving and Copying Compressed Files and Folders
From NTFS Partition To FAT PartitionD
To NTFS PartitionsFrom NTFS PartitionsC
Within an NTFS PartitionBWithin an NTFS PartitionA
Copy Move
Copy
Move
Copy
Move
What Are Compressed (zipped) Folders?
Compressed folders can contain multiple files and folders that are compressed to reduce the overall storage space for the content
A compressed folder with a .zip extension is created. Note the reduced file size.
3/11/2014
68
What Are Compressed (zipped) Folders?
Compressed folders can contain multiple files and folders that are compressed to reduce the overall storage space for the content
A compressed folder with a .zip extension is created. Note the reduced file size.
Demonstration: Compressing Files and Folders
In this demonstration, you will see how to:
Compress a folder
Copy files into the compressed folder
Move compressed files into an uncompressed folder
Copy compressed files into an uncompressed folder
Compress a folder by using the Compressed (zipped) Folder feature
10 min
3/11/2014
69
Notes Over-flow Slide
General information
If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.
The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.
Printing Hidden Slides
Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides
Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides
Notes Over-flow Slide
General information
If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.
The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.
Printing Hidden Slides
Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides
Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides
3/11/2014
70
Lesson 5: Managing Printing
Printing Components in Windows 7
XPS and GDI-Based Printing
Demonstration: Installing and Sharing a Printer
Managing Client-Side Printing
Configuring Location-Aware Printing
Printing Components in Windows 7
3/11/2014
71
Printing Components in Windows 7
XPS and GDI-Based Printing
GDI-based printing
Is used by legacy applications in pre-Vista versions of Windows Uses enhanced metafile format (EMF) as the spool file format Requires a printer driver unique to each printer model
XPS-based printing
XPS is a new document description language Requires an XPS printer driver Is used only by WPF applications Generates a spool file in XPS format
Interoperability of XPS and GDI-based printing
XPS-based printing can print to an older GDI-based printer by converting print jobs from XPS to EMF format
GDI-based printing can print to a new XPS-based printer by converting print jobs from EMF to XPS format
3/11/2014
72
Demonstration: Installing and Sharing a Printer
In this demonstration, you will see how to:
Create and share a local printer
Set permissions on the printer
10 min
Notes Over-flow Slide
General information
If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.
The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.
Printing Hidden Slides
Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides
Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides
3/11/2014
73
Managing Client-Side Printing
Print Management TasksDevices and Printers
Managing Client-Side Printing
Print Management Tasks
3/11/2014
74
Configuring Location-Aware Printing
Configuring Location-Aware Printing
3/11/2014
75
Lab: Configuring File Access and Printers on Windows 7 Client Computers
Exercise 1: Create and Configure a Shared Folder for All Users
Exercise 2: Configuring Shared Access to Files for Specific Users
Exercise 3: Create and Share a Local Printer
Logon information:
Virtual machine6292A-LON-DC1 6292A-LON-CL1 6292A-LON-CL2
User name Administrator
Password Pa$$w0rd
Estimated time: 30 minutes
Lab Scenario
A group of engineering users need to share files on the Windows 7 computers. All computers are in a domain. The most powerful Windows 7 computer has many files that other users need to access. Most files can be shared among all users; however, the more sensitive files can only be accessed by selected users. The Windows 7 computer has a printer attached to it that other users want to access from their own computers.
As the IT professional assigned to this account, you have outlined the following tasks that must be performed to satisfy these requirements:
Create a public share for the files that all users must be able to access
Create a new share for some specific files that only selected users can access
Share a printer on the workstation that can be accessed by other users
3/11/2014
76
Lab Review
You created the shared folder for all users.
How can you simplify the process for users to access the folder from their computers?
You need to ensure that only specific users can access a shared folder across the network when they are logged on the computer with the shared folder.
How do you configure the permissions?
You need to ensure that users can manage only the print jobs that they have sent to a shared printer. Members of the HelpDesk group must be able to delete all print jobs.
How do you configure the printer permissions?
Module Review and Takeaways
Review questions
Best Practices
Tools
3/11/2014
77
Notes Over-flow Slide
General information
If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.
The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.
Printing Hidden Slides
Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides
Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides
Notes Over-flow Slide
General information
If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.
The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.
Printing Hidden Slides
Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides
Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides
3/11/2014
78
Module 4
Configuring Network Connectivity
Module Overview
Configuring IPv4 Network Connectivity
Configuring IPv6 Network Connectivity
Implementing Automatic IP Address Allocation
Overview of Name Resolution
Troubleshooting Network Issues
3/11/2014
79
Lesson 1: Configuring IPv4 Network Connectivity
What Is an IPv4 Address?
What Is a Subnet Mask?
What Is a Default Gateway?
What Are Public and Private IPv4 Addresses?
Demonstration: Configuring an IPv4 Address
An IPv4 address identifies a computer to other computers on a network.
What Is an IPv4 Address?
IP Address192.168.1.201
IP Address192.168.1.202
IP Address192.168.1.200
Subnet 2
IP Address192.168.2.182
IP Address192.168.2.180
IP Address192.168.2.181
Subnet 1Subnet 1
Dotted decimal representation of the address
3/11/2014
80
An IPv4 address identifies a computer to other computers on a network.
What Is an IPv4 Address?
IP Address192.168.1.201
IP Address192.168.1.202
IP Address192.168.1.200
Subnet 2
IP Address192.168.2.182
IP Address192.168.2.180
IP Address192.168.2.181
Subnet 1
What Is a Subnet Mask?
A subnet mask specifies which part of an IPv4 address is the network ID and which part of the
IPv4 address is the host ID.
This is a simple Class C type IPv4 number. There are 3 octets for the network ID
and 1 octet for the host ID.
Network IDxw y z
192 168 1 0
Subnet maskxw y z
255 255 255 0
This is the network ID for this number. This network ID is shared by all the
hosts on the same subnet
IP addressxw y z
192 168 1 200
This is the host ID in the fourth octet. Note: This host ID is 200 of 254 hosts on this specific subnet.
3/11/2014
81
What Is a Subnet Mask?
A subnet mask specifies which part of an IPv4 address is the network ID and which part of the
IPv4 address is the host ID.
Network IDxw y z
192 168 1 0
Subnet maskxw y z
255 255 255 0
IP addressxw y z
192 168 1 200
A default gateway is a device, usually a router, on a TCP/IP internet that forwards IP packets to
other subnets.
What Is a Default Gateway?
Use a default gateway when the internal routing table on the host has no information about
the destination subnet.
Router
Default gateway
Subnet 2
Windows 7 clients
Subnet 1
Windows 7 clients
3/11/2014
82
A default gateway is a device, usually a router, on a TCP/IP internet that forwards IP packets to
other subnets.
What Is a Default Gateway?
Router
Default gateway
Subnet 2
Windows 7 clients
Subnet 1
Windows 7 clients
What Are Public and Private IPv4 Addresses?
Private
Non-routable on the Internet
Can be locally assigned by organization
Must be translated to access the Internet
Public
Required by devices and hosts that connect directly to the Internet
Must be unique
Routable on the Internet
Must be assigned by IANA
3/11/2014
83
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Demonstration: Configuring an IPv4 Address
In this demonstration, you will see how to configure a Windows 7 computer with:
An IPv4 address
A subnet mask
A default gateway
10 min
3/11/2014
84
Lesson 2: Configuring IPv6 Network Connectivity
Benefits of Using IPv6
Windows 7 Support for IPv6
What Is the IPv6 Address Space?
IPv6 Address Types
Demonstration: Configuring an IPv6 Address
Benefits of Using IPv6
Benefits of using IPv6 compared to IPv4
Larger address space
More efficient routing
Simpler host configuration
Built-in security
Better prioritized delivery support
Redesigned headers
3/11/2014
85
Windows 7 Support for IPv6
IPv6 is Enabled by Default
Windows 7 uses IPv6 by default to support security needs and additional features
Windows 7 Dual Stack
Windows 7 facilitates the dual stack to use IPv4 and IPv6 simultaneously
Direct Access requires IPv6
Windows 7 clients can use Direct Access which facilitates client computers connecting to the enterprise domain
IPv6 uses Remote Desktop
IPv6 supports Windows 7 File Sharing Security and Echo Systemfeatures such as Remote Access and Direct Access
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
86
The IPv6 address space:
What Is the IPv6 Address Space?
Uses 128 bits as compared to 32-bits that the IPv4 address space uses
Allocates 64-bits for the network ID and 64-bits for the host ID
Uses a prefix to define the network ID
2001:0DB8:0000:0000:02AA:00FF:FE28:9C5A/64
2001:DB8:0:0:2AA:FF:FE28:9C5A/64
Each digit represents four bits
The prefix is a forward slash followed by the number of bits in the network ID
2001:DB8::2AA:FF:FE28:9C5A/64
ShortenShorten
ShortenShorten Shorten the address by dropping leading zeros and using zero compression
Continue shortening the address by dropping contiguous groups of zeros
IPv6 uses hexidecimal notation
The IPv6 address space:
What Is the IPv6 Address Space?
Uses 128 bits as compared to 32-bits that the IPv4 address space uses
Allocates 64-bits for the network ID and 64-bits for the host ID
Uses a prefix to define the network ID
2001:0DB8:0000:0000:02AA:00FF:FE28:9C5A/64
2001:DB8:0:0:2AA:FF:FE28:9C5A/64
2001:DB8::2AA:FF:FE28:9C5A/64
ShortenShorten
ShortenShorten
IPv6 uses hexidecimal notation
3/11/2014
87
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
88
IPv6 Address Types
IPv6 Address Types
Unicast use for one-to-one communication between hosts
Multicast use for one-to-many communication between computers that are defined as using the same multicast address
Anycast use for locating services or the nearest router
IPv6 Unicast Address Types
Global Unicast globally routable and reachable on the IPv6 portion of the Internet
Link-Local use when communicating with neighboring hosts on the same link
Unique Local Unicast equivalent to IPv4 private address spaces, such as 10.0.0.0/8, and have the prefix FD00::/8
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
89
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Demonstration: Configuring an IPv6 Address
In this demonstration, you will see how to:
Manually configure a Windows 7 computer with an IPv6 address
Verify the IP configuration
10 min
3/11/2014
90
Lesson 3: Implementing Automatic IP Address Allocation
Automatic IPv4 Configuration Process
Automatic IPv6 Configuration Process
Demonstration: Configuring a Computer to Obtain an IPv4 Address Dynamically
Troubleshooting Client-Side DHCP Issues
Automatic private IP addressing (APIPA):Automatic private IP addressing (APIPA):
Is used if a DHCP server cannot be contacted
Assigns IP addresses on the 169.254.0.0/16 network
Cannot be used with:
Active Directory
Internet connectivity
Multiple subnets
DNS or WINS servers
IPv4 Client
DHCP Server with IPv4 Scope and
IPv4 SiteLocal Scope
IPv4 Router
IPv4 Static Configuration IPv4 Client
Automatic IPv4 Configuration Process
3/11/2014
91
Automatic private IP addressing (APIPA):Automatic private IP addressing (APIPA):
Is used if a DHCP server cannot be contacted
Assigns IP addresses on the 169.254.0.0/16 network
Cannot be used with:
Active Directory
Internet connectivity
Multiple subnets
DNS or WINS servers
Automatic IPv4 Configuration Process
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
92
Automatic IPv6 Configuration Process
IPv6 Client
DHCP v6 Server with IPv6 Scope and
IPv6 SiteLocal Scope
IPv6 Router
Static Configuration IPv6 Client
Automatic IPv6 Configuration Process
DHCP V6 Server assigns Automatic IPv6 Configuration information to the client.
IP V6 Clients uses DHCP assigned IP Configuration to access network resources
IP V6 Router provides a Gateway to the internet or another Subnet.
IP V6 Static Client does not get automatic configuration from the DHCPv6 Server
Automatic IPv6 Configuration Process
Automatic IPv6 Configuration Process
DHCP V6 Server assigns Automatic IPv6 Configuration information to the client
IP V6 Clients uses DHCP assigned IP Configuration to access network resources
IP V6 Router provides a Gateway to the internet or another Subnet
IP V6 Static Client does not get automatic configuration from the DHCPv6 Server
3/11/2014
93
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Demonstration: Configuring a Computer to Obtain an IPv4 Address Dynamically
In this demonstration, you will see how to:
Automatically configure a Windows 7 computer with an IPv4 address
Verify the IP configuration
10 min
3/11/2014
94
Troubleshooting Client-Side DHCP Issues
IPConfig is used to display IP configuration information and to release and renew addresses
Option Description
/all Displays all IP address configuration information
/release Releases a dynamic IPv4 address lease
/renew Renews a dynamic IPv4 address lease
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
95
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
96
Lesson 4: Overview of Name Resolution
Types of Computer Names
Methods for Resolving Computer Names
Types of Computer Names
Name Description
Host name
Up to 255 characters in length
Can contain alphabetic and numeric characters, periods, and hyphens
Part of FQDN
NetBIOS name
Represent a single computer or group of computers
15 characters used for the name
16th character identifies service
Flat namespace
3/11/2014
97
NetBIOS Name Cache4
WINS Server
Broadcast6DNS Resolver Cache2
Local Host Name1
LMHOSTS File7
DNS Server3 5
Methods for Resolving Computer Names
Lesson 5: Troubleshooting Network Issues
Tools for Troubleshooting Networks
Process for Troubleshooting Networks
Demonstration: Troubleshooting Common Network-Related Problems
3/11/2014
98
Tools for Troubleshooting Networks
Tool Purpose
Event Viewer Enables you to view errors relating to network activity
Windows Network
DiagnosticsHelps to diagnose and resolve network problems
IPCONFIGDisplays IP configuration information and controls the DNS resolver cache
PING and PathPING Verifies basic IP connectivity
TRACERT Verifies a routing path
NSLOOKUP Enables testing of name resolution
Process for Troubleshooting Networks
IPConfigNSlookup
Tracert Ping
Windows NetworkDiagnosticsEvent Viewer
3/11/2014
99
Demonstration: How to Troubleshoot Network-Related Problems
In this demonstration, you will see how to use the TCP/IP troubleshooting tools to help resolve common connectivity problems.
10 min
Lab: Configuring Network Connectivity
Exercise 1: Configuring IPv4 Addressing
Exercise 2: Configuring IPv6 Addressing
Exercise 3: Troubleshooting Network Connectivity
Logon information
Estimated time: 40 minutes
Virtual machine6292A-LON-DC16292A-LON-CL1
User name Contoso\Administrator
Password Pa$$w0rd
3/11/2014
100
Lab Scenario
Laptop computers are being introduced for some of the managers in Contoso Corporation. You need to test how the IPv4 configuration will behave when they are out of the office and a DHCP server is unavailable.
Contoso Corporation is considering the implementation of IPv6 in the internal network. However, none in the organization has much experience with IPv6. You are performing some configuration tests with DHCPv6 to see how it behaves.
A work experience student has been unsuccessful in attempting to resolve an network connectivity problem on a Windows 7 computer. The changes made to the computer have not been documented. You need to restore network connectivity for the computer.
Lab Review
How are APIPA addresses for IPv4 similar to link-local addresses in IPv6?
How can you update a Windows 7 computer to use the correct information after a host record is updated in DNS, but the Windows 7 computer is still resolving the name to the previous IP address?
3/11/2014
101
Module Review and Takeaways
Review Questions
Common Issues
Tools
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
102
Module 5
Configuring Wireless Network Connections
Module Overview
Overview of Wireless Networks
Configuring a Wireless Network
3/11/2014
103
Lesson 1: Overview of Wireless Networks
What Is a Wireless Network?
Wireless Network Technologies
Security Protocols for a Wireless Network
What Is a Wireless Network?
Advantages Extends or replaces wired
infrastructure (wire-free)
Increases productivity for mobile employees
Provides access to internet in public places
Disadvantages
Possible interference
Potential security risk
Additional management
A wireless network:
Two modes:
Interconnected devices connected by radio waves instead of wires or cables
Ad hoc Infrastructure
3/11/2014
104
Wireless Network Technologies
Wireless Broadband:
Provides high-speed wireless internet and data network access
Comparable to wired broadband, such as ADSL or cable modem
Used to have constant connectivity to internet and corporate network
Windows 7 supports for Wireless Broadband:
Driver-based model for mobile broadband devices
Used the same user interface regardless of the provider
StandardMaximum
bit rateRange of frequencies Usage
802.11a 54 Mbps C-Band ISM (5.725 to 5.875 GHz) Not widely used
802.11b 11 Mbps S-Band ISM (2.4 to 2.5 GHz) Widely used
802.11g 54 Mbps S-Band ISM Gaining popularity
802.11n 600 Mbps C-Band and S-Band ISM Gaining popularity, not yet finalized
Windows 7 provides built-in support for all standards, but also depends on:
The wireless network adapter
The wireless network adapter driver
Security
standard
Authentication
methods
Encryption
methodsRemarks
IEEE 802.11 Open system and
shared keyWEP
Weak authentication and encryption. Use is highly
discouraged
IEEE 802.1X EAP authentication
methodsWEP Strong EAP methods provide strong authentication
WPA-Enterprise 802.1X TKIP / AES
Strong authentication (with strong EAP method)
and strong (TKIP) or very strong (AES) encryption
Used for medium and large organizations
WPA-Personal PSK TKIP / AES
Strong authentication (with strong PSK) and strong
(TKIP) or very strong (AES) encryption
Used for home networks or small offices
WPA2-Enterprise 802.1X TKIP / AES
Strong authentication (with strong EAP method)
and strong (TKIP) or very strong (AES) encryption
Used for medium and large organizations
WPA2-Personal PSK TKIP / AES
Strong authentication (with strong PSK) and strong
(TKIP) or very strong (AES) encryption.
Used for home networks or small offices
Security Protocols for a Wireless Network
3/11/2014
105
Lesson 2: Configuring a Wireless Network
Configuring Hardware for Connecting to a Wireless Network
Wireless Network Settings
Demonstration: Connecting to a Wireless Network
Improving the Wireless Signal Strength
Process for Troubleshooting a Wireless Network Connection
Configuring Hardware for Connecting to a Wireless Network
Connect and configure a Wireless Access Point
Configure a wireless network adapter in the client computer
Configuring Client Computers
Connect to a Network dialog box
Command line: netsh wlan
Group policy
3/11/2014
106
General Settings
Connection Settings
Security Type Encryption TypeSecurity tabRight click any network profile
Properties
Security Types
Wireless Network Settings
Control Panel
Network and Internet
Network and Sharing Center
Manage Wireless Networks
In this demonstration, you will see how to:
Connect to a public and open wireless network
Configure an unlisted wireless network
Connect to that network
Connect to the administrative webpage of a wireless AP
Configure the security settings of the wireless AP
Demonstration: Connecting to a Wireless Network
10 min
3/11/2014
107
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
3/11/2014
108
Improving the Wireless Signal Strength
To improve the signal strength:
Ensure close proximity to the wireless AP
Consider installing an external antenna
Check for physical obstructions
Add wireless APs
Check for devices that may cause interference
Consider changing the wireless channel
Review the diagnostic information
3
Identify the problem from the list of problems found
4
Resolve the problem that was identified
5
Diagnose the connection by using Windows Network Diagnostics tool 2
Accessed from:
Right click network icon on System Tray
Click Troubleshoot problems
Attempt to connect to a wireless network 1
Accessed from:
Network and Sharing Center
System Tray
Attempt to connect to a wireless network 1
Diagnose the connection by using Windows Network Diagnostics tool 2
Review the diagnostic information3
Identify the problem from the list of problems found 4
Resolve the problem that was identified 5
Process for Troubleshooting a Wireless Network Connection
3/11/2014
109
Lab: Configuring Wireless Network Connections
Exercise 1: Determine the Appropriate Configuration for a Wireless Network
Exercise 2: Troubleshooting Wireless Connectivity
Estimated time: 30 minutes
Lab Scenario
The Contoso Corporation is implementing Windows 7 desktops throughout their