Microsoft Diagnostics and Recovery Toolset Overview

Size: px
Start display at page:

Download "Microsoft Diagnostics and Recovery Toolset Overview"

Transcription

1 Microsoft Diagnostics and Recovery Toolset Overview Microsoft Diagnostics and Recovery Toolset (DaRT) provides a set of tools that help IT shift desktop repair planning from reactive to proactive, saving time and reducing the challenges associated with troubleshooting and repairing desktop system failures. This white paper offers an overview of DaRT: its benefits, its capabilities, and how to evaluate it.

2 DART OVERVIEW INTRODUCTION 1 Introduction A user frantically calls the Help desk. His PC keeps crashing, and your manager sends you to fix the problem. At the user s desk, you log on to the Windows operating system and use the troubleshooting tools available. You look in Event Viewer for clues, and you determine that the problem is a faulty device driver. You then use the Computer Management console to disable that driver. Windows includes many such tools to help you diagnose and fix problems. But what do you do if you cannot start Windows? Part of the Microsoft Desktop Optimization Pack (MDOP), illustrated below, DaRT helps IT: Easily recover PCs that have become unusable Rapidly diagnose probable causes of issues Quickly repair unbootable or locked-out systems

3 DART OVERVIEW INTRODUCTION 2 DaRT includes fourteen administrative, system and network tools for troubleshooting and desktop recovery, even when Windows Safe Mode or normal boot will not function. For example, recover deleted files or partitions with File Restore or reset lost or forgotten local passwords with Locksmith. Additionally, the DaRT Defender tool ensures that malware is not loaded into the computer s memory and cannot remain hidden by scanning the infected operating system while it is offline. The tools in DaRT provide a foundation for shifting desktop repair procedures from reactive to proactive. Organizations can develop recovery image deployment and support plans that best fit their IT staffing and infrastructure requirements. A proactive approach can help save time and reduce the challenges associated with troubleshooting and repairing system failures, while getting users back to productivity faster without compromising settings, preferences, or user data, as with reimaging. With a desktop repair plan in place, the simple image creation process, coupled with an easy to use tool menu, allows organizations to rapidly deploy, use, and benefit from DaRT. Deploying via bootable media such as CD, DVD, or USB is one of the fastest routes to deployment. However, depending on a company s infrastructure, deploying locally to end-user machines or via network boot servers may provide more long term benefit.

4 DART OVERVIEW WHAT S NEW IN DART 8 3 What s New in DaRT 8 DaRT 8 is the newest version of the toolset, and it is part of the MDOP 2012 release. It includes many new features that Table 1 describes. Table 1 New Features in DaRT 8 Support for new software and hardware platforms: A reimagined DaRT Recovery Image Wizard: Improved Windows PowerShell scripting: Support for Windows 8 and Windows Server 2012 Support for GUID Partition Tables (GPTs) Transparent Unified Extensible Firmware Interface (UEFI) machine boot integration Built on Windows PowerShell cmdlets Native support for USB media deployment Support for WIM and ISO image file formats Ability to create 32- and 64-bit images on a single PC Four new DaRT cmdlets Scripting DaRT recovery images is similar to scripting other imaging processes End-to-end scripting enabled by DISM cmdlets

5 DART OVERVIEW CREATING RECOVERY IMAGES 4 Creating Recovery Images You use the DaRT Recovery Image Wizard to create custom DaRT recovery images. These recovery images start Windows RE, from which you can start the DaRT tools. Microsoft reimagined the DaRT Recovery Image Wizard for DaRT 8. It is built on Windows PowerShell cmdlets, and it can generate scripts that you can use later to rebuild recovery images by using the same settings. It includes native support for USB media deployment, so you no longer have to use an external tool to create bootable USB drives. It also generates WIM images in addition to ISO files. You can more easily deploy recovery images by using your existing deployment infrastructure (see the section titled Deploying Recovery Images ). DaRT supports Windows 8 and Windows Server It has minimal hardware requirements, and both x86 and x64 versions are available. However, DaRT does not support cross-platform recovery images. Creating recovery images by using the DaRT Recovery Image Wizard is simple. On the Start screen, type DaRT and click DaRT Recovery Image to start the wizard. Table 2 on page 5 describes each page of the wizard.

6 DART OVERVIEW CREATING RECOVERY IMAGES 5 Table 2 DaRT Recovery Image Wizard Page Description The wizard bases DaRT recovery images on Windows RE, which Windows 8 and Windows Server 2012 provide. You must use x86 Windows to build 32-bit DaRT recovery images. Likewise, use x64 Windows to build 64-bit DaRT recovery images. You can create recovery images for both system types on a single PC, but you cannot create cross-platform recovery images (i.e., one image that works on both x86 and x64 system types). By default, the wizard enables all DaRT tools for the local user. However, you can disable some or all of the tools for the local user while allowing the Help desk full access to them. For example, you can make extremely powerful tools (e.g., Disk Wipe, Locksmith, and Registry Editor) unavailable to the local user.

7 DART OVERVIEW CREATING RECOVERY IMAGES 6 Using Remote Connection, the Help desk can connect to end users PCs by using the Remote Connection Viewer and use the DaRT tools to troubleshoot and repair their PCs. When you enable remote connections, you can also specify a port number and a welcome message. If you do not specify a port number, Remote Connection will assign a random port number. For more information about Remote Connection, see Using Remote Connection, later in this white paper. This page contains four tabs, each of which allows you to further customize and configure the DaRT recovery image: Drivers. Add device drivers that Windows 8 does not provide in the box. WinPE. Select optional Windows Preinstallation Environment (PE) components to include in the DaRT recovery image. Crash Analyzer. Add the Windows 8 Debugging Tools to the DaRT recovery image. Crash Analyzer relies on the Debugging Tools to analyze memory dump files. You can install them on the computer you are using to create the DaRT recovery image, thereby including them in the image, or you can install them on each PC that you repair. Microsoft recommends including the Debugging Tools in the DaRT recovery image. Download the Windows 8 Debugging Tools as part of the Windows Driver Kit 8.

8 DART OVERVIEW CREATING RECOVERY IMAGES 7 Defender. Microsoft recommends downloading the latest malware definitions from the Internet when you create the recovery image and also when you start Defender on Internet connected PCs. Specify a path and name for the image file. (The wizard will create a subfolder based on the x86 or x64 system type.) New for DaRT 8, the wizard can create WIM image files in addition to ISO files. You can also generate a Windows PowerShell script that will build a DaRT recovery image with the same configuration, and you can add or change files in the DaRT recovery image. When finished, the wizard displays the location where it created the DaRT recovery image and lists the files it created. You can also choose a recordable CD, DVD, or USB drive and click Create Bootable Media to create bootable media without using an external image burner, Windows 7 USB/DVD Download Tool, or other tool. Otherwise, you can deploy the ISO or WIM file using the methods that the section titled Deploying Recovery Images describes.

9 DART OVERVIEW EXPLORING THE DART TOOLS 8 Deploying Recovery Images Support staff would traditionally lug around a DaRT CD, DVD, or USB drive to use the DaRT recovery image. DaRT 8 offers many other deployment choices that are logistically simpler. The end-user and support experience improves greatly when the recovery image is always available locally or remotely. Based on Windows RE, the DaRT recovery image is simply a Windows PE image. As a result, you can generally deploy the DaRT recovery image using the same tools and techniques you use to deploy Windows RE or Windows PE boot images, including the following (see Table 3 on page 9 for a comparison): Local installation. By installing the DaRT recovery image locally, users can start it by using advanced startup options in Windows 8. You can deploy the DaRT recovery image locally by using Microsoft System Center 2012 Configuration Manager, the Microsoft Deployment Toolkit 2012 (MDT 2012), or any other electronic software distribution (ESD) tool. The process automates local installation of DaRT tools on each system by using Reagentc.exe so that DaRT is always available. Network boot. To network-boot the DaRT recovery image, deploy it by using Windows Deployment Services (Windows DS). Deployment via Windows DS can be the quickest and simplest way to make the DaRT recovery image available to connected users in production. This method can also make updating recovery images simpler because you store them centrally instead of locally on each PC. USB drives. DaRT 8 now offers native support in the DaRT Recovery Image Wizard for creating USB media. In previous versions, additional tools (e.g., the Windows 7 USB/DVD Download Tool) were required to install the DaRT recovery image on USB drives. Removable disks. Of course, DaRT has always supported burning the recovery image to CDs or DVDs. However, the new alternatives are far simpler and more convenient.

10 Portability Infrastructure Requirement Availability Centralized Updates Network Requirement Remote Support DART OVERVIEW EXPLORING THE DART TOOLS 9 Table 3 Deployment Choices for DaRT Recovery Images Deployment Method Manual Local Installation Automated Local Installation Window DS USB Drive CD or DVD =good, =better, =best After you start a PC by using media containing a DaRT recovery image, Windows RE asks a few simple questions to initialize the environment. These questions include whether to initialize network connectivity in the background by using DHCP (you can manually configure network connectivity later by using the TCP/IP Configuration tool); which language and keyboard you want to use; and whether you want to start Windows 8, troubleshoot the PC, or turn off the PC. To start the DaRT tools, click Troubleshoot, click Microsoft Diagnostics and Recovery Toolset (see Figure 1 on page10), and then choose the offline Windows installation that you want to troubleshoot. After DaRT starts, you will see the Diagnostics and Recovery Toolset window.

11 Figure 1 Troubleshoot screen DART OVERVIEW EXPLORING THE DART TOOLS 10

12 DART OVERVIEW EXPLORING THE DART TOOLS 11 Exploring the DaRT Tools Figure 2 shows the Diagnostics and Recovery Toolset window. From here, you can launch any of the individual tools that you made available in the DaRT recovery image. You can also use the Solution Wizard to choose the best tool, based on a brief interview. Click Help to see detailed instructions for using each tool. The following sections provide an overview of each tool. Figure 2 Diagnostics and Recovery Toolset Window

13 DART OVERVIEW EXPLORING THE DART TOOLS 12 Registry Editor You can use Registry Editor, which Figure 3 shows, to edit the registry of the offline Windows installation that you are troubleshooting. Tasks include adding, removing, and editing keys and values; and importing REG files. Registry Editor enables you to make registry edits that could help repair a system that will not boot. You can also use Registry Editor to edit values that the offline Windows installation locks while it is running. Figure 3 Registry Editor Notice in Figure 3 that HKEY_CURRENT_USER is missing. That is because a user did not log on to the installed operating system. Instead, Registry Editor populates HKEY_USERS with all the user hive files found in the target installation. Additionally, HKEY_LOCAL_MACHINE does not contain a HARDWARE registry key.

14 DART OVERVIEW EXPLORING THE DART TOOLS 13 Serious problems might occur if you modify the registry incorrectly by using Registry Editor. These problems might require that you reinstall the operating system. Microsoft cannot guarantee that you can solve these problems. Modify the registry at your own risk.

15 DART OVERVIEW EXPLORING THE DART TOOLS 14 Locksmith The Locksmith Wizard (Figure 4) is a simple tool that allows you to set the password for any local account on the offline Windows installation that you are troubleshooting. You do not need to know the current password. However, the password you set must comply with any requirements that a local Group Policy Object (GPO) defines, including password length and complexity. Use this tool in the event that the password for a local account (e.g., the local Administrator account) is unknown. This tool cannot set passwords for domain accounts. Figure 4 Locksmith Wizard Crash Analyzer By using Crash Analyzer, you can quickly determine the cause of an issue by analyzing memory dump files on the offline Windows installation that you are troubleshooting. Based on this

16 DART OVERVIEW EXPLORING THE DART TOOLS 15 information, you can take corrective action. Crash Analyzer can eliminate much of the guesswork involved in diagnosing crashes. For example, if Crash Analyzer reports that a device driver called myfault.sys is the cause, as Figure 5 shows, you can disable the device driver by using the Services and Drivers item in Computer Management (see the Computer Management section). After discovering and disabling the faulty device driver, you can try to start the repaired Windows installation. Figure 5 Crash Analyzer Crash Analyzer requires the Windows 8 Debugging Tools. As described in the Creating Recovery Images section, you can include the Debugging Tools in the DaRT recovery image or you can install them on each PC that you are troubleshooting. Microsoft recommends that you include the tools in the DaRT recovery image. Otherwise, you must locate the Debugging Tools each time you use Crash Analyzer. In addition to the Debugging Tools, Crash Analyzer requires symbol files for the operating system that you are repairing. Symbol files map memory addresses to names, helping to provide

17 DART OVERVIEW EXPLORING THE DART TOOLS 16 meaningful information for troubleshooting. You download the symbol files when you use Crash Analyzer to troubleshoot a PC. (An Internet connection is required while troubleshooting.) Even if you plan to reimage the PC, running Crash Analyzer to determine the cause of the issue is a good idea. The image might have a bad driver that is causing intermittent problems in your environment, and Crash Analyzer can help you see these patterns and improve its stability. If you do not have access to symbols or the Debugging Tools on the PC that you are troubleshooting, you can copy the memory dump file to another PC and use the standalone version of Crash Analyzer to diagnose the issue. After installing DaRT on the PC, type Crash Analyzer on the Start screen, and click Crash Analyzer. File Restore In Windows, the Recycle Bin helps prevent users from permanently deleting files by mistake. However, users sometimes realize that they need a particular deleted file only after emptying the Recycle Bin. In other cases, files are too big to fit in the Recycle Bin, or an application deletes the files. File Restore can help restore such deleted files. Figure 6 on page 17 shows the File Restore user interface. First, you must find the file you want to restore. File Restore has filtering capabilities to help expedite this process. For instance, you can use a file mask to search for specific filename patterns. Additionally, you can limit results to a certain path, date range, or size range. File Restore can even find files in deleted directories. For each file that File Restore finds, it indicates whether recovery is likely or unlikely.

18 DART OVERVIEW EXPLORING THE DART TOOLS 17 Figure 6 File Restore File Restore is not limited to regular disk volumes. File Restore can find and restore files on lost volumes or on volumes that Windows BitLocker Drive Encryption protects. In the first case, File Restore can scan for and locate lost volumes, which you can then search for deleted files. In the second case, File Restore gives you the ability to unlock BitLocker-encrypted volumes by manually providing the recovery password or loading the recovery key from a file.

19 DART OVERVIEW EXPLORING THE DART TOOLS 18 Disk Commander By using Disk Commander, you can recover and repair disk partitions or volumes. As Figure 7 on page 19 shows, you can choose from the following recovery processes: Restore the Master Boot Record (MBR) or the header of the GUID Partition Table (GPT). This option repairs damaged boot code in the MBR on a disk or the header of the GPT, without affecting existing partition tables. Recover one or more lost volumes. This option scans a disk for lost volumes and allows you to recover them. Restore partition tables from Disk Commander backup. This option restores partition tables from a backup. Disk Commander gives you the opportunity to back up partition tables before making changes. Save partition tables to Disk Commander backup. This option backs up partition tables. The backup includes partition table entries and boot sectors for each partition. Microsoft recommends that you back up a disk before using Disk Commander to repair it. By using Disk Commander, you can potentially damage volumes and make them inaccessible. Additionally, changes to one volume can affect other volumes because volumes on a disk share a partition table. Disk Commander does not support recovering deleted BitLockerencrypted volumes.

20 Figure 7 Disk Commander DART OVERVIEW EXPLORING THE DART TOOLS 19

21 DART OVERVIEW EXPLORING THE DART TOOLS 20 Disk Wipe Many organizations simply format PCs hard disks when they donate, recycle, or discard them. However, just formatting the hard disk might not destroy sensitive company or personal data on that disk. As various news accounts have shown, malicious people can get their hands on PCs that companies discard and can recover sensitive data. Disk Wipe, which Figure 8 shows, can erase all data from a disk or volume. Two algorithms are available: You can use a single-pass overwrite or four-pass overwrite, the latter of which meets U.S. Department of Defense standards. After wiping a disk or volume, you cannot recover the data, so verify the size and label of a volume before erasing it. Figure 8 Disk Wipe

22 DART OVERVIEW EXPLORING THE DART TOOLS 21 Computer Management The Computer Management console that you see in Figure 9 on page 22 will be familiar to any IT professional. DaRT tailors the console for the purpose of diagnosing and repairing problems that can prevent the offline Windows installation from booting. The items in this console include the following: System Information. This item displays information about the system that you are repairing. Information includes the Windows version, registered owner and organization, the computer name as known by the installed operating system, and the computer name that DaRT randomly assigned to the system. Event Viewer. This item enables you to view the event logs of the offline Windows installation that you are troubleshooting. You can use Event Viewer to look for entries that can help you diagnose the problem. Autoruns. This item configures the programs that start automatically when the operating system starts. By using Autoruns, you can stop a program from starting automatically when you suspect that the program is preventing Windows from starting. Services and Drivers. This item manages the services and device drivers that start when the target Windows installation starts. For every service and device driver, you see an entry that indicates its startup type, a description, a display name, and so on. You can change the startup type to Boot, System, Automatic, Disabled, or Delayed Auto-start. If you have identified a service or device driver that is preventing the operating system from starting, you can disable it here. Disk Management. This item displays drive information, creates new partitions or volumes, and formats drives. Disk Management in DaRT is similar to Disk Management in Windows.

23 Figure 9 Computer Management DART OVERVIEW EXPLORING THE DART TOOLS 22

24 DART OVERVIEW EXPLORING THE DART TOOLS 23 Explorer Sometimes, before you attempt to repair or reimage a system, you need to salvage businesscritical information that the user stored on a local drive. In DaRT, you can use Explorer to browse the PC s file system and network shares. Because you can map drive letters to network shares, you can easily copy and move files from the system to the network for safekeeping or from the network to the system to restore them. Figure 10 shows Explorer. Figure 10 Explorer Solution Wizard DaRT has many tools, and figuring out which one to use can be confusing initially. The Solution Wizard (Figure 11 on page 24) asks you a series of questions and then recommends the best tool for the job, based on your answers. This wizard helps you determine which tool to use when

25 DART OVERVIEW EXPLORING THE DART TOOLS 24 you are not familiar with the tools in DaRT. After becoming familiar with DaRT, you are more likely to start the correct tool for each job, without the help of the Solution Wizard. Figure 11 Solution Wizard TCP/IP Configuration When you start the DaRT boot media, it obtains its TCP/IP configuration (IP address and DNS server) from DHCP by default. If DHCP is unavailable, you can manually configure TCP/IP by using the TCP/IP Configuration tool, which Figure 12 on page 25 shows. First, you choose a network adapter, and then you configure the IP address and DNS server for that adapter. Click Advanced to configure advanced TCP/IP settings.

26 Figure 12 TCP/IP Configuration DART OVERVIEW EXPLORING THE DART TOOLS 25

27 DART OVERVIEW EXPLORING THE DART TOOLS 26 Hotfix Uninstall The Hotfix Uninstall Wizard, which Figure 13 shows, can remove hotfixes or service packs from the offline Windows installation that you are troubleshooting. Use this tool when a hotfix or service pack is potentially preventing the operating system from starting. Microsoft recommends that you use this tool to uninstall only one hotfix at a time, even though the tool allows you to uninstall more than one at a time. Be aware that programs that you have installed or updated after installing the hotfix might not work correctly after you uninstall the hotfix. Figure 13 Hotfix Uninstall Wizard

28 DART OVERVIEW EXPLORING THE DART TOOLS 27 SFC Scan Use the System File Repair Wizard (Figure 14) to repair system files that are preventing the Windows installation from starting. The System File Repair Wizard can automatically repair system files that are corrupted or missing. Alternatively, the wizard can prompt you before performing any repairs. Figure 14 System File Repair Wizard File Search Before reimaging a PC, recovering files from the local hard disk is important particularly when the user might not have backed up or stored the files elsewhere. Although the Explorer tool can be helpful, File Search can help you find documents when you do not know the file path or when you need to search for general types of files across all the local hard disks. File Search

29 DART OVERVIEW EXPLORING THE DART TOOLS 28 (Figure 15) enables you to search the PC for files. You can search for specific filename patterns in specific paths. Additionally, you can limit results to a date range or size range. In recovery scenarios, when repairing the installed operating system is not possible, you can use File Search to find users documents and copy them from the PC. Figure 15 File Search Windows Defender Offline A good antivirus and anti-malware strategy is crucial to preventing malicious and other potentially unwanted software from negatively impacting your organization Although real-time scanner tools like Microsoft Forefront or Windows Intune Endpoint Protection are vital, today s ever-changing landscape requires many different tools to defend your environment. Malware that uses rootkits can mask itself from the running operating system. If a rootkitenabled virus or spyware makes its way to the system, most real-time scanning and removal

30 DART OVERVIEW EXPLORING THE DART TOOLS 29 tools can no longer see it or remove it. Because Windows Defender Offline scans while the installed operating system is offline, you can attack the rootkit without it hiding from you. Figure 16 shows Windows Defender Offline. It can help detect malware and unwanted software and alert you to security risks. When Windows Defender Offline detects malicious or unwanted software, it prompts you to remove, quarantine, or allow each item. Figure 16 Windows Defender Offline On Internet-connected PCs, Windows Defender Offline will automatically download the latest malware definitions. However, Microsoft recommends that you also download the definitions when you create the DaRT recovery image by using the DaRT Recovery Image Wizard. Doing so ensures that malware definitions are available when you are troubleshooting PCs without Internet connections even though they might be out of date.

31 DART OVERVIEW USING REMOTE CONNECTION 30 Using Remote Connection DaRT Remote Connection can help reduce the time and effort required to support end users. You can connect to client PCs and use the DaRT tools remotely without visiting users desks. You enable Remote Connection when you create recovery images by using the DaRT Recovery Image Wizard (see the section titled Creating Recovery Images, earlier in this white paper). When users require remote assistance, you talk them through starting the PC into DaRT. After starting DaRT, they click Remote Connection and confirm that they want to share the DaRT tools; then, as Figure 17 shows, Remote Connection displays a ticket number, IP address, and port number that the user gives to you. Figure 17 Remote Connection

32 DART OVERVIEW USING REMOTE CONNECTION 31 You then use the Remote Connection Viewer to connect to the DaRT tools remotely (Figure 18). To simplify the process and reduce the amount of handholding required to get Remote Connection started, you can optionally configure the DaRT recovery image to start Remote Connection automatically whenever users start their PCs with the recovery image. See the DaRT 8 Help for more information. Figure 18 Remote Connection Viewer You can also restrict local end-user access to the DaRT tools while retaining full access to them through the Remote Connection Viewer. Simply disable all of the tools on the Tool Selection page of the DaRT Recovery Image Wizard. This configuration only disables the tools for the local user. It does not hide them, and it does not disable the Remote Connection tool. When users start the DaRT tools, they see that all of the tools are unavailable except for Remote Connection. However, when you connect to the DaRT tools by using Remote Connection Viewer, you still have unrestricted access to the DaRT tools.

33 DART OVERVIEW CUSTOMIZING REMOTE CONNECTION 32 Customizing Remote Connection Without customization, using Remote Connection requires assistance. Additionally, its default configuration might not match your requirements (e.g., you might want to perform actions while the user is away). You can customize Remote Connection to support advanced options, though. The configuration file winpeshl.ini in \Windows\System32\ on the DaRT recovery image allows you to configure custom actions when DaRT starts. For example, you can launch the following applications: RemoteRecovery.exe nomessage. This initiates the Remote Connection and bypasses the confirmation dialog. Remote Connection continues as if the user had clicked Yes. WaitForConnection.exe. This prevents the script from continuing until either Remote Connection is not running or a valid connection is established with the user s PC. To customize Remote Connection, modify winpeshl.ini on the Create Image page of the DaRT Recovery Image Wizard. Listing 1 shows an example that starts Remote Connection and waits for the connection before starting Windows RE. Listing 1 Winpeshl.ini [LaunchApps] "%windir%\system32\netstart.exe -network -remount" "cmd /C start %windir%\system32\remoterecovery.exe -nomessage" "%windir%\system32\waitforconnection.exe" "%SYSTEMDRIVE%\sources\recovery\recenv.exe" When DaRT starts, it creates the file inv32.xml in \Windows\System32\ on the RAM disk. This file contains connection information: IP address, port, and ticket number. You can copy this file to a network share to trigger a Help desk workflow. For example, a custom program can check the network share for connection files, then create a support ticket or send notifications.

34 DART OVERVIEW EVALUATING DART 33 Evaluating DaRT DaRT helps IT easily recover PCs that have become unusable, rapidly diagnose probable causes of issues, and quickly repair unbootable or locked-out systems, all without leaving their desks and much faster than the average time it takes to reimage the machine. DaRT allows administrators to shift desktop repair planning from reactive to proactive, saving time and reducing the challenges associated with troubleshooting and repairing system failures. With a plan in place, the simple image creation process, coupled with an easy to use tool menu, allows organizations to rapidly deploy, use, and benefit from the toolset. DaRT is part of the Microsoft Desktop Optimization Pack (MDOP), which is an add-on license available to Software Assurance customers. Begin your evaluation today: Download and evaluate DaRT as part of MDOP. MDOP is available to Volume Licensing customers, Microsoft Development Network (MSDN) subscribers, and Microsoft TechNet subscribers. See MDOP on Microsoft.com. To learn how DaRT and MDOP for Software Assurance can help you better troubleshoot and repair PCs, see See MDOP on TechNet. For technical information about DaRT and MDOP for Software Assurance, see This toolset enables us to restore clients instantly without rebuilding them saving up to six hours per instance. David Smith, Technical Support Center, UMC Health System

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics

More information

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed. CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12 Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge

More information

Office 365 Windows Intune Administration Guide

Office 365 Windows Intune Administration Guide Chapter 7 Office 365 Windows Intune Administration Guide Office 365 is a suite of technologies delivered as a Software as a Service (SaaS) offering. Office 365 reduces the IT costs for businesses of any

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do

More information

Windows 10 and Enterprise Mobility

Windows 10 and Enterprise Mobility Windows 10 and Enterprise Mobility Deploying Windows 10 using Microsoft Deployment Toolkit The exercises in this lab guide show how to deploy Windows 10 by using Microsoft Deployment Toolkit (MDT) 2013

More information

How To Manage Hard Disk Partitioning In Windows 8.1.2 (Windows 8) (Windows 7) (Powerbook) (For Windows 8) And Windows 8 (Pro) (Winstone) (Probation) (Perl

How To Manage Hard Disk Partitioning In Windows 8.1.2 (Windows 8) (Windows 7) (Powerbook) (For Windows 8) And Windows 8 (Pro) (Winstone) (Probation) (Perl Exam : 70-688 Title : Managing and Maintaining Windows 8 Version : Demo 1 / 19 1.DRAG DROP Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not

More information

Installing and Upgrading to Windows 7

Installing and Upgrading to Windows 7 Installing and Upgrading to Windows 7 Before you can install Windows 7 or upgrade to it, you first need to decide which version of 7 you will use. Then, you should check the computer s hardware to make

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Maintaining, Updating, and Protecting Windows 7

Maintaining, Updating, and Protecting Windows 7 Lesson 7 Maintaining, Updating, and Protecting Windows 7 Learning Objectives Students will learn to: Understand Disk Defragmenter Understand Disk Cleanup Understand Task Scheduler Understand Action Center

More information

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol... Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers

More information

Understanding Backup and Recovery Methods

Understanding Backup and Recovery Methods Understanding Backup and Recovery Methods LESSON 8 EXAM OBJECTIVE MATRIX SKILLS/CONCEPTS EXAM OBJECTIVE DESCRIPTION EXAM OBJECTIVE NUMBER Understanding Local, Network, Understand backup and recovery 6.1

More information

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc. Microsoft Windows 7 Administration Instant Reference William Panek WILEY Wiley Publishing, Inc. Introduction xix PART I: Installation 1 Chapter 1: Installing Windows 7 3 Understand Windows 7's New Features

More information

NetVanta Unified Communications Server Backup and Restore Procedures

NetVanta Unified Communications Server Backup and Restore Procedures NetVanta Unified Communications Technical Note NetVanta Unified Communications Server Backup and Restore Procedures 1 Introduction 1.1 Overview This document provides backup and restore procedures to protect

More information

HP Backup and Recovery Manager

HP Backup and Recovery Manager HP Backup and Recovery Manager User Guide Version 1.0 Table of Contents Introduction Installation How to Install Language Support HP Backup and Recovery Manager Reminders Scheduled Backups What Can Be

More information

User Manual. HitmanPro.Kickstart User Manual Page 1

User Manual. HitmanPro.Kickstart User Manual Page 1 User Manual HitmanPro.Kickstart User Manual Page 1 Table of Contents 1 Introduction to HitmanPro.Kickstart... 3 2 What is ransomware?... 4 3 Why do I need HitmanPro.Kickstart?... 6 4 Creating a HitmanPro.Kickstart

More information

Understanding Backup and Recovery Methods

Understanding Backup and Recovery Methods Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore

More information

ALTIRIS Deployment Solution 6.8 Preboot Automation Environment

ALTIRIS Deployment Solution 6.8 Preboot Automation Environment ALTIRIS Deployment Solution 6.8 Preboot Automation Environment The information contained in the Altiris knowledgebase is subject to the Terms of Use as outlined at http://www.altiris.com/legal/termsofuse.asp.

More information

Chapter 5: Fundamental Operating Systems

Chapter 5: Fundamental Operating Systems Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Getting Started. HP Retail Systems

Getting Started. HP Retail Systems Getting Started HP Retail Systems Copyright 2012, 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft and Windows are U.S. registered

More information

User Manual. Copyright Rogev LTD

User Manual. Copyright Rogev LTD User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician MS50331 Längd: 5 dagar Windows 7, Enterprise Desktop Support Technician Detta är den bredaste, mest djuplodande kursen för dig som arbetar som Supporttekniker och behöver vara champion på Windows när frågorna

More information

Quick Start Guide. Version R91. English

Quick Start Guide. Version R91. English Using StorageCraft Recovery Environment Quick Start Guide Version R91 English May 20, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s

More information

UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0

UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0 UltraBac Documentation UBDR Gold Bare Metal Disaster Recovery Administrator Guide UBDR Gold v8.0 UBDR Administrator Guide UBDR Gold v8.0 The software described in this guide is furnished under a license

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

Windows Server 2008 R2 Essentials

Windows Server 2008 R2 Essentials Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution

More information

Microsoft Exchange 2003 Disaster Recovery Operations Guide

Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment

More information

Migrate to Windows Small Business Server 2011 Standard from Windows Small Business Server 2008

Migrate to Windows Small Business Server 2011 Standard from Windows Small Business Server 2008 Migrate to Windows Small Business Server 2011 Standard from Windows Small Business Server 2008 Microsoft Corporation Published: March 2011 Version: 11.03.11 Abstract This guide describes how to migrate

More information

Administering Windows-based HP Thin Clients with System Center 2012 R2 Configuration Manager SP1

Administering Windows-based HP Thin Clients with System Center 2012 R2 Configuration Manager SP1 Technical white paper Administering Windows-based HP Thin Clients with System Center 2012 R2 Configuration Manager SP1 Table of contents Executive summary... 3 Configuration Manager features... 3 Asset

More information

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec Intelligent disaster recovery Dell DL backup to Disk Appliance powered by Symantec The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry s only fully integrated

More information

How to Integrate SmartDeploy with Windows Deployment Services

How to Integrate SmartDeploy with Windows Deployment Services How to Integrate SmartDeploy with Windows Deployment Services SmartDeploy Revised: October 2014 Integrating custom Windows Imaging Format (WIM) images into Windows Deployment Services (WDS) lets you take

More information

SPECOPS DEPLOY / OS 4.6 DOCUMENTATION

SPECOPS DEPLOY / OS 4.6 DOCUMENTATION Technical documentation: SPECOPS DEPLOY / OS 4.6 DOCUMENTATION By Shay Byrne, Product Manager 1 Getting Started... 4 1.1 Specops Deploy / OS Supported Configurations...4 1.2 Specops Deploy and Active Directory...

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

User Guide Replica Automatic Backup System

User Guide Replica Automatic Backup System User Guide Replica Automatic Backup System 2009 Seagate Technology Contents 1 Getting Started with the Seagate Replica Automatic Backup System...4 Replica s First Steps...4 Safely Disconnect...4 Using

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

NovaBACKUP. User Manual. NovaStor / November 2011

NovaBACKUP. User Manual. NovaStor / November 2011 NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

Administrator Guide. HP Backup and Recovery Manager

Administrator Guide. HP Backup and Recovery Manager Administrator Guide HP Backup and Recovery Manager Copyright 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft and Windows are

More information

Getting Started. rp5800, rp5700 and rp3000 Models

Getting Started. rp5800, rp5700 and rp3000 Models Getting Started rp5800, rp5700 and rp3000 Models Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft, Windows, and Windows

More information

70-685: Enterprise Desktop Support Technician

70-685: Enterprise Desktop Support Technician 70-685: Enterprise Desktop Support Technician Course Introduction Course Introduction Chapter 01 - Identifying Cause and Resolving Desktop Application Issues Identifying Cause and Resolving Desktop Application

More information

Using WMI Scripts with BitDefender Client Security

Using WMI Scripts with BitDefender Client Security Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...

More information

How to easily clean an infected computer (Malware Removal Guide)

How to easily clean an infected computer (Malware Removal Guide) How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather

More information

Windows" 7 Desktop Support

Windows 7 Desktop Support Windows" 7 Desktop Support and Administration Real World Skills for MCITP Certification and Beyond Darril Gibson WILEY Wiley Publishing, Inc. Contents Introduction xxiii Chapter 1 Planning for the Installation

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Windows 7, Enterprise Desktop Support Technician Course Number: 70-685 Certification Exam This course is preparation for the Microsoft Certified IT Professional (MCITP) Exam, Exam 70-685: Pro: Windows

More information

Understand Backup and Recovery Methods

Understand Backup and Recovery Methods Understand Backup and Recovery Methods Lesson Overview Understand backup and recovery methods. In this lesson, you will explore: Backup management Backup options Recovery methods Backup Management Windows

More information

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved. Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Windows Embedded Standard 7 (WES7) Administration Guide

Windows Embedded Standard 7 (WES7) Administration Guide Windows Embedded Standard 7 (WES7) Administration Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

SafeGuard Easy startup guide. Product version: 7

SafeGuard Easy startup guide. Product version: 7 SafeGuard Easy startup guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 About Sophos SafeGuard (SafeGuard Easy)...4 2.1 About Sophos SafeGuard (SafeGuard Easy) 7.0...6

More information

F-Secure E-mail and Server Security. Administrator's Guide

F-Secure E-mail and Server Security. Administrator's Guide F-Secure E-mail and Server Security Administrator's Guide TOC F-Secure E-mail and Server Security Contents Preface: Disclaimer...vi Chapter 1: About This Guide...7 1.1 Introduction...8 1.1.1 Product contents...8

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013) 1 Laplink DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: CustomerService@laplink.com Laplink Software, Inc. 600 108th Ave.

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Data Igloo User Guide

Data Igloo User Guide 1 2 Last modified: April, 2014 1999-2014 Faronics Corporation. All rights reserved. Faronics, Deep Freeze, Faronics Core Console, Faronics Anti-Executable,Faronics Anti-Virus, Faronics Device Filter, Faronics

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Image Backup and Recovery Procedures

Image Backup and Recovery Procedures Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you

More information

Backing Up and Recovering Your Server

Backing Up and Recovering Your Server 8 Backing Up and Recovering Your Server In this chapter, you will learn to: Understand Backup and Recovery (Pages 254 262) 33n Understand Backup and Recovery Terminology (Page 255) n Use Backup and Recovery

More information

Image Backup and Recovery Procedures

Image Backup and Recovery Procedures Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you

More information

Course Outline. ttttttt

Course Outline. ttttttt 1300 86 87246 1300 TO TRAIN 50292 - Administering and Maintaining General Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer, maintain,

More information

Clickfree C6 Easy Imaging October 24, 2011

Clickfree C6 Easy Imaging October 24, 2011 HOW LONG WILL THE FIRST BACKUP TAKE? Clickfree Total Computer Backup can take a few hours to complete when first plugged in. Since Clickfree will copy absolutely everything from your computer (including

More information

50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)

50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum) This course can be purchased by authorized Microsoft Learning Centers at the Courseware Marketplace web-site. Microsoft Certified Trainers (MCTs) can get a free copy at the same website. About the Course

More information

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven)

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven) Objectif This five-day instructor-ledcourse provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help

More information

Jetico Central Manager. Administrator Guide

Jetico Central Manager. Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

Selected Windows XP Troubleshooting Guide

Selected Windows XP Troubleshooting Guide 1 Selected Windows XP Troubleshooting Guide To locate lost files: Compiled by: Jason M. Cohen Check these locations to locate lost files: The My Documents folder Click Start, and then click My Documents.

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

RESCUE CD. User s Guide

RESCUE CD. User s Guide RESCUE CD User s Guide 2 CONTENTS 1. When to use the Rescue CD 2 1.1 System Requirements 2 1.2 Using the Rescue CD 3 1.2.1 Using a USB drive 3 Recommended method 3 Alternative method 4 1.2.2 Automate the

More information

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide Sophos SafeGuard Encryption for Windows Support Guide University Information Technology Security & Policy September 15, 2015 Version Date Modification 1.0 September 15, 2015 Initial guide 1.1 1.2 1.3 1.4

More information

Advanced Diploma In Hardware, Networking & Server Configuration

Advanced Diploma In Hardware, Networking & Server Configuration Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led Course Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer,

More information

Acronis Backup & Recovery 10 Workstation. Installation Guide

Acronis Backup & Recovery 10 Workstation. Installation Guide Acronis Backup & Recovery 10 Workstation Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent for Windows...

More information

(Exam 70-680): Configuring

(Exam 70-680): Configuring Microsoft MCTS Self-Paced Training Kit (Exam 70-680): Configuring Windows? Ian McLean Orin Thomas Contents Introduction Lab Setup Instructions Hardware Requirements Using the DVD xxv How to Install the

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Revo Uninstaller - User's Guide

Revo Uninstaller - User's Guide Table of Contents 1. Overview... 2 2. User Interface... 4 3. Uninstaller... 5 4. Hunter Mode... 10 5. Tools... 12 5.1. AutoRun Manager... 13 5.2. Junk Files Cleaner... 15 5.3. Windows Tools... 16 5.4.

More information

How to Integrate SmartDeploy Enterprise with System Center Configuration Manager

How to Integrate SmartDeploy Enterprise with System Center Configuration Manager How to Integrate SmartDeploy Enterprise with System Center Configuration Manager SmartDeploy Revised: November 2014 Integrating SmartDeploy Enterprise with Microsoft System Center Configuration Manager

More information

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery. MS-50292: Administering and Maintaining Windows 7 This five-day instructor-led course provides students with the knowledge and skills to successfully install, maintain, and troubleshoot Windows 7 computers.

More information

How To Encrypt A Computer With A Password Protected Encryption Software On A Microsoft Gbk (Windows) On A Pc Or Macintosh (Windows Xp) On An Uniden (Windows 7) On Pc Or Ipa (Windows 8) On

How To Encrypt A Computer With A Password Protected Encryption Software On A Microsoft Gbk (Windows) On A Pc Or Macintosh (Windows Xp) On An Uniden (Windows 7) On Pc Or Ipa (Windows 8) On Sophos Disk Encryption Tools guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Download the encryption tools...4 3 Displaying the system status with SGNState...5 4

More information

Quickstart Administration

Quickstart Administration Microsoft Windows Intune 2.0: Quickstart Administration Manage your PCs in the Enterprise through the Cloud with Microsoft Windows Intune David Overton PUBLISHING 1 enterprise 88 professional expertise

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

HP EliteBook and ProBook Notebook PCs - Upgrading from Windows 7 to Windows 8

HP EliteBook and ProBook Notebook PCs - Upgrading from Windows 7 to Windows 8 HP EliteBook and ProBook Notebook PCs - Upgrading from Windows 7 to Windows 8 This document pertains to HP business notebook computers to be upgraded from Windows 7 using a digital copy of Windows 8. You

More information

Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions

Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions Disclaimer: As with any software upgrade or new release, it is strongly encouraged to fully test the new build within your environment prior

More information

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Acronis Backup & Recovery 10 Server for Windows. Installation Guide Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information