Lesson Plans Configuring Windows 7

Similar documents
Configuring and Administering Windows 7

Course 50322B: Configuring and Administering Windows 7

ICT Professional Optional Programmes

Planning and Managing Windows 7 Desktop Deployments and Environments

Configuring Windows Server 2008 Active Directory

MCTS Cert Guide: Microsoft Windows 7, Configuring. Don Poulton. Pearson 800 East 96th Street. Indianapolis, Indiana USA

(Exam ): Configuring

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Windows 7, Enterprise Desktop Support Technician

70-685: Enterprise Desktop Support Technician

Windows" 7 Desktop Support

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.

Training Guide: Configuring Windows8 8

Microsoft Windows 8 Beta Exam by Ding Dong

MS Planning and Managing Windows 7 Desktop Deployment and Environments

Planning and Managing Windows 7 Desktop Deployments and Environments

Windows 7, Enterprise Desktop Support Technician

Training Package: Enterprise Desktop Administrator on Windows 7(70-680; )

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Planning and Managing Windows 7 Desktop Deployments and Environments

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

NE-6294A Planning and Managing Windows 7 Desktop Deployments and Environments

Planning and Managing Windows 7 Desktop Deployments & Environments Version 7

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

MS 50292: Administering and Maintaining Windows 7

5115B: Installing, Configuring, and Troubleshooting Windows Vista

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Course 6292A: Installing and Configuring Windows 7 Client. About this Course. Audience Profile

MICROSOFT EXAM QUESTIONS & ANSWERS

MS Configuring Windows 8.1

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

Get Success in Passing Your Certification Exam at first attempt!

Course Outline. ttttttt

Implementing a Desktop Infrastructure Course 20415B; 5 days, Instructor-led

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led

Exam : Installing and Configuring Windows Server 2012

ICT Professional Competence Diploma PROCOM2

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MS MCITP: Windows 7 Enterprise Desktop Support Technician Boot Camp

Configuring Windows Server 2008 Network Infrastructure

MCSA Windows 8 (Exam )

Corso: Configuring and Administering Windows 7 Codice PCSNET: MSW7-8 Cod. Vendor: Durata: 5

R4: Configuring Windows Server 2008 Network Infrastructure

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Planning and Implementing Windows Server 2008

Usrig Microsoft User Account Cards

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

Lesson Plans Managing a Windows 2003 Network Infrastructure

Windows 7, Enterprise Desktop Support Technician

Prepared for: The American Association of State Highway and Transportation Officials. Julian Soh Microsoft Corporation.

How To Manage Hard Disk Partitioning In Windows (Windows 8) (Windows 7) (Powerbook) (For Windows 8) And Windows 8 (Pro) (Winstone) (Probation) (Perl

IT-Pruefungen.de. Hochwertige Qualität, neueste Prüfungsunterlagen.

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Installing and Configuring Windows 7 Client

Installing and Configuring Windows B; 5 Days, Instructor-led

Implementing a Desktop Infrastructure

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven)

Exam : Administrating Windows Server 2012 R2. Course Overview

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

ILTA HANDS ON Securing Windows 7

Chapter 12: Windows XP, Vista, and 7

Implementing and Supporting Microsoft Windows XP Professional

MCSA Security + Certification Program

Course 20415:Implementing a Desktop Infrastructure

Supporting Windows 8.1

Windows 7. Qing Liu Michael Stevens

Microsoft Windows 7, Enterprise Desktop Administrator. Practice Test. Version 10.0

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

PassTest. Bessere Qualität, bessere Dienstleistungen!

Lesson Plans LabSim for Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Networking Best Practices Guide. Version 6.5

OFFICIAL MICROSOFT LEARNING PRODUCT 6292A. Installing and Configuring Windows 7 Companion Content

Windows Server 2008 R2 Essentials

Advanced Diploma In Hardware, Networking & Server Configuration

Movie Cube. User s Guide to Wireless Function

Deployment Guide: Transparent Mode

Managing and Maintaining a Windows Server 2003 Network Environment

70-413: Designing and Implementing a Server Infrastructure

Course Outline. Implementing a Desktop Infrastructure Course 20415B: 5 days Instructor Led

Course Outline: Course Implementing a Desktop Infrastructure

AV-006: Installing, Administering and Configuring Windows Server 2012

Lesson Plans Administering Security in a Server 2003 Network

Windows 7 Portable Command Guide: MOTS , and MCITP

Windows Server 2008 Essentials. Installation, Deployment and Management

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Agency Pre Migration Tasks

6445A - Implementing and Administering Windows Small Business Server 2008

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network

Client Server Networks

Exam: QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents:

Transcription:

Lesson Plans Configuring Windows 7 (Exam 70-680) Version 2.0

Table of Contents Course Overview... 3 Section 1.1: Windows 7 Versions... 5 Section 1.2: Windows 7 Installation... 6 Section 1.3: Upgrade... 8 Section 1.4: User Profile and Data Migration... 10 Section 1.5: Domain Networking... 12 Section 2.1: System Images Overview... 13 Section 2.2: Image Preparation... 14 Section 2.3: Image Capture... 16 Section 2.4: Manual Image Deployment... 18 Section 2.5: Image Servicing... 19 Section 2.6: Virtual Hard Disk (VHD)... 21 Section 2.7: Domain Image Deployment... 23 Section 3.1: Devices and Drivers... 25 Section 3.2: Disk Partitions and Volumes... 27 Section 3.3: Disk Optimization... 29 Section 3.4: Removable Storage... 30 Section 3.5: Application Compatibility... 31 Section 3.6: User Account Control (UAC)... 32 Section 3.7: Internet Options... 34 Section 3.8: Internet Explorer (IE) 8... 36 Section 3.9: Application Restriction... 38 Section 4.1: IPv4... 40 Section 4.2: IPv6... 42 Section 4.3: IP Address Configuration... 44 Section 4.4: Internet Connection Sharing (ICS)... 46 Section 4.5: Wireless Networking... 47 Section 4.6: Windows Firewall... 49 Section 5.1: Authentication and Authorization... 51 Section 5.2: NTFS Permissions... 53 Section 5.3: Resource Sharing... 55 Section 5.4: Printer Sharing and Management... 57 Section 5.5: Auditing... 59 Section 5.6: Encryption... 61 Section 5.7: BranchCache... 63 Section 6.1: Network Access Protection (NAP)... 64 Section 6.2: Virtual Private Network (VPN)... 65 Section 6.3: DirectAccess... 67 Section 6.4: BitLocker and BitLocker To Go... 69 Section 6.5: Mobility Options... 71 Section 7.1: Troubleshooting Tools... 73 Section 7.2: System Events... 75 Section 7.3: Performance Monitoring... 77 Section 7.4: Resource Monitoring... 79 1

Section 7.5: Reliability and Performance Maintenance... 80 Section 7.6: Optimization... 81 Section 7.7: System Updates... 83 Section 7.8: Remote Management... 85 Section 7.9: Remote Assistance... 87 Section 8.1: System Backup... 88 Section 8.2: File Recovery... 89 Section 8.3: System Recovery... 90 Practice Exams... 92 2

Course Overview This course prepares students for Microsoft s Exam 70-680: Configuring Windows 7. It focuses on installing, deploying configuring, monitoring, and maintaining systems that run Windows 7. Module 1 Windows Installation This module examines elements that are involved in installing Windows. These elements include the editions and features available with Windows 7, installation and upgrade methods, and preserving user profiles and data using migration tools. Also discussed are the basics of domain networking: Active Directory, and Group Policies. Module 2 System Images In this module students will learn concepts about capturing a system image. Details discussed include; preparing a system to capture a system image, capturing a system image, manually deploying an image from a network share, and methods for deploying a system image. The students will also learn about creating a Virtual Hard Disk and applying a Windows image to the file. Module 3 Hardware and Applications This module teaches the students about hardware issues such as configuring devices and drivers, managing disk partitions and volumes, and methods for optimizing a disk drive. The students will also examine application issues such as solving application compatibility problems with Windows 7, protecting the system configuration using the User Account Control, configuring Internet Explorer 8, and configuring access and compatibility for applications. Module 4 Networking This module discusses the following networking concerns; configuring IPv4 and IPv6 network addresses, Internet Connection Sharing (ICS), wireless networking, Windows Firewall, and Windows Firewall with Advanced Security (WFAS). Module 5 Resource Access This module examines the fundamentals of accessing resources. Topics discussed include configuring authentication and authorization, NTFS permissions, and resource sharing. Students will learn basics of managing printer sharing, auditing, encrypting files and folders, and configuring BranchCache. Module 6 Mobile Computing In this module students will learn concepts about configuring remote connections; Network Access Protection (NAP) and Virtual Private Network (VPN). They will also learn about configuring DirectAccess, BitLocker and BitLocker To Go, and configuring and managing options for mobile devices. 3

Module 7 Monitoring and Maintenance This module discusses configuring tools for troubleshooting, monitoring system events, monitoring performance and resource, ensuring the reliability and performance of a system, optimizing system performance, managing system updates, and remote management of computers. Module 8 Backup and Recovery In this module students will learn about the basic elements of backup and recovery; system backup, file recovery, and system recovery. Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification exam. 4

Section 1.1: Windows 7 Versions This section discusses the six different editions of Windows 7 and the features available in the different editions. Concepts covered include: Windows 7 editions Windows 7 features Features included in each Windows 7 edition Minimal requirements for Windows 7 editions Windows 7 N-editions 101. Perform a clean installation. This objective may include but is not limited to: o Identifying hardware requirements What are the different editions of Windows 7? Which editions would allow you to create a HomeGroup or join a HomeGroup? What is the difference between the Ultimate edition and the Enterprise edition? What is the difference between a Professional edition and a Professional N edition? About 15 minutes Number of Exam Questions 3 questions 5

Section 1.2: Windows 7 Installation In this section students will learn about Windows 7 installation methods and sources. Concepts covered include: Windows 7 installation methods: o Clean (Custom) o Upgrade (In-place) o Migration Windows 7 installation sources: o DVD o USB o Network o Windows Deployment Services (WDS) After finishing this section, students should be able to complete the following tasks: Copy Windows 7 installation files to a USB flash device. Perform a Windows 7 installation using a USB flash device. 101. Perform a clean installation. This objective may include but is not limited to: o Identifying hardware requirements o Setting up as the sole operating system o Setting up as dual boot; installation methods o Boot from the source of installation, preparing the installation source: USB, CD, network share, WDS Under which circumstances should you choose a clean installation of Windows 7? What is the advantage of a dual-boot system? When would you choose an upgrade rather than a clean installation of Windows 7? What are the requirements of a USB flash storage device before it can be an installation source? In which environment would you use Windows Deployment Services (WDS)? About 25 minutes 6

Number of Exam Questions 9 questions 7

Section 1.3: Upgrade This section examines details about upgrading to Windows 7. Concepts covered include: Types of upgrades o Intra-edition Upgrade o Previous Windows Version Upgrade Upgrade considerations: o License key is required o Cross-architecture upgrades are not supported o Use the Upgrade Advisor to evaluate a computer s readiness After finishing this section, students should be able to complete the following tasks: Run the Windows 7 Upgrade Advisor tool to determine the computer's hardware readiness for Windows 7. Perform an upgrade from Windows Vista to Windows 7. 102. Upgrade to Windows 7 from previous versions of Windows. This objective may include but is not limited to: o Upgrading from Windows Vista o Migrating from Windows XP o Upgrading from one edition of Windows 7 to another edition of Windows 7 You have Windows 7 Professional installed. Which editions of Windows 7 support an upgrade from your current system? You have Windows 7 Home Premium installed. You would like the system to run the Home Basic edition. How would you make the change? When upgrading to Windows 7, what are the tasks you should complete prior to running the setup program? How does the Windows 7 Upgrade Advisor tool simplify the process of upgrading Windows 7 to a different edition? Under what circumstances must you perform an clean installation instead of an upgrade installation? About 20 minutes 8

Number of Exam Questions 9 questions 9

Section 1.4: User Profile and Data Migration This section provides information about the role of migration to preserve user profile data and settings. Concepts covered include: Types of migration: o Side-by-side o Wipe-and-load Migration tools: o Windows Easy Transfer (WET) o User State Migration Tool (USMT) Location of files when you install over Windows XP and Vista: o Shared files and folders o Profile-specific files and folders o Installed programs o Windows settings and preference After finishing this section, students should be able to complete the following tasks: Use USMT to migrate user settings and profile information from a Windows XP computer to a Windows 7 installation. On the source computer run Scanstate to save the migration user accounts to a network share. On the destination computer run Loadstate to import user migration information from a network share. 103. Migrate user profiles. This objective may include but is not limited to: o Migrating from one machine to another o Migrating from previous versions of Windows o Side-by-side vs. wipe and load What are the main differences between a side-by-side migration and a wipe-andload migration? What types of files and data are moved during a migration? How can you save user data during a migration? When would you choose to perform a migration using the Windows Easy Transfer (WET) over the User State Migration Tool (USMT)? What are the transfer methods available when using WET to save user files? 10

What are the different kinds of migration stores supported by USMT? What scanstate.exe command moves Windows XP user data files during a hardlink migration? About 35 minutes Number of Exam Questions 11 questions 11

Section 1.5: Domain Networking This section discusses the basics about using domains. Concepts covered include: The Active Directory structure: o Domains o Objects o Attributes o Organizational units o Generic container objects Applying Group Policy settings Group Policy object categories: o Computer Configuration o User Configuration Common GPOs settings: o Account Policies o Local Policies/Audit Policy o Local Policies/User Rights Assignments o Local Policies/Security Options o Registry o File System o Software Restriction Policies o Administrative Templates How would you configure security settings for all the users in a domain? Which editions of Windows 7 can join a domain? When there is a conflict between the local and domain configuration settings, which setting takes precedence? About 10 minutes Number of Exam Questions 2 questions 12

Section 2.1: System Images Overview This section provides an overview of capturing a system image. Concepts covered include: The role of the system images. Windows Automated Installation Kit (Windows AIK) tools: o Windows Preinstallation Environment (Windows PE) o Windows System Image Manager (Windows SIM) o System Preparation Tool (Sysprep) o ImageX o Oscdimg Types of computers required for preparing a system image: o Reference computer o Technician computer 201. Capture a system image. What are the advantages of using a system image to install Windows 7 to computers? What is the file extension of a Windows 7 system image file? How do you create an answer file for an automated installation? Which tools does the Windows Automated Installation Kit include to prepare or create a system image? About 10 minutes Number of Exam Questions 1 question 13

Section 2.2: Image Preparation This section examines details about preparing a system to capture a system image. Concepts covered include: Windows installation configuration passes: o windowspe o offlineservicing o specialize o oobesystem Additional configuration passes: o generalize o auditsystem o audituser Methods to run Windows Setup: o Interactive (attended) o Automated (unattended) The role of Windows SIM Steps to create an answer file Considerations when using an answer file for automated installation Using the System Preparation Tool (Sysprep) to configure new installations of Windows. Sysprep switches to manage system images and Windows installation process: o /audit o /generalize o /oobe o /shutdown o /reboot o /quiet o /quit o /unattend Considerations when using Sysprep The process to create, prepare, and deploy a Windows installation image After finishing this section, students should be able to complete the following tasks: Use Windows SIM to create an answer file. Configure properties and components of the answer file to increase the automation of the installation and setup. Use Sysprep to prepare an installation before it is captured. 14

201. Capture a system image. This objective may include but is not limited to: o Preparing system for capture What role does the Windows System Image Manager (Windows SIM) perform in image preparation? What is the purpose of the Sysprep? What privileges are required to execute Sysprep? Which Sysprep switch allows a user to remove all machine-specific information from an installation? What is the out-of-box experience mode? About 40 minutes Number of Exam Questions 9 questions 15

Section 2.3: Image Capture This section discusses tools and steps to capture a system image. Concepts covered include: Windows PE o The role of Windows PE o Steps to create a bootable Windows PE disc for capturing system images ImageX o The role of ImageX o Using a Wimscript.ini configuration file to exclude specific files during the ImageX capture operation ImageX options: o /capture o /config o /compress o /split o /apply o /apply /ref o /verify Steps to capture the reference computer s Windows 7 installation onto a network share After finishing this section, students should be able to complete the following tasks: Create a Windows 7 PE boot disk. Use ImageX to capture a Windows 7 installation. 201. Capture a system image. This objective may include but is not limited to: o Preparing system for capture o Creating a WIM file o Automated capture o Manual capture Which tool would you use to create a bootable Windows PE disc? What are the boot sources for Windows PE? Which tool is used to create an image from a reference computer? What is the purpose of the exclusion exception section of the Wimscript.ini file? 16

Which imagex.exe switch checks for errors and file duplication after capturing the installation? About 25 minutes Number of Exam Questions 4 questions 17

Section 2.4: Manual Image Deployment In this section students will explore the process to manually deploy an image from a network share. Details about the following concepts will be covered: Tools to manually deploy an image from a network share: o Diskpart o ImageX Steps to deploying a system image from a network share. After finishing this section, students should be able to complete the following tasks: Manually deploy an image onto a local computer? 203. Deploy a system image. This objective may include but is not limited to: o Manually deploying a customized image What tools would you use to manually deploy an image from a network share? Why should you create two partitions on a hard drive prior to installing the image? What command at the command prompt connects a network share and maps the drive with a letter? What is the purpose of BCDBoot when deploying an image to the local hard drive? About 10 minutes Number of Exam Questions 3 questions 18

Section 2.5: Image Servicing This section examines the basics of deploying a system image. Concepts covered include: The role of image servicing Tools to service an image: o Deployment Image Servicing and Management (DISM) o ImageX Components of the system image: o Drivers o Windows applications and application patches o Windows security updates and features o International settings o Windows editions After finishing this section, students should be able to complete the following tasks: Use ImageX to mount an image, make and save changes to the image, and dismount the image. Use DISM to mount an image, make changes to the image, gather information about the image, and dismount the image. 202. Prepare a system image for deployment. This objective may include but is not limited to: o Inserting an application into a system image o Inserting a driver into a system image o Inserting an update into a system image o Configuring tasks to run after deployment When would you choose to use ImageX over DISM to mount an image? When using DISM, how do you save changes before dismounting an image? How do you mount a read-write image with ImageX? What is the difference between an online image and an offline image? About 45 minutes 19

Number of Exam Questions 9 questions 20

Section 2.6: Virtual Hard Disk (VHD) In this section students will learn about creating and configuring a Virtual Hard Disk (VHD). Concepts covered include: The role of a Virtual Hard Drive (VHD) Actions to perform with a VHD file: o Create a new VHD o Attach (mount) the VHD o Detach (dismount) the VHD o Compact (reduce) the size of a VHD o Expand (increase) the maximum size available in a VHD Tools to create and manage VHD files: o Disk Management MMC o DiskPart o WIM2VHD o BCDEdit VHD considerations: o Native-boot VHD o Applying a WIM file to a VHD o Installing Windows 7 to a VHD o Using Offline servicing to make changes to a Windows image After finishing this section, students should be able to complete the following tasks: Create a VHD file and apply a Windows image to the file. Install Windows 7 to a VHD file. Configure a computer to boot from the VHD file. 204. Configure a VHD. This objective may include but is not limited to: o Creating, deploying, booting, mounting, and updating VHDs o Offline updates o Offline servicing What is the difference between a Virtual Hard Drive (VHD) and a standard Hard Disk Drive (HDD)? What are the advantages of using a VHD for Windows 7 installations? What is the difference between a fixed disk VHD file and a dynamically expanding VHD file? Which utilities would you use to create, manage and mount VHD files? 21

What is a native-boot VHD? Which editions of Windows 7 support a native-boot VHD? About 40 minutes Lab/Activity Create a VHD Number of Exam Questions 15 questions 22

Section 2.7: Domain Image Deployment This section discusses methods for deploying a system image. Concepts covered include: The role of Microsoft Deployment Toolkit (MDT 2010) o Distribution methods: Lite Touch Installation (LTI) Zero Touch Installation (ZTI) o MDT 2010 Deployment Workbench areas to manage and distribute Windows 7 images: Distribution share Task sequences Deployment point The role of Windows Deployment Services (WDS): o Types of WDS images Install image Boot image Capture boot image Discover boot image o WDS unattend files: Windows Deployment Services client unattend file Image unattend file o Transmission methods to deploy images: Unicast Multicast o Scheduled casting o Managing and maintaining WDS from the command line. After finishing this section, students should be able to complete the following tasks: Use WDS to create an installation and boot image. Image a computer with a Windows 7 Enterprise image. 203. Deploy a system image. This objective may include but is not limited to: o Automated deployment methods What is the role of the Microsoft Deployment Toolkit (MDT)? What is the difference between the Lite Touch Installation and Zero Touch Installation MDT distribution methods? 23

What are the main areas of the MDT 2010 Deployment Workbench that are used to manage and distribute Windows 7 images? What are the differences between the MDT and Windows Deployment Services (WDS)? What are the four different types of WDS images that are used during installation? About 30 minutes Number of Exam Questions 10 questions 24

Section 3.1: Devices and Drivers This section provides an overview of configuring devices and drivers. Details about the following are presented: Device drivers o Automatic driver updates o Windows 7 driver store o Driver staging o Digital signatures Device driver configuration and troubleshooting details o Guidelines to install new hardware following a Windows 7 installation o 32-bit drivers vs. 64-bit operating systems o Tools to configure and troubleshoot device drivers: Device Manager Devices and Printer PnPUtil Group Policy settings System Information (Msinfo32) Reliability Monitor Driver Verifier Monitor Driver Query Signature Verification DirectX Diagnostic After finishing this section, students should be able to complete the following tasks: Use the PnPUtil tool to stage a driver or remove a driver in the driver store. Use Device Manager to enable and disable devices, and roll back or install device drivers. Use Group Policy to manage and maintain drivers. 301. Configure devices. This objective may include but is not limited to: o Updating, disabling, and uninstalling drivers o Signed drivers o Conflicts between drivers o Configuring driver settings o Resolving problem device driver 25

704. Configure performance settings. This objective may include but is not limited to: o Updated drivers What does it mean to stage a driver? What are the advantages of placing drivers in the driver store? What does Windows do when it cannot find a driver in the driver store? How can you be assured that a driver is stable and reliable? What tool lists drivers on the computer which do not have a digital signature? Which tool will troubleshoot problems with printers? About 40 minutes Lab/Activity Manage Devices 1 Manage Devices 2 Number of Exam Questions 16 questions 26

Section 3.2: Disk Partitions and Volumes This section discusses managing disk partitions and volumes. Details about the following are covered: The role of a partition o Partitioning schemes: Master Boot Record (MBR) Globally unique identifier (GUID) Partition Table (GPT) The role of a volume o Disk types Basic Dynamic Considerations when managing partitions and volumes o Partitioning a hard disk o Formatting o Converting a basic disk to a dynamic disk o Resizing a volume o Managing disks using diskpart o Using a mount point After finishing this section, students should be able to complete the following tasks: Use Diskpart to create and resize a volume. Use Disk Management to create simple, spanned, striped, and mirrored volumes. 702. Manage disks. This objective may include but is not limited to: o Managing disk volumes o RAID In which circumstances do you need multiple partitions on a single disk? What is the difference between the Globally Unique Identifier (GUID) Partition Table (GPT) and the Master Boot Record (MBR) partitioning schemes? What is the difference between a partition and a volume? When working with volumes, when would you choose a basic disk over a dynamic disk? Which details should you consider when converting from a dynamic disk to a basic disk? 27

About 45 minutes Lab/Activity Create Volumes Add Space to an Existing Volume Resize Existing Volumes Number of Exam Questions 11 questions 28

Section 3.3: Disk Optimization This section discusses methods for optimizing a disk drive. Methods covered include: Disk Cleanup Disk Defragmenter Check Disk Quotas After finishing this section, students should be able to complete the following tasks: Defragment the files on a disk to optimize the performance of the disk. Create a soft quota to warn the administrator when a user exceeds a specified amount of disk space. 702. Manage Disks. This objective may include but is not limited to: o Managing disk volumes o Managing file system fragmentation How does the Disk Defragmenter optimize the performance of a hard drive? What kind of functions does the Disk Cleanup utility perform? How can you delete restore points with the Disk Cleanup utility? What does Check Disk attempt to do with orphaned files? How can you monitor and restrict disk usage by users? What is the difference between a hard quota and a soft quota? About 25 minutes Lab/Activity Perform Disk Maintenance Enable Disk Quotas Number of Exam Questions 3 questions 29

Section 3.4: Removable Storage This section discusses policies to manage removable storage. Concepts covered include: Categories and policies available in Removable Storage Access policies in Group Policy: o Policies to control access for CDs and DVDs, floppy drives, and removable disks o Custom Classes policies o Windows Portable Devices (WPD) policies o All Removable Storage Classes: Deny all access o All Removable Storage Classes: Allow direct access in remote sessions o (in seconds) to force reboot After finishing this section, students should be able to complete the following tasks: Use Group Policy to manage removable media permissions. 702. Manage disks. This objective may include but is not limited to: o Removable device policies How can you prohibit the removal of sensitive data from the network? When would you use a Custom Classes policy? How can you immediately enforce removable media settings in Group Policy? About 5 minutes Number of Exam Questions 1 question 30

Section 3.5: Application Compatibility This section explores tools to solve application compatibility problems with Windows 7. Details covered include: Program Compatibility Application Compatibility Toolkit (ACT) Windows XP mode After finishing this section, students should be able to complete the following tasks: Use the Program Compatibility Troubleshooter utility to handle application compatibility issues. Manually configure the compatibility mode in the properties of an application. 302. Configure application compatibility. This objective may include but is not limited to: o Setting compatibility mode o Implementing shims What are the requirements for Windows XP Mode? What must you do to use Windows XP Mode? What tools are available to solve application compatibility problems with Windows 7? What is the best long-term application compatibility solution? Which program compatibility feature should you use for incompatible programs known by Windows 7? About 30 minutes Lab/Activity Configure Application Compatibility Number of Exam Questions 5 questions 31

Section 3.6: User Account Control (UAC) This section explores protecting the system configuration using the User Account Control (UAC). Details covered include: The role of User Account Control (UAC) The default behavior of UAC UAC notification level settings: o Always notify o Notify me only when programs try to make changes to my computer o Notify me only when programs try to make changes to my computer (do not dim the desktop) o Never notify UAC settings that can be controlled through Group Policy: o Run all administrators in Admin Approval Mode o Behavior of the elevation prompt for Standard Users o Behavior of the elevation prompt for administrators in Admin Approval Mode o Admin Approval Mode for the Built-in Administrator account o Switch to the secure desktop when prompting for elevation o Detect application installations and prompt for elevation o Only elevate executables that are signed and validated o Only elevate UIAccess applications that are installed in secure locations o Allow UIAccess applications to prompt for elevation without using secure desktop o Virtualizes file and registry write failures to per-user locations After finishing this section, students should be able to complete the following tasks: Manage Secure Desktop and UAC notification levels. 503. Configure user account control (UAC). This objective may include but is not limited to: o Configuring local security policy o Configuring admin vs. standard UAC prompt behaviors o Configuring Secure Desktop What is the recommended UAC notification level setting? How does the UAC control the type of actions that a user can perform on the system? 32

How does privilege elevation work? What is purpose of Secure Desktop? How would you identify when Secure Desktop is activated? Under which circumstances would you use Group Policy to configure UAC settings? About 35 minutes Lab/Activity Configure UAC Settings 1 Configure UAC Settings 2 Number of Exam Questions 6 questions 33

Section 3.7: Internet Options This section explores facts about using Internet options to configure settings for Internet Explorer. Details covered include: Internet Explorer 8 (IE 8) tools IE 8 tabs IE 8 security zones default settings: o Security level o Protected mode IE security zones: o Local intranet o Trusted o Restricted o Internet Modifying zone membership The role of certificates Certificate Authority (CA) o Root CA o Subordinate CA o Standalone CA Certificates that Internet Explorer tracks After finishing this section, students should be able to complete the following tasks: Configure advanced security settings, zone membership, and privacy settings for IE. 304. Configure Internet Explorer. This objective may include but is not limited to: o Configuring security settings o Certificates for secure Web sites What are the different kinds of security zones? What is the difference between the default security level and the default protected mode assigned to security zones? What is the difference between a root CA and a subordinate CA? About 40 minutes 34

Lab/Activity Modify Zone Memberships Configure Privacy Settings Configure Advanced Security Settings Number of Exam Questions 6 questions 35

Section 3.8: Internet Explorer (IE) 8 This section explores facts about enhancing security, access, and compatibility with IE 8 features. Details covered include: InPrivate Mode features: o InPrivate Browsing o InPrivate Filtering Features which enhance Internet Explorer security: o Delete Browsing History o AutoComplete o SmartScreen Filter o Cross-Site Scripting Filter o Data Execution Prevention o Content Advisor o Advanced Settings The role of Compatibility View Components to configure the Compatibility View: o Compatibility View button o Compatibility View Settings o Group Policy Managing Internet Explorer Add-ons: o Toolbars and extension o Search providers o Accelerators o InPrivate Filtering Considerations when configuring the Manage Add-on console: o Storage of add-on functionality o Disabling an add-on o Deleting an add-on After finishing this section, students should be able to complete the following tasks: Use InPrivate Mode to protect privacy. Use accelerators to quickly access, share, search, translate or obtain additional information about a topic. Add additional accelerators to provide additional functionality. Configure Compatibility View. 302. Configure application compatibility. This objective may include but is not limited to: 36

o Compatibility issues with Internet Explorer 304. Configure Internet Explorer. This objective may include but is not limited to: o Configuring compatibility view o Configuring security settings o Configuring providers o Managing add-ons o Controlling InPrivate mode How does the SmartScreen Filter detect phishing Web sites and Web sites that dispense malware? What is the difference between how the InPrivate Mode features protect a user's privacy? When would you choose to disable an add-on? What function does the Compatibility View provide for users? How can you clear previously-saved passwords saved in Internet Explorer? About 45 minutes Number of Exam Questions 10 questions 37

Section 3.9: Application Restriction This section discusses methods to configure application restriction policies to limit and restrict the applications that users can run. Details covered include: The role of software restriction policies o Application restriction rules: Hash Certificate Path Network Zone Default o Conflicting rules o Enforcement policies options o Enabling certificate rules o Extensions Advantages of AppLocker policies AppLocker rule types: o Executable o Windows Installer o Script o DLL Conditions for AppLocker rules: o Publisher o Path o Hash AppLocker considerations: o AppLocker rules vs software restriction policies o Soft-enforcement mode o AppLocker event log contents After finishing this section, students should be able to complete the following tasks: Configure a local software restriction policy for a specific user. Create a path rule for an application. Create a hash rule to create software restrictions. 303. Configure application restrictions. This objective may include but is not limited to: o Setting software restriction policies o Setting application control policies 38

o Setting through group policy or local security policy How are software restriction policies managed, and in what order are they applied? How does a hash rule identify one application from another? Does the same hash value always apply after the application receives a software update? What are the advantages of using AppLocker over software restriction policies? If software restriction policies and AppLocker policies are configured on the same object, which rules take precedence? About 50 minutes Number of Exam Questions 8 questions 39

Section 4.1: IPv4 This section provides an overview of IPv4 addresses. Concepts covered include: IPv4 addresses: o 32-bit binary number o Converting from binary to decimal o Subnet mask o Default class for IPv4 address ranges A B C D E o Networking services: Dynamic Host Configuration Protocol (DHCP) Domain Name System (DNS) Network Address Translation (NAT) o IPv4 address considerations Subnetting o The role of subnetting o Custom subnet masks o Classless addressing o Classless Inter-Domain Routing (CIDR) o Calculating if workstations are on the same subnetworks 401. Configure IPv4 network settings. This objective may include but is not limited to: o Connecting to a network o Configuring name resolution o Setting up a connection for a network o Network locations o Resolving connectivity issues o APIPA What is the function of the subnet mask? How can you divide a large network into smaller networks? What does the Classless Inter-Domain Routing (CIDR) notation represent? What does it mean if a Windows client has an IP address of 169.254.0.3 with the subnet mask of 255.255.0.0? 40

What is the advantage of using NAT? How can you determine if individual computers are on the same network? How do Windows 7 clients resolve host names to IP addresses? About 30 minutes Number of Exam Questions 3 questions 41

Section 4.2: IPv6 This section provides an overview of IPv6 addresses. Concepts covered include: IPv6 features: o Address space o Header improvements o Route aggregation o Built-in security features o Built-in Quality of Service (QoS) o Neighbor Discovery (ND) o Geographic assignment of addresses IPv6 address o 128-bit binary number (32 hexadecimal numbers, organized into 8 quartets) Prefix Interface ID o Types of addresses: Reserved Unicast Multicast Anycast Loopback Unspecified o Addressing methods for implementingipv6: IPv4-mapped address Tunneling IPv4-compatible address Intra-site Automatic Tunnel Addressing Protocol (ISATAP) 6-to-4 Teredo tunneling 402. Configure IPv6 network settings. This objective may include but is not limited to: o Configuring name resolution o Connecting to a network o Setting up a connection for a network o Network locations o Resolving connectivity issues o Link local multicast name resolution 42

Why does IPv6 not require the NAT and PAT networking services? What portion of an IPv6 address represents the prefix, and which portion represents the interface ID? What is the difference between a link-local and a unique local unicast address? What is the difference between a unicast address and an anycast address? When implementing IPv6, which transition methods incorporate an IPv4 address? About 25 minutes Number of Exam Questions 4 questions 43

Section 4.3: IP Address Configuration This section provides information about configuring IPv4 and IPv6 addresses. Concepts covered include: Methods to assign IPv4 addresses and other IPv4 configuration values: o Dynamic Host Configuration Protocol (DHCP) o Static (manual) assignment o Automatic Private IPv4 Addressing (APIPA) o Alternate IPv4 configuration Methods to configure an IPv6 address: o Static full assignment o Static partial assignment o Stateless autoconfiguration o DHCPv6 Tools to troubleshoot network problems: o Event Viewer o Windows Network Diagnostics o ipconfig o ping o tracert o pathping o Unified tracing o nslookup o netstat o netsh o Network and Sharing Center After finishing this section, students should be able to complete the following tasks: Use netsh to create a firewall rule to allow inbound and outbound ICMP traffic. Configure a computer with a static address. Use ipconfig and ping to gather information and test the TCP/IP connection of a computer. Configure an IPv4-compatible address while transitioning to IPv6. 401. Configure IPv4 network settings. This objective may include but is not limited to: o Connecting to a network o Configuring name resolution o Setting up a connection for a network 44

o Network locations o Resolving connectivity issues o APIPA 402. Configure IPv6 network settings. This objective may include but is not limited to: o Configuring name resolution o Connecting to a network o Setting up a connection for a network o Network locations o Resolving connectivity issues When would you choose to manually assign IPv4 configuration values for a network adapter? How is IP addressing different for APIPA versus DHCP? When would you choose to use DHCP to assign IP addresses? When using IPv6 stateless autoconfiguration, how do the clients learn the addresses of other clients on the network? What is the difference between the two modes of DHCPv6? About 50 minutes Lab/Activity Configure IPv4 Settings Configure IPv6 Settings. Number of Exam Questions 14 questions 45

Section 4.4: Internet Connection Sharing (ICS) This section provides information about configuring Internet Connection Sharing (ICS) to share network access with other network users through a computer s Internet connection. Concepts covered include: Tasks to configure ICS o Configuring the ICS host o Configuring the ICS clients Considerations when using ICS After finishing this section, students should be able to complete the following tasks: Configure an ICS host. 403. Configure networking settings. This objective may include but is not limited to: o Configuring network adapters What are the advantages of using ICS in a small network? What are the differences between an ICS host and an ICS client? How many network adapters are required before you can implement ICS? Which network adapter on the ICS host will have 192.168.137.1 as the IP address? About 10 minutes Lab/Activity Configure ICS Number of Exam Questions 1 question 46

Section 4.5: Wireless Networking This section provides the following information about configuring wireless networking: Wireless networking architecture: o Devices o Connection Method Ad hoc Infrastructure o SSID (Service Set Identifier) Wireless networking standards Technologies to improve speed or the distance of wireless transmissions: o Multiple Input Multiple Output (MIMO) o Channel bonding Considerations for wireless networks Methods to authenticate wireless networks: o Open o Shared key o 802.1x Standards to provide security for wireless networking: o Wired Equivalent Privacy (WEP) o Wi-Fi Protected Access (WPA) o Wi-Fi Protected Access 2 (WPA2) or 802.11i Practices to provide a level of security: o Change the administrator account name and password o Change SSID from defaults o Update the firmware o Enable the firewall on the access point o Disable DHCP o Enable MAC address filtering Connecting to a wireless network: o SSID o Wireless network icon in the System Tray o Profiles o Manually creating a network profile o Ad-hoc connections o Using netsh wlan to configure wireless connections at the command prompt Considerations for wireless connections o Incorrect configuration o Range and obstructions o Access point placement o Channel interference o Automatic switching (roaming) 47

After finishing this section, students should be able to complete the following tasks: Create and connect to an ad-hoc wireless network. Manually connect to a network whose SSID is not being broadcast. Create and save a wireless profile. 403. Configure networking settings. This objective may include but is not limited to: o Adding a physically connected (wired) or wireless device o Connecting to a wireless network o Configuring security settings on the client o Set preferred wireless networks o Configuring network adapters What type of devices are used in a wireless network? When should you use an ad-hoc wireless network? How does channel bonding increase the performance of wireless transmissions? How does 802.1x provide greater authentication security than other authentication methods? What types of settings does a wireless profile contain? What is the primary reason not to use WPA2 to secure a wireless network? About 55 minutes Lab/Activity Connect to a Wireless Network Configure a Wireless Profile Number of Exam Questions 8 questions 48

Section 4.6: Windows Firewall In this section students will learn details about configuring Windows Firewall and Windows Firewall with Advanced Security (WFAS) to protect a system by controlling all traffic through a computer s network interfaces. Windows Firewall o The role of Windows Firewall o Configure basic settings using the Windows Firewall utility o Network Location Awareness Profile types Domain Home or Work Public o Default responses to outbound and inbound traffic o Firewall exceptions Windows Firewall with Advanced Security (WFAS) o Rule Types: Program Port Predefined Custom o Connection security rules types: Isolation Authentication exemption Server-to-server Tunnel Custom o Action options for rules: Allow the connection Block the connection Allow the connection if it is secure o Options for network profiles: Firewall state Inbound connections Outbound connections o Configure exceptions based on the port, protocol, or application o Manage firewall settings with the netsh advfirewall command o Edge traversal After finishing this section, students should be able to complete the following tasks: Configure the Windows Firewall to protect the computer from outside sources. 49

Create inbound and outbound rules using the Windows Firewall with Advanced Security (WFAS). 404. Configure Windows Firewall. This objective may include but is not limited to: o Configuring rules for multiple profiles o Allowing or denying an application o Network-profile-specific rules o Configuring notifications o Configuring authenticated exceptions How does Windows Firewall protect users from hackers, viruses, and worms? Why does Windows Firewall provide a list of predefined firewall exceptions? When would you choose to use Windows Firewall with Advanced Security (WFAS) over Windows Firewall? What type of connection security rule protects traffic based on IP addresses? About 45 minutes Lab/Activity Configure the Windows Firewall Number of Exam Questions 10 questions 50

Section 5.1: Authentication and Authorization This section examines configuring Authentication and Authorization to control access to resources. Concepts discussed include: Authentication o The role of authentication o Authentication features: Kerberos v5 Windows NT LAN Manager (NTLM) Certificates Smart cards Biometrics Online identity integration o Multifactor authentication Authorization o Permission o Policy o Right o Built-in groups: Administrators Backup Operators Event Log Readers Network Configuration Operators Users Power Users Remote Desktop Users Tools to manage authentication: o Credential Manager o runas command o Account policies After finishing this section, students should be able to complete the following tasks: Use Credential Manager to save and manage usernames and passwords. Use Run As to run applications as an administrator or a secondary user. 504. Configure authentication and authorization. This objective may include but is not limited to: o Resolving authentication issues o Configuring rights o Managing credentials 51

o Managing certificates o Smart cards with PIV o Elevating user privileges o Multifactor authentication What is the difference between authentication and authorization? Why does the Power Users group exist as a built-in group for Windows 7? When considering authorization, what is the difference between a permission and a right? Under which circumstance is Credential Manager unnecessary? What is the difference between the account lockout duration and the account lockout threshold? How can you force users to create and use unique passwords? About 55 minutes Lab/Activity Manage Account Policies Number of Exam Questions 8 questions 52

Section 5.2: NTFS Permissions This section provides an overview of using NTFS permissions to control access to files and folders. Concepts covered include: NTFS permissions for folders and files o Full control o Modify o Read & execute o List folder contents o Read o Write Access Control Entries (ACE) o Explicit permissions o Allow permission o Deny permission Applying permissions How permissions can be affected by copying or moving files with NTFS permissions Managing NTFS permissions from a command prompt Comparing special permissions to NTFS permissions Configuring special permissions After finishing this section, students should be able to complete the following tasks: Restrict access to files and folders using NTFS permissions. Apply Special Permissions to provide specific control over files and folders. 502. Configure file and folder access. This objective may include but is not limited to: o Configuring NTFS permissions o Resolving effective permissions issues o Copying files vs. moving files. What are the six standard NTFS permissions? How does an object receive explicit permissions versus inherited permissions? How are effective permissions determined? Which permissions take precedence when both share and NTFS permissions apply to a folder? 53

How does copying or moving files with NTFS permissions affect the permissions on the file or folder? About 45 minutes Lab/Activity Configure NTFS Permissions Number of Exam Questions 10 questions 54

Section 5.3: Resource Sharing This section explores sharing resources. Details discussed include: Location types identifying the type of network, settings and services: o Domain o Public o Home o Work Networking services for location types: o Network discovery o File and printer sharing o Public folder sharing o Media streaming o File sharing connections o Password protected sharing o HomeGroup connections Methods to control access to shared content: o Basic sharing o Advanced sharing o Public folder sharing Managing shared folders Managing libraries Sharing resources using HomeGroups After finishing this section, students should be able to complete the following tasks: Create a HomeGroup to share specific types of files with other computers running Windows 7. Join a HomeGroup to share a library of files. Create and secure a shared folder. 501. Configure shared resources. This objective may include but is not limited to: o Folder virtualization o Shared folder permissions o Configuring HomeGroup settings Under what circumstances would you choose to enable the Public Folder Sharing networking service? 55

What are the differences between a domain, public, work and home network profile? When using public folder sharing, where are the public files located? How would you share individual files and folders within the HomeGroup? How can you create an administrative share? What is a library, and where are files physical located when displayed in a library? About 55 minutes Lab/Activity Share and Secure Folders Number of Exam Questions 17 questions 56

Section 5.4: Printer Sharing and Management In this section students will learn the basics of managing printer sharing. Concepts covered include: Sharing a printer Setting permissions on a printer: o Print o Manage printer o Manage documents Using the Print Management MMC snap-in Printer management features: o Client-Side Rendering (CSR) o Driver isolation o XML Paper Specification (XPS) o Windows Color System (WCS) o Location-aware printing After finishing this section, students should be able to complete the following tasks: Create and share a printer. Manage the default printer based on the location. Manage printer permissions. 403. Configure networking settings. This objective may include but is not limited to: o Configuring location-aware printing 501. Configure shared resources. This objective may include but is not limited to: o Printers and queues What is the difference between the manage printer and the manage document printer permissions? What are the functions of the Print Management MMC snap-in? When would you choose to isolate the print driver? How does Client-Side Rendering (CSR) reduce print processing times? What is the advantage of location-aware printing? 57

About 30 minutes Lab/Activity Share a printer Configure Default Printer Number of Exam Questions 7 questions 58

Section 5.5: Auditing This section provides an overview of using auditing to monitoring system events. Concepts covered include: The role of auditing Common audit policies: o Account logon events o Logon events o Account management o Object access o Policy change o Privilege use o System events o Process tracking o Directory service access Considerations when configuring auditing After finishing this section, students should be able to complete the following tasks: Configure auditing to track the success and failure of specified actions of a user. Create a custom view to filter tasks and manage the audit results? 604. Configure remote connections. This objective may include but is not limited to: o Advanced security auditing 703. Monitor systems. This objective may include but is not limited to: o Configuring event logging o Filtering event logs What is the difference between account logon and logon audit policies? As the Administrator you have requested that all users change their passwords. What audit policy would verify that all the users have complied with the request? What policy would you use to audit failed attempts to view or modify registry settings? About 20 minutes 59