Date post: | 28-Dec-2015 |
Category: |
Documents |
Upload: | yusuf-ziya-guelec |
View: | 283 times |
Download: | 2 times |
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED
O F F I C I A L M I C R O S O F T L E A R N I N G P R O D U C T
20687A Configuring Windows 8
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDii Configuring Windows 8
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein.
2012 Microsoft Corporation. All rights reserved.
Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty /Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners
Product Number: 20687A
Part Number: X18-48640
Released: 08/2012
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDMICROSOFT LICENSE TERMS OFFICIAL MICROSOFT LEARNING PRODUCTS MICROSOFT OFFICIAL COURSE Pre-Release and Final Release Versions These license terms are an agreement between Microsoft Corporation and you. Please read them. They apply to the Licensed Content named above, which includes the media on which you received it, if any. These license terms also apply to any updates, supplements, internet based services and support services for the Licensed Content, unless other terms accompany those items. If so, those terms apply. BY DOWNLOADING OR USING THE LICENSED CONTENT, YOU ACCEPT THESE TERMS. IF YOU DO NOT ACCEPT THEM, DO NOT DOWNLOAD OR USE THE LICENSED CONTENT. If you comply with these license terms, you have the rights below. 1. DEFINITIONS.
a. Authorized Learning Center means a Microsoft Learning Competency Member, Microsoft IT Academy
Program Member, or such other entity as Microsoft may designate from time to time. b. Authorized Training Session means the Microsoft-authorized instructor-led training class using only
MOC Courses that are conducted by a MCT at or through an Authorized Learning Center. c. Classroom Device means one (1) dedicated, secure computer that you own or control that meets or
exceeds the hardware level specified for the particular MOC Course located at your training facilities or primary business location.
d. End User means an individual who is (i) duly enrolled for an Authorized Training Session or Private
Training Session, (ii) an employee of a MPN Member, or (iii) a Microsoft full-time employee. e. Licensed Content means the MOC Course and any other content accompanying this agreement.
Licensed Content may include (i) Trainer Content, (ii) software, and (iii) associated media. f. Microsoft Certified Trainer or MCT means an individual who is (i) engaged to teach a training session
to End Users on behalf of an Authorized Learning Center or MPN Member, (ii) currently certified as a Microsoft Certified Trainer under the Microsoft Certification Program, and (iii) holds a Microsoft Certification in the technology that is the subject of the training session.
g. Microsoft IT Academy Member means a current, active member of the Microsoft IT Academy
Program. h. Microsoft Learning Competency Member means a Microsoft Partner Network Program Member in
good standing that currently holds the Learning Competency status. i. Microsoft Official Course or MOC Course means the Official Microsoft Learning Product instructor-
led courseware that educates IT professionals or developers on Microsoft technologies.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDj. Microsoft Partner Network Member or MPN Member means a silver or gold-level Microsoft Partner
Network program member in good standing. k. Personal Device means one (1) device, workstation or other digital electronic device that you
personally own or control that meets or exceeds the hardware level specified for the particular MOC Course.
l. Private Training Session means the instructor-led training classes provided by MPN Members for
corporate customers to teach a predefined learning objective. These classes are not advertised or promoted to the general public and class attendance is restricted to individuals employed by or contracted by the corporate customer.
m. Trainer Content means the trainer version of the MOC Course and additional content designated
solely for trainers to use to teach a training session using a MOC Course. Trainer Content may include Microsoft PowerPoint presentations, instructor notes, lab setup guide, demonstration guides, beta feedback form and trainer preparation guide for the MOC Course. To clarify, Trainer Content does not include virtual hard disks or virtual machines.
2. INSTALLATION AND USE RIGHTS. The Licensed Content is licensed not sold. The Licensed Content is licensed on a one copy per user basis, such that you must acquire a license for each individual that accesses or uses the Licensed Content.
2.1 Below are four separate sets of installation and use rights. Only one set of rights apply to you.
a. If you are a Authorized Learning Center:
i. If the Licensed Content is in digital format for each license you acquire you may either: 1. install one (1) copy of the Licensed Content in the form provided to you on a dedicated, secure
server located on your premises where the Authorized Training Session is held for access and use by one (1) End User attending the Authorized Training Session, or by one (1) MCT teaching the Authorized Training Session, or
2. install one (1) copy of the Licensed Content in the form provided to you on one (1) Classroom Device for access and use by one (1) End User attending the Authorized Training Session, or by one (1) MCT teaching the Authorized Training Session.
ii. You agree that: 1. you will acquire a license for each End User and MCT that accesses the Licensed Content, 2. each End User and MCT will be presented with a copy of this agreement and each individual
will agree that their use of the Licensed Content will be subject to these license terms prior to their accessing the Licensed Content. Each individual will be required to denote their acceptance of the EULA in a manner that is enforceable under local law prior to their accessing the Licensed Content,
3. for all Authorized Training Sessions, you will only use qualified MCTs who hold the applicable competency to teach the particular MOC Course that is the subject of the training session,
4. you will not alter or remove any copyright or other protective notices contained in the Licensed Content,
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED5. you will remove and irretrievably delete all Licensed Content from all Classroom Devices and
servers at the end of the Authorized Training Session, 6. you will only provide access to the Licensed Content to End Users and MCTs, 7. you will only provide access to the Trainer Content to MCTs, and 8. any Licensed Content installed for use during a training session will be done in accordance
with the applicable classroom set-up guide.
b. If you are a MPN Member. i. If the Licensed Content is in digital format for each license you acquire you may either:
1. install one (1) copy of the Licensed Content in the form provided to you on (A) one (1) Classroom Device, or (B) one (1) dedicated, secure server located at your premises where the training session is held for use by one (1) of your employees attending a training session provided by you, or by one (1) MCT that is teaching the training session, or
2. install one (1) copy of the Licensed Content in the form provided to you on one (1) Classroom Device for use by one (1) End User attending a Private Training Session, or one (1) MCT that is teaching the Private Training Session.
ii. You agree that: 1. you will acquire a license for each End User and MCT that accesses the Licensed Content, 2. each End User and MCT will be presented with a copy of this agreement and each individual
will agree that their use of the Licensed Content will be subject to these license terms prior to their accessing the Licensed Content. Each individual will be required to denote their acceptance of the EULA in a manner that is enforceable under local law prior to their accessing the Licensed Content,
3. for all training sessions, you will only use qualified MCTs who hold the applicable competency to teach the particular MOC Course that is the subject of the training session,
4. you will not alter or remove any copyright or other protective notices contained in the Licensed Content,
5. you will remove and irretrievably delete all Licensed Content from all Classroom Devices and servers at the end of each training session,
6. you will only provide access to the Licensed Content to End Users and MCTs, 7. you will only provide access to the Trainer Content to MCTs, and 8. any Licensed Content installed for use during a training session will be done in accordance
with the applicable classroom set-up guide.
c. If you are an End User: You may use the Licensed Content solely for your personal training use. If the Licensed Content is in digital format, for each license you acquire you may (i) install one (1) copy of the Licensed Content in the form provided to you on one (1) Personal Device and install another copy on another Personal Device as a backup copy, which may be used only to reinstall the Licensed Content; or (ii) print one (1) copy of the Licensed Content. You may not install or use a copy of the Licensed Content on a device you do not own or control.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDd. If you are a MCT.
i. For each license you acquire, you may use the Licensed Content solely to prepare and deliver an Authorized Training Session or Private Training Session. For each license you acquire, you may install and use one (1) copy of the Licensed Content in the form provided to you on one (1) Personal Device and install one (1) additional copy on another Personal Device as a backup copy, which may be used only to reinstall the Licensed Content. You may not install or use a copy of the Licensed Content on a device you do not own or control.
ii. Use of Instructional Components in Trainer Content. You may customize, in accordance with the most recent version of the MCT Agreement, those portions of the Trainer Content that are logically associated with instruction of a training session. If you elect to exercise the foregoing rights, you agree: (a) that any of these customizations will only be used for providing a training session, (b) any customizations will comply with the terms and conditions for Modified Training Sessions and Supplemental Materials in the most recent version of the MCT agreement and with this agreement. For clarity, any use of customize refers only to changing the order of slides and content, and/or not using all the slides or content, it does not mean changing or modifying any slide or content.
2.2 Separation of Components. The Licensed Content components are licensed as a single unit and you may not separate the components and install them on different devices. 2.3 Reproduction/Redistribution Licensed Content. Except as expressly provided in the applicable installation and use rights above, you may not reproduce or distribute the Licensed Content or any portion thereof (including any permitted modifications) to any third parties without the express written permission of Microsoft.
2.4 Third Party Programs. The Licensed Content may contain third party programs or services. These license terms will apply to your use of those third party programs or services, unless other terms accompany those programs and services.
2.5 Additional Terms. Some Licensed Content may contain components with additional terms, conditions, and licenses regarding its use. Any non-conflicting terms in those conditions and licenses also apply to that respective component and supplements the terms described in this Agreement.
3. PRE-RELEASE VERSIONS. If the Licensed Content is a pre-release (beta) version, in addition to the other
provisions in this agreement, then these terms also apply:
a. Pre-Release Licensed Content. This Licensed Content is a pre-release version. It may not contain the same information and/or work the way a final version of the Licensed Content will. We may change it for the final version. We also may not release a final version. Microsoft is under no obligation to provide you with any further content, including the final release version of the Licensed Content.
b. Feedback. If you agree to give feedback about the Licensed Content to Microsoft, either directly or
through its third party designee, you give to Microsoft without charge, the right to use, share and commercialize your feedback in any way and for any purpose. You also give to third parties, without charge, any patent rights needed for their products, technologies and services to use or interface with any specific parts of a Microsoft software, Microsoft product, or service that includes the feedback. You will not give feedback that is subject to a license that requires Microsoft to license its software, technologies, or products to third parties because we include your feedback in them. These rights
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDsurvive this agreement.
c. Term. If you are an Authorized Training Center, MCT or MPN, you agree to cease using all copies of the
beta version of the Licensed Content upon (i) the date which Microsoft informs you is the end date for using the beta version, or (ii) sixty (60) days after the commercial release of the Licensed Content, whichever is earliest (beta term). Upon expiration or termination of the beta term, you will irretrievably delete and destroy all copies of same in the possession or under your control.
4. INTERNET-BASED SERVICES. Microsoft may provide Internet-based services with the Licensed Content, which may change or be canceled at any time.
a. Consent for Internet-Based Services. The Licensed Content may connect to computer systems over an
Internet-based wireless network. In some cases, you will not receive a separate notice when they connect. Using the Licensed Content operates as your consent to the transmission of standard device information (including but not limited to technical information about your device, system and application software, and peripherals) for internet-based services.
b. Misuse of Internet-based Services. You may not use any Internet-based service in any way that could harm it or impair anyone elses use of it. You may not use the service to try to gain unauthorized access to any service, data, account or network by any means.
5. SCOPE OF LICENSE. The Licensed Content is licensed, not sold. This agreement only gives you some rights to use the Licensed Content. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the Licensed Content only as expressly permitted in this agreement. In doing so, you must comply with any technical limitations in the Licensed Content that only allows you to use it in certain ways. Except as expressly permitted in this agreement, you may not: install more copies of the Licensed Content on devices than the number of licenses you acquired; allow more individuals to access the Licensed Content than the number of licenses you acquired; publicly display, or make the Licensed Content available for others to access or use; install, sell, publish, transmit, encumber, pledge, lend, copy, adapt, link to, post, rent, lease or lend,
make available or distribute the Licensed Content to any third party, except as expressly permitted by this Agreement.
reverse engineer, decompile, remove or otherwise thwart any protections or disassemble the Licensed Content except and only to the extent that applicable law expressly permits, despite this limitation;
access or use any Licensed Content for which you are not providing a training session to End Users using the Licensed Content;
access or use any Licensed Content that you have not been authorized by Microsoft to access and use; or
transfer the Licensed Content, in whole or in part, or assign this agreement to any third party.
6. RESERVATION OF RIGHTS AND OWNERSHIP. Microsoft reserves all rights not expressly granted to you in this agreement. The Licensed Content is protected by copyright and other intellectual property laws and treaties. Microsoft or its suppliers own the title, copyright, and other intellectual property rights in the Licensed Content. You may not remove or obscure any copyright, trademark or patent notices that appear on the Licensed Content or any components thereof, as delivered to you.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED7. EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and regulations. You
must comply with all domestic and international export laws and regulations that apply to the Licensed Content. These laws include restrictions on destinations, End Users and end use. For additional information, see www.microsoft.com/exporting.
8. LIMITATIONS ON SALE, RENTAL, ETC. AND CERTAIN ASSIGNMENTS. You may not sell, rent, lease, lend or
sublicense the Licensed Content or any portion thereof, or transfer or assign this agreement.
9. SUPPORT SERVICES. Because the Licensed Content is as is, we may not provide support services for it.
10. TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you fail to comply with the terms and conditions of this agreement. Upon any termination of this agreement, you agree to immediately stop all use of and to irretrievable delete and destroy all copies of the Licensed Content in your possession or under your control.
11. LINKS TO THIRD PARTY SITES. You may link to third party sites through the use of the Licensed Content.
The third party sites are not under the control of Microsoft, and Microsoft is not responsible for the contents of any third party sites, any links contained in third party sites, or any changes or updates to third party sites. Microsoft is not responsible for webcasting or any other form of transmission received from any third party sites. Microsoft is providing these links to third party sites to you only as a convenience, and the inclusion of any link does not imply an endorsement by Microsoft of the third party site.
12. ENTIRE AGREEMENT. This agreement, and the terms for supplements, updates and support services are
the entire agreement for the Licensed Content. 13. APPLICABLE LAW.
a. United States. If you acquired the Licensed Content in the United States, Washington state law governs the interpretation of this agreement and applies to claims for breach of it, regardless of conflict of laws principles. The laws of the state where you live govern all other claims, including claims under state consumer protection laws, unfair competition laws, and in tort.
b. Outside the United States. If you acquired the Licensed Content in any other country, the laws of that country apply.
14. LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the laws of your country. You may also have rights with respect to the party from whom you acquired the Licensed Content. This agreement does not change your rights under the laws of your country if the laws of your country do not permit it to do so.
15. DISCLAIMER OF WARRANTY. THE LICENSED CONTENT IS LICENSED "AS-IS," "WITH ALL FAULTS," AND "AS
AVAILABLE." YOU BEAR THE RISK OF USING IT. MICROSOFT CORPORATION AND ITS RESPECTIVE AFFILIATES GIVE NO EXPRESS WARRANTIES, GUARANTEES, OR CONDITIONS UNDER OR IN RELATION TO THE LICENSED CONTENT. YOU MAY HAVE ADDITIONAL CONSUMER RIGHTS UNDER YOUR LOCAL LAWS WHICH THIS AGREEMENT CANNOT CHANGE. TO THE EXTENT PERMITTED UNDER YOUR LOCAL LAWS, MICROSOFT CORPORATION AND ITS RESPECTIVE AFFILIATES EXCLUDE ANY IMPLIED WARRANTIES OR CONDITIONS, INCLUDING THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED16. LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. TO THE EXTENT NOT PROHIBITED BY
LAW, YOU CAN RECOVER FROM MICROSOFT CORPORATION AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO USD$5.00. YOU AGREE NOT TO SEEK TO RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES FROM MICROSOFT CORPORATION AND ITS RESPECTIVE SUPPLIERS.
This limitation applies to o anything related to the Licensed Content, services made available through the Licensed Content, or
content (including code) on third party Internet sites or third-party programs; and o claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence,
or other tort to the extent permitted by applicable law.
It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential or other damages.
Please note: As this Licensed Content is distributed in Quebec, Canada, some of the clauses in this agreement are provided below in French. Remarque : Ce le contenu sous licence tant distribu au Qubec, Canada, certaines des clauses dans ce contrat sont fournies ci-dessous en franais. EXONRATION DE GARANTIE. Le contenu sous licence vis par une licence est offert tel quel . Toute utilisation de ce contenu sous licence est votre seule risque et pril. Microsoft naccorde aucune autre garantie expresse. Vous pouvez bnficier de droits additionnels en vertu du droit local sur la protection dues consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties implicites de qualit marchande, dadquation un usage particulier et dabsence de contrefaon sont exclues. LIMITATION DES DOMMAGES-INTRTS ET EXCLUSION DE RESPONSABILIT POUR LES DOMMAGES. Vous pouvez obtenir de Microsoft et de ses fournisseurs une indemnisation en cas de dommages directs uniquement hauteur de 5,00 $ US. Vous ne pouvez prtendre aucune indemnisation pour les autres dommages, y compris les dommages spciaux, indirects ou accessoires et pertes de bnfices. Cette limitation concerne:
tout ce qui est reli au le contenu sous licence , aux services ou au contenu (y compris le code) figurant sur des sites Internet tiers ou dans des programmes tiers ; et
les rclamations au titre de violation de contrat ou de garantie, ou au titre de responsabilit stricte, de ngligence ou dune autre faute dans la limite autorise par la loi en vigueur.
Elle sapplique galement, mme si Microsoft connaissait ou devrait connatre lventualit dun tel dommage. Si votre pays nautorise pas lexclusion ou la limitation de responsabilit pour les dommages indirects, accessoires ou de quelque nature que ce soit, il se peut que la limitation ou lexclusion ci-dessus ne sappliquera pas votre gard. EFFET JURIDIQUE. Le prsent contrat dcrit certains droits juridiques. Vous pourriez avoir dautres droits prvus par les lois de votre pays. Le prsent contrat ne modifie pas les droits que vous confrent les lois de votre pays si celles-ci ne le permettent pas. Revised December 2011
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDx Configuring Windows 8
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED Configuring Windows 8 xi
Acknowledgments Microsoft Learning would like to acknowledge and thank the following for their contribution towards developing this title. Their effort at various stages in the development has ensured that you have a good classroom experience.
Andrew J. Warren Content Developer Andrew Warren has more than 25 years of experience in the IT industry, many of which he has spent teaching and writing. He has been involved as the subject matter expert (SME) for many of the Windows Server 2008 courses and the technical lead on a number of other courses. He also has been involved in developing TechNet sessions on Microsoft Exchange Server 2007. Based in the United Kingdom, he runs his own IT training and education consultancy.
David Susemiehl Content Developer David Susemiehl has worked as consultant, trainer, and courseware developer since 1996. David has extensive experience consulting on Microsoft Systems Management Server and Microsoft System Center Configuration Manager 2007, as well as Active Directory, Exchange Server, and Terminal Server/Citrix deployments. David has developed courseware development for Microsoft and Hewlett-Packard, and delivered those courses successfully in Europe, Central America, and across North America. For the last several years, David has been writing courseware for Microsoft Learning, and consulting on infrastructure transitions in Michigan.
Jason Kellington - Content Developer Jason Kellington is a Microsoft Certified Trainer (MCT), Microsoft Certified IT Professional (MCITP), and a Microsoft Certified Solutions Expert (MCSE), as well as a consultant, trainer and author. He has experience working with a wide range of Microsoft technologies, focusing on the design and deployment of enterprise network infrastructures. Jason works in several capacities with Microsoft, as a SME for Microsoft Learning courseware titles, a senior technical writer for Microsoft IT Showcase, and an author for Microsoft Press.
Seth Dietz Technical Reviewer Seth Dietz is a Microsoft Certified Technology Specialist (MCTS), Microsoft Certified Solutions Associate (MCSA), and MCITP, and he has more than 15 years of IT experience. He currently works as a Sr. Technical Account Manager with In-Touch Computer Services, Inc. in Charlotte, NC, where he focuses on implementing outsourced IT solutions for small and medium business. Seth has worked as a SME on several development projects for Microsoft certification exams since 2008. His specializations include virtualization, backup and disaster recovery, mobility and wireless, Remote Desktop Services, Microsoft Office 365, network infrastructure, and Microsoft Small Business Server. Seth has been a project-management professional since 2004.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDxii Configuring Windows 8
Contents Module 1: Installing and Deploying Windows 8
Lesson 1: Introducing Windows 8 1-2 Lesson 2: Preparing to Install Windows 8 1-7 Lesson 3: Installing Windows 8 1-14 Lab A: Installing Windows 8 1-18 Lesson 4: Automating the Installation of Windows 8 1-21 Lab B: Performing an Unattended Installation of Windows 8 1-32 Lesson 5: Activating Windows 8 1-35
Module 2: Upgrading and Migrating to Windows 8 Lesson 1: Upgrading to Windows 8 2-2 Lesson 2: Migrating to Windows 8 2-7 Lesson 3: Migrating User Data and Settings 2-11 Lab: Migrating to Windows 8 2-18
Module 3: Managing Disks and Device Drivers Lesson 1: Managing Disks, Partitions, and Volumes 3-2 Lesson 2: Maintaining Disks, Partitions, and Volumes 3-13 Lesson 3: Working with Virtual Hard Disks 3-17 Lab A: Managing Disks 3-21 Lesson 4: Installing and Configuring Device Drivers 3-26 Lab B: Configuring Device Drivers 3-38
Module 4: Configuring and Troubleshooting Network Connections Lesson 1: Configuring IPv4 Network Connectivity 4-2 Lesson 2: Configuring IPv6 Network Connectivity 4-9 Lesson 3: Implementing Automatic IP Address Allocation 4-16 Lab A: Configuring Network Connection 4-22 Lesson 4: Implementing Name Resolution 4-25 Lesson 5: Troubleshooting Network Connectivity 4-28 Lab B: Troubleshooting Network Connectivity 4-33
Module 5: Implementing Wireless Network Connections Lesson 1: Overview of Wireless Networks 5-2 Lesson 2: Implementing a Wireless Network 5-8 Lab: Planning the Implementation of Wireless Network Connections 5-13
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED Configuring Windows 8 xiii
Module 6: Implementing Network Security Lesson 1: Overview of Threats to Network Security 6-2 Lesson 2: Configuring Windows Firewall 6-8 Lab A: Configuring Inbound and Outbound Firewall Rules 6-16 Lesson 3: Securing Network Traffic 6-18 Lab B: Configuring Connection Security Rules 6-28 Lesson 4: Configuring Windows Defender 6-30 Lab C: Implementing Host-Based Virus and Malware Protection 6-33
Module 7: Configuring File Access and Printers on Windows 8 Clients Lesson 1: Managing File Access 7-2 Lesson 2: Managing Shared Folders 7-12 Lesson 3: Configuring File Compression 7-20 Lab A: Configuring File Access 7-24 Lesson 4: Managing Printers 7-27 Lab B: Configuring Printers 7-30 Lesson 5: Overview of SkyDrive 7-32
Module 8: Securing Windows 8 Desktops Lesson 1: Authentication and Authorization in Windows 8 8-2 Lesson 2: Implementing GPOs 8-6 Lab A: Implementing Local GPOs 8-14 Lesson 3: Securing Data with EFS and BitLocker 8-17 Lab B: Securing Data 8-37 Lesson 4: Configuring User Account Control 8-39 Lab C: Configuring and Testing UAC 8-46
Module 9: Configuring Applications Lesson 1: Install and Configure Applications 9-2 Lesson 2: Managing Apps from the Windows Store 9-11 Lesson 3: Configuring Internet Explorer Settings 9-15 Lab A: Configuring Internet Explorer Security 9-21 Lesson 4: Configuring Application Restrictions in the Enterprise 9-23 Lab B: Configuring AppLocker (Optional) 9-30
Module 10: Optimizing and Maintaining Windows 8 Client Computers Lesson 1: Optimizing the Performance of Windows 8 10-2 Lab A: Optimizing Windows 8 Performance 10-11 Lesson 2: Managing the Reliability of Windows 8 10-14 Lesson 3: Managing Windows 8 Updates 10-19 Lab B: Maintaining Windows Updates 10-26
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDxiv Configuring Windows 8
Module 11: Configuring Mobile Computing and Remote Access Lesson 1: Configuring Mobile Computers and Device Settings 11-2 Lab A: Configuring a Power Plan 11-10 Lesson 2: Configuring VPN Access 11-12 Lab B: Implementing a VPN Connection 11-19 Lesson 3: Configuring Remote Desktop and Remote Assistance 11-21 Lab C: Implementing Remote Desktop 11-24 Lesson 4: Overview of DirectAccess 11-26
Module 12: Implementing Hyper-V Lesson 1: Overview of Hyper-V 12-2 Lesson 2: Creating Virtual Machines 12-5 Lesson 3: Managing Virtual Hard Disks 12-10 Lesson 4: Managing Snapshots 12-13
Module 13: Troubleshooting and Recovering Windows 8 Lesson 1: Backing Up and Restoring Files in Windows 8 13-2 Lesson 2: Recovery Options in Windows 8 13-5 Lab: Recovering Windows 8 13-17
Appendix A: Using Windows PowerShell Lesson 1: Introduction to Windows PowerShell 3.0 A-2 Lesson 2: Windows PowerShell Remoting A-11 Lesson 3: Using Windows PowerShell Cmdlets A-18
Lab Answer Keys Module 1 Lab A: Installing Windows 8 L1-1 Module 1 Lab B: Performing an Unattended Installation of Windows 8 L1-3 Module 2 Lab: Migrating to Windows 8 L2-5 Module 3 Lab A: Managing Disks L3-7 Module 3 Lab B: Configuring Device Drivers L3-12 Module 4 Lab A: Configuring Network Connection L4-15 Module 4 Lab B: Troubleshooting Network Connectivity L4-18 Module 5 Lab: Planning the Implementation of Wireless Network Connections L5-21 Module 6 Lab A: Configuring Inbound and Outbound Firewall Rules L6-25 Module 6 Lab B: Configuring Connection Security Rules L6-27 Module 6 Lab C: Implementing Host-Based Virus and Malware Protection L6-29 Module 7 Lab A: Configuring File Access L7-31 Module 7 Lab B: Configuring Printers L7-34 Module 8 Lab A: Implementing Local GPOs L8-37 Module 8 Lab B: Securing Data L8-40
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED Configuring Windows 8 xv
Module 8 Lab C: Configuring and Testing UAC L8-42 Module 9 Lab A: Configuring Internet Explorer Security L9-45 Module 9 Lab B: Configuring AppLocker (Optional) L9-47 Module 10 Lab A: Optimizing Windows 8 Performance L10-51 Module 10 Lab B: Maintaining Windows Updates L10-54 Module 11 Lab A: Configuring a Power Plan L11-57 Module 11 Lab B: Implementing a VPN L11-58 Module 11 Lab C: Implementing Remote Desktop L11-60 Module 13 Lab: Recovering Windows 8 L13-63
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED About This Course xvii
About This Course This section provides you with a brief description of the course, audience, suggested prerequisites, and course objectives.
Course Description
Note: This first release (A) MOC version of course 20687A has been developed on prerelease software (Release Preview (RP)). Microsoft Learning will release a B version of this course after the RTM version of the software is available.
This course will provide you with the knowledge and skills to install, manage, secure, and support Windows 8-based computers, devices, user accounts, and network resources. This course will teach you how to configure Windows 8 and troubleshoot various issues related to networking, data management, wireless connectivity and remote access. This course will also provide guidelines, best practices, and considerations that will help you optimize performance and minimize errors and security threats in Windows 8 client computers.
Audience
This course is intended for IT professionals, who have prior experience in configuring the Windows 8 operating system, and troubleshooting issues, and providing user support for Windows 8-based computers and devices. These IT professionals could be consultants, full-time desktop support technicians, or IT generalists who provide support for Windows 8 computers as part of their broader technical duties. IT professionals seeking certification in the 70-687 Windows 8 Configuring exam also may take this course.
Student Prerequisites This course requires that you meet the following prerequisites:
Experience managing computers running on the Windows 8 operating system.
Technical knowledge of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS).
Familiarity with Active Directory Domain Services (AD DS) principles and the fundamentals of AD DS management.
Understanding of the Public Key Infrastructure (PKI) components and working knowledge of the fundamentals of Active Directory Certificate Services (AD CS).
Knowledge of Microsoft Windows Server 2008 or Windows Server 2008 R2 fundamentals.
Knowledge of Microsoft Windows client fundamentals; for example, working knowledge of Windows XP, Windows Vista, and/or Windows 7.
Understanding of the fundamentals of management and experience using the Microsoft Office 2010 system or the Microsoft Office 2007 system.
Knowledge of Windows Automated Installation Kit (WAIK) components including Windows PE, Windows System Image Manager (SIM), Volume Activation Management Tool (VAMT), ImageX, User State Migration Tool (USMT), and Deployment Image Servicing and Management (DISM) concepts and fundamentals.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDxviii About This Course
Course Objectives After completing this course, students will be able to:
Plan and perform the installation of Windows 8.
Install Windows 8 on computers that are running an existing operating system.
Configure disks, partitions, volumes, and device drivers in a Windows 8 system.
Configure network connectivity and troubleshoot connectivity issues.
Install, configure, and maintain wireless network connections.
Implement Windows 8 technologies to secure network connections.
Share files and printers.
Implement tools and technologies that can help secure Windows 8 desktops.
Configure and control applications in Windows 8.
Optimize and maintain Windows 8-based computers.
Configure mobile computer settings and remote access.
Describe Hyper-V for Windows 8, and describe how to use it to support legacy applications.
Determine how to recover Windows 8 from various failures.
Describe how to use Windows PowerShell to manage Windows 8.
Course Outline This section provides an outline of the course:
Module 1, Installing Windows 8" describes the key features of Windows 8, and the differences between the various versions. This module also describes how to install and activate Windows 8 on a computer.
Module 2, Upgrading and Migrating to Windows 8" describes how to install Windows 8 on computers that are running on other operating systems. The module describes the processes of upgrading or migrating to Windows 8, and discusses the differences between both.
Module 3, Managing Disks and Device Drivers" describes how to configure and manage disks, partitions, and volumes in a Windows 8 system. Additionally, this module describes how to install, configure, and troubleshoot device drivers.
Module 4, Configuring and Troubleshooting Network Connections" compares IPv4 and IPv6 addresses, and describes how to configure both. The module also describes how to implement Automatic IP address Allocation and name resolution. The module concludes with a lab on troubleshooting network connectivity.
Module 5, Implementing Wireless Network Connections" provides an overview of wireless networks, and describes how to install, configure, and troubleshoot them.
Module 6, Implementing Network Security" provides an overview of common network security threats, and how to mitigate them by configuring inbound and outbound firewall rules, connection security rules, Windows Defender, and host-based virus and malware protection.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED About This Course xix
Module 7, Configuring File Access and Printers on Windows 8 Clients" describes how to manage file access, and configure NTFS file-system permissions for files and folders. The module also provides an overview of shared folders, file compression, and the impact of moving and copying compressed files and folders. The module then goes on to describe how to create and share printers, and concludes with an overview of Windows Live SkyDrive.
Module 8, Securing Windows 8 Desktops" describes new authentication and authorization features in Windows 8. The module also describes how to implement local Group Policy objects, secure data with Encrypting File Service (EFS) and BitLocker drive encryption, and configure User Account Control (UAC).
Module 9, Configuring Applications" describes how to install and configure applications, application compatibility, and application restrictions in Windows 8. Additionally, the module describes how to configure and test Windows Internet Explorer security settings, and AppLocker rules that restrict the running of applications.
Module 10, Optimizing and Maintaining Windows 8 Client Computers" describes how to identify issues with performance and reliability, and use tools such as Resource Monitor, Data Collector Sets, and Performance Monitor. The module also describes how to optimize Windows 8 performance, and manage and maintain Windows updates. Additionally, the module describes how to manage Windows 8 reliability by using Windows diagnostic tools.
Module 11, Configuring Mobile Computing and Remote Access" describes how to configure mobile computer settings and power plans, and provides an overview of mobile device sync partnerships and power-saving options. The module also describes how to enable and configure virtual private network (VPN) access, create and test a VPN, and configure remote desktop and remote assistance. The module concludes with an overview of DirectAccess, and how it works for internal and external clients.
Module 12, Implementing Hyper-V" describes the fundamentals of Hyper-V for Windows 8 and scenarios for using it. The module also describes how to create and configure virtual machines in Hyper-V, and how to manage virtual hard disks (VHDs) and snapshots.
Module 13, Troubleshooting and Recovering Windows 8" describes how to back up data and use recovery options such as System Restore to recover Windows 8.
Appendix A, Using Windows PowerShell" describes the fundamentals of Windows PowerShell, and how to use Windows PowerShell cmdlets and remote commands.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDxx About This Course
Course Materials The following materials are included with your kit:
Course Handbook A succinct classroom learning guide that provides all the critical technical information in a crisp, tightly-focused format, which is just right for an effective in-class learning experience.
Lessons: Guide you through the learning objectives and provide the key points that are critical to the success of the in-class learning experience.
Labs: Provide a real-world, hands-on platform for you to apply the knowledge and skills learned in the module.
Module Reviews and Takeaways: Provide improved on-the-job reference material to boost knowledge and skills retention.
Lab Answer Keys: Provide step-by-step lab solution guidance at your finger tips when its needed.
Course Companion Content on the http://www.microsoft.com/learning/companionmoc Site: Searchable, easy-to-navigate digital content with integrated premium on-line resources designed to supplement the Course Handbook.
Modules: Include companion content, such as questions and answers, detailed demo steps and additional reading links, for each lesson. Additionally, they include Lab Review questions and answers and Module Reviews and Takeaways sections, which contain the review questions and answers, best practices, common issues and troubleshooting tips with answers, and real-world issues and scenarios with answers.
Resources: Include well-categorized additional resources that give you immediate access to the most up-to-date premium content on TechNet, MSDN, and Microsoft Press.
Student Course files on the http://www.microsoft.com/learning/companionmoc Site: Includes the Allfiles.exe, a self-extracting executable file that contains all the files required for the labs and demonstrations.
Course evaluation At the end of the course, you will have the opportunity to complete an online evaluation to provide feedback on the course, training facility, and instructor.
To provide additional comments or feedback on the course, send e-mail to [email protected]. To inquire about the Microsoft Certification Program, send e-mail to [email protected].
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED About This Course xxi
Virtual Machine Environment This section provides the information for setting up the classroom environment to support the business scenario of the course.
Virtual Machine Configuration In this course, you will use Microsoft Hyper-V to perform the labs.
Important At the end of each lab, you must close the virtual machine and must not save any changes. To close a virtual machine without saving the changes, perform the following steps:
1. On the virtual machine, on the Action menu, click Close.
2. In the Close dialog box, in the What do you want the virtual machine to do? list, click Turn off and delete changes, and then click OK.
The following table shows the role of each virtual machine used in this course:
Virtual machine Role
20687A-LON-DC1 Domain controller in the Adatum.com domain
20687A-LON-CL1 Domain member
20687A-LON-CL2 Domain member
20687A-LON-CL3 Domain member
20687A-LON-CL4 Blank with no operating system installed, but is linked to the Windows 8 Enterprise client ISO
Software Configuration The following software is installed on each VM:
Windows Server 8
Windows 8 Client (Windows 8 Enterprise)
Microsoft Office 2010
On the server, possibly also Windows Automated Installation Kit (AIK)
Classroom Setup Each classroom computer will have the same virtual machine configured in the same way.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDxxii About This Course
Course Hardware Level To ensure a satisfactory student experience, Microsoft Learning requires a minimum equipment configuration for trainer and student computers in all Microsoft Certified Partner for Learning Solutions (CPLS) classrooms in which Official Microsoft Learning Product courseware are taught.
Intel Virtualization Technology (Intel VT) or AMD Virtualization (AMD-V) processor
Dual 120 gigabyte (GB) hard disks 7200 RM Serial ATA (SATA) or better*
8 GB RAM
DVD drive
Network adapter
Super VGA (SVGA) 17-inch monitor
Microsoft Mouse or compatible pointing device
Sound card with amplified speakers
*Striped
In addition, the instructor computer must be connected to a projection display device that supports SVGA 1024 x 768 pixels, 16-bit colors.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED1-1
Module 1 Installing and Deploying Windows 8
Contents: Module Overview 1-1
Lesson 1: Introducing Windows 8 1-2
Lesson 2: Preparing to Install Windows 8 1-7
Lesson 3: Installing Windows 8 1-14
Lab A: Installing Windows 8 1-18
Lesson 4: Automating the Installation of Windows 8 1-21
Lab B: Performing an Unattended Installation of Windows 8 1-32
Lesson 5: Activating Windows 8 1-35
Module Review and Takeaways 1-39
Module Overview Windows 8 is the latest Microsoft client operating system. With new features and capabilities, it builds on the strong core functionality of Windows 7 to provide a stable and feature rich client experience, across many form factors.
This module will introduce you to some new features of Windows 8, provide guidance on installing Windows 8, and introduce you the Windows 8 licensing environment.
Objectives After completing this module, you will be able to:
Describe the different editions of Windows 8.
Prepare a computer for Windows 8 installation.
Install Windows 8.
Automate the installation of Windows 8.
Explain Windows 8 licensing and activation.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED1-2 Installing a
Lesson Introd
Winefficandandmig
LesAfte
Int
BuilWintaskthe provinfoWinandsuchmaldatauserman
Thenewmak
NewWinintro300
nd Deploying Windo
1 ucing W
ndows 8 is desiciently. Windo the latest tab the different
ght select a spe
sson Objecer completing
Describe the
Explain the d
Understand t
troducing
t on the solid ndows 8 is desiks efficiently anlatest in compvides integrate
ormation and andows 8 can m data-security h as full-screenware protectioa encryption. Wr experience anageable platf
design of Winw user interfacekes it the centr
w Features ndows 8 represoduction of th new features.
Start screen. Tapplications acan display livfriendly layouin Windows s
Cloud integrainformation. settings instaany compute
ows 8
Windowigned to meetws 8 enables y
blet and phoneWindows 8 ed
ecific Windows
ctives this lesson, yo
key features in
ifferences betw
he implication
Windows
foundation ofigned to help nd effectively bputing technoled connectionapplications. A
meet your organeeds by prov
n immersive apon, strong authWindows 8 prolong with a mform.
ndows 8 enable and app modral hub of user
in Windowsents Microsofhe Microsoft W. The following
The Start screeand informatiove informationut, it is significasince Windows
ation. WindowUsers signing ntly that are imr, regardless o
ws 8 t a large scopeyou to take ade platforms. Thditions that ares edition.
ou will be able
n Windows 8.
ween Window
ns of using the
8
f Windows 7, users performby incorporatiogy. Windowss to important
Additionally, nizations busviding featurepplications, buhentication, anovides an improre secure and
es it to suppodel increases ur activity and d
s 8 fts most signif
Windows 95 og section highl
en represents aon in Windowsn and provide antly different s 95.
ws 8 provides inin to a Windowmportant to thof the compute
e of computingvantage of co
his lesson will ie available. The
to:
s 8 editions.
32-bit or 64-b
their ng s 8 t
iness s
uilt-in nd roved d
rt the unique wusers productidata integratio
ficant change ioperating syste
ights some of
a significant shs 8. The Start San interactive from the Start
ncreased integws 8 desktop chem. Windowsers location.
g needs, and eomputing devicntroduce you e lesson also w
bit versions on
working stylesivity, and the d
on.
in operating syem. Therefore, f the most imp
hift in the way Screen is tile-bhub experienct button interf
gration with clocomputer can s 8 ensures a c
enable users toces from traditto the key Win
will describe w
n Windows 8.
s of many diffedesign of the n
ystem design sWindows 8 co
portant feature
users find andbased, and its cce for users. Wface that has b
oud-based serconnect to thonsistent user
o perform tasktional platformndows 8 featuhy and when y
erent people. Tnew Start scree
since the ontains more tes and changes
d interact withconfigurable ti
With its touch-been impleme
rvices and e information
r experience ac
s ms, res you
The en
than s:
h iles
nted
and cross
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED
U
Wsp
WWth
Reset and rspecific def
o Reset y
o Refresreinsta
Windows Tcan start anTo Go-enabapplication
Remote Deenables musession. Youand univers
Hyper-V. Henvironmenmultiple opdepartmencompatibili
Support forsupport fordevices, pro
Understand
Windows 8 compan two distinc
Windows 8 EWindows 8 comhe x86 platform
Windows 8available. Itnecessary fbusiness us
Windows 8support theprofessionavirtualizatio
Windows 8includes en
refresh your PCfault state, or r
your PC remo
h your PC keells Windows, r
o Go. Windownd run from a bled USB devics, files, and set
esktop Servicesultiple users tou can use Winsal access to W
yper-V on Wnt. You can takperating systemts can providety with Windo
r multiple formr both the x86 oviding more u
ding Wind
mes in four diffct processor-a
Editions mes in three sem:
. This is the mot contains the or general hom
se.
Pro. This edite needs of busals, and suppoon, computer m
Enterprise. Thnterprise-level
C. By using Resrecover Windo
oves all person
eps all personaetaining the u
ws To Go enabuniversal seriace, they get a ttings.
s. Windows 8 n connect remodows 8 in Virt
Windows 8 des
Windows 8 provke advantage m configuratioe a consolidateows Server 201
m factors. Windand the ARM
ubiquitous acc
dows 8 Edi
ferent editionsrchitecture typ
parate edition
ost basic editiokey features me and small-
ion is designedsiness and techrts a broader smanagement,
his edition supsecurity, mobi
set and Refresows 8 from erro
al data, apps,
al data, desktoser experience
les you to supal bus (USB) stocomplete Win
now includes Rotely to the saual Desktop Inktops.
vides a flexibleof this environ
ons, by using aed and efficien12.
dows 8 is the fplatform. Win
cess to the Win
tions
s that pes.
ns on
on
d to hnical set of Windowand domain c
ports the full sility, and confi
h, users and ITors or corrupt
and settings fr
op-style apps, ae and user dat
ply a fully funcorage device. W
ndows 8 experi
Remote Desktome computingnfrastructure (V
e and high-pernment to test a single compu
nt virtual enviro
first Windows ndows 8 runs ondows 8 enviro
ws 8 technologconnectivity.
set of Windowguration.
C
T staff can retuoperating sys
rom the PC, an
and other impta.
ctioning copy When users boience, along w
op Services (RDg infrastructurVDI) scenarios
rforming clienapplications anuter. By using Honment throu
operating syston PCs, as wellonment for us
ies, including e
ws 8 functional
Configuring Windows
urn a computetem files:
nd reinstalls W
portant setting
of Windows 8oot from a Win
with all of their
DS) capability, e, each in an i to provide ro
t virtualizationnd IT scenariosHyper-V, IT gh virtual mac
tem to provide as tablets and
sers.
encryption,
ity, and additio
s 8 1-3
er to a
Windows.
gs, and
8 that ndows
which solated bust
n s in
chine
e d similar
onally
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED1-4 Installing and Deploying Windows 8
Key Feature Comparison The following table represents the key features available in each edition of Windows 8.
Feature Windows 8 Windows 8 ProWindows 8 Enterprise
BitLocker and BitLocker To Go X X
Boot from virtual hard disk (VHD) X X
Client Hyper-V X X
Domain Join X X
Encrypting File System X X
Group Policy X X
AppLocker X
BranchCache X
DirectAccess X
Side-load Metro apps X
Virtualization through RemoteFX X
Windows To Go X
Understanding Windows RT Windows 8 is the first Windows client operating system that supports the ARM processor architecture that is commonly found in mobile devices such as tablets and phones. Windows RT is designed specifically to run apps built on the Metro platform, and it is available only as a preinstalled operating system on tablets and similar devices with ARM processors. ARM provides a lightweight form factor with excellent battery life, specifically for mobile devices. Windows RT is preloaded with touch-optimized versions of Microsoft Office applications, and is limited to running apps built using the Metro style UI.
Note: Further detail on Windows RT is outside of the scope of this course. It is mentioned here for reference only. Unless otherwise noted, all references to Windows 8 in this course are for the x86 and x64 editions.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDA
EainWanWth
WthadW
CInarwde
Advantage
ach licensed edncludes WindoWindows 8 Entend 64-bit versi
Windows 8 are hat utilize the 6
While the 64-biheir 32-bit coudvantages of u
Windows 8, incl
Improved pcan processenabling yothis improv
Enhanced m(RAM), andincluding a
Improved dwas difficulother comm
Since the refor these demost of the
Improved senvironmenExecution P
Support forWindows 8translation.
Choosing Win most cases, architecture. A c
with a 64-bit pretermine whic
You can ins
You can insarchitectureoperating sfunctionalit
32-bit driveby 32-bit dprocessor a
You can insversions of
s of 64-bit
dition of Windws 8, Windowerprise, is availions. The 64-bdesigned to w64-bit process
t versions are unterparts, theusing a 64-bit luding:
performance. Ts more data foou to scale youved processor c
memory. A 64- it can addressll 32-bit editio
device supportt to obtain thi
mon office equ
elease of the 6evices has impe drivers that w
security. The arnt through KePrevention (DE
r the Client Hy. Hyper-V requ
indows 8 Vea computer wilcomputer withrocessor will ruch version of W
stall 64-bit ver
stall 32-bit vere. When you insystem does noty.
ers will not worivers only, yo
architecture.
stall 32-bit verapplications o
t Windows
dows 8, which ws 8 Pro, and lable in both 3
bit versions of work with comp
or architecture
similar in feature are several edition of
The 64-bit proor each clock cur applicationscapacity, you m
-bit operating s memory abo
ons of Window
t. Although 64rd-party drive
uipment.
64-bit versions proved greatly.work with Wind
rchitecture of rnel Patch Pro
EP).
yper-V featureuires 64-bit pr
ersions for Il run the versi
h a 32-bit procun the 64-bit vWindows 8 sho
sions of Windo
sions of Windonstall a 32-bit ot take advant
ork in 64-bit veu must use a 3
sions of Windoor for testing p
s 8 Version
32-bit
puters e.
ures to
cessors cycle, s to run faster must install a 6
system can move 4 gigabytews 8, which are
-bit processorers for common
of Windows V. Because Winddows 7 also w
64-bit processtection (KPP),
. This feature irocessor archit
Installationon of Windowcessor will run version of Winduld be installe
ows 8 only on
ows 8 on comversion of Win
tage of any 64
ersions of Wind32-bit version
ows 8 on 64-bpurposes.
ns
or support mo64-bit edition
make more effices (GB). This is e limited to 4 G
rs have been anly used devic
Vista and Windows 8 is built
work with Wind
sors enables a mandatory ke
is only supporttecture that su
ws 8 that corres
the 32-bit verdows 8. You ca
ed on a compu
computers wi
puters with 32ndows 8 on a
4-bit processor
dows 8. If you of Windows 8
bit architecture
C
ore users. Howof the operati
cient use of raunlike all 32-b
GB of addressa
vailable for soces, such as pri
ndows 7, the at on the same dows 8.
more secure oernel-mode dr
ted in the 64-bpports second
sponds to its prsion of Windoan use the foll
uter.
ith 64-bit proc
2-bit or 64-bit 32-bit processr architecture f
have hardwar8, regardless of
e computers to
Configuring Windows
wever, to benefing system.
ndom access mbit operating syable memory.
ome time, in thinters, scanner
availability of dkernel as Win
operating systeriver signing, a
bit versions of d level address
processor ows 8, and a colowing list to
cessor architec
processor sor architecturfeatures or
re that is suppof the compute
o support earli
s 8 1-5
fit from
memory ystems,
he past it rs, and
drivers dows 7,
em nd Data
fs
omputer
cture.
re, the
orted ers
ier
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED1-6 Installing and Deploying Windows 8
Limitations of the 64-Bit Versions The 64-bit editions of Windows 8 do not support the 16-bit Windows on Windows (WOW) environment. If your organization requires earlier versions of 16-bit applications, they will not run natively in Windows 8. One solution is to run the application within a virtual environment by using Client Hyper-V.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDLessonPrepa
Thruinde
Thsu
LA
H
Wcoinexruanth
ThreWreopco
Thim
n 2 aring tohe first step in un on the comnstallation procevices, drivers,
his lesson will uccessful Wind
esson Objfter completin
Describe m
Explain how
Understand
Identify me
Describe th
Hardware R
Windows 8 takeomputing hardnnovative devicxperience. Howunning on earlnd many comphe minimum h
he following seecommended
Windows 8. Winequirements arperating systeompromised if
1 gigahertz
1 GB RAM
16 GB avail
DirectX 9
he Windows 8mprovements i
o Install installing Winputer will be ccess, you need, and applicati
introduce youdows 8 installat
ectives ng this lesson, y
minimum recom
w to check for
d and identify
ethods for miti
he options ava
Requireme
es advantage odware. It also sces for an uncwever, Windowier configuratiputers in enterardware requi
ections list thehardware requndows 8 will inre not met, bum performancf the compute
z (GHz) or faste
(32-bit) or 2 G
able hard disk
graphics devic
kernel has bein general perf
Windondows 8 on a ccompatible witd to understanons, and unde
to these conction.
you will be ab
mmended hard
device and sc
common appl
gating applica
ilable for insta
ents for Ins
of new and posupports the laompromising ws 8 also is capions of compurprises today mrements easily
e minimum uirements for nstall if some out user experiece may be r does not me
er processor
GB RAM (64-bit
k space (32-bit
ce with a Wind
een refined andformance on t
ws 8 computer is toth Windows 8.d minimum ha
erstand the ins
cepts, and equ
le to:
dware requirem
reen resolutio
ication-compa
ation-compati
lling Windows
stalling W
owerful atest user pable of uters, meet y.
of these nce and
et or exceed t
t)
t) or 20 GB (64
dows Display D
d improved frothe same comp
o ensure that th. As a part of pardware requirstallation meth
ip you with in
ments for insta
n compatibilit
atibility issues.
bility issues.
s 8.
Windows 8
the following s
4-bit)
Driver Model (W
om Windows 7puter in severa
C
he hardware apreparing for trements, ident
hods available.
formation tha
alling Window
ty.
.
specifications:
WDDM) 1.0 or
7 and, in manyal different are
Configuring Windows
and software bthe Windows 8tify problemat
t you need to
ws 8.
r newer driver
y cases, you meas.
s 8 1-7
being 8 tic
plan a
ay see
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED1-8 Installing a
HaIn arequ
De
ApayouotheprineasythemWindriv
Howhardloadas hada
CheThecombestCon
ComTheWinand
nd Deploying Windo
rdware Reqddition to theuire a specific
The Windows(UEFI). The sepotentially unWindows 8 o
While the secboot process.
Client Hyper-(SLAT). SLAT performed fo
The BitLockerthe most seamkeys within a
etermining
art from the m also must deter computer h
nters, wireless ky to identify vim to ensure thndows 8, and tver for the app
wever, there ardware componded as well. Crhard drive contpters, network
ecking Hard Windows 8 se
mpatibility. Howt to be sure th
nfirming hardw
mpatibility Compatibility
ndows 8 progra pertinent com
Device make
Links to more
Compatibility
Driver version
ows 8
quirements f requirementshardware con
s 8 secured boecured boot prnwanted operaperating syste
cure boot proc.
-V requires a 6reduces the ov
or virtual mach
r feature requimless and secumicrocontroll
g Device Co
inimum hardwtermine the cohardware. Devikeyboards, andsually, and you
hat they are cohey have a fun
propriate Wind
re other devicenents that musritical system ctrollers, chipsek adapters, and
dware Competup process wwever, when aat the comput
ware compatib
Center for Wy Center for Wam and device
mpatibility info
and model
e information a
y status
ns available (32
for Importas listed in the pfiguration befo
oot process reqrocess takes adating-system bm start.
cess is not man
64-bit processoverhead incurr
hines.
res a computeure BitLocker eer on a compu
ompatibili
ware requiremeompatibility of ces such as d wireless miceu should chec
ompatible withnctioning devidows 8 edition.
es and computst have driversomponents, su
ets, graphics d other import
patibility will check the in organizationter hardware f
bility enables a
Windows 8indows 8 webe compatibilityormation inclu
about the dev
2-bit or 64-bit
ant Featurespreceding sectore they will in
quires a BIOS bdvantage of UEboot loaders b
ndatory for Wi
or architecturered during the
er that supportexperience. TPuters motherb
ity and Scr
ents,
e are k
h ce .
ter s uch
tant system de
nstallation comn is deploying for those compsmoother inst
site on Microsy. The website ding:
ice
t)
s tion, Windowsnstall or run co
based on UnifiEFI to prevent
between the sy
indow 8, it gre
e that supportse virtual-to-phy
ts Trusted PlatPM allows the sboard.
reen Resol
evices, must ha
mputer autommultiple insta
puters is comptallation proce
soft.com providcontains a cat
8 contains sevorrectly:
ed Extensible the launching
ystems BIOS st
eatly increases
s second level ysical address
tform Module storage of BitL
lution
ave drivers to f
matically for deallations of Winpatible with Wess.
des informatiotalog of progr
veral features
Firmware Integ of unknown tarting and the
the integrity o
address translmapping proc
(TPM) to provLocker encrypt
function prope
vice and drivendows 8 at onindows 8.
on about ams and devic
that
rface or e
of the
ation cess
vide tion
erly.
er ce, its
ces,
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDThp
WA scthM
Thdi
/C
C
Asya sehawantoca
SDapfosy
UUcoapto
Uexthat
H
he Compatibilrovide feedbac
Windows 8 Snew requirem
creen resolutiohe desktop, ma
Metro style app
he maximum sisplays, or high
AdditionaCompatCenter
Common A
n application wystem can causcomputer with
everal reasons.ardware that w
work on Windony compatibilio be aware of tause the most
etup and Inuring applicatpplication migolders that exisystem. This can
User Accounser Account Computer, and pplication thato do so.
AC also limits xpose their cohat requires adttempts to writ
owever, UAC m
Custom insadministrat
Standard umight not m
ity Center for ck for devices
Screen Resoment in Windowon, and 1366x7aking it viewabp with less than
supported resoh-pixel density
al Reading: htr/Home.
Application
written for a spse problems wh a different o. Generally, apwork on Windows 8. To troubty issues effectthe general arissues.
nstallation otion setup andght try to copy sted in a previon prevent the a
nt Control ontrol (UAC) aby restricting t requires adm
the context inmputer to viru
dministrator pete to a nonvirt
may result in t
tallers, uninstator.
ser applicationmake this task
Windows 8 weto confirm co
olution ws 8 is that Me768 for the snable while you un this required
olution for Winy displays on s
ttp://www.mic
n-Compati
pecific operatiwhen you instaoperating systeplications andows 7 will contbleshoot and atively, it is impeas that typica
of Applicatio installation, afiles and shor
ous Windows application fro
adds security tmost users to
ministrative per
n which a proceuses or other mermissions to rtualized registr
the following c
allers, and upd
ns that requireavailable to st
ebsite also enampatibility.
etro-style appap feature. Thiuse other Met
d resolution, yo
ndows 8 is 256maller form-fa
crosoft.com/en
ibility Prob
ing ll it on
em, for tinue to
address portant ally
ons n
rtcuts to operating syst
om installing p
o Windows byrun as standar
rmissions, the s
ess executes, tmalware. This crun, performs ury location.
compatibility is
daters may not
e administrativtandard users.
ables commun
plications shous enables you ro or traditionou will receive
60x1440, allowactor devices.
n-us/windows/
blems
tem, but no loproperly or eve
y controlling ard users. Whensystem promp
to minimize thchange affectsunnecessary a
ssues:
t be detected a
ve privileges to.
C
nity interaction
ld have a minito snap a Met
nal apps. If youan error mess
wing for large f
/compatibility/
nger exist for en installing at
dministrator-ln users attemppts them to con
he ability of uses any applicatiodministrator c
and elevated t
o perform their
Configuring Windows
n, where users
imum of 1024xtro app to the
u attempt to lasage.
format traditio
/en-US
the new operat all.
evel access to pt to launch annfirm their inte
ers to inadverton installer or checks or actio
to run as
r tasks may fai
s 8 1-9
can
x768 side of
aunch a
onal
ating
the n ention
tently update
ons, or
il or
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED1-10 Installing and Deploying Windows 8
Applications that attempt to perform tasks for which the current user does not have the necessary permissions may fail. How the failure manifests itself is dependent upon how the application was written.
Control panel applications that perform administrative tasks and make global changes may not function properly and may fail.
Dynamic link library (DLL) applications that run using RunDLL32.exe may not function properly if they perform global operations.
Standard user applications writing to global locations will be redirected to per-user locations through virtualization.
Windows Resource Protection Windows Resource Protection (WRP) protects Windows resources, such as files, folders, and registries, in a read-only state. This affects specific files, folders, and registry keys only. WRP restricts updates to protected resources to the operating system trusted installers, such as Windows Servicing. This enables better protection for the components and applications that ship with the operating system from the impact of other applications and administrators. However, WRP may result in the following compatibility issues:
Application installers that attempt to replace, modify, or delete operating system files and/or registry keys that WRP protects may fail, with an error message indicating that the resource cannot be updated. This is because access to these resources is denied.
Applications that attempt to write new registry keys or values to protected registry keys may fail with an error message that indicates that the change failed because access was denied.
Applications that attempt to write to protected resources may fail if they rely on registry keys or values.
64-Bit Architecture Windows 8 fully supports the 64-bit architecture. The 64-bit version of Windows 8 can run all 32-bit applications with the help of the WOW64 emulator. Considerations for the 64-Bit Windows 8 include:
Applications or components that use 16-bit executables, 16-bit installers, or 32-bit kernel drivers will either fail to start or will function improperly on a 64-bit edition of Windows 8.
Installation of 32-bit kernel drivers will fail on the 64-bit system. If an installer manually adds a driver by editing the registry, the system will not load this driver, and this can cause a system failure.
Installation of 64-bit unsigned drivers will fail on the 64-bit system. If an installer manually adds a driver by editing the registry, the system will not load the driver during load time if it is not signed.
Windows Filtering Platform Windows Filtering Platform (WFP) is an application program interface (API) that enables developers to create code that interacts with the filtering that occurs at several layers in the networking stack and throughout the operating system. If you are using a previous version of this API in your environment, you may experience failures when running security-class applications, such as network scanning, antivirus programs, or firewall applications.
Operating System Version Changes The operating system version number changes with each operating system release. For Windows 7, the internal version number is 6.1, whereas for Windows 8, the internal version number is 6.2. The GetVersion function returns this value when it is queried by an application. This change affects any application or application installer that specifically checks for the operating system version, and might prevent the installation from occurring or the application from running.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDKKeMW
M
Yo(Acodeaffe
Map
MSo
Kernel-Modeernel-mode dr
Mode Driver FraWindows Vista.
Methods fo
ou can use theACT) to determompatible withetermine how ffect your appeatures to:
Verify your compatibiliWindows o
Verify a Wi
Become invshare your
Test your wWindows In
Mitigating an application and
Mitigation Mome of the mo
Modifying ta modificatregistry ent
You can usewith ACT) tContact the
Applying uaddress masystem envensure that
Upgrading exists, the bmust considtwo differe
Modifying ta short-termyou must cregarding tadding the
e Drivers rivers must supamework (UM
or Mitigati
e Application Cmine whether yh Windows 8. Aan update to lications. You c
application, dty with a new
operating syste
ndows update
volved in the Arisk assessmen
web applicationnternet Explore
pplication com current suppo
Methods ore common m
the configurattion to the apptries, or chang
e tools such asto detect and ce software ven
pdates or servany of the comironment. Aftet the compatib
the applicatiobest long-termder both the cnt versions of
the security com solution is toonduct a full-rthe modificatiosite to the tru
pport the WindDF). UMDF is
ing Comm
Compatibility Tyour applicatioACT also helpsthe new versiocan use the AC
device, and comversion of the
em.
e's compatibilit
ACT communitnt with other A
ns and websiteer.
mpatibility issuort for the app
mitigation met
tion of the exisplication configing file or fold
s the Compatibcreate applicat
ndor for inform
vice packs to thmpatibility issueer applying thebility issue has
on to a compatm mitigation is cost of the upgthe applicatio
onfiguration. Ifo modify the srisk analysis anons. For exampusted site list o
dows 8 operata device drive
mon Applic
Toolkit ons are s you on will CT
mputer e
ty.
ty, and ACT users.
es for compati
ue typically depplication.
thods include t
sting applicatioguration, such
der permission
bility Administtion fixes (also
mation about a
he application.es, and they hee update or sebeen mitigate
tible version. Ifto upgrade to
grade and any n.
f your compatsecurity confignd gain consenple, you can mr by turning o
ting system orr developmen
cation-Com
bility with new
pends on vario
the following:
on. There can h as moving files.
trator or the Sto called shims) any additional
. Updates or seelp the applica
ervice pack, aded.
f a newer, como the newer vepotential prob
tibility issues aguration of thensus from you
mitigate the Intoff Protected M
Co
r be redesignednt platform tha
mpatibility
w releases and
ous factors, suc
be compatibiles to different
tandard User Ato address cocompatibility
ervice packs mation to run w
dditional applic
mpatible versioersion. Using thblems that ma
ppear to be pee application. Ur organizationternet Explorer
Mode, which w
onfiguring Windows
d to follow theat was introduc
y Issues
security upda
ch as the type
lity issues that folders, modi
Analyzer (instampatibility isssolutions.
may be availabwith the new opcation tests ca
on of the applihis approach, yay arise with ha
ermissions-relaUsing this appns security tear Protected mo
we do not reco
8 1-11
e User-ced in
ates to
of
require fying
alled ues.
le to perating n
cation you aving
ated, roach, m ode by mmend.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED1-12 Installing
Op
Youway
and Deploying Wind
Running the abe able to runHyper-V. Late
Using applicasystem versioright-clickingmode from th
You also can compatibility Features.
Selecting anoapplication isyou must con
ptions for I
u can install Wiys, including:
Clean installaWindows 8 owhich you areprevious Wininformation, oto installationon a computestart the comthe computersystem, run seYou can run s
o DVD
o Network
o USB Key
You also can
Upgrade instawant to replaapplications,
To perform aand select Upan in-place udevice settingyour importa
Migration. Yoneed to movebased compu
o Back up t
dows 8
application in n the applicatier sections of t
ation-compatiboning, by runni the shortcut ohe Compatibi
use the Programode. The Pr
other applicatio available, con
nsider both the
Installing W
indows 8 in a n
tion. A clean iccurs when the installing Widows operatinor when you en. To perform aer without an oputer directly r already has aetup.exe to stsetup.exe from
share
use an image
allation. Perforce an existing files, and setti
n in-place upgpgrade. You capgrade, the Wgs, applicationnt data before
ou perform a me files and settuter (destinatio
the users setti
a virtualized eion in an earliethis course will
bility features.ing the applicaor .exe file, andlity tab.
am Compatibirogram Compa
on that perfornsider switchine cost of the a
Windows
number of diff
nstallation of e hard disk to ndows contain
ng system erase the disk pa clean installaoperating systfrom the DVD
an operating tart the installam the followin
to perform a c
rm an upgradeversion of Wi
ngs.
grade to Windan run setup.e
Windows 8 instas, and other co
e performing a
migration whetings from youon computer).
ings and data
environment. Ifer version of Wl provide more
You can mitigation in compad then applyin
lity Wizard to atibility Wizard
ms the same bg to the comppplication and
8
ferent
ns no
prior ation tem, D. If
ation. ng sources:
clean installati
e, which also isndows with W
ows 8, run theexe from the pallation prograonfiguration inan upgrade.
n you have a cur old operatinPerform a mig
f all other metWindows usinge details about
gate applicatioatibility mode
ng Windows V
assist in configd is in Control
business functipatible applicad the cost of em
on.
s known as anWindows 8 and
e Windows 8 inroduct DVD oam retains all unformation au
computer alreang system (sougration by doi
thods are unavg virtualizationt Hyper-V.
on issues, such . You can acceista or Window
guring an appPanel, under
ion. If anotheration. When usmployee supp
n in-place upgr you need to r
nstallation pror from a netwouser settings, d
utomatically. A
ady running Wrce computer)ng the followi
vailable, you m tools such as
as operating-ess this mode bws XP compat
plications Programs and
r compatible sing this approport and trainin
rade, when yoretain all user
ogram (setup.eork share. Durdata, hardware
Always back up
Windows 7, and) to the Windong:
may
by ibility
oach, ng.
u
exe), ring e
p all of
d ows 8-
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDConfiguring Windows 8 1-13
o Perform a clean installation
o Reinstall the applications
o Restore the users settings and data
There are two migration scenarios: side-by-side, and wipe and load. In side-by-side migration, the source computer and the destination computer are two different computers. In wipe and load migration, the target computer and the source computer are the same. To perform wipe-and-load migration, you perform a clean installation of Windows 8 on a computer that already has an operating system, by running the Windows 8 installation program, and then selecting Custom (advanced).
Automated installation. You perform an automated installation when you use one of the above methods of installation in combination with an automation tool, to make the installation more seamless, or to remove repetitive tasks from the installation process.
Automated installations can take many forms, including pushing precreated images to computers, using an enterprise-level tool such as the Microsoft Deployment Toolkit (MDT), Windows Deployment Services (WDS) and the Windows Assessment and Deployment Kit, or even by creating an answer file manually to provide information directly to the installation process.
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITED1-14 Installing
Lesson 3Installi
Althbasecombest
ThisyouWin
LesAfte
Dis
A clsiminstin thnew
Me
Youby rnetwinst
RunDVInstwayfollo
1.
and Deploying Wind
3 ing Winhough you caned nature of th
mputerremait implement th
s lesson will he can impleme
ndows 8.
sson Objecer completing
Decide when
Explain the m
Describe Win
Explain comm
scussion: D
ean installatiople installationallation involvhe installation
w, default insta
Question: Wclean installat
ethods for
u can perform running setup.work share. Yoallation by dep
nning WindVD
alling from they to install Winowing steps:
Insert the Win
dows 8
ndows 8n perform Winhe installation in consistent, rhat method a
elp you analyzent those meth
ctives this lesson, yo
to perform a
methods that yo
dows To Go.
mon installatio
Deciding W
on is the most sn method for Wes the least nuprocess, and illation of Wind
hen do you tytion of Window
r Performin
a clean installaexe from the D
ou also can perploying an ima
dows 8 Insta
e product DVDndows 8, and in
ndows 8 DVD.
8 dows 8 installaprocess and t
regardless of tre important p
e the reasons bods, and intro
ou will be able
clean installati
ou can use to
n errors.
When to Pe
straightforwarWindows 8. A cumber of variait also results idows 8.
ypically performws?
ng a Clean
ation of WindoDVD or from arform a clean age.
allation from
D is the simplencludes the
ation by usinghe desired reshe method. Departs of the pla
behind using cduce the Wind
to:
ion of Window
perform a clea
erform a C
rd and clean bles n a
m a
n Installatio
ows 8 a
m
est
a number of sulta properetermining whanning proces
certain methodows To Go m
ws 8.
an installation
Clean Insta
on
different methly functioning hich method toss for a Window
ds, help you tomethod, which
.
allation
hods, the imagWindows 8
o use and howws 8 installatio
o understand is new in
ge-
w to on.
how
MCT U
SE ON
LY. STUD
ENT U
SE PROH
IBITEDConfiguring Windows 8 1-15
2. If your computer does not currently have an operating system, start the computer by using the product DVD. If your computer already has an operating system, you also can start the computer with the old operating system, and then run the Windows 8 installation from the product DVD on that operating system.
3. Complete the wizard.
Running Windows 8 Installation from a Network Share Instead of a DVD, you can store the Windows 8 installation files in a network share. Generally, the network source is a shared folder on a file server. Perform the following steps to install Windows 8 from a network share:
1. If your computer does not currently have an operating system, start the computer by using the Windows Preinstallation Environment (Windows PE). You can start Windows PE from bootab