03-installing and configuring windows 7 client

199
3/11/2014 1 Installing and Configuring Windows® 7 Client Welcome! Thank you for taking our training. We’ve worked together with our Microsoft Certified Partners for Learning Solutions and Microsoft IT Academies to bring you a world-class learning experience, including: Microsoft Certified Trainers + Instructors. Your instructor is a premier technical and instructional expert who meets ongoing certification requirements. Customer Satisfaction Guarantee. Our Certified Partners for Learning Solutions offer a satisfaction guarantee and we hold them accountable for it. At the end of class, please complete an evaluation of today’s experience. We value your feedback! Certification Exam Benefits. After training, consider taking a Microsoft Certification exam. Independent research by IDC concluded that 75% of managers believe certifications are important to team performance*. Ask your instructor about available exam promotions and discounts. We wish you a great learning experience and ongoing career success! * IDC, Value of Certification: Team Certification and Organizational Performance, November 2006

Upload: anand919

Post on 16-Dec-2015

31 views

Category:

Documents


2 download

DESCRIPTION

Installing and Configuring Windows 7 Client

TRANSCRIPT

  • 3/11/2014

    1

    Installing and Configuring Windows 7 Client

    Welcome!

    Thank you for taking our training. Weve worked together with our Microsoft Certified Partners for Learning Solutions and Microsoft IT Academies to bring you a world-class learning experience, including:

    Microsoft Certified Trainers + Instructors. Your instructor is a premier technical and instructional expert who meets ongoing certification requirements.

    Customer Satisfaction Guarantee. Our Certified Partners for Learning Solutions offer a satisfaction guarantee and we hold them accountable for it. At the end of class, please complete an evaluation of todays experience. We value your feedback!

    Certification Exam Benefits. After training, consider taking a Microsoft Certification exam. Independent research by IDC concluded that 75% of managers believe certifications are important to team performance*. Ask your instructor about available exam promotions and discounts.

    We wish you a great learning experience and ongoing career success!

    * IDC, Value of Certification: Team Certification and Organizational Performance, November 2006

  • 3/11/2014

    2

    Introduction

    Name

    Company affiliation

    Title/function

    Job responsibility

    Operating system, networking, security experience

    Windows experience

    Your expectations for the course

    Course Companion CD

    Course Material

    http://www.microsoft.com/learning/

    Lessons

    Labs

    Module Reviews and Takeaways

    Lab Answers

    A succinct classroom learning guide that provides critical technical information to optimize your in-class learning experience.

    Online Resources

    Student Course Files

    Searchable, easy-to-navigate digital content with integrated premiumon-line resources designed to

    supplement the Course Handbook.

    Course Handbook

  • 3/11/2014

    3

    How to Use the Course Material

    http://www.microsoft.com/learning/

    Use the handbook content as the primary resource for reference during

    the class.

    Use the troubleshooting tips and best practices in the Module Reviews and

    Takeaways section as on-the-job references.

    During the class, refer to the Companion CD while performing labs

    or as suggested by the instructor.

    Use the CD as your extended learning resource on the job.

    Course Handbook Course Companion CD

    Facilities

    Class hours

    Building hours

    Parking

    Restrooms

    Meals

    Phones

    Messages

    Smoking

    Recycling

  • 3/11/2014

    4

    6293: Supporting Windows 7 Clients in the Enterprise6293: Supporting Windows 7 Clients in the Enterprise

    6294: Planning and Managing Windows 7 Desktop Deployments and Environments6294: Planning and Managing Windows 7 Desktop Deployments and Environments

    6292: Installing and Configuring Windows 7 Client6292: Installing and Configuring Windows 7 Client

    Microsoft Learning

    http://www.microsoft.com/learning/

    Microsoft Certification Program

    Exam number and title

    Core exam for the following track

    Elective exam for the following track

    70-680: TS: Windows 7, Configuring

    MCTS MCITP

    http://www.microsoft.com/learning/

  • 3/11/2014

    5

    About This Course

    Audience

    Course Prerequisites

    Course Objectives

    Course Outline

    Module 1: Installing, Upgrading, and Migrating to Windows 7

    Module 2: Configuring Disks and Device Drivers

    Module 3: Configuring File Access and Printers on Windows 7 Clients

    Module 4: Configuring Network Connectivity

    Module 5: Configuring Wireless Network Connections

    Module 6: Securing Windows 7 Desktops

    Module 7: Optimizing and Maintaining Windows 7 Client Computers

    Module 8: Configuring Mobile Computing and Remote Access in Windows 7

  • 3/11/2014

    6

    Virtual Machine Environment

    Base09C-

    RC.vhd

    Base10A-WS08R2-

    HV.vhd

    Parent

    6292A-LON-CL1-

    ALLFILES.vhd

    Parent

    WS08R2-LON-

    DC1.vhd

    Differencing

    Parent

    6292A-LON-DC1.vhd

    Differencing

    Win7-OFC.vhd

    DifferencingDifferencing

    Parent

    6292A-LON-CL2.vhd

    Differencing

    Stand Alone

    6292A-LON-CL3.vhdBase10D-W7-

    Office07-HV.vhd

    Parent

    Base09F-Vista-

    Office07SP2-

    HV.vhd

    Parent

    Differencing

    6292A-LON-VS1.vhd

    6292A-LON-CL1-

    Disk1.vhd6292A-LON-CL1-

    Disk2.vhd

    Differencing

    6292A-LON-CL1.vhd

    Virtual Machine Environment

    Virtual machine Used as:

    6292A-LON-DC1 Domain controller in the Contoso.com domain

    6292A-LON-CL1 Windows 7 computer in the Contoso.com domain

    6292A-LON-CL2 Windows 7 computer in the Contoso.com domain

    6292A-LON-CL3 Virtual machine with no operating system installed

    6292A-LON-VS1 Windows Vista computer in the Contoso.com domain

  • 3/11/2014

    7

    Demonstration: Using Hyper-V Manager

    In this demonstration, you will learn how to:

    Open Hyper-V Manager

    Navigate the various sections/panes within Hyper-V Manager

    Virtual Machines, Snapshots, and Actions: Server specific and Virtual Machine specific

    Identify the virtual machines (VMs) used in the labs for this course

    Take a Snapshot and Apply a Snapshot

    Connect to a VM

    Start and log on to a VM

    Switch between the full screen and window modes

    Revert to the previous Snapshot

    Shut down a VM

    Understand the difference between Shut Down and Turn off

    Close Hyper-V Manager

    Module 1

    Installing, Upgrading, and Migrating to Windows 7

  • 3/11/2014

    8

    Module Overview

    Preparing to Install Windows 7

    Performing a Clean Installation of Windows 7

    Upgrading and Migrating to Windows 7

    Performing Image-Based Installation of Windows 7

    Configuring Application Compatibility

    Lesson 1: Preparing to Install Windows 7

    Key Features of Windows 7

    Editions of Windows 7

    Hardware Requirements for Installing Windows 7

    Advantages of Using 64-Bit Editions of Windows 7

    Options for Installing Windows 7

  • 3/11/2014

    9

    Improved user interface and accessibility features

    Windows Search

    BranchCacheTM, DirectAccess, and VPN Reconnect

    Productivity

    Windows Virtual PC and Windows XP Mode

    Manageability

    Microsoft Windows PowerShell 2.0

    Group Policy Scripting

    Windows Troubleshooting Packs

    Problem Steps Recorder

    Improvements to System Restore Tool and Reliability Monitor

    AppLockerTM

    Improvements in auditing

    Group policy preferences

    Reduce help desk calls

    Automation FlexibilityWindows Imaging (WIM) format and image-based deployment

    Modularization

    Network deployment by using Windows Deployment Services with Multicast with multiple stream transfer and Dynamic driver provisioning

    The new Deployment Image Servicing and Management (DISM) and improvements in User State Migration Tool (USMT) 4.0

    Deployment

    Application recovery and error reporting

    Detection and recovery from hard disk and memory failures

    Auto-tuning network stack for more efficient bandwidth utilization

    Reliability and performance

    Defragmentation runs in the background

    Data protection at document, file, directory,computer and network levels

    Rights Management Services (RMS)

    Encrypting File System (EFS)

    Windows BitLockerTM Drive Encryption and Windows BitLocker To GoTM

    Internet Protocol Security (IPsec)

    Multi-tiered data protection

    Fundamentally secured platform

    New features and improvements to protect against worms, viruses, and malware

    Administrators work at user privilege level

    Streamlined User Account Control (UAC)

    SecurityUsability

    Clearer ways to organize, search for, and view information

    New communication, mobility, and networking features

    Key Features of Windows 7

    Improvements to the user interface

    Accessibility features

    BranchCacheTM, DirectAccess, and VPN Reconnect

    Enhanced user productivity

    Reliable and consistent performance using new hardware features

    Improved application recovery and error reporting

    Detection and recovery from some hard disk and memory failures

    Auto-tuning network stack for more efficient bandwidth utilization

    Greater reliability and performance

    Improved data protection at document, file, directory and computer levels

    Rights Management Services (RMS)

    Windows BitLockerTM Drive Encryption and Windows BitLocker To GoTM

    Internet Protocol Security (IPsec)

    Multi-tiered data protection

    Built on a fundamentally secure platform based on Windows Vista foundation

    New features and improvements to protect against worms, viruses, and malware

    Administrators work at user privilege level

    Streamlined User Account Control (UAC)

    Enhanced securityImproved Usability

    Clearer ways to organize, search for, and view information

    New communication, mobility, and networking features

    The key features of Windows 7are categorized as follows:

    Reliability and performance

    Deployment

    Usability

    Security

    Productivity

    Manageability

    Multi-tiered data protection

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    10

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Windows 7 Ultimate

    Windows 7Enterprise

    Windows 7 Professional

    Windows 7 Home

    Premium

    Windows 7 Home Basic

    Windows 7 Starter

    Editions of Windows 7

    Windows 7 Ultimate

    Targeted for technical enthusiasts who want all Windows 7 features, without a Volume License agreement

    Includes all the same features as the Windows 7 Enterprise

    Not licensed for VDI scenarios

    Windows 7 Enterprise

    Business-focused edition, targeted for managed environments, mainly large enterprises

    Includes all features available in Windows 7 Professional edition

    Additionally, it includes:

    BitLocker and BitLocker To Go

    AppLocker

    DirectAccess

    BranchCache

    All worldwide interface languages

    Enterprise Search Scopes

    Virtual Desktop Infrastructure (VDI) enhancements and ability to boot from a VHD

    Windows 7 Professional

    Business-focused edition for small and lower mid-market companies and users who have networking, backup, and security needs and multiple PCs or servers

    Includes all features available in Windows 7 Home Premium edition

    Additionally, it includes:

    Core business features, such as Domain Join and Group Policy

    Data protection with advanced network backup and Encrypted File System

    Ability to print to the right printer at home or work with Location Aware Printing

    Remote Desktop host and Offline folders

    Windows Virtual PC and Windows XP Mode.

    Windows 7 Home Premium

    The standard edition for customer. It provides full functionality on the latest hardware, easy ways to connect, and a visually rich environment

    Includes all features available in Windows 7 Home Basic edition

    Additionally, it includes:

    Windows Aero Glass, advanced windows navigation and Aero background

    Windows Touch (Multi-touch and handwriting support)

    Ability to create a HomeGroup, which ease sharing across all PCs and devices

    DVD Video playback and authoring

    Windows Media Center, Snipping Tool, Sticky Notes, Windows Journal and Windows Sideshow

    Windows 7 Home Basic

    Targeted for value PCs in emerging markets, meant for accessing the internet and running basic productivity applications

    Includes all features available in Windows 7 Starter edition

    Additionally, it includes:

    No limit on number of programs you can run

    Live Thumbnail previews and enhanced visual experiences

    Advanced networking support (ad-hoc wireless networks and internet connection sharing)

    Windows 7 Starter

    Targeted specifically for small form factor PCs in all markets

    Only 32-bit

    Features include:

    Improved Windows Taskbar and Jump Lists

    Windows Search

    Ability to join a HomeGroup

    Action Center, Device Stage, Fax and Scan

    Enhanced media streaming, including Play To

    Broad applications and device compatibility

    No limitation on how many applications can run simultaneously

    Secured, reliable and supported operating system

    Windows 7 Home Basic

    Value edition in emerging markets

    Windows 7 Professional

    Windows 7 Home

    Premium

    Standard consumer edition

    Does not include business features

    Consumers Businesses

    Windows 7 Ultimate

    Enthusiasts

    All features of Windows features

    Specialized

    Windows 7 Starter

    Entry-level edition in all markets

    Emerging Markets

    Business-focused edition for small and lower mid-market

    Include business features

    Windows 7 Enterprise

    Business-focused edition for large

    enterprises

    Enterprises

    Entry Level PCs

  • 3/11/2014

    11

    Hardware Requirements for Installing Windows 7

    Hardware Minimum Requirements

    CPU 1 GHz or faster

    RAM 1 GB for 32-bit or 2 GB for 64-bit

    GPU Aero Capable

    Video RAM 128 MB

    HDD Free 16 GB for 32-bit or 20 GB for 64-bit

    Optical Drive DVD

    Advantages of Using 64-Bit Editions of Windows 7

    Take advantage of 64-bit processors:

    Limitation:

    Improved performance

    More memory

    Improved device support

    Improved security

    Does not support the 16-bit Windows on Windows (WOW) environment

  • 3/11/2014

    12

    Clean installation

    Install Windows 7 on a new partition Replace an existing operating system on a partition

    Upgrade installation

    Replace an existing version of Windows with Windows 7 All users applications, files, and settings are retained

    Migration Move files and settings from an old operating system to

    Windows 7 Side-by-side or wipe and load

    Options for Installing Windows 7

    Lesson 2: Performing a Clean Installation of Windows 7

    Discussion: Considerations for a Clean Installation

    Methods for Performing Clean Installation

    Discussion: Common Installation Errors

    Demonstration: Configuring the Computer Name and Domain/Word Group Settings

  • 3/11/2014

    13

    Discussion: Considerations for a Clean Installation

    When do you typically perform a clean installation of Windows?

    5 min

    Start the computer by using Windows PE

    Connect to a network share containing Windows 7 files

    Run setup.exe from the network share and complete the wizard

    Running setup.exe Running setup.exe from a network share

    Insert the product DVD

    Start the computer by using the product DVD

    Complete the wizard

    Running setup.exe Running setup.exe from DVD

    Create a WIM file from a reference computer

    Start the computer by using Windows PE

    Apply the WIM file to the target computer

    Install by using an Install by using an image

    ImageX, Windows Deployment Service, Microsoft Deployment Toolkit

    Methods for Performing Clean Installation

    Running setup.exe Running setup.exe from DVD

    Installing by using an Installing by using an image

    Running setup.exe Running setup.exe from a network share

  • 3/11/2014

    14

    Discussion: Common Installation Errors

    What potential issues might you encounter when installing Windows?

    5 min

    Demonstration: Configuring the Computer Name and Domain/Workgroup Settings

    5 min

    In this demonstration, you will see how to configure domain and workgroup settings.

  • 3/11/2014

    15

    Lesson 3: Upgrading and Migrating to Windows 7

    Considerations for Upgrading and Migrating to Windows 7

    Identifying the Valid Upgrade Paths

    Determining the Feasibility of an Upgrade Using Windows Upgrade Advisor

    Process for Upgrading to Windows 7

    Tools for Migrating User Data and Settings

    Process for Migrating to Windows 7

    Migrating User Settings and Data by Using WET

    Considerations for Upgrading and Migrating to Windows 7

    Upgrade:

    Does not require the reinstallation of applications

    Does not require additional storage space

    Does not require replacing existing computer hardware

    Is the recommended solution in home or small offices scenarios

    Migrate:

    Requires a reinstallation of applications

    Typically, requires more storage space

    Typically, requires replacing existing computer hardware

    Is the recommended solution to achieve a standardized environment in a large enterprise scenario

  • 3/11/2014

    16

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Identifying the Valid Upgrade Paths

    Windows 95Windows 98Windows MEWindows NT4Windows 2000

    Windows Vista SP1, SP2 Windows 7

    Only clean install

    Clean install

    In-place upgrade Clean install Migration

    MigrationMigrationWindows XPWindows Vista RTM

    Windows Anytime Upgrade enables you to upgrade to a higher edition of Windows 7

  • 3/11/2014

    17

    Determining the Feasibility of an Upgrade Using Windows Upgrade Advisor

    Windows Upgrade Advisor is a downloadable application that helps Windows users identify which edition of

    Windows 7 meets their needs

    Use Windows Upgrade Advisor to:

    Provide suggestions about necessary hardware updates to install and run the appropriate edition and features of Windows 7

    Provide upgrade guidance to Windows 7

    RequirementsRequirements

    .NET 2.0

    MSXML 6

    20 MB free HDD

    Administrator privileges

    Internet connection

    Keep operating system up to date to protect against any security threats:

    Update can also be done during upgrade (Dynamic Update)

    Update

    Determine any relevant updates1

    Apply all relevant updates to the computer

    2

    After the upgrade:

    Verify

    Log on to the computer1

    Verify all applications and hardware devices function correctly

    2

    Follow Windows Upgrade Advisor recommendations if any

    3

    To perform an upgrade to Windows 7, run setup.exe from:

    Windows 7 product DVD

    Network shareUpgrade

    Protect against data loss, backup data and settings by using appropriate backup media:

    CD/DVD disc

    Network share

    Any other backup mediaBack upEvaluate

    Evaluate whether your computer meets the necessary requirements to run Windows 7:

    Use the following tools:

    Hardware requirements

    Application compatibility

    Standard User Analyzer Tool

    Microsoft Assessment and Planning Toolkit

    Windows Upgrade Advisor

    Application Compatibility Toolkit

    Evaluate

    Back Up

    UpgradeVerify

    Update

    Process for Upgrading to Windows 7

  • 3/11/2014

    18

    User State Migration Tool (USMT) 4.0

    Windows Easy Transfer (WET)Application

    Settings

    User Preferences

    User Data

    Earlier Version of Windows

    Windows 7

    What to migrateIdentify which components are to be migrated

    to the new operating system

    Use one of the following migration tools:

    Windows Easy Transfer (WET)

    User State Migration Tool (USMT) 4.0

    Tools for Migrating User Data and Settings

    Back up user state, including:

    Use one of the following migration tools:

    User settings

    Application settings

    User data

    Back up

    Windows Easy Transfer

    User State Migration Tool

    Run the Windows 7 installation (setup.exe) from:

    product DVD

    Network shareInstallInstall

    Windows 7

    Keep your computer secure by keeping up with current updates:

    Update

    Select check for updates during installation

    Check for updates after installation

    After installing Windows 7, reinstall all applications:

    InstallInstallApplications

    Install the compatible version of the applications

    After installing applications, restore user state by using:

    Restore

    Windows Easy Transfer

    User State Migration Tool

    Process for Migrating to Windows 7

    Back Up

    Install Windows 7

    UpdateInstall Applications

    Restore

  • 3/11/2014

    19

    Transfer files and settings by using a network

    Click A Network

    Click This is my old computer

    Start WET on the source computer

    Click Next

    On the destination computer, enter WETkey and then click Next

    WET creates WET key

    3

    4

    1

    2

    6

    5

    Click Transfer and proceed with the wizard

    7

    Source Computer

    Destination Computer

    On destination computer:

    Prepare for the migration on the destination computer

    Click Next

    Select transfer method

    Close all active programs

    Start Windows Easy Transfer

    Click I need to install now (if source computer does not have WET)

    Click This is my new computer

    3

    4

    1

    2

    6

    5

    Select destination media and save WET files7

    Destination Computer

    To migrate by using WET:

    WET is the recommended tool for scenarios in which you have a small number of computers to migrate

    Store the Windows 7 WET files to be Used on the Source Computer

    Migrate Files and Settings from the Source Computer to the Destination Computer by using:

    Windows Easy Transfer cable

    Network

    Removable media or a network share

    1

    2

    Migrating User Settings and Data by Using WET

    Lesson 4: Performing an Image-Based Installation of Windows 7

    What Is Windows Imaging File Format?

    Tools for Performing an Image-Based Installation

    Image-Based Installation Process

    Demonstration: Building an Answer File by Using Windows SIM

    Building a Reference Installation by Using SysPrep

    Demonstration: Creating Bootable Windows PE Media

    Capturing and Applying the Installation Image by Using ImageX

    Demonstration: Modifying Images by Using DISM

    Migrating User Data and Settings by Using USMT 4.0

    Configuring VHDs

  • 3/11/2014

    20

    What Is Windows Imaging File Format?

    Provides the following benefits:

    One image for many hardware configurations

    Compression and single instancing

    Multiple images in one file

    Offline servicing of the image file

    Installation on partitions of any size

    Nondestructive deployments

    Modification of image files using APIs

    Bootable image support for Windows PE

    A file-based image technology used to install the Windows operating system

    Tools for Performing Image-Based Installation

    Windows Setup (setup.exe)

    Answer File

    Catalog

    Windows Automated Installation Kit (Windows AIK)

    Windows System Image Manager (Windows SIM)

    Windows Preinstallation Environment (Windows PE)

    ImageX

    User State Migration Tool (USMT)

    Deployment Image Servicing and Management (DISM)

    Sysprep

    Diskpart

    Windows Deployment Services (WDS)

    Virtual Hard Disk (VHD)

  • 3/11/2014

    21

    Image-Based Installation Process

    Build an Answer File1

    Build a reference installation2

    Create a bootable Windows PE Media3

    Capture the installation image4

    Deploy the installation image5

    Demonstration: Building an Answer File by Using Windows SIM

    10 min

    In this demonstration, you will learn how to create an answer file by using Windows SIM.

  • 3/11/2014

    22

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Prepares an installation of Windows for duplication, auditing, and delivery

    Building a Reference Installation by Using SysPrep

    Use Sysprep to:

    Remove system-specific data from the Windows operating system

    Configure Windows to start in audit mode

    Configure the Windows operating system to start the Windows Welcome phase

    Reset Windows Product Activation

    Sysprep.exe [/quiet] [/generalize] [/audit | oobe] Sysprep.exe [/quiet] [/generalize] [/audit | oobe] [/reboot | /shutdown | /quit] [/unattend:answerfile]

  • 3/11/2014

    23

    Demonstration: Creating Bootable Windows PE Media

    5 min

    In this demonstration, you will see how to create bootable Windows PE media that can be used for imaging computers.

    A command-line tool that is used to capture, modify, and apply file-based WIM images

    Capturing and Applying the Installation Image by Using ImageX

    Use ImageX to:

    View the contents of a WIM file

    Capture and apply images

    Mount images for offline image editing

    Store multiple images in a single file

    Compress the image files

    Implement scripts for image creation

    ImageX [/flags EditionID] [{/dir | /info | /capture | /apply | /append | /delete | /export | /mount | /mountrw | /unmount | /split} [Parameters]

  • 3/11/2014

    24

    Demonstration: Modifying Images by Using DISM

    5 min

    In this demonstration, you will see how to modify an image by using DISM.

    Migrating User Settings and Data by Using USMT 4.0

    A scriptable command-line tool that provides a highly-customizable user-profile migration

    experience for IT professionals

    Scanstate [StorePath] [/i:[path\]FileName] [Options]Loadstate [StorePath] [/i:[path\]FileName] [Options]

    USMT components:

    ScanState and LoadState

    Config.xml and Migration .xml files

    Component manifests for Windows Vista, Windows 7, and down-level manifests for Windows XP

    USMT internal files

  • 3/11/2014

    25

    Configuring VHDs

    Create VHD

    DiskPart Tool

    Disk Management MMC

    Attach VHD to the host computer

    Prepare VHD

    Install Windows 7 to the VHD

    Deploy VHD

    Copy VHD to computer to run in VM

    Copy VHD to computer to run in Native Boot

    Add a Native Boot VHD to the Boot Menu

    Use WDS to deploy VHD images for native boot

    A native-boot VHD is a VHD that can be used as the running operating system on a computer without a

    parent operating system

    Lesson 5: Configuring Application Compatibility

    Common Application Compatibility Problems

    Common Mitigation Methods

    Updating Shims

  • 3/11/2014

    26

    Common Application Compatibility Problems

    Common Application Compatibility problems may relate to the following areas:

    Setup and installation of applications

    User Account Control

    Windows Resource Protection (WRP)

    Internet Explorer Protected Mode

    64-bit architecture

    Windows Filtering Platform (WFP)

    Operating system version changes

    Kernel-mode drivers

    Deprecated components

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    27

    Common Mitigation Methods

    Common mitigation methods include:

    Modifying the application configuration

    Applying updates or service packs

    Upgrading the application

    Modifying the security configuration

    Running the application in a virtualized environment

    Using application compatibility features built into the operating system

    Selecting another application

    Updating Shims

    A shim is software, added to an existing application or other program, to provide some form of enhancement or stability

    In the application compatibility context, a shim refers to a compatibility fix

    Use the Compatibility Administrator Tool to:

    To deploy a compatibility fix:

    Search for a compatibility fix for an existing application

    Create a new compatibility fix

    Store the compatibility fix database locally or in a network location

    Use the Sdbinst.exe command-line tool to install the compatibility fix

  • 3/11/2014

    28

    Lab: Installing and Configuring Windows 7

    Exercise 1: Migrating Settings by Using Windows Easy Transfer

    Exercise 2: Configuring a Reference Image

    Exercise 3: Deploying a Windows 7 Image

    Logon information

    Virtual machines6292A-LON-DC16292A-LON-CL16292A-LON-VS1

    User name Contoso\Administrator

    Password Pa$$w0rd

    Estimated time: 90 minutes

    Lab Scenario

    The first batch of Windows 7 computers has arrived. As part of the deployment process, you need to migrate user settings from existing Windows XP computers to the new Windows 7 computers.

    You are rolling out Windows 7 to the computers in your organization. To do this you are creating a reference image of Windows 7 that can be applied to other computers. The image is generalized by using Sysprep.

    You are performing a manual test of the deployment process for new images. Eventually, this process will be automated. In this test run, you are ensuring that you have the correct syntax for all of the commands used to start the capture of user settings from the old computer, apply the reference image to the new computer, and then apply user settings to the new computer.

  • 3/11/2014

    29

    Lab Review

    Why do you use Sysprep before capturing an image?

    Why is Windows PE required as part of the imaging process?

    Module Review and Takeaways

    Review Questions

    Common Issues and Troubleshooting Tips

    Best Practices

    Tools

  • 3/11/2014

    30

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Module 2

    Configuring Disks and Device Drivers

  • 3/11/2014

    31

    Module Overview

    Partitioning Disks in Windows 7

    Managing Disk Volumes

    Maintaining Disks in Windows 7

    Installing and Configuring Device Drivers

    Lesson 1: Partitioning Disks in Windows 7

    What Is an MBR Disk?

    What Is a GPT Disk?

    Disk Management Tools

    Demonstration: Converting an MBR Partition to a GPT Partition

  • 3/11/2014

    32

    What Is an MBR Disk?

    Is created when the disk is partitioned

    Is on the first sector of the hard disk

    Contains a four partition entry table

    Limits the number & size of partitions

    Master Boot Record (MBR) DiskThe MBR contains the partition table for the disk and a small

    amount of executable code called the master boot code.

    What Is a GPT Disk?

    GUID Partition Table(GPT)Contains an array of partition entries describing the start and end LBA of each partition on disk

    Supports more partitions

    Supports larger partitions

    Enhances reliability

    Supports boot disks on 64-bit Windows operating systems, UEFI systems

  • 3/11/2014

    33

    Diskpart.exe

    Scriptable command line utility

    Create scripts to automate disk-related tasks

    Always runs locally

    Disk Management Snap-in

    Graphical user interface

    Manage disks and volumes, both basic and dynamic, locally or on remote computers

    Simple partition creation

    Disk Management Tools

    Use diskpart.exe to convert partition styles

    MBR GPT

    Disk Management Snap-in

    Graphical user interface

    Manage disks and volumes, both basic and dynamic, locally or on remote computers

    Simple partition creation

    Diskpart.exe

    Scriptable command line utility

    Create scripts to automate disk-related tasks

    Always runs locally

    Use diskpart.exe to convert partition styles

    MBR GPT

    Disk Management Tools

    Disk Management Snap-in

    Graphical user interface

    Manage disks and volumes, both basic and dynamic, locally or on remote computers

    Simple partition creation

    Diskpart.exe

    Scriptable command line utility

    Create scripts to automate disk-related tasks

    Always runs locally

    Use diskpart.exe to convert partition styles

    MBR GPT

  • 3/11/2014

    34

    Demonstration: Converting an MBR Partition to a GPT Partition

    In this demonstration, you will see how to:

    Convert a Disk to GPT by using Diskpart.exe

    Convert Disk 3 to GPT by using Disk Management

    Verify the Disk Type

    10 min

    Lesson 2: Managing Disk Volumes

    What Is a Simple Volume?

    Demonstration: Creating a Simple Volume

    What Are Spanned and Striped Volumes?

    Demonstration: Creating Spanned and Striped Volumes

    Purpose of Resizing a Volume

    Demonstration: Resizing a Volume

  • 3/11/2014

    35

    What Is a Simple Volume?

    Simple VolumeDynamic volume that encompasses available

    free-space from a single, dynamic, hard disk drive

    Can be extended on same disk

    Can be extended across disks creating a Can be extended across disks creating a spanned volume

    Not fault tolerant

    Volume I/O performance the same as Disk Volume I/O performance the same as Disk I/O performance

    Demonstration: Creating a Simple Volume

    In this demonstration, you will see how to create a simple volume by using Disk Management and Diskpart.exe.

    10 min

  • 3/11/2014

    36

    Spanned

    A spanned volume joins areas of unallocated space disks into a single logical disk.

    Striped

    A striped volume maps stripes of data cyclically across the disks.

    Striped

    Requires multiple dynamic disks

    Allocated space from each disk must be identical

    Well suited for isolating the paging file

    No fault tolerance

    Up to 32 disks can be combined into single striped volume

    Provides for faster throughput

    Spanned

    Requires dynamic disks

    Space allocated from multiple dynamic disks

    Up to 32 disks can be combined into single spanned volume

    No fault tolerance

    No performance improvement compared to simple volumes

    Can shrink or extend

    What Are Spanned and Striped Volumes?

    Striped

    Requires multiple dynamic disks

    Allocated space from each disk must be identical

    Well suited for isolating the paging file

    No fault tolerance

    Up to 32 disks can be combined into single striped volume

    Provides for faster throughput

    Spanned

    Requires dynamic disks

    Space allocated from multiple dynamic disks

    Up to 32 disks can be combined into single spanned volume

    No fault tolerance

    No performance improvement compared to simple volumes

    Can shrink or extend

    What Are Spanned and Striped Volumes?

  • 3/11/2014

    37

    Demonstration: Creating Spanned and Striped Volumes

    In this demonstration, you will see how to:

    Create a spanned volume

    Create a striped volume

    10 min

    Purpose of Resizing a Volume

    Before shrinking:

    Defragment the disk

    Reduce shadow copy disk space consumption

    Ensure that no page files are stored on the volume to be shrunk

    Resize a volume to create additional, unallocated space to use for data or programs on a new volume.

    Shrink simple and spanned dynamic disks to:

    Extend the simple volume on the same disk

    Extend a simple volume to include unallocated space on other disks on the same computer

  • 3/11/2014

    38

    Demonstration: Resizing a Volume

    In this demonstration, you will see how to:

    Shrink a volume by using Diskpart.exe

    Extend a volume by Disk Management

    5 min

    Lesson 3: Maintaining Disks in Windows 7

    What Is Disk Fragmentation?

    Defragmenting a Disk

    What Are Disk Quotas?

    Demonstration: Configuring Disk Quotas (Optional)

  • 3/11/2014

    39

    What Is Disk Fragmentation?

    Disk fragmentation can:

    Consist of both fragmented files and fragmented free space

    Lead to poor performance of the disk subsystem

    Disk fragmentation is the non-contiguous storage of data on a volume

    Defragmenting a Disk

    Rearrange data and reunite fragmented files

    Scheduled to run automatically by default

    Can be run from the command-lineC:>

  • 3/11/2014

    40

    What Are Disk Quotas?

    A disk quota is a way for you to limit use of disk space on a volume for each user to conserve disk space.

    Disk quotas help you:

    Track and restrict disk consumption

    Proactively monitor available space

    Determine who is consuming available space

    Plan for storage capacity increases

    Demonstration: Configuring Disk Quotas (Optional)

    In this demonstration, you will see how to:

    Create quotas in a Volume

    Test a quota

    Review quota alerts and event-log messages

    12 min

  • 3/11/2014

    41

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    42

    Lesson 4: Installing and Configuring Device Drivers

    Overview of Device Drivers in Windows 7

    Installing Devices and Drivers

    Device Driver Management Tools

    Options for Updating Drivers

    Managing Signed Drivers

    Discussion: Options for Recovering from a Driver Problem

    Demonstration: Managing Drivers

    Overview of Device Drivers in Windows 7

    A driver is a small software program that allows a hardware device to communicate with a computer.

    Drivers developed for the 32-bit versions do not work with the 64-bit versions, and vice versa.

    Device drivers that ship with Windows 7 have a Microsoft digital signature.

    The driver store is the driver repository.

    Device metadata packages contain device experience XML documents that represent:

    The properties of the device

    The device functions

    Applications and services that support the device.

  • 3/11/2014

    43

    Installing Devices and Drivers

    Improve end-user device driver installation by:

    Configuring client computers to automatically search a specified list of folders

    Search folders specified by the DevicePath registry entry

    Staging driver packages in the protected driver store

    Add to the Driver Store by using the Plug-and-Play utility (Pnputil.exe) at a Command Prompt

    Device Manager

    Helps install and update drivers for hardware devices, change the hardware settings for those devices, and troubleshoot problems

    Use Device Manager to manage devices only on a local computer

    this location are usually

    Devices and Printers

    Provides a place to manage devices

    Devices that display in this location are usually external devices that you connect or disconnect from the computer through a port or network connection

    Device Manager Device StageDevices and PrintersDevice Stage

    Provides users with a way to access devices and advanced options for managing them

    Devices in use are shown on the taskbar with a photo-realistic icon

    Device Driver Management Tools

  • 3/11/2014

    44

    Device Manager Device StageDevices and Printers

    Device Driver Management Tools

    Options for Updating Drivers

    Dynamic Update

    Windows Update

    Manufacturers media or Web site

    Device Manager

    Compatibility Report

    Works with Windows Update to download critical fixes and device drivers required for the setup process

    Updates the driver software for the device manually

    Use the media or browse to the device manufacturers Web site to obtain an updated driver

    Use this report to load a new or updated driver during Use this report to load a new or updated driver during an upgrade

    Delivers software updates and drivers, and provides automatic updating options

  • 3/11/2014

    45

    Managing Signed Drivers

    Benefits of signing and staging driver packages Benefits of signing and staging driver packages

    Maintaining signed drivers

    Improved security

    Reduced support costs

    Better user experience

    Use Sigverif.exe to check for unsigned device drivers

    Use a Command Prompt to run the driverquery command with the /si switch to obtain a basic list of signed and unsigned device drivers

    Use Group Policy to deploy certificates to client computers

    Discussion: Options for Recovering from a Driver Problem

    1. How often have new devices and their associated drivers introduced reliability problems on computers that you manage?

    2. What are possible ways of recovering from a driver problem? Describe a situation in which you might use each recovery method to resolve a driver problem.

    15 min

  • 3/11/2014

    46

    Demonstration: Managing Drivers

    In this demonstration, you will see how to:

    Update a device driver

    Roll back a device driver

    Install a driver into the driver store

    12 min

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    47

    Lab: Configuring Disks and Device Drivers

    Exercise 1: Configuring Disks

    Exercise 2: Configuring Disk Quotas (Optional)

    Exercise 3: Updating a Device Driver

    Logon information

    Virtual machine6292A-LON-DC16292A-LON-CL1

    User name Contoso\Administrator

    Password Pa$$w0rd

    Estimated time: 30 minutes

    Lab Scenario

    A Windows 7 computer is used for rendering large engineering drawings. It requires expanded disk space and fast disks. Initially a simple volume is requested, but then an application requires a separate drive letter and the simple volume must be shrunk. Then, more disk space is required, so a spanned volume is created. Finally, a striped volume is created to enhance performance.

    Some of the employees at the engineering company work on a shift basis. Disk quotas need to be created for people who share computers on a shift basis and to see which user is using how much disk space allocated.

    As the volume of work increases, some of the devices are not functioning as required. Your task is to perform an update of the drivers for those devices.

  • 3/11/2014

    48

    Lab Review

    1. In Exercise 1, you used the assign command in diskpart to assign a drive letter to a newly created volume. Instead of assigning a drive letter, what else can you do?

    2. In Exercise 2, you used local disk quotas to manage disk consumption. Although this is a useful local management tool, in an enterprise network based on Windows Server 2008, what other disk space management tools can you use?

    3. In Exercise 3, you used driver roll back to reverse a driver update you made. If your computer will not start properly, how can you address a driver-related problem?

    Module Review and Takeaways

    Review Questions

    Common Issues

    Best Practices

    Tools

  • 3/11/2014

    49

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    50

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    51

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Module 3

    Configuring File Access and Printers on Windows 7

    Clients

  • 3/11/2014

    52

    Module Overview

    Overview of Authentication and Authorization

    Managing File Access in Windows 7

    Managing Shared Folders

    Configuring File Compression

    Managing Printing

    Lesson 1: Overview of Authentication and Authorization

    What Are Authentication and Authorization?

    Authentication and Authorization Process

    New Authentication Features in Windows 7

  • 3/11/2014

    53

    What Are Authentication and Authorization?

    User Resource

    Who are you?

    Authentication: Verifying the identity of something or someone

    Are you on the list?

    Authorization: Determining whether something or someone has permission to access a resource

    What does the list say you can do?

    Access: Determining what actions something or someone can perform on the resource based on permission levels

    Authentication and Authorization Process

    Windows Authentication

    MethodDescription

    Kerberos version 5 protocol

    Used by Windows 7 clients and servers running Microsoft Windows Server 2000 or later

    NTLMUsed for backward compatibility with computers running pre-Windows 2000 operating systems and some applications

    Certificate mapping Certificates are used as authentication credentials

    Windows authentication methods include:

  • 3/11/2014

    54

    New Authentication Features in Windows 7

    Biometrics

    Windows Biometric Framework (WBF) provides support for fingerprint biometric devices through a new set of components

    A common API facilitates development of applications A common API facilitates development of applications using biometrics

    Through a new Control Panel item, users can control the availability and use of biometric devices

    Device Manager support for managing drivers for biometric devices

    Group Policy settings to enable, disable, or limit the use of biometric data for a local computer or domain

    Smart Cards

    Smart card-related Plug and Play

    Kerberos support for Smart card logon

    Encrypt removable media using BitLocker and using the Smart card option to unlock the drive

    Document and e-mail signing

    Used with line-of-business applications to enable certificate use with no additional middleware

    Online Identity Integration

    A new group policy setting is available that controls the ability of online IDs to authenticate to a computer

    Online IDs can be used to identify individuals within a network

    Users must link their Windows user account to an online ID to facilitate authentication

    Authentication occurs through the use of certificates

    Does not affect domain accounts or local user accounts from logging on to the computer

    Notes Over-flow Slide

    General information

    If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.

    The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.

    Printing Hidden Slides

    Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides

    Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides

  • 3/11/2014

    55

    New Authentication Features in Windows 7

    New Authentication

    FeaturesDescription

    Smart cards

    Several new authentication features are available for use with Smart cards, including:

    Kerberos support for Smart card logon

    Encrypt removable media using BitLocker and using the Smart card option to unlock the drive

    Document and e-mail signing

    BiometricsWindows Biometric Framework (WBF) provides support for fingerprint biometric devices through a new set of components

    Online Identity Integration

    A new group policy setting is available that controls the ability of online IDs to authenticate to a computer

    Lesson 2: Managing File Access in Windows 7

    What Are NTFS Permissions?

    What Is Permission Inheritance?

    Demonstration: Configuring NTFS Permissions for Files and Folders

    Impact of Copying and Moving Files and Folders on Set Permissions

    What Are Effective Permissions?

    Discussion: Determining Effective Permissions

  • 3/11/2014

    56

    NTFS file and folder permissions

    What Are NTFS Permissions?

    Define the type of access granted to a user, group, or computer for a file or folder

    What Is Permission Inheritance?

    Explicit Permission: User creates a file or folder and assigns permissions

    Allow Read;Deny Write

    Inherited Permission: File or folder permissions for a child object default from its parent

    Allow Read; Allow Write

    When Permission Inheritance is blocked

    Perform one of the following:

    Copy existing group or user permissions to the child file or folder

    Start with blank permissions on the child file or folder and configure a unique set of permissions

  • 3/11/2014

    57

    What Is Permission Inheritance?

    Explicit Permission: User creates a file or folder and assigns permissions

    Allow Read;Deny Write

    Inherited Permission: File or folder permissions for a child object default from its parent

    Allow Read; Allow Write

    Demonstration: Configuring NTFS Permissions for Files and Folders

    In this demonstration, you will see how to:

    Create a folder and a document file

    Grant selected users Write access to the file

    Deny selected users Write access to the file

    Verify the Deny permissions on the file

    10 min

  • 3/11/2014

    58

    Notes Over-flow Slide

    General information

    If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.

    The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.

    Printing Hidden Slides

    Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides

    Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides

    Impact of Copying and Moving Files and Folders on Set Permissions

    NTFS Partition C:\Copy or Move

    NTFS Partition E:\

    When you copy or move a file or folder to a different NTFS partition

    Full Control Allow ReadDeny Write

    The file or folder inherits permissions from the destination folder

    NTFS Partition C:\

    Allow ReadDeny Write

    The file or folder inherits permissions from the new parent folder

    When you copy or move a file or folder within an NTFS partition

    Copy or Move

    When moving a file or folder that has explicitly assigned When moving a file or folder that has explicitly assigned permissions, those permissions are retained in addition to the newly inherited permissions

    Allow ReadDeny Write

  • 3/11/2014

    59

    Impact of Copying and Moving Files and Folders on Set Permissions

    When you copy or move a file or folder to a different NTFS partition

    The file or folder inherits permissions from the destination folder

    When you copy or move a file or folder within an NTFS partition

    The file or folder inherits permissions from the new parent folder

    When moving a file or folder that has explicitly assigned permissions, those permissions are retained in addition to the newly inherited permissions

    What Are Effective Permissions?

    When determining effective permissions:

    User and group permissions are combined

    Deny permissions override allow permissions

    The Effective Permissions feature:

    Calculates and displays the permissions granted to a user or group

    Determines all domain and local groups in which the user is a member

    Takes into account permissions inherited from the parent object

    Effective permissions are a file or folders final, combined permission set that is determined by Windows 7 when a file or folder contains both user and group permissions.

  • 3/11/2014

    60

    Discussion: Determining Effective Permissions

    Users Group

    Sales Group

    User1

    Users group hasWrite for Folder1

    Sales group hasRead for Folder1

    1

    Users group hasRead for Folder1

    Sales group hasWrite for Folder2

    2

    Users group hasModify for Folder1

    File2 must only be available to Sales group with Read permission

    3

    NTFS Partition

    File2

    Folder1

    Folder2

    File1

    Lesson 3: Managing Shared Folders

    What Are Shared Folders?

    Methods of Sharing Folders

    Discussion: Combining NTFS and Share Permissions

    The Network and Sharing Center

  • 3/11/2014

    61

    What Are Shared Folders?

    The default shared folders permission is Full Control for the user that shared the folder

    You can share folders, but you cannot share individual files

    Folders can be shared:

    In the MMC console using the Shares snap-in

    In Windows Explorer

    Through the command line using the Net Share command

    Through Computer Management

    Shared folders are folders that allow network access totheir content

    Methods of Sharing Folders

    Basic Sharing

    Advanced Sharing

    Public Folder Sharing

    Access controlled by permissions

    Public Folder SharingPublic Folder Sharing

    Files shared with same network

    Files shared with same computer

    Multiple default Public folders for each computer

    Basic Sharing

    Allows you to share folders quickly

    You configure permissions

    Advanced SharingAdvanced Sharing

    Configure caching

    Configure permissions

    Choose share name

    Configure simultaneous connections

  • 3/11/2014

    62

    Methods of Sharing Folders

    Basic Sharing

    Allows you to share folders quickly

    You configure permissions

    Advanced Sharing

    Configure permissions, simultaneous connections, and caching

    Choose share name

    Public Sharing

    Multiple default Public folders for each computer

    Files shared with same computer and with same network

    Access controlled by permissions

    Discussion: Combining NTFS and Share Permissions

    1. If a user is assigned Full Control NTFS permission to a file but is accessing the file through a share with Read permission, what will be the effective permission the user will have on the file?

    2. If you want a user to view all files in a shared folder but you can modify only certain files in the folder, what permissions would you give?

    3. Identify a scenario at your organization in which you may have to combine NTFS and Share permissions. What is the reason for combining permissions?

    10 min

    When you create a shared folder on an NTFS formatted partition, both the shared folder permissions and the NTFS file system permissions are combined to secure file resources.

    By default, the Everyone group is granted the shared folder permission Read

    file and subfolder in a shared folder and the appropriate shared Users must have the appropriate NTFS permissions for each file and subfolder in a shared folder and the appropriate shared folder permissions to access those resources

    The share permissions on a folder apply to that folder, to all files in that folder, to sub folders, and to all files in those subfolders

    When NTFS and shared folder permissions are combined, the resulting effective permission is the most restrictive one of the two permission sets

  • 3/11/2014

    63

    Discussion: Combining NTFS and Share Permissions

    1. If a user is assigned Full Control NTFS permission to a file but is accessing the file through a share with Read permission, what will be the effective permission the user will have on the file?

    2. If you want a user to view all files in a shared folder but you can modify only certain files in the folder, what permissions will you give?

    3. Identify a scenario at your organization in which you may have to combine NTFS and Share permissions. What is the reason for combining permissions?

    10 min

    The Network and Sharing Center

    Provides centralized control of network features

    Network Map

    Network Location private, public, domain

    Network Discovery

    Controls sharing capabilities related to various network resources:

    File sharing

    Public folder sharing

    Printer sharing

    Media sharing

    The Network and Sharing Center provides services to view, configure, and troubleshoot your network access and sharing

    capabilities

  • 3/11/2014

    64

    Notes Over-flow Slide

    General information

    If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.

    The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.

    Printing Hidden Slides

    Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides

    Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides

    The Network and Sharing Center

    Provides centralized control of network features

    Network Map

    Network Location private, public, domain

    Network Discovery

    Controls sharing capabilities related to various network resources:

    File sharing

    Public folder sharing

    Printer sharing

    Media sharing

    The Network and Sharing Center provides services to view, configure, and troubleshoot your network access and sharing

    capabilities

  • 3/11/2014

    65

    Lesson 4: Configuring File Compression

    What Is NTFS File Compression?

    Impact of Moving and Copying Compressed Files and Folders

    What Are Compressed (Zipped) Folders?

    Demonstration: Compressing Files and Folders

    What Is NTFS File Compression?

    NTFS file compression is the method used by the NTFS file system to compress files, folders, and volumes

    Uses compression to save disk space

    Does not use compression for system files and folders

    Compression is configured asan NTFS attribute

    NTFS calculates disk spacebased on uncompressed file size

    Applications that open a compressed file only see theuncompressed data

    File prior to compression

    File after compressionFile after

    compression

  • 3/11/2014

    66

    What Is NTFS File Compression?

    NTFS file compression is the method used by the NTFS file system to compress files, folders, and volumes

    Uses compression to save disk space

    Does not use compression for system files and folders

    Compression is configured asan NTFS attribute

    NTFS calculates disk spacebased on uncompressed file size

    Applications that open a compressed file only see theuncompressed data

    File prior to compression

    File after compressionFile after

    compression

    Discussion: Impact of Moving and Copying Compressed Files and Folders

    From NTFS Partition To FAT PartitionD

    To NTFS PartitionsFrom NTFS PartitionsC

    Within an NTFS PartitionBWithin an NTFS PartitionA

    Inherits compression state of the target folder

    Retains its original compression state

    No Compression

    Copy Move

    Copy

    Move

    Copy

    Move

    Inherits compression state of the target folder

  • 3/11/2014

    67

    Discussion: Impact of Moving and Copying Compressed Files and Folders

    From NTFS Partition To FAT PartitionD

    To NTFS PartitionsFrom NTFS PartitionsC

    Within an NTFS PartitionBWithin an NTFS PartitionA

    Copy Move

    Copy

    Move

    Copy

    Move

    What Are Compressed (zipped) Folders?

    Compressed folders can contain multiple files and folders that are compressed to reduce the overall storage space for the content

    A compressed folder with a .zip extension is created. Note the reduced file size.

  • 3/11/2014

    68

    What Are Compressed (zipped) Folders?

    Compressed folders can contain multiple files and folders that are compressed to reduce the overall storage space for the content

    A compressed folder with a .zip extension is created. Note the reduced file size.

    Demonstration: Compressing Files and Folders

    In this demonstration, you will see how to:

    Compress a folder

    Copy files into the compressed folder

    Move compressed files into an uncompressed folder

    Copy compressed files into an uncompressed folder

    Compress a folder by using the Compressed (zipped) Folder feature

    10 min

  • 3/11/2014

    69

    Notes Over-flow Slide

    General information

    If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.

    The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.

    Printing Hidden Slides

    Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides

    Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides

    Notes Over-flow Slide

    General information

    If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.

    The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.

    Printing Hidden Slides

    Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides

    Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides

  • 3/11/2014

    70

    Lesson 5: Managing Printing

    Printing Components in Windows 7

    XPS and GDI-Based Printing

    Demonstration: Installing and Sharing a Printer

    Managing Client-Side Printing

    Configuring Location-Aware Printing

    Printing Components in Windows 7

  • 3/11/2014

    71

    Printing Components in Windows 7

    XPS and GDI-Based Printing

    GDI-based printing

    Is used by legacy applications in pre-Vista versions of Windows Uses enhanced metafile format (EMF) as the spool file format Requires a printer driver unique to each printer model

    XPS-based printing

    XPS is a new document description language Requires an XPS printer driver Is used only by WPF applications Generates a spool file in XPS format

    Interoperability of XPS and GDI-based printing

    XPS-based printing can print to an older GDI-based printer by converting print jobs from XPS to EMF format

    GDI-based printing can print to a new XPS-based printer by converting print jobs from EMF to XPS format

  • 3/11/2014

    72

    Demonstration: Installing and Sharing a Printer

    In this demonstration, you will see how to:

    Create and share a local printer

    Set permissions on the printer

    10 min

    Notes Over-flow Slide

    General information

    If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.

    The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.

    Printing Hidden Slides

    Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides

    Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides

  • 3/11/2014

    73

    Managing Client-Side Printing

    Print Management TasksDevices and Printers

    Managing Client-Side Printing

    Print Management Tasks

  • 3/11/2014

    74

    Configuring Location-Aware Printing

    Configuring Location-Aware Printing

  • 3/11/2014

    75

    Lab: Configuring File Access and Printers on Windows 7 Client Computers

    Exercise 1: Create and Configure a Shared Folder for All Users

    Exercise 2: Configuring Shared Access to Files for Specific Users

    Exercise 3: Create and Share a Local Printer

    Logon information:

    Virtual machine6292A-LON-DC1 6292A-LON-CL1 6292A-LON-CL2

    User name Administrator

    Password Pa$$w0rd

    Estimated time: 30 minutes

    Lab Scenario

    A group of engineering users need to share files on the Windows 7 computers. All computers are in a domain. The most powerful Windows 7 computer has many files that other users need to access. Most files can be shared among all users; however, the more sensitive files can only be accessed by selected users. The Windows 7 computer has a printer attached to it that other users want to access from their own computers.

    As the IT professional assigned to this account, you have outlined the following tasks that must be performed to satisfy these requirements:

    Create a public share for the files that all users must be able to access

    Create a new share for some specific files that only selected users can access

    Share a printer on the workstation that can be accessed by other users

  • 3/11/2014

    76

    Lab Review

    You created the shared folder for all users.

    How can you simplify the process for users to access the folder from their computers?

    You need to ensure that only specific users can access a shared folder across the network when they are logged on the computer with the shared folder.

    How do you configure the permissions?

    You need to ensure that users can manage only the print jobs that they have sent to a shared printer. Members of the HelpDesk group must be able to delete all print jobs.

    How do you configure the printer permissions?

    Module Review and Takeaways

    Review questions

    Best Practices

    Tools

  • 3/11/2014

    77

    Notes Over-flow Slide

    General information

    If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.

    The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.

    Printing Hidden Slides

    Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides

    Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides

    Notes Over-flow Slide

    General information

    If you have too much Notes text associated with one slide to fit in one Notes Page, use the hidden Notes Over-flow Slide as page two of the Notes Page.

    The red line indicates that this slide must not be printed. In an actual module, do not add content to this slide or modify it in any other way. Only add content to the Notes Page.

    Printing Hidden Slides

    Ensure that you print hidden slides when / if printing the Notes Pages. In the print dialog box, select Print hidden slides

    Ensure that you do not print hidden slides when / if printing the actual Slides. In the print dialog box, de-select Print hidden slides

  • 3/11/2014

    78

    Module 4

    Configuring Network Connectivity

    Module Overview

    Configuring IPv4 Network Connectivity

    Configuring IPv6 Network Connectivity

    Implementing Automatic IP Address Allocation

    Overview of Name Resolution

    Troubleshooting Network Issues

  • 3/11/2014

    79

    Lesson 1: Configuring IPv4 Network Connectivity

    What Is an IPv4 Address?

    What Is a Subnet Mask?

    What Is a Default Gateway?

    What Are Public and Private IPv4 Addresses?

    Demonstration: Configuring an IPv4 Address

    An IPv4 address identifies a computer to other computers on a network.

    What Is an IPv4 Address?

    IP Address192.168.1.201

    IP Address192.168.1.202

    IP Address192.168.1.200

    Subnet 2

    IP Address192.168.2.182

    IP Address192.168.2.180

    IP Address192.168.2.181

    Subnet 1Subnet 1

    Dotted decimal representation of the address

  • 3/11/2014

    80

    An IPv4 address identifies a computer to other computers on a network.

    What Is an IPv4 Address?

    IP Address192.168.1.201

    IP Address192.168.1.202

    IP Address192.168.1.200

    Subnet 2

    IP Address192.168.2.182

    IP Address192.168.2.180

    IP Address192.168.2.181

    Subnet 1

    What Is a Subnet Mask?

    A subnet mask specifies which part of an IPv4 address is the network ID and which part of the

    IPv4 address is the host ID.

    This is a simple Class C type IPv4 number. There are 3 octets for the network ID

    and 1 octet for the host ID.

    Network IDxw y z

    192 168 1 0

    Subnet maskxw y z

    255 255 255 0

    This is the network ID for this number. This network ID is shared by all the

    hosts on the same subnet

    IP addressxw y z

    192 168 1 200

    This is the host ID in the fourth octet. Note: This host ID is 200 of 254 hosts on this specific subnet.

  • 3/11/2014

    81

    What Is a Subnet Mask?

    A subnet mask specifies which part of an IPv4 address is the network ID and which part of the

    IPv4 address is the host ID.

    Network IDxw y z

    192 168 1 0

    Subnet maskxw y z

    255 255 255 0

    IP addressxw y z

    192 168 1 200

    A default gateway is a device, usually a router, on a TCP/IP internet that forwards IP packets to

    other subnets.

    What Is a Default Gateway?

    Use a default gateway when the internal routing table on the host has no information about

    the destination subnet.

    Router

    Default gateway

    Subnet 2

    Windows 7 clients

    Subnet 1

    Windows 7 clients

  • 3/11/2014

    82

    A default gateway is a device, usually a router, on a TCP/IP internet that forwards IP packets to

    other subnets.

    What Is a Default Gateway?

    Router

    Default gateway

    Subnet 2

    Windows 7 clients

    Subnet 1

    Windows 7 clients

    What Are Public and Private IPv4 Addresses?

    Private

    Non-routable on the Internet

    Can be locally assigned by organization

    Must be translated to access the Internet

    Public

    Required by devices and hosts that connect directly to the Internet

    Must be unique

    Routable on the Internet

    Must be assigned by IANA

  • 3/11/2014

    83

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Demonstration: Configuring an IPv4 Address

    In this demonstration, you will see how to configure a Windows 7 computer with:

    An IPv4 address

    A subnet mask

    A default gateway

    10 min

  • 3/11/2014

    84

    Lesson 2: Configuring IPv6 Network Connectivity

    Benefits of Using IPv6

    Windows 7 Support for IPv6

    What Is the IPv6 Address Space?

    IPv6 Address Types

    Demonstration: Configuring an IPv6 Address

    Benefits of Using IPv6

    Benefits of using IPv6 compared to IPv4

    Larger address space

    More efficient routing

    Simpler host configuration

    Built-in security

    Better prioritized delivery support

    Redesigned headers

  • 3/11/2014

    85

    Windows 7 Support for IPv6

    IPv6 is Enabled by Default

    Windows 7 uses IPv6 by default to support security needs and additional features

    Windows 7 Dual Stack

    Windows 7 facilitates the dual stack to use IPv4 and IPv6 simultaneously

    Direct Access requires IPv6

    Windows 7 clients can use Direct Access which facilitates client computers connecting to the enterprise domain

    IPv6 uses Remote Desktop

    IPv6 supports Windows 7 File Sharing Security and Echo Systemfeatures such as Remote Access and Direct Access

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    86

    The IPv6 address space:

    What Is the IPv6 Address Space?

    Uses 128 bits as compared to 32-bits that the IPv4 address space uses

    Allocates 64-bits for the network ID and 64-bits for the host ID

    Uses a prefix to define the network ID

    2001:0DB8:0000:0000:02AA:00FF:FE28:9C5A/64

    2001:DB8:0:0:2AA:FF:FE28:9C5A/64

    Each digit represents four bits

    The prefix is a forward slash followed by the number of bits in the network ID

    2001:DB8::2AA:FF:FE28:9C5A/64

    ShortenShorten

    ShortenShorten Shorten the address by dropping leading zeros and using zero compression

    Continue shortening the address by dropping contiguous groups of zeros

    IPv6 uses hexidecimal notation

    The IPv6 address space:

    What Is the IPv6 Address Space?

    Uses 128 bits as compared to 32-bits that the IPv4 address space uses

    Allocates 64-bits for the network ID and 64-bits for the host ID

    Uses a prefix to define the network ID

    2001:0DB8:0000:0000:02AA:00FF:FE28:9C5A/64

    2001:DB8:0:0:2AA:FF:FE28:9C5A/64

    2001:DB8::2AA:FF:FE28:9C5A/64

    ShortenShorten

    ShortenShorten

    IPv6 uses hexidecimal notation

  • 3/11/2014

    87

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    88

    IPv6 Address Types

    IPv6 Address Types

    Unicast use for one-to-one communication between hosts

    Multicast use for one-to-many communication between computers that are defined as using the same multicast address

    Anycast use for locating services or the nearest router

    IPv6 Unicast Address Types

    Global Unicast globally routable and reachable on the IPv6 portion of the Internet

    Link-Local use when communicating with neighboring hosts on the same link

    Unique Local Unicast equivalent to IPv4 private address spaces, such as 10.0.0.0/8, and have the prefix FD00::/8

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    89

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Demonstration: Configuring an IPv6 Address

    In this demonstration, you will see how to:

    Manually configure a Windows 7 computer with an IPv6 address

    Verify the IP configuration

    10 min

  • 3/11/2014

    90

    Lesson 3: Implementing Automatic IP Address Allocation

    Automatic IPv4 Configuration Process

    Automatic IPv6 Configuration Process

    Demonstration: Configuring a Computer to Obtain an IPv4 Address Dynamically

    Troubleshooting Client-Side DHCP Issues

    Automatic private IP addressing (APIPA):Automatic private IP addressing (APIPA):

    Is used if a DHCP server cannot be contacted

    Assigns IP addresses on the 169.254.0.0/16 network

    Cannot be used with:

    Active Directory

    Internet connectivity

    Multiple subnets

    DNS or WINS servers

    IPv4 Client

    DHCP Server with IPv4 Scope and

    IPv4 SiteLocal Scope

    IPv4 Router

    IPv4 Static Configuration IPv4 Client

    Automatic IPv4 Configuration Process

  • 3/11/2014

    91

    Automatic private IP addressing (APIPA):Automatic private IP addressing (APIPA):

    Is used if a DHCP server cannot be contacted

    Assigns IP addresses on the 169.254.0.0/16 network

    Cannot be used with:

    Active Directory

    Internet connectivity

    Multiple subnets

    DNS or WINS servers

    Automatic IPv4 Configuration Process

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    92

    Automatic IPv6 Configuration Process

    IPv6 Client

    DHCP v6 Server with IPv6 Scope and

    IPv6 SiteLocal Scope

    IPv6 Router

    Static Configuration IPv6 Client

    Automatic IPv6 Configuration Process

    DHCP V6 Server assigns Automatic IPv6 Configuration information to the client.

    IP V6 Clients uses DHCP assigned IP Configuration to access network resources

    IP V6 Router provides a Gateway to the internet or another Subnet.

    IP V6 Static Client does not get automatic configuration from the DHCPv6 Server

    Automatic IPv6 Configuration Process

    Automatic IPv6 Configuration Process

    DHCP V6 Server assigns Automatic IPv6 Configuration information to the client

    IP V6 Clients uses DHCP assigned IP Configuration to access network resources

    IP V6 Router provides a Gateway to the internet or another Subnet

    IP V6 Static Client does not get automatic configuration from the DHCPv6 Server

  • 3/11/2014

    93

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Demonstration: Configuring a Computer to Obtain an IPv4 Address Dynamically

    In this demonstration, you will see how to:

    Automatically configure a Windows 7 computer with an IPv4 address

    Verify the IP configuration

    10 min

  • 3/11/2014

    94

    Troubleshooting Client-Side DHCP Issues

    IPConfig is used to display IP configuration information and to release and renew addresses

    Option Description

    /all Displays all IP address configuration information

    /release Releases a dynamic IPv4 address lease

    /renew Renews a dynamic IPv4 address lease

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    95

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    96

    Lesson 4: Overview of Name Resolution

    Types of Computer Names

    Methods for Resolving Computer Names

    Types of Computer Names

    Name Description

    Host name

    Up to 255 characters in length

    Can contain alphabetic and numeric characters, periods, and hyphens

    Part of FQDN

    NetBIOS name

    Represent a single computer or group of computers

    15 characters used for the name

    16th character identifies service

    Flat namespace

  • 3/11/2014

    97

    NetBIOS Name Cache4

    WINS Server

    Broadcast6DNS Resolver Cache2

    Local Host Name1

    LMHOSTS File7

    DNS Server3 5

    Methods for Resolving Computer Names

    Lesson 5: Troubleshooting Network Issues

    Tools for Troubleshooting Networks

    Process for Troubleshooting Networks

    Demonstration: Troubleshooting Common Network-Related Problems

  • 3/11/2014

    98

    Tools for Troubleshooting Networks

    Tool Purpose

    Event Viewer Enables you to view errors relating to network activity

    Windows Network

    DiagnosticsHelps to diagnose and resolve network problems

    IPCONFIGDisplays IP configuration information and controls the DNS resolver cache

    PING and PathPING Verifies basic IP connectivity

    TRACERT Verifies a routing path

    NSLOOKUP Enables testing of name resolution

    Process for Troubleshooting Networks

    IPConfigNSlookup

    Tracert Ping

    Windows NetworkDiagnosticsEvent Viewer

  • 3/11/2014

    99

    Demonstration: How to Troubleshoot Network-Related Problems

    In this demonstration, you will see how to use the TCP/IP troubleshooting tools to help resolve common connectivity problems.

    10 min

    Lab: Configuring Network Connectivity

    Exercise 1: Configuring IPv4 Addressing

    Exercise 2: Configuring IPv6 Addressing

    Exercise 3: Troubleshooting Network Connectivity

    Logon information

    Estimated time: 40 minutes

    Virtual machine6292A-LON-DC16292A-LON-CL1

    User name Contoso\Administrator

    Password Pa$$w0rd

  • 3/11/2014

    100

    Lab Scenario

    Laptop computers are being introduced for some of the managers in Contoso Corporation. You need to test how the IPv4 configuration will behave when they are out of the office and a DHCP server is unavailable.

    Contoso Corporation is considering the implementation of IPv6 in the internal network. However, none in the organization has much experience with IPv6. You are performing some configuration tests with DHCPv6 to see how it behaves.

    A work experience student has been unsuccessful in attempting to resolve an network connectivity problem on a Windows 7 computer. The changes made to the computer have not been documented. You need to restore network connectivity for the computer.

    Lab Review

    How are APIPA addresses for IPv4 similar to link-local addresses in IPv6?

    How can you update a Windows 7 computer to use the correct information after a host record is updated in DNS, but the Windows 7 computer is still resolving the name to the previous IP address?

  • 3/11/2014

    101

    Module Review and Takeaways

    Review Questions

    Common Issues

    Tools

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    102

    Module 5

    Configuring Wireless Network Connections

    Module Overview

    Overview of Wireless Networks

    Configuring a Wireless Network

  • 3/11/2014

    103

    Lesson 1: Overview of Wireless Networks

    What Is a Wireless Network?

    Wireless Network Technologies

    Security Protocols for a Wireless Network

    What Is a Wireless Network?

    Advantages Extends or replaces wired

    infrastructure (wire-free)

    Increases productivity for mobile employees

    Provides access to internet in public places

    Disadvantages

    Possible interference

    Potential security risk

    Additional management

    A wireless network:

    Two modes:

    Interconnected devices connected by radio waves instead of wires or cables

    Ad hoc Infrastructure

  • 3/11/2014

    104

    Wireless Network Technologies

    Wireless Broadband:

    Provides high-speed wireless internet and data network access

    Comparable to wired broadband, such as ADSL or cable modem

    Used to have constant connectivity to internet and corporate network

    Windows 7 supports for Wireless Broadband:

    Driver-based model for mobile broadband devices

    Used the same user interface regardless of the provider

    StandardMaximum

    bit rateRange of frequencies Usage

    802.11a 54 Mbps C-Band ISM (5.725 to 5.875 GHz) Not widely used

    802.11b 11 Mbps S-Band ISM (2.4 to 2.5 GHz) Widely used

    802.11g 54 Mbps S-Band ISM Gaining popularity

    802.11n 600 Mbps C-Band and S-Band ISM Gaining popularity, not yet finalized

    Windows 7 provides built-in support for all standards, but also depends on:

    The wireless network adapter

    The wireless network adapter driver

    Security

    standard

    Authentication

    methods

    Encryption

    methodsRemarks

    IEEE 802.11 Open system and

    shared keyWEP

    Weak authentication and encryption. Use is highly

    discouraged

    IEEE 802.1X EAP authentication

    methodsWEP Strong EAP methods provide strong authentication

    WPA-Enterprise 802.1X TKIP / AES

    Strong authentication (with strong EAP method)

    and strong (TKIP) or very strong (AES) encryption

    Used for medium and large organizations

    WPA-Personal PSK TKIP / AES

    Strong authentication (with strong PSK) and strong

    (TKIP) or very strong (AES) encryption

    Used for home networks or small offices

    WPA2-Enterprise 802.1X TKIP / AES

    Strong authentication (with strong EAP method)

    and strong (TKIP) or very strong (AES) encryption

    Used for medium and large organizations

    WPA2-Personal PSK TKIP / AES

    Strong authentication (with strong PSK) and strong

    (TKIP) or very strong (AES) encryption.

    Used for home networks or small offices

    Security Protocols for a Wireless Network

  • 3/11/2014

    105

    Lesson 2: Configuring a Wireless Network

    Configuring Hardware for Connecting to a Wireless Network

    Wireless Network Settings

    Demonstration: Connecting to a Wireless Network

    Improving the Wireless Signal Strength

    Process for Troubleshooting a Wireless Network Connection

    Configuring Hardware for Connecting to a Wireless Network

    Connect and configure a Wireless Access Point

    Configure a wireless network adapter in the client computer

    Configuring Client Computers

    Connect to a Network dialog box

    Command line: netsh wlan

    Group policy

  • 3/11/2014

    106

    General Settings

    Connection Settings

    Security Type Encryption TypeSecurity tabRight click any network profile

    Properties

    Security Types

    Wireless Network Settings

    Control Panel

    Network and Internet

    Network and Sharing Center

    Manage Wireless Networks

    In this demonstration, you will see how to:

    Connect to a public and open wireless network

    Configure an unlisted wireless network

    Connect to that network

    Connect to the administrative webpage of a wireless AP

    Configure the security settings of the wireless AP

    Demonstration: Connecting to a Wireless Network

    10 min

  • 3/11/2014

    107

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

    Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

  • 3/11/2014

    108

    Improving the Wireless Signal Strength

    To improve the signal strength:

    Ensure close proximity to the wireless AP

    Consider installing an external antenna

    Check for physical obstructions

    Add wireless APs

    Check for devices that may cause interference

    Consider changing the wireless channel

    Review the diagnostic information

    3

    Identify the problem from the list of problems found

    4

    Resolve the problem that was identified

    5

    Diagnose the connection by using Windows Network Diagnostics tool 2

    Accessed from:

    Right click network icon on System Tray

    Click Troubleshoot problems

    Attempt to connect to a wireless network 1

    Accessed from:

    Network and Sharing Center

    System Tray

    Attempt to connect to a wireless network 1

    Diagnose the connection by using Windows Network Diagnostics tool 2

    Review the diagnostic information3

    Identify the problem from the list of problems found 4

    Resolve the problem that was identified 5

    Process for Troubleshooting a Wireless Network Connection

  • 3/11/2014

    109

    Lab: Configuring Wireless Network Connections

    Exercise 1: Determine the Appropriate Configuration for a Wireless Network

    Exercise 2: Troubleshooting Wireless Connectivity

    Estimated time: 30 minutes

    Lab Scenario

    The Contoso Corporation is implementing Windows 7 desktops throughout their