20687a configuring windows 8 setup guide trainer handbook

528
MCT USE ONLY. STUDENT USE PROHIBITED OFFICIAL MICROSOFT LEARNING PRODUCT 20687A Configuring Windows ® 8

Upload: yusuf-ziya-guelec

Post on 28-Dec-2015

281 views

Category:

Documents


2 download

TRANSCRIPT

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED

    O F F I C I A L M I C R O S O F T L E A R N I N G P R O D U C T

    20687A Configuring Windows 8

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDii Configuring Windows 8

    Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.

    Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.

    The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein.

    2012 Microsoft Corporation. All rights reserved.

    Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty /Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners

    Product Number: 20687A

    Part Number: X18-48640

    Released: 08/2012

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDMICROSOFT LICENSE TERMS OFFICIAL MICROSOFT LEARNING PRODUCTS MICROSOFT OFFICIAL COURSE Pre-Release and Final Release Versions These license terms are an agreement between Microsoft Corporation and you. Please read them. They apply to the Licensed Content named above, which includes the media on which you received it, if any. These license terms also apply to any updates, supplements, internet based services and support services for the Licensed Content, unless other terms accompany those items. If so, those terms apply. BY DOWNLOADING OR USING THE LICENSED CONTENT, YOU ACCEPT THESE TERMS. IF YOU DO NOT ACCEPT THEM, DO NOT DOWNLOAD OR USE THE LICENSED CONTENT. If you comply with these license terms, you have the rights below. 1. DEFINITIONS.

    a. Authorized Learning Center means a Microsoft Learning Competency Member, Microsoft IT Academy

    Program Member, or such other entity as Microsoft may designate from time to time. b. Authorized Training Session means the Microsoft-authorized instructor-led training class using only

    MOC Courses that are conducted by a MCT at or through an Authorized Learning Center. c. Classroom Device means one (1) dedicated, secure computer that you own or control that meets or

    exceeds the hardware level specified for the particular MOC Course located at your training facilities or primary business location.

    d. End User means an individual who is (i) duly enrolled for an Authorized Training Session or Private

    Training Session, (ii) an employee of a MPN Member, or (iii) a Microsoft full-time employee. e. Licensed Content means the MOC Course and any other content accompanying this agreement.

    Licensed Content may include (i) Trainer Content, (ii) software, and (iii) associated media. f. Microsoft Certified Trainer or MCT means an individual who is (i) engaged to teach a training session

    to End Users on behalf of an Authorized Learning Center or MPN Member, (ii) currently certified as a Microsoft Certified Trainer under the Microsoft Certification Program, and (iii) holds a Microsoft Certification in the technology that is the subject of the training session.

    g. Microsoft IT Academy Member means a current, active member of the Microsoft IT Academy

    Program. h. Microsoft Learning Competency Member means a Microsoft Partner Network Program Member in

    good standing that currently holds the Learning Competency status. i. Microsoft Official Course or MOC Course means the Official Microsoft Learning Product instructor-

    led courseware that educates IT professionals or developers on Microsoft technologies.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDj. Microsoft Partner Network Member or MPN Member means a silver or gold-level Microsoft Partner

    Network program member in good standing. k. Personal Device means one (1) device, workstation or other digital electronic device that you

    personally own or control that meets or exceeds the hardware level specified for the particular MOC Course.

    l. Private Training Session means the instructor-led training classes provided by MPN Members for

    corporate customers to teach a predefined learning objective. These classes are not advertised or promoted to the general public and class attendance is restricted to individuals employed by or contracted by the corporate customer.

    m. Trainer Content means the trainer version of the MOC Course and additional content designated

    solely for trainers to use to teach a training session using a MOC Course. Trainer Content may include Microsoft PowerPoint presentations, instructor notes, lab setup guide, demonstration guides, beta feedback form and trainer preparation guide for the MOC Course. To clarify, Trainer Content does not include virtual hard disks or virtual machines.

    2. INSTALLATION AND USE RIGHTS. The Licensed Content is licensed not sold. The Licensed Content is licensed on a one copy per user basis, such that you must acquire a license for each individual that accesses or uses the Licensed Content.

    2.1 Below are four separate sets of installation and use rights. Only one set of rights apply to you.

    a. If you are a Authorized Learning Center:

    i. If the Licensed Content is in digital format for each license you acquire you may either: 1. install one (1) copy of the Licensed Content in the form provided to you on a dedicated, secure

    server located on your premises where the Authorized Training Session is held for access and use by one (1) End User attending the Authorized Training Session, or by one (1) MCT teaching the Authorized Training Session, or

    2. install one (1) copy of the Licensed Content in the form provided to you on one (1) Classroom Device for access and use by one (1) End User attending the Authorized Training Session, or by one (1) MCT teaching the Authorized Training Session.

    ii. You agree that: 1. you will acquire a license for each End User and MCT that accesses the Licensed Content, 2. each End User and MCT will be presented with a copy of this agreement and each individual

    will agree that their use of the Licensed Content will be subject to these license terms prior to their accessing the Licensed Content. Each individual will be required to denote their acceptance of the EULA in a manner that is enforceable under local law prior to their accessing the Licensed Content,

    3. for all Authorized Training Sessions, you will only use qualified MCTs who hold the applicable competency to teach the particular MOC Course that is the subject of the training session,

    4. you will not alter or remove any copyright or other protective notices contained in the Licensed Content,

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED5. you will remove and irretrievably delete all Licensed Content from all Classroom Devices and

    servers at the end of the Authorized Training Session, 6. you will only provide access to the Licensed Content to End Users and MCTs, 7. you will only provide access to the Trainer Content to MCTs, and 8. any Licensed Content installed for use during a training session will be done in accordance

    with the applicable classroom set-up guide.

    b. If you are a MPN Member. i. If the Licensed Content is in digital format for each license you acquire you may either:

    1. install one (1) copy of the Licensed Content in the form provided to you on (A) one (1) Classroom Device, or (B) one (1) dedicated, secure server located at your premises where the training session is held for use by one (1) of your employees attending a training session provided by you, or by one (1) MCT that is teaching the training session, or

    2. install one (1) copy of the Licensed Content in the form provided to you on one (1) Classroom Device for use by one (1) End User attending a Private Training Session, or one (1) MCT that is teaching the Private Training Session.

    ii. You agree that: 1. you will acquire a license for each End User and MCT that accesses the Licensed Content, 2. each End User and MCT will be presented with a copy of this agreement and each individual

    will agree that their use of the Licensed Content will be subject to these license terms prior to their accessing the Licensed Content. Each individual will be required to denote their acceptance of the EULA in a manner that is enforceable under local law prior to their accessing the Licensed Content,

    3. for all training sessions, you will only use qualified MCTs who hold the applicable competency to teach the particular MOC Course that is the subject of the training session,

    4. you will not alter or remove any copyright or other protective notices contained in the Licensed Content,

    5. you will remove and irretrievably delete all Licensed Content from all Classroom Devices and servers at the end of each training session,

    6. you will only provide access to the Licensed Content to End Users and MCTs, 7. you will only provide access to the Trainer Content to MCTs, and 8. any Licensed Content installed for use during a training session will be done in accordance

    with the applicable classroom set-up guide.

    c. If you are an End User: You may use the Licensed Content solely for your personal training use. If the Licensed Content is in digital format, for each license you acquire you may (i) install one (1) copy of the Licensed Content in the form provided to you on one (1) Personal Device and install another copy on another Personal Device as a backup copy, which may be used only to reinstall the Licensed Content; or (ii) print one (1) copy of the Licensed Content. You may not install or use a copy of the Licensed Content on a device you do not own or control.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDd. If you are a MCT.

    i. For each license you acquire, you may use the Licensed Content solely to prepare and deliver an Authorized Training Session or Private Training Session. For each license you acquire, you may install and use one (1) copy of the Licensed Content in the form provided to you on one (1) Personal Device and install one (1) additional copy on another Personal Device as a backup copy, which may be used only to reinstall the Licensed Content. You may not install or use a copy of the Licensed Content on a device you do not own or control.

    ii. Use of Instructional Components in Trainer Content. You may customize, in accordance with the most recent version of the MCT Agreement, those portions of the Trainer Content that are logically associated with instruction of a training session. If you elect to exercise the foregoing rights, you agree: (a) that any of these customizations will only be used for providing a training session, (b) any customizations will comply with the terms and conditions for Modified Training Sessions and Supplemental Materials in the most recent version of the MCT agreement and with this agreement. For clarity, any use of customize refers only to changing the order of slides and content, and/or not using all the slides or content, it does not mean changing or modifying any slide or content.

    2.2 Separation of Components. The Licensed Content components are licensed as a single unit and you may not separate the components and install them on different devices. 2.3 Reproduction/Redistribution Licensed Content. Except as expressly provided in the applicable installation and use rights above, you may not reproduce or distribute the Licensed Content or any portion thereof (including any permitted modifications) to any third parties without the express written permission of Microsoft.

    2.4 Third Party Programs. The Licensed Content may contain third party programs or services. These license terms will apply to your use of those third party programs or services, unless other terms accompany those programs and services.

    2.5 Additional Terms. Some Licensed Content may contain components with additional terms, conditions, and licenses regarding its use. Any non-conflicting terms in those conditions and licenses also apply to that respective component and supplements the terms described in this Agreement.

    3. PRE-RELEASE VERSIONS. If the Licensed Content is a pre-release (beta) version, in addition to the other

    provisions in this agreement, then these terms also apply:

    a. Pre-Release Licensed Content. This Licensed Content is a pre-release version. It may not contain the same information and/or work the way a final version of the Licensed Content will. We may change it for the final version. We also may not release a final version. Microsoft is under no obligation to provide you with any further content, including the final release version of the Licensed Content.

    b. Feedback. If you agree to give feedback about the Licensed Content to Microsoft, either directly or

    through its third party designee, you give to Microsoft without charge, the right to use, share and commercialize your feedback in any way and for any purpose. You also give to third parties, without charge, any patent rights needed for their products, technologies and services to use or interface with any specific parts of a Microsoft software, Microsoft product, or service that includes the feedback. You will not give feedback that is subject to a license that requires Microsoft to license its software, technologies, or products to third parties because we include your feedback in them. These rights

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDsurvive this agreement.

    c. Term. If you are an Authorized Training Center, MCT or MPN, you agree to cease using all copies of the

    beta version of the Licensed Content upon (i) the date which Microsoft informs you is the end date for using the beta version, or (ii) sixty (60) days after the commercial release of the Licensed Content, whichever is earliest (beta term). Upon expiration or termination of the beta term, you will irretrievably delete and destroy all copies of same in the possession or under your control.

    4. INTERNET-BASED SERVICES. Microsoft may provide Internet-based services with the Licensed Content, which may change or be canceled at any time.

    a. Consent for Internet-Based Services. The Licensed Content may connect to computer systems over an

    Internet-based wireless network. In some cases, you will not receive a separate notice when they connect. Using the Licensed Content operates as your consent to the transmission of standard device information (including but not limited to technical information about your device, system and application software, and peripherals) for internet-based services.

    b. Misuse of Internet-based Services. You may not use any Internet-based service in any way that could harm it or impair anyone elses use of it. You may not use the service to try to gain unauthorized access to any service, data, account or network by any means.

    5. SCOPE OF LICENSE. The Licensed Content is licensed, not sold. This agreement only gives you some rights to use the Licensed Content. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the Licensed Content only as expressly permitted in this agreement. In doing so, you must comply with any technical limitations in the Licensed Content that only allows you to use it in certain ways. Except as expressly permitted in this agreement, you may not: install more copies of the Licensed Content on devices than the number of licenses you acquired; allow more individuals to access the Licensed Content than the number of licenses you acquired; publicly display, or make the Licensed Content available for others to access or use; install, sell, publish, transmit, encumber, pledge, lend, copy, adapt, link to, post, rent, lease or lend,

    make available or distribute the Licensed Content to any third party, except as expressly permitted by this Agreement.

    reverse engineer, decompile, remove or otherwise thwart any protections or disassemble the Licensed Content except and only to the extent that applicable law expressly permits, despite this limitation;

    access or use any Licensed Content for which you are not providing a training session to End Users using the Licensed Content;

    access or use any Licensed Content that you have not been authorized by Microsoft to access and use; or

    transfer the Licensed Content, in whole or in part, or assign this agreement to any third party.

    6. RESERVATION OF RIGHTS AND OWNERSHIP. Microsoft reserves all rights not expressly granted to you in this agreement. The Licensed Content is protected by copyright and other intellectual property laws and treaties. Microsoft or its suppliers own the title, copyright, and other intellectual property rights in the Licensed Content. You may not remove or obscure any copyright, trademark or patent notices that appear on the Licensed Content or any components thereof, as delivered to you.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED7. EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and regulations. You

    must comply with all domestic and international export laws and regulations that apply to the Licensed Content. These laws include restrictions on destinations, End Users and end use. For additional information, see www.microsoft.com/exporting.

    8. LIMITATIONS ON SALE, RENTAL, ETC. AND CERTAIN ASSIGNMENTS. You may not sell, rent, lease, lend or

    sublicense the Licensed Content or any portion thereof, or transfer or assign this agreement.

    9. SUPPORT SERVICES. Because the Licensed Content is as is, we may not provide support services for it.

    10. TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you fail to comply with the terms and conditions of this agreement. Upon any termination of this agreement, you agree to immediately stop all use of and to irretrievable delete and destroy all copies of the Licensed Content in your possession or under your control.

    11. LINKS TO THIRD PARTY SITES. You may link to third party sites through the use of the Licensed Content.

    The third party sites are not under the control of Microsoft, and Microsoft is not responsible for the contents of any third party sites, any links contained in third party sites, or any changes or updates to third party sites. Microsoft is not responsible for webcasting or any other form of transmission received from any third party sites. Microsoft is providing these links to third party sites to you only as a convenience, and the inclusion of any link does not imply an endorsement by Microsoft of the third party site.

    12. ENTIRE AGREEMENT. This agreement, and the terms for supplements, updates and support services are

    the entire agreement for the Licensed Content. 13. APPLICABLE LAW.

    a. United States. If you acquired the Licensed Content in the United States, Washington state law governs the interpretation of this agreement and applies to claims for breach of it, regardless of conflict of laws principles. The laws of the state where you live govern all other claims, including claims under state consumer protection laws, unfair competition laws, and in tort.

    b. Outside the United States. If you acquired the Licensed Content in any other country, the laws of that country apply.

    14. LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the laws of your country. You may also have rights with respect to the party from whom you acquired the Licensed Content. This agreement does not change your rights under the laws of your country if the laws of your country do not permit it to do so.

    15. DISCLAIMER OF WARRANTY. THE LICENSED CONTENT IS LICENSED "AS-IS," "WITH ALL FAULTS," AND "AS

    AVAILABLE." YOU BEAR THE RISK OF USING IT. MICROSOFT CORPORATION AND ITS RESPECTIVE AFFILIATES GIVE NO EXPRESS WARRANTIES, GUARANTEES, OR CONDITIONS UNDER OR IN RELATION TO THE LICENSED CONTENT. YOU MAY HAVE ADDITIONAL CONSUMER RIGHTS UNDER YOUR LOCAL LAWS WHICH THIS AGREEMENT CANNOT CHANGE. TO THE EXTENT PERMITTED UNDER YOUR LOCAL LAWS, MICROSOFT CORPORATION AND ITS RESPECTIVE AFFILIATES EXCLUDE ANY IMPLIED WARRANTIES OR CONDITIONS, INCLUDING THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED16. LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. TO THE EXTENT NOT PROHIBITED BY

    LAW, YOU CAN RECOVER FROM MICROSOFT CORPORATION AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO USD$5.00. YOU AGREE NOT TO SEEK TO RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES FROM MICROSOFT CORPORATION AND ITS RESPECTIVE SUPPLIERS.

    This limitation applies to o anything related to the Licensed Content, services made available through the Licensed Content, or

    content (including code) on third party Internet sites or third-party programs; and o claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence,

    or other tort to the extent permitted by applicable law.

    It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential or other damages.

    Please note: As this Licensed Content is distributed in Quebec, Canada, some of the clauses in this agreement are provided below in French. Remarque : Ce le contenu sous licence tant distribu au Qubec, Canada, certaines des clauses dans ce contrat sont fournies ci-dessous en franais. EXONRATION DE GARANTIE. Le contenu sous licence vis par une licence est offert tel quel . Toute utilisation de ce contenu sous licence est votre seule risque et pril. Microsoft naccorde aucune autre garantie expresse. Vous pouvez bnficier de droits additionnels en vertu du droit local sur la protection dues consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties implicites de qualit marchande, dadquation un usage particulier et dabsence de contrefaon sont exclues. LIMITATION DES DOMMAGES-INTRTS ET EXCLUSION DE RESPONSABILIT POUR LES DOMMAGES. Vous pouvez obtenir de Microsoft et de ses fournisseurs une indemnisation en cas de dommages directs uniquement hauteur de 5,00 $ US. Vous ne pouvez prtendre aucune indemnisation pour les autres dommages, y compris les dommages spciaux, indirects ou accessoires et pertes de bnfices. Cette limitation concerne:

    tout ce qui est reli au le contenu sous licence , aux services ou au contenu (y compris le code) figurant sur des sites Internet tiers ou dans des programmes tiers ; et

    les rclamations au titre de violation de contrat ou de garantie, ou au titre de responsabilit stricte, de ngligence ou dune autre faute dans la limite autorise par la loi en vigueur.

    Elle sapplique galement, mme si Microsoft connaissait ou devrait connatre lventualit dun tel dommage. Si votre pays nautorise pas lexclusion ou la limitation de responsabilit pour les dommages indirects, accessoires ou de quelque nature que ce soit, il se peut que la limitation ou lexclusion ci-dessus ne sappliquera pas votre gard. EFFET JURIDIQUE. Le prsent contrat dcrit certains droits juridiques. Vous pourriez avoir dautres droits prvus par les lois de votre pays. Le prsent contrat ne modifie pas les droits que vous confrent les lois de votre pays si celles-ci ne le permettent pas. Revised December 2011

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDx Configuring Windows 8

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED Configuring Windows 8 xi

    Acknowledgments Microsoft Learning would like to acknowledge and thank the following for their contribution towards developing this title. Their effort at various stages in the development has ensured that you have a good classroom experience.

    Andrew J. Warren Content Developer Andrew Warren has more than 25 years of experience in the IT industry, many of which he has spent teaching and writing. He has been involved as the subject matter expert (SME) for many of the Windows Server 2008 courses and the technical lead on a number of other courses. He also has been involved in developing TechNet sessions on Microsoft Exchange Server 2007. Based in the United Kingdom, he runs his own IT training and education consultancy.

    David Susemiehl Content Developer David Susemiehl has worked as consultant, trainer, and courseware developer since 1996. David has extensive experience consulting on Microsoft Systems Management Server and Microsoft System Center Configuration Manager 2007, as well as Active Directory, Exchange Server, and Terminal Server/Citrix deployments. David has developed courseware development for Microsoft and Hewlett-Packard, and delivered those courses successfully in Europe, Central America, and across North America. For the last several years, David has been writing courseware for Microsoft Learning, and consulting on infrastructure transitions in Michigan.

    Jason Kellington - Content Developer Jason Kellington is a Microsoft Certified Trainer (MCT), Microsoft Certified IT Professional (MCITP), and a Microsoft Certified Solutions Expert (MCSE), as well as a consultant, trainer and author. He has experience working with a wide range of Microsoft technologies, focusing on the design and deployment of enterprise network infrastructures. Jason works in several capacities with Microsoft, as a SME for Microsoft Learning courseware titles, a senior technical writer for Microsoft IT Showcase, and an author for Microsoft Press.

    Seth Dietz Technical Reviewer Seth Dietz is a Microsoft Certified Technology Specialist (MCTS), Microsoft Certified Solutions Associate (MCSA), and MCITP, and he has more than 15 years of IT experience. He currently works as a Sr. Technical Account Manager with In-Touch Computer Services, Inc. in Charlotte, NC, where he focuses on implementing outsourced IT solutions for small and medium business. Seth has worked as a SME on several development projects for Microsoft certification exams since 2008. His specializations include virtualization, backup and disaster recovery, mobility and wireless, Remote Desktop Services, Microsoft Office 365, network infrastructure, and Microsoft Small Business Server. Seth has been a project-management professional since 2004.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDxii Configuring Windows 8

    Contents Module 1: Installing and Deploying Windows 8

    Lesson 1: Introducing Windows 8 1-2 Lesson 2: Preparing to Install Windows 8 1-7 Lesson 3: Installing Windows 8 1-14 Lab A: Installing Windows 8 1-18 Lesson 4: Automating the Installation of Windows 8 1-21 Lab B: Performing an Unattended Installation of Windows 8 1-32 Lesson 5: Activating Windows 8 1-35

    Module 2: Upgrading and Migrating to Windows 8 Lesson 1: Upgrading to Windows 8 2-2 Lesson 2: Migrating to Windows 8 2-7 Lesson 3: Migrating User Data and Settings 2-11 Lab: Migrating to Windows 8 2-18

    Module 3: Managing Disks and Device Drivers Lesson 1: Managing Disks, Partitions, and Volumes 3-2 Lesson 2: Maintaining Disks, Partitions, and Volumes 3-13 Lesson 3: Working with Virtual Hard Disks 3-17 Lab A: Managing Disks 3-21 Lesson 4: Installing and Configuring Device Drivers 3-26 Lab B: Configuring Device Drivers 3-38

    Module 4: Configuring and Troubleshooting Network Connections Lesson 1: Configuring IPv4 Network Connectivity 4-2 Lesson 2: Configuring IPv6 Network Connectivity 4-9 Lesson 3: Implementing Automatic IP Address Allocation 4-16 Lab A: Configuring Network Connection 4-22 Lesson 4: Implementing Name Resolution 4-25 Lesson 5: Troubleshooting Network Connectivity 4-28 Lab B: Troubleshooting Network Connectivity 4-33

    Module 5: Implementing Wireless Network Connections Lesson 1: Overview of Wireless Networks 5-2 Lesson 2: Implementing a Wireless Network 5-8 Lab: Planning the Implementation of Wireless Network Connections 5-13

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED Configuring Windows 8 xiii

    Module 6: Implementing Network Security Lesson 1: Overview of Threats to Network Security 6-2 Lesson 2: Configuring Windows Firewall 6-8 Lab A: Configuring Inbound and Outbound Firewall Rules 6-16 Lesson 3: Securing Network Traffic 6-18 Lab B: Configuring Connection Security Rules 6-28 Lesson 4: Configuring Windows Defender 6-30 Lab C: Implementing Host-Based Virus and Malware Protection 6-33

    Module 7: Configuring File Access and Printers on Windows 8 Clients Lesson 1: Managing File Access 7-2 Lesson 2: Managing Shared Folders 7-12 Lesson 3: Configuring File Compression 7-20 Lab A: Configuring File Access 7-24 Lesson 4: Managing Printers 7-27 Lab B: Configuring Printers 7-30 Lesson 5: Overview of SkyDrive 7-32

    Module 8: Securing Windows 8 Desktops Lesson 1: Authentication and Authorization in Windows 8 8-2 Lesson 2: Implementing GPOs 8-6 Lab A: Implementing Local GPOs 8-14 Lesson 3: Securing Data with EFS and BitLocker 8-17 Lab B: Securing Data 8-37 Lesson 4: Configuring User Account Control 8-39 Lab C: Configuring and Testing UAC 8-46

    Module 9: Configuring Applications Lesson 1: Install and Configure Applications 9-2 Lesson 2: Managing Apps from the Windows Store 9-11 Lesson 3: Configuring Internet Explorer Settings 9-15 Lab A: Configuring Internet Explorer Security 9-21 Lesson 4: Configuring Application Restrictions in the Enterprise 9-23 Lab B: Configuring AppLocker (Optional) 9-30

    Module 10: Optimizing and Maintaining Windows 8 Client Computers Lesson 1: Optimizing the Performance of Windows 8 10-2 Lab A: Optimizing Windows 8 Performance 10-11 Lesson 2: Managing the Reliability of Windows 8 10-14 Lesson 3: Managing Windows 8 Updates 10-19 Lab B: Maintaining Windows Updates 10-26

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDxiv Configuring Windows 8

    Module 11: Configuring Mobile Computing and Remote Access Lesson 1: Configuring Mobile Computers and Device Settings 11-2 Lab A: Configuring a Power Plan 11-10 Lesson 2: Configuring VPN Access 11-12 Lab B: Implementing a VPN Connection 11-19 Lesson 3: Configuring Remote Desktop and Remote Assistance 11-21 Lab C: Implementing Remote Desktop 11-24 Lesson 4: Overview of DirectAccess 11-26

    Module 12: Implementing Hyper-V Lesson 1: Overview of Hyper-V 12-2 Lesson 2: Creating Virtual Machines 12-5 Lesson 3: Managing Virtual Hard Disks 12-10 Lesson 4: Managing Snapshots 12-13

    Module 13: Troubleshooting and Recovering Windows 8 Lesson 1: Backing Up and Restoring Files in Windows 8 13-2 Lesson 2: Recovery Options in Windows 8 13-5 Lab: Recovering Windows 8 13-17

    Appendix A: Using Windows PowerShell Lesson 1: Introduction to Windows PowerShell 3.0 A-2 Lesson 2: Windows PowerShell Remoting A-11 Lesson 3: Using Windows PowerShell Cmdlets A-18

    Lab Answer Keys Module 1 Lab A: Installing Windows 8 L1-1 Module 1 Lab B: Performing an Unattended Installation of Windows 8 L1-3 Module 2 Lab: Migrating to Windows 8 L2-5 Module 3 Lab A: Managing Disks L3-7 Module 3 Lab B: Configuring Device Drivers L3-12 Module 4 Lab A: Configuring Network Connection L4-15 Module 4 Lab B: Troubleshooting Network Connectivity L4-18 Module 5 Lab: Planning the Implementation of Wireless Network Connections L5-21 Module 6 Lab A: Configuring Inbound and Outbound Firewall Rules L6-25 Module 6 Lab B: Configuring Connection Security Rules L6-27 Module 6 Lab C: Implementing Host-Based Virus and Malware Protection L6-29 Module 7 Lab A: Configuring File Access L7-31 Module 7 Lab B: Configuring Printers L7-34 Module 8 Lab A: Implementing Local GPOs L8-37 Module 8 Lab B: Securing Data L8-40

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED Configuring Windows 8 xv

    Module 8 Lab C: Configuring and Testing UAC L8-42 Module 9 Lab A: Configuring Internet Explorer Security L9-45 Module 9 Lab B: Configuring AppLocker (Optional) L9-47 Module 10 Lab A: Optimizing Windows 8 Performance L10-51 Module 10 Lab B: Maintaining Windows Updates L10-54 Module 11 Lab A: Configuring a Power Plan L11-57 Module 11 Lab B: Implementing a VPN L11-58 Module 11 Lab C: Implementing Remote Desktop L11-60 Module 13 Lab: Recovering Windows 8 L13-63

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED About This Course xvii

    About This Course This section provides you with a brief description of the course, audience, suggested prerequisites, and course objectives.

    Course Description

    Note: This first release (A) MOC version of course 20687A has been developed on prerelease software (Release Preview (RP)). Microsoft Learning will release a B version of this course after the RTM version of the software is available.

    This course will provide you with the knowledge and skills to install, manage, secure, and support Windows 8-based computers, devices, user accounts, and network resources. This course will teach you how to configure Windows 8 and troubleshoot various issues related to networking, data management, wireless connectivity and remote access. This course will also provide guidelines, best practices, and considerations that will help you optimize performance and minimize errors and security threats in Windows 8 client computers.

    Audience

    This course is intended for IT professionals, who have prior experience in configuring the Windows 8 operating system, and troubleshooting issues, and providing user support for Windows 8-based computers and devices. These IT professionals could be consultants, full-time desktop support technicians, or IT generalists who provide support for Windows 8 computers as part of their broader technical duties. IT professionals seeking certification in the 70-687 Windows 8 Configuring exam also may take this course.

    Student Prerequisites This course requires that you meet the following prerequisites:

    Experience managing computers running on the Windows 8 operating system.

    Technical knowledge of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS).

    Familiarity with Active Directory Domain Services (AD DS) principles and the fundamentals of AD DS management.

    Understanding of the Public Key Infrastructure (PKI) components and working knowledge of the fundamentals of Active Directory Certificate Services (AD CS).

    Knowledge of Microsoft Windows Server 2008 or Windows Server 2008 R2 fundamentals.

    Knowledge of Microsoft Windows client fundamentals; for example, working knowledge of Windows XP, Windows Vista, and/or Windows 7.

    Understanding of the fundamentals of management and experience using the Microsoft Office 2010 system or the Microsoft Office 2007 system.

    Knowledge of Windows Automated Installation Kit (WAIK) components including Windows PE, Windows System Image Manager (SIM), Volume Activation Management Tool (VAMT), ImageX, User State Migration Tool (USMT), and Deployment Image Servicing and Management (DISM) concepts and fundamentals.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDxviii About This Course

    Course Objectives After completing this course, students will be able to:

    Plan and perform the installation of Windows 8.

    Install Windows 8 on computers that are running an existing operating system.

    Configure disks, partitions, volumes, and device drivers in a Windows 8 system.

    Configure network connectivity and troubleshoot connectivity issues.

    Install, configure, and maintain wireless network connections.

    Implement Windows 8 technologies to secure network connections.

    Share files and printers.

    Implement tools and technologies that can help secure Windows 8 desktops.

    Configure and control applications in Windows 8.

    Optimize and maintain Windows 8-based computers.

    Configure mobile computer settings and remote access.

    Describe Hyper-V for Windows 8, and describe how to use it to support legacy applications.

    Determine how to recover Windows 8 from various failures.

    Describe how to use Windows PowerShell to manage Windows 8.

    Course Outline This section provides an outline of the course:

    Module 1, Installing Windows 8" describes the key features of Windows 8, and the differences between the various versions. This module also describes how to install and activate Windows 8 on a computer.

    Module 2, Upgrading and Migrating to Windows 8" describes how to install Windows 8 on computers that are running on other operating systems. The module describes the processes of upgrading or migrating to Windows 8, and discusses the differences between both.

    Module 3, Managing Disks and Device Drivers" describes how to configure and manage disks, partitions, and volumes in a Windows 8 system. Additionally, this module describes how to install, configure, and troubleshoot device drivers.

    Module 4, Configuring and Troubleshooting Network Connections" compares IPv4 and IPv6 addresses, and describes how to configure both. The module also describes how to implement Automatic IP address Allocation and name resolution. The module concludes with a lab on troubleshooting network connectivity.

    Module 5, Implementing Wireless Network Connections" provides an overview of wireless networks, and describes how to install, configure, and troubleshoot them.

    Module 6, Implementing Network Security" provides an overview of common network security threats, and how to mitigate them by configuring inbound and outbound firewall rules, connection security rules, Windows Defender, and host-based virus and malware protection.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED About This Course xix

    Module 7, Configuring File Access and Printers on Windows 8 Clients" describes how to manage file access, and configure NTFS file-system permissions for files and folders. The module also provides an overview of shared folders, file compression, and the impact of moving and copying compressed files and folders. The module then goes on to describe how to create and share printers, and concludes with an overview of Windows Live SkyDrive.

    Module 8, Securing Windows 8 Desktops" describes new authentication and authorization features in Windows 8. The module also describes how to implement local Group Policy objects, secure data with Encrypting File Service (EFS) and BitLocker drive encryption, and configure User Account Control (UAC).

    Module 9, Configuring Applications" describes how to install and configure applications, application compatibility, and application restrictions in Windows 8. Additionally, the module describes how to configure and test Windows Internet Explorer security settings, and AppLocker rules that restrict the running of applications.

    Module 10, Optimizing and Maintaining Windows 8 Client Computers" describes how to identify issues with performance and reliability, and use tools such as Resource Monitor, Data Collector Sets, and Performance Monitor. The module also describes how to optimize Windows 8 performance, and manage and maintain Windows updates. Additionally, the module describes how to manage Windows 8 reliability by using Windows diagnostic tools.

    Module 11, Configuring Mobile Computing and Remote Access" describes how to configure mobile computer settings and power plans, and provides an overview of mobile device sync partnerships and power-saving options. The module also describes how to enable and configure virtual private network (VPN) access, create and test a VPN, and configure remote desktop and remote assistance. The module concludes with an overview of DirectAccess, and how it works for internal and external clients.

    Module 12, Implementing Hyper-V" describes the fundamentals of Hyper-V for Windows 8 and scenarios for using it. The module also describes how to create and configure virtual machines in Hyper-V, and how to manage virtual hard disks (VHDs) and snapshots.

    Module 13, Troubleshooting and Recovering Windows 8" describes how to back up data and use recovery options such as System Restore to recover Windows 8.

    Appendix A, Using Windows PowerShell" describes the fundamentals of Windows PowerShell, and how to use Windows PowerShell cmdlets and remote commands.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDxx About This Course

    Course Materials The following materials are included with your kit:

    Course Handbook A succinct classroom learning guide that provides all the critical technical information in a crisp, tightly-focused format, which is just right for an effective in-class learning experience.

    Lessons: Guide you through the learning objectives and provide the key points that are critical to the success of the in-class learning experience.

    Labs: Provide a real-world, hands-on platform for you to apply the knowledge and skills learned in the module.

    Module Reviews and Takeaways: Provide improved on-the-job reference material to boost knowledge and skills retention.

    Lab Answer Keys: Provide step-by-step lab solution guidance at your finger tips when its needed.

    Course Companion Content on the http://www.microsoft.com/learning/companionmoc Site: Searchable, easy-to-navigate digital content with integrated premium on-line resources designed to supplement the Course Handbook.

    Modules: Include companion content, such as questions and answers, detailed demo steps and additional reading links, for each lesson. Additionally, they include Lab Review questions and answers and Module Reviews and Takeaways sections, which contain the review questions and answers, best practices, common issues and troubleshooting tips with answers, and real-world issues and scenarios with answers.

    Resources: Include well-categorized additional resources that give you immediate access to the most up-to-date premium content on TechNet, MSDN, and Microsoft Press.

    Student Course files on the http://www.microsoft.com/learning/companionmoc Site: Includes the Allfiles.exe, a self-extracting executable file that contains all the files required for the labs and demonstrations.

    Course evaluation At the end of the course, you will have the opportunity to complete an online evaluation to provide feedback on the course, training facility, and instructor.

    To provide additional comments or feedback on the course, send e-mail to [email protected]. To inquire about the Microsoft Certification Program, send e-mail to [email protected].

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED About This Course xxi

    Virtual Machine Environment This section provides the information for setting up the classroom environment to support the business scenario of the course.

    Virtual Machine Configuration In this course, you will use Microsoft Hyper-V to perform the labs.

    Important At the end of each lab, you must close the virtual machine and must not save any changes. To close a virtual machine without saving the changes, perform the following steps:

    1. On the virtual machine, on the Action menu, click Close.

    2. In the Close dialog box, in the What do you want the virtual machine to do? list, click Turn off and delete changes, and then click OK.

    The following table shows the role of each virtual machine used in this course:

    Virtual machine Role

    20687A-LON-DC1 Domain controller in the Adatum.com domain

    20687A-LON-CL1 Domain member

    20687A-LON-CL2 Domain member

    20687A-LON-CL3 Domain member

    20687A-LON-CL4 Blank with no operating system installed, but is linked to the Windows 8 Enterprise client ISO

    Software Configuration The following software is installed on each VM:

    Windows Server 8

    Windows 8 Client (Windows 8 Enterprise)

    Microsoft Office 2010

    On the server, possibly also Windows Automated Installation Kit (AIK)

    Classroom Setup Each classroom computer will have the same virtual machine configured in the same way.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDxxii About This Course

    Course Hardware Level To ensure a satisfactory student experience, Microsoft Learning requires a minimum equipment configuration for trainer and student computers in all Microsoft Certified Partner for Learning Solutions (CPLS) classrooms in which Official Microsoft Learning Product courseware are taught.

    Intel Virtualization Technology (Intel VT) or AMD Virtualization (AMD-V) processor

    Dual 120 gigabyte (GB) hard disks 7200 RM Serial ATA (SATA) or better*

    8 GB RAM

    DVD drive

    Network adapter

    Super VGA (SVGA) 17-inch monitor

    Microsoft Mouse or compatible pointing device

    Sound card with amplified speakers

    *Striped

    In addition, the instructor computer must be connected to a projection display device that supports SVGA 1024 x 768 pixels, 16-bit colors.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED1-1

    Module 1 Installing and Deploying Windows 8

    Contents: Module Overview 1-1

    Lesson 1: Introducing Windows 8 1-2

    Lesson 2: Preparing to Install Windows 8 1-7

    Lesson 3: Installing Windows 8 1-14

    Lab A: Installing Windows 8 1-18

    Lesson 4: Automating the Installation of Windows 8 1-21

    Lab B: Performing an Unattended Installation of Windows 8 1-32

    Lesson 5: Activating Windows 8 1-35

    Module Review and Takeaways 1-39

    Module Overview Windows 8 is the latest Microsoft client operating system. With new features and capabilities, it builds on the strong core functionality of Windows 7 to provide a stable and feature rich client experience, across many form factors.

    This module will introduce you to some new features of Windows 8, provide guidance on installing Windows 8, and introduce you the Windows 8 licensing environment.

    Objectives After completing this module, you will be able to:

    Describe the different editions of Windows 8.

    Prepare a computer for Windows 8 installation.

    Install Windows 8.

    Automate the installation of Windows 8.

    Explain Windows 8 licensing and activation.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED1-2 Installing a

    Lesson Introd

    Winefficandandmig

    LesAfte

    Int

    BuilWintaskthe provinfoWinandsuchmaldatauserman

    Thenewmak

    NewWinintro300

    nd Deploying Windo

    1 ucing W

    ndows 8 is desiciently. Windo the latest tab the different

    ght select a spe

    sson Objecer completing

    Describe the

    Explain the d

    Understand t

    troducing

    t on the solid ndows 8 is desiks efficiently anlatest in compvides integrate

    ormation and andows 8 can m data-security h as full-screenware protectioa encryption. Wr experience anageable platf

    design of Winw user interfacekes it the centr

    w Features ndows 8 represoduction of th new features.

    Start screen. Tapplications acan display livfriendly layouin Windows s

    Cloud integrainformation. settings instaany compute

    ows 8

    Windowigned to meetws 8 enables y

    blet and phoneWindows 8 ed

    ecific Windows

    ctives this lesson, yo

    key features in

    ifferences betw

    he implication

    Windows

    foundation ofigned to help nd effectively bputing technoled connectionapplications. A

    meet your organeeds by prov

    n immersive apon, strong authWindows 8 prolong with a mform.

    ndows 8 enable and app modral hub of user

    in Windowsents Microsofhe Microsoft W. The following

    The Start screeand informatiove informationut, it is significasince Windows

    ation. WindowUsers signing ntly that are imr, regardless o

    ws 8 t a large scopeyou to take ade platforms. Thditions that ares edition.

    ou will be able

    n Windows 8.

    ween Window

    ns of using the

    8

    f Windows 7, users performby incorporatiogy. Windowss to important

    Additionally, nizations busviding featurepplications, buhentication, anovides an improre secure and

    es it to suppodel increases ur activity and d

    s 8 fts most signif

    Windows 95 og section highl

    en represents aon in Windowsn and provide antly different s 95.

    ws 8 provides inin to a Windowmportant to thof the compute

    e of computingvantage of co

    his lesson will ie available. The

    to:

    s 8 editions.

    32-bit or 64-b

    their ng s 8 t

    iness s

    uilt-in nd roved d

    rt the unique wusers productidata integratio

    ficant change ioperating syste

    ights some of

    a significant shs 8. The Start San interactive from the Start

    ncreased integws 8 desktop chem. Windowsers location.

    g needs, and eomputing devicntroduce you e lesson also w

    bit versions on

    working stylesivity, and the d

    on.

    in operating syem. Therefore, f the most imp

    hift in the way Screen is tile-bhub experienct button interf

    gration with clocomputer can s 8 ensures a c

    enable users toces from traditto the key Win

    will describe w

    n Windows 8.

    s of many diffedesign of the n

    ystem design sWindows 8 co

    portant feature

    users find andbased, and its cce for users. Wface that has b

    oud-based serconnect to thonsistent user

    o perform tasktional platformndows 8 featuhy and when y

    erent people. Tnew Start scree

    since the ontains more tes and changes

    d interact withconfigurable ti

    With its touch-been impleme

    rvices and e information

    r experience ac

    s ms, res you

    The en

    than s:

    h iles

    nted

    and cross

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED

    U

    Wsp

    WWth

    Reset and rspecific def

    o Reset y

    o Refresreinsta

    Windows Tcan start anTo Go-enabapplication

    Remote Deenables musession. Youand univers

    Hyper-V. Henvironmenmultiple opdepartmencompatibili

    Support forsupport fordevices, pro

    Understand

    Windows 8 compan two distinc

    Windows 8 EWindows 8 comhe x86 platform

    Windows 8available. Itnecessary fbusiness us

    Windows 8support theprofessionavirtualizatio

    Windows 8includes en

    refresh your PCfault state, or r

    your PC remo

    h your PC keells Windows, r

    o Go. Windownd run from a bled USB devics, files, and set

    esktop Servicesultiple users tou can use Winsal access to W

    yper-V on Wnt. You can takperating systemts can providety with Windo

    r multiple formr both the x86 oviding more u

    ding Wind

    mes in four diffct processor-a

    Editions mes in three sem:

    . This is the mot contains the or general hom

    se.

    Pro. This edite needs of busals, and suppoon, computer m

    Enterprise. Thnterprise-level

    C. By using Resrecover Windo

    oves all person

    eps all personaetaining the u

    ws To Go enabuniversal seriace, they get a ttings.

    s. Windows 8 n connect remodows 8 in Virt

    Windows 8 des

    Windows 8 provke advantage m configuratioe a consolidateows Server 201

    m factors. Windand the ARM

    ubiquitous acc

    dows 8 Edi

    ferent editionsrchitecture typ

    parate edition

    ost basic editiokey features me and small-

    ion is designedsiness and techrts a broader smanagement,

    his edition supsecurity, mobi

    set and Refresows 8 from erro

    al data, apps,

    al data, desktoser experience

    les you to supal bus (USB) stocomplete Win

    now includes Rotely to the saual Desktop Inktops.

    vides a flexibleof this environ

    ons, by using aed and efficien12.

    dows 8 is the fplatform. Win

    cess to the Win

    tions

    s that pes.

    ns on

    on

    d to hnical set of Windowand domain c

    ports the full sility, and confi

    h, users and ITors or corrupt

    and settings fr

    op-style apps, ae and user dat

    ply a fully funcorage device. W

    ndows 8 experi

    Remote Desktome computingnfrastructure (V

    e and high-pernment to test a single compu

    nt virtual enviro

    first Windows ndows 8 runs ondows 8 enviro

    ws 8 technologconnectivity.

    set of Windowguration.

    C

    T staff can retuoperating sys

    rom the PC, an

    and other impta.

    ctioning copy When users boience, along w

    op Services (RDg infrastructurVDI) scenarios

    rforming clienapplications anuter. By using Honment throu

    operating syston PCs, as wellonment for us

    ies, including e

    ws 8 functional

    Configuring Windows

    urn a computetem files:

    nd reinstalls W

    portant setting

    of Windows 8oot from a Win

    with all of their

    DS) capability, e, each in an i to provide ro

    t virtualizationnd IT scenariosHyper-V, IT gh virtual mac

    tem to provide as tablets and

    sers.

    encryption,

    ity, and additio

    s 8 1-3

    er to a

    Windows.

    gs, and

    8 that ndows

    which solated bust

    n s in

    chine

    e d similar

    onally

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED1-4 Installing and Deploying Windows 8

    Key Feature Comparison The following table represents the key features available in each edition of Windows 8.

    Feature Windows 8 Windows 8 ProWindows 8 Enterprise

    BitLocker and BitLocker To Go X X

    Boot from virtual hard disk (VHD) X X

    Client Hyper-V X X

    Domain Join X X

    Encrypting File System X X

    Group Policy X X

    AppLocker X

    BranchCache X

    DirectAccess X

    Side-load Metro apps X

    Virtualization through RemoteFX X

    Windows To Go X

    Understanding Windows RT Windows 8 is the first Windows client operating system that supports the ARM processor architecture that is commonly found in mobile devices such as tablets and phones. Windows RT is designed specifically to run apps built on the Metro platform, and it is available only as a preinstalled operating system on tablets and similar devices with ARM processors. ARM provides a lightweight form factor with excellent battery life, specifically for mobile devices. Windows RT is preloaded with touch-optimized versions of Microsoft Office applications, and is limited to running apps built using the Metro style UI.

    Note: Further detail on Windows RT is outside of the scope of this course. It is mentioned here for reference only. Unless otherwise noted, all references to Windows 8 in this course are for the x86 and x64 editions.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDA

    EainWanWth

    WthadW

    CInarwde

    Advantage

    ach licensed edncludes WindoWindows 8 Entend 64-bit versi

    Windows 8 are hat utilize the 6

    While the 64-biheir 32-bit coudvantages of u

    Windows 8, incl

    Improved pcan processenabling yothis improv

    Enhanced m(RAM), andincluding a

    Improved dwas difficulother comm

    Since the refor these demost of the

    Improved senvironmenExecution P

    Support forWindows 8translation.

    Choosing Win most cases, architecture. A c

    with a 64-bit pretermine whic

    You can ins

    You can insarchitectureoperating sfunctionalit

    32-bit driveby 32-bit dprocessor a

    You can insversions of

    s of 64-bit

    dition of Windws 8, Windowerprise, is availions. The 64-bdesigned to w64-bit process

    t versions are unterparts, theusing a 64-bit luding:

    performance. Ts more data foou to scale youved processor c

    memory. A 64- it can addressll 32-bit editio

    device supportt to obtain thi

    mon office equ

    elease of the 6evices has impe drivers that w

    security. The arnt through KePrevention (DE

    r the Client Hy. Hyper-V requ

    indows 8 Vea computer wilcomputer withrocessor will ruch version of W

    stall 64-bit ver

    stall 32-bit vere. When you insystem does noty.

    ers will not worivers only, yo

    architecture.

    stall 32-bit verapplications o

    t Windows

    dows 8, which ws 8 Pro, and lable in both 3

    bit versions of work with comp

    or architecture

    similar in feature are several edition of

    The 64-bit proor each clock cur applicationscapacity, you m

    -bit operating s memory abo

    ons of Window

    t. Although 64rd-party drive

    uipment.

    64-bit versions proved greatly.work with Wind

    rchitecture of rnel Patch Pro

    EP).

    yper-V featureuires 64-bit pr

    ersions for Il run the versi

    h a 32-bit procun the 64-bit vWindows 8 sho

    sions of Windo

    sions of Windonstall a 32-bit ot take advant

    ork in 64-bit veu must use a 3

    sions of Windoor for testing p

    s 8 Version

    32-bit

    puters e.

    ures to

    cessors cycle, s to run faster must install a 6

    system can move 4 gigabytews 8, which are

    -bit processorers for common

    of Windows V. Because Winddows 7 also w

    64-bit processtection (KPP),

    . This feature irocessor archit

    Installationon of Windowcessor will run version of Winduld be installe

    ows 8 only on

    ows 8 on comversion of Win

    tage of any 64

    ersions of Wind32-bit version

    ows 8 on 64-bpurposes.

    ns

    or support mo64-bit edition

    make more effices (GB). This is e limited to 4 G

    rs have been anly used devic

    Vista and Windows 8 is built

    work with Wind

    sors enables a mandatory ke

    is only supporttecture that su

    ws 8 that corres

    the 32-bit verdows 8. You ca

    ed on a compu

    computers wi

    puters with 32ndows 8 on a

    4-bit processor

    dows 8. If you of Windows 8

    bit architecture

    C

    ore users. Howof the operati

    cient use of raunlike all 32-b

    GB of addressa

    vailable for soces, such as pri

    ndows 7, the at on the same dows 8.

    more secure oernel-mode dr

    ted in the 64-bpports second

    sponds to its prsion of Windoan use the foll

    uter.

    ith 64-bit proc

    2-bit or 64-bit 32-bit processr architecture f

    have hardwar8, regardless of

    e computers to

    Configuring Windows

    wever, to benefing system.

    ndom access mbit operating syable memory.

    ome time, in thinters, scanner

    availability of dkernel as Win

    operating systeriver signing, a

    bit versions of d level address

    processor ows 8, and a colowing list to

    cessor architec

    processor sor architecturfeatures or

    re that is suppof the compute

    o support earli

    s 8 1-5

    fit from

    memory ystems,

    he past it rs, and

    drivers dows 7,

    em nd Data

    fs

    omputer

    cture.

    re, the

    orted ers

    ier

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED1-6 Installing and Deploying Windows 8

    Limitations of the 64-Bit Versions The 64-bit editions of Windows 8 do not support the 16-bit Windows on Windows (WOW) environment. If your organization requires earlier versions of 16-bit applications, they will not run natively in Windows 8. One solution is to run the application within a virtual environment by using Client Hyper-V.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDLessonPrepa

    Thruinde

    Thsu

    LA

    H

    Wcoinexruanth

    ThreWreopco

    Thim

    n 2 aring tohe first step in un on the comnstallation procevices, drivers,

    his lesson will uccessful Wind

    esson Objfter completin

    Describe m

    Explain how

    Understand

    Identify me

    Describe th

    Hardware R

    Windows 8 takeomputing hardnnovative devicxperience. Howunning on earlnd many comphe minimum h

    he following seecommended

    Windows 8. Winequirements arperating systeompromised if

    1 gigahertz

    1 GB RAM

    16 GB avail

    DirectX 9

    he Windows 8mprovements i

    o Install installing Winputer will be ccess, you need, and applicati

    introduce youdows 8 installat

    ectives ng this lesson, y

    minimum recom

    w to check for

    d and identify

    ethods for miti

    he options ava

    Requireme

    es advantage odware. It also sces for an uncwever, Windowier configuratiputers in enterardware requi

    ections list thehardware requndows 8 will inre not met, bum performancf the compute

    z (GHz) or faste

    (32-bit) or 2 G

    able hard disk

    graphics devic

    kernel has bein general perf

    Windondows 8 on a ccompatible witd to understanons, and unde

    to these conction.

    you will be ab

    mmended hard

    device and sc

    common appl

    gating applica

    ilable for insta

    ents for Ins

    of new and posupports the laompromising ws 8 also is capions of compurprises today mrements easily

    e minimum uirements for nstall if some out user experiece may be r does not me

    er processor

    GB RAM (64-bit

    k space (32-bit

    ce with a Wind

    een refined andformance on t

    ws 8 computer is toth Windows 8.d minimum ha

    erstand the ins

    cepts, and equ

    le to:

    dware requirem

    reen resolutio

    ication-compa

    ation-compati

    lling Windows

    stalling W

    owerful atest user pable of uters, meet y.

    of these nce and

    et or exceed t

    t)

    t) or 20 GB (64

    dows Display D

    d improved frothe same comp

    o ensure that th. As a part of pardware requirstallation meth

    ip you with in

    ments for insta

    n compatibilit

    atibility issues.

    bility issues.

    s 8.

    Windows 8

    the following s

    4-bit)

    Driver Model (W

    om Windows 7puter in severa

    C

    he hardware apreparing for trements, ident

    hods available.

    formation tha

    alling Window

    ty.

    .

    specifications:

    WDDM) 1.0 or

    7 and, in manyal different are

    Configuring Windows

    and software bthe Windows 8tify problemat

    t you need to

    ws 8.

    r newer driver

    y cases, you meas.

    s 8 1-7

    being 8 tic

    plan a

    ay see

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED1-8 Installing a

    HaIn arequ

    De

    ApayouotheprineasythemWindriv

    Howhardloadas hada

    CheThecombestCon

    ComTheWinand

    nd Deploying Windo

    rdware Reqddition to theuire a specific

    The Windows(UEFI). The sepotentially unWindows 8 o

    While the secboot process.

    Client Hyper-(SLAT). SLAT performed fo

    The BitLockerthe most seamkeys within a

    etermining

    art from the m also must deter computer h

    nters, wireless ky to identify vim to ensure thndows 8, and tver for the app

    wever, there ardware componded as well. Crhard drive contpters, network

    ecking Hard Windows 8 se

    mpatibility. Howt to be sure th

    nfirming hardw

    mpatibility Compatibility

    ndows 8 progra pertinent com

    Device make

    Links to more

    Compatibility

    Driver version

    ows 8

    quirements f requirementshardware con

    s 8 secured boecured boot prnwanted operaperating syste

    cure boot proc.

    -V requires a 6reduces the ov

    or virtual mach

    r feature requimless and secumicrocontroll

    g Device Co

    inimum hardwtermine the cohardware. Devikeyboards, andsually, and you

    hat they are cohey have a fun

    propriate Wind

    re other devicenents that musritical system ctrollers, chipsek adapters, and

    dware Competup process wwever, when aat the comput

    ware compatib

    Center for Wy Center for Wam and device

    mpatibility info

    and model

    e information a

    y status

    ns available (32

    for Importas listed in the pfiguration befo

    oot process reqrocess takes adating-system bm start.

    cess is not man

    64-bit processoverhead incurr

    hines.

    res a computeure BitLocker eer on a compu

    ompatibili

    ware requiremeompatibility of ces such as d wireless miceu should chec

    ompatible withnctioning devidows 8 edition.

    es and computst have driversomponents, su

    ets, graphics d other import

    patibility will check the in organizationter hardware f

    bility enables a

    Windows 8indows 8 webe compatibilityormation inclu

    about the dev

    2-bit or 64-bit

    ant Featurespreceding sectore they will in

    quires a BIOS bdvantage of UEboot loaders b

    ndatory for Wi

    or architecturered during the

    er that supportexperience. TPuters motherb

    ity and Scr

    ents,

    e are k

    h ce .

    ter s uch

    tant system de

    nstallation comn is deploying for those compsmoother inst

    site on Microsy. The website ding:

    ice

    t)

    s tion, Windowsnstall or run co

    based on UnifiEFI to prevent

    between the sy

    indow 8, it gre

    e that supportse virtual-to-phy

    ts Trusted PlatPM allows the sboard.

    reen Resol

    evices, must ha

    mputer autommultiple insta

    puters is comptallation proce

    soft.com providcontains a cat

    8 contains sevorrectly:

    ed Extensible the launching

    ystems BIOS st

    eatly increases

    s second level ysical address

    tform Module storage of BitL

    lution

    ave drivers to f

    matically for deallations of Winpatible with Wess.

    des informatiotalog of progr

    veral features

    Firmware Integ of unknown tarting and the

    the integrity o

    address translmapping proc

    (TPM) to provLocker encrypt

    function prope

    vice and drivendows 8 at onindows 8.

    on about ams and devic

    that

    rface or e

    of the

    ation cess

    vide tion

    erly.

    er ce, its

    ces,

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDThp

    WA scthM

    Thdi

    /C

    C

    Asya sehawantoca

    SDapfosy

    UUcoapto

    Uexthat

    H

    he Compatibilrovide feedbac

    Windows 8 Snew requirem

    creen resolutiohe desktop, ma

    Metro style app

    he maximum sisplays, or high

    AdditionaCompatCenter

    Common A

    n application wystem can causcomputer with

    everal reasons.ardware that w

    work on Windony compatibilio be aware of tause the most

    etup and Inuring applicatpplication migolders that exisystem. This can

    User Accounser Account Computer, and pplication thato do so.

    AC also limits xpose their cohat requires adttempts to writ

    owever, UAC m

    Custom insadministrat

    Standard umight not m

    ity Center for ck for devices

    Screen Resoment in Windowon, and 1366x7aking it viewabp with less than

    supported resoh-pixel density

    al Reading: htr/Home.

    Application

    written for a spse problems wh a different o. Generally, apwork on Windows 8. To troubty issues effectthe general arissues.

    nstallation otion setup andght try to copy sted in a previon prevent the a

    nt Control ontrol (UAC) aby restricting t requires adm

    the context inmputer to viru

    dministrator pete to a nonvirt

    may result in t

    tallers, uninstator.

    ser applicationmake this task

    Windows 8 weto confirm co

    olution ws 8 is that Me768 for the snable while you un this required

    olution for Winy displays on s

    ttp://www.mic

    n-Compati

    pecific operatiwhen you instaoperating systeplications andows 7 will contbleshoot and atively, it is impeas that typica

    of Applicatio installation, afiles and shor

    ous Windows application fro

    adds security tmost users to

    ministrative per

    n which a proceuses or other mermissions to rtualized registr

    the following c

    allers, and upd

    ns that requireavailable to st

    ebsite also enampatibility.

    etro-style appap feature. Thiuse other Met

    d resolution, yo

    ndows 8 is 256maller form-fa

    crosoft.com/en

    ibility Prob

    ing ll it on

    em, for tinue to

    address portant ally

    ons n

    rtcuts to operating syst

    om installing p

    o Windows byrun as standar

    rmissions, the s

    ess executes, tmalware. This crun, performs ury location.

    compatibility is

    daters may not

    e administrativtandard users.

    ables commun

    plications shous enables you ro or traditionou will receive

    60x1440, allowactor devices.

    n-us/windows/

    blems

    tem, but no loproperly or eve

    y controlling ard users. Whensystem promp

    to minimize thchange affectsunnecessary a

    ssues:

    t be detected a

    ve privileges to.

    C

    nity interaction

    ld have a minito snap a Met

    nal apps. If youan error mess

    wing for large f

    /compatibility/

    nger exist for en installing at

    dministrator-ln users attemppts them to con

    he ability of uses any applicatiodministrator c

    and elevated t

    o perform their

    Configuring Windows

    n, where users

    imum of 1024xtro app to the

    u attempt to lasage.

    format traditio

    /en-US

    the new operat all.

    evel access to pt to launch annfirm their inte

    ers to inadverton installer or checks or actio

    to run as

    r tasks may fai

    s 8 1-9

    can

    x768 side of

    aunch a

    onal

    ating

    the n ention

    tently update

    ons, or

    il or

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED1-10 Installing and Deploying Windows 8

    Applications that attempt to perform tasks for which the current user does not have the necessary permissions may fail. How the failure manifests itself is dependent upon how the application was written.

    Control panel applications that perform administrative tasks and make global changes may not function properly and may fail.

    Dynamic link library (DLL) applications that run using RunDLL32.exe may not function properly if they perform global operations.

    Standard user applications writing to global locations will be redirected to per-user locations through virtualization.

    Windows Resource Protection Windows Resource Protection (WRP) protects Windows resources, such as files, folders, and registries, in a read-only state. This affects specific files, folders, and registry keys only. WRP restricts updates to protected resources to the operating system trusted installers, such as Windows Servicing. This enables better protection for the components and applications that ship with the operating system from the impact of other applications and administrators. However, WRP may result in the following compatibility issues:

    Application installers that attempt to replace, modify, or delete operating system files and/or registry keys that WRP protects may fail, with an error message indicating that the resource cannot be updated. This is because access to these resources is denied.

    Applications that attempt to write new registry keys or values to protected registry keys may fail with an error message that indicates that the change failed because access was denied.

    Applications that attempt to write to protected resources may fail if they rely on registry keys or values.

    64-Bit Architecture Windows 8 fully supports the 64-bit architecture. The 64-bit version of Windows 8 can run all 32-bit applications with the help of the WOW64 emulator. Considerations for the 64-Bit Windows 8 include:

    Applications or components that use 16-bit executables, 16-bit installers, or 32-bit kernel drivers will either fail to start or will function improperly on a 64-bit edition of Windows 8.

    Installation of 32-bit kernel drivers will fail on the 64-bit system. If an installer manually adds a driver by editing the registry, the system will not load this driver, and this can cause a system failure.

    Installation of 64-bit unsigned drivers will fail on the 64-bit system. If an installer manually adds a driver by editing the registry, the system will not load the driver during load time if it is not signed.

    Windows Filtering Platform Windows Filtering Platform (WFP) is an application program interface (API) that enables developers to create code that interacts with the filtering that occurs at several layers in the networking stack and throughout the operating system. If you are using a previous version of this API in your environment, you may experience failures when running security-class applications, such as network scanning, antivirus programs, or firewall applications.

    Operating System Version Changes The operating system version number changes with each operating system release. For Windows 7, the internal version number is 6.1, whereas for Windows 8, the internal version number is 6.2. The GetVersion function returns this value when it is queried by an application. This change affects any application or application installer that specifically checks for the operating system version, and might prevent the installation from occurring or the application from running.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDKKeMW

    M

    Yo(Acodeaffe

    Map

    MSo

    Kernel-Modeernel-mode dr

    Mode Driver FraWindows Vista.

    Methods fo

    ou can use theACT) to determompatible withetermine how ffect your appeatures to:

    Verify your compatibiliWindows o

    Verify a Wi

    Become invshare your

    Test your wWindows In

    Mitigating an application and

    Mitigation Mome of the mo

    Modifying ta modificatregistry ent

    You can usewith ACT) tContact the

    Applying uaddress masystem envensure that

    Upgrading exists, the bmust considtwo differe

    Modifying ta short-termyou must cregarding tadding the

    e Drivers rivers must supamework (UM

    or Mitigati

    e Application Cmine whether yh Windows 8. Aan update to lications. You c

    application, dty with a new

    operating syste

    ndows update

    volved in the Arisk assessmen

    web applicationnternet Explore

    pplication com current suppo

    Methods ore common m

    the configurattion to the apptries, or chang

    e tools such asto detect and ce software ven

    pdates or servany of the comironment. Aftet the compatib

    the applicatiobest long-termder both the cnt versions of

    the security com solution is toonduct a full-rthe modificatiosite to the tru

    pport the WindDF). UMDF is

    ing Comm

    Compatibility Tyour applicatioACT also helpsthe new versiocan use the AC

    device, and comversion of the

    em.

    e's compatibilit

    ACT communitnt with other A

    ns and websiteer.

    mpatibility issuort for the app

    mitigation met

    tion of the exisplication configing file or fold

    s the Compatibcreate applicat

    ndor for inform

    vice packs to thmpatibility issueer applying thebility issue has

    on to a compatm mitigation is cost of the upgthe applicatio

    onfiguration. Ifo modify the srisk analysis anons. For exampusted site list o

    dows 8 operata device drive

    mon Applic

    Toolkit ons are s you on will CT

    mputer e

    ty.

    ty, and ACT users.

    es for compati

    ue typically depplication.

    thods include t

    sting applicatioguration, such

    der permission

    bility Administtion fixes (also

    mation about a

    he application.es, and they hee update or sebeen mitigate

    tible version. Ifto upgrade to

    grade and any n.

    f your compatsecurity confignd gain consenple, you can mr by turning o

    ting system orr developmen

    cation-Com

    bility with new

    pends on vario

    the following:

    on. There can h as moving files.

    trator or the Sto called shims) any additional

    . Updates or seelp the applica

    ervice pack, aded.

    f a newer, como the newer vepotential prob

    tibility issues aguration of thensus from you

    mitigate the Intoff Protected M

    Co

    r be redesignednt platform tha

    mpatibility

    w releases and

    ous factors, suc

    be compatibiles to different

    tandard User Ato address cocompatibility

    ervice packs mation to run w

    dditional applic

    mpatible versioersion. Using thblems that ma

    ppear to be pee application. Ur organizationternet Explorer

    Mode, which w

    onfiguring Windows

    d to follow theat was introduc

    y Issues

    security upda

    ch as the type

    lity issues that folders, modi

    Analyzer (instampatibility isssolutions.

    may be availabwith the new opcation tests ca

    on of the applihis approach, yay arise with ha

    ermissions-relaUsing this appns security tear Protected mo

    we do not reco

    8 1-11

    e User-ced in

    ates to

    of

    require fying

    alled ues.

    le to perating n

    cation you aving

    ated, roach, m ode by mmend.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED1-12 Installing

    Op

    Youway

    and Deploying Wind

    Running the abe able to runHyper-V. Late

    Using applicasystem versioright-clickingmode from th

    You also can compatibility Features.

    Selecting anoapplication isyou must con

    ptions for I

    u can install Wiys, including:

    Clean installaWindows 8 owhich you areprevious Wininformation, oto installationon a computestart the comthe computersystem, run seYou can run s

    o DVD

    o Network

    o USB Key

    You also can

    Upgrade instawant to replaapplications,

    To perform aand select Upan in-place udevice settingyour importa

    Migration. Yoneed to movebased compu

    o Back up t

    dows 8

    application in n the applicatier sections of t

    ation-compatiboning, by runni the shortcut ohe Compatibi

    use the Programode. The Pr

    other applicatio available, con

    nsider both the

    Installing W

    indows 8 in a n

    tion. A clean iccurs when the installing Widows operatinor when you en. To perform aer without an oputer directly r already has aetup.exe to stsetup.exe from

    share

    use an image

    allation. Perforce an existing files, and setti

    n in-place upgpgrade. You capgrade, the Wgs, applicationnt data before

    ou perform a me files and settuter (destinatio

    the users setti

    a virtualized eion in an earliethis course will

    bility features.ing the applicaor .exe file, andlity tab.

    am Compatibirogram Compa

    on that perfornsider switchine cost of the a

    Windows

    number of diff

    nstallation of e hard disk to ndows contain

    ng system erase the disk pa clean installaoperating systfrom the DVD

    an operating tart the installam the followin

    to perform a c

    rm an upgradeversion of Wi

    ngs.

    grade to Windan run setup.e

    Windows 8 instas, and other co

    e performing a

    migration whetings from youon computer).

    ings and data

    environment. Ifer version of Wl provide more

    You can mitigation in compad then applyin

    lity Wizard to atibility Wizard

    ms the same bg to the comppplication and

    8

    ferent

    ns no

    prior ation tem, D. If

    ation. ng sources:

    clean installati

    e, which also isndows with W

    ows 8, run theexe from the pallation prograonfiguration inan upgrade.

    n you have a cur old operatinPerform a mig

    f all other metWindows usinge details about

    gate applicatioatibility mode

    ng Windows V

    assist in configd is in Control

    business functipatible applicad the cost of em

    on.

    s known as anWindows 8 and

    e Windows 8 inroduct DVD oam retains all unformation au

    computer alreang system (sougration by doi

    thods are unavg virtualizationt Hyper-V.

    on issues, such . You can acceista or Window

    guring an appPanel, under

    ion. If anotheration. When usmployee supp

    n in-place upgr you need to r

    nstallation pror from a netwouser settings, d

    utomatically. A

    ady running Wrce computer)ng the followi

    vailable, you m tools such as

    as operating-ess this mode bws XP compat

    plications Programs and

    r compatible sing this approport and trainin

    rade, when yoretain all user

    ogram (setup.eork share. Durdata, hardware

    Always back up

    Windows 7, and) to the Windong:

    may

    by ibility

    oach, ng.

    u

    exe), ring e

    p all of

    d ows 8-

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDConfiguring Windows 8 1-13

    o Perform a clean installation

    o Reinstall the applications

    o Restore the users settings and data

    There are two migration scenarios: side-by-side, and wipe and load. In side-by-side migration, the source computer and the destination computer are two different computers. In wipe and load migration, the target computer and the source computer are the same. To perform wipe-and-load migration, you perform a clean installation of Windows 8 on a computer that already has an operating system, by running the Windows 8 installation program, and then selecting Custom (advanced).

    Automated installation. You perform an automated installation when you use one of the above methods of installation in combination with an automation tool, to make the installation more seamless, or to remove repetitive tasks from the installation process.

    Automated installations can take many forms, including pushing precreated images to computers, using an enterprise-level tool such as the Microsoft Deployment Toolkit (MDT), Windows Deployment Services (WDS) and the Windows Assessment and Deployment Kit, or even by creating an answer file manually to provide information directly to the installation process.

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITED1-14 Installing

    Lesson 3Installi

    Althbasecombest

    ThisyouWin

    LesAfte

    Dis

    A clsiminstin thnew

    Me

    Youby rnetwinst

    RunDVInstwayfollo

    1.

    and Deploying Wind

    3 ing Winhough you caned nature of th

    mputerremait implement th

    s lesson will he can impleme

    ndows 8.

    sson Objecer completing

    Decide when

    Explain the m

    Describe Win

    Explain comm

    scussion: D

    ean installatiople installationallation involvhe installation

    w, default insta

    Question: Wclean installat

    ethods for

    u can perform running setup.work share. Yoallation by dep

    nning WindVD

    alling from they to install Winowing steps:

    Insert the Win

    dows 8

    ndows 8n perform Winhe installation in consistent, rhat method a

    elp you analyzent those meth

    ctives this lesson, yo

    to perform a

    methods that yo

    dows To Go.

    mon installatio

    Deciding W

    on is the most sn method for Wes the least nuprocess, and illation of Wind

    hen do you tytion of Window

    r Performin

    a clean installaexe from the D

    ou also can perploying an ima

    dows 8 Insta

    e product DVDndows 8, and in

    ndows 8 DVD.

    8 dows 8 installaprocess and t

    regardless of tre important p

    e the reasons bods, and intro

    ou will be able

    clean installati

    ou can use to

    n errors.

    When to Pe

    straightforwarWindows 8. A cumber of variait also results idows 8.

    ypically performws?

    ng a Clean

    ation of WindoDVD or from arform a clean age.

    allation from

    D is the simplencludes the

    ation by usinghe desired reshe method. Departs of the pla

    behind using cduce the Wind

    to:

    ion of Window

    perform a clea

    erform a C

    rd and clean bles n a

    m a

    n Installatio

    ows 8 a

    m

    est

    a number of sulta properetermining whanning proces

    certain methodows To Go m

    ws 8.

    an installation

    Clean Insta

    on

    different methly functioning hich method toss for a Window

    ds, help you tomethod, which

    .

    allation

    hods, the imagWindows 8

    o use and howws 8 installatio

    o understand is new in

    ge-

    w to on.

    how

  • MCT U

    SE ON

    LY. STUD

    ENT U

    SE PROH

    IBITEDConfiguring Windows 8 1-15

    2. If your computer does not currently have an operating system, start the computer by using the product DVD. If your computer already has an operating system, you also can start the computer with the old operating system, and then run the Windows 8 installation from the product DVD on that operating system.

    3. Complete the wizard.

    Running Windows 8 Installation from a Network Share Instead of a DVD, you can store the Windows 8 installation files in a network share. Generally, the network source is a shared folder on a file server. Perform the following steps to install Windows 8 from a network share:

    1. If your computer does not currently have an operating system, start the computer by using the Windows Preinstallation Environment (Windows PE). You can start Windows PE from bootab