microsoft ® official course module 11 configuring mobile computing and remote access
TRANSCRIPT
Module Overview
Configuring Mobile Computers and Device Settings
Configuring VPN Access
Configuring Remote Desktop and Remote Assistance•Overview of DirectAccess
Lesson 1: Configuring Mobile Computers and Device Settings
Discussion: Types of Mobile Computers and Devices
Tools for Configuring Mobile Computers and Device Settings
What Are Mobile Device Sync Partnerships?
Power Plans and Power-Saving Options•Demonstration: Configuring Power Plans
Discussion: Types of Mobile Computers and Devices
•How do mobile computers differ from desktops?•What are key end-user needs that mobile computers resolve?
Tools for Configuring Mobile Computers and Device Settings
Tool Features
Power Options• Battery meter• Power plans
Windows Mobility Center
• Key system settings collected in one place • Display brightness, power plan, volume,
wireless networking, external display settings, display orientation, and synchronization status
Windows MobileDevice center
• Synchronize various content including music, video, contacts, calendar events, web browser favorites, and other files between Windows Phone devices and Windows 8
Sync Center• Sync data between desktop computers,
network servers, and mobile devices• Show current status of all sync partnerships
Presentation Settings
• Reconfigure your computer for a presentation• One click changes multiple settings
What Are Mobile Device Sync Partnerships?
Mobile device sync partnerships update information
about the mobile device and the host computer
Desktop
Files sent to mobile device
Mobile
device
Files sent to
desktop
Power Plans and Power-Saving Options
Power plan Description
Power Saver
This plan saves power on a mobile computer by reducing system performance. Its primary purpose is to maximize battery life.
High performance
This plan provides the highest level of performance on a mobile computer by adapting processor speed to your work or activity, and by maximizing system performance.
BalancedThis plan balances energy consumption and system performance by adapting the computer’s processor speed to your activity.
Method for turning a computer on or off
Data storage state
Power
needs
Sleep or Standby System State Saved to Memory Low
Hibernate System State Saved to Disk None
Shut Down All Data Saved to Disk None
Demonstration: Configuring Power Plans
In this demonstration, you will see how to configure a power plan
Lab A: Configuring a Power Plan
•Exercise 1: Creating and Configuring a New Power Plan
Logon InformationVirtual Machines 20687B-LON-DC1
20687B-LON-CL1User Name Adatum\AdamPassword Pa$$w0rd
Estimated Time: 15 minutes
Lab Scenario
Adam is about to take a long trip to visit all of A. Datum’s customers in the United Kingdom. Before he leaves, he would like you to optimize the power consumption on his Windows 8 laptop.
Lab Review
• In the lab, you configured a power plan to optimize the battery life of Adam’s laptop computer. What are the compromises that arise from this?
Lesson 2: Configuring VPN Access
What Is a VPN Connection?
Tunneling Protocols for VPN Connections
VPN Authentication
What Is VPN Reconnect?
Demonstration: Configuring a VPN
What Is the Connection Manager Administration Kit?
Configuring and Distributing a Connection Profile•Demonstration: Creating a Connection Profile
What Is a VPN Connection?
Large Branch Office
Medium Branch Office
Small Branch Office
Home Office with VPN
Client
Remote User with VPN Client
Corporate Headquarters
VPN
VPN Server
VPN Server
VPN Server
VPN Server
A VPN provides a point-to-point connection between components of a private network, through a public network such as the Internet
Tunneling Protocols for VPN Connections
Windows 8 supports four VPN tunneling protocols:
• PPTP
• L2TP/IPsec
• SSTP
• IKEv2
VPN Authentication
When selecting authentication, always choose the strongest and most secure form of authentication supported by all the components within your network infrastructureAvailable methods:• PAP• CHAP• MS-CHAPv2• EAP• Digital certificates
What Is VPN Reconnect?
The VPN Reconnect feature maintains connectivity across network outages
VPN Reconnect:• Provides seamless and consistent VPN connectivity • Uses the IKEv2 technology • Automatically reestablishes VPN connections when
connectivity is available• Maintains the connection if users move between
different networks• Makes the connection status transparent to users
What Is the Connection Manager Administration Kit?
The Connection Manager Administration Kit:• Allows you to customize users’ remote connection
experience by creating predefined connections on remote servers and networks
• Creates an executable file that can be run on a client computer to establish a network connection that you have designed
• Reduces help desk requests related to the configuration of RAS connections
• Assists in problem resolution because the configuration is known
• Reduces the likelihood of user errors when they configure their own connection objects
Configuring and Distributing a Connection Profile
• The CMAK Connection Profile Wizard assists in the process of creating custom connection profiles for users
• Use the CMAK Connection Profile Wizard to configure:
• The target operating system• Support for VPN• Support for dial-up, including the custom phone
book• Proxy • Custom Help file• Custom support information
Demonstration: Creating a Connection Profile
This demonstration shows how to: • Install the CMAK feature• Create a connection profile• Examine the profile
Lab B: Implementing a Virtual Private Network Connection
•Exercise 1: Creating and Testing a VPN Connection
Logon InformationVirtual Machines 20687B-LON-DC1
20687B-LON-CL1User Name Adatum\Administrator Password Pa$$w0rd
Estimated Time: 30 minutes
Lab Scenario
Adam’s sales trip starts next week. He is keen to be able to access corporate data files while he is on the road. You decide to create a VPN on his laptop computer to facilitate this requirement.
Lab Review
•You created and test a VPN connection in the lab. When you are configuring the client-side of a VPN connection, what should factors do you need to consider?
Lesson 3: Configuring Remote Desktop and Remote Assistance
What Are Remote Desktop and Remote Assistance?
Configuring Remote Desktop•Demonstration: Configuring Remote Assistance
What Are Remote Desktop and Remote Assistance?
Remote Desktop Remote Assistance• A Windows 8 feature that enables users to connect to their desktop computer from another device
• Enables administrators to connect to multiple remote servers for administrative purposes
• A Windows 8 feature that enables support staff to connect to a remote desktop computer
• Optionally allows for remote control of that computer
• Enables the seeking or offering of assistance
Configuring Remote Desktop
Configuring Remote Desktop includes setting it up on the remote computer and the host
computer Host Computer• Launch the Remote Desktop
Connection• Choose Options to see the
Remote Desktop configuration settings
• On the General Tab, enter the remote computer’s name and your authentication credentials
• Save your Connection Settings
• Select preferences on the remaining tabs
Remote Computer• Open the System Window• Select Remote Settings• In the System Properties
Window confirm Allow Remote Assistance selected
• Under Remote Desktop select or add the users who can connect to this computer
Demonstration: Configuring Remote Assistance
In this demonstration, you will see how to:
• Request Remote Assistance
• Configure Windows Firewall to Enable Remote Administration
• Provide Remote Assistance
Lab C: Implementing Remote Desktop
•Exercise 1: Configuring a Remote Desktop Connection
Logon InformationVirtual Machines 20687B-LON-DC1
20687B-LON-CL120687B-LON-CL2
User Names Adatum\Administrator and Adatum\Adam
Password Pa$$w0rd
Estimated Time: 15 minutes
Lab Scenario
Adam has a desktop computer in his office in London that he may wish to use while he travels around the UK between his customers.
Lab Review
In the lab, you enabled the Remote Desktop feature through the firewall by editing the local firewall settings. Is there an alternative way in which you can make this change?
In the lab, you configured Remote Desktop. In what circumstances can you envision using Remote Desktop to troubleshoot a user’s computer?• If attempting to connect to a remote computer with Remote Desktop from an Internet-connected computer, what other possible configuration changes might you need to make?
Lesson 4: Overview of DirectAccess
Discussion: Complexities of Managing VPNs
What Is DirectAccess?
Components of DirectAccess
What Is the Name Resolution Policy Table?
How DirectAccess Works for Internal Clients
How DirectAccess Works for External Clients•Configuring DirectAccess
What Is DirectAccess?
Features of DirectAccess:
• Connects automatically to corporate network over the public network
• Uses various protocols, including HTTPS, to establish IPv6 connectivity
• Supports selected server access and IPsec authentication• Supports end-to-end authentication and encryption• Supports management of remote client computers• Allows remote users to connect directly to intranet servers
DirectAccess enables seamless remote access to intranet resources without first establishing a VPN connection
Components of DirectAccess
Internet websites
DirectAccess server
AD DS domain controller
DNS server
Internal network resources Network location
server
PKI deployment
IPv6/IPsec
External clients
NRPT/ Consec
Internal clients
What Is the Name Resolution Policy Table?
NRPT is a table that defines DNS servers for different namespaces and corresponding security settings. It is used before the adapter’s DNS settings.
Using NRPT:
• DNS servers can be defined for each DNS namespace rather than for each interface
• DNS queries for specific namespaces can be optionally secured by using IPsec
How DirectAccess Works for Internal Clients
Internet websites
DirectAccess server
Internal clients
AD DS domain controller
DNS server
CRL dist point
Network location server
Consec
NRPT
How DirectAccess Works for External Clients
DirectAccess server
AD DS domain controller
DNS server
Consec
NRPT
External clients
DNS server
Internal network resources
DirectAccess server
AD DS domain controller
DNS server
Consec
NRPT
External clients
DNS server
Internal network resources
Infrastr
ucture
DirectAccess server
AD DS domain controller
DNS server
Consec
NRPT
External clients
DNS server
Internal network resources
Infrastr
ucture
Intranet
DirectAccess server
AD DS domain controller
DNS server
Consec
NRPT
External clients
DNS server
Internal network resources
Internet websites
In
frastructure
Intranet
Configuring DirectAccess
1. Configure the AD DS domain controller and DNS
2. Optionally, configure the PKI environment
3. Configure the DirectAccess server
4. Configure the DirectAccess clients and verify
DirectAccess functionality