All Modules PDF
All Modules PDF
All Modules PDF
Section Objectives
Explain the differences between Windows Vista and Windows 7 display driver
technologies
Explain how to configure the Start menu and taskbar settings
Explain how to personalize the Windows 7 desktop to your requirements
Describe the Windows Aero graphics package
List the hardware and software requirements of the Windows Aero graphics package
Section Overview
This section deals with the array of tools available for the users and administrators to personalize
their desktops. Desktop personalization allows users to make changes to their desktop
environment such as screen colors, screen savers, and taskbar settings. This section describes the
Personalization center and other tools available to accomplish these goals.
Note
The features shown throughout this course are based on the
Windows 7 Ultimate edition.
4-2
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 provides the next generation of display capability for its users. With Windows Vista,
Microsoft included the WDDM 1.0. The Desktop Window Manager required this to fully and
neatly render both requested graphics and the Aero package. With Windows 7, Microsoft
completely reworked the WDDM (Windows Display Driver Model). The new version, WDDM
1.1, works directly with DirectX 10, as opposed to the Windows Vista DirectX 9.0, and offers
many important performance enhancements. The most prominent development with the WDDM
1.1 and DirectX 10 partnership is that Windows 7 now uses a consistent amount of memory, no
matter how many applications it needs to run. In contrast, Windows Vista required an incremental
increase in memory usage for each new opened application. The WDDM 1.0 used in Windows
Vista is much less efficient than the new WDDM 1.1 used in Windows 7. As you open more GDI-
based applications with Windows Vista, you experience memory usage issues. The more GDI-
based applications you open, the more memory is allocated to the process. This is a major
limitation of WDDM 1.0. With WDDM 1.1, Windows 7 uses memory more consistently
throughout the application-rendering process.
Windows 7 also uses the new Direct2D, which is a replacement or advancement for GDI.
Direct2D aids in the rendering of 2D images such as lines and simple shapes. Direct2D runs in
conjunction with Direct3D 10 and requires the presence of the WDDM 1.1 drivers. This
partnership and development provides a much quicker responding desktop and Windows
experience.
Figure 93 lists the subjects that are described in this topic.
The new WDDM 1.1 driver set performs well on memory-starved computers. Windows Vista and
WDDM 1.0 can bring a computer with a small amount of RAM to a standstill. WDDM 1.1 is
definitely much more memory friendly; however, there is a tradeoff. WDDM 1.1 stresses the CPU
more than its predecessor, WDDM 1.0, does. After strenuous testing, though, it is easily seen that
even with the increased CPU load that Windows 7 computers may experience, the benefits
provided by the better memory usage far outweigh the negatives in performance at the processor
level.
Helpful Hint
Now with the availability of multi-core processors, the CPU impact is
virtually unnoticeable, even with powerful benchmarking software.
The new WDDM 1.1 driver set also allows graphic processing at the
core level; meaning that with multi-core processors, each core can
simultaneously render instructions from the GPU. With the Windows
Vista WDDM, this was not possible. Core 0 was the only core that
would render instructions from a GPU. If that core was currently busy
processing other threads, the GDI application would simply wait. When
opening applications, the user experiences lag times in seconds. This
is called GDI global lock (also described as a bottleneck.)
4-4
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
In Windows Vista, if a GDI application is currently rendering a 3 MB file, that information exists
in two locations: within the graphics memory location on the GPU and within system memory. In
theory, if the GPU was busy, the CPU could take over and render the image. The net effect of this
process was a duplication and depletion of memory resources. Microsoft drastically changed this
memory allocation principle for Windows 7.
Figure 96 shows how Windows 7 allocates memory for graphics rendering. As you can see, the
WDDM 1.1 driver set no longer calls for system memory to create a duplicate data store. Instead,
the GPU renders a simple application window on the graphics controller card. This drastically
reduces memory usage across all applications as they render new windows. Advanced Windows
Vista users immediately notice the results of this when they attempt to execute some of their
routine functions on their newer Windows 7 counterparts. The operations that render Windows
happen with ease resulting in smoother opening and closing of windows.
GDI global lock is a serious situation that is experienced within Windows Vista as GDI
applications compete for the attention of the GPU. As multiple GDI-based applications attempt to
render windows, the GDI applications stack prevents or locks out other GDI applications from
writing their windows to the GPU. When one GDI process is complete, the GDI driver stack
allows the next GDI application to begin its rendering process. GDI global lock is a bottleneck and
as such slows down the overall performance of the Windows Vista video performance. This
presents a major issue for the 4.3 aspect ratio scaling with projectors used in presentation mode on
Windows Vista computers. This GDI global lock phenomenon, along with the duplication of
memory described earlier, is a major issue with Windows Vista.
Helpful Hint
Power users who routinely use projectors with 4.3 aspect ratios
immediately notice that the scaling issues of the past have vanished.
Pressing the WIN+P keys opens the new presentation settings.
4-6
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
The improvements to the GDI Scheduler are responsible for the performance improvements in the
WDDM 1.1 driver set. This new scheduler allows all CPU cores to render graphics instructions; it
also allows each GDI application to request CPU attention and to write its windows to support the
application. The bottleneck disappears, the single core processing restriction disappears, and the
windows rendering process performs much better. The performance gain is especially noticeable
to graphics professionals, gamers, and hardcore data processors. Even home users that use the
World Wide Web notice the process is much more efficient. They perceive this as an increase in
their Internet speed at the ISP, although it is really a Windows 7 performance increase.
As shown in Figure 98, the GDI global lock has disappeared from the picture. This simply means
that the GPU Scheduler can now schedule graphics instructions to all cores simultaneously. This
dramatically improves the overall performance of the Windows 7 desktop experience.
Helpful Hint
DirectX 11 supports tessellation, which is a huge advancement in
graphics rendering. With tessellation, large graphic webs are broken
down into smaller, more manageable chunks. This allows for much
better rendering times and shading across all pixels. Full tessellation
requires specific hardware that is not currently on the market. ATI
Technologies has several cards that support a simple tessellation
process; however, they are not capable of full tessellation. Windows 7
already supports full tessellation, so it will be ready when the hardware
is available.
For the average user, there is not a significant difference between the Windows Vista and the
Windows 7 desktop experience. However, some noticeable additions, omissions, enhancements,
and outright changes do exist. Once a user becomes familiar with these changes, Windows will
become even easier to work with.
Figure 99 lists the subjects that are described in this topic.
4-8
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Taskbar Tab
Using the Taskbar tab of the Taskbar and Start Menu Properties dialog box, you can change the
position of the taskbar to the bottom, top, left, or right of the desktop. You can customize the look
and interaction of the taskbar buttons and customize the notification area. One new Aero Graphics
feature that you can manipulate here is the Aero Peek feature. Using Aero Peek, you can quickly
look at the desktop when it is hidden by open windows.
As you begin to customize your user interface to meet your needs, one of the first things you
might notice is that on the Start Menu tab of the Taskbar and the Start Menu Properties dialog
box, the Classic Start Menu option is no longer available. You now have only the configuration
options for the Windows 7 Start menu. The Start Menu tab also provides basic customization for
the Power button and privacy settings for the display of previously used applications.
4-10
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Customizing the Windows 7 User Interface
Users can further customize the Start menu in many different ways, such as: turning on or off
links to certain tools and utilities, enabling a large or small icon view, and enabling links as sub-
menus or to open new windows.
Desktop Personalization
Windows 7 provides many enhanced ways to personalize your desktop environment. A right-click
on the desktop displays the Personalization option, which opens the Personalization section of the
Appearance and Personalization category of Control Panel.
Figure 103 lists the Personalization features that are described in this topic.
4-12
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Desktop Themes
As in older versions of Windows, you have the ability to change the desktop themes. If Windows
Aero is available, you also have the opportunity to use one of several new (depending on the
Windows 7 edition) Aero desktops: Windows 7, Architecture, Characters, Landscapes,
Nature, Scenes, and United States (depending on the MUI chosen). Depending on the edition,
you may also have the choice of several basic and high-contrast themes.
Keep in mind that Windows Aero does not function within a virtual environment.
Helpful Hint
You can have your desktop theme change routinely by adjusting the
Slide Show Settings from the Personalization menu.
Note the links in the left pane and along the bottom of the Personalization window in Figure 104.
These links provide access to several dialog boxes that enable you to further personalize your
Windows 7 desktop.
Desktop Icons
Clicking the Change desktop icons link in the left pane of the Personalization window opens the
Desktop Icon Settings dialog box. Here you can choose which icons are visible on the desktop.
You can also change the look and feel of the icons by clicking the Change Icon button. The
Allow themes to change desktop icons check box allows the theme settings you configured on
the Personalization window to manipulate the icons as needed.
Helpful Hint
If you accidentally delete the Recycle Bin, you can quickly come here
and select the Recycle Bin check box to restore it.
4-14
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Desktop Background
The Desktop Background link at the bottom of the Personalization window opens to the Desktop
Background window you see in Figure 106. Using this window, you can choose an individual
background without choosing an entire theme. You can also choose several backgrounds and
configure them to display as a slide show based on a time interval that meets your needs or
desires. For example, you can configure a new background to display every 30 minutes (default)
or as frequently as every 10 seconds. The Shuffle check box at the bottom of the screen tells
Windows 7 to shuffle the backgrounds so that the desktop background choices display in a random
order. You can pull backgrounds from your Windows libraries and the Pictures library. You can
also use solid colors as your desktop background.
The Windows Color link at the bottom of the Personalization window opens the Window Color
and Appearance window. Here, you can change the color of your window borders. You can also
adjust the transparency settings here, which is an Aero feature. Using the Color intensity slide bar
under the Enable transparency check box, you can adjust the transparency of the window border.
With the color mixer, you can select custom colors by adjusting the hue, saturation, and brightness
of the window border color that is currently selected.
Clicking the Advanced appearance settings link opens the Window Color and Appearance
dialog box, which should be familiar from earlier versions of Windows. If Windows 7 Aero is
disabled, you can enable it by choosing the appropriate theme here. You can also do this from the
root of the Personalization category in Control Panel.
Note
The transparency settings are not available if Windows Aero is not
available or enabled, or if the Windows 7 installation is running in the
virtual environment.
4-16
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Sounds
The Sounds link in the Personalization window opens the Sound dialog box as shown in Figure
108. Here you can customize individual sounds, or you can choose an overall sound scheme.
Sound schemes are the sounds that are played when certain events happen during the use of a
Windows 7 computer. Each version of Windows 7 comes with a number of sound schemes.
Windows 7 Ultimate contains approximately 20 individual options with names such as Garden,
Festival, and Calligraphy.
Screen Saver
The final link at the bottom of the Personalization window is the Screen Saver link. This link
opens the Screen Saver Settings dialog box shown in Figure 109. One noticeable change from
previous versions of Windows is the ability to enable a password on resume even if the screen
saver is not configured. To configure this setting, select the On Resume, display logon screen
check box. This automatically locks the desktop and makes it accessible only with a user name
and a password. Using the Wait field, you can configure how much time must elapse without
activity for the screen saver to become active. The default is one (1) minute. From the Screen
saver drop-down list, you can select which screen saver you want to use.
4-18
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Screen Resolution
The Screen Resolution tool provides the settings for screen size, color depth, and multiple monitor
configurations. To access the Screen Resolution dialog box, right-click the desktop background
and select the Screen Resolution option.
Windows 7 has two views that the users can choose to interact with: the Basic view and the
Windows Aero graphics view. These views are dependent on the hardware limitations within the
system. Following is a description of the Windows 7 Basic view and the Aero graphics views
along with the Windows 7 Aero interface requirements and features.
The Basic view is the default view when the Aero interface is not present, or when the Windows 7
computer does not support Aero due to hardware limitations. The Basic view, as the name implies,
is the Windows view without the transparent boundaries around the windows. The taskbar carries
the same options and features as the Aero view, but it is also not transparent.
The Classic view is even more rudimentary and continues the look and feel of the Windows XP
operating system. In Classic view, the Start button is the most noticeable change. It is similar to
the Start button in Windows XP, with the simple name Start driving the users attention. The
Classic view is carried throughout the entire operating system; Control Panel looks different, as do
the Control Panel style windows and MMC style windows.
4-20
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Aero
If your computer meets the Windows Aero requirements, you can change the look and feel of the
basic interface with the Windows Aero features. Choosing a Windows Aero theme from the
Personalization category of Control Panel immediately activates Windows Aero. The overall
appearance and use of the Windows 7 operating system changes with Windows Aero enabled:
Helpful Hint
Did you know that the Windows transparency feature actually serves a
purpose other than looks? Power users who multitask with multiple
windows open sometimes experience headaches because of the way
the eye focuses on the windows borders while the user is attempting
to focus on the data within the window. The transparency feature
prevents this phenomenon from happening.
A computer system must meet specific hardware and software requirements before the Windows
Aero experience is made available. Following is a description of those hardware and software
requirements.
Hardware Requirements
The Aero package is quite strict about the hardware it takes to operate the Aero features. Figure
115 lists the minimum hardware requirements for the Aero graphics package. Most computers
purchased these days exceed these requirements.
Helpful Hint
Ensure that the hardware you choose is on the approved Aero
graphics card list. Just because the card you choose has 128 MB
of onboard memory does not mean that it supports the WDDM 1.1
driver set.
4-22
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Microsoft further recommends that you match the optimum monitor resolutions and refresh rates
with the appropriate amount of RAM. This helps you achieve optimal resolutions and, in essence,
optimal Windows Aero functionality.
Software Requirements
Figure 117 lists the software requirements for Windows Aero. WDDM version 1.1, Pixel Shader
2.0, DirectX 10, Direct2D, and Direct3D are necessary for Aero to perform correctly. These
software packages and the new driver set ensure that Windows 7 Aero uses less memory and
resources than its Windows Vista predecessor, while at the same time providing a smoother
interface when using a computer running Windows 7.
Windows 7 Aero is not supported in Windows 7 Starter or Home Basic editions. These editions
use the Basic view.
Windows Aero is full of features to make the user experience more enjoyable and productive.
Once viewed as superficially attractive, these features are now seen as valuable assets to the user.
Anyone who has used the Aero package for any length of time fully recognizes that the tools are
useful for everyday work.
4-24
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows Flip 3D
Windows Flip 3D presents open windows to the user in a virtual rotary mechanism. Pressing the
WIN and TAB keys simultaneously activates Flip 3D. Pressing the TAB key cycles you through
the open windows in the order they are displayed.
The Windows Aero Filmstrip presents minimized windows in a different and less dramatic way.
Pressing the ALT and TAB keys together displays a filmstrip with miniaturized views of the
contents of your currently open applications. Pressing the TAB key switches to the next
minimized window. Windows 7 also incorporates the functionality of Windows Peek into Aero
Filmstrip. As you mouse over a minimized window, other windows become transparent so that
you can see the window the mouse is hovering over. This new feature is a welcome enhancement
to the Aero Filmstrip.
Windows Aero Peek is new to the Windows 7 Aero graphics package. The Show Desktop button
is actually a rectangle at the extreme right end of the Windows taskbar. Clicking this button
minimizes all the windows on the desktop. Hovering the mouse over the Show Desktop button
makes all of the open windows completely transparent, allowing you to view the desktop without
minimizing the windows. When you move your mouse pointer off the Show Desktop button, the
windows return to their previous states. The Windows Aero Peek feature is also a part of the
ALT+TAB keyboard functionality.
4-26
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Aero Peek is enabled within the Taskbar and Start Menu Properties dialog box. Right-click the
Start button, select Properties, and then click the Taskbar tab. The Aero Peek configuration is at
the bottom of the dialog box as shown in Figure 123. Select the Use Aero Peek to preview the
desktop check box to enable Aero Peek.
Before Windows Aero Peek, simultaneously utilizing many open windows presented you with a
cluttered, messy desktop.
Using Aero Peek, you can see behind all the windows and minimize the clutter. With Aero
Peek applied, only the outlines of the windows are visible, but the Windows desktop is now
visible as well.
4-28
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Aero Peek also works by hovering the mouse over the icons of running applications on the
taskbar. This displays a thumbnail preview of the running applications. Hovering the mouse over
one of the thumbnails makes the other open windows transparent and the minimized window
shows on the desktop for a quick look at the fully maximized window.
Aero Shake
Another new Aero feature for Windows 7 is Aero Shake. When you left-click and hold on a
window border, and then shake the window back and forth, all other open windows minimize,
leaving only the shaken window in view. This drastically reduces the time it takes to minimize
multiple windows as compared to clicking the Minimize (-) button individually for each open
window.
As shown in Figure 128, the Calculator utility is the only utility left open. The others are
minimized and anchored to the taskbar.
4-30
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Aero Snap
Aero Snap is another new feature of the Windows 7 Aero package. If you have ever tried to use
two open windows together (for example, to compare two documents or to drag an item from one
window into another), you understand how tedious it is to size and position the windows to work
the way you need them to. Aero Snap allows you to easily align a window to either side of the
desktop so that you can see both of them simultaneously. To activate Aero Snap, simply drag one
window over to the left side of the desktop; the window snaps into perfect alignment with the left
half of the desktop. Then drag the second window to the right; it snaps to the right half of the
desktop.
Figure 130 shows the results of Aero Snap: two windows perfectly aligned to the left and right in a
fraction of the time.
4-32
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Acronyms
The following acronyms are used in this section:
2D two-dimensional
3D three dimensional
CPU central processing unit
GB gigabyte
GDI Graphics Device Interface
GHz gigahertz
GPU graphics processing unit
ISP Internet service provider
MB megabyte
MMC Microsoft Management Console
MUI Multilingual User Interface
RAM random access memory
WDDM Windows Display Driver Model
Section Review
Summary
The WDDM 1.1 is a drastic improvement over the WDDM 1.0 used with Windows
Vista. The following table lists some of the differences between the two:
On the Taskbar tab of the Taskbar and Start Menu Properties dialog box, you can
change the appearance of the taskbar, position of the taskbar on the desktop, customize
which buttons appear in the notification area, and enable the Aero Peek feature.
On the Start Menu tab of the Taskbar and Start Menu Properties dialog box, you can
customize the behavior of items in the Start menu and the Power button.
The Personalization window provides access to many options you can use to
personalize the desktop:
Themes: Choose from various desktop themes that include settings for
backgrounds, windows colors, and sounds, including, if it is available, the
Windows Aero desktop themes.
Desktop Icons: Click the Change desktop icons link to choose which of the main
icons are visible on the desktop, how the icons look, and whether themes make
changes to these icons.
Desktop Background: Click the Desktop Background link to choose a graphic
or color to display as the background on the computer screen. You can also group
graphics or colors together to display as a slide show on the desktop.
Window Color and Appearance: Click the Window Color link to change the
color and transparency (only available with Windows Aero) of window borders.
Sounds: Click the Sounds link to customize or disable the individual sounds or
sound schemes played when events happen during the use of the computer.
4-34
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Screen Savers: Click the Screen Saver link to customize the screen savers and
enable a password on resume even if the screen saver is not configured.
Screen Resolution: Configure the screen size as well as the color depth and
settings for multiple monitors.
Windows Aero is an enhanced viewing experience that builds on the Windows Flip
and Aero Filmstrip features present in Windows Vista. Windows Aero is only available
on systems that meet the hardware and software requirements.
Hardware requirements for Windows Aero are listed in the following table:
Hardware Requirement
Processor 1 GHz, for both 32-bit (x86) 64-bit (x64)
RAM 1 GB
Graphics card 128-MB dedicated graphics card from the Aero approved list
Figure 132: Windows Aero Hardware Requirements
Windows Aero also requires the Pixel Shader 2.0, DirectX 10, Direct2D, and
Direct3D software packages and the WDDM 1.1, driver set to run.
The Windows Aero carryovers from Windows Vista are:
o Windows Flip: Rotate through a virtual stack of the open windows on your
desktop using the WIN+TAB keys.
o Aero Filmstrip: Display miniaturized views of the open windows in a
filmstrip using the ALT+TAB keys.
The new Windows Aero features for Windows 7 are:
o Aero Peek: Make all open windows transparent so you can see the desktop by
hovering over the Show Desktop button.
o Aero Shake: Quickly minimize all open windows on the desktop but the one
you want to focus on by shaking the selected window pane.
o Aero Snap: Arrange windows side-by-side by dragging one window to the
left side of the screen and the other window to the right side of the screen.
Knowledge Check
1. Which of the following graphics features are required for Windows Aero to function? (Choose all
that apply.)
a. DirectX 10 or higher
b. WDDM 1.1
c. Direct 3D
d. Pixel Shader 2.0
2. How do you activate Windows Flip 3D?
a. ALT+F7
b. CTRL+A
c. ALT+TAB
d. WIN+TAB
3. What advantage does WDDM 1.1 partnered with DirectX 10 provide for Windows 7 over
WDDM 1.0 used in Windows Vista?
4. The WDDM Driver 1.1 conserves memory by eliminating duplicate RAM usage.
a. True
b. False
5. Which Windows Aero feature would you use to compare two open documents side-by-side on
your desktop?
a. Windows Flip
b. Aero Peek
c. Aero Snap
d. Aero Shake
e. Aero Filmstrip
6. Which link in the Personalization window would you click to restore the Recycle Bin to the
desktop if it was accidentally deleted?
a. Change desktop icons
b. Desktop background
c. Screen Saver
d. Sounds
7. What types of changes can you make to the taskbar?
4-36
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Customizing the Windows 7 User Interface
4-38
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
7
Windows 7 Networking
Section Topics
TCP/IP Fundamentals
Next Generation TCP/IP Stack
Dynamic Host Configuration Protocols
Network and Sharing Center
BranchCache
Windows 7 Networking
Section Objectives
Section Overview
Computer networking involves the ability to share, manipulate, and collaborate on data. The
network is the single tool that can make a business extremely productive and, hopefully,
profitable. One of the most important duties of the Windows 7 administrator is to constantly make
sure that his or her network is up and functioning properly. Successful system administrators
understand general networking concepts. This section introduces the Windows 7 networking
technologies as well as networking in general. By applying this information, you can successfully
manage and monitor your networks so that your networks can operate smoothly and efficiently.
7-2
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
TCP/IP Fundamentals
TCP/IP is a suite of protocols. In the early 1970s, TCP/IP started as a very simple protocol suite. It
has since grown into something much more capable and complex. TCP/IP is implemented as a set
of layers. The four layers in the TCP/IP model are derived from a seven-layer model known as the
OSI model. Because the OSI model is just that, a model, the TCP/IP protocol suite does not have
to fit the OSI mold completely. The OSI model is simply a reference on which most technologies
today are based.
Figure 197 lists the subjects that are described in this topic.
Windows 7 Networking
TCP/IP is the most widely used protocol suite today. The future of the Internet is tied to TCP/IP.
In fact, the Internet as it is known today began as the ARPANET, a network commissioned by the
Defense Department as a resilient form of communication in the event of some natural or man-
made calamity (such as a nuclear attack).
In the beginning, the ARPANET was owned by the military and its contractors. That grew to
include universities working on military projects and certain government institutions. Over time,
the military relied less and less on the ARPANET as a secure means of communication. In the
early 1990s, they released it to the public as the Internet.
For years, the core technology of the ARPANET was the TCP/IP protocol. TCP/IP addressing and
routing gave the network its fault tolerance. TCP/IP, ever evolving, gained more and more
capabilities. New protocols, network types, and services are always being integrated into it and
added on top of it. Without TCP/IP and its potential for growth, the robust and resilient network of
the Internet would not exist.
7-4
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Network Architecture
The network architecture in Windows Server 2008 R2 changed to reflect a new emphasis on
speed, security, and the tight integration of IPv6. Even with these enhancements, the core of the
networking architecture still conforms to the seven-layer OSI model. The following topic
describes the layers of the new Windows TCP/IP stack.
Application layer: This is the layer where the Winsock, NetBIOS, and the WSK APIs
are implemented. Programmers write their applications to the appropriate API, and the
requests are translated and sent down the protocol stack. WSK is the new Winsock
Kernel NPI. It replaces the aging TDI that is still implemented for backward
compatibility.
Transport layer: This layer contains the TCP and UDP protocols along with raw
mode for transmitting packets that do not need either TCP or UDP.
Network layer: Sometimes known as the Internet layer, this is where the IPv4 and
IPv6 live side-by-side and run simultaneously. These protocols most importantly deal
with routing information from one network to another.
Framing layer: Also known as the data-link or physical layer, this is the layer where
data coming from IPv4 and IPv6 is placed into the appropriate framing structure for the
medium being used.
Windows 7 Networking
IPv4 Addressing
Providing addressing and routing capabilities is one of the primary functions of TCP/IP. Every
computer that communicates directly with another computer over the Internet must have a unique
IP address.
The identifier given to each host is called an IP address. This address follows a 32-bit binary form
that is converted into a decimal value for human readability:
10000010.00000001.00000011.00000110 = 130.1.3.6
You can compare the IP address to a home address. Your country, zip code, and street number tell
the post office how to get mail to you. With TCP/IP, each router on the network breaks down and
analyzes the IP address components and then forwards the information to the appropriate
destination until the message reaches the intended recipient.
Figure 200 lists the subjects that are described in this topic.
7-6
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Of the 32 bits that make up the IP address, some are set aside for the network ID and others are
reserved for host IDs on that network.
Either an ISP or the IANA provides the network ID. The host IDs can be freely chosen by the
network administrator from the range available on their network ID.
The address class determines which bits are set aside for the network. Each address class has a
default network mask that defines the network ID portion of the IP address.
Windows 7 Networking
Network Mask
Along with the IP address, another important detail must be provided: the network mask,
sometimes referred to as a subnet mask. Like the IP address, the mask is also a series of 1s and 0s.
The difference is that the mask must have contiguous ones from left to right. Anything else results
in a zero.
11111111.11111111.11111111.00000000 = 255.255.255.0
The mask is used as a filter to pass the IP address through. The filtering process is based on a
binary ANDing routine. With the ANDing routine, any time a 1 and 1 are in the same position, the
resulting binary value is a binary 1. Any other combination always generates a zero.
7-8
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Address Classes
Initially, address classing was intended to allocate the IP addresses available on the Internet in the
most efficient way possible. What it really does is reserve predefined ranges of IP addresses for
large numbers of hosts on a network and reserves others for medium-sized and small-sized
networks.
Class A and B network IDs are completely used up (aside from the occasional ID that is returned
to the pool). A sizable number of Class C networks are still available.
Each of the A, B, and C classes has a default network mask associated with it:
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
It is up to the network administrator to subdivide the network further, if necessary, by creating a
subnet mask beyond the default network mask.
Windows 7 Networking
Private IP Addressing
IANA reserved a subset of the public address space for the purpose of private IP addressing.
Initially designed to promote flexibility in addressing and routing schemes on private networks,
these ranges have the side effect of delaying the transition from our current IPv4 to IPv6.
Many organizations are now using one of the private address ranges to protect their local networks
from intrusion, as well. The private addresses cannot be used on the public Internet as either a
source or destination host. The first router hearing such a message drops it.
A private address that communicates with the outside world must communicate through an
intermediary, such as a NAT or a proxy. These gateways translate the private address into a usable
public IP address before it hits the Internet.
7-10
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Default Gateway
Default gateway configuration is important if a host needs to transmit data beyond its local
network segment. Configuring the default gateway involves finding the IP address of the router
that lets the host send data to other networks.
The default gateway or router setting becomes involved as a direct result of the IP addresses and
network masks being used on the hosts of a network. Any time a TCP/IP host sends a packet on
the network, the local TCP/IP protocol of the host runs the IP address through the network mask.
The result tells IP whether the destination host is local or remote to the sender.
Windows 7 Networking
Configuring the TCP/IP settings for network adapters on Windows 7 is very much the same as it
has been since Windows 2000. The most visible difference is that IPv6 is now installed by default.
The following topics describe how to configure TCP/IP settings using the graphical and
command-line methods.
7-12
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Graphical Configuration
In the Windows GUI, the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box is still the
mainstay of TCP/IP address configuration. To reach this dialog box, click Start, Control Panel,
Network and Internet, Network and Sharing Center, and Manage Network Connections.
Once the general properties dialog box is open, you can dynamically configure the various settings
by choosing the Obtain an IP address automatically option, or manually by changing the
following options:
Windows 7 Networking
Command-Line Configuration
You can also configure TCP/IP details from the command line. This is very important to learn
because there is no way to graphically configure TCP/IP settings on the server core operating
system.
Use the netsh command from the command-line on either the full or core versions of Windows
Server 2008. Use the netsh command to configure IP settings on demand, or with a script for
repetitive operations.
When used on-demand, the Netsh tool has its own console and command structure. The Netsh tool
uses the following top-level commands:
Usage: netsh [-a AliasFile] [-c Context] [-r RemoteDevice] [-u
[DomainName\]UserName] [-p Password | *]
[Command | -f ScriptFile]
7-14
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
lan - Changes to the `netsh lan' context.
nap - Changes to the `netsh nap' context.
netio - Changes to the `netsh netio' context.
p2p - Changes to the `netsh p2p' context.
ras - Changes to the `netsh ras' context.
rpc - Changes to the `netsh rpc' context.
set - Updates configuration settings.
show - Displays information.
winhttp - Changes to the `netsh winhttp' context.
winsock - Changes to the `netsh winsock' context.
wlan - Changes to the `netsh wlan' context.
The following sub-contexts are available:
advfirewall bridge dhcpclient firewall http interface ipsec lan
nap netio p2p ras rpc winhttp winsock wlan
Windows 7 Networking
While creating Windows 7, Microsoft overhauled many different aspects of Windows operating
system and the networking subsystem is no exception. Microsoft integrated many of the latest
Internet RFC standards into the new operating system. Some of these changes are speed and
security enhancements made to existing components; whereas other changes are brand new
features. Some of the new functionality was introduced with Windows Vista.
Figure 210 lists the subjects that are described in this topic.
7-16
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
New Features
The new networking stack in Windows 7 offers many new features, including the following.
Windows 7 Networking
qWAVE Components
qWAVE (Quality Windows Audio-Video Experience) is a collection of components based on QoS
that allow multimedia traffic to be prioritized on wired and wireless networks. The qWAVE
components examine bandwidth and QoS capability to provide consistent usage of the networks
resources.
Networking Enhancements
The improvements in existing network components are almost as profound as the addition of new
features, if not more so. These changes improve the performance, security, and scalability of the
Windows 7 network subsystems. The following topics describe these improvements.
Multiprocessor Scaling
Prior versions of the NDIS architecture limited the processing of traffic from a network card to a
single processor. Now, the NDIS architecture can distribute that traffic across multiple processors
for increased throughput.
7-18
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Compound TCP
Over connections with a higher amount of latency, CTCP (Compound TCP) increases the
performance of large file copies by appropriately tuning the TCP window size based on the speed
of the network, the round-trip time, and the size of the data that needs transmitting.
ECN Support
ECN (Explicit Congestion Notification) allows routers to explicitly inform hosts of congestion by
marking packets as they are forwarded. Without ECN, hosts drop their transmission rate whenever
packets are lost, even if the problem is not due to congestion.
Routing Improvements
Detection of an unreachable neighbor goes further than dead gateway detection in discovering that
a router is no longer available and looking for a new gateway. Previously only a feature of IPv6,
this is now extended to IPv4.
Failback support allows systems that have switched to a different gateway to switch back when the
original router comes back online.
Windows 7 Networking
IPv6 Protocol
IPv6 is an update to the TCP/IP protocol that drastically changes the way addresses are assigned
on networks. It is based on a 128-bit addressing scheme instead of 32 bits like the current IPv4
addressing scheme. The following topics describe the attributes of IPv6.
Better Routing
The large size of the IPv6 address pool can be subdivided into hierarchical routing domains that
reflect the topology of the modern-day Internet. The use of 128 bits provides multiple levels of
hierarchy and flexibility in designing hierarchical addressing and routing that is lacking on the
IPv4-based Internet.
Enhanced Security
Instead of just being an add-on technology as it is with IPv4, IPSec is now a protocol requirement
in IPv6.
7-20
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Mobile IPv6
Using mobile IPv6, clients can move around from location to location without the worry of being
disconnected. A permanent address is assigned to the node to so it can be found regardless of the
network it is on.
IPv6 Enhancements
Although IPv6 is tightly integrated into the Windows 7 operating system, support for the protocol
is not new. Windows XP and Windows Server 2003 both used IPv6 for some time now, but users
had to install and enable it. Since this more rudimentary implementation, numerous improvements
have been made:
LLMNR: LLMNR (Link-Local Multicast Name Resolution) allows both IPv4 and
IPv6 clients to discover each others names without a DNS server present.
Support for ipv6-literal.net names: This special zone format allows applications that
do not support IPv6 addresses to use the addresses through a standard DNS name. As
an example:
For the IPv6 address:
2002:ec8:28:3:f98a:5b31:6700:67aa
The corresponding ipv6-literal.net name is:
2002-ec8-28-3-f98a-5b31-6700-67aa.ipv6-literal.net
RRAS support for IPv6 over PPP: The Windows 7 and Windows Server 2008 RRAS
services now allow PPP connections to use IPv6 through the server.
Reduced address scanning vulnerabilities: Windows 7 and Windows Server 2008
now generate random interface IDs for non-temporary auto-configured IPv6 addresses,
including public and link-local addresses. This reduces the vulnerabilities present when
the known manufacturer ID of an interface is used.
Support for DHCPv6: The IPv6 client in Windows Server 2008 and Windows 7 are
now DHCPv6 capable.
The Windows Vista and Windows 7 operating systems bring a new network mapping feature that
uses two base protocols: LLTDM (Link-Layer Topology Discovery Mapper) and LLTDR (Link-
Layer Topology Discovery Responder). These protocols are advancements from the old master
browser NetBIOS services. They are responsible for discovering networks and also other network
devices capable of speaking the two protocols. Currently, these protocols work only with the
Windows Vista, Windows 7, Windows Server 2008, and Windows Server 2008 R2 product lines.
The Windows Firewall with Advanced Features enables and disables these protocols based on the
rules configured for each network profile or type chosen. For example, network discovery is not
allowed on public network categories.
7-22
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Microsoft has long put enormous effort into making sure that as much backward compatibility
exists in the latest operating system to keep the older applications and services working. This
compatibility comes at the cost of performance, security, and the inclusion of new technologies.
For Windows Vista, Windows 7, and Windows Server 2008, Microsoft discontinued many older
technologies that are very infrequently used today. People who may be upset by this of course
have the option to stay with the older versions of Windows to keep these features.
Figure 216 briefly lists some of the discontinued networking features. Other features and options
that do not relate to networking have also been pulled from the operating system.
DHCP (Dynamic Host Configuration Protocol) is a service that runs on a Windows server and
automatically provides IP addresses to hosts on the network. Automatic address assignment helps
to lighten the load that administrators face when dealing with the addressing of computers on the
network.
The following topics describe DHCP at a high level and the role of the DHCP in IPv6.
7-24
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
DHCP Fundamentals
DHCP uses a client-server model for communication. When a client needs an address, it sends out
a DHCP Discover broadcast. Any DHCP servers that hear this broadcast reply with a DHCP Offer
message. The DHCP client replies with a DHCP Request message. Finally, the server confirms
address assignment with a DHCP Acknowledgement message.
The DHCP consists of several components on the server and the clients within the network. These
components include:
DHCP server: This server is responsible for issuing and revoking IP configurations
from clients and working with DNS servers to create A (IPv4 host) or AAAA (IPv6
host) records.
DHCP client: This client is the Windows 7 installed client that receives the client
configuration from the DHCP server. The client DHCP process works with the DHCP
server to configure the DNS record described above.
DHCP scope: This scope is the range of IP addresses assigned to the DHCP clients.
The DHCP scope also contains IP addresses excluded from distribution and IP
addresses reserved for various devices and printers via MAC addresses.
DHCP scope options: These options are enhancements to the DHCP scope.
Information contained as options are as simple as IP addressing information for DNS
servers, WINS servers, default gateway routers, NetBIOS broadcast types, and the new
Windows 7 only option: DHCP Network Hints.
When you require more addressing control, enable the DHCPv6 component. IPv6 allows inherent
automatic address assignment and may not need a full DHCPv6 implementation. The following
topics describe the role of DHCP in IPv6.
DHCP Is Optional
IPv6 automatically assigns itself an address based upon information that it gathers from Router
Solicitation and Router Advertisement messages. Router messages have two flags that are known
as the M flag (Managed Address Configuration) and the O flag (Other Stateful Configuration).
When the M flag is set to 1, it tells the IPv6 client to look to a DHCPv6 service for addressing. If
the O flag is set to 1, the client uses DHCPv6 for other options such as DNS server addresses.
7-26
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
One of the most welcome changes to the Windows 7 operating system is the streamlining and
reconfiguring of the network settings. This change makes the entire configuration much more
intuitive for the user and the administrator. Windows XP forced you to navigate to many different
locations to accomplish some basic tasks. With the Windows 7 product line, the Network and
Sharing Center provides access to all these tasks in one central location. This applet is your one-
stop location for all the Windows 7 networking and Internet configuration options.
As shown in Figure 220, this topic describes the functionality of the Network and Sharing Center
in Windows 7.
Windows 7 Networking
You can access the Network and Sharing Center from a few different locations. You can access it
one of the following ways:
7-28
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
The network map is a feature that is enabled depending on the chosen network profile type. The
Windows Firewall with Advanced Features assigns the various rules that apply to the chosen
networking profile. For instance, if you choose the public profile, network discovery, and file
sharing are turned off. So when you choose the public profile, the Network Map feature does
not work.
Helpful Hint
The LLTDM is responsible for the mapping features that are available
in the Network and Sharing Center. If you choose the public profile,
this driver is blocked from outgoing and incoming communication.
You can override the default settings of the public network by toggling
the Network Discovery and File Sharing options or by customizing
your network.
Caution
When you make changes to the default network settings, you may be
opening up security risks, especially on the public network.
On the Network Map window, you can view a detailed map of your network. This map shows you
all of the devices currently connected to your network. Of course, these devices must support the
mapping protocols and drivers known as LLTDM and LLTDR. This means that Windows Vista
and Windows 7 devices will show up on the map as well as networking devices that support the
protocols mentioned. These network devices typically are routers, switches, and wireless access
points.
Administering and Maintaining W Windows
indows 7
7-29
Windows 7 Networking
The mapping feature does take some time to render a map, especially if the network contains
many approved devices. You must consider the traffic that this process causes and determine
whether to allow the discovery process on your networks.
Helpful Hint
You can download a compatibility pack for Windows XP that allows the
discovery of Windows XP devices on the network. However, this does
not allow the Windows XP devices to create maps.
Helpful Hint
If you correctly configure the networking feature and choose the
correct network profile but the mapping feature does not work, look to
the firewall for the possibility of a blocked UDP or TCP port 2177.
Helpful Hint
Use Group Policy to allow or disallow the mapping process on all
Windows Vista and Windows 7 computers. Just because you block the
2177 port on your firewalls, does not mean that the memory-starved
devices will not attempt to send discovery and mapper packets to the
network.
7-30
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Windows 7 provides the following wizards for making connections to various networks:
Windows 7 Networking
The Set Up a Connection or Network option allows you to connect to a wireless, broadband or
dial-up connection to the internet. It also provides the option to manually connect to a wireless
network. It can be used to connect to the workplace through a VPN or using dial-up. It can also
be used to set up an ad-hoc wireless connection when a wireless access point is unavailable.
7-32
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Windows 7 makes it easier to configure wireless networks that do not broadcast their SSID, also
known as the Wireless Network Name. With the Windows XP wireless networking model, these
networks did not show up; they were invisible to the user. While this is considered a security
feature of wireless networking, plenty of freeware packages on the Internet can discover the
presence of non-broadcasting wireless networks. With Windows 7, the non-broadcasting wireless
networks display in the new Wireless Network dialog box as unnamed networks.
You do not need to manually add a non-broadcasting wireless network as a preferred network in
the list of preferred networks. To connect to a network, simply click the unnamed network in the
list, make the choice to connect, supply the appropriate SSID value, and if required, supply the
encryption key. This process is much easier than in Windows Vista.
Helpful Hint
The Connect to a network wizard contains a feature that allows you to
manually connect to a wireless network. This is provided in case
multiple unnamed networks exist in the wireless networking dialog box.
Instead of trying every connection, simply create a manual connection
to a wireless network and set it as the preferred network.
Windows 7 Networking
You can enable the homegroup configuration from the Network and Sharing Center. A benefit of
the homegroup is the Windows 7 library. This is again the Windows 7 aggregate view of shared
resources and system folders, both local and remote.
With the Windows 7 homegroups and libraries, you can point to data that lives on many
computers, and possibly different networks, in a clear and concise manner within a library. The
new Windows Media Center also integrates with the homegroup and the library functions so that
folders watch and autoupdate as content changes. You no longer have to navigate a file structure
to see your data.
7-34
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
The Troubleshoot problems Network and Internet feature built into Windows 7 networks
provides seven main tools for troubleshooting most issues that may occur. The wizard presents the
user with several questions designed to configure a troubleshooting method that, hopefully,
corrects the problem. You can troubleshoot the following issues:
Internet connections
Shared folders
Homegroups
Network adapters
Incoming connections
Connection to a workplace using DirectAccess
Printing
Windows 7 Networking
The Windows 7 product line carried over the Windows Vista classification schemes. The benefits
are many, but the main purpose is to make you to choose a network location type when you
successfully connect to a network. This network location type drives the network settings
configuration. Behind the scenes, the Windows Firewall passes down the incoming and outgoing
rules based on the network profile configuration, which is based on the network type that you
chose.
7-36
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
You can also directly access your network interface from the Network and Sharing Center. Simply
click the link for the connection name and then click the Properties button. You can make many
adjustments and configurations from the Properties dialog box.
Helpful Hint
When you search for the word adapters, Windows 7 takes you to the
Network Connections section of Control Panel and you can see a list
of your adapters.
Windows 7 Networking
BranchCache
BranchCache keeps a cached copy of the data on the Windows Server 2008 R2 BranchCache
server. This reduces data access times by as much as 50 percent as compared to pulling the data
from the remote file server every time the user requires access to the data.
This topic defines BranchCache and describes the hosted and distributed cache modes of the
BranchCache feature built in to Windows Server 2008 R2 and Windows 7.
7-38
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
What Is BranchCache?
BranchCache helps to reduce the file transfer traffic between a headquarters location and its
remote offices. BranchCache operates in one of two modes: the Hosted Cache mode, where a
Windows Server 2008 R2 device hosts a cached copy of the data, or a Distributed Cache mode
where a BranchCache server is not required. In a Distributed Cache mode, computers in the
branch store cached copies of the data and as the data is requested, this data is sent to new
Windows 7 devices. This is all managed by the BranchCache process and drivers.
Helpful Hint
BranchCache supports all of the popular protocols for Web content
such as HTTP and HTTPS as well as SMB for file server
communication. Because of this standards-based support,
BranchCache supports all modern file types by extension. The
BranchCache process caches only read requests to files, so it never
interferes with any user that is writing to a remote file. BranchCache
also only caches data that has been requested, so it is very efficient at
dealing with bandwidth or the lack of it.
Windows 7 Networking
In the Hosted Cache mode data is downloaded to BranchCache-enabled servers in the branch
office by BranchCache-enabled clients. The Hosted Cache mode does not require a dedicated
server and is enabled on any physical or virtual server that is running Windows Server 2008 R2 in
the branch office.
The following process is used to cache and retrieve data:
1. The Windows 7 client connects to the server containing data files and requests them
as normal.
2. The data-containing server authenticates the client as normal and returns content
metadata over the standard data channel.
3. The client uses hashes in the metadata to search for the file in the local Hosted Cache
server. If this is the first time any client has retrieved the file, the client retrieves the
file directly from the original server that has the data.
4. The client exchanges content identifiers with the Hosted Cache server over an SSL
connection.
5. The Hosted Cache server retrieves the set of data blocks that are not cached from
the client.
6. If another Windows 7 client requests the same file from the data-containing server,
authentication occurs and content identifiers are once again returned.
7. The client exchanges the content identifiers with the Hosted Cache server over an SSL
channel. The Hosted Cache server encrypts the cached data and returns it to the client.
8. The client decrypts the data, and verifies that the content has not been modified.
7-40
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
In a Distributed Cache mode, Windows 7 clients cache the content and exchange the data with
other authorized Windows 7 clients in the same location. Distributed Cache mode is best for
branch offices with less than 50 users.
With the Distributed Cache mode, a local Hosted Cache server is not required. Windows 7 clients
cooperate with each other to cache and retrieve files. The WS-Discovery multicast protocol is
utilized to find other Windows 7 devices with locally cached data.
Distributed Cache mode operates on a per subnet basis.
Windows 7 Networking
Acronyms
The following acronyms are used in this section:
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Windows 7 Networking
Section Review
Summary
TCP/IP is a suite of addressing and routing protocols that consists of four layers:
Application layer: Implements the Winsock, NetBIOS, and the WSK APIs.
Transport layer: Contains the TCP and UDP protocols along with raw mode for
transmitting packets that do not need either TCP or UDP.
Network layer: Routes information from one network to another via the IPv4 and
IPv6 which live side-by-side and run simultaneously.
Framing layer: Places data coming from IPv4 and IPv6 into the appropriate
framing structure for the medium being used.
You can configure the TCP/IP settings for network adapters on Windows 7 using the
following methods:
Graphical configuration: Use the Internet Protocol Version 4 (TCP/IPv4)
Properties dialog box to automatically obtain IP addresses or manually change the
IP address, subnet mask, default gateway and others options.
Command-line configuration: Use the NetSH command-line tool to configure IP
settings on demand, or with a script for repetitive operations.
Enhancements made to IP version 6 for the Windows 7 client operating system include
the following:
128-bit address space: There are for 3.4 x 10^38 possible addresses
(340,282,366,920,938,463,463,374,607,431,768,211,456)
Better routing: Routing is built around the Internet architecture
Enhanced security: IPSec is a protocol requirement
Improved mobile IPv6: Maintains connectivity with address changes
Inherent QoS functionality: Traffic flow fields are part of the IPv6 header
The DHCP service runs on a Windows server and automatically provides IP addresses
to hosts on the network using the following client-server communication model
process:
1. Client sends out a Discover message.
2. Servers answer with an Offer message.
3. Client replies with Request message.
4. Server confirms with an Acknowledgement message.
The DHCP consists of these components::
DHCP server: Responsible for issuing and revoking IP configurations from
clients and also creating A or AAAA records.
DHCP client: Receives the client configuration from the DHCP server.
DHCP scope: Contains the range of IP addresses assigned to the DHCP clients, as
well as, IP addresses excluded from distribution or reserved for other various
devices.
DHCP scope options: Contains enhancements to the DHCP scope ranging from
IP addressing information for DNS servers to the new Windows 7 only option:
DHCP Network Hints.
7-44
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Knowledge Check
1. Can Windows XP computers appear in a Windows 7 Network Map?
2. The ________________ layer, sometimes known as the Internet layer, is responsible for routing
information from one network to another.
3. Josh wishes to use the IPv6 local loopback address to verify if the IPv6 network stack is
responding as designed. What address should he use with ping inside the command prompt?
a. 127.0.0.1
b. 127.EEOD:0000:0000:00000:0001
c. 0:0:0:0:0:0:0:1
d. fe80::1c8c:3026:9d2c:bc66%13
4. Which of the following features in the Network and Sharing Center are useful when trying to
diagnose network-related problems? (Choose all that apply).
a. Network maps
b. Change adapter settings
c. Troubleshoot problems wizard
d. Set network locations
Windows 7 Networking
5. Place the steps for the DHCP service process in the correct order. Write the numbers in the
Answer column.
Answer Description
Client replies with Request message
6. Clients running Windows Vista and Windows 7 can retrieve cached files from each other when
running in the Distributed BranchCache mode.
a. True
b. False
7. Which of the following methods could you use to configure TCP/IP settings? (Choose all
that apply):
a. Automatically obtain IP addresses in the Internet Protocol Version 6 (TCP/IPv6) Properties
dialog box.
b. Use the Network Display Map feature to view and edit the IPv6 settings.
c. Use the NetSH command-line tool to configure IP settings on demand.
d. Manually change the IP address, subnet mask, default gateway and others options from the
Internet Protocol Version 6 (TCP/IPv6) Properties dialog box.
8. For each Windows 7 enhancement t of IPv6, write a brief description in the space provided:
Better routing
Enhanced security
7-46
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Networking
Answer Description
3 Client replies with Request message
6. Clients running Windows Vista and Windows 7 can retrieve cached files from each other when
running in the Distributed BranchCache mode.
a. True
b. False
Client computers must be running Windows 7.
7. Which of the following methods could you use to configure TCP/IP settings? (Choose all
that apply):
a. Automatically obtain IP addresses in the Internet Protocol Version 6 (TCP/IPv6)
Properties dialog box.
b. Use the Network Display Map feature to view and edit the IPv6 settings.
c. Use the NetSH command-line tool to configure IP settings on demand.
d. Manually change the IP address, subnet mask, default gateway and others options from
the Internet Protocol Version 6 (TCP/IPv6) Properties dialog box.
Windows 7 Networking
8. For each Windows 7 enhancement of IPv6, write a brief description in the space provided:
Better routing:
Routing is built around the Internet architecture
Enhanced security:
IPSec is a protocol requirement
Improved mobile IPv6:
Maintains connectivity with address changes
7-48
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
6
Integrating Windows 7 with Active
Directory
Section Topics
DNS Overview
Windows Server 2008 R2 Active Directory
Joining an Active Directory Domain
Using Active Directory Tools Remotely
Implementing Group Policy
Section Objectives
Section Overview
The business environment is constantly changing. The operating systems that run smoothly are the
ones that can efficiently and securely operate under some of the most hostile and volatile
conditions. The client operating systems installed within large enterprise networks must be
manageable, both remotely and centrally. Windows Server products and Windows 7 client
operating systems can do this for you. This section introduces the server-side technologies
available with Windows Server 2008 R2 and the enterprise abilities of Windows 7. This
information helps you understand what you can do in your own network to make your job easier
and your data more available and secure.
6-2
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
DNS Overview
DNS is one of the most important services in Active Directory environments. The DNS (Domain
Name System) is a service that translates user-friendly names into their associated numerical IP
addresses. DNS eliminates the need to remember all of the IP addresses for the systems
throughout an environment. Of course, this is crucial in communicating with systems on the
Internet since there are millions of IP addresses.
DNS is also required for communication with the outside world due to the Internets total reliance
on DNS as a name resolution platform.
The tight integration of DNS within Active Directory as a naming standard has enormous
advantages. The fact that you need to use only one name resolution service for either internal or
external name resolution greatly simplifies the administration process.
Figure 158 lists the subjects that are described in this topic.
DNS is a critical service for Active Directory. In fact, without DNS the Active Directory service
cannot function. DNS is used to find the addresses for Active Directory hosts and resources.
Special SRVs dynamically register these services in the DNS database.
DNS is also used to register sites for Active Directory. Widely dispersed environments use sites to
provide boundaries between physical locations.
6-4
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
DNS is not the only method available to resolve names to IP addresses. Over the years, various
systems utilized several other types of name resolution. Windows Server 2008 R2 still supports
these alternative name resolution mechanisms for backward compatibility.
Hosts file
Since the early days of UNIX operating systems, Hosts files have been used to resolve names into
IP addresses. The Hosts file is a standard text file with host names and addresses created manually
for name resolution. The text file resides locally on every host and does not automatically update
when names or IP addresses on the network change.
Hosts files have a format like the following:
10.0.0.101 skunk
10.0.0.102 panda
10.0.0.125 tiger
NetBIOS
Originally, IBM introduced the NetBIOS naming standard for its mainframe environments. Later
Microsoft adopted this standard for its LAN Manager series of operating systems (of which
Windows Server 2008 is a descendant). NetBIOS was never meant for use in the large
environments where it is currently deployed. With a 15-character maximum to identify computers,
and no hierarchy, NetBIOS quickly runs into capacity problems.
Initially, NetBIOS name resolution was entirely broadcast-based. This meant that every computer
that wanted to communicate using those names had to exist on the same network segment.
Microsoft introduced LMHosts files as a way to initially integrate NetBIOS into the world of
TCP/IP, and allow NetBIOS resolution to reach computers on distant networks. Like the Hosts
file, LMHosts is a static file that must be updated by hand.
Microsoft later introduced WINS as a centralized name resolution resource that dynamically
updates with the latest names and IP addresses of the computers throughout the environment.
However, WINS still relies on the 15 character or less, non-hierarchical structure.
DNS
DNS was introduced as an RFC standard in the mid-1980s to address the problems facing the
burgeoning Internet (still known as the ARPANET at that time). The network grew so rapidly that
the simple Hosts files just could not keep up. DNS was developed as a hierarchical, distributed
database of names. Although centralized, initially DNS was maintained manually. The latest
versions of DNS, however, can dynamically update with new or modified host names and IP
addresses. DNS focuses on the capacity and overhead issues that have plagued other name
resolution services.
A DNS name is made up of several components (shown in Figure 161) that represent the
hierarchical namespace of DNS. Analyzing these components is helpful in understanding the
structure of DNS and helps when troubleshooting DNS problems.
FQDN
The FQDN (fully qualified domain name) refers to the combination of all of the naming
components together. A domain name is fully qualified when the host, second-level, top-level, and
root portions of the name are combined.
Host
The host portion of the DNS name is the identity of the computer or computers that the name
relates to. This may not be the only identity for that computer. Other aliases or host names could
also point to the IP address of the computer.
6-6
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Second Level
The second level (sometimes called a sub-domain) is a subdivision of the DNS namespace. This
further compartmentalizes the DNS architecture into identifiers that represent the organizations
and entities that make up the namespace.
Top Level
The top-level names categorize different portions of the DNS namespace into collections of
different types of organizations. They also represent different parts of the world. Thousands of
top-level domain names, such as .us, .fr, .jp, .tw, and others, represent all of the different
countries around the world. The most recognized top-level domain names are those used for
businesses and organizations throughout the United States, such as .com, .net, .org, and so on.
Several widely known governmental top-level domain names, such as .gov, .mil, .edu, and many
others also exist.
Root
The root of the DNS namespace is simply the dot (.) at the end of every FQDN. Sometimes it is
not written or typed, but it is always there in the DNS hierarchy and is always used in name
resolution. Fifteen DNS servers process root queries. From there, all other queries are processed.
DNS is also the name resolution mechanism of the Internet. If DNS had not been developed, the
Internet would not exist as it does today. Imagine remembering 72.21.210.250 as the Internet IP
address instead of http://www.amazon.com. Imagine remembering the IP addresses for the
hundreds of Web sites you currently visit. Internet DNS is identical to the DNS you may use in
your network environment; however, it is designed to support hundreds of millions of users with
billions of queries for name resolution.
The Internet name resolution mechanism provides external access to your resources. So if you are
a large company, you can make your products available to the world, not just your local area. DNS
is the one service or mechanism that is single-handedly responsible for the explosion of the
Internet, besides the arrival of the personal computer.
DNS also helps to find other types of resources, not just Web sites or server names. DNS can also
provide access to many other types of resources and services within the network. These resources
are made available through the use of DNS resource records such as:
6-8
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
DNS can both help and hurt a network. If you are not careful with its implementation and design,
you can inadvertently expose all of your internal resources to the outside world. Businesses can
operate in a safe manner because of the development of private name resolution techniques. You
can create private and public DNS namespace so that your internal resources are safe from the
outside world and your internal users can still access the Internet namespace.
Private name resolution starts with a private top-level domain name. Therefore, instead of using
the typical .com, .edu, .org, and so forth, you can configure a private TLD that is not accepted as a
valid top-level domain name. For example, you can assign local, internal, or private as the
domain name of all of your internal resources. Currently, 20 approved TLDs exist with countless
country designations that can also be used as TLDs. Of course, you have to complete the advanced
configurations to the Windows Server 2008 R2 DNS server so the internal clients can access the
Internet address space.
In the Active Directory environment, SRVs (service location records) locate the critical services
that are necessary for directory service functionality. Domain controllers automatically update the
DNS database with the following record types:
Kerberos
LDAP
Global catalog
Clients and servers also use DNS to determine which site they are in and the servers running the
critical services that they should communicate with.
6-10
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Troubleshooting Tools
Many tools are available for troubleshooting the Windows 7 operating system in general. A few of
these tools are more focused on resolving issues with DNS. The following topics describe these
tools.
Adapter Status
The Adapter Status and corresponding Network Connection Details are useful for displaying basic
information related to the network card and its IP address settings. This tool is sometimes easier to
perform when troubleshooting with another individual over the phone.
Ping
The Ping tool is the ubiquitous connectivity testing utility found on almost any TCP/IP-based
operating system. This tool is not strictly for name resolution troubleshooting. However, if you use
the Ping tool against a name, expect to see the corresponding IP address echoed back. If not, name
resolution may be failing.
6-12
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Active Directory is a distributed database that stores information about objects such as user
accounts. It also provides information about network resources and application data for directory-
enabled applications and services. You can organize Active Directory into a hierarchical structure
that reflects the layout of your organization and possibly matches the DNS architecture as well.
Active Directory promotes the use of a single-sign-on to the environment for ease of use and a
more top-down administrative model. Within an Active Directory forest, you can permit a user
access to resources that exist on any computer in any domain.
Following topics describe the goals, objects, and architecture of Active Directory as well as the
naming standards used by Active Directory.
Active Directory is very flexible and extensible. The Active Directory platform has many potential
uses. Following is a description of the most important goals for Active Directory.
Authenticate Users
Before gaining access to any part of the Active Directory infrastructure, users must prove their
identity. It is the responsibility of the DC (domain controller) to provide this authentication.
Before anyone is allowed access, the DC must check the users credentials against the Active
Directory database. If the information provided is correct, the user receives a TGT as the pass to
get STs before accessing any resources.
6-14
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
The heart of Active Directory is a database that stores meaningful object information. The Active
Directory contains many different object types. Administrators create and interact with only a
handful of the following objects:
Users: User accounts are the most prominent object within Active Directory. They
establish the list of known individuals allowed to log on to the system.
Groups: Groups are very important in the reduction of administrative overhead.
Collecting users together into groups allows the administrator to assign privileges to
the group instead of each individual.
Computers: Administrators either create computer objects ahead of time or when a
computer joins the domain. Computers use computer objects to participate in the
domains security context.
Contacts: Contacts do not have a user name and cannot log on to the domain
environment. Administrators use contacts to establish e-mail aliases for individuals
outside the organization.
Printers: Printer objects exist within the directory as a convenient method to locate a
shared printer within the network.
Shared folders: Shared folders are for convenience. A shared folder in Active
Directory points to physical shared folder on a server or workstation. Creating a shared
folder in Active Directory does not create the shared folder on the target computer. The
destination shared folder must already exist.
Active Directory is made of a collection of components that work at different hierarchical levels.
You should understand the designations of these levels even when you are implementing an
Active Directory structure of a smaller size:
Forest: A forest could be a single domain. However, the word forest generally depicts
something larger. A forest could be made up of two or more trees with different
namespaces, for example hq.local and widget.com. Trees and domains in the forest are
bound together by links known as trusts.
Tree: A tree is a collection of one or more domains in the same namespace, for
example hq.local. Domains in the tree are linked together by trust relationships.
Domain: The domain is the basic building block and security boundary for the Active
Directory environment. The domain also establishes a storage area for Active Directory
objects within the DCs in that domain.
Global catalog: The GC for an Active Directory forest summarizes all the objects
stored on each domain in the forest. Since each domain contains its own database
separate from other domains, the GC binds multiple domain directories into one larger
searchable directory.
Organizational unit: OUs are containers in which other objects, such as users and
groups, are stored. OUs are a very important organizational technique for dealing with
very large numbers of objects. It is difficult to manage thousands of user accounts all in
one flat list. Instead, gather objects into meaningful subdivisions called OUs that you
can manage more efficiently.
Domain controller: A DC is a computer that runs the Active Directory service and is
able to answer logon requests and queries about objects. The DC replicates any
changes to the Active Directory database to and from other DCs for redundancy.
Site: Sites provide an indication of the physical architecture of the environment.
Usually administrators establish sites for each physical location, and then place a GC
on a DC within each of the sites. Sites provide a foundation for replication and for
local logons.
6-16
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Naming Standards
Active Directory uses a combination of different naming technologies to provide access to the
directory database:
DNS: DNS is one of the most important pieces of the Active Directory puzzle. Not
only does DNS provide the host name to TCP/IP address resolution necessary to
communicate with all of the Active Directory Services, it also provides the naming
structure for Active Directory itself.
DNS is critical in locating the LDAP, Kerberos, and global catalog resources necessary
for domain functionality through the use of SRV records.
LDAP: LDAP is used to query and access the directory database. LDAP is an open
standard used by other vendors for their own directory services and follows a common
access scheme. Using LDAP, other network computers and services can leverage
Active Directory for their own purposes.
X.500: The X.500 standard is a naming specification that defines the hierarchical
structure of a directory database. Active Directory loosely conforms to the X.500
specifications making it easier to convert objects from other directory services to
Active Directory and vice versa.
The X.500 specification lays out the use of containment qualifiers for the different
levels of the hierarchy. The following is an example of an X.500 DN.
cn=Jane Doe, ou=Sales, o=hq, l=atl, st=ga, c=us
cn: common name
ou: organizational unit
o: organization
l: locality
st: state
c: country
Active Directory naming architecture: When Microsoft first designed Active
Directory, it did not adopt the entire X.500 naming scheme for the Active Directory
database. Instead, the developers took part of the X.500 architecture (the cn= and ou=)
and appended the naming scheme used on the Internet today: DNS. The DNS domain
name information, for example gk.com, is turned into a series of dc= qualifiers.
The following is an example of an Active Directory DN:
cn=JaneD, ou=Sales, dc=atl, dc=hq, dc=local
Administering and Maintaining W Windows
indows 7
6-17
To take advantage of single sign-on, Group Policy, security, resource access, and the many other
features of Active Directory, the user's computer must join the Active Directory domain.
Following is a description of how to join a Windows 7 client computer to the Active Directory
Domain environment, how to change the computer identify, the placement of the computer object,
and how to log on to the domain.
Requirements to Join
To join an Active Directory domain, the computer must be configured with a proper DNS server
address that allows the client to contact a domain controller. The user must log on to the local
computer as a local administrator equivalent.
It is not necessary, however, to log on as an administrator from the domain. A normal user can
join computers to the domain up to 10 times. Domain administrators and enterprise administrators
can join an unlimited number of times.
6-18
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
When you join the domain, by default, the computer object is placed in the Computers container.
The domain administrator can move this later. It is also possible to create the computer object
ahead of time in an OU that is appropriate. When the computer joins the domain later, it
immediately adopts any group policies on the OU that the computer is in.
6-20
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
In Windows 7, the account name of the last logged on user displays by default on the logon
screen. To log on as a different user, or to force a domain versus local logon, click the Switch
User button, and then select Other User. You can then type any valid user name for the local
computer or for the domain.
If you type a user account name that does not exist on the local computer, the context
automatically changes to the domain that the computer belongs to. You can also specify the
context in the following ways:
HQ\Joe
Joe@hq.local
It is not always convenient or desirable to use domain management tools on the server console.
Instead, it is possible to install the tools on a Windows 7 console that you can use for
administration.
However, when these tools are unavailable, or the computer you are using is not a domain
member, other methods of remote administration are available.
Figure 176 lists the subjects that are described in this topic.
An Active Directory environment has several possible options for remote management:
Remote command-line tools: Many command-line tools are available to use against
either the local computer or remote computers. To find out if a tool has remote
management capabilities, run the command with a /? switch, and look for a server or
computer name switch that allows you to change the focus of the command.
Remote Desktop: Any computer with a Remote Desktop client can connect to the
server and run tools and utilities as if sitting at the server console. This is a great option
for non-domain member computers, and for non-Windows computers.
Windows 7 MMC tools: Most of the built-in MMC tools have the ability to focus on
remote computers. The Computer Management Console is one example.
RSAT: Dozens of additional MMC tools are available in the Remote Server
Administration Tools package. This is a free download from Microsoft.
6-22
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
To install the RSAT, go to the Microsoft Web site and search for RSAT. Choose the version that
matches your version of Windows (32 bit or 64 bit), and download it. To install the package, run
the MSU file and follow the prompts.
After installing the RSAT MSU file, the tools do not appear on the administrative tools listing by
default. You must add the individual RSAT tools that you need, or add them all.
To add the RSAT tools, follow these steps:
1. Click Start, Control Panel, and Programs and Features.
2. Click the Turn Windows Features on or off link.
3. Scroll down to the Remote Server Administration Tools section.
4. Expand and select each individual check box for the items you need.
Note
The list of RSAT tools do not automatically select the lower check
boxes when you select an item higher on the list. You must select
each individual item to install it.
6-24
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Microsoft introduced Group Policy with Windows 2000 as a replacement for the system policies
of older Windows environments. The system policies used in the past were very inflexible and
difficult to reverse once put in place.
The new Group Policy in Windows Server 2008 builds upon the foundation established with
Windows 2000. Group Policy enhancements made in Windows Server 2003 were minor compared
to the new features and hundreds of new settings in Group Policy for Windows Server 2008.
Group Policy may be enhanced with new features but the basic architecture remains the same. To
properly deploy and troubleshoot Group Policy, you must understand its capabilities and
components.
This topic describes the Group Policy features of Windows 7 in the Active Directory environment.
Policies are very important to the network administrator. Policies allow you to pass down many
security or configuration settings to your Windows 7 workstations in a centralized manner, which
makes it easy for you to administer the network. Without policies, you would literally have to visit
thousands of computers either through remote access technologies or by traveling to the location
of the computer, which is not efficient and very costly.
Windows 7 provides you access to several types of policies and utilities for creating and managing
them. Windows 7 provides the local security policy and the Group Policy settings that are passed
down from your Windows Server 2008 R2 computers.
Helpful Hint
You can find many important configuration items in the Windows 7
local security policy, such as the UAC and the Windows Firewall with
Advanced Features.
Figure 181 lists the subjects that are described in this topic.
6-26
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Each Group Policy object is broken down into two primary sections:
In the previous Group Policy Management Editor, the Administrative Templates section for both
the user or computer configurations contained most of the desktop settings and restrictions. Now,
there are two new layers:
6-28
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Integrating Windows 7 with Active Directory
Local Policies
Local policies are those settings configured only on the local computer. These are usually
implemented on a stand-alone or workgroup computer.
Use the Group Policy Management Editor or gpedit.msc tool to edit local policies.
Security Policies
One section within Group Policy deals specifically with security settings. The security policies
section contains settings that can be used to secure or lock down computers in the environment
through Group Policy instead of having to implement those settings on each individual system.
The main headings of the security policy are:
Security Settings Password Policy and Account Lockout Policy: Contains the
password history, password age, password length, complexity requirements, and
encryption options
Local Policies Audit Policy, User Rights Assignments and Security Options:
Contains the auditing settings, user rights to the system, and UAC settings
Windows Firewall with Advanced Security: Contains the inbound and outbound rule
creation, IPSec security rules, and NAP rules
Network List Manager Policies: Contains the policy settings that control the listing of
identified, unidentified, all networks, and identifying networks
Public Key Policies: Contains EFS policies, BitLocker Drive Encryption policies, and
certificate settings
Software Restriction Policies: Allows and blocks software from the network
Application Control Policies: Contains AppLocker policies
IP Security Policies on Local Computer: Contains the wizard for creating IP security
policies
Advanced Audit Policy Configuration: Contains 40 or more advanced audit policies
for many categories and subcategories such as auditing file shares, registry, and the file
system
6-30
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Folder Redirection
The process of folder redirection makes it possible to store a user's personal My Documents files
on a server instead of locally. The user is unaware of this change, and the documents are also
cached on the user's local hard drive using offline synchronization.
You can also set up many other folders for folder redirection:
AppData (Roaming): Contains files used to store some application configuration data.
Desktop: Contains all files and shortcuts stored on the Windows desktop.
Start Menu: Refers to the Personal section of the Start Menu with all of the program
groups and shortcuts. (You cannot redirect the All Users section.)
Documents: Contains the bulk of any user-created files. (Formerly known as My
Documents)
Pictures: Stores photos by default. You can reduce replication traffic by disabling
some of these less work-related folders.
Music: Stores music by default. You can reduce replication traffic by disabling some
of these less work-related folders.
Videos: Stores videos by default. You can reduce replication traffic by disabling some
of these less work-related folders.
Favorites: Stores Internet favorites to Web sites.
Contacts: Refers to the built-in contacts database for Windows Vista.
Downloads: Stores files downloaded through Windows Messenger and other programs
by default.
Links: Stores quick shortcuts to other folders in the personal and public folders of
the user.
Searches: Stores predefined search criteria for new files, recently viewed files,
recently changed documents, and so forth.
Saved Games: Stores the users games. Some games are now designed to save the
users games here by default.
Software Deployment
A powerful feature of Group Policy is the ability to distribute software packages and to restrict
access to unauthorized software. Other more powerful tools also provide these features, such as
Microsoft Systems Management Server, but for the small to mid-sized environment, the built-in
software management tools in Group Policy may be all that are needed.
6-32
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Published packages are optional. The end user must install published packages using
Add/Remove Programs on Windows XP and Windows Server 2003, or using Programs and
Features on Windows Vista, Windows 7, and Windows Server 2008.
Software Restrictions
Because of the growing threat of viruses and rogue software, tight control over the software that
users run is greatly needed. Antivirus software is certainly a necessity, but it only catches known
software threats. Any new viruses or Trojan horses that slip under the radar can still be a huge
problem. You can use the Software Restriction feature of Group Policy to prevent users from
running prohibited or malicious programs, or prevent certain programs from starting.
The following topics describe the software restriction and AppLocker policies.
Hash Rule
A hash rule is a more secure mechanism used to permit or deny access to specific files. An MD5
hash is a unique value generated from the bits and bytes of the file. This value is unique among
files. You can use this value to identify whether or not the file is allowed to run. Unfortunately, a
very knowledgeable individual can circumvent the hash rule by hex-editing the file in question and
changing it by a tiny amount.
Certificate Rule
The certificate rule is by far the most secure, but also the most cumbersome to implement. To
properly implement certificate rules, a PKI must be in place to generate and verify certificates.
To use a certificate rule, a special code-signing certificate must be issued by a Certification
Authority. The private key portion of the certificate is then used to sign the files that are allowed
to run. The public key portion of the certificate is then made available to all who need to use the
signed files.
The certificate rules are normally used in a situation where no software is allowed to run except
those files signed by a trusted code-signing certificate. This exclusive model requires constant
oversight as new software or revisions to existing software come along. It is, however, the most
secure computing model available.
AppLocker Policies
Microsoft provided software restriction policies in Windows XP to control the software allowed to
run on computers in the environment. A new, more advanced version of software restriction
policies, AppLocker, is now available for Windows Server 2008 R2 and Windows 7.
The following are AppLocker features:
More powerful publisher rules: AppLocker has the ability to create a rule for a
product name. This eliminates the need to regenerate the hash rule for every update of
an application. Based on publisher, product name, file name, or version, this
information is taken from the digital signature of the application.
Simplified rule processing structure: AppLocker removes the complex precedence
rules for different rule types. Now, all deny rules take precedence over allow rules.
User rules for non-interactive logons: With AppLocker, a help desk administrator
who is remotely administering a user's desktop has the rules enforced whether they are
interactively logged on or not.
Separate policies for .exe files, .msi files, scripts, and DLLs: In AppLocker,
executable rules apply to executable code; path rules created for executable programs
do not apply to DLLs. To control DLL behavior, simply create a DLL rule.
Auditing mode: In AppLocker, enable an audit-only mode to watch or track the
AppLocker process without actually blocking access to files.
Wizard for rule creation: In AppLocker, use a rule creation wizard to generate rules
that allow all applications in a specified folder to run.
6-34
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Logon Scripts
In the past, actions that could not be configured as Group Policy settings were performed by logon
scripts. More and more of these settings are now incorporated into Group Policy as individual
configurable items.
For instance, historically, logon scripts were used to create a mapped network drive for users at
logon. With Windows 7 and Windows Server 2008 R2, Group Policy now contains a User
Configuration, Preferences, Windows Settings, Drive Maps option that allows you to configure
the mapped drives.
In addition to logon scripts, Group Policy can also provide computer startup and shutdown scripts
that execute when the computer starts, or is shut down. These can be cleanup or maintenance
related activities.
Using familiar batch file programming or VBScript, you can still write scripts. However, it is now
possible to design the scripts using Windows PowerShell. Since Windows PowerShell is now
automatically installed on Windows 7 and Windows Server 2008 R2, Windows PowerShell scripts
will be more common in the future.
ADMX Templates
ADMX files contain the settings that are represented in the Administrative Templates section of
a Group Policy. These templates, as their name implies, are based on standard XML and have an
.admx file extension. This file type replaced the .adm standard for administrative templates.
Windows 7 stores these .admx files in the %Windir%\Policy Definitions folder. If you need to,
you can also download additional policy definitions directly from Microsoft.
These policies are passed down to the Windows 7 workstations from a Windows Server 2008 R2
central store. A central store is a location that lives within the SYSVOL folder. You need to create
the central store only once. The store is then replicated to all of the other domain controllers via
the replication process.
The central store contains a root-level folder that houses all of the non-language-specific policy
definitions and lower level folders that contain any language-specific policy definitions. You can
copy the .admx files into the appropriate location using any copy method, such as Xcopy or copy
and paste.
6-36
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
You can open .admx or .adm files with any text editor, including Notepad. However, you must
ensure that your text editor does in fact understand the .xml syntax. You can also use Visual
Studio or the easy-to-use and navigate XML Notepad 2007. This is a simple and free download
from the Microsoft software download site.
Group Policy, as you learned, affects many different computer and user settings. It is important to
realize that Group Policy also affects many different locations. Administrators can apply policies
to many locations, such as the Active Directory site, domain, and the OU. Remember,
administrators can also configure local policy on the workstations as well.
Administrators need to figure out how all of these policies may or may not affect each other.
Microsoft has provided a simple Group Policy application procedure.
The acronym is: LSDOU (Local, Site, Domain, Organizational Unit). This simply states that
policies are applied to the Windows 7 workstations in that order.
1. Local: Local policies are applied first. Local policies apply only to the local computer
or workstation.
2. Site: ADDS site policies are applied second. Site policies apply to the subnet IDs that
match the site that the computer or user is located within.
3. Domain: ADDS domain policies are applied third. Domain policies apply to all users
and computers in the same domain.
4, OU: ADDS OU policies are applied last. OU policies apply to all users and computers
in the OU that the policy is linked to. Sometimes OUs are nested within other OUs
because they are easy to manage this way. Any policies within the nested OUs are
applied one at a time after the initial OU policy.
The Group Policy application model is a simple one to master, until policies start to conflict. For
example, a domain administrator applies a policy to the domain that prevents access to Windows 7
Control Panel. However, a branch office administrator has a policy that allows access to Windows 7
Control Panel of the OU that he or she is responsible for. What happens? Again, Microsoft has an
easy-to-understand rule of Group Policy precedence. The rule simply states that the policy that is
applied last wins. So in the previous example where the OU lives within the domain, the users
within the OU would not be affected by the policy and they would have access to Control Panel.
6-38
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
To manage group policies most effectively, there should be a good foundation to apply them to.
This foundation normally exists as a hierarchy of OUs within the domain environment. Group
policies certainly can be applied to the site and the domain levels, but the real power of Group
Policy is in being able to apply it in a granular fashion.
When applying a GPO to an OU structure, it is important to remember that a policy applied at a
parent OU is automatically inherited by all child and grandchild OUs. This default behavior
should be leveraged so that settings that really should apply to a broad range of users and
computers are applied at a higher parent level, while settings that should affect only a subset of
accounts are applied at a child OU. Structuring the OUs appropriately can make this process
much easier.
Sometimes this normal inheritance process can be limiting. For that reason, there are three ways to
disrupt the inheritance of higher-level policies:
Contradictory Settings
If a child OU has the need to opt out of a particular Group Policy setting, a new GPO can be
created at that level that has the opposite setting. The last policy applied in the processing
sequence wins.
Block Inheritance
When a very large number of settings are configured at a higher level and many of them should
not apply to a child OU, enable the Block Inheritance attribute on the OU so that no policies from
above apply.
Enforce
The Enforce option is applied at higher levels of the policy architecture to ensure that certain
policies cannot be overridden or be blocked. The Enforce option is applied to an individual GPO.
Depending on the options you enable, some GPOs can be overridden or blocked while others can
be made mandatory. The Enforce option always wins.
There are several tools, some graphical and some command-line based, that are used in managing
and troubleshooting the Group Policy process. The following topics describe these tools.
GPMC.msc
The Group Policy Management Console is the primary tool for viewing and managing all of the
policies that exist in a given Active Directory forest. All of the sites, domains and OUs can be
viewed from one console interface. The tool also displays a listing of all GPOs defined in each
domain, even if they are not currently applied to anything.
In addition to displaying the structure of the group policies, the GPMC tool allows the
administrator to quickly see which policy settings are being applied at each level of the OU
structure without opening each policy in the Group Policy Management Editor.
There are also built-in tools for viewing Group Policy modeling and Group Policy results. These
tools are invaluable in testing and troubleshooting policy application.
Gpedit.msc
The Group Policy Management Editor is a tool that can be launched from within the Group Policy
Management console, or stand-alone. When launched by itself, the local policies of a computer
can be viewed.
Using the editor, you can view and modify all of the policy settings within a GPO. Many settings
within the editor are simply On, Off or Not Configured. Other settings may require selections
from drop-down lists, while others may require text entry.
Gpupdate.exe
The Group Policy Update tool is a command-line tool used to force policy application. When
troubleshooting policies, it may sometimes be necessary to apply policies ahead of the normal
refresh interval of 30 to 90 minutes.
6-40
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Gpresult.exe
The Group Policy Results tool is a command-line tool that can display all of the policy settings
that are active for a computer or user. The output from the tool can be redirected to a file for later
viewing.
RSoP Snap-in
Another tool that can be used to troubleshoot policy application is the Resultant Set of Policy
Snap-in. This tool displays policies in a graphical fashion much like that of the Group Policy
Management Editor. The RSoP snap-in has largely been replaced by similar functionality built
into the Group Policy Management Console.
In the past, the GPMC was a feature pack download for Windows Server 2003. Now, the GPMC
is the standard tool for managing group policies.
Acronyms
The following acronyms are used in this section:
Global
Gloobal Knowledge Training LLC L
LL
Section Review
Summary
The DNS Service is used to resolve DNS domain names into their corresponding IP
addresses. This is the naming standard used for the Internet at large and also for the
internal Active Directory environment.
Windows Server 2008 R2 Active Directory stores object information, authenticates
user identification, and implements group and security policies. The heart of Active
Directory is a distributed database that stores meaningful object information for the
Users, Groups, Computers, Contacts, Printers, and Shared folders objects. Active
Directory is made up of the following hierarchical collection of components: Forest,
Tree, Domain, Global catalog, Organizational Unit, Domain controller, and Site.
Before joining an Active Directory domain, the following requirements must be met:
The computer must be configured with a proper DNS server address.
The server address must allow the client to contact a domain controller.
The user must log on as a local administrative or equivalent.
To join an Active Directory, follow these steps:
1. Click Start, right-click Computer, and then select Properties.
2. Click the Change Settings link, and then click the Change button.
3. Select the Domain option, type the name of the domain you want to join, and then
click OK.
4. Type user name and password and then click OK.
5. Restart the computer.
To configure and edit Windows 7 local security policies, open the gpedit.msc console
and expand Computer Configuration, Windows Settings, and Security Settings.
To remotely administer Active Directory, use the following Windows 7 Active
Directory tools :
Tool Description
Remote command-line Remotely manages either the local computer or the remote
tools computers; many command-line tools are available
Remote Desktop Connects to the server and runs tools and utilities as if sitting at
server console
Windows 7 MMC tools Focuses on remote computer management; the Computer
Management Console is one example of the many tools available
RSAT Downloads and installs dozens of remote server MMC tools for
free; each tool must be enabled in the administrative tools listing.
Figure 196: Windows 7 Active Directory Tools
ADMX templates house policy definitions for the Administrative Templates section
of a Group Policy. Using ADMX templates, you can configure thousands of possible
desktop and user settings.
6-44
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
To configure the Windows 7 Group Policy objects, open the gpmc.msc and either edit
an existing Group Policy object, or create a new one.
The four levels at which Group Policy objects can be applied are:
Local: These policies apply to the local computer or workstation.
Site: These policies apply to the subnet IDs that match the site that the computer
or user is located within.
Domain: These policies apply to all users and computers in the same domain.
Organizational Unit: These policies apply to all users and computers in the OU
that the policy is linked to.
Knowledge Check
1. Which of the following examples are fully qualified DNS names? (Choose all that apply.)
a. www.mycompany.westernstates.local
b. http://joe.com
c. Http://joe.com
d. Server1.managementdept.newyorkcity.manhattan.us
e. Server21
2. How are ADMX templates used to configure Administrative Templates settings?
3. Susan Winters has been tasked to configure the network settings on 34 Windows 7 computers. She
logs on to her Windows 7 management workstation named wks1.ziffcom.local. She clicks the
Start button and then types LOC in the Search box. She opens the local security policy as an
administrator. Has she begun to handle this task correctly?
4. Which criteria must be met before you can join an Active Directory domain?
8. What are the main goals of Windows Server 2008 R2 Active Directory? (Choose all that apply).
a. Stores object information
b. Authenticates user identification
c. Distributes software packages
d. Implements group and security policies
9. Briefly describe the process used to configure the Windows 7 local policy.
6-46
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
7. Match each Windows 7 Active Directory tool with its correct description. Write the letter of the
description in the Answer column.
8. What are the main goals of Windows Server 2008 R2 Active Directory? (Choose all that apply).
a. Stores object information
b. Authenticates user identification
c. Distributes software packages
d. Implements group and security policies
9. Briefly describe the process used to configure the Windows 7 local policy.
Open the gpedit.msc console and expand Computer Configuration, Windows Settings, and
Security Settings to configure and edit Windows 7 local security policies.
6-48
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
8
Windows 7 Remote Access and
Mobile Computing
Section Topics
Windows 7 Virtual Private Networking
Windows 7 DirectAccess
Remote Desktop
Power Management Options
Offline Files and Folders
Section Objectives
Section Overview
Windows 7 remote access technologies are valuable tools for the distributed workplace. These
tools help you connect remote workers to your branch office as well as connect to other
Windows 7 devices for helpdesk type duties. Microsoft also provided the RSAT for
Windows 7 RC. Using this suite of tools, administrators can use their Windows 7 workstations to
manage their remote servers with all of the necessary tools like the Active Directory Domain
Services utilities. This section explores the available remote access technologies that are present
and available with Windows 7 as well as some features that are brand new and only function
within a Windows Server 2008 R2 environment.
8-2
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
This topic defines the VPN features of the Windows 7 operating system and describes how to
configure a new VPN connection and how to set up an incoming VPN session.
What Is a VPN?
VPN is a method for securely gaining access to a private network. Once connected, the client
appears as if it has a local connection. Windows 7 supports the following VPN protocols:
8-4
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
The Windows 7 VPN wizards are available from the Network and Sharing Center, which you can
access from the Network and Internet category in Control Panel. This topic describes the steps to
establish a new VPN connection.
In the Network and Sharing Center, click the Set up a new connection or network link and select
the Connect to a workplace option. The wizard is very intuitive, provided that you know which
configurations you want to make. You will most likely use Group Policy to distribute this
connection information to those who need it, or you can create connections with the CMAK v1.3
utility, which works well with Windows 7. The bottom line is that you want to avoid manually
configuring hundreds of Windows 7 VPN clients, if at all possible. Giving detailed directions to
your users is also not the answer.
Select the Connect to a workplace option to establish a VPN connection to your corporate
network. If VPN connections are already available, the system prompts you to either use one of
the existing connections or create a new one.
The system prompts you to either connect to the VPN over the Internet or dial the private network
via a phone line. Next, you need to type the server name or IP address of the VPN server to which
you need to connect.
8-6
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Provide Credentials
The User name and Password text boxes follow standard Active Directory conventions for user
name entry. You may use the UPN (joe@hq.local) format, or use the domain\user (HQ\Joe)
format.
After configuring the VPN connection object with the user name and password, the system creates
the connection and displays it in the Network Connection window of Control Panel. The
connection is configured, but one main item is left out of the wizard process: the security
parameters for the VPN connection. You must go back and enter the properties of the VPN
connection object and configure the security.
If the security information is set up incorrectly, the client will not connect to the VPN server. Pay
attention to the designated error codes. They help you to troubleshoot problems. Some of the error
codes that you may encounter include the following:
732: Your computer and the remote computer could not agree on the PPP control
protocols.
718: The connection timed out waiting for a valid response from the remote computer.
734: The PPP link control protocol was terminated.
736: The remote computer terminated the control protocol.
919: The connection could not be established because the authentication protocol used
by the RAS/VPN server to verify your user name and password could not be matched
with the settings in your connection profile.
Note
Windows 7 does not support the MS-CHAPv1 authentication methods.
After the connection is created, you can use it at any time by opening the list of network
connections in the Network and Sharing Center or by clicking the Network icon in the
notification area.
This topic explains how to set up and view the status of an incoming VPN session on a Windows 7
device by creating a new incoming connection, modifying protocols and services settings, viewing
the connection status, and opening the new VPN connection.
8-8
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Creating a new incoming connection is not straightforward as creating an outbound VPN session.
There is no standard link for creating the inbound connection within the Network and Sharing
Center. To see the New Incoming Connection option, open the Network and Sharing Center and
click the Change Adapter Settings link. Press the ALT key to view the File menu. On the File
menu, select the New Incoming Connection option.
The first window prompts you for the names of the users that should be allowed to connect to the
VPN server.
You can modify the protocols and services available through the VPN server for greater security.
Typically, most connections need the IPv4 protocol and the File and Printer Sharing for Microsoft
Networks service.
After creating the connection, view the status of incoming sessions in the list of network
connections by opening the Network and Sharing Center and selecting the Change adapter
settings link. You can also disconnect the incoming connection from here.
8-10
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Remote Access and Mobile Computing
Windows 7 DirectAccess
Windows DirectAccess is a new technology that may make VPN technology obsolete. Windows
DirectAccess is a remote access tool that allows secure connections over the Internet without using
a VPN connection.
With VPN, just like DirectAccess, a remote user can to connect over the Internet and access
resources inside the corporate network, but the similarities end here. With VPN, the back-end
server must be set up and managed along with the connections. The VPN process is also a costly
process to manage. With VPN other issues exist as well. For example, many businesses have
visitors that need to connect to their own corporate offices to place orders or send e-mail. These
visitors try to establish a secure VPN connection, only to find out that firewalls block their
connection or they simply cannot connect.
With DirectAccess, the entire corporate network file shares, intranet Web sites, and any LOB
applications remain accessible wherever the user is if an available Internet connection exists.
This topic describes DirectAccess, the benefits of DirectAccess and its DirectAccess requirements
for servers, clients, and networks. It also describes the process of installing and configuring
DirectAccess.
DirectAccess Explained
8-12
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
DirectAccess Benefits
Works flawlessly with Terminal Services RemoteApp and the AppLocker features.
Provides enhanced network security. DirectAccess supports authentication at the
computer level and the user level.
Supports multifactor authentication with various technologies so you can easily deploy
smart card or thumbprint scanners as a second level of authentication before users are
allowed to connect to the DirectAccess mechanism in place.
DirectAccess technology secures the transmission by using IPv6 over IPSec. This mechanism
encrypts communications transmitted across the Internet, a volatile network. The communication
stream has real traffic-shaping mechanisms built in. This allows only traffic destined for the
corporate network to pass through to the Windows Server 2008 R2 DirectAccess server. With
advanced configurations, the administrator can choose to send all the communication through the
DirectAccess Windows Server 2008 R2 device, if necessary.
Helpful Hint
One of the other major benefits of the DirectAccess process is that you
can force updates down to the Windows 7 and Windows Vista devices
without waiting for them to connect to the VPN. Many companies pass
down updates as the client computers connect to the corporate VPN
server. The problem is that you cannot tell exactly when the client
computers will connect to the VPN server. Some client computers
connect daily and some connect once every two months. With
Windows DirectAccess, you can force updates anytime your client
computers connect to the Internet. The client computer negotiates and
connects even before the user logs on. You can configure a message
telling users that an update is being installed on their device from the
corporate office or the updates can happen behind the scenes.
DirectAccess Requirements
8-14
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Firewall exceptions are required on the Internet facing firewall on the DirectAccess server. The
following exceptions are necessary:
Installing DirectAccess
Configuring DirectAccess
Due to the variety of services and additional configuration that is necessary, the Windows
Server 2008 R2 DirectAccess technology is a complex technology to set up. However, after
performing the initial configuration, ongoing management is relatively easy, except for occasional
updates. You do not have any complex VPN connection objects to create or to manage. You need
some simple certificates and a client that is already embedded within the Windows 7 operating
system to complete the installation and configuration.
The Windows Server 2008 R2 provides the DirectAccess Management Console for managing the
DirectAccess processes and server-side configurations. From this console, you can see if issues
exist with the DirectAccess services and configurations or client connections.
8-16
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Remote Desktop
This topic describes the features and enhancements of Remote Desktop. Figure 253 lists the
subjects described in this topic.
Remote Desktop provides a user with the ability to remotely connect to his or her Windows 7
computer desktop. The connection is very fast and allows for an experience that is just like sitting
at the desktop of the physical computer.
Remote Desktop performs very well even over slower WAN connections. The Remote Desktop
service is highly optimized for displaying Windows content, and uses compression technology to
reduce bandwidth consumption.
Remote Desktop is not a true remote control type product. The desktop of the remote device will
go to a locked workstation console when a remote user is connected.
Helpdesk and other administrative users constantly connect to users devices to fix simple issues
and to make routine configurations. Windows 7 provides the latest RDP connection utility known
as RDPv7. The RDPv7 connection utility fully supports Windows 7 Aero, as well as, all Direct2D
and Direct3D 10.1 applications. You no longer have to use a single monitor. You can have your
workstation monitor that displays your helpdesk clients and an external monitor that shows the
desktop of the users device to which you are connected.
Behind the scenes, the RDP client is redesigned to give you better performance over a variety of
network connections as well as better multimedia performance with several key multimedia
enhancements. The enhancements include support for the following:
Streaming media
Media Foundation
DirectShow
Low latency audio playback
Bidirectional audio
8-18
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
RemoteFX is a new technology included with Windows Server 2008 R2 SP1 and Windows 7 SP1.
It is designed to enhance the visual capabilities of Remote Desktop clients connected to a
Windows 7 virtual device running on Hyper-V R2 SP1. RemoteFX allows for 3D graphics
capabilities, OpenGL, full motion video, and USB redirection support. The server requires a
DirectX 10.0 capable graphics card and supports two to four clients per GPU depending on
resolution. Microsoft based RemoteFX on technology it acquired with the purchase of Calista
Technologies.
Using RemoteFX USB redirection, USB devices can be installed and used in the remote VDI
session. Also with RemoteFX USB redirection, many devices like scanners, multifunction
printers, webcams, and others can be used in the virtual device via the RDP session.
For all of the RDPv7 connection features to work, you have to enable remote access to and from
your devices by navigating to Control Panel, System and Security, System, and clicking the
UAC-protected Remote tab.
The Remote tab displays options for two types of remote access: Remote Assistance and Remote
Desktop. Remote Assistance allows you to configure access for users accessing your devices using
the invitation framework provided by Windows 7. With Remote Desktop, you can select the types
of connections users can make. For example, you can allow connections with older versions of
RDP clients, or you can set up a more secure environment and let users connect only if they have
the newest RDP connection utility, which uses network level authentication.
Note
Users that connect must be members of the RDP users group or they
must be administrators who already have membership within the RDP
users group.
8-20
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
If your connection to the remote device fails, one of the first things you should check after you
check the remote settings is the firewall. If the firewall is blocking port 3389, the RDP cannot
establish a connection to a remote device. Depending on the type of firewall you are using, you
may have to create an incoming and outgoing rule allowing the passage of port 3389.
If you are using the Windows Firewall, you can simply create an exception for the RDP by
choosing the appropriate firewall exception for Remote Assistance or Remote Desktop and then
choosing the network category on which you need the protocol.
Note
Make sure that you understand the ramifications of opening firewall
ports. Also, close any and all ports that you will not be using. This
ensures that your network is as safe as possible.
The following topics explain how to create a connection to a Remote Desktop server.
Once you configure Remote Desktop Connection settings in Windows 7, you can launch the
RDPv7 Connection utility and create a connection to another device. To access the utility, you can
type remote or mstsc.exe in the Search box or click Start, All Programs, Accessories, and
Remote Desktop Connection.
The RDP Connection utility contains six tabs: General, Display, Local Resources, Programs,
Experience, and Advanced.
8-22
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
General Settings
Use the General tab to configure the connection-specific information, such as the computer name
and the user name that you use to connect to the device. The Computer field can contain an
FQDN, an IP address, or a NetBIOS name if you are using WINS. You can also save the
connection information you create to an RDP file, which can be used by other devices or used at a
later time.
Display Settings
Use the Display tab to begin the configuration for what Microsoft calls the Desktop Experience.
Using the Display tab, you can do the following:
Configure the display resolution of the connection. You can set the display resolution
to higher or lower by using the slider bar.
Select to use all of your monitors for the remote connection by selecting the Use all my
monitors for the remote session check box.
Configure the number of colors that are displayed over the connection.
Note
Higher resolutions and colors do require more resources. The rule is to
keep the configuration to a minimum to preserve the resources of the
connection.
8-24
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Remote Access and Mobile Computing
Use the Local Resources tab to configure which local resources are available during the remote
session to the remote device. For example, if you want to transmit sounds that are generated on the
remote device over the network to your device, click the Remote Audio Settings button and make
the correct selection. You can also choose to record remote audio from the remote device over the
network to your device.
In the Keyboard area, you can configure the behavior of your keyboard when you use multiple
key combinations such as CTRL+ALT+DELETE. You can configure the multi-keystroke to
toggle your local computer or the key combination to activate a process on the remote device.
In the Local devices and resources area, you can configure the devices and resources that are
available in your remote sessions, such as printers and the Windows keyboard. With the More
button, you can choose smart cards, ports, local drives, and other PnP devices.
Programs Settings
The Programs tab within the Remote Desktop Connection dialog box allows users to configure an
application that they want to start automatically after a remote desktop connection is established.
This option is often used within a call center environment. These clients connect to a terminal
server, and their call center application starts automatically after a successful log on.
8-26
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Experience Settings
Use the Experience tab to toggle on or off the items that can slow the desktop connection down
because of the rendering of excessive data over the connection. You can allow or disallow the
following options:
Desktop background
Font smoothing
Desktop composition
Show window contents while dragging
Menu and window animation
Visual styles
Persistent bitmap caching
You can also choose the connection speed of the network. The Choose your connection speed to
optimize performance drop-down list contains the following choices:
Advanced Settings
Use the Advanced tab to secure connections to authenticated servers with the server
authentication options. If a server authentication fails, the connection has three behavior options:
Warn me
Connect but dont warn me
Do not connect
You can also configure the connection behavior for devices that are connecting remotely outside
the network through a remote desktop or TS Gateway server. Use the Settings button to enter the
required connection information or tell Windows 7 to automatically discover the settings.
8-28
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Gateway Settings
Using the Remote Desktop Gateway feature, you can set up a server as a gateway to other Remote
Desktop hosts. The connection is very secure, operating over an SSL connection using port 443 by
default. You can use this in lieu of a VPN connection for accessing RDP servers on a private
network.
Windows 7 takes into account that laptops, notebooks, and other portable computers have a
completely different set of requirements than desktop computers. Windows 7 contains many new
features for the mobile computer users.
Previously, portable computers were treated as if they were desktop computers that folded up and
had batteries. Microsoft has changed its approach with Windows 7 and portable computers. This
new philosophy led to many changes such as faster boot and shutdown times and extended battery
preservation times. A major focus of Windows 7 is drivers.
With Windows Vista, faulty drivers do not allow a computer to efficiently go into sleep mode.
This causes a great amount of battery drainage on the system. With Windows Vista, computers
have problems moving from a suspended state to an awake state, connecting to projectors with 4:1
aspect ratios, switching between Wi-Fi networks in real time, and issues with power management.
Microsoft dealt with all of these issues with the Windows 7 operating system.
This topic describes the power management features of Windows 7, including power options,
power plan settings, custom power plans, the Windows 7 Mobility Center, and the battery meter.
8-30
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Power Options
To access the power options, navigate to Control Panel, Hardware and Sound, and click the
Power Options link. The Power Options window contains two power options, as opposed to
Windows Vista, which had three power plans. The two power plans are Balanced
(recommended) and Power saver. These plans toggle the power plan settings between a
performance and an energy savings power plan. Options to customize these plans are available
both manually and through the use of Group Policy from the Windows Server 2008 R2 server.
More advanced power management settings are available through Group Policy. You can
configure power management settings such as adaptive display brightness settings, reserve battery
notification level, and automatic sleep with open network files. Now administrators can decide
which settings to enforce and which to configure as default settings that users can later modify.
By default, Windows 7 is configured to turn off a computers display after 10 minutes and to put
the computer to sleep after 30 minutes. To change these settings, navigate to Control Panel,
Hardware and Sound, Power Options, and Edit Plan Settings. Figure 270 shows the Edit Plan
Settings window and the Advanced Settings tab in the Power Options dialog box.
8-32
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Use the following recommendations as guidelines for the Hybrid sleep settings.
Hard disk Turn off hard disk Set it to at least one minute before the computer is set
to sleep.
Sleep Sleep after Set it to at least one minute after the hard disk and the
display are set to turn off. This setting is for the
computer.
Sleep Allow hybrid sleep Set it to On.
Sleep Hibernate after Set it to at least one minute before the computer is set
to sleep and at least one minute after the Sleep after
setting.
Power buttons and lid Start menu power Set it to Sleep.
button
Display Turn off display after Set it to at least one minute before the computer is set
to sleep. You should set the display the same as the
hard disk time.
Multimedia settings When sharing media Set the Allow the computer to sleep setting to prevent
the multimedia from waking up the computer.
Figure 271: Hybrid Sleep Settings
Hibernate Settings
Windows 7 provides hibernation as a power-saving state that saves your open documents and
programs to your hard drive and then turns your computer off. Use the following
recommendations as guidelines for the hibernate settings.
Hard disk Turn off hard disk after Set it to at least one minute before the computer is set to
sleep.
Sleep Sleep after Set it to Never.
Sleep Allow hybrid sleep Set it to Off.
Sleep Hibernate after Set it to at least one minute after the hard disk and the
display are set to turn off.
Power buttons and lid Start menu power Set it to Hibernate.
button
Display Turn off display after Set it to at least one minute before the computer is set to
hibernate. You should set the display the same as the
hard disk time.
Multimedia settings When sharing media Set the Allow the computer to sleep setting to prevent
the multimedia from waking up the computer.
Figure 272: Hibernate Settings
Display Settings
After a computer is inactive for 10 minutes, by default the monitor is set to turn off. To change the
default display settings, go to Control Panel, Hardware and Sound, Power Options, Edit Plan
Settings, and click the Turn off the display drop-down menu. Remember to pass these settings
down and lock them through the Group Policy.
Sleep Settings
You can also change the Sleep mode settings to protect your data. To access the settings, go to
Control Panel, Hardware and Sound, Power Options, Edit Plan Settings, and click the Put
the computer to sleep drop-down list.
Use the following recommendations as guidelines for the Sleep settings. You should pass these
settings down to your clients so that you have a consistent power management configuration
throughout the enterprise. Sleep mode protects any open documents and programs by committing
them to RAM. The sleep process then puts the computer into a low-power state. If you lose power
to the computer, you also lose the information stored in memory.
Hard disk Turn off hard disk Set it to at least one minute before the computer is
after set to sleep.
Sleep Sleep after Set it to at least one minute after the hard disk and
the display are set to turn off. This setting is for the
computer.
Sleep Allow hybrid sleep Set it to Off.
Sleep Hibernate after Set it to Never.
Power buttons and lid Start menu power Set it to Sleep.
button
Display Turn off display after Set it to at least one minute before the computer is
set to sleep. You should set the display the same as
the hard disk time.
Multimedia settings When sharing media Set the Allow the computer to sleep setting to
prevent the multimedia from waking up the computer.
Figure 273: Sleep Settings
8-34
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Certain conditions and hardware require a completely unique power profile. If that is the case,
you may have to create a completely new custom power plan. Follow these steps to create a new
power plan.
1. In Control Panel, click the Power Options link.
2. In the Power Options window, click the Create a power plan link. The Create a power
plan window appears.
3. Select one of the three options:
Balanced (recommended)
Power saver
High performance
4. Follow the prompts to configure the power plan.
5. Give the power plan a name and save it.
The plan is now available for you to use from the Power Options window. Also, the settings are
stored and protected in the registry.
The Windows Mobility Center utility is a one-stop location for configuration items that are
pertinent to notebooks, laptops, and tablet computers. The configuration items include:
Display
Audio for the speakers
Battery and power plan options
Wireless networking
External displays
Windows synchronization settings
Presentation settings
8-36
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Battery Meter
With previous desktop operating systems, the low battery user interface often showed the wrong
status. Windows 7 contains a new interface that provides more timely and accurate information
about the status of the battery.
When the battery is down to 7 percent power, a warning message displays. The message does not
go away until you take some action. The low battery threshold is also configurable.
In Windows 7, the notifications are more visible and occur more frequently than in previous
desktop operating systems. All of these low battery indications and settings are also configurable
using the Windows Server 2008 Group Policy.
Using the Offline Files and Folders technology, a user can access files on a server over the
network, yet have those files cached locally on his or her Windows 7 computer in the event he or
she disconnects from the network. With this features, server-based files become usable when the
person is traveling and network connectivity is not available.
Windows 7 carries over the Offline Files and Folders utility from older Windows versions. The
utility is available when you install Windows 7. You need to configure your servers to support
offline files and folders and you need to configure which files you want available offline on
the client.
8-38
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Use the Offline Files dialog box to make additional changes to the synchronization settings. You
can access the offline files settings by opening the Sync Center from Start, All Programs, and
Accessories.
Another way to access the offline settings you want to control and manage is by typing offline at
the Start menu Search box.
The Offline Files dialog box contains four tabs: General, Disk Usage, Encryption, and Network.
These tabs are used to:
You can set the offline process to check the network bandwidth at a pre-determined time interval.
The default is five (5) minutes. Once a slow network is detected, your device works offline as if
you are not connected to the network. This cuts down on unnecessary bandwidth usage. Once the
network speed has increased, you are automatically placed back in an online status and
synchronization updates the network location with any bit-level changes that may have happened
while you were working offline.
You can also force your device to work online if you are working offline by using the Windows
Explorer to navigate to the mapped drive and clicking the Work Online button. You are then put
in an online status and the clock resets to five (5) minutes before the offline process checks for a
slow network.
To make a file or folder available offline, right-click the file or folder in Windows Explorer and
select the Always available offline option. The data synchronizes with the local resource. When
users disconnect from the network, a second synchronization occurs and any bit-level changes are
copied to the computer that is disconnecting. Users are then free to disconnect and leave the office.
The cached data remains active on the laptop or other mobile computer and is available as needed,
even as the device disconnects from the network.
8-40
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
The Windows 7 Sync Center is a central location where you can view synchronization progress,
and resolve any synchronization conflicts or errors.
The Sync Center has been around since the introduction of Windows Vista. Use the Sync Center
for the following tasks:
Monitor and manage all types of synchronization between the Windows 7 operating
systems and devices.
Manage the synchronization between the mapped drives and the Windows 7 devices.
Manage the synchronization of e-contacts with a PDA.
Manage the synchronization of MP3 players and other audio devices that are used by
the Windows Media Player.
Drive the offline files mechanism and the configurations you make to the offline file
process.
To access the Sync Center, go to Control Panel and click the Sync Center link.
You can easily review the results of your synchronizations with your devices and your offline
files. To view the synchronization results, click the View sync results link in the Sync Center
window.
Acronyms
The following acronyms are used in this section:
2D two dimensional
3D three dimensional
AD CS Active Directory Certificate Services
CMAK Connection Manager Administrator Kit
CRL certificate revocation list
DNS Domain Name System
EAP-MSCHAP Microsoft Challenge-Handshake Authentication Protocol version 2)
FQDN fully qualified domain name
GPU graphics processing unit
HTTPS Hypertext Transfer Protocol Secure
ICMP Internet Control Message Protocol
IKEv2 Internet Key Exchange version 2
IP Internet Protocol
IPSec IP Security
IPv4 Internet Protocol version 4
IPv6 Internet Protocol version 6
ISATAP Intra-Site Automatic Tunnel Addressing Protocol
Kbps kilobyte per second
L2TP Layer 2 Tunneling Protocol
LAN local area network
LOB line of business
Mbps megabytes per second
MS-CHAP Microsoft Challenge Handshake Authentication Protocol
NAP Network Access Policy
NetBIOS Network Basic Input/Output System
PDA personal digital assistant
PKI public key infrastructure
PnP Plug and Play
PPP Point-to-Point Protocol
PPTP Point-to-Point Tunneling Protocol
RAM random access memory
RAS Remote Access Service
RC Release Candidate
RDP Remote Desktop Protocol
RSA Rivest, Shamir, and Adleman
8-42
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Section Review
Summary
Windows 7 supports the following VPN protocols:
PPTP: Provides ease of setup, but is slower and less secure than other VPN
options.
L2TP: Provides better speed and security than PPTP, but requires more effort to
configure.
SSTP: Provides for a very secure VPN connection, while needing less setup
involved than L2TP.
The DirectAccess benefits include the following:
Provides always-on connectivity
Provides seamless connectivity
Provides bidirectional access
Contains improved security
Provides an integrated solution
Works flawlessly with Terminal Services RemoteApp and AppLocker features
Provides enhanced network security; supports authentication at the computer level
and the user level
Supports multifactor authentication with various technologies
Secures the transmission by using IPv6 over IPSec
The features of the Remote Desktop version 7 utility include the following:
Windows 7 users can access the console of another Windows 7 or Windows
Server 2008 machine.
The remote desktop looks exactly like the local desktop.
Connection is incredibly fast on a LAN.
Performance is very good even on a WAN connection.
Provides seamless access to local devices and resources.
Takes Over the desktop session of the remote computer
To allow Remote Desktop to communicate through Windows Firewall, choose either
the Remote Assistance or Remote Desktop option and then choose the network type.
Windows 7 contains three standard power management plans::
Balanced (recommended): Balances the computer performance with energy
consumption
Power saver: Saves energy by reducing computer performance
High performance: Increase computer performance by consuming more energy.
With properly configured offline files and folders settings, you can access and work
with individual files or complete folders that are stored on the network when you are
not connected to the network or when the server is unavailable. To enable the offline
feature:
1. Right-click the item.
2. Select the Always available offline option.
8-44
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
You can configure the following offline settings in the Offline Files dialog box:
o General: View and disable offline files or automatically synchronize offline
files.
o Disk Usage: View and change the size of the offline file store.
o Encryption: Protect the files in the offline file store from unwanted users.
o Network: Adjust the synchronization behavior of offline files during slow
network times.
Knowledge Check
1. Does Windows 7 provide a VPN connection object within the Windows 7 Accessibility location in
Control Panel?
2. To allow Remote Desktop to communicate through the Windows 7 Firewall, you must create an
incoming and outgoing rule allowing the passage of port 3389.
a. True
b. False
3. For each power plan, write a brief description in the space provided.
Power saver:
Balanced:
5. Does Windows 7 RDP support the Aero initiative across TCP/IP networks?
7. When configuring the sleep mode settings for your laptop, what should you set the Start menu
power button to?
8. Which of the following settings can you configure when connecting to a remote computer using
Remote Desktop? (Choose all that apply.)
a. Display settings
b. Experience settings
c. IPSec policies
d. Gateway Server Settings
9. The DirectAccess Management Console can be installed from the Group Policy Management
Editor.
a. True
b. False
8-46
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Windows 7 Remote Access and Mobile Computing
8-48
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
8. Which of the following settings can you configure when connecting to a remote computer using
Remote Desktop? (Choose all that apply.)
a. Display settings
b. Experience settings
c. IPSec policies
d. Gateway Server Settings
9. The DirectAccess Management Console can be installed from the Group Policy Management
Editor.
a. True
b. False
The DirectAccess Management Console must be installed using the Server Manager.
10. List the VPN technologies that are supported by Windows 7.
PPTP: Provides ease of setup, but is slower and less secure than other VPN
options.
L2TP: Provides better speed and security than PPTP, but requires more effort to
configure.
SSTP: Provides for a very secure VPN connection, while needing less setup
involved than L2TP.
8-50
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
13
Running and Troubleshooting
Applications
Section Topics
Application Compatibility Tools
Windows 7 File and Registry Virtualization
Windows Virtual PC with XP Mode
Section Objectives
Section Overview
An operating system is only as good as the applications that it can run. A new operating system
that cannot run the applications that make you productive is an operating system that does nothing
for your business. Windows 7, like Windows Vista, takes into account the usefulness and
compatibility of applications. This section introduces the Windows 7 tools and other stand-alone
utilities used for application compatibility, remediation, and mitigation.
13-2
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
You can use the Windows 7 application compatibility tools to quickly and temporarily bring an
application into compatibility. The tools adjust the environment variable of the Windows 7
computer to emulate another environment such as Windows XP or Windows 2000.
Following is a description of the tools that are available for application compatibility in
Windows 7.
Figure 433 lists the subjects described in this topic.
The Program Compatibility Wizard is located in the Programs category of Windows 7 Control
Panel. To run the wizard, click the Run programs made for previous versions of Windows link.
The wizard guides you through the simple process of configuring your incompatible application to
function.
The first step in using the Program Compatibility Wizard is to choose the application that has
trouble running on Windows 7.
You can let Windows choose compatibility options for you by selecting the Try Recommended
Settings option. For more control, you can select the Troubleshoot Program option and answer a
series of questions about the problems you are having with the program.
13-4
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
When you select the manual method, you must choose the Windows environment that the
application was originally intended for. For instance, if the application was designed for
Windows XP, then choose the compatibility mode for Windows XP (SP 2). This adjusts the
default Windows 7 environment to emulate the Windows XP environment as best it can. Once the
wizard changes the settings, leave the wizard open and run the application using the new settings.
If the application runs, then complete the final steps of the wizard and solidify the environment
settings as they pertain to the application.
Helpful Hint
Selecting the Troubleshoot program option and manually
troubleshooting does not change the security of the Windows 7
environment at all. You are not violating anything that Windows 7
deems a risk, so the wizard might fail to produce the desired results.
Compatibility Tab
The Compatibility tab is available in the properties dialog of a program or shortcut. All of the
settings that are configured in the Program Compatibility Wizard are actually reflected here. To
set the compatibility options more quickly, you can go directly to the Compatibility tab and set
the options manually.
The SUA (Standard User Analyzer) tool enables you to test your applications and to monitor API
requests to detect potential compatibility issues due to the UAC feature in both Windows Vista
and Windows 7. UAC requires all users, including administrators, to operate as standard users
until the application is elevated by acknowledging the UAC prompt. Not all applications can run
properly with the Standard User role if the application requires access and privileges that are
unavailable to a standard user.
13-6
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
You can use other tools to help you to discover issues with applications before they are
implemented, which can fix the problematic applications.
The SUA is a tool that tests the performance of an application under the strict guidelines of a
standard user. Remember, Windows Vista and Windows 7 require that all users, regardless of
group affiliation, interact with the operating system as a standard user. For security purposes,
some programs require interaction with the Windows platform by an administrator. The Windows
7 platform limits the use of administrative privileges by default. The SUA attempts to mitigate
problems before they are experienced in a live situation.
The tool analyzes your application during the installation and transparently records a log of what
action is taking place during the installation process. The tool generates a detailed report showing
what the program is attempting to access. Hard access can be defined as file system access in the
context of the administrator.
While the SUA does not repair any of the problems that it finds, it gives the administrator the
information required to avoid any issues during the application compatibility testing phase of the
Windows 7 migration.
13-8
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
The Standard User Analyzer is available as a single download or as part of the ACT (Application
Compatibility Toolkit) version 5.5. The ACT version 5.5 provides a suite of application tools such
as the Compatibility Administrator, Application Compatibility Manager, Internet Explorer
Compatibility Test Tool, Setup Analysis tool, Standard User Analyzer wizard, and the Standard
User Analyzer tool. These tools can help you during your application-testing phase, and you can
download them for free.
For these tools to function properly, ensure that you have the proper user context and access to run
them. The tools let you know if you do not have the proper permissions. For all of the tool features
to function properly, you have to log on to your Windows computer with administrative privileges
or rights.
Compatibility Administrator
You can use the Windows Compatibility Administrator tool to repair an application that is
experiencing problems with Windows Vista or Windows 7. You can adjust the environment
variable settings for an application to ease the requirements for run-time functionality. The tool
contains a database of thousands of patches and fixes for some popular applications. You need
more than just a basic understanding of development and application packaging to productively
use this tool.
Many compatibility fixes are available to make your program mitigations more straightforward.
These fixes provide detail on the issues resolved, such as registry and file system permissions that
you can use to resolve specific compatibility issues.
13-10
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
With the new database tool, if an application, such as an in-house application, does not have a fix
already in the database, you can create your own. You can choose from three new objects types to
pair with the database. As shown in Figure 445, the three new objects are Application Fix,
Apphelp Message, and Compatibility Mode. You can also add the application in question to the
database and create these fixes for it.
Using the ACM (Application Compatibility Manager) tool, you can collect data and analyze your
environment, so that you can resolve issues prior to deploying a new operating system in your
organization.
The basic ACM functionality is quite important. You can use the tool to navigate around the
network and gather information about Windows XP SP2 or SP3, Windows Vista, Windows Vista
SP1 or SP2, and Windows 7 computers. The Application Compatibility reports show the installed
applications, the application packages, and the computers and other devices that are under each of
the operating system categories. Along with this information, the reports also list any
compatibility issues that exist under each operating system.
13-12
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Running and Troubleshooting Applications
Windows Vista introduced a new method of executing and managing applications. This method,
called Windows file and registry virtualization, still applies to the Windows 7 operating system.
Following is a description o f the Windows 7 file and registry virtualization process for application
compatibility and security. Figure 448 lists the subjects described in this topic.
Several things happen when you install an application. The program needs to set itself up in two
main locations, the registry and the Program Files group. Unfortunately, when the application has
problems, these locations are left vulnerable to corruption. The file and registry virtualization
method limits the effects of an application corruption issue.
With the file registry and virtualization feature, when a user installs an application, the installation
process creates a virtual store. This virtual store contains all of the typical installation files and a
copy of the appropriate registry location instead of writing to the live registry and file system. The
theory is simple: if the application crashes or becomes compromised with a virus, a bad macro, or
a driver, then the virtual store becomes corrupt. This action preserves the integrity of the live
registry and the Program Files group. Figure 449 shows the file and registry virtualization process
flow during the read and write phases. Notice the behavior during the write phase. If users have
the appropriate permissions, they can write to the Program Files group. Therefore, the local
administrator has access to the live locations as well as the virtualized locations.
13-14
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Virtual Store
File and registry virtualization is a feature of the UAC that protects the registry and the Program
Files group from being manipulated by applications that standard users install or run in the context
of their standard user accounts.
The process works in a simple method. When an application attempts something that is considered
dangerous, for example write to an .ini file such as c:\program files\BadApp\options.ini,
Windows detects that the users privileges do not allow him or her to write to that location.
Instead, the file and registry process copies options.ini to
c:\users\yourAccouneName\AppData\Local|VirtualStore\Program Files\
BadApp\Options.ini. The file and registry virtualization process then lets the modification
proceed.
The same process happens for the registry values associated with the
HKEY_LOCAL_MACHINE registry hive. By protecting these two volatile locations, the
Program Files group and the HKEY_LOCAL_MACHINE registry hive, the process, hopefully,
keeps your machine more stable over its usage.
When the UAC protected and managed application runs, it runs safely in the virtual store. In this
location, the applications process can safely manipulate a copy of the protected files. Running the
older application from this protected location maintains the security of the Windows 7 operating
system.
You can turn off the file and registry virtualization within the UAC policy settings under the local
security policy.
File and registry virtualization is a function of the UAC mechanism that is part of the local
security policy of a computer. Access the UAC locations by navigating to the LSP location and
follow the path: Local Policies/Security Options. Enable or disable the file and registry
virtualization process by clicking the UAC security setting in the list, User Account Control:
Virtualize file and registry write failures to per-user locations.
13-16
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Helpful Hint
File and registry virtualization is a powerful tool that helps you to
maintain the stability of your Windows 7 desktops and their
applications. A best practice is to leave it enabled.
Figure 452 shows several other UAC features that pertain to UIAccess applications and their
efficient operation. One of these is the User Account Control: Allow UIAccess applications to
prompt for elevation without using the secure desktop setting. For User Interface Accessibility
applications, it automatically disables the dim secure desktop during the initialization period.
Some types of applications are unable to function with the secure desktop. This configuration
turns off the secure desktop for User Interface Accessibility applications, such as the Windows
Remote Assistance.
The Detect application installations and prompt for elevation UAC setting controls whether
users can install applications on their desktops. This configuration requires that users have
administrative privileges during the installation process. If users do not have administrative
privileges, the installation does not start.
Helpful Hint
Applications that do not require administrative privileges install
regardless of this setting.
The User Account Control: Only elevate executables that are signed and validated setting
further controls application installations. This option configures the application installation and
execution permissions with the use of a PKI. It partners the application with a code-signing
certificate generated by a CA. You simply add these certificates to the Trusted Publishers
certificate store on the users local computers. If a valid certificate exists in the Trusted Publishers
certificate store for an application, then the application completes the installation and runs
successfully on the device.
Note
Troubleshooting applications involved with this type of environment
can be difficult without a working knowledge of the PKI in place at your
business.
The User Account Control: Only elevate UIAccess applications that are installed in secure
locations setting. UIAccess applications that are not located in one of the systems secure locations
cannot launch. The default secure locations include:
Occasionally, you may find applications that do not function on a new operating system, or do not
run in any compatibility mode. A possible solution to the problem is to run the application on its
intended operating system. This is possible due to virtual technologies that can assist you with this
problem. The Microsoft Virtual PC platform runs applications not designed for Windows 7. Using
Microsoft Virtual PC, a single computer can perform all of this.
Figure 453 lists the subjects described in this topic.
13-18
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
The issue with running virtualized applications on the desktop is that the user has to log on to one
desktop for his or her new features and then log onto the other virtual desktop to run the legacy
applications. This is an unpleasant task for some users, because it is easy for them to become
confused regarding which desktop is currently in use.
Windows 7 provides the use of Virtual PC technology with one major improvement. Users do not
have to log on to another desktop to use Windows XP-based applications. The new Windows
Virtual PC with XP Mode, a free download for Windows 7 users, is a tool that contains a
Windows XP virtual machine you can open and log on to. For any applications that do not
function on Windows 7, install them directly on the Windows XP virtual machine. Once you
finish and log off the Windows XP virtual machine, you can access the applications from the
Windows 7 programs list as if they were installed on the Windows 7 machine. Users do not need
to switch back and forth to use the applications. This eases user confusion, which reduces the
number of help desk calls and increases productivity.
When the Virtual PC application installation is complete and the Windows XP Mode virtual
machine from Microsoft is downloaded, the Windows XP Mode virtual machine automatically
registers with Virtual PC. Additional virtual machines can be created in Windows Virtual PC so
that you can run other operating systems as well.
To create a new virtual machine, click Start, All Programs, Windows Virtual PC, and then click
Windows Virtual PC. In the Virtual Machines window, click the Create Virtual Machine
button.
13-20
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Using the Virtual PC, you can adjust the virtual machine settings such as the memory used and the
network setting for the network interface card and for the hard drives. Remember to also enable
the virtual machine integration features, which make the physical hardware and the virtual
operating system work more smoothly and efficiently together.
The requirements for Microsoft Virtual PC are as follows:
Windows Clipboard
USB device support
Printing
Physical hard drive availability
Mouse movement between the host machine and the virtual machine seamlessly
To publish virtual applications from a guest operating system to the Windows 7 host, your guest
operating system must be one of the following:
Windows XP Professional SP 3
Windows Vista Enterprise
Windows Vista Ultimate
Windows 7 Enterprise
Windows 7 Ultimate
Windows XP Mode is a free copy of Windows XP prepackaged inside a virtual machine. You can
download this VM from Microsoft and run it free of charge as long as you own Windows 7.
After you meet all of the prerequisites, it should be very easy to build your environment. Start the
Windows XP Mode virtual machine and install your applications. If your installation does not
create a shortcut, you need to create a shortcut from the application install folder to the All Users
Start Menu folder. You can now turn off (not hibernate) the Windows XP virtual machine. The
user should now be able to find the virtualized applications within his or her Program Files group
on the Windows 7 machine.
13-22
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Launching Windows XP mode launches a virtual machine that Windows XP is installed in. If the
VM was running previously, it resumes from a saved state.
After launching Windows XP Mode, the VM appears inside a window on the local Windows 7
desktop. You may interact with Windows XP normally, by using the mouse and the keyboard.
You can also take Windows XP Mode into and out of full screen mode by using the Action menu,
or by pressing the CTRL+ALT+PAUSE key sequence.
Install any applications that you cannot run on Windows 7 inside the Windows XP Mode virtual
machine. Once the application is installed, it actually appears as a shortcut on the Windows 7
Start menu. When you launch the application from the Windows 7 shortcut, the application
launches in a single window all by itself. It does not appear like it is running inside a VM, even
though the VM is really running in the background.
13-24
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Acronyms
The following acronyms are used in this section:
Section Review
Summary
You use the following Windows 7 application compatibility tools to quickly and
temporarily bring an application into compatibility:
The Program Compatibility Wizard: Use this step-by-step process to help you
configure your incompatible application to run on Windows 7.
Compatibility tab: Use this tool to manually change the compatibility settings in
the Properties dialog box of the application.
Standard User Analyzer: Use the SUA tool to test an application and to see how
it performs under the strict standard user guidelines.
Windows Application Compatibility Toolkit 5.5: Use this free suite of
application tools during the application-testing phase. In addition to the SUA tool,
the ACT contains the Compatibility Administrator, Application Compatibility
Manager, Internet Explorer Compatibility Test Tool, and Setup Analysis Tool
Several UAC features exist within the local security policies that pertain to UIAccess
applications and their efficient operation:
Virtualize file and registry write failures to per-user locations: Enables the file
and registry virtualization process.
Allow UIAccess applications to prompt for elevation without using the secure
desktop: Disables the dim secure desktop for User Interfaces Applications, such
as Windows Remote Assistance.
Detect application installations and prompt for elevation: Enables only users
with administrative privileges to install applications on their desktops.
Only elevate executables that are signed and validated: Allows applications to
install only if a valid certificate exists in the Trusted Publishers certificate store for
an application.
Only elevate UIAccess applications that are installed in secure locations:
Enables or disables the launch of UIAccess applications that are not located in a
secure location.
Windows Virtual PC with XP mode launches legacy applications in older versions of
Windows inside a VM.
Before you can use the Windows Virtual PC with XP mode, you must download and
install the free copy of the Virtual PC application and the Windows XP mode virtual
machine. Once you install the free downloads, you can open the Windows XP mode
VM and install any applications that cannot run on Windows 7 inside the VM.
Installing an application in the Windows XP VM creates a shortcut on the Windows 7
Start menu. After installation, you can open an incompatible application in the VM by
clicking on the shortcut in the Windows 7 Start menu.
13-26
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
Running and Troubleshooting Applications
Knowledge Check
1. Can you turn off the Windows file and registry virtualization within the Windows plan?
2. Can you use the Windows Virtual PC with XP Mode on 64-bit systems?
4. Using the Standard User Analyzer tool, you can manipulate the local security policies that pertain
to User Interface applications.
a. True
b. False
5. Which of the following tools are components of the Application Compatibility Toolkit v 5.5?
(Choose all that apply.)
a. Internet Explorer Compatibility Test tool
b. Compatibility Administrator
c. Compatibility tab
d. Setup Analysis tool
e. Standard User Analyzer
13-28
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
13-30
Administering
Adminnistering
and Maintaining Windows 7
Global
Gloobal Knowledge Training LLC L
LL
TechSherpas
Table of Contents
Lab 0: Configuring the Lab Environment
Lab Objectives ................................................................................................................... 0-2
Lab Overview ..................................................................................................................... 0-2
Lab Procedures ................................................................................................................. 0-3
Classroom Hosted Labs: Examining Hardware Components ........................................ 0-3
Lab Answer Key................................................................................................................. 0-6
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It isLTOC-3
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
LTOC-4
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
LTOC-6
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L0
Lab 0: Configuring the Lab
Environment
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L0-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will configure your host operating system for future labs.
Lab Procedures
While you are performing the exercises in this lab, the instructor will do the same to prepare the
instructor machine for classroom demos.
Remote Lab
In the remote labs environment, you do not have access to the host
machine's configuration settings and these steps will not apply. Skip
the following exercises if that is the case. Only perform these tasks if
your instructor asks you.
In these tasks, you will prepare your system for future labs. Hyper-V will not install and run on a
system that is not configured properly. Many systems are produced with multi-core processors that
are capable of providing built-in hardware virtualization. Both Intel and AMD processors are
available with this feature. On some systems, the hardware virtualization capabilities are disabled
by default and must be turned on in the systems BIOS. Your instructor may tell you to skip tasks
if the BIOS is already configured.
Note
During the POST routine, the system will briefly flash the keystroke
necessary to enter System Setup or some other description of the
systems BIOS configuration screen. On most Dell systems, press the
F2 key. On Lenovo systems, press the F1 key.
Caution
Make sure the time and date in the BIOS reflects the current time and
date. If you are not sure how to check this or change it, consult with
your instructor.
1. If the system is currently on, power it off completely and turn it back on, again.
2. Press F2 when prompted during the POST routine.
3. Go to the Performance section and then press ENTER.
4. Press the down arrow key to the Multi-Core Support option. If Multi-Core Support is Off,
press ENTER, select the Enabled option, and then press ENTER again.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L0-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
5. Press the down arrow key to the POST Behavior section and then press ENTER.
6. Press the down arrow key to the Virtualization option. If Virtualization is Off, press ENTER,
select Enabled, and then press ENTER again.
7. Press ESC to exit setup, select the Exit Setup option, and then press ENTER.
Task 3: Log On to the Host Operating System and Set the Computer
Name
In these steps, you will log on to the host operating system and set the computer name.
Caution
If you booted the host machine for the first time, wait one to two
minutes before logging on. The server will run several configuration
scripts that will restart the system shortly after the logon prompt
appears. If the system does not restart within a few minutes, those
scripts have likely already been run and you may proceed with
the logon.
1. Boot the host machine and log on as Administrator with a password of TrustM3 (capital T,
capital M, and the number 3).
2. Click Start.
3. Right-click Computer and select Properties.
4. Click the Remote Settings link.
5. Select the Allow connections from computers running any version of Remote Desktop option.
(This option may already be selected.)
6. Click the Computer Name tab.
7. Click the Change button.
8. Confirm that the computer name is Host##, where ## is your assigned student ID from 01 to 24.
(Ask your instructor to assign you a student ID, if you do not already have one. The instructor ID
will be Host00.)
9. If the computer name is not correct, change it, click OK several times, and then reboot the
machine when prompted. Log back on after the reboot.
Remote Lab
In the remote labs environment, the host computer's settings are
already established and cannot be changed. Skip these steps in
that case.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L0-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L1
Lab 1: Exploring the Features of
Windows 7
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L1-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will start your VMs and prepare the lab environment for upcoming labs.
Note
The Alpha VM must be running throughout the entire course. This VM
provides DHCP addressing for the other VMs that are called on during
your labs. You will start the ALPHA VM in this lab. Do not shut it down
until the end of the course.
Lab Procedures
Exercise 1: Launching the Alpha VM
In this exercise, you will launch the initial Alpha VM required for future labs.
Remote Lab
In the remote labs environment, the host machine is used only as a
terminal to connect to a remote labs host server. You will need to
connect to this host machine remotely using instructions provided to
you by your instructor or the Global Knowledge remote labs team.
2. From the desktop, double-click the LabVMs folder or shortcut. If the shortcut is not available,
click Start, Administrative Tools, and Hyper-V Manager.
3. Double-click the Alpha VM to open the Virtual Machine Connection window.
4. Click the Start button on the icon bar to start the VM. The Alpha VM should boot quickly and
present you with a logon prompt. DO NOT LOG ON right away. The Alpha VM runs several
scripts in the background at startup in preparation for the lab environment. Within one to two
minutes, the Alpha VM will reboot a final time.
Note
You will see a CTRL+ALT+DEL prompt for log on. Since you are
using a VM, this key sequence will not pass through. Instead,
select the Action, Ctrl+Alt+Delete option on the menu bar or click
the corresponding icon on the icon bar in the Virtual Machine
Connection window.
Note
Leave the Alpha VM running at all times unless you are asked to shut
it down in a later lab exercise.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L1-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
1. Click the Start button, right-click My Computer, and then select the Properties option.
2. Click the Computer Name tab.
3. Click the Change button.
4. Type India in the Computer name text box.
5. Click OK to accept the changes.
6. Click OK in the restart warning dialog box.
7. Click OK to accept the changes.
8. Click Yes to restart.
9. After the reboot, log on as Administrator with a password of TrustM3.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L1-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
1. Click Start, right-click Computer, and then select the Properties option.
2. Click the Change Settings link. (You should now be on the Computer Name tab of the System
Properties dialog box.)
3. Click the Change button.
4. Type Kilo in the Computer name text box.
3. Browse to the C:\LabFiles\ISO folder, select the 6183-labFiles.iso file, and then click Open.
4. If an Autoplay window appears, click the X button to close it.
5. Verify that Administrator is the default user name.
6. Type TrustM3 for the password, and then click the right arrow button or press ENTER.
7. Click Start, Control Panel, System and Security, and Windows Firewall.
8. If the Windows Firewall is currently off, click the Use recommended settings button.
9. Close the Windows Firewall window.
10. Click the Network icon in the lower-right corner of the window, and then click the Open
Network and Sharing Center link.
11 Click the Local Area Connection link, and then click the Details button.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L1-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
14. Click Start, All Programs. You will notice that the program groups are now listed with the
folders at the bottom and loose programs are listed at the top.
15. Browse around and get familiar with the new look and feel of the Start menu structure. (You will
notice that the My prefix is no longer part of the shortcuts on the Start menu.)
16. When you are finished, leave the Kilo VM running.
10. Type the following and press ENTER. (Note the dot before the slash, and the number 1 (one) at
the end.)
.\LabTrek.ps1
Note
The script takes a few seconds to start. Wait a minute or two for the
script to create the users and OUs. Then you may continue.
If the script runs, but displays the error message Unable to find a
default server with Active Directory Web Services running, perform
the following steps:
1. On the Alpha VM, click Start, Administrative Tools, Services.
2. In the Services listing, right-click Active Directory Web Services
and click Start.
3. Close the Services console and try to run the LabTrek.ps1
script again.
13. When the script finishes, click Start, Administrative Tools, and Active Directory Users
and Computers.
14. Expand hq.local.
15. Browse through the Accounts OU structure and examine the users and groups that are listed under
Engineering, IT, Management, and Sales.
For your reference, the following is the OU, Group, and User structure that created with the
Windows PowerShell script:
Organizational Units:
hq.local Accounts
hq.local Accounts Engineering
hq.local Accounts IT
hq.local Accounts Management
hq.local Accounts Sales
hq.local Accounts Sales East Coast
hq.local Accounts Sales West Coast
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L1-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Groups:
hq.local Accounts Engineering Eng Admins
hq.local Accounts Engineering Eng Users
hq.local Accounts IT Help Desk
hq.local Accounts IT IT Admins
hq.local Accounts Management Executives
hq.local Accounts Sales Sales Admins
hq.local Accounts Sales Sales Users
Users:
hq.local Accounts Engineering Scooty
hq.local Accounts Engineering SooLoo
hq.local Accounts IT Ohara
hq.local Accounts IT Speck
hq.local Accounts Management Quirk
hq.local Accounts Sales Checkoff
hq.local Accounts Sales MackOy
L1-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L1-11
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L1-12
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L2
Lab 2: Installing Windows 7
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L2-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will use the native VHD boot option to install Windows 7. You will use the
BCDEdit tool to view and edit the BCD store. You will also use the Windows Easy Transfer
process to migrate a profile from Windows XP and Windows Vista to Windows 7.
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skipped any of the previous labs, you may need to configure those items now. You may skip these
tasks if you have already performed them.
4. Type the following to confirm, and then press ENTER to accept the change.
Y
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L2-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. On the menu bar in the Hotel VM window, click Media, DVD Drive, and Insert Disk.
5. Browse to the C:\LabFiles\ISO folder, select the WIN-7.iso file, and then click Open.
6. In the Autoplay window that appears, click the Run setup.exe option. (It may take a bit of time
for the AutoPlay window to show up.)
7. Choose Install Now.
8. Click Do not get the latest updates for installation.
9. Select the I accept the license terms check box, and then click Next.
Caution
Stop here. Do not click next on the disk selection screen.
13. Click the red X in the upper-right corner of the installation window.
14. Click Yes to cancel the installation.
15. Close the Install Windows screen.
NOTE:
If you see a Virtual Machine Connection dialog with the message
Mouse not captured in Remote Desktop session, select the Please
dont show me this again checkbox and click OK. If necessary,
reboot the VM again, click inside the VM window, and press a key to
boot from the DVD when prompted.
4. When the Install Windows screen appears, press SHIFT+F10. (This will open a
command window.)
5. In the command prompt, type the following, and then press ENTER.
md c:\vhd
Note
Make sure to type in the command as a single command, and do not
forget the type=expandable string at the end of the command.
10. Type exit, and then press ENTER to leave the command prompt.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L2-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
15. Select Disk 3 Unallocated Space on the disk selection screen. (It should be the disk with the
19.5 GB of free space.)
16. Click Next to begin the installation. (Ignore the warning that states that Windows cannot install to
this volume.)
17. The Installing Windows screen appears. Copying Windows files, Expanding Windows Files,
Installing features, Installing Updates, and Completing Installation also appears. This will
take some time, the screen may flicker, and an occasional reboot may occur.
18. Create your first user in the Windows 7 Ultimate Installation screen by typing the following
information in the Username and Computer Name text fields:
Username: Student
Computer Name: Hotel-7
19. Click Next.
20. Enter and confirm the following password, and then enter the following password hint:
Password: TrustM3
Password Hint: TrustM3
21. Click Next.
9. Click Yes to acknowledge the UAC prompt. (The command prompt opens in the context of
the administrator.)
10. In the command prompt, type the following, and then press ENTER to navigate back to the root of
the command prompt.
cd \
12. Scroll up and down through the BCDEdit results and make a note of the following items:
What is the default boot menu timeout value?
What drive letter is the Microsoft Windows Vista installation located on?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L2-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Where is the Windows 7 entry really installed? (Look for the device entry.)
Task 2: Adjust the Boot Menu Timeout Value and Default Operating
System
In this task, you will adjust the Boot menu Timeout Value, as well as, the default
operating system.
1. In the command prompt, type the following, and then press ENTER.
bcdedit /set {bootmgr} timeout 10
Find and write the identifier for the Microsoft Windows Vista entry. (This is known as the GUID
value for the BCD entry. It is a very lengthy hexadecimal value.)
3. Type the following command using the GUID that you wrote down previously and press ENTER.
bcdedit /default {GUID}
5. Has Microsoft Windows Vista now become the default operating system?
2. You should see a message that the entry was created successfully. Write the GUID value for the
new entry:
3. Type the following command using the GUID that you wrote down in the previous step, and then
press ENTER.
bcdedit /set {GUID} SOS Yes
Note
The SOS value directs the Windows boot process to display verbose
information during the boot process for diagnostics purposes. This
information can also be displayed by using the F8 key during the boot
sequence and using the Safe Mode options. The advantage of using
this switch is that nothing is disabled. It is just more informative.
5. Do you see the new Win7 SOS boot entry and the SOS value?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L2-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
14. Which option is better for managing the more advanced boot features?
L2-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. When you reach the Logon screen, log on as Student with a password of TrustM3.
5. Does it appear that there is anything different about the system since using the Win7 SOS
boot option?
7. Type File1.txt, press ENTER, and then press ENTER again to open the file in Notepad.
8. Type This is test file 1, save the document, and then close Notepad.
9. Repeat these steps to create File2.txt and File3.txt.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L2-11
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
6. Click the Windows Explorer icon on the taskbar, and then navigate to Computer,
Local Disk (D:).
7. Right-click Local Disk (D:) (or right-click a blank area in the right-window) and select the New,
Folder options.
8. Type Transfer for the folder name, and then press ENTER.
9. Right-click the Transfer folder and select Properties.
10. Click the Sharing tab, and then click the Advanced Sharing button.
11. Select the Share this Folder check box, and then click the Permissions button.
12. Select the Allow - Full Control check box, and then click OK.
13. Click OK again, and then click Close.
1. On the Hotel VM, click Start, All Programs, Accessories, System Tools, and Windows
Easy Transfer.
2. Click Next on the Welcome screen.
3. Click A Network.
4. Click This is My New Computer.
L2-12
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. Click A Network.
9. Click This is My Old Computer.
10. Write the Windows Easy Transfer Key that is displayed:
7. Clear the Labs (D:) drive check box. (Make sure this item is now a gray box, not blue.)
8. Under the All Users folder, expand Start Menu, Programs, and Tools+Utils, and then select the
check boxes for:
BGInfo
CCleaner
9. Scroll down and expand C:\Program Files.
10. Select the check boxes for:
BGInfo
CCleaner
11. Click Save.
12. Make sure that your selections do not total over 20 to 30 MB of data to be transferred. If the data
is several hundred megabytes or gigabytes in size, go back to Customize your choices.
13. Click Transfer when you are done making changes.
14. When the transfer is complete, click See What Was Transferred.
15. View the details for the Transfer report and the Program report, and then close the Report window.
16. Close the Windows Easy Transfer window, and then click Restart Later.
17. Examine your system to see what has been transferred:
Did your File1, File2 and File3 documents transfer?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L2-13
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Do they work?
Note
The Windows Easy Transfer Wizard does not install programs for you.
It will only copy programs and their Start menu shortcuts if you select
them. This does not create registry entries or copy any special files
that may be needed in the Windows directory structure. Some
programs are fairly self-contained and will function if you select them
during the transfer. Other programs will fail to run unless they are
reinstalled manually on the new computer. WET is most concerned
with transferring your personal documents.
L2-14
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
6. Make a note of the programs that you see in the Tools+Utils group:
10. Type This is test file 1, save the document, and then close Notepad.
11. Repeat these steps to create VistaFile2 and VistaFile3.
12. Close the My Documents window.
13. Right-click the desktop and select the Personalize option.
14. Click the Desktop Background link, and then select Solid Colors in the Location drop-down list.
15. Choose the dark purple color swatch and click OK.
10. Clear the Labs (D:) drive check box. (Make sure this item is now a gray box, not blue.)
11. Expand Users, Public.
12. Do you see any Start menu items?
L2-16
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
9. View the details for the Transfer report and the Program report, and then close the Report window.
10. Close the Windows Easy Transfer window, and then select Restart Later.
11. Examine your system to see what has been transferred:
Did your VistaFile1, VistaFile2 and VistaFile3 documents transfer?
Did the Windows color scheme change to the Windows Vista scheme?
Note
The Windows Easy Transfer Wizard does not install programs for you.
It will only copy programs and their Start menu shortcuts if you select
them. This does not create registry entries or copy any special files
that may be needed in the Windows directory structure. Some
programs are fairly self-contained and will function if you select them
during the transfer. Other programs will fail to run unless they are
reinstalled manually on the new computer. WET is most concerned
with transferring your personal documents.
12. Once you have finished the transfer of data, shut down the Hotel VM and do not start it unless
called for in a later lab.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L2-17
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L2-18
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Task 2: Adjust the Boot Menu Timeout Value and Default Operating
System
2. Do you see the new value for the timeout listed?
Answers will vary.
Which operating system is listed with the identifier {current}?
Answers will vary.
Find and write the identifier for the Microsoft Windows Vista entry. (This is known as the GUID
value for the BCD entry. It is a very lengthy hexadecimal value.)
Answers will vary.
5. Has Microsoft Windows Vista now become the default operating system?
Answers will vary.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L2-19
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L2-20
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L2-21
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L2-22
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L3
Lab 3: Configuring and Managing
Windows 7
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L3-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Manage user accounts and profiles with Control Panel and the Computer Management
Console
Configure Windows 7 system settings
Examine the Windows 7 Control Panel
Configure the Ease of Access Center settings
Manipulate file and folder settings
Configure searching and indexing properties
Lab Overview
In this lab, you will use tools and utilities such as the Computer Management Console, Ease of
Access Center, Device Manager, and Control Panel to configure desktop, folder, searching and
indexing and system settings.
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skipped any of the previous labs, you many need to configure those items now. You may skip
these tasks if you have already performed them.
1. In the Virtual Machine Connection window for each VM, click Media, DVD Drive, and Insert
Disk. (This is a menu option at the top of the Virtual Machine Connection window.)
2. Browse to the C:\LabFiles\ISO folder, select the 6183-LabFiles.iso file, and then click Open.
4. Type the following to confirm, and then press ENTER to accept the change
Y
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L3-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
3. Click the Jane Doe user account, type TrustM3 for the password, and then press ENTER.
4. Once the desktop appears, right-click the desktop and select New, Text Document.
5. Type Jane Was Here for the file name, and then press ENTER.
6. Log off the Jane Doe user account.
7. Select the Student user account, type TrustM3 for the password, and then press ENTER.
8. Do you see Jane Does document?
9. Why?
7. What is the reason that the Windows Experience Index cannot be computed?
8. Click Close.
9. Click the back arrow in the System window to return to the previous screen.
10. Click the Advanced system settings link.
11. List the tabs that are available in the System Properties dialog box:
17. If you have the System Properties dialog box open, click Cancel to close it.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L3-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
7. Select Network Adapters from the list of hardware types, and then click Next.
8. Select Microsoft from the list of manufacturers, select Microsoft Loopback Adapter from the
list of network adapters, and then click Next.
9. Click Next to install the device, and then click Finish.
10. Take a few moments to explore some of the hardware that is available in the Device Manager.
11. When you finish exploring, expand Network Adapters, right-click Microsoft Loopback
Adapter, and then select Properties.
12. Click the Advanced tab and examine some of the hardware characteristics you can modify for
this device.
13. Click the Driver tab.
14. List some of the driver options that are available:
17. How does the Microsoft Loopback Adapter now appear in the Device Manager?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L3-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
5. Choose the text that you prefer on screen 1 of 4, and then click Next.
6. Choose the text that you prefer on screen 2 of 4, and then click Next
7. Choose the text that you prefer on screen 3 of 4, and then click Next.
8. Choose the text that you prefer on screen 4 of 4, and then click Finish.
L3-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
10. Click the back arrow in the System and Security window to return to the previous window.
11. Browse through some of the other Control Panel categories, but do not make any changes.
12. When you have finished exploring, close Control Panel and all other open windows.
3. Type Master Control Panel for the shortcut name, and then click the Finish button.
4. Double-click the Master Control Panel shortcut.
5. Scroll through the Control Panel items in the right window and notice the detailed listing of all the
Control Panel items and subitems.
6. Close the window when you finish.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L3-11
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
10. Click the Magnifier Options icon. (It looks like a gear or sprocket.)
11. What does the Color Inversion option do?
L3-12
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
12. Can you fine-tune the Magnifier to follow keyboard inputs versus mouse movements?
13. Close the Magnifier Options dialog box by clicking the red X.
14. Close the Magnifier by clicking the red X in the Magnifier Option window.
3. Click Start, type Notepad in the Search box, and then click the Notepad option to start the
Notepad program.
4. Type your address on the Notepad document using the on-screen keyboard.
5. What do you notice about the key entry process? Does the keyboard suggest to you the word that
you are typing?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L3-13
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. Click the Organize drop-down list in the upper-left corner, and then select Folder and Search
Options.
9. Does this appear to be the same Folder Options dialog box that you accessed from Control Panel?
L3-14
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
11. Why do you think that encrypted files are configured the way they are by default?
17. Click in the text box under Add new extension to list to add a custom file extension to index.
18. Type .WIN7. (Hint: Remember the period before WIN7 [.WIN7].)
19. Click the Add button.
20. What did the configuration do?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L3-15
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Note
If the Windows key plus F key combination does not open the Search
feature in the VM, go to View, Full Screen Mode on the menu bar in
the Virtual Machine Connection window for the Windows keystrokes to
work. To exit Full Screen mode, use the Restore Down button on the
tab at the top of the screen.
3. Type .jpg in the Search box at the top right of the window.
11. Do you see the search that you previously configured and saved?
16. Navigate to the path you wrote down for the Lighthouse image.
L3-16
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
22. What does this tell you about the Windows 7 custom searches?
24. Navigate back to the Sample Pictures location. Choose another image and move it to a new
location. Navigate to your custom search and see if the picture is still there. If it is, have the
properties of the image changed?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L3-17
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L3-18
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L3-19
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L3-20
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L3-21
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L3-22
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L3-23
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L3-24
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L4
Lab 4: Customizing the Windows 7
User Interface
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L4-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will explore the customization options that are available in the Windows 7
operating system. You will also preview the Windows Aero features that are available in the
virtual machine environment.
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skipped any of the previous labs, you may need to configure those items now. You can skip any of
these tasks if you have already performed them.
1. In the Virtual Machine Connection window for each VM, click Media, DVD Drive, and Insert
Disk. (This is a menu option at the top of the Virtual Machine Connection window.)
2. Browse to the C:\LabFiles\ISO folder, select the 6183-LabFiles.iso file, and then click Open.
4. Type the following to confirm, and then press ENTER to accept the change.
Y
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L4-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. In the drop-down list under Scheme, select Windows Black (system scheme).
9. Click OK to return to the Personalization window.
10. In the Themes section of the Personalization window, scroll down to Basic and High Contrast
Themes and select the High Contrast #1 theme.
11. Navigate around the interface a bit with the new theme selected.
12. Notice how this theme can be useful for those with vision issues and to reduce bandwidth usage
over RDP connections.
13. Select the Windows Classic theme.
Note
In a production environment, we normally would secure the screen
saver. Here, we are leaving the screen lock off for simplicity.
4. Select Log off from the Power button action drop-down list.
5. Click the Customize button.
6. Scroll down and select the Run command check box.
7. Select the Display on the All Programs menu and the Start menu option under System
administrative tools.
8. Click OK, and then click OK again.
9. Drag the taskbar to the top of your screen.
10. See if you can drag the taskbar anywhere else, and then drag it back to the bottom of your screen.
11. Click Start.
12. Do you see the Run option?
18. Right-click the Command Prompt icon on the taskbar and select the Command Prompt option.
(A second copy of the Command Prompt should open.)
19. Right-click the Command Prompt icon on the taskbar and select the Close all windows option.
5. Select the Use visual styles on windows and buttons check box, and then click OK. (This should
now be the ONLY item selected.)
6. Navigate around the Windows interface and you should notice that it is a bit more responsive
than before.
5. Drag the Windows Explorer window to the right until your mouse reaches the edge of the screen
and let go.
6. You should now have the Command Prompt and Windows Explorer side by side.
7. Click the Notepad icon on the taskbar.
8. Grab the title bar of Notepad and shake it rapidly back and forth.
9. Did anything happen?
Note
Sometimes the Aero Shake feature will not function in a VM session
due to the timing of the mouse movements.
1. Make sure you are performing these steps on the local machine or on your personal machine.
2. Right-click the desktop and choose the Personalize option.
3. In the Themes section of the Personalization window, scroll down and select the Windows
Classic theme. Notice how the themes are adjusted.
Note
When Classic is chosen, the appearance is as close to an older
desktop as allowed with the new Windows 7 system.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L4-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
5. Click Start.
6. Right-click Computer.
7. Select Properties.
8. Click the Advanced systems setting link, if necessary. (You should be on the Advanced tab, if
not, then click the Advanced tab.)
9. Click the Settings button under Performance.
10. Click the Adjust for best performance option, and then click OK twice.
11. How much memory is now being used by the Windows 7 system? How can you find out?
12. Navigate to the Task Manager by right-clicking the taskbar and selecting the Start Task
Manager option.
13. Click the Performance tab.
14. How much memory is being used?
23. Click the Adjust for best appearance option, and then click OK twice.
24. Open the Task Manager, if necessary.
25. Click the Performance tab.
27. At rest, how much memory did Windows Aero capture from your idle memory pool?
5. Scroll through the minimized windows by pressing WIN+TAB. Let go of the TAB key on a
specific window while still pressing the WIN key. What happens?
6. Close all the windows except for the Computer and Games windows.
7. Have you ever tried to adjust two windows together on the same desktop? This can be very
tedious. Drag the Computer window to the far left until your mouse reaches the edge of the screen
to see if Aero Snap can help.
8. What happens?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L4-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
9. Now drag the Games window to the right left until your mouse reaches the edge of the screen.
Does it snap into position?
12. Open Computer, Games, and Music to view another new Aero feature.
13. Position your mouse pointer in the transparent bar of the Games window.
14. With the left mouse button, drag the window back and forth as fast as you can.
15. What happens?
16. Try it again with the same window. What happens when you shake the window again?
17. Open up five or six windows to view the Aero Peek feature.
18. Shake one window to minimize the rest.
19. Now minimize the last open window.
20. Press ALT+TAB on your keyboard.
21. What does this do?
L4-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
22. We have seen this for other versions of Windows, but what happens when you pause on one of the
minimized windows?
23. Windows Aero Peek gives a preview of the maximized window so it is easier to see. Shake a
window to close all other windows, and then close the last one again.
24. Use Windows Aero Snap to snap a window to the left and to the right. Remember how to snap?
25. Find the Show Desktop button on the new Windows 7 taskbar.
26. The Show Desktop button has moved and changed. Look to the right of the Windows 7 clock.
That rectangle is the Windows Peek button. Move your mouse pointer over the button and you
will see a preview of the desktop.
27. Click the Windows Peek button to see the dual function of this button; it acts like the old Show
Desktop button.
28. Right-click the Start button and select Properties to turn the Windows Aero Peek feature off.
29. Click the Taskbar tab.
30. Which options should you clear to turn the Windows Aero Peek feature off?
34. Did you also move the mouse in the Film strip of the minimized windows? If so, what happened?
35. Right-click the Library icon on the taskbar and select the Close all windows option.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L4-11
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L4-12
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L4-13
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L4-14
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L5
Lab 5: Windows 7 in the Workgroup
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L5-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will examine the options for using Windows 7 in a workgroup environment. You
will then compare the workgroup functionality to the new Windows 7 HomeGroup feature.
Finally, you will use the Windows 7 library feature to consolidate access to frequently used files.
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skipped any of the previous labs, you may need to configure those items now. You may skip these
tasks if you have already performed them.
1. In the Virtual Machine Connection window for each VM, click Media, DVD Drive, and Insert
Disk. (This is a menu option at the top of the Virtual Machine Connection window.)
2. Browse to the C:\LabFiles\ISO folder, select the 6183-LabFiles.iso file, and then click Open.
4. Type the following to confirm, and then press ENTER to accept the change.
Y
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L5-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Note
Ignore any Windows Activation warning messages. They will
disappear after the logon.
Note
A Network Location dialog box may pop up at some point. If it does,
click Work Network, and then click Close.
7. Type LABGROUP for the workgroup name, and then click OK.
8. Click OK in the Welcome to the LABGROUP dialog box.
18. Type LABGROUP for the workgroup name, and then click OK.
19. Click OK in the Welcome to the LABGROUP dialog box.
20. Click OK on the restart message.
21. Click Close, and then click the Restart Now button.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L5-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Right-click the C drive in the left section of the window, and then select the New, Folder options.
5. Type MarketingData for the folder name, and then press ENTER.
6. Right-click the MarketingData folder, and then select the Share With, Specific People options.
7. In the drop-down list, select Everyone, and then click the Add button.
8. In the Read drop-down list, select Read/Write for the Everyone entry.
9. Click the Share button.
10. If you are prompted to turn on network discovery and file sharing, click the Yes option.
11. Click the Done button.
12. Switch to the Kilo VM.
13. Click Start, Control Panel, User Accounts and Family Safety, and Add or Remove
User Accounts.
14. Do you see a Student account?
15. If you do not see the account, create a new account called Student now. Make the Student account
an Administrator and give it a password of TrustM3.
16. Log off the Kilo VM.
7. If it does not refresh, right-click in the blank window, and then select the Refresh option.
8. Double-click Lima when it appears.
18. Does the workgroup name appear to have any security purpose?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L5-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. Click the Turn off Windows Firewall (Not Recommended) option for both the Home and Public
networks, and then click OK.
9. On the Lima VM, repeat the steps to disable the firewall.
10. Switch back to the Kilo VM and click the Start button.
11. Type HomeGroup in the Search box, and then press ENTER.
12. If a yellow warning appears on the HomeGroup page, click the What is a network location link.
(If the warning does not appear, click the Create a homegroup button.)
13. Click Home Network for your network type.
14. Select all check boxes on the Create a Homegroup page, and then click Next.
15. Write your HomeGroup password here: (Please remember that this password is case sensitive.)
17. Highlight the HomeGroup password, right-click it, and then select the Copy option.
18. Click the Finish button.
19. Click Start , type Sticky in the Search box, and then press ENTER.
20. Right-click in the sticky note and select the Paste option.
21. Is this a wise security practice in the real world?
22. Select the Stream my pictures, music, and videos to all devices on my network check box in
the HomeGroup Settings window, and then click the Save Changes button.
23. Switch to the Lima VM.
24. Click Start, type HomeGroup in the Search box, and then press ENTER.
25. If a yellow warning appears on the HomeGroup page, click the What is a network location link.
(If the warning does not appear, click the Join Now button.)
26. Click Home Network for your network type.
27. Select all of the check boxes on the Share with other home computers running Windows page.
28. Click Next, type the HomeGroup password that you wrote previously. (Or look at the sticky note
on the Kilo VM.)
29. Click Next.
30. Click the Finish button on the You have joined the HomeGroup page.
31. Click the Stream my pictures, music, and videos to all devices on my network check box in the
HomeGroup Settings window, and then click the Save Changes button.
32. Close all windows.
33. Open Windows Explorer from the taskbar and navigate to the C root folder.
34. Right-click the C drive in the left section of the window, and then select the New, Folder options.
35. Type SouthEastData for the folder name, and then press ENTER.
36. Double-click the SouthEastData folder to open it.
37. Right-click in the empty space in the right section of the window, and then select the New, Text
Document options.
38. Type Sales Meeting Summary.txt for the file name, and then press ENTER.
39. Double-click the new file to open it.
43. Create another text document and name it Southeast regions new customer.txt.
44. This time, add some fictional customers that you can search for later.
45. Save and close the file.
46. Right-click SouthEastData, and then select the Share With, HomeGroup (Read) options.
47. Switch to the Kilo VM.
48. Close the HomeGroup wizard (if it is open), click the Start button, and then select Computer.
49. Do you see any indication that the HomeGroup was created?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L5-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
55. What user account are you logged on as in the Kilo VM?
57. Why were you not asked for credentials when accessing the SouthEastData resource on the
Lima VM?
8. Open the file, and then write a few legible (and clean!) sentences.
9. Save and close the file.
10. Create two additional monthly sales files.
11. Close Windows Explorer.
L5-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
a.
b.
c.
d.
3. Click Libraries in the left section of the window, and then click New Library on the toolbar.
4. Type Class Documents for the library name when the new library icon displays, and then
press ENTER.
5. In the Share with drop-down list on the toolbar, select HomeGroup (Read/Write).
6. Right-click the Class Documents library, and then select Properties.
7. Click the Include a Folder button.
8. Type \\lima\SouthEastData in the Folder text box, click the Include Folder button, and then
click OK.
9. In Windows Explorer, navigate to the C drive.
10. Select the SalesData folder in the right section of the window.
11. Click Include in Library on the toolbar and select the Class Documents library option.
12. Click Libraries in the left section of the window.
15. Click the blue 2 Locations link under the Class Documents library at the top of the window.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L5-11
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
16. Based on the information contained in that location, what is a library? (Hint: Read the
description.)
24. If so, can you create new data within the SalesData folder in the library? (Right-click inside the
folder and select New, Text Document.)
25. In the Kilo VM, navigate back to the Class Documents library.
26. Right-click the Class Documents library, and then select Share with, HomeGroup (Read).
27. Close all windows on the Kilo VM.
34. Right-click inside the class folder, and then select the New Folder option.
L5-12
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
35. Were you allowed to create new data within the library?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L5-13
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L5-14
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
49. Do you see any indication that the HomeGroup was created?
In the left window pane of Windows Explorer, you should see a HomeGroup section.
51. Do you see SouthEastData listed?
Yes.
53. What is the actual path of the data?
\\Lima\SouthEastData
55. What user account are you logged on as in the Kilo VM?
You should be logged on as student.
56. Does this account exist on the Lima VM?
No.
57. Why were you not asked for credentials when accessing the SouthEastData resource on the Lima
VM?
The HomeGroup setup does not require a user to exist. The HomeGroup shared password
confirms that other machines have authorization.
L5-16
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L6
Lab 6: Integrating Windows 7 with
Active Directory
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will integrate Windows 7 into an Active Directory environment. You will join
Windows 7 to the Active Directory domain, and use Group Policy to centrally manage Windows 7
configuration settings.
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skipped any of the previous labs, you may need to configure those items now. You can skip these
tasks if you have already performed them.
1. In the Virtual Machine Connection window for each VM, click Media, DVD Drive, and Insert
Disk. (This is a menu option at the top of the Virtual Machine Connection window.)
2. Browse to the C:\LabFiles\ISO folder, select the 6183-LabFiles.iso file, and then click Open.
3. If an AutoPlay window appears, click the X button to close it.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Type the following to confirm, and then press ENTER to accept the change.
Y
Note
Leave the Alpha VM running at all times unless you are asked to shut
it down in a later lab exercise.
4. Do not make any changes here now. Click the Cancel button.
5. Expand the hq.local container in the left section of the window, and then select the
Computers container.
6. Do you see any computers listed?
7. In the left section of the window, select the Domain Controllers container.
8. Which domain controller is listed?
11. Right-click the Domain Controllers OU, select Properties, and then see if a Group Policy tab
listed.
Note
In Windows Server 2008 and later versions, the Active Directory Users
and Computers tool no longer displays policies for editing.
13. Click Start, Administrative Tools, and Group Policy Management. Now you should see
policies listed under the hq.local domain root and the Domain Controllers OU.
14. Where did this Group Policy Management Console come from?
Note
The Group Policy Management Console is now installed by default on
all Windows Server 2008 domain controllers. For Windows Server
2008 member servers, the GPMC can be added as a feature using the
Server Manager tool.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Expand the Computer Configuration, Policies, Windows Settings, Security Settings, Local
Policies node, and then click Security Options.
5. Write the values for the following policy setting:
Network security: Do not store LAN Manager hash value on next password change.
6. Close the Group Policy Management Editor without making any changes.
7. Close the Group Policy Management Console.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Note
After the reboot, you will see a CTRL+ALT+DEL prompt for logon.
Since you are using a VM, this key sequence will not pass through.
Instead, on the menu bar select Action, Ctrl+Alt+Delete or on the
icon bar in the VM Connection window use the corresponding icon.
Note
From this point forward, always log on as Administrator@hq.local
unless otherwise noted in the labs.
5. Expand the Computer Configuration, Windows Settings, Security Settings, Local Policies
node, and then click Security Options.
6. Write the values for the following policy setting:
Network security: Do not store LAN Manager hash value on next password change.
7. Close the Local Group Policy Editor without making any changes.
1. In the Kilo VM, click Start, right-click Computer, and then select Properties.
2. Click the Change Settings link, and then click the Change button in the System Properties dialog
box.
3. Type Kilo in the Computer name text box, select the Member of Domain option, type hq.local
in the Domain name text box, and then click OK.
4. Type Administrator with a password of TrustM3, and then click OK.
5. Click OK in the Welcome to the hq.local domain dialog box.
6. Click OK in the restart message.
7. Click Close to exit the System Properties dialog box, and then click the Restart Now button.
Note
After reboot, you will see a CTRL+ALT+DEL prompt for logon. Since
you are using a VM, this key sequence will not pass through. Instead,
select the Action, Ctrl+Alt+Delete option on the menu bar or use
the corresponding icon on the icon bar in the Virtual Machine
Connection window.
8. After the reboot, log on as Administrator@hq.local with a password of TrustM3. (Use the
Switch User option to change the logon name.)
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L6-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Expand the Computer Configuration, Windows Settings, Security Settings, Local Policies
node and click Security Options.
5. Write the values for the following policy setting:
Network security: Do not store LAN Manager hash value on next password change.
6. Close the Local Group Policy Editor without making any changes.
7. How are the above settings different from what you saw before joining the domain?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-11
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Expand and select all check boxes next to each component under the Feature Administration
Tools and Role Administration Tools components. (You must expand several subnodes as well.
Unfortunately, there is no easier way to do this.)
5. Click OK. (This will take a little bit of time.)
6. To configure the Start menu to display the Administration Tools shortcut, right-click Start,
select Properties, and then click the Customize button.
7. In the Customize Start Menu dialog box, scroll down to the System administrative tools option,
and select the Display on the All Programs menu and the Start menu option.
8. Click OK, and then click OK again.
9. Click Start, Administrative tools. You should now see all the tools available for managing the
domain environment, including the Active Directory Users and Computers and Group Policy
Management consoles.
3. Expand the hq.local, Accounts node, and then click the Management OU.
4. Double-click the Quirk user, and then click the Member of tab.
5. Click the Add button, type Domain Admins, and then click OK.
6. Click OK to save the changes to Quirk.
4. Select the Share this folder check box, and then click the Permissions button.
5. Select the Allow Full Control check box for the Everyone group.
6. Click OK, click OK again, and then click Close to save the changes.
13. Click the Advanced button, and then click the Change Permissions button.
14. Clear the Include inheritable permission from this object's parent check box.
15. Click the Add button in the warning dialog box.
16. Select the entry for Users with the Special permission designation from the Permission entries list,
and then click the Remove button.
17. Select the entry for Users with the Read & Execute permission and click the Edit button.
18. In the Apply to drop-down list, select This folder only. (This prevents the permission from being
inherited into other user's home folders.)
19. Click OK three times.
20. Click Close to save the changes.
21. Navigate to the E:\LabFiles\Install folder.
22. Copy the AdobeReader folder and the stopwatch.msi file to the C:\Software folder.
23. Switch to the Kilo VM, and then log on as Administrator@hq.local with a password of
TrustM3.
24. Click Start, Administrative Tools, and Active Directory Users and Computers. (If you do not
see Administrative Tools, use the Search box to find and launch the Active Directory tool.)
25. Expand the hq.local, Accounts node, and then click the Management OU.
26. Double-click the Quirk user account, and then click the Profile tab.
27. Select the Connect option, type \\Alpha\home\%username% in the To: text box, and then click
OK.
28. Repeat the above steps for any other user accounts you see in the Accounts OU structure.
Note
You can use multiple select techniques when there is more than one
user in the same OU. The Home folder will be used in a demo of folder
redirection later in this lab.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-13
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
29. Navigate back to Windows Explorer in the Alpha VM and look at the C:\Home folder. Is there
anything in this folder?
4. Hold the CTRL key and select India, Kilo, and Lima.
5. Right-click India, and then select the Move option.
6. Expand the hq, Accounts node, select the Management OU, and then click OK.
7. Expand the hq, Accounts node, click the Management OU, and ensure the computer objects
are present.
L6-14
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Close the Documents Properties dialog box without making any changes.
5. Click Start, Documents, and then create several new text documents in the Documents folder.
Add some text to each document.
6. Log on to the India VM as Quirk@hq.local with a password of TrustM3.
7. Open the My Documents folder.
8. Do you see the documents you created on the Kilo VM? (If you do not, wait a few minutes, then
log off and log back on again.)
9. Create a few new documents in the My Documents folder on the India VM.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-15
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Expand the Forest: hq.local, Domains, hq.local Accounts node, and then click the Management
OU.
5. Right-click the Management OU, and then select the Create a GPO in this domain and link it
here option.
6. Type Management Software, and then click OK.
L6-16
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
3. Right-click the Domain Software GPO, and then select the Edit option.
4. Expand the Computer Configuration, Policies, Software Settings, Software Installation node.
5. Right-click Software Installation, and then select the New, Package options.
6. Type \\Alpha\software in the File name box, and then click Open.
7. Double-click the Adobe Reader folder, and then double-click the AcroRead.msi package.
8. Leave the default option selected, and then click OK. (Be patient; this may take some time.)
5. Click Start, type cmd in the Search box, and then press ENTER.
6. Type the following, and then press ENTER.
gpupdate
7. Wait for the update to finish and check the programs again.
8. Are they installed yet?
9. Go back to the command prompt, type the following, and then press ENTER.
gpupdate /force
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-17
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
10. Type the following, and then press ENTER when asked to reboot.
Y
11. After the reboot, log back on as Quirk@hq.local with a password of TrustM3
12. Is the software available now?
14. Rename the file to Logon.VBS, press ENTER, and then click Yes to accept the name change.
15. Right-click Logon.VBS, and then select the Edit option.
16. Click Open in the warning dialog box.
20. Click OK in the Add a Script window, and then click OK again.
L6-18
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
5. Right-click Management, and then select Create a GPO in this domain and link it here.
6. Type Management Preferences, and then click OK.
7. Expand the Management OU.
8. Select the Management OU in the left section of the window.
9. Right-click the Management Preferences GPO, and then select Edit.
10. Expand the User Configuration, Management Preferences, and Windows Settings.
11. Right-click Drive Maps, and then select the New, Mapped Drive options.
12 Type \\alpha\software in the Location field.
13. Select the Reconnect check box.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-19
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
28. Close the Group Policy Management Editor and the Group Policy Management Console.
L6-20
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-21
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L6-22
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L6-23
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L6-24
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L7
Lab 7: Windows 7 Networking
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L7-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will explore the network settings in Windows 7. You will configure TCP/IP
settings and use remote management tools to view network settings and details. You will use
DHCP configuration settings and troubleshoot DHCP issues. You will also configure and manage
a BranchCache environment for Windows 7 and Windows Server 2008 R2.
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skip any of the previous labs, you may need to configure those items now. You can skip these
tasks if you have already performed them.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L7-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Type the following to confirm, and then press ENTER to accept the change.
Y
7. Click Start, Control Panel, Network and Internet, and Network and Sharing Center.
8. Click the Local Area Connection link.
9. Click the Details button.
10. Write the following information:
IPv4 IP address: ___________________________________________
Link-local IPv6 address: _____________________________________
11. Switch to the Lima VM and log on as Administrator with a password of TrustM3.
12. Open the command prompt.
13. Type the following command, and then press ENTER.
netsh advfirewall set allprofiles state off
(This is just an alternative way to disable the firewall instead of using Control Panel.)
14. Type the following commands and write the results. (Type each command, and then press
ENTER.):
ping Kilo Address: ____________________________
15. Do these match any of the addresses you wrote from the IP address details of the Kilo VM?
16. Close the command prompt, and then switch back to the Kilo VM.
17. Close the details window, and then click the Properties button.
18. Select Internet Protocol Version 6, and then click the Properties button.
19. Notice that the address fields are not fixed octets as they are in IPv4.
20. Does it appear that you could enter an IP address manually?
32. Do you see any DHCP-related information like the DHCP server IP address and lease time?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L7-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
34. Type the following commands and write the results. (Type each command, and then press
ENTER.)
ping Kilo Address: ____________________________
35. Do you see the new IPv4 address for the Kilo VM as a response? If you do not, the entry is
cached. Type the following and press ENTER to flush the cache and try to ping again.
ipconfig /flushdns
5. Type the following, and then press ENTER to allow the firewall exception.
Y
8. Type the following commands. (Type each command, and then press ENTER.).
Interface (Switches to the interface context.)
13. What do you think would happen if you used the set command to reset the IP address of the
remote host?
14. Type the following, and then press ENTER to exit the netsh tool and WinRS.
q
16. What IP address and hostname are listed in the IPConfig output?
17. Type the following, and then press ENTER. (This opens an entire command prompt session on the
Lima VM. This is similar to a telnet session but more secure.)
winrs r:lima cmd
20. Can you tell that you are running the command prompt on the Lima VM and not locally?
21. Type the following, and then press ENTER to exit the WinRS remote command prompt.
exit
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L7-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
15. Can you communicate with the other machines on your network using that address?
19. Switch back to the Alpha VM and click Start, Administrative Tools, and DHCP to launch the
management console.
20. Expand the alpha.hq.local, IPv4 node, right-click the Classroom Scope, and then and then select
the Activate option. (This allows the Alpha VM to give out addresses again.)
21. Switch back to the Kilo VM and open the command prompt.
22. Type the following, and then press ENTER.
ipconfig /all
24. Is there anything that you need to do in order to obtain the correct DHCP address again? (Do not
do anything now.)
25. Wait two to three minutes, then type the following again. (It may take as long as 5 minutes to
refresh automatically.)
ipconfig /all
27. Why did you not have to manually renew the address?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L7-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
7. Double-click Configuration in the left section of the Server Manager window, and then
select Services.
8. Right-click BranchCache in the Services listing, and then select Start.
1. On the Alpha VM, open Windows Explorer and navigate to the E:\LabFiles\Install folder.
2. Right-click WordViewer2007.exe and select the Copy option.
3. Navigate to C:\InetPub\WWWRoot, right-click WWWRoot, and then and then select the
Paste option.
L7-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. Perform the above steps on the Lima VM to apply the BranchCache policy and make sure
BranchCache is running.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L7-11
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
3. On the toolbar, click the graph icon drop-down arrow, and then select Report.
4. Right-click the report window, and then select Add Counters.
5. Scroll to the BranchCache counter and click the down arrow to expand the list of counters.
6. Hold down the CTRL key and select Retrieval: Bytes from cache, Retrieval: Bytes from server
and Retrieval: Bytes served.
7. Click the Add button, and then click OK. (All BranchCache values should now be zero.)
8. Keep the Performance Monitor window open so that you can watch the progress of
BranchCache activity.
9. Click Start, type http://Alpha/WordViewer2007.exe in the Search box, and then and then
press ENTER.
10. Click Ask Me Later if a Setup Internet Explorer 8 message appears.
11. Click Save in the File Download dialog box, and then click Save again.
1. In the Lima VM, click Start, type perf in the Search box, and then and then select Performance
Monitor from the results list.
2. Select the Performance Monitor item in the left section of the Performance Monitor window.
3. Click the graph icon drop-down arrow on the toolbar, and then click Report.
4. Right-click the report window, and then select Add Counters.
5 Scroll to the BranchCache counter and click the down arrow to expand the list of counters.
6. Hold down the CTRL key and select Retrieval: Bytes from cache, Retrieval: Bytes from server
and Retrieval: Bytes served.
7. Click the Add button, and then click OK. (All values should now be zero.)
L7-12
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. Keep the Performance Monitor window open so that you can watch the progress of the
BranchCache activity.
9. Click Start, type http://alpha/WordViewer2007.exe in the Search box, and then press ENTER.
10. Click Ask Me Later if a Setup Internet Explorer 8 message appears.
11. Click Save in the File Download dialog box, and then click Save again.
12. Click Close.
13. Look at the Performance Monitor report. Did any of the numbers change?
Note
If you did not see any Retrieval: Bytes from Cache numbers, repeat
the download of WordViewer2007.exe on the Kilo VM, then on the
Lima VM, and see if the numbers increment.
1. On the Alpha VM, click Start, and then type Group in the Search box.
2. Choose Group Policy Management from the search results.
3. Expand the Forest: hq.local, Domains, hq.local, Accounts, Management node.
4. Right-click the Management BranchCache GPO, and then clear the Link Enabled option.
5. If prompted, click OK to confirm.
6. Switch to the Kilo VM, and then open the command prompt.
7. Type the following, and then press ENTER.
gpupdate
8. Type the following, and then press ENTER. (There is a space after the = sign.)
sc config peerdistsvc start= disabled
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L7-13
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
13. Type the following, and then press ENTER. (There is a space after the = sign.)
sc config peerdistsvc start= disabled
L7-14
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L7-15
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
16. What IP address and hostname are listed in the IPConfig output?
The command should return the characteristics of the Lima VM.
20. Can you tell that you are running the command prompt on the Lima VM and not locally?
Not unless you run a command like Hostname that tells you the name of the host you are
working on.
L7-16
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L7-17
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L7-18
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L8
Lab 8: Windows 7 Remote Access
and Mobile Computing
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will examine the VPN features of the Windows 7 operating system. You will
access a Windows Server 2008 R2 server running the Routing and Remote Access Service. You
will configure Windows 7 as a one connection VPN server. You will also use the Remote Desktop
feature of Windows 7 to provide access to the Windows 7 desktop, or to connect remotely to other
RDP servers.
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skipped any of the previous labs, you may need to configure those items now. You can skip these
tasks if you have already performed them.
1. In the Virtual Machine Connection window for each VM, click Media, DVD Drive, and Insert
Disk. (This is a menu option at the top of the Virtual Machine Connection window.)
2. Browse to the C:\LabFiles\ISO folder, select the 6183-LabFiles.iso file, and then click Open.
3. If an AutoPlay window appears, click the X button to close it.
4. Type the following to confirm, and then press ENTER to accept the change.
Y
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. If the role is already installed, scroll down in the right section of the window and click the Add
Role Services link under Network Policy and Access Services.
5. If the role is not already installed, click the Add Roles link on the right section of the main
window, and then click Next in the Before you Begin dialog box.
6. Select the Network Policy and Access Services check box in the Select Server Roles dialog box.
7. Click Next.
8. Read the complete Network Policy and Access Services introduction, and then click Next.
9. Select the Routing and Remote Access Services check box in the Select Role Services
dialog box.
10. Which two role services were automatically chosen?
1. Click Start, Administrative Tools, and Active Directory Users and Computers.
2. Expand the hq.local, Accounts, Management node.
6. Change the Dial In option to Allow Access, and then click OK.
7. Close the Remote Active Directory Users and Computers window.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
5. Click Start, Control Panel, Network and Internet, and Network and Sharing Center.
6. Click the Connect to a network link.
7. Select Corporate VPN Connection.
16. Click the Network icon in the lower-right corner of the screen and click the Network and
Sharing Center link.
17. Do you see the VPN connection listed under View your active networks?
18. Click the Corporate VPN Connection link, and then click the Details button. (This displays the
IP settings for the VPN connection.)
19. Close the Details and Status windows.
20. Close the Network and Sharing Center.
21. After you finish testing the VPN connection, click the Network icon in the lower-right corner of
the screen.
22. Select the Corporate VPN Connection, and then click the Disconnect button.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Select Yes in the Windows cant create a shortcut here dialog box to create the shortcut on
the desktop.
5. Close the Network and Sharing Center and any other open windows.
6. Do you see the Corporate VPN Connection shortcut on your desktop?
9. Select the Through the Internet check box, and then click Next.
10. Click the Allow Access button, and then click Close.
11. You should now see Incoming Connections listed.
7. Type Kilo in the Internet address text box, type VPN Connection to Kilo in the Destination
name text box, and then click Next.
8. Type Jane in the User name text box and TrustM3 in the Password text box.
9. Select Remember this Password, and then click the Create button.
10. Click Close.
11. In the Network and Sharing Center, click the Connect to a network link.
12. Select the VPN Connection to Kilo, and then click the Connect button.
13. Type TrustM3 in the Password text box, and then select the Save this User Name and
Password for the Following Users check box.
14. Click the Connect button.
15. Click Start, type cmd in the Search box, and then press ENTER to open the command prompt.
18. When you finish testing the VPN Connection, click the Network icon in the lower-right corner of
the screen, select VPN Connection to Kilo, and then click the Disconnect button.
19. Close the Network and Sharing Center and any other open windows.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L8-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
20. Save this custom .RDP (Remote Desktop Protocol) connection object in the Documents library. If
you are not already there, navigate to the Documents library and type Corporate Server RDP
Connection in the File name text box.
21. Click Save.
22. Click the red X in the top right corner of the Remote Desktop Connection you just created and
saved to the Documents library. (Do NOT connect now.)
11. Are you remote controlling the Alpha VM or is this a unique session?
12. Explore what the connection actually provided in terms of local resources. On the Alpha VM
Remote Desktop, adjust the windows sliders so that you can see the Start button.
13. Click Start, and then click Computer.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-11
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Select the Allow connections from computers running any version of remote desktop option,
and then click OK. (The option may already be selected.)
9. In the drop-down list, select High Color (16 bit) in the Colors section.
10. Click the Local Resources tab.
11. Click the More button under the Local devices and resources section.
L8-12
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
18. In the If server authentication fails drop-down list, make sure the Warn me option is selected.
19. Click the General tab, and then click the Save As button.
20. Save this custom .RDP (Remote Desktop Protocol) connection object in the Documents library. If
you are not already there, navigate to the Documents library and type Kilo RDP Connection in
the File Name text box.
21. Click Save.
22. Click the red X in the top right corner of the Remote Desktop Connection you just created and
saved to the Documents library. (Do NOT connect now.)
1. Make sure you are logged on to the Kilo VM as Administrator@hq.local with a password
of TrustM3.
2. Wait for your desktop to appear.
3. Bring up the Lima VM and position it side-by-side with the Kilo VM.
4. Switch to the Lima VM.
5. Click Start, and then click Computer.
6. Click Documents under Libraries.
7. Double-click the Kilo RDP Connection.
8. Give your consent by clicking Connect if you are presented with a Remote Desktop warning that
asks you to verify the unknown publisher.
9. Enter your password if asked (TrustM3) and click OK.
10. What happened to the Kilo VM session after you successfully connected?
11. What does this tell you about the number of simultaneous sessions that are allowed on a
Windows 7 machine?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-13
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
12. Explore what the connection actually provided in terms of local resources. In the Alpha VM
Remote Desktop, adjust the windows sliders so you can see the Start button.
13. Click Start, and then click Computer.
14. Look in the left section of the window and find Computer.
15. How many C drives do you see there? What are they?
16. When you have finished exploring, click the X button on the tab at the top of the screen to
disconnect the session.
9. Select the Share this Folder check box, and then click the Permissions button.
10. Select Allow - Full Control for the Everyone group, and then click OK.
11. Click the Caching button on the Advanced Sharing dialog box.
L8-14
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
17. Open the file and add a few words. (Keep it clean!)
18. Save and close the document.
19. Create a few more documents for Q2, Q3, and Q4.
11. Can you think of any issues to consider when encrypting the offline files stored on your computer?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-15
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
15. If prompted, click Yes to restart and log back on as Administrator@hq.local with the
TrustM3 password.
3. Right-click SalesPresentations.
4. Do you see the Always Available Offline option? (Do not select it now. This will make all files in
the folder available offline.)
5. Double-click SalesPresentations.
6. Right-click the Q1-Sales file and select the Always Available Offline option. (The Sync Center
briefly appears and syncs the file. The file size is small and synchronization should not take
much time.)
7. Close all windows and navigate back to the desktop when the preparation of the offline files
is complete.
8. Click Start, type Sync in the Search box, and then select the Sync Center from the search results.
9. Click the View sync results link.
L8-16
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
29. Right-click the Local Area Connection and select the Enable option.
30. Click Start, type \\Alpha in the Search box, and then press ENTER.
31. What shares are listed?
34. Switch to the Alpha VM and open the Q1-Sales file again.
35. Do you see the new content now?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-17
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L8-18
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
18. Click the Cancel button to close the Advanced Settings dialog box.
19. Click the Cancel button to return to the Select a power plan window.
20. Select the Balanced (recommended) power plan radio button, then close the Power
Options window.
Note
Since Virtual Machines do not have direct access to the physical
hardware, you will not see all the power management options that
would be available on a physical machine.
4. Right-click the Sales OU and select the Create a GPO in this domain, and link it here option.
5. Type Power Options Laptops for the Group Policy name.
6. Leave the Source Starter GPO settings as (none), and then click OK.
7. Right-click the Power Options Laptops policy and click the Edit option.
8. Expand the Group Policy Management Editor window.
9. Expand the Computer Configuration, Policies, Administrative Templates, System, and
Power Management node.
10. Double-click Select an Active Power Plan GPO from the list.
11. Click the Enabled option.
12. In the Active Power Plan drop-down list under Options, select Power Saver, and then click OK.
13. Double-click the Video and Display Settings folder.
14. Double-click Turn off the display (Plugged In).
15. Click the Enable option.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-19
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
16. Type 120 in the Turn Off the Display (seconds) text box under Options, and then click OK.
17. Close the Group Policy Management Editor window.
18. Close the Group Policy Management utility.
L8-20
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-21
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L8-22
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L8-23
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L8-24
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L9
Lab 9: Working with File Systems
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will create and manage Windows file systems. You will manage NTFS and share
permissions and use EFS to secure files. You will also use the native VHD mount capability of
Windows 7 to mount a VHD file as a drive letter in Windows.
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skipped any of the previous labs, you may need to configure those items now. You can skip these
tasks if you have already performed them.
4. Type the following to confirm, and then press ENTER to accept the change.
Y
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. If you are prompted to initialize disks, click OK. (This is only an identifier, not a format.)
5. What type of disk is Disk 0? (Basic or dynamic? Keep this in mind as you go through the
following steps.)
6. Right-click the C volume on Disk 0, and then select the Shrink Volume option.
7. Type 60000 in the Enter the amount of space to shrink in MB text box, and then click the
Shrink button. (This is a dynamic shrink and does not require a reboot.)
8. On Disk 0, right-click the Unallocated space, and then select the New Simple Volume option.
9. Click Next on the welcome screen.
10. Type 20000 in the Simple volume size in MB text box (do not use a comma), and then
click Next.
11. Choose F as the drive letter, and then click Next.
12. Select the Perform a quick format check box, and then click Next.
13. Click the Finish button to create the new volume.
14. What kind of partition is F? (Primary or logical drive?)
17. Did you have to choose the partition type when you created them?
18. Right-click the G volume and notice the Extend volume and Shrink volume options.
19. Which volumes can you shrink?
21. Right-click the G volume, select the Extend volume option, and then click Next.
22. Type 10000 in the Select the amount of space in MB text box to extend the volume, and then
click Next.
23. Click the Finish button to extend the volume.
24. Right-click the F volume, and then select the Shrink volume option.
25. Type 5000 in the Enter the amount of space to shrink in MB text box, and then click the
Shrink button. (Notice the gap of unallocated space that appears between F and G.)
26. Did you have to convert to dynamic disk in order to perform these operations?
27. Do you think it would be a good idea to shrink a volume that has another volume after it?
28. With a basic disk, does it appear possible to extend anything but the last volume?
3. Select the New Spanned Volume option, and then click Next.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Choose the Disk 2 option from the left, and then click the Add button.
5. What is the total volume size that will be created?
6. Click Next.
7. Choose H as the drive letter, and then click Next.
8. Ensure that NTFS is the selected File system.
9. Also, ensure the Perform a quick format check box is selected.
10. Click Next, and then click the Finish button.
11. Click Yes to convert the disks to dynamic.
12. When the formatting is complete, examine the H volume.
13. What disks are being occupied by the H volume?
14. Are equal amounts of space being used from each disk?
17. Select the Delete Volume option, and then click Yes to confirm.
4. Click Next.
5. Choose H as the drive letter, and then click Next.
6. Ensure that NTFS is the selected File system.
12. Are equal amounts of space being used from each disk?
15. Select the Delete Volume option, and then click Yes to confirm.
1. Right-click the Unallocated space on Disk 1,select the New Mirrored Volume option, and then
click Next.
2. Select the Disk 2 option from the left, and then click the Add button.
3. Type 10000 in the Select the amount of space in MB text box.
4. After typing 10000, notice how both the amount of space taken from each disk and the total
volume size change.
5. Click Next.
6. Choose H as the drive letter, and then click Next.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
13. Are equal amounts of space being used from each disk?
11. Click the New Folder button, and then type VHD for the folder name.
12. Double-click the VHD folder to open it.
13. Type DiskOne.vhd.in the File name text box, and then click the Save button.
18. Right-click the newly created VHD-based disk (Disk 3), select the Initialize Disk option, and then
click OK.
19. Right-click the Unallocated space area next to Disk 3, select the New Simple Volume option, and
then click Next.
20. Leave the default amount of space as is, and then click Next.
31. After the files have been copied, navigate back to the C:\VHD folder.
32. How large is the DiskOne.vhd file now?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Note
Normal users should not be allowed access to the
Customers folder. The following will become the ACL.
(Only these entries should be on the list. The steps that
follow will show you how to achieve this.)
Creator Owner Full control
System Full control
Administrators Full control
Sales Admins Full control
Sales Users Read & Execute
List folder contents
Read
Write
L9-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
5. Click the Edit button, highlight the Users group, and then click the Remove button. (Read the
message that appears thoroughly.)
6. Why were you not successful?
7. Click OK.
8. Can you remove the grey check boxes for the permissions assigned to the Users group?
9. Can you select the Deny Full Control check box for the Users group?
Note
Most users, including administrators, are also members of the Users
group. If you select the Deny Full Control check box for the Users
group, you would be denying access to yourself as well as to the Sales
Admins and Sales Users groups.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-11
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
16. How do the existing permission check boxes appear for the Users group now?
17. Select the Authenticated Users group, and then click the Remove button.
18. Select the Users group, and then click the Remove button.
19. Were you successful this time?
20. Click the Add button, and then click the Locations button. (The users you want are in the hq.local
domain. You need to know how to change the focus when you are in a multi-domain environment
or when you are sitting at a member server or workstation.)
21. Select hq.local in the Locations window, and then click OK.
22. Type sales ad; sales us; creator owner in the Enter the object name to select text box, and then
click OK. (You will find the closest matches to the semicolon separated list. Notice that you did
not have to fully spell out each group name.)
23. Select the Creator Owner group, and then select the Allow Full Control check box.
24. Select the Sales Admins group, and then select the Allow Full Control check box.
25. Select the Sales Users group, and then select the Allow Read & Execute, Allow List Folder
Contents, Allow Read, and Allow Write check boxes.
26. Click OK when you are done, and then click OK again to save the changes.
27. On your own, set the ACL for the SpreadSheets folder to look like the list that follows.
(Remember to remove inheritance before you can remove the Users group.)
CREATOR OWNER Full control
SYSTEM Full control
Administrators Full control
Sales Users Full control
Help Desk Deny Full Control
28. Based on these permissions, will a person who is a member of both the Help Desk group and the
Domain Admins group be able to access the Management folder?
(He or she should not be able to because the Deny permission always takes precedence.)
L9-12
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. Do these permissions apply to someone who is sitting at the computer where the folder exists?
9. Select the Allow Full Control check box for the Everyone group.
10. Why should you not be concerned about securing this more thoroughly?
11. Click OK, click OK again, and then click Close to save the changes.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-13
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Note
Once the share has been created, you will not see the traditional
sharing indicator on the folder. Click the folder and look at the
bottom of the Windows Explorer interface to see the sharing status
of the folder.
1. Log on to the Lima VM with the Quirk user account and the password TrustM3.
2. Click Start, in the Search box type \\kilo.hq.local, and then press ENTER. You should now see a
list of shared folders.
3. Open the Customers share.
4. Navigate around the folders and see what you can access.
Can you modify any files?
L9-14
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Note
The answer should be yes to all of these questions since Quirk is a
member of the Domain Admins group.
7. Now try logging on to the Lima VM as MackOy and attempt to access the Customers and the
SpreadSheets shares.
Can MackOy delete existing files and create new files in Customers?
Can MackOy delete existing files and create new files in SpreadSheets?
Helpful Hint
MackOy is a member of the Sales Admins group but is not a member
of Sales Users.
Does it appear that with these share permissions MackOy can do more than what he was allowed
with the NTFS permissions?
8. Now try logging on to the Lima VM as CheckOff and attempt to access the Customers and the
SpreadSheets shares.
Can CheckOff delete existing files and create new files in Customers?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-15
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Can CheckOff delete existing files and create new files in SpreadSheets?
Helpful Hint
CheckOff is a member of the Sales Users group but is not a member
of Sales Admins.
Does it appear that with these share permissions CheckOff can do more than what he was allowed
with the NTFS permissions?
9. Now try logging on to the Lima VM as Scooty and attempt to access the Customers and the
SpreadSheets shares.
Can Scooty delete existing files and create new files in Customers?
Can Scooty delete existing files and create new files in SpreadSheets?
Helpful Hint
Scooty is a member of the Eng Admins group but is not a member of
Sales Users or Sales Admins.
Does it appear that the share permissions allow Scooty to do more than what the NTFS
permissions allowed?
L9-16
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
3. Click the Security tab, and then click the Advanced button.
4. Click the Effective Permissions button.
5. Click the Select button, type Quirk in the Enter the object name to select text box, and then
click OK.
6. What are the resulting permissions?
7. Click the Select button, type MackOy in the Enter the object name to select text box, and then
click OK.
8. What are the resulting permissions?
9. Click the Select button, type Scooty in the Enter the object name to select text box, and then
click OK.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-17
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
11. Click the Select button, type Sales Users in the Enter the object name to select text box, and
then click OK.
12. What are the resulting permissions?
13. Try a few other user and group names to see the different effective permissions.
14. Click the Cancel button twice to close the security dialog when you are finished.
L9-18
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. Click Start, click the right arrow next to Shutdown, and then select the Restart option.
9. Click Yes to confirm restart.
10. Quickly click inside the VM window as it is restarting. Press a key when prompted to boot from
the CD/DVD.
11. Wait for the Install Windows screen to appear with the language selection.
12. Press SHIFT+F10 on the keyboard simultaneously to open a command prompt.
13. Type the following commands, and then press ENTER after each. (If you cannot locate customers
on C, try using another drive letter, such as D, E or F.)
C:
cd customers
16. Type the name of one of your files, and then press ENTER.
17. Does the file open?
20. If someone stole your laptop, would the NTFS permissions you established prevent unauthorized
access?
21. Click the Action, Reset menu option in the Virtual Machine Connection window.
22. Click the Reset button to confirm.
23. This time, boot normally. (Do not boot from the DVD.)
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-19
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
1. Open the TopSecret folder, and then double-click the EyesOnly.txt file.
2. Does it appear encrypted?
(No, the encryption attribute is still on the file, and the re-encryption is transparent.)
Note
The administrator from the domain is the EFS recovery agent, and the
file to be recovered is not stored on the domain controller with the
recovery agent key. Since the file is stored on the Kilo VM, the
recovery agent cannot inherently open the file. It would have to
be moved to the domain controller where the recovery agent key
is located.
L9-20
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
16. If someone stole your laptop, would EFS encryption prevent unauthorized access?
17. Click the Action, Reset menu option in the Virtual Machine Connection window.
18. Click the Reset button to confirm.
19. This time, boot normally. (Do not boot from the DVD.)
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-21
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L9-22
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-23
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
14. Are equal amounts of space being used from each disk?
No. The spanned volume can be created from unequal amounts of space.
16. Do you have the ability to extend or shrink this volume?
Yes.
L9-24
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L9-25
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. Do these permissions apply to someone who is sitting at the computer where the folder exists?
No. These permissions only apply to those who connect to this share via the network.
10. Why should you not be concerned about securing this more thoroughly?
Because the NTFS permissions have been configured to be more secure.
L9-26
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. Now try logging on to the Lima VM as CheckOff and attempt to access the Customers and the
SpreadSheets shares.
Can CheckOff delete existing files and create new files in Customers?
No.
Can CheckOff delete existing files and create new files in SpreadSheets?
Yes.
Does it appear that the share permissions allow CheckOff to do more than what the NTFS
permissions allowed?
No.
9. Now try logging on to the Lima VM as Scooty and attempt to access the Customers and the
SpreadSheets shares.
Can Scooty delete existing files and create new files in Customers?
No.
Can Scooty delete existing files and create new files in SpreadSheets?
No.
Does it appear that the share permissions allow Scooty to do more than what the NTFS
permissions allowed?
No.
L9-28
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L10
Lab 10: Securing Windows 7
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L10-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Configure UAC
Configure the Windows 7 Firewall
Use BitLocker to Secure Data
Implement Network Access Protection
Lab Overview
In this lab, you will examine some of the advanced options available to secure the Windows 7
operating system. You will configure the UAC system to protect users from malicious software.
You will configure the Windows 7 firewall to prevent unauthorized access over the network. You
will use BitLocker to encrypt data and implement Network Access Protection to ensure that
systems on the network are healthy before they are allowed access.
L10-2
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skipped any of the previous labs, you may need to configure those items now. You may skip these
tasks may be skipped if you have already performed them.
1. In the Virtual Machine Connection window for each VM, click Media, DVD Drive, and Insert
Disk. (This is a menu option at the top of the Virtual Machine Connection window.)
2. Browse to the C:\LabFiles\ISO folder, select the 6183-LabFiles.iso file, and then click Open.
3. If an AutoPlay window appears, click the X button to close it.
4. Type the following to confirm, and then press ENTER to accept the change.
Y
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L10-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L10-4
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
7. Slide the slider to the location that would provide the user with the least amount of UAC prompts.
Does Microsoft recommend this configuration?
8. What will the user see in terms of UAC prompts with the selected setting?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L10-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
12. Click the Cancel button to discard any changes and leave the default settings.
4. Navigate around the Computer Management console. Does it appear fully functional?
9. Close the System Properties dialog box and the System Control Panel.
10. Click Start, type cmd in the Search box, and then click the cmd item in the search results.
11. Type the following, and then press ENTER in the command prompt.
bcdedit
L10-6
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
14. Click Start, and then type cmd in the Search box.
15. Right-click cmd.exe in the search results, and then select the Run As Administrator option.
16. Click Yes to confirm.
17. Type the following, and then press ENTER.
bcdedit
20. Log off the Kilo VM and log back on as Scooty@hq.local with a password of TrustM3.
21. Click Start, right-click Computer, and then select the Manage option. (This time you are
prompted for credentials.)
22. Type Scooty with a password of TrustM3. What are the results?
30. Click the Start button, and then type cmd in the Search box.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L10-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
31. Right-click cmd.exe in the search results and select the Run As Administrator option.
32. Are you prompted to simply confirm running the tool this time?
8. Right-click the Sales OU, and then select the Create a GPO in this domain, and Link it
here option.
9. Type Sales UAC Settings in the Name text box, and then click OK.
10. Right-click Sales UAC Settings, and then select the Edit option.
11. Navigate to Computer Configuration, Policies, Windows Settings, Security Settings, Local
Policies, and Security Options.
12. Scroll down to the bottom in the right section of window to see all the User Account Control
related options.
13. On the title bar at the top of the Local Security Policy window, there is a line between the Policy
column and the Policy Setting column. Drag that line to the right to maximize the Policy column
until all the headings are exposed.
14. Double-click the following policy: User Account Control: Behavior of the elevation prompt
for standard users.
15. What are the options for the elevation prompt?
L10-8
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
16. Is it possible to completely stop standard users from configuring advanced settings on their
computers?
20. Can administrators in Admin Approval Mode be treated like standard users?
Note
Setting this option is effectively the same as configuring the Always
Notify option for UAC in Control Panel on the local machine.
23. Double-click the User Account Control: Admin Approval Mode for the Built-in
Administrator account.
24. What are the options for this setting?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L10-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
26. Which UAC setting can you configure to block standard users from installing applications?
27. Which UAC setting can you configure to only allow applications that have a signing certificate?
8. Switch back to the User Accounts dialog box when the policy update is complete in the
command prompt.
9. Click the Change User Account Control Settings link.
10. What is the current setting for UAC? (If it has not changed, wait a few minutes and try to run the
gpupdate /force again.)
L10-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
29. Move the slider to the second notch down if it is not already there and click OK to save the
setting. (Click Yes if you are prompted to confirm.)
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L10-11
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
7. Select Windows Firewall with Advanced Security in the list of available snap-ins, and then click
the Add button.
8. Select the Local Computer option, and then click the Finish button.
9. Click the Add button again, select the Another Computer option, type Lima.hq.local, and then
click the Finish button.
10. Click OK when you have finished adding the connections.
11. Click File, Save to save the console as Firewall Admin to the Desktop folder.
12. Navigate to the Windows Firewall with Advanced Security on Local Computer,
Inbound Rules.
13. Scroll down to the bottom of the list and find all of the Windows Firewall Remote
Management entries.
14. Right-click each entry and select the Enable Rule option if it is not already enabled.
15. Navigate to the settings for the Windows Firewall with Advanced Security on Lima,
Inbound Rules.
16. Scroll down to the bottom of the list and find all of the Windows Firewall Remote
Management entries.
17. Right-click each entry and select the Enable Rule option if it is not already enabled.
18. Keep the Windows Firewall with Advanced Security on Lima selected.
19. Scroll to the right in the list of available rules until you see the Protocol column.
20. Click the Protocol column header to sort by protocol.
21. Scroll through the list of protocols until you find the ICMPv4 and ICMPv6 protocol types.
22. Right-click and Disable all of the ICMPv4 and ICMPv6 related rules.
23. Open a command prompt on the Kilo VM, type the following, and then press ENTER.
ping t 4 Lima
L10-12
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
27. Switch to the Kilo VM after running this command and check the ping that is running against the
Lima VM.
28. Is it still working?
29. Press CTRL+C to stop the continuous ping in the command prompt on the Kilo VM.
30. Switch back to the Kilo VM and browse through the list of enabled rules for the Kilo and Lima
VMs in the firewall.
31. Click the Name column header to sort by name instead of protocol type. Notice that while many
rules are enabled, a large number of them are not.
32. Enable the following inbound rules on both the Kilo and Lima VMs if the service is present.
(Some may have multiple entries. Enable all of them. If any of these items is not present, skip
them.) Now most of the management tools will work remotely against the Kilo and Alpha VMs.
Network Discovery
Performance Logs and Alerts
Remote Assistance
Remote Desktop
Remote Event Log Management
Remote Scheduled Tasks Management
Remote Service Management
Remote Volume Management
Windows Remote Management
33. On the Kilo VM, click Start, right-click Computer, and then select the Manage option.
34. Right-click Computer Management (Local), and then select the Connect to another
computer option.
35. Type Lima, and then click OK.
36. Explore the Computer Management Console and see which options work properly.
37. When you finish, open the command prompt on the Kilo VM and type the following:
netsh advfirewall set allprofiles state off
38. Run the above command in the command prompt on the Lima VMs as well.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L10-13
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. Click the New Folder button and type VHD for the folder name. (This folder may already exist
from a previous lab.)
9. Double-click the VHD folder to open it.
10. Type UFD-One.vhd for the file name and click Save.
11. Click the Dynamically Expanding option.
12. Type 1024 in the Virtual hard disk size text box, ensure that MB is selected in the drop-down
list, and then click OK. (The VHD mounting now appears in the list of available disks.)
13. Right-click the newly created VHD-based disk, select the Initialize Disk option, and then
click OK.
14. Right-click the Unallocated area next to the new disk, select the New Simple Volume option, and
then click Next.
15. Leave the default amount of space selected and click Next.
16. Choose drive letter U and click Next.
L10-14
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
3. Type Password123 in the Type your password and the Retype your password text boxes, and
then click Next.
4. Click Save the recovery key to a file, and then click Save.
5. Click Yes to the confirmation prompt, and then click Next.
6 Click the Start Encrypting button, and then click Close when the encryption is complete.
7. Navigate to the U drive in Windows Explorer.
8. Can you see the Scripts folder?
10. Can you open the ReadMe file in the Scripts folder?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L10-15
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
9. Right-click the U drive, and then select the Unlock Drive option.
10. Type Password123 for the password, and then click the Unlock button.
11. Click Open Folder to View Files.
14. When you finish exploring the encrypted disk, switch back to the Disk Management tool.
15. Right-click VHD based disk (Disk 3), select the Detach VHD option, and then click OK.
L10-16
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Select the 006 DNS Servers check box, type 10.100.100.201 in the IP address text box, and then
click the Add button.
5. Click Yes if you are asked to confirm.
6. Select the 015 DNS Domain Name check box, type restricted.local in the String value text box,
and then click OK.
1. Click Start, type policy in the Search box, and then select Network Policy Server from the
search results.
2. Select NPS (Local).
3. Click the Configure NAP link in the right section of the window.
4. Select Dynamic Host Configuration Protocol (DHCP) from the Connection Method drop-
down list, and then click Next.(If you cannot see the Next button, drag the taskbar to the right-
hand side of your screen to expose the bottom part of the dialog box.)
5. Click Next on the RADIUS clients page.
6. Click Next on the Specify DHCP Scopes page.
7. Click Next on the Configure Machine Groups page.
8. Click Next on the Remediation Server Group page.
9. Clear the Enable auto-remediation of client computers check box on the Define NAP Health
Policy page, and then click Next.
10. Click Finish on the Completing NAP Enforcement Policy and RADIUS Client
Configuration page.
11. Leave the NPS console open for the following procedure.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L10-17
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
3. Clear all check boxes except A firewall is enabled for all network connections, and then
click OK.
4. Leave the Network Policy Server console open.
3. Type the following commands, and then press ENTER after each:
netsh advfirewall set allprofiles state off
gpupdate
sc query napagent (Look at the State of the napagent service. It should be Running.)
Note
If the Group Policy settings do not appear to take effect right away,
wait a few minutes and run gpupdate again.
7. Examine your IP characteristics. (Look at the ipconfig information at the top of the screen, and the
DNS domain name.)
8. Are you restricted, or do you have full access?
9. Why?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L10-19
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
14. Why?
Task 9: Clean Up
In this task, you will undo the changes made to the VM during this bonus exercise.
1. Switch to the Alpha VM and use the Active Directory Users and Computers tool to move the Kilo
VM back to the Computers container. (Or move it back to hq.local, Accounts, Management if
that is where it was originally located.)
2. Switch to or open the DHCP console.
3. Expand IPv4, right-click the Scope Classroom option, and then select Properties.
4. Click the Network Access Protection tab, select the Disable for This Scope option, and then
click OK.
5. Open the Server Manager, and then select Roles.
6. Click the Remove Roles link, and then click Next.
7. Clear the Network Policy and Access Services role check box, and then click Next.
8. Click the Remove button, and then click Close.
9. Click Yes to restart. (Wait for the Alpha VM to present a logon screen before continuing.)
10. Switch to the Kilo VM, and then run gpupdate from the command prompt.
11. Type the following command, and then press ENTER.
netsh advfirewall set allprofiles state on
12. Click Start button, type mmc in Search box, and then press ENTER.
13. Select Network Access Protection Agent from search results and click the Stop this service link.
(Unless it has already been stopped.)
L10-20
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L10-22
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L10-23
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L10-24
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L11
Lab 11: Windows 7 Backup and
Recovery
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L11-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will use the backup and recovery features of the Windows 7 operating system. You
will examine the System Restore feature and use the Previous Versions capability to restore
individual files. You will also use the Windows 7 Backup tool to backup specific files.
L11-2
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skipped any of the previous labs, you may need to configure those items now. You may skip these
tasks if you have already performed them.
1. In the Virtual Machine Connection window for each VM, click Media, DVD Drive, Insert Disk.
(This is a menu option at the top of the Virtual Machine Connection window.)
2. Browse to the C:\LabFiles\ISO folder, select the 6183-LabFiles.iso file, and then click Open.
4. Type the following to confirm, and then press ENTER to accept the change.
Y
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L11-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L11-4
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Select the original restore (Original Configuration) point, and then click Next.
5. Click the Finish button, and then click Yes to confirm.
6. The system will automatically restart to begin the System Restore.
7. Log back on to the Kilo VM as Administrator with a password of TrustM3.
8. Click Close on the system restore message that appears.
9. Do you see the Stopwatch icon on the Desktop now?
5. Open the PreviousVersion folder, right-click in the empty folder, and then select the New, Text
document option.
6. Type Data for the name, and then press ENTER.
7. Open the Data text document and type This data was created on Monday within the text
document. Save and close the document.
8. Close the PreviousVersion folder.
9. Click Start, right-click Computer, and then select Properties.
10. Click the System protection link.
11. Ensure that protection is set to On for the Local Disk (C:) (System) drive.
12. Click the Create button on the bottom of the System Properties dialog box.
13. Name the first system restore point Monday Midnight.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L11-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
14. Click the Create button to create a manual system restore point.
15. Click Close and leave the System Properties dialog box open.
16. Double-click the PreviousVersion folder.
4. Close the Previous Versions Properties dialog box and navigate back to the desktop.
L11-6
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
9. Right-click the PreviousVersion folder and select the Restore previous version option.
10. Select the most recent version of the Data folder that is available on the list.
(Hint: It is the first one on the list.)
11. Click the Restore button.
12. Click the Restore button in the Are you sure message.
13. Click OK to close the success message.
14. Did it work?
15. When was the last data entry created within the Data document?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L11-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
28. You can restore to a different location just in case you are afraid of overwriting good data
with bad.
29. In the PreviousVersion Properties dialog box, select the newest version in the list of
folder versions.
30. Click the Copy button.
31. Select Computer, Local Disk (C:) in the Copy Items dialog box.
32. Click the Copy button.
33. Click OK to close the PreviousVersion Properties dialog box.
34. Did it work?
L11-8
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
35. What do you see when you navigate to the Local Disk (C:) drive?
Helpful Hint
Remember that previous versions are not a substitute for regular
backups, and the Previous Versions client is already installed within
Windows 7 and Windows Vista.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L11-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
20. Click the Save settings and run backup button. The Backup in progress dialog box displays
within the Backup and Restore center. Detailed information about the backup performance and the
backup be displays.
21. Click the View Details button next to the Backup progress indicator while the backup is running.
22. When the backup is complete, you have successfully completed this part of the lab.
L11-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
8. Navigate to the Alpha VM backup if you are not automatically directed to that location.
9. Browse to Backup of C, Scripts.
10. Select the PowerShell folder, and then click the Add folder button.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L11-11
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L11-12
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L11-13
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L11-14
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L12
Lab 12: Troubleshooting and
Monitoring Windows 7
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L12-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will monitor and troubleshoot the Windows 7 operating system. You will use the
Performance Monitor to analyze the performance characteristics of Windows 7. You will use the
Task Manager to view and stop running tasks. You will also use the Event Viewer to examine the
system for errors or other important messages.
L12-2
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skipped any of the previous labs, you may need to configure those items now. You may skip these
tasks if you have already performed them.
1. In the Virtual Machine Connection window for each VM, click Media, DVD Drive, and Insert
Disk. (This is a menu option at the top of the Virtual Machine Connection window.)
2. Browse to the C:\LabFiles\ISO folder, select the 6183-LabFiles.iso file, and then click Open.
4. Type the following to confirm, and then press ENTER to accept the change.
Y
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L12-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Expand the CPU section, and then click the CPU column header to sort by CPU time. Which
process is the busiest (other than System)?
5. Expand the Disk section, and then click the Read (Bytes/sec) column header. Which process is
reading the most from the disk?
6. Expand the Network section, and then click the Total (Bytes/sec) column header. Which process
is communicating with the network the most?
7. Expand the Memory section, and then click the Working Set column. Which process is
consuming the greatest amount of RAM?
L12-4
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
10. Expand the Monitoring Tools container in the left section of the window.
11. Select the Performance Monitor tool. Are there any counters currently being graphed?
12. Click the plus (+) icon on the icon bar at the top of the screen.
13. From the list of available counters, add the following to the list:
Processor > % Processor Time
Logical Disk > % Disk Time
Logical Disk > % Free Space
Logical Disk > Disk Read Bytes/sec
Logical Disk > Disk Write Bytes/sec
Memory > Available Mbytes
Memory > Pages/sec
14. Click OK when you finish adding these items. (You should now see a running graph of
current performance.)
15. Expand the Data Collector Sets container in the left section of the window.
16. Expand the System container. Which predefined data collector sets are available in this list?
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L12-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
4. Select the Performance Counter and System configuration information check boxes, and then
click Next.
5. In the Sample interval text box, type 1. (Longer sample intervals are better for long-term
monitoring.)
6. Click the Add button, and then add the following counters to the list:
Processor > % Processor Time
Logical Disk > % Disk Time
Logical Disk > % Free Space
Logical Disk > Disk Read Bytes/sec
Logical Disk > Disk Write Bytes/sec
Memory > Available Mbytes
Memory > Pages/sec
7. Click OK to add the counters to the list, and then click Next.
9. Click the Add button in the Registry keys window.
10. Type HKLM\System\CurrentControlSet\Services, and then click Next.
11. Click Next to accept the default log file name, and then click Finish.
12. Highlight the User Defined container in the left section of the window.
13. Right-click the User Defined container, and then select New, Data Collector Set.
14. Type Classroom Alert for the name, click the Create Manually option, and then click Next.
15. Select the Performance Counter Alert option, and then click Next.
16. Click Add, add the Processor > % Processor Time counter, and then click OK to add the
counter to the list.
17. In the Limit text box, type 80 for the percentage that the counter must be above to generate
the alert.
18. Click Next, and then click Finish.
19. Highlight the Classroom Alert in the left section of the window.
20. Double-click the DataCollector01 entry.
21. Click the Alert Action tab, and then select the Log an entry in the application log option.
22. Select the Classroom Log from the drop-down list, and then click OK.
23. Right-click the Classroom Alert, and then select the Start option.
Note
You now have a watchdog process that starts a log of system counters
whenever CPU usage rises above 80 percent.
L12-6
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
3. When you finish, right-click the Classroom Log again, and then click the Stop option.
4. Open the System container in the left section of the window.
5. Right-click the System Diagnostics data collector, and then click the Start option.
6. Launch applications and generate activity. Within 60 seconds, the data collector
automatically stops.
7. After about a 1 minute, right-click the System Performance data collector and click the
Start option.
8. Once again, launch applications and generate activity. Within 60 seconds the data collector
automatically stops.
9. When you finish, expand the Reports container in the left section of the window.
10. Expand User Defined, Classroom Log.
11. Double-click the report in the right section of the window to view it. (A chart with the activity
generated during the 2-minute interval appears.)
12. In the left section of the window, expand System and view the reports in System Diagnostics.
(Notice that this report is text-based, but very detailed.)
13. Now view the System Performance report. (In this report, you can switch from text to chart view
with the icon bar at the top of the Performance Monitor tool.)
14. Once you finish viewing the data, go back and start the Classroom Log again and leave it
running. (Before starting the log, you may want to change the sample interval to 15 seconds. The
1 second interval you used earlier is fine for short-term monitoring, but not good for lengthy
periods of time.)
Note
The text reports are customizable and allow great flexibility and power
in monitoring a system.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L12-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
9. Right-click one of the Notepad instances, and then select the End Task option.
10. Right-click the Computer Management instance, and then select the Go to process option.
11. Which process did it take you to?
12. Right-click the mmc.exe process, and then select the End Process option.
13. Click End Process to confirm.
14. Right-click the wordpad.exe instance, and then select the Open File Location option.
L12-8
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
16. Right-click one of the svchost.exe instances, and then click the Go to Service option.
17. Which service(s) was highlighted?
18. Perform the previous two steps on several of the other svchost.exe instances. Log your results
here:
26. In the command prompt, type notepad c:\recovery\, and then press the TAB key. (Do NOT press
ENTER yet. This automatically fills in the name of the only subfolder under Recovery.)
27. At the end of this line, type \winre.wim, and then press ENTER.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L12-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
31. This command prompt file is several hundred megabytes in size and would take a very long time
to open. Give it a few minutes to generate some data, and then close Notepad.
32. What is the physical memory usage now?
33. Launch two Notepad instances, type a few characters in each one, and then leave them running for
the next section.
1. Switch to the Kilo VM, close all open programs, and then open the command prompt.
2. Type the following commands, and then press ENTER after each. (Minimize each one
after launching.)
notepad
notepad
notepad
regedit
3. Type the following, and then press ENTER. (more is a program that text information can be
piped to using the pipe symbol (|) after any command that normally sends text to the screen.)
tasklist | more
4. Use the ENTER key to step through one line at a time and the SPACEBAR to page through the
information one screen at a time.
5. Type the following, and then press ENTER.
tasklist /svc | more
L12-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
9. Scroll through the help listing and notice that a process can be eliminated using either the PID
(process ID) or the IM (image name).
10. When would it be better to use the PID?
11. Type the following (where #### is the PID of one of the Notepad instances), and then press
ENTER.
taskkill /pid ####
15. Switch to the Alpha VM, open Notepad twice, and then enter a few lines of text in each
Notepad document.
16. Switch back to the Kilo VM.
17. Type the following in the command prompt, and then press ENTER.
tasklist /s alpha | more
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L12-11
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
22. What happened to the data that you typed in each document?
24. You can close all windows that are open on the Alpha and Kilo VMs.
4. Expand the Error section and double-click the event ID with the most errors. A filtered view
appears listing only those events.
5. Double-click one of the events to display the details.
6. Close the event when you are finished.
7. Expand the Windows Logs container in the left section of the window.
L12-12
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
9. Scan through the event logs to become familiar with the new layout.
3. Right-click the Subscriptions container and select the Create Subscription option.
4. Type Events from Alpha in the Subscription name text box.
5. Click the Select Computers button.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L12-13
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
6. Click Add Domain Computers, type Alpha in the list of computers, and then click OK.
7. Does it appear that you could add more than one computer to collect from?
16. On the Kilo VM, click Start, Administrative Tools, and Services.
17. Right-click Services (Local) in the left section of the window, and then select Connect to
another computer.
18. Type Alpha for the computer name, and then click OK.
19. Scroll down to Windows Event Collector in the list of services and double-click it.
20. Change the Startup Type to Automatic, click the Start button, and then click OK.
21. Close the Services console, and then switch back to Event Viewer.
Note
This subscription now collects future events from the Alpha VM into
the Forwarded Events container. You may look at this container later
in class to see if any events have been propagated.
L12-14
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L12-15
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L12-16
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and provided to you by TechSherpas. It is L12-17
illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L12-18
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L13
Lab 13: Running and Troubleshooting
Applications on Windows 7
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L13-1
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Objectives
Lab Overview
In this lab, you will troubleshoot application issues for the Windows 7 operating system. You will
use the Application Compatibility Toolkit to view existing application patches and see how you
could possibly develop your own custom patches. You will use the built-in compatibility options
within Windows 7 to run legacy applications.
L13-2
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Lab Procedures
Prerequisites
The exercises in this lab require configuration that has been performed in previous labs. If you
skipped any of the previous labs, you may need to configure those items now. You may skip these
tasks if you have already performed them.
1. In the Virtual Machine Connection window for each VM, click Media, DVD Drive, and Insert
Disk. (This is a menu option at the top of the Virtual Machine Connection window.)
2. Browse to the C:\LabFiles\ISO folder, select the 6183-LabFiles.iso file and then click Open.
4. Type the following to confirm, and then press ENTER to accept the change.
Y
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L13-3
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L13-4
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
Note
The SUA Wizard needs to be run as a standard user. However, the
Standard User Analyzer full version is run as an Administrator.
1. Click Start, All Programs, Microsoft Application Compatibility Toolkit, and Developer and
Tester Tools.
2. Click the Standard User Analyzer application to execute the program.
Note
The SUA is monitoring, in the background, how the application goes
through its installation process.
13. Select the I Accept option on the license agreement, and then click Next.
14. Accept the defaults on the User Information window, and then click Next.
15. Accept the defaults on the Destination Folder window, and then click Next.
16. Click Next in the Ready to install the Application window. The SUA monitored
installation commences.
17. Click the Finish button in the SUPERAntiSpyware Professional has been successfully installed
window. The SUA tool calculates.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L13-5
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
22. Click the Do Not Protect button on the Protect Home Page from Being Changed window.
23. Click Close in the Definitions Update Reminder window.
24. Select Close in the SUPERAntiSpyware main menu. Only the SUA window should open.
25. Again, what is the final line of the SUA output?
26. Based on the tabs you see at the top of the SUA window, how many issues were found with the
SUPERAntiSpyware product for the following tabs:
File = ___________________________________________________________
Registry = ______________________________________________________
Other Objects = ________________________________________________
(Hint: Look at the numbers in the tabs.)
27. What is the complete error on the File tab?
L13-6
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
28. Does this error suggest that sasp.exe works with File and Registry virtualization?
29. What are the three complete errors on the Registry tab?
a.
b.
c.
30. What do these three errors indicate about their corresponding registry keys and Windows 7?
31. On the Other Objects tab, are these OpenFileMappingW sections allowed by Windows 7?
(Hint: Color?)
6. Click Next in the Important Information window, and then click Next again.
7. Type the following e-mail address in the User Information window.
Test@test.com
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L13-7
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
1. In the Kilo VM, click Start, All Programs, and Zone Labs.
2. Right-click the Zone Alarm executable.
3. Select the Properties option.
11. Click the up arrow in the System Tray if the red and green Zone Alarm icon disappears from the
System Tray. The icon appears.
12. Double-click the red and green Zone Alarm icon. The Zone Alarm application should
open successfully.
Administering
This is a unique and Maintaining
copy of the course Windows
material identified 7 Lab Guide
by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, L13-9
and provided to you by TechSherpas. It is illegal to reprint,
redistribute, orresell
Globalthis content.
KnowledgeThe Licensed
TrainingContent
LLC is licensed "as-is." Microsoft does not support this Licensed Content in any way and Microsoft gives no express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.
TechSherpas
L13-10
This is a unique Administering
copy of the course material identified by code 5a2bccb2-c5fd-4faf-8aa1-147b13239c22, and and Maintaining
provided Windows 7 ItLab
to you by TechSherpas. Guide
is illegal to reprint,
redistribute, or resell this content. The Licensed Content is licensed "as-is." Microsoft does not support this Licensed
Content
Global inKnowledge
any way and Microsoft
Training gives
LLCno express
warranties, guarantees or conditions. Please report any unauthorized use of this content to piracy@microsoft.com or by calling +1 800-785-3448.