You are previewing Exam Ref 70-687: Configuring Windows 8.
O'Reilly logo
Exam Ref 70-687: Configuring Windows 8

Book Description

Prepare for Exam 70-687—and help demonstrate your real-world mastery of Windows 8 setup and support. Designed for experienced IT Professionals ready to advance their status—Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA level.

Focus on the expertise measured by these objectives:

  • Install and upgrade to Windows 8

  • Configure hardware and applications

  • Configure network connectivity

  • Configure access to resources

  • Configure remote access and mobility

  • Monitor and maintain Windows clients

  • Configure backup and recovery options

  • Table of Contents

    1. Dedication
    2. Special Upgrade Offer
    3. Introduction
      1. Microsoft certifications
      2. Who should read this book
        1. Assumptions
      3. Who should not read this book
      4. Organization of this book
      5. Conventions and features in this book
      6. System requirements
      7. Errata & book support
      8. We want to hear from you
      9. Stay in touch
    4. Preparing for the exam
    5. 1. Install and upgrade Windows 8
      1. Objective 1.1: Evaluate hardware readiness and compatibility
        1. Identifying the correct version of Windows 8
        2. Hardware support: differences between 32-bit and 64-bit Windows 8
        3. Software compatibility and Windows 8
        4. Hardware compatibility in Windows 8
        5. Common application compatibility problems
          1. User Account Control
          2. Windows Resource Protection
          3. Incompatibilities of 64-bit
          4. Windows Filtering Platform
          5. Kernel-mode drivers
          6. Operating system version number changes
        6. Managing application compatibility in Windows 8
          1. Running earlier Windows versions in Hyper-V: What to look for
          2. Setting application compatibility in Windows 8
        7. Objective summary
        8. Objective review
      2. Objective 1.2: Install Windows 8
        1. What are the installation methods?
        2. Following a pre-installation checklist
        3. Choosing between an upgrade or a clean installation
          1. The System Reserved partition
          2. When to perform a clean install
          3. Methods for performing a clean installation
        4. Creating a custom Windows 8 installation
          1. Step 1: Create a Windows PE drive
          2. Step 2: Create an unattended answer file
          3. Step 3: Install Windows 8
          4. Step 4: Capture the image
          5. Step 5: Deploy the image to the test computer
        5. Installing Windows 8 into a Virtual Hard Disk (VHD)
          1. Using an Existing VHD
          2. Creating a new VHD
        6. Deploying via Windows To Go
        7. Understanding common Windows 8 installation errors
        8. Activating Windows 8
        9. Upgrading to Windows 8
        10. Objective summary
        11. Objective review
      3. Objective 1.3: Migrate and configure user data
        1. Choosing to migrate
          1. Migration using Windows Easy Transfer
          2. Migration using the User State Migration Tool (USMT)
          3. Using folder redirection
        2. Objective summary
        3. Objective review
      4. Chapter summary
      5. Answers
        1. Objective 1.1: Thought experiment
        2. Objective 1.1: Review
        3. Objective 1.2: Thought experiment
        4. Objective 1.2: Review
        5. Objective 1.3: Thought experiment
        6. Objective 1.3: Review
    6. 2. Configure hardware and applications
      1. Objective 2.1: Configure devices and device drivers
        1. 32-bit versus 64-bit and unsigned drivers
        2. Maintaining hardware device drivers
        3. Managing device drivers with Device Manager
        4. Installing hardware in Windows 8 using Device Manager
        5. Installing legacy hardware in Windows 8
        6. Configuring device drivers
        7. Troubleshooting and repairing device drivers
          1. Rolling back a device driver
          2. Hiding drivers in Windows Update
          3. Removing and reinstalling a driver
        8. Using Devices and Printers and Device Stage
        9. Objective summary
        10. Objective review
      2. Objective 2.2: Install and configure desktop applications
        1. Automating software installs from a server
        2. Setting default program options in Windows 8
          1. Set Your Default Programs option
          2. Associate A File Type Or Protocol With A Program option
          3. Change AutoPlay Settings option
          4. Set Program Access And Computer Defaults option
        3. Managing program compatibility
        4. Objective summary
        5. Objective review
      3. Objective 2.3: Install and configure Windows Store applications
        1. Disabling access to the Windows Store
        2. Sideloading apps in Windows 8
        3. Synching app licenses
        4. Objective summary
        5. Objective review
      4. Objective 2.4: Control access to local hardware and applications
        1. Blocking external media access using Group Policy
        2. Blocking program and app access using AppLocker
        3. Objective summary
        4. Objective review
      5. Objective 2.5: Configure Internet Explorer
        1. Configuring compatibility view in IE10
        2. Setting browser security options in IE10
        3. Allowing websites through SmartScreen security
        4. Objective summary
        5. Objective review
      6. Objective 2.6: Configure Hyper-V
        1. Using Hyper-V in Windows 8 Pro
        2. Using the Virtual Machine Connection utility in Windows 8
        3. Configuring virtual machines in Hyper-V
          1. Creating virtual switches and sandboxing VMs
          2. Managing snapshots in Hyper-V
        4. Importing and exporting virtual machines
        5. Understanding Hyper-V limitations
        6. Objective summary
        7. Objective review
      7. Chapter summary
      8. Answers
        1. Objective 2.1: Thought experiment
        2. Objective 2.1: Review
        3. Objective 2.2: Thought experiment
        4. Objective 2.2: Review
        5. Objective 2.3: Thought experiment
        6. Objective 2.3: Review
        7. Objective 2.4: Thought experiment
        8. Objective 2.4: Review
        9. Objective 2.5: Thought experiment
        10. Objective 2.5: Review
        11. Objective 2.6: Thought experiment
        12. Objective 2.6: Review
    7. 3. Configure network connectivity
      1. Objective 3.1: Configure IP settings
        1. Comparing IPv4 to IPv6
          1. Configuring the IPv4 subnet mask
          2. Configuring the IPv4 default gateway
        2. Configuring IPv6 addresses
        3. Understanding different types of IP addresses
          1. IPv4 address types
          2. IPv6 address types
        4. Configuring IPv4 and IPv6 in Windows 8
        5. Using IPConfig
        6. Additional network troubleshooting tools in Windows 8
        7. Objective summary
        8. Objective review
      2. Objective 3.2: Configure networking settings
        1. Setting up VPN connections in Windows 8
        2. Resolving computer name, domain, and workgroup conflicts
        3. Using the Windows 8 automatic network troubleshooter
        4. Objective summary
        5. Objective review
      3. Objective 3.3: Configure and maintain network security
        1. Understanding defense in depth
        2. Mitigating security threats
          1. Eavesdropping
          2. Denial of service (DoS) attacks
          3. Port scanning
          4. Man in the middle
        3. Configuring the Windows 8 Firewall
        4. Comparing communications ports in Windows 8
        5. Using IPsec to secure Windows 8
        6. Configuring Windows Defender
        7. Objective summary
        8. Objective review
      4. Objective 3.4: Configure remote management
        1. Permitting remote sessions on the computer
        2. Configuring Remote Desktop
        3. Configuring Remote Assistance
        4. Objective summary
        5. Objective review
      5. Chapter summary
      6. Answers
        1. Objective 3.1: Thought experiment
        2. Objective 3.1: Review
        3. Objective 3.2: Thought experiment
        4. Objective 3.2: Review
        5. Objective 3.3: Thought experiment
        6. Objective 3.3: Review
        7. Objective 3.4: Thought experiment
        8. Objective 3.4: Review
    8. 4. Configure access to resources
      1. Objective 4.1: Configure shared resources
        1. Configuring HomeGroup settings
        2. Configuring file libraries
        3. Configuring shared printers
          1. Automatically sharing a printer
          2. Manually sharing a printer
          3. Manually connecting to a shared printer
          4. Using the Print Management console
        4. Setting up and configuring SkyDrive
        5. Configuring Near Field Communication (NFC)
        6. Configuring shared folder permissions
          1. Using the Network and Sharing Center
          2. Sharing folders via File Explorer
          3. Using Advanced Sharing
            1. Sharing Through the Command Line
            2. Using the Shared Folders MMC Snap-In
            3. Using Powershell 3.0 Cmdlets
        7. Objective summary
        8. Objective review
      2. Objective 4.2: Configure file and folder access
        1. Configuring NTFS permissions
          1. Working with access control lists (ACLs)
          2. Using NTFS permissions
            1. Standard File and Folder Permissions
            2. Special File and Folder Permissions
            3. Understanding NTFS Permission Inheritance
            4. Disabling NTFS Inheritance in Windows 8
          3. Copying and moving files and folders with NTFS permissions
          4. Using Effective Permissions
          5. Understanding self-healing NTFS
        2. Using EFS to encrypt files and folders
          1. Deciding between BitLocker and EFS
          2. Encrypting a file or folder with EFS
          3. Recovering your EFS-encrypted files
        3. Configuring disk quotas
        4. Configuring object access auditing
          1. Enabling object access auditing
          2. Enabling object access auditing on a folder
          3. Viewing audit log entries in Event Viewer
        5. Objective summary
        6. Objective review
      3. Objective 4.3: Configure local security settings
        1. Configuring Secure Boot
          1. Combining UEFI and Secure Boot
          2. Disabling Secure Boot
          3. Understanding x86 and ARM
        2. Configuring SmartScreen filter
        3. Configuring User Account Control (UAC) behavior
          1. Understanding how UAC works
            1. Uac Shield
            2. UAC Elevation Prompts
            3. Uac Secure Desktop Feature
            4. Improvements to Uac in Windows 8
          2. Using Local Security Policy to configure UAC behavior
        4. Configuring Local Security Policy
          1. Viewing and modifying Local Security Policy
          2. Configuring a password policy
          3. Configuring an account lockout policy
          4. Importing and exporting security settings
        5. Objective summary
        6. Objective review
      4. Objective 4.4: Configure authentication and authorization
        1. Configuring rights
        2. Managing credentials
        3. Managing certificates
          1. Exporting personal certificates
          2. Importing personal certificates
          3. Granting users access to an encrypted file
        4. Configuring smart cards
          1. Virtual smart cards
          2. Changes to the smart card logon experience
          3. Smart Card Service start and stop behavior
          4. Smart card transactions
        5. Configuring biometrics
        6. Configuring picture password
        7. Configuring PIN
        8. Setting up and configuring a Microsoft account
        9. Objective summary
        10. Objective review
      5. Chapter summary
      6. Answers
        1. Objective 4.1: Thought experiment
        2. Objective 4.1: Review
        3. Objective 4.2: Thought experiment
        4. Objective 4.2: Review
        5. Objective 4.3: Thought experiment
        6. Objective 4.3: Review
        7. Objective 4.4: Thought experiment
        8. Objective 4.4: Review
    9. 5. Configure remote access and mobility
      1. Objective 5.1: Configure remote connections
        1. Configuring remote authentication
        2. Configuring Remote Desktop Connection
          1. Enabling Remote Desktop
          2. Working with new Remote Desktop functionality
        3. Establishing VPN connections and authentication
          1. Using tunneling protocols in VPN connections
          2. Configuring VPN connections
            1. Creating a New VPN Connection
            2. Using an Existing VPN Connection to Connect to a Corporate Network
            3. Editing Connection Properties
            4. Deleting A Connection
          3. Enabling VPN Reconnect
        4. Managing broadband connections
        5. Working with Windows 8 Remote Assistance
          1. Enabling Remote Assistance
          2. Requesting and initiating Remote Assistance
          3. Using Easy Connect
        6. Objective summary
        7. Objective review
      2. Objective 5.2: Configure mobility options
        1. Using the Windows Mobility Center
        2. Configuring power policies
          1. Using the Power Options utility in Control Panel
          2. Using Group Policy to configure Power Management
        3. Working with offline files
          1. Enabling offline files
            1. Configuring Server-Side Options
            2. Configuring Client-Side Options
          2. Configuring offline file policies
        4. Configuring Windows To Go
          1. Configuring Group Policy settings for Windows To Go
          2. Creating a Windows To Go Workspace
        5. Configuring sync options
        6. Configuring Wi-Fi Direct
        7. Objective summary
        8. Objective review
      3. Objective 5.3: Configure security for mobile devices
        1. Understanding how BitLocker works
          1. BitLocker pre-provisioning
          2. Used disk space–only encryption
          3. Standard user PIN and password change
          4. Using Network Unlock
          5. Extended storage support
        2. Configuring BitLocker
        3. Using BitLocker To Go
        4. Configuring startup key storage
        5. Configuring location settings (GPS)
        6. Objective summary
        7. Objective review
      4. Answers
        1. Objective 5.1: Thought experiment
        2. Objective 5.1: Review
        3. Objective 5.2: Thought experiment
        4. Objective 5.2: Review
        5. Objective 5.3: Thought experiment
        6. Objective 5.3: Review
    10. 6. Monitor and maintain Windows clients
      1. Objective 6.1: Configure and manage Windows updates
        1. Configuring update settings
          1. Configuring Windows Update settings in Windows 8
          2. Configuring Windows Server Update Services (WSUS)
        2. Updating Windows Store applications
          1. Removing Windows 8 apps
          2. Understanding Windows product lifecycles
        3. Managing Installed Updates
        4. Testing updates
        5. Objective summary
        6. Objective review
      2. Objective 6.2: Manage local storage
        1. Managing disk volumes
          1. Using Disk Management
          2. Using DiskPart for disk operations
          3. Performing disk management with PowerShell 3.0
          4. Using the Check Disk tool
        2. Managing file system fragmentation
          1. Defragmentation
          2. Disk Cleanup
        3. Managing Storage Spaces
        4. Objective summary
        5. Objective review
      3. Objective 6.3: Monitor system performance
        1. Configuring Task Manager
          1. Monitoring system resources
          2. Using the Windows Experience Index
          3. Performance Monitor
          4. Performance counters and bottlenecks
          5. Action Center
          6. Reliability Monitor
        2. Optimizing networking performance
        3. Troubleshooting your network
        4. Configuring event subscriptions
        5. Optimizing the desktop environment
        6. Configuring Indexing Options
        7. Objective summary
        8. Objective review
      4. Answers
        1. Objective 6.1: Thought experiment
        2. Objective 6.1: Review
        3. Objective 6.2: Thought experiment
        4. Objective 6.2: Review
        5. Objective 6.3: Thought experiment
        6. Objective 6.3: Review
    11. 7. Configure backup and recovery options
      1. Objective 7.1: Configure backup
        1. Using Microsoft SkyDrive
        2. Using Windows 7 File Recovery
          1. Using file backup
          2. Monitoring and recovering file backups
        3. Objective summary
        4. Objective review
      2. Objective 7.2: Configure system recovery options
        1. Configure System Restore
          1. Using Safe Mode
          2. Invoking safe boot mode
        2. Refreshing your PC
        3. Resetting your PC
        4. Using System Repair Disc and Recovery Drive
          1. Using Startup Repair
          2. Manually repairing Windows 8 Startup
        5. Performing a system image backup
        6. Objective summary
        7. Objective review
      3. Objective 7.3: Configure file recovery options
        1. Working with File History
          1. Configuring File History
          2. Cleaning up versions
        2. Objective summary
        3. Objective review
      4. Chapter summary
      5. Answers
        1. Objective 7.1: Thought experiment
        2. Objective 7.1: Review
        3. Objective 7.2: Thought experiment
        4. Objective 7.2: Review
        5. Objective 7.3: Thought experiment
        6. Objective 7.3: Review
    12. A. About the authors
    13. Index
    14. About the Authors
    15. Special Upgrade Offer
    16. Copyright