You are previewing Windows® 8 Administration Pocket Consultant.
O'Reilly logo
Windows® 8 Administration Pocket Consultant

Book Description

Portable and precise, this pocket-sized guide delivers ready answers for administering Windows 8. Zero in on core operations and tasks—and get the focused information you need to get the job done.

Table of Contents

  1. Microsoft® Windows 8 Administration Pocket Consultant
  2. Dedication
  3. Introduction
    1. Who Is This Book For?
    2. How Is This Book Organized?
    3. Conventions Used in This Book
    4. Errata & Book Support
    5. We Want to Hear from You
    6. Stay in Touch
  4. 1. Introduction to Windows 8 Administration
    1. Getting Started with Windows 8: The Quick Tour
    2. Understanding 64-Bit Computing
    3. Deploying Windows 8
      1. Using DISM
      2. Understanding Windows Imaging
      3. Managing Access and Prestaging Computers
        1. Prestaging Computers
        2. Modifying Image File Security
        3. Requiring Administrator Approval
      4. Customizing Windows Images
    4. Installing Windows 8
      1. Preparing for Windows 8 Installation
      2. Performing a Windows 8 Installation
    5. Running Windows 8
      1. Using Action Center and Activating Windows
      2. Running Windows 8 in Groups and Domains
        1. Understanding UAC in Windows 8
        2. Logging on to, Shutting Down, and Restarting Windows 8
        3. Managing User Account Passwords with Windows 8
          1. Changing the Current User’s Password
          2. Changing Other Account Passwords
          3. Creating and Using a Password Reset Disk
          4. Resetting a User’s Password
      3. Power Plans, Sleep Modes, and Shutdown
    6. Windows 8 Architecture
  5. 2. Configuring Windows 8 Computers
    1. Supporting Computers Running Windows 8
      1. Working with the Computer Management Console
      2. Getting Basic System and Performance Information
      3. Getting Advanced System Information
      4. Working with WMI Control
    2. Using System Support Tools
      1. Working with Disk Cleanup
      2. Verifying System Files with File Signature Verification
      3. Managing System Configuration, Startup, and Boot
        1. Understanding Startup Modes and Troubleshooting System Startup
        2. Changing Boot Options
        3. Enabling and Disabling Startup Applications for Troubleshooting
        4. Enabling and Disabling Services for Troubleshooting
    3. Managing System Properties
      1. The Computer Name Tab
      2. The Hardware Tab
      3. The Advanced Tab: Performance Options
        1. Setting Windows Performance
        2. Setting Application Performance
        3. Configuring Virtual Memory
        4. Configuring Data Execution Prevention
      4. The Advanced Tab: Environment Variables
        1. Creating an Environment Variable
        2. Editing an Environment Variable
        3. Deleting an Environment Variable
      5. The Advanced Tab: Startup and Recovery Options
        1. Setting Startup Options
        2. Setting Recovery Options
      6. The System Protection Tab
        1. Understanding System Protection
        2. Configuring System Restore
      7. The Remote Tab
    4. Configuring Power Management Settings
      1. Managing Power Options from the Command Line
      2. Working with Power Plans
      3. Selecting and Optimizing Power Plans
      4. Creating Power Plans
      5. Configuring Systemwide Power Button and Password Protection on Wakeup Settings
      6. Managing Power Options in Policy Settings
      7. Using Alarms and Configuring Alarm Actions
        1. Configuring Low-Battery Notification and Actions
        2. Configuring Critical-Battery Alarms
        3. Configuring Reserve-Power Mode
  6. 3. Customizing the Desktop and the User Interface
    1. Optimizing PC Settings
      1. The Personalize Page
        1. Personalizing the Lock Screen
        2. Personalizing the Start Screen and Account Picture
      2. The Users Page
      3. The Notifications Page
      4. The Search, Share, and Privacy Pages
      5. The Sync Your Settings Page
    2. Working with Desktops and Startup Applications
      1. Creating Shortcuts for Desktops, Startup, and More
      2. Adding and Removing Startup Applications
    3. Customizing the Taskbar
      1. Understanding the Taskbar
      2. Pinning Shortcuts to the Taskbar
      3. Changing the Taskbar’s Size and Position
      4. Auto Hiding, Locking, and Controlling Taskbar Visibility
      5. Controlling Programs in the Notification Area
      6. Controlling Icon Display in the Notification Area
    4. Optimizing Toolbars
      1. Displaying Toolbars
      2. Creating Personal Toolbars
    5. Working with Desktop Themes
      1. Applying and Removing Themes
      2. Tailoring and Saving Themes
      3. Deleting Custom Themes
    6. Optimizing the Desktop Environment
      1. Setting the Desktop Background
      2. Working with the Default Desktop Icons
    7. Screen Saver Dos and Don’ts
      1. Configuring Screen Savers with Password Protection
      2. Reducing Screen Saver Resource Usage
      3. Setting Energy-Saving Settings for Monitors
    8. Modifying Display Appearance and Video Settings
      1. Configuring Window Color and Appearance
      2. Optimizing Display Readability
      3. Configuring Video Settings
        1. Checking the Current Video Adapter and Monitor
        2. Changing the Video Driver
        3. Changing the Monitor Driver
        4. Configuring Multiple Monitor Support
        5. Customizing Display Appearance
      4. Troubleshooting Display Problems
  7. 4. Managing Firmware, Boot Configuration, and Startup
    1. Navigating and Understanding Firmware Options
      1. Firmware Interface Types and Boot Data
      2. Boot Services, Run-Time Services, and Beyond
      3. UEFI
    2. Navigating Startup and Power States
      1. Working with Firmware Interfaces
      2. Examining Firmware Interfaces
      3. Power States and Power Management
    3. Diagnosing and Resolving Startup Problems
      1. Troubleshooting Startup Phase 1
      2. Troubleshooting Startup Phase 2
      3. Troubleshooting Startup Phase 3
      4. Troubleshooting Startup Phase 4
      5. Troubleshooting Startup Phase 5
    4. Managing Startup and Boot Configuration
      1. Setting Startup and Recovery Options
      2. Managing System Boot Configuration
      3. Using the BCD Editor
    5. Managing the BCD Store
      1. Viewing BCD Entries
      2. Creating and Identifying the BCD Store
      3. Importing and Exporting the BCD Store
      4. Creating, Copying, and Deleting BCD Entries
      5. Setting BCD Entry Values
      6. Changing Data Execution Prevention and Physical Address Extension Options
      7. Changing the Operating System Display Order
      8. Changing the Default Operating System Entry
      9. Changing the Default Timeout
      10. Changing the Boot Sequence Temporarily
  8. 5. Configuring User and Computer Policies
    1. Group Policy Essentials
      1. Accessing and Using Local Group Policies
      2. Accessing and Using Site, Domain, and OU Policies
    2. Configuring Policies
      1. Viewing Policies and Templates
      2. Enabling, Disabling, and Configuring Policies
      3. Adding or Removing Templates
    3. Working with File and Data Management Policies
      1. Configuring Disk Quota Policies
      2. Configuring System Restore Policies
      3. Configuring Offline File Policies
    4. Working with Access and Connectivity Policies
      1. Configuring Network Policies
      2. Configuring Remote Assistance Policies
    5. Working with Computer and User Script Policies
      1. Controlling Script Behavior Through Policy
      2. Assigning Computer Startup and Shutdown Scripts
      3. Assigning User Logon and Logoff Scripts
    6. Working with Logon and Startup Policies
      1. Setting Policy-Based Startup Programs
      2. Disabling Run Lists Through Policy
  9. 6. Automating Windows 8 Configuration
    1. Understanding Group Policy Preferences
    2. Configuring Group Policy Preferences
      1. Working with Management Actions
      2. Working with Editing States
      3. Working with Alternative Actions and States
    3. Managing Preference Items
      1. Creating and Managing a Preference Item
      2. Setting Common Tab Options
  10. 7. Managing User Access and Security
    1. Understanding User and Group Accounts
      1. User Account Essentials
      2. Group Account Essentials
      3. Domain vs. Local Logon
    2. Managing User Account Control and Elevation Prompts
      1. Redefining Standard User and Administrator User Accounts
      2. Optimizing UAC and Admin Approval Mode
    3. Managing Local Logon
      1. Creating Local User Accounts in a Homegroup or Workgroup
      2. Granting Access to an Existing Domain Account to Allow Local Logon
      3. Changing Local User Account Types
      4. Switching Between Synced and Regular Accounts
      5. Creating Passwords for Local User Accounts
      6. Recovering Local User Account Passwords
      7. Controlling Logon
      8. Removing Accounts and Denying Local Access to Workstations
    4. Managing Stored Credentials
      1. Adding Windows or Generic Credentials
      2. Adding Certificate-Based Credentials
      3. Editing Credentials
      4. Backing Up and Restoring Windows Credentials
      5. Removing Credential Entries
    5. Managing Local User Accounts and Groups
      1. Creating Local User Accounts
      2. Creating Local Groups for Workstations
      3. Adding and Removing Local Group Members
      4. Enabling or Disabling Local User Accounts
      5. Creating a Secure Guest Account
      6. Renaming Local User Accounts and Groups
      7. Deleting Local User Accounts and Groups
    6. Managing Remote Access to Workstations
      1. Configuring Remote Assistance
      2. Configuring Remote Desktop Access
      3. Making Remote Desktop Connections
  11. 8. Installing and Maintaining Applications
    1. Managing Desktop Apps
      1. Working with Apps: The Essentials
      2. Configuring Trusted Apps and Windows Store Access
      3. Enhancing Security for Apps and Overriding Default Settings
      4. Enhancing Networking Security for Apps
    2. Managing Application Virtualization and Run Levels
      1. Application Access Tokens and Location Virtualization
      2. Application Integrity and Run Levels
      3. Setting Run Levels
      4. Optimizing Virtualization and Installation Prompting for Elevation
    3. Installing Programs: The Essentials
      1. Working with Autorun
      2. Application Setup and Compatibility
      3. Making Programs Available to All or Selected Users
    4. Deploying Applications Through Group Policy
    5. Configuring Program Compatibility
      1. Special Installation Considerations for 16-Bit and MS-DOS-Based Programs
      2. Forcing Program Compatibility
        1. Using the Program Compatibility Troubleshooter Wizard
        2. Setting Compatibility Options Directly
    6. Managing Installed and Running Programs
      1. Managing Currently Running Programs
      2. Managing, Repairing, and Uninstalling Programs
      3. Designating Default Programs
      4. Managing the Command Path
      5. Managing File Extensions and File Associations
      6. Configuring AutoPlay Options
      7. Adding and Removing Windows Features
  12. 9. Managing Hardware Devices and Drivers
    1. Working with the Automated Help and Support System
      1. Using Automated Help and Support
      2. Customizing Automated Help and Support
      3. Working with Support Services
        1. Starting, Stopping, and Pausing Services
        2. Configuring Service Startup
        3. Configuring Service Logon
        4. Configuring Service Recovery
        5. Disabling Unnecessary Services
      4. Managing Services Using Preferences
    2. Installing and Maintaining Devices: The Essentials
      1. Installing Preexisting Devices
      2. Installing Internal, USB, FireWire, and eSATA Devices
      3. Installing Wireless, Network, and Bluetooth Devices
      4. Installing Local and Network Printers
        1. Setting Up a Local Printer
        2. Setting Up a Wireless, Bluetooth, or Network Printer
    3. Getting Started with Device Manager
    4. Working with Device Drivers
      1. Device Driver Essentials
      2. Using Signed and Unsigned Device Drivers
      3. Tracking Driver Information
      4. Installing and Updating Device Drivers
      5. Enabling and Disabling Types of Devices
      6. Restricting Device Installation Using Group Policy
      7. Rolling Back Drivers
      8. Removing Device Drivers for Removed Devices
      9. Uninstalling, Reinstalling, and Disabling Device Drivers
      10. Enabling and Disabling Hardware Devices
      11. Troubleshooting Hardware
  13. 10. Handling Maintenance and Support Tasks
    1. Managing Automatic Updates
      1. Windows Update: The Essentials
      2. Restoring Payloads and Components via Windows Update
      3. Configuring Automatic Updating
      4. Checking for Updates
      5. Viewing Update History and Installed Updates
      6. Removing Automatic Updates to Recover from Problems
      7. Hiding Available Updates
      8. Restoring Declined Updates
    2. Using Remote Assistance to Resolve Problems
      1. Understanding Remote Assistance
      2. Creating Remote Assistance Invitations
      3. Offering Remote Assistance or Answering a Remote Assistance Invitation
    3. Detecting and Resolving Windows 8 Errors
      1. Using the Event Logs for Error Tracking and Diagnosis
      2. Viewing and Managing the Event Logs
    4. Scheduling Maintenance Tasks
      1. Understanding Task Scheduling
      2. Viewing and Managing Tasks on Local and Remote Systems
      3. Creating Scheduled Tasks
      4. Troubleshooting Scheduled Tasks
    5. Backing Up and Recovering a Computer
      1. Backing Up and Recovering Files and Folders Using Previous Versions
      2. Recovering from a Failed Start
      3. Recovering from a Failed Resume
      4. Repairing a Computer to Enable Startup
      5. Backing Up and Recovering System State Using System Restore
        1. Understanding Restore Points
        2. Creating Manual Restore Points
        3. Recovering from Restore Points
        4. Troubleshooting System Restore
      6. Creating and Using File History
        1. Configuring File History Backups
        2. Enabling File History Backups and Configuring Drives
        3. Excluding Folders from File History Backups
        4. Modifying Default Save Settings
        5. Recovering Personal Data
    6. Troubleshooting Startup and Shutdown
      1. Resolving Restart or Shutdown Issues
      2. Making Sense of Stop Errors
  14. 11. Using TPM and BitLocker Drive Encryption
    1. Creating Trusted Platforms
      1. TPM: The Essentials
      2. TPM: Management and Policies
      3. Enabling TPM
      4. Initializing and Preparing a TPM for First Use
      5. Turning an Initialized TPM On or Off
      6. Clearing the TPM
      7. Changing the TPM Owner Password
    2. BitLocker Drive Encryption: The Essentials
      1. Understanding BitLocker Drive Encryption
      2. Hardware Encryption, Secure Boot, and Network Unlock
      3. Deploying BitLocker Drive Encryption
    3. Managing BitLocker Drive Encryption
      1. Preparing for BitLocker Drive Encryption
      2. Enabling BitLocker on Nonsystem Volumes
      3. Enabling BitLocker on USB Flash Drives
      4. Enabling BitLocker on System Volumes
      5. Managing and Troubleshooting BitLocker
        1. Recovering Data Protected by BitLocker Drive Encryption
        2. Disabling or Turning Off BitLocker Drive Encryption
  15. 12. Managing Disk Drives and File Systems
    1. Disk Management Essentials
      1. Using the Computer Console
      2. Using Disk Management
      3. Using FSUtil and DiskPart
    2. Improving Disk Performance
      1. Understanding and Using Windows ReadyBoost
      2. Enabling and Configuring ReadyBoost
      3. Understanding and Using Windows ReadyDrive
      4. Understanding and Using Windows SuperFetch
    3. Working with Basic and Dynamic Disks
    4. Using Basic and Dynamic Disks
      1. Understanding Drive Designations
      2. Installing and Initializing New Physical Disks
      3. Changing a Disk’s Partition Table Style
      4. Marking a Partition as Active
      5. Converting a Basic Disk to a Dynamic Disk or Vice Versa
    5. Working with Disks, Partitions, and Volumes
    6. Partitioning Disks and Preparing Them for Use
      1. Creating Partitions, Logical Drives, and Simple Volumes
      2. Creating Spanned and Striped Volumes
      3. Shrinking or Extending Volumes
      4. Formatting Partitions and Volumes
      5. Assigning, Changing, or Removing Drive Letters and Paths
      6. Assigning, Changing, or Deleting a Volume Label
      7. Deleting Partitions, Volumes, and Logical Drives
      8. Converting a Volume to NTFS
      9. Recovering a Failed Simple, Spanned, or Striped Volume
      10. Regenerating a Striped Set with Parity
    7. Using Disk Mirroring
      1. Creating Mirrored Volumes
      2. Breaking a Mirrored Set
      3. Removing a Mirrored Set
    8. Moving a Dynamic Disk to a New System
    9. Troubleshooting Common Disk Problems
      1. Repairing Disk Errors and Inconsistencies
      2. Checking for Disk Errors
        1. Running Check Disk from the Command Line
        2. Running Check Disk Interactively
      3. Defragmenting Disks
      4. Resynchronizing and Repairing a Mirrored Set
      5. Repairing a Mirrored System Volume to Enable Boot
    10. Working with Removable Storage Devices
    11. Working with Data Discs
      1. Disc Burning: The Essentials
      2. Mounting ISO Images
      3. Burning ISO Images to Disc
      4. Burning Mastered Discs
      5. Burning Discs with Live File Systems
      6. Changing the Default Burning Options
    12. Managing Disk Compression and File Encryption
      1. Compressing Drives and Data
        1. Compressing Drives
        2. Compressing Directories and Files
        3. Expanding Compressed Drives
        4. Expanding Compressed Directories and Files
      2. Encrypting Drives and Data
        1. Understanding Encryption and EFS
        2. Encrypting Directories and Files
        3. Working with Encrypted Files and Folders
        4. Configuring Recovery Policy
        5. Sharing Decrypted Files
        6. Decrypting Files and Directories
  16. 13. Managing File Security and Resource Sharing
    1. File Security and Sharing Options
    2. Controlling Access to Files and Folders with NTFS Permissions
      1. Understanding and Using Basic Permissions
        1. Working with and Setting Basic Permissions
        2. Special Identities and Best Practices for Assigning Permissions
      2. Assigning Special Permissions
      3. Assigning Claims-Based Permissions
      4. File Ownership and Permission Assignment
      5. Applying Permissions Through Inheritance
        1. Inheritance Essentials
        2. Viewing Inherited Permissions
        3. Stopping Inheritance
        4. Restoring Inherited Permissions
      6. Determining the Effective Permissions and Troubleshooting
    3. Sharing Files and Folders over the Network
      1. Controlling Access to Network Shares
      2. Creating a Shared Resource
        1. Sharing a Resource and Setting Share Permissions in File Explorer
        2. Changing or Stopping Sharing
        3. Sharing a Folder and Setting Share Permissions in Computer Management
      3. Creating and Managing Shared Folders in Group Policy
      4. Using and Accessing Shared Resources
      5. Using and Accessing Shared Folders for Administration
      6. Troubleshooting File Sharing
    4. Using and Configuring Public Folder Sharing
      1. Using Public Folder Sharing
      2. Configuring Public Folder Sharing
    5. Auditing File and Folder Access
      1. Enabling Auditing for Files and Folders
      2. Configuring and Tracking Auditing
  17. 14. Maintaining Data Access and Availability
    1. Configuring File Explorer Options
      1. Customizing File Explorer
      2. Configuring Advanced File Explorer Options
        1. Setting Group Policy for File Explorer and Folder Views
        2. Managing Drive Access in File Explorer
    2. Managing Offline Files
      1. Understanding Offline Files
      2. Making Files or Folders Available Offline
        1. Step 1: Share Folders
        2. Step 2: Make Folders Available for Offline Use
        3. Step 3: Specify the Offline Files and Folders to Use
      3. Managing Offline File Synchronization
        1. Scheduling Syncing
        2. Syncing on an Event or Action
        3. Resolving Synchronization Conflicts and Errors
      4. Configuring Disk Usage Limits for Offline Files
      5. Managing Encryption for Offline Files
      6. Making Offline Files Unavailable
    3. Configuring Disk Quotas
      1. Using Disk Quotas
      2. Enabling Disk Quotas on NTFS Volumes
      3. Viewing Disk Quota Entries
      4. Creating Disk Quota Entries
      5. Updating and Customizing Disk Quota Entries
      6. Deleting Disk Quota Entries
      7. Exporting and Importing Disk Quota Settings
      8. Disabling Disk Quotas
    4. Using Branch Caching
  18. 15. Configuring and Troubleshooting TCP/IP Networking
    1. Navigating Windows 8 Networking Features
      1. Understanding Network Discovery and Network Categories
      2. Working with Network Explorer
      3. Working with Network And Sharing Center
    2. Installing Networking Components
      1. Working with TCP/IP and the Dual IP Stack
      2. Installing Network Adapters
      3. Installing Networking Services (TCP/IP)
    3. Configuring Network Connections
      1. Configuring Static IP Addresses
        1. Using the Ping Command to Check an Address
        2. Configuring a Static IPv4 or IPv6 Address
      2. Configuring Dynamic IP Addresses and Alternate IP Addressing
      3. Configuring Multiple Gateways
      4. Configuring DNS Resolution
        1. Basic DNS Settings
        2. Advanced DNS Settings
      5. Configuring WINS Resolution
    4. Managing Network Connections
      1. Enabling and Disabling Network Connections
      2. Checking the Status, Speed, and Activity for Network Connections
      3. Viewing Network Configuration Information
      4. Renaming Network Connections
    5. Troubleshooting and Testing Network Settings
      1. Diagnosing and Resolving Network Connection Problems
      2. Diagnosing and Resolving Internet Connection Problems
      3. Performing Basic Network Tests
      4. Resolving IP Addressing Problems
      5. Releasing and Renewing DHCP Settings
      6. Registering and Flushing DNS
  19. 16. Managing Mobile Networking and Remote Access
    1. Configuring Networking for Mobile Devices
      1. Working with Mobility Settings
      2. Configuring Dynamic IP Addresses
      3. Configuring Alternate Private IP Addresses
      4. Connecting to Networked Projectors
    2. Understanding Mobile Networking and Remote Access
    3. Creating Connections for Remote Access
      1. Creating a Dial-Up Connection
        1. Working with Dialing Rules and Locations
          1. Viewing and Setting the Default Dialing Location
          2. Creating Dialing Locations
          3. Deleting Dialing Locations
        2. Creating a Dial-Up Internet Connection to an ISP
        3. Creating a Dial-Up Connection to a Workplace
      2. Creating a Broadband Connection to the Internet
      3. Creating a VPN Connection
    4. Configuring Connection Properties
      1. Configuring Automatic or Manual Connections
      2. Configuring Proxy Settings for Mobile Connections
      3. Configuring Connection Logon Information
      4. Configuring Automatic Disconnection
      5. Setting a Connection to Use Dialing Rules
      6. Configuring Primary and Alternate Phone Numbers
      7. Configuring Identity Validation
      8. Configuring Networking Protocols and Components
      9. Enabling and Disabling Windows Firewall for Network Connections
    5. Establishing Connections
      1. Connecting with Dial-Up
      2. Connecting with Broadband
      3. Connecting with VPN
    6. Wireless Networking
      1. Wireless Network Devices and Technologies
      2. Wireless Security
      3. Installing and Configuring a Wireless Adapter
      4. Working with Wireless Networks and Wireless Connections
      5. Connecting to Wireless Networks
      6. Managing and Troubleshooting Wireless Networking
  20. Index
  21. About the Author
  22. Copyright