Introduction |
|
xxix | |
Assessment Test - MD-100 |
|
xxix | |
Assessment Test - MD-101 |
|
xliii | |
Answers to Assessment Test - MD-100 |
|
xlix | |
Answers to Assessment Test - MD-101 |
|
lviii | |
|
|
1 | (538) |
|
Chapter 1 Windows Client Installation |
|
|
3 | (90) |
|
|
4 | (7) |
|
|
9 | (2) |
|
Windows 10 vs. Windows 11 |
|
|
11 | (1) |
|
What Has Been Changed in Windows 11? |
|
|
12 | (1) |
|
Windows 10 and 11 Architecture |
|
|
13 | (1) |
|
Preparing to Install Windows |
|
|
14 | (11) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Windows 10 Enterprise E3 and E5 |
|
|
17 | (1) |
|
Windows Client Requirements |
|
|
18 | (2) |
|
New Installation or Upgrade? |
|
|
20 | (4) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (16) |
|
Performing a Clean Installation of Windows 10 |
|
|
26 | (10) |
|
Performing an Upgrade to Windows 10 from Windows 8.1 |
|
|
36 | (5) |
|
|
41 | (7) |
|
Performing a Clean Installation of Windows 11 |
|
|
42 | (1) |
|
Performing an Upgrade to Windows 11 from Windows 10 |
|
|
43 | (1) |
|
Troubleshooting Installation Problems |
|
|
43 | (2) |
|
Supporting Multiple-Boot Options |
|
|
45 | (2) |
|
|
47 | (1) |
|
Understanding Automated Deployment Options |
|
|
48 | (18) |
|
An Overview of the Microsoft Deployment Toolkit |
|
|
48 | (6) |
|
An Overview of Unattended Installation |
|
|
54 | (2) |
|
An Overview of Windows Deployment Services |
|
|
56 | (3) |
|
An Overview of the System Preparation Tool and Disk Imaging |
|
|
59 | (4) |
|
Overview of the Windows Assessment and Deployment Kit |
|
|
63 | (1) |
|
Windows Configuration Designer |
|
|
64 | (1) |
|
Summary of Windows Client Deployment Options |
|
|
64 | (2) |
|
Deploying Unattended Installations |
|
|
66 | (8) |
|
Using the System Preparation Tool to Prepare an Installation for Imaging |
|
|
67 | (2) |
|
Using Windows Configuration Designer to Create a Disk Image |
|
|
69 | (2) |
|
Using the Deployment Image Servicing and Management Tool |
|
|
71 | (2) |
|
Using Windows System Image Manager to Create Answer Files |
|
|
73 | (1) |
|
|
74 | (11) |
|
|
75 | (1) |
|
|
76 | (2) |
|
Using Windows Update for Business |
|
|
78 | (3) |
|
|
81 | (2) |
|
Using Command-Line Options |
|
|
83 | (1) |
|
Installing Microsoft Store Updates |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (5) |
|
Chapter 2 Configuring Users |
|
|
93 | (104) |
|
Understanding User Accounts |
|
|
94 | (4) |
|
|
95 | (1) |
|
|
96 | (1) |
|
Local and Domain User Accounts |
|
|
97 | (1) |
|
Working with User Accounts |
|
|
98 | (19) |
|
Using the Local Users and Groups Utility |
|
|
98 | (3) |
|
Using the User Accounts Option in Control Panel |
|
|
101 | (1) |
|
|
102 | (5) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
Changing a User's Password |
|
|
110 | (1) |
|
Using Windows Hello, Pictures, and Biometrics |
|
|
111 | (1) |
|
|
112 | (2) |
|
Understanding Windows Defender Credential Guard |
|
|
114 | (2) |
|
Configuring Device Health Attestation |
|
|
116 | (1) |
|
|
117 | (9) |
|
Managing User Group Membership |
|
|
117 | (2) |
|
Setting Up User Profiles, Logon Scripts, and Home Folders |
|
|
119 | (7) |
|
Troubleshooting User Account Authentication |
|
|
126 | (1) |
|
Managing and Creating Groups |
|
|
127 | (8) |
|
|
127 | (4) |
|
|
131 | (2) |
|
Managing Group Membership |
|
|
133 | (2) |
|
|
135 | (1) |
|
Managing Security Using GPOs and LGPOs |
|
|
135 | (20) |
|
Understanding the GPO and LGPO Basics |
|
|
135 | (2) |
|
Using the Group Policy Result Tool |
|
|
137 | (1) |
|
Managing and Applying LGPOs |
|
|
138 | (2) |
|
Configuring Local Security Policies |
|
|
140 | (1) |
|
|
141 | (6) |
|
|
147 | (8) |
|
Configuring User Account Control |
|
|
155 | (10) |
|
|
156 | (1) |
|
Managing Credentials by Using Credential Manager |
|
|
157 | (2) |
|
Local Administrator Password Solutions (LAPS) |
|
|
159 | (6) |
|
Registry and File Virtualization |
|
|
165 | (1) |
|
Understanding Smart Cards |
|
|
165 | (2) |
|
Configuring Remote Management |
|
|
167 | (19) |
|
|
168 | (1) |
|
|
168 | (5) |
|
|
173 | (3) |
|
|
176 | (4) |
|
|
180 | (2) |
|
Enabling PowerShell Remoting |
|
|
182 | (1) |
|
Configuring a VPN Connection |
|
|
182 | (3) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (3) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (6) |
|
|
197 | (42) |
|
Managing File and Folder Security |
|
|
198 | (13) |
|
Folder Options/File Explorer Options |
|
|
199 | (4) |
|
Understanding Dynamic Access Control |
|
|
203 | (1) |
|
Securing Access to Files and Folders |
|
|
204 | (4) |
|
Determining and Viewing Effective Permissions for NTFS |
|
|
208 | (3) |
|
Determining NTFS Permissions for Copied or Moved Files |
|
|
211 | (1) |
|
|
211 | (9) |
|
Creating and Managing Shared Folders |
|
|
211 | (2) |
|
Configuring Share Permissions |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (5) |
|
Understanding Hardware Security |
|
|
220 | (10) |
|
Using BitLocker Drive Encryption |
|
|
221 | (1) |
|
|
222 | (2) |
|
Windows 7 vs. Windows 10/11 |
|
|
224 | (3) |
|
Using the BitLocker Administration and Monitoring Utility |
|
|
227 | (1) |
|
Use Configuration Manager to Manage BitLocker Drive Encryption (BDE) |
|
|
228 | (1) |
|
Understanding Smart Cards |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (7) |
|
Chapter 4 Managing the Windows Client Environment |
|
|
239 | (96) |
|
|
240 | (39) |
|
Manipulating the Desktop Environment |
|
|
241 | (10) |
|
Configuring Personalization |
|
|
251 | (8) |
|
|
259 | (11) |
|
Using the Microsoft Management Console |
|
|
270 | (2) |
|
Using the System Settings |
|
|
272 | (1) |
|
Understanding the Settings Window |
|
|
273 | (4) |
|
|
277 | (2) |
|
Configuring Mobility Options |
|
|
279 | (9) |
|
Configuring Offline Files and Synchronization |
|
|
279 | (2) |
|
Configuring Power Policies |
|
|
281 | (7) |
|
Managing Windows 10/11 Services |
|
|
288 | (3) |
|
Configuring Internet Browsers |
|
|
291 | (12) |
|
|
291 | (2) |
|
|
293 | (1) |
|
Pinning Sites to the Taskbar |
|
|
293 | (1) |
|
|
293 | (1) |
|
Security and Privacy Enhancements |
|
|
293 | (1) |
|
Using the Browser's Compatibility Mode |
|
|
294 | (1) |
|
Using Enhanced Security Mode in Edge |
|
|
295 | (2) |
|
|
297 | (1) |
|
Configuring Internet Options |
|
|
297 | (6) |
|
Manage and Use Hyper-V on Windows Client |
|
|
303 | (19) |
|
Hyper-V System Requirements |
|
|
304 | (1) |
|
Enabling the Hyper-V Role |
|
|
304 | (1) |
|
Opening the Hyper-V Manager |
|
|
305 | (6) |
|
Changing Configuration on an Existing Virtual Machine |
|
|
311 | (2) |
|
Deleting Virtual Machines |
|
|
313 | (1) |
|
|
314 | (2) |
|
Managing Virtual Hard Disks |
|
|
316 | (6) |
|
|
322 | (6) |
|
|
325 | (3) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
330 | (5) |
|
Chapter 5 Configuring Security and Devices |
|
|
335 | (84) |
|
|
336 | (4) |
|
|
337 | (1) |
|
|
337 | (2) |
|
|
339 | (1) |
|
Using the Disk Management Utility |
|
|
340 | (15) |
|
Understanding the Disk Management Utility |
|
|
340 | (15) |
|
|
355 | (3) |
|
|
355 | (3) |
|
Understanding Filesystems |
|
|
358 | (3) |
|
|
358 | (3) |
|
|
361 | (1) |
|
|
361 | (4) |
|
|
365 | (16) |
|
|
365 | (1) |
|
|
366 | (4) |
|
Installing and Updating Device Drivers |
|
|
370 | (9) |
|
|
379 | (2) |
|
|
381 | (20) |
|
Configuring Removable Storage Devices |
|
|
381 | (4) |
|
|
385 | (16) |
|
Configuring Windows Defender Firewall |
|
|
401 | (7) |
|
Understanding the Windows Defender Firewall Basics |
|
|
401 | (2) |
|
Windows Defender Firewall with Advanced Security |
|
|
403 | (5) |
|
Managing Windows Security |
|
|
408 | (3) |
|
|
408 | (3) |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (6) |
|
Chapter 6 Configuring Network Connectivity |
|
|
419 | (66) |
|
|
420 | (7) |
|
|
420 | (2) |
|
On-Site Active Directory Networks |
|
|
422 | (2) |
|
Cloud-Based Azure Active Directory |
|
|
424 | (1) |
|
Other Microsoft Networking Terms and Roles |
|
|
424 | (3) |
|
|
427 | (18) |
|
Configuring a Network Adapter |
|
|
428 | (6) |
|
Troubleshooting a Network Adapter |
|
|
434 | (1) |
|
Configuring Wireless NIC Devices |
|
|
434 | (8) |
|
|
442 | (3) |
|
|
445 | (25) |
|
Benefits and Features of TCP/IP |
|
|
446 | (2) |
|
Basics of IP Addressing and Configuration |
|
|
448 | (4) |
|
|
452 | (11) |
|
Configuring TCP/IP on Windows 10 |
|
|
463 | (4) |
|
Testing Your IP Configuration |
|
|
467 | (1) |
|
Configuring Windows Client on a Network |
|
|
468 | (2) |
|
|
470 | (8) |
|
|
471 | (4) |
|
Configure and Manage Certificates on Client Devices |
|
|
475 | (3) |
|
|
478 | (1) |
|
|
479 | (1) |
|
|
479 | (1) |
|
|
480 | (5) |
|
Chapter 7 Configuring Recovery |
|
|
485 | (54) |
|
|
487 | (1) |
|
Knowing the Startup/Boot Options |
|
|
488 | (10) |
|
|
489 | (3) |
|
|
492 | (2) |
|
Using Other Startup Setting Options |
|
|
494 | (1) |
|
Understanding System Restore |
|
|
495 | (2) |
|
Using the System Image Recovery |
|
|
497 | (1) |
|
Using the Startup Repair Tool |
|
|
498 | (1) |
|
Maintaining Windows 10/11 with Backup and Restore |
|
|
498 | (7) |
|
|
499 | (1) |
|
Restoring Files from a Backup |
|
|
500 | (1) |
|
Recovering Files from OneDrive |
|
|
501 | (1) |
|
Using the WBAdmin Command Utility |
|
|
502 | (1) |
|
Using Advanced Backup Options |
|
|
503 | (2) |
|
|
505 | (6) |
|
|
506 | (1) |
|
|
507 | (1) |
|
Cleaning Up Old Restore Points |
|
|
507 | (1) |
|
|
508 | (2) |
|
|
510 | (1) |
|
|
511 | (21) |
|
Introducing Performance Monitor |
|
|
511 | (10) |
|
Using Other Performance-Monitoring Tools |
|
|
521 | (10) |
|
|
531 | (1) |
|
|
532 | (1) |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
534 | (5) |
|
|
539 | (334) |
|
Chapter 8 Deploy Windows Client |
|
|
541 | (44) |
|
Plan a Windows Client Deployment |
|
|
542 | (9) |
|
Microsoft Endpoint Manager (MEM) Overview |
|
|
542 | (2) |
|
|
544 | (7) |
|
Deploying with Windows Autopilot |
|
|
551 | (16) |
|
Windows Autopilot Requirements |
|
|
552 | (5) |
|
Configure Device Registration for Autopilot |
|
|
557 | (2) |
|
Windows Autopilot Profiles |
|
|
559 | (4) |
|
Provision Windows Devices by Using Autopilot |
|
|
563 | (1) |
|
Troubleshoot an Autopilot Deployment |
|
|
564 | (3) |
|
Using Microsoft Deployment Toolkit (MDT) |
|
|
567 | (9) |
|
|
567 | (1) |
|
MDT Configuration Options |
|
|
568 | (1) |
|
Plan and Implement PXE Boot by Using Windows Deployment Services (WDS) |
|
|
569 | (7) |
|
|
576 | (1) |
|
|
576 | (1) |
|
|
577 | (1) |
|
|
578 | (7) |
|
Chapter 9 Managing Identity and Access |
|
|
585 | (70) |
|
Active Directory vs. Azure Active Directory |
|
|
586 | (39) |
|
Understanding Active Directory |
|
|
586 | (11) |
|
Understanding Azure Active Directory |
|
|
597 | (28) |
|
|
625 | (13) |
|
Password Hash Synchronization with Azure AD |
|
|
625 | (1) |
|
Azure Active Directory Pass-Through Authentication |
|
|
626 | (1) |
|
|
627 | (3) |
|
Common Identity Scenarios |
|
|
630 | (1) |
|
|
631 | (7) |
|
Configure Enterprise State Roaming in Azure AD |
|
|
638 | (1) |
|
Requirements of Enterprise State Roaming |
|
|
638 | (1) |
|
Enable Enterprise State Roaming |
|
|
639 | (1) |
|
Plan and Implement Conditional Access Policies |
|
|
639 | (6) |
|
Create a Conditional Access Policy |
|
|
642 | (1) |
|
Troubleshooting Conditional Access |
|
|
643 | (2) |
|
Using PowerShell Commands |
|
|
645 | (2) |
|
|
647 | (1) |
|
|
648 | (1) |
|
|
649 | (1) |
|
|
650 | (5) |
|
Chapter 10 Planning and Managing Microsoft Intune |
|
|
655 | (64) |
|
Managing Devices with Microsoft Intune |
|
|
656 | (31) |
|
Understanding Microsoft Intune Benefits |
|
|
658 | (1) |
|
Configuring Intune Subscriptions |
|
|
658 | (7) |
|
Provisioning User Accounts |
|
|
665 | (1) |
|
Setting Administrator Accounts |
|
|
665 | (22) |
|
|
687 | (12) |
|
Deploying Applications Using Intune |
|
|
687 | (7) |
|
Supporting Broadband Connectivity |
|
|
694 | (1) |
|
Understanding Data Synchronization |
|
|
695 | (2) |
|
Using Mobile Application Management |
|
|
697 | (2) |
|
|
699 | (11) |
|
Deploying Software Updates Using Intune |
|
|
699 | (6) |
|
Using Intune Compliance Reports |
|
|
705 | (1) |
|
|
705 | (1) |
|
Implement App Protection and App Configuration Policies |
|
|
706 | (4) |
|
|
710 | (1) |
|
|
711 | (1) |
|
|
711 | (1) |
|
|
712 | (1) |
|
|
713 | (6) |
|
Chapter 11 Managing Devices |
|
|
719 | (28) |
|
|
721 | (19) |
|
|
721 | (2) |
|
Plan Device Compliance Policies |
|
|
723 | (5) |
|
Device Configuration Profiles |
|
|
728 | (12) |
|
|
740 | (1) |
|
|
741 | (1) |
|
|
741 | (1) |
|
|
742 | (5) |
|
Chapter 12 Managing Security |
|
|
747 | (50) |
|
|
748 | (40) |
|
Planning and Implementing Endpoint Protection |
|
|
749 | (2) |
|
|
751 | (1) |
|
Managing Endpoint Security in Microsoft Intune |
|
|
752 | (7) |
|
Implementing Microsoft Defender for Endpoint |
|
|
759 | (12) |
|
Understanding Microsoft Defender Application Guard |
|
|
771 | (9) |
|
Understanding Microsoft Defender Credential Guard |
|
|
780 | (3) |
|
Implementing and Managing Microsoft Defender Exploit Guard |
|
|
783 | (4) |
|
Using Windows Defender Application Control |
|
|
787 | (1) |
|
|
788 | (1) |
|
|
789 | (1) |
|
|
790 | (1) |
|
|
791 | (6) |
|
Chapter 13 Monitoring Devices |
|
|
797 | (76) |
|
|
799 | (21) |
|
Monitor Cloud-Based Tools |
|
|
799 | (10) |
|
Monitor Azure Device Security |
|
|
809 | (4) |
|
Monitor Devices by Using Endpoint Manager Admin Center |
|
|
813 | (5) |
|
Monitoring Devices by Using Endpoint Analytics |
|
|
818 | (2) |
|
|
820 | (1) |
|
|
820 | (1) |
|
|
820 | (1) |
|
|
821 | (6) |
|
Appendix Answers to Review Questions |
|
|
827 | (1) |
|
Chapter 1 Windows Client Installation |
|
|
828 | (2) |
|
Chapter 2 Configuring Users |
|
|
830 | (3) |
|
|
833 | (3) |
|
Chapter 4 Managing the Windows Client Environment |
|
|
836 | (4) |
|
Chapter 5 Configuring Security and Devices |
|
|
840 | (3) |
|
Chapter 6 Configuring Network Connectivity |
|
|
843 | (3) |
|
Chapter 7 Configuring Recovery |
|
|
846 | (4) |
|
Chapter 8 Deploy Windows Client |
|
|
850 | (5) |
|
Chapter 9 Managing Identity and Access |
|
|
855 | (3) |
|
Chapter 10 Planning and Managing Microsoft Intune |
|
|
858 | (4) |
|
Chapter 11 Managing Devices |
|
|
862 | (3) |
|
Chapter 12 Managing Security |
|
|
865 | (4) |
|
Chapter 13 Monitoring Devices |
|
|
869 | (4) |
Index |
|
873 | |