Introduction |
|
xix | |
Lesson 1 Installing and Upgrading Client Systems |
|
1 | (36) |
|
Understanding Windows Systems |
|
|
3 | (14) |
|
Understanding User Interfaces |
|
|
4 | (1) |
|
Determining Appropriate Editions Per Device Type |
|
|
5 | (5) |
|
Understanding Processor and Memory Architecture |
|
|
10 | (2) |
|
|
12 | (1) |
|
Understanding Windows 10 System Requirements |
|
|
13 | (4) |
|
Understanding Installation Types |
|
|
17 | (14) |
|
|
18 | (2) |
|
Performing a Clean Install of Windows 10 |
|
|
20 | (3) |
|
|
23 | (3) |
|
Migrating to Windows 10 from Previous Versions of Windows |
|
|
26 | (5) |
|
|
31 | (1) |
|
|
32 | (2) |
|
|
32 | (2) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (3) |
|
Scenario 1-1: Troubleshooting a Compatibility Problem |
|
|
35 | (1) |
|
Scenario 1-2: Converting a Small Office to Windows 10 |
|
|
35 | (1) |
|
Scenario 1-3: Selecting the Right Computer and Operating System |
|
|
35 | (1) |
|
Scenario 1-4: Installing Windows 10 |
|
|
35 | (2) |
Lesson 2 Understanding Operating System Configurations |
|
37 | (60) |
|
Understanding User Accounts |
|
|
39 | (3) |
|
|
40 | (2) |
|
Configuring and Optimizing User Account Control (UAC) |
|
|
42 | (3) |
|
|
44 | (1) |
|
|
45 | (35) |
|
Introducing Windows 10 Settings |
|
|
47 | (3) |
|
|
50 | (3) |
|
Configuring System Options |
|
|
53 | (3) |
|
Changing the Date and Time |
|
|
56 | (1) |
|
Configuring the Desktop and Taskbar Settings |
|
|
56 | (4) |
|
Configuring the Start Menu |
|
|
60 | (1) |
|
Configuring File Explorer Settings |
|
|
60 | (2) |
|
Configuring User Profiles |
|
|
62 | (1) |
|
Configuring Folder Locations |
|
|
63 | (2) |
|
|
65 | (2) |
|
Configuring Display Settings |
|
|
67 | (3) |
|
Configuring Power Settings |
|
|
70 | (4) |
|
Configuring Accessibility Options |
|
|
74 | (4) |
|
Creating and Managing Shortcuts |
|
|
78 | (2) |
|
|
80 | (12) |
|
Enable the Hyper-V Feature |
|
|
80 | (2) |
|
Creating and Configuring Virtual Machines |
|
|
82 | (5) |
|
Creating and Managing Virtual Switches |
|
|
87 | (3) |
|
Creating and Managing Virtual Disks |
|
|
90 | (1) |
|
Creating and Managing Checkpoints |
|
|
91 | (1) |
|
|
92 | (2) |
|
|
94 | (2) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
Scenario 2-1: Getting Administrative-Level Privileges |
|
|
96 | (1) |
|
Scenario 2-2: Configuring Accessibility Features |
|
|
96 | (1) |
|
Scenario 2-3: Running a Legacy Application |
|
|
96 | (1) |
|
Scenario 2-4: Creating a Better User Experience |
|
|
96 | (1) |
Lesson 3 Understanding Native Applications, Tools, Mobility, and Remote Management and Assistance |
|
97 | (70) |
|
Configuring Internet Explorer |
|
|
99 | (17) |
|
Managing Cookies and Privacy Settings |
|
|
99 | (5) |
|
Configuring Security Zones |
|
|
104 | (2) |
|
Using Dynamic Security and Protected Mode |
|
|
106 | (2) |
|
Configuring the SmartScreen Filter and Phishing |
|
|
108 | (1) |
|
|
109 | (2) |
|
Configuring Compatibility Mode |
|
|
111 | (1) |
|
Configuring Secure Sockets Layer (SSL) and Certificates |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (2) |
|
Configuring Microsoft Edge |
|
|
116 | (2) |
|
|
118 | (1) |
|
Introducing Accessory Programs |
|
|
119 | (11) |
|
|
120 | (5) |
|
Using Windows Media Player 12 |
|
|
125 | (5) |
|
Supporting Mobile Access and Data Synchronization |
|
|
130 | (6) |
|
Synchronizing Your PC Settings |
|
|
130 | (2) |
|
Configuring Offline Files |
|
|
132 | (4) |
|
Using Windows Mobility Center |
|
|
136 | (2) |
|
Change Mobility Center Settings |
|
|
138 | (1) |
|
Accessing a Computer Remotely |
|
|
138 | (24) |
|
Configuring Remote Desktop |
|
|
139 | (5) |
|
Configuring Remote Assistance |
|
|
144 | (4) |
|
Configuring Remote Management Settings |
|
|
148 | (1) |
|
Using the Microsoft Management Console to Manage Systems Remotely |
|
|
149 | (4) |
|
Using Windows Remote Management |
|
|
153 | (2) |
|
|
155 | (1) |
|
Introducing Windows PowerShell |
|
|
155 | (5) |
|
Using Remote Windows PowerShell |
|
|
160 | (2) |
|
|
162 | (1) |
|
|
163 | (2) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (2) |
|
Scenario 3-1: Securing Internet Explorer 11 |
|
|
165 | (1) |
|
Scenario 3-2: Offering Remote Assistance |
|
|
165 | (1) |
|
Scenario 3-3: Viewing Logs Remotely |
|
|
166 | (1) |
|
Scenario 3-4: Creating a Playlist |
|
|
166 | (1) |
Lesson 4 Managing Applications, Services, and Disks |
|
167 | (60) |
|
|
169 | (7) |
|
|
169 | (2) |
|
Configuring Windows Features |
|
|
171 | (1) |
|
Supporting Desktop Application Co-Existence |
|
|
172 | (1) |
|
Troubleshooting Program Compatibility |
|
|
172 | (2) |
|
Configuring Startup Options |
|
|
174 | (2) |
|
Managing Windows Store Apps |
|
|
176 | (5) |
|
Configuring the Windows Store |
|
|
176 | (2) |
|
Implementing Windows Store Apps |
|
|
178 | (2) |
|
Understanding Group Policy and Network Application Installation |
|
|
180 | (1) |
|
|
181 | (8) |
|
Understanding Service Startup Types |
|
|
183 | (6) |
|
Using MSConfig (System Configuration Utility) |
|
|
189 | (5) |
|
Change System Configuration Settings |
|
|
193 | (1) |
|
Managing Processes and Applications with Task Manager |
|
|
194 | (4) |
|
|
198 | (14) |
|
Understanding Storage Device Types |
|
|
198 | (3) |
|
Understanding Disk and Drive Types |
|
|
201 | (2) |
|
Understanding File Systems |
|
|
203 | (2) |
|
Using Disk Management to Configure Disks, Volumes, and File Systems |
|
|
205 | (7) |
|
Encrypting and Compressing Files and Folders |
|
|
212 | (8) |
|
Understanding Encrypting File System (EFS) |
|
|
213 | (4) |
|
|
217 | (3) |
|
|
220 | (2) |
|
|
222 | (2) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (3) |
|
Scenario 4-1: Providing Redundancy on a Client Computer |
|
|
224 | (1) |
|
Scenario 4-2: Protecting Laptop Computers |
|
|
225 | (1) |
|
Scenario 4-3: Uninstalling Local Software |
|
|
225 | (1) |
|
Scenario 4-4: Running a Windows 7 Application on Windows 10 |
|
|
225 | (2) |
Lesson 5 Managing Devices |
|
227 | (34) |
|
Understanding Cloud Storage |
|
|
228 | (4) |
|
Using OneDrive to Manage Files and Folders |
|
|
229 | (3) |
|
Understanding Printing Devices |
|
|
232 | (10) |
|
Understanding Local Printers |
|
|
232 | (4) |
|
Understanding Network Printers |
|
|
236 | (1) |
|
|
237 | (2) |
|
Understanding Print Queues |
|
|
239 | (2) |
|
Understanding Internet Printing |
|
|
241 | (1) |
|
Understanding System Devices and Device Drivers |
|
|
242 | (13) |
|
|
243 | (2) |
|
Using the Devices and Printers Folder |
|
|
245 | (2) |
|
|
247 | (5) |
|
Troubleshooting Problem Devices |
|
|
252 | (3) |
|
|
255 | (1) |
|
|
256 | (2) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (3) |
|
Scenario 5-1: Troubleshooting Print Jobs |
|
|
258 | (1) |
|
Scenario 5-2: Troubleshooting a Printer Driver |
|
|
258 | (1) |
|
Scenario 5-3: Changing Print Drivers |
|
|
259 | (1) |
|
Scenario 5-4: Using Cloud Services |
|
|
259 | (2) |
Lesson 6 Understanding File and Print Sharing |
|
261 | (34) |
|
Understanding File and Printer Sharing Basics |
|
|
263 | (3) |
|
Configuring HomeGroup Connections |
|
|
266 | (5) |
|
|
271 | (17) |
|
Configuring Public Folders |
|
|
271 | (1) |
|
|
272 | (4) |
|
Configuring File System Permissions |
|
|
276 | (3) |
|
Understanding Effective NTFS Permissions |
|
|
279 | (4) |
|
Viewing Effective Permissions on a Resource |
|
|
283 | (2) |
|
Combining NTFS and Share Permissions |
|
|
285 | (1) |
|
|
285 | (3) |
|
Configuring Printer Sharing |
|
|
288 | (2) |
|
|
290 | (1) |
|
|
291 | (2) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
293 | (2) |
|
Scenario 6-1: Picking an Appropriate File Sharing Method |
|
|
293 | (1) |
|
Scenario 6-2: Creating and Configuring a Homegroup |
|
|
294 | (1) |
|
Scenario 6-3: Restricting Permissions |
|
|
294 | (1) |
|
Scenario 6-4: Mapping a Network Drive |
|
|
294 | (1) |
Lesson 7 Maintaining, Updating, and Protecting Windows 10 |
|
295 | (42) |
|
Exploring Built-in Maintenance Tools |
|
|
297 | (15) |
|
|
297 | (3) |
|
|
300 | (1) |
|
|
301 | (7) |
|
Using Security and Maintenance (formerly called Action Center) |
|
|
308 | (2) |
|
|
310 | (2) |
|
Maintaining the Windows Registry |
|
|
312 | (3) |
|
Browse and Back Up the Windows Registry |
|
|
314 | (1) |
|
Configuring and Managing Updates |
|
|
315 | (7) |
|
Configuring Windows Update Options |
|
|
316 | (3) |
|
Managing Update History and Rolling Back Updates |
|
|
319 | (1) |
|
Implementing Insider Preview |
|
|
320 | (1) |
|
Implementing Semi-Annual Channel, Semi-Annual Channel (Targeted), & Long-Term Servicing Branch (LTSB) Scenarios |
|
|
320 | (2) |
|
Defending Your System from Malicious Software |
|
|
322 | (9) |
|
Understanding Windows Firewall |
|
|
324 | (2) |
|
Managing Client Security Using Windows Defender |
|
|
326 | (5) |
|
|
331 | (1) |
|
|
332 | (2) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
334 | (3) |
|
Scenario 7-1: Automating Computer Maintenance and Program Launching |
|
|
334 | (1) |
|
Scenario 7-2: Removing Viruses Safely |
|
|
334 | (1) |
|
Scenario 7-3: Gathering System Information |
|
|
335 | (1) |
|
Scenario 7-4: Distributing Windows Updates Across a Network |
|
|
335 | (2) |
Lesson 8 Understanding Backup and Recovery Methods |
|
337 | (28) |
|
Understanding Local, Network, and Automated Backup Methods |
|
|
338 | (1) |
|
Restoring Previous Versions of Files and Folders |
|
|
339 | (4) |
|
Schedule a Windows 10 Backup to Include a System Image |
|
|
340 | (2) |
|
Restore a File from a Windows 10 Backup |
|
|
342 | (1) |
|
Configuring System Recovery |
|
|
343 | (15) |
|
Configuring a System Restore |
|
|
343 | (3) |
|
Configuring a Windows 10 File Recovery Drive |
|
|
346 | (1) |
|
|
347 | (4) |
|
Performing Recovery Operations Using Windows Recovery |
|
|
351 | (7) |
|
|
358 | (2) |
|
|
360 | (2) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (3) |
|
Scenario 8-1: Scheduling File Backups |
|
|
362 | (1) |
|
Scenario 8-2: Installing from an Image |
|
|
363 | (1) |
|
Scenario 8-3: Creating a System Repair Disc |
|
|
363 | (1) |
|
Scenario 8-4: Resolving a Driver Problem Using Recovery Boot Options |
|
|
363 | (2) |
Appendix |
|
|
|
365 | (16) |
|
Lesson 1 Installing and Upgrading Client Systems |
|
|
366 | (1) |
|
Answers to Knowledge Assessment |
|
|
366 | (1) |
|
Answers to Business Case Scenarios |
|
|
367 | (1) |
|
Lesson 2 Understanding Operating System Configurations |
|
|
367 | (2) |
|
Answers to Knowledge Assessment |
|
|
367 | (1) |
|
Answers to Business Case Scenarios |
|
|
368 | (1) |
|
Lesson 3 Understanding Native Applications, Tools, Mobility, and Remote Management and Assistance |
|
|
369 | (2) |
|
Answers to Knowledge Assessment |
|
|
369 | (1) |
|
Answers to Business Case Scenarios |
|
|
370 | (1) |
|
Lesson 4 Managing Applications, Services, Folders, and Libraries |
|
|
371 | (1) |
|
Answers to Knowledge Assessment |
|
|
371 | (1) |
|
Answers to Business Case Scenarios |
|
|
372 | (1) |
|
Lesson 5 Managing Devices |
|
|
372 | (2) |
|
Answers to Knowledge Assessment |
|
|
372 | (1) |
|
Answers to Business Case Scenarios |
|
|
373 | (1) |
|
Lesson 6 Understanding File and Print Sharing |
|
|
374 | (2) |
|
Answers to Knowledge Assessment |
|
|
374 | (1) |
|
Answers to Business Case Scenarios |
|
|
375 | (1) |
|
Lesson 7 Maintaining, Updating, and Protecting Windows 10 |
|
|
376 | (2) |
|
Answers to Knowledge Assessment |
|
|
376 | (1) |
|
Answers to Business Case Scenarios |
|
|
377 | (1) |
|
Lesson 8 Understanding Backup and Recovery Methods |
|
|
378 | (3) |
|
Answers to Knowledge Assessment |
|
|
378 | (1) |
|
Answers to Business Case Scenarios |
|
|
379 | (2) |
Index |
|
381 | |