20688D ENU Companion
20688D ENU Companion
20688D ENU Companion
MI CROSOFT
LEA RN I N G
20688D
Supporting Windows 8.1
Companion Content
P RODU CT
ii
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with
any real company, organization, product, domain name, e-mail address, logo, person, place or event is
intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the
user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property
rights covering subject matter in this document. Except as expressly provided in any written license
agreement from Microsoft, the furnishing of this document does not give you any license to these
patents, trademarks, copyrights, or other intellectual property.
The names of manufacturers, products, or URLs are provided for informational purposes only and
Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding
these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a
manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links
may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not
responsible for the contents of any linked site or any link contained in a linked site, or any changes or
updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission
received from any linked site. Microsoft is providing these links to you only as a convenience, and the
inclusion of any link does not imply endorsement of Microsoft of the site or the products contained
therein.
2014 Microsoft Corporation. All rights reserved.
Microsoft and the trademarks listed at
http://www.microsoft.com/about/legal/en/us/IntellectualProperty/Trademarks/EN-US.aspx are trademarks of
the Microsoft group of companies. All other trademarks are property of their respective owners
DEFINITIONS.
a. Authorized Learning Center means a Microsoft IT Academy Program Member, Microsoft Learning
Competency Member, or such other entity as Microsoft may designate from time to time.
b. Authorized Training Session means the instructor-led training class using Microsoft Instructor-Led
Courseware conducted by a Trainer at or through an Authorized Learning Center.
c.
Classroom Device means one (1) dedicated, secure computer that an Authorized Learning Center owns
or controls that is located at an Authorized Learning Centers training facilities that meets or exceeds the
hardware level specified for the particular Microsoft Instructor-Led Courseware.
d. End User means an individual who is (i) duly enrolled in and attending an Authorized Training Session
or Private Training Session, (ii) an employee of a MPN Member, or (iii) a Microsoft full-time employee.
e. Licensed Content means the content accompanying this agreement which may include the Microsoft
Instructor-Led Courseware or Trainer Content.
f.
Microsoft Certified Trainer or MCT means an individual who is (i) engaged to teach a training session
to End Users on behalf of an Authorized Learning Center or MPN Member, and (ii) currently certified as a
Microsoft Certified Trainer under the Microsoft Certification Program.
g. Microsoft Instructor-Led Courseware means the Microsoft-branded instructor-led training course that
educates IT professionals and developers on Microsoft technologies. A Microsoft Instructor-Led
Courseware title may be branded as MOC, Microsoft Dynamics or Microsoft Business Group courseware.
h. Microsoft IT Academy Program Member means an active member of the Microsoft IT Academy
Program.
i.
Microsoft Learning Competency Member means an active member of the Microsoft Partner Network
program in good standing that currently holds the Learning Competency status.
j.
MOC means the Official Microsoft Learning Product instructor-led courseware known as Microsoft
Official Course that educates IT professionals and developers on Microsoft technologies.
k. MPN Member means an active Microsoft Partner Network program member in good standing.
l.
Personal Device means one (1) personal computer, device, workstation or other digital electronic device
that you personally own or control that meets or exceeds the hardware level specified for the particular
Microsoft Instructor-Led Courseware.
m. Private Training Session means the instructor-led training classes provided by MPN Members for
corporate customers to teach a predefined learning objective using Microsoft Instructor-Led Courseware.
These classes are not advertised or promoted to the general public and class attendance is restricted to
individuals employed by or contracted by the corporate customer.
n. Trainer means (i) an academically accredited educator engaged by a Microsoft IT Academy Program
Member to teach an Authorized Training Session, and/or (ii) a MCT.
o. Trainer Content means the trainer version of the Microsoft Instructor-Led Courseware and additional
supplemental content designated solely for Trainers use to teach a training session using the Microsoft
Instructor-Led Courseware. Trainer Content may include Microsoft PowerPoint presentations, trainer
preparation guide, train the trainer materials, Microsoft One Note packs, classroom setup guide and Prerelease course feedback form. To clarify, Trainer Content does not include any software, virtual hard
disks or virtual machines.
2.
USE RIGHTS. The Licensed Content is licensed not sold. The Licensed Content is licensed on a one copy
per user basis, such that you must acquire a license for each individual that accesses or uses the Licensed
Content.
2.1
Below are five separate sets of use rights. Only one set of rights apply to you.
a. If you are a Microsoft IT Academy Program Member:
i. Each license acquired on behalf of yourself may only be used to review one (1) copy of the Microsoft
Instructor-Led Courseware in the form provided to you. If the Microsoft Instructor-Led Courseware is
in digital format, you may install one (1) copy on up to three (3) Personal Devices. You may not
install the Microsoft Instructor-Led Courseware on a device you do not own or control.
ii. For each license you acquire on behalf of an End User or Trainer, you may either:
1. distribute one (1) hard copy version of the Microsoft Instructor-Led Courseware to one (1) End
User who is enrolled in the Authorized Training Session, and only immediately prior to the
commencement of the Authorized Training Session that is the subject matter of the Microsoft
Instructor-Led Courseware being provided, or
2. provide one (1) End User with the unique redemption code and instructions on how they can
access one (1) digital version of the Microsoft Instructor-Led Courseware, or
3. provide one (1) Trainer with the unique redemption code and instructions on how they can
access one (1) Trainer Content,
provided you comply with the following:
iii. you will only provide access to the Licensed Content to those individuals who have acquired a valid
license to the Licensed Content,
iv. you will ensure each End User attending an Authorized Training Session has their own valid licensed
copy of the Microsoft Instructor-Led Courseware that is the subject of the Authorized Training
Session,
v. you will ensure that each End User provided with the hard-copy version of the Microsoft InstructorLed Courseware will be presented with a copy of this agreement and each End User will agree that
their use of the Microsoft Instructor-Led Courseware will be subject to the terms in this agreement
prior to providing them with the Microsoft Instructor-Led Courseware. Each individual will be required
to denote their acceptance of this agreement in a manner that is enforceable under local law prior to
their accessing the Microsoft Instructor-Led Courseware,
vi. you will ensure that each Trainer teaching an Authorized Training Session has their own valid
licensed copy of the Trainer Content that is the subject of the Authorized Training Session,
vii. you will only use qualified Trainers who have in-depth knowledge of and experience with the
Microsoft technology that is the subject of the Microsoft Instructor-Led Courseware being taught for
all your Authorized Training Sessions,
viii. you will only deliver a maximum of 15 hours of training per week for each Authorized Training
Session that uses a MOC title, and
ix. you acknowledge that Trainers that are not MCTs will not have access to all of the trainer resources
for the Microsoft Instructor-Led Courseware.
b. If you are a Microsoft Learning Competency Member:
i. Each license acquired on behalf of yourself may only be used to review one (1) copy of the Microsoft
Instructor-Led Courseware in the form provided to you. If the Microsoft Instructor-Led Courseware is
in digital format, you may install one (1) copy on up to three (3) Personal Devices. You may not
install the Microsoft Instructor-Led Courseware on a device you do not own or control.
ii. For each license you acquire on behalf of an End User or Trainer, you may either:
1. distribute one (1) hard copy version of the Microsoft Instructor-Led Courseware to one (1) End
User attending the Authorized Training Session and only immediately prior to the
commencement of the Authorized Training Session that is the subject matter of the Microsoft
Instructor-Led Courseware provided, or
2. provide one (1) End User attending the Authorized Training Session with the unique redemption
code and instructions on how they can access one (1) digital version of the Microsoft InstructorLed Courseware, or
3. you will provide one (1) Trainer with the unique redemption code and instructions on how they
can access one (1) Trainer Content,
provided you comply with the following:
iii. you will only provide access to the Licensed Content to those individuals who have acquired a valid
license to the Licensed Content,
iv. you will ensure that each End User attending an Authorized Training Session has their own valid
licensed copy of the Microsoft Instructor-Led Courseware that is the subject of the Authorized
Training Session,
v. you will ensure that each End User provided with a hard-copy version of the Microsoft Instructor-Led
Courseware will be presented with a copy of this agreement and each End User will agree that their
use of the Microsoft Instructor-Led Courseware will be subject to the terms in this agreement prior to
providing them with the Microsoft Instructor-Led Courseware. Each individual will be required to
denote their acceptance of this agreement in a manner that is enforceable under local law prior to
their accessing the Microsoft Instructor-Led Courseware,
vi. you will ensure that each Trainer teaching an Authorized Training Session has their own valid
licensed copy of the Trainer Content that is the subject of the Authorized Training Session,
vii. you will only use qualified Trainers who hold the applicable Microsoft Certification credential that is
the subject of the Microsoft Instructor-Led Courseware being taught for your Authorized Training
Sessions,
viii. you will only use qualified MCTs who also hold the applicable Microsoft Certification credential that is
the subject of the MOC title being taught for all your Authorized Training Sessions using MOC,
ix. you will only provide access to the Microsoft Instructor-Led Courseware to End Users, and
x. you will only provide access to the Trainer Content to Trainers.
c.
ii.
You may customize the written portions of the Trainer Content that are logically associated with
instruction of a training session in accordance with the most recent version of the MCT agreement.
If you elect to exercise the foregoing rights, you agree to comply with the following: (i)
customizations may only be used for teaching Authorized Training Sessions and Private Training
Sessions, and (ii) all customizations will comply with this agreement. For clarity, any use of
customize refers only to changing the order of slides and content, and/or not using all the slides or
content, it does not mean changing or modifying any slide or content.
2.2 Separation of Components. The Licensed Content is licensed as a single unit and you may not
separate their components and install them on different devices.
2.3 Redistribution of Licensed Content. Except as expressly provided in the use rights above, you may
not distribute any Licensed Content or any portion thereof (including any permitted modifications) to any
third parties without the express written permission of Microsoft.
2.4 Third Party Notices. The Licensed Content may include third party code tent that Microsoft, not the
third party, licenses to you under this agreement. Notices, if any, for the third party code ntent are included
for your information only.
2.5 Additional Terms. Some Licensed Content may contain components with additional terms,
conditions, and licenses regarding its use. Any non-conflicting terms in those conditions and licenses also
apply to your use of that respective component and supplements the terms described in this agreement.
3.
Pre-release Term. If you are an Microsoft IT Academy Program Member, Microsoft Learning
Competency Member, MPN Member or Trainer, you will cease using all copies of the Licensed Content on
the Pre-release technology upon (i) the date which Microsoft informs you is the end date for using the
Licensed Content on the Pre-release technology, or (ii) sixty (60) days after the commercial release of the
technology that is the subject of the Licensed Content, whichever is earliest (Pre-release term).
Upon expiration or termination of the Pre-release term, you will irretrievably delete and destroy all copies
of the Licensed Content in your possession or under your control.
4.
SCOPE OF LICENSE. The Licensed Content is licensed, not sold. This agreement only gives you some
rights to use the Licensed Content. Microsoft reserves all other rights. Unless applicable law gives you more
rights despite this limitation, you may use the Licensed Content only as expressly permitted in this
agreement. In doing so, you must comply with any technical limitations in the Licensed Content that only
allows you to use it in certain ways. Except as expressly permitted in this agreement, you may not:
access or allow any individual to access the Licensed Content if they have not acquired a valid license
for the Licensed Content,
alter, remove or obscure any copyright or other protective notices (including watermarks), branding
or identifications contained in the Licensed Content,
publicly display, or make the Licensed Content available for others to access or use,
copy, print, install, sell, publish, transmit, lend, adapt, reuse, link to or post, make available or
distribute the Licensed Content to any third party,
reverse engineer, decompile, remove or otherwise thwart any protections or disassemble the
Licensed Content except and only to the extent that applicable law expressly permits, despite this
limitation.
5. RESERVATION OF RIGHTS AND OWNERSHIP. Microsoft reserves all rights not expressly granted to
you in this agreement. The Licensed Content is protected by copyright and other intellectual property laws
and treaties. Microsoft or its suppliers own the title, copyright, and other intellectual property rights in the
Licensed Content.
6.
EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and regulations.
You must comply with all domestic and international export laws and regulations that apply to the Licensed
Content. These laws include restrictions on destinations, end users and end use. For additional information,
see www.microsoft.com/exporting.
7.
SUPPORT SERVICES. Because the Licensed Content is as is, we may not provide support services for it.
8.
TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you fail
to comply with the terms and conditions of this agreement. Upon termination of this agreement for any
reason, you will immediately stop all use of and delete and destroy all copies of the Licensed Content in
your possession or under your control.
9.
LINKS TO THIRD PARTY SITES. You may link to third party sites through the use of the Licensed
Content. The third party sites are not under the control of Microsoft, and Microsoft is not responsible for
the contents of any third party sites, any links contained in third party sites, or any changes or updates to
third party sites. Microsoft is not responsible for webcasting or any other form of transmission received
from any third party sites. Microsoft is providing these links to third party sites to you only as a
convenience, and the inclusion of any link does not imply an endorsement by Microsoft of the third party
site.
10.
ENTIRE AGREEMENT. This agreement, and any additional terms for the Trainer Content, updates and
supplements are the entire agreement for the Licensed Content, updates and supplements.
11.
APPLICABLE LAW.
a. United States. If you acquired the Licensed Content in the United States, Washington state law governs
the interpretation of this agreement and applies to claims for breach of it, regardless of conflict of laws
principles. The laws of the state where you live govern all other claims, including claims under state
consumer protection laws, unfair competition laws, and in tort.
b. Outside the United States. If you acquired the Licensed Content in any other country, the laws of that
country apply.
12.
LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the laws
of your country. You may also have rights with respect to the party from whom you acquired the Licensed
Content. This agreement does not change your rights under the laws of your country if the laws of your
country do not permit it to do so.
13.
14.
LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. YOU CAN RECOVER FROM
MICROSOFT, ITS RESPECTIVE AFFILIATES AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP
TO US$5.00. YOU CANNOT RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL,
LOST PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES.
This limitation applies to
o
anything related to the Licensed Content, services, content (including code) on third party Internet
sites or third-party programs; and
o
claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence,
or other tort to the extent permitted by applicable law.
It also applies even if Microsoft knew or should have known about the possibility of the damages. The
above limitation or exclusion may not apply to you because your country may not allow the exclusion or
limitation of incidental, consequential or other damages.
Please note: As this Licensed Content is distributed in Quebec, Canada, some of the clauses in this
agreement are provided below in French.
Remarque : Ce le contenu sous licence tant distribu au Qubec, Canada, certaines des clauses
dans ce contrat sont fournies ci-dessous en franais.
EXONRATION DE GARANTIE. Le contenu sous licence vis par une licence est offert tel quel . Toute
utilisation de ce contenu sous licence est votre seule risque et pril. Microsoft naccorde aucune autre garantie
expresse. Vous pouvez bnficier de droits additionnels en vertu du droit local sur la protection dues
consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties
implicites de qualit marchande, dadquation un usage particulier et dabsence de contrefaon sont exclues.
LIMITATION DES DOMMAGES-INTRTS ET EXCLUSION DE RESPONSABILIT POUR LES
DOMMAGES. Vous pouvez obtenir de Microsoft et de ses fournisseurs une indemnisation en cas de dommages
directs uniquement hauteur de 5,00 $ US. Vous ne pouvez prtendre aucune indemnisation pour les autres
dommages, y compris les dommages spciaux, indirects ou accessoires et pertes de bnfices.
Cette limitation concerne:
tout ce qui est reli au le contenu sous licence, aux services ou au contenu (y compris le code)
figurant sur des sites Internet tiers ou dans des programmes tiers; et.
les rclamations au titre de violation de contrat ou de garantie, ou au titre de responsabilit
stricte, de ngligence ou dune autre faute dans la limite autorise par la loi en vigueur.
Elle sapplique galement, mme si Microsoft connaissait ou devrait connatre lventualit dun tel dommage. Si
votre pays nautorise pas lexclusion ou la limitation de responsabilit pour les dommages indirects, accessoires
ou de quelque nature que ce soit, il se peut que la limitation ou lexclusion ci-dessus ne sappliquera pas votre
gard.
EFFET JURIDIQUE. Le prsent contrat dcrit certains droits juridiques. Vous pourriez avoir dautres droits
prvus par les lois de votre pays. Le prsent contrat ne modifie pas les droits que vous confrent les lois de votre
pays si celles-ci ne le permettent pas.
Revised July 2013
Module 1
Implementing a Troubleshooting Methodology
Contents:
Module Review and Takeaways
Gather information.
Module 2
Troubleshooting Startup Issues
Contents:
Lesson 1: Overview of the Windows 8.1 Startup Recovery Environment
12
13
Lesson 1
Restart 20688D-LON-CL1.
2.
When prompted to Press any key to boot from CD or DVD, press the space bar. The computer
boots into Windows Setup.
3.
4.
5.
6.
7.
On the Advanced options page, notice the four tools that are available.
2.
3.
At the command prompt, type list disk, and then press Enter.
4.
At the command prompt, type list volume, and then press Enter.
5.
6.
7.
At the command prompt, type dir, and then press Enter. This is the system drive.
8.
9.
At the command prompt, type net start, and then press Enter. A list of running services is returned.
10. At the command prompt, type sc query, and then press Enter. A list of services and their current
status is returned.
11. At the command prompt, type regedit, and then press Enter. The Registry Editor opens.
12. Close the Registry Editor.
13. At the command prompt, type exit, and then press Enter.
2.
3.
4.
On the Startup Repair page, click Windows 8.1. Automatic startup repair begins.
5.
2.
3.
2.
3.
4.
5.
Completion steps
After you have completed the practice session, leave the virtual machines running for the next
practice session.
2.
3.
4.
5.
In the System Properties dialog box, click the System Protection tab, and then click Create.
6.
In the System Protection dialog box, in the text box, type Initial System Restore Point, and then
click Create.
7.
Right-click Start, point to Shut down or sign out, and then click Restart.
2.
When prompted to Press any key to boot from CD or DVD, press the spacebar.
3.
4.
5.
6.
2.
3.
4.
On the Restore your computer to the state it was in before the selected event page, in the
unnamed drop-down list box, click Initial System Restore Point, and then click Next.
5.
6.
In the Once started, System Restore cannot be interrupted. Do you want to continue? dialog
box, click Yes. The system restore process begins.
8.
After your computer has restarted, sign in as Adatum\administrator with the password Pa$$w0rd.
9.
Completion steps
After you have completed the practice session, leave the virtual machines running for the next
practice session.
Lesson 2
2.
3.
4.
Click Recovery.
5.
6.
7.
On the Advanced options page, click Command Prompt. Your computer restarts into the
Command Prompt mode.
2.
3.
At the command prompt, type bcdedit /enum, and then press Enter. This lists the available boot
options in the store.
2.
At the command prompt, type bootrec /scanos, and then press Enter. This command scans the
partitions for viable operating systems.
3.
At the command prompt, type bootrec /rebuildbcd, and then press Enter. This command rebuilds
the boot store automatically.
4.
2.
Completion steps
After you have completed the practice session, leave the virtual machines running for the next
practice session.
On LON-CL1, on the Start screen, type msconfig.exe, and then press Enter.
2.
On the Boot tab, select the Safe boot check box, and then click OK.
2.
When the computer has restarted, sign in as Adatum\Administrator with the password Pa$$w0rd.
2.
Notice that the desktop is modified to include Safe Mode in each corner.
3.
2.
In the System Configuration dialog box, on the General tab, click Normal startup, and then click
OK.
3.
4.
When the computer has restarted, sign in as Adatum\Administrator with the password of
Pa$$w0rd.
5.
2.
3.
4.
Click Recovery.
5.
6.
7.
8.
9.
10. When the computer has restarted, on the Startup Settings page, press Enter to start normally. You
will not use any of the Startup Settings during this practice.
Completion steps
1.
2.
In the Virtual Machines list, right-click 20688D-LON-CL1, and then click Revert.
3.
Lesson 4
10
2.
3.
In the Local Group Policy Editor, expand Computer Configuration, expand Administrative
Templates, expand Windows Components, and then expand BitLocker Drive Encryption.
4.
5.
6.
In the Require additional authentication at startup dialog box, click Enabled, and then click OK.
7.
8.
9.
At the command prompt, type gpupdate /force, and then press Enter.
Enable BitLocker
1.
On LON-CL1, on the desktop, on the Taskbar, click the File Explorer icon.
2.
3.
4.
In the Format Floppy Disk Drive (A:) dialog box, click Start, and then click OK.
5.
6.
7.
In the results pane, right-click Local Disk (C:), and then click Turn on BitLocker.
8.
In the BitLocker Drive Encryption (C:) dialog box, click Enter a password. This is necessary because
the virtual machine does not support USB flash drives.
9.
On the Create a password to unlock this drive page, in the Enter your password and Reenter
your password boxes, type Pa$$w0rd, and then click Next.
10. On the How do you want to back up your recovery key? page, click Save to a file.
11. In the Save BitLocker recovery key as dialog box, click Floppy Disk Drive (A:).
12. Click Open, and then click Save.
Note: If you receive an error message saying that Disk A: is write protected at this point,
use this procedure to resolve the problem:
1.
2.
3.
Click Media, point to Diskette Drive, and then click Insert Disk.
4.
In the Open dialog box, type D:\Program Files\Microsoft Learning\20688\Drives\20688DFloppy.vfd, and then click Open.
5.
On the 20688D-LON-CL1 virtual machine, in the Save BitLocker recovery key as error message
dialog box, click OK.
6.
7.
8.
Click Next.
9.
On the Are you ready to encrypt this drive? page, click Continue.
10. Right-click Start, point to Shut down or sign out, and then click Restart.
During the restart sequence, when the BitLocker screen displays, in the Enter the password to
unlock this drive box, type Pa$$w0rd, and then press Enter.
2.
3.
4.
5.
6.
Right-click Local Disk (C:), and then click Manage BitLocker. Notice that the drive is now being
encrypted.
7.
8.
In This PC, double-click Floppy Disk Drive (A:), and then double-click the file that starts BitLocker
Recovery Key.
9.
Write down the recovery key that displays in the file. You will need this for the lab, so write carefully.
Completion steps
After you have completed the practice session, leave the virtual machines running for the lab.
Question: The boot environment of a users computer is corrupt, and you suspect a virus. Before you can
run virus removal tools, first you must recover the boot environment. What command-line tools could you
use?
Answer: You can use Bootrec.exe with the fixmbr and fixboot switches.
Question: Your user adds a new hard disk to the computer, which changes the computers partition
numbering. To enable the computer to start, the user needs you to change the BCD. What tool would you
use?
Answer: You can use BCDEdit /enum to view the entries in the BCD store, and then use
BCDEdit to edit the BCD store to reflect the changes in the computer.
Question: After installing a new video driver, your users computer becomes unstable and will not start
correctly. What would you try first to resolve this problem?
Answer: You would use System Restore, and then roll back the configuration to a previous point.
If System Restore is unavailable, attempt a driver rollback.
Module 3
Troubleshooting Hardware and Device Drivers
Contents:
Lesson 1: Overview of Hardware Troubleshooting
10
11
Lesson 1
Lesson 3
If necessary, sign in to the LON-CL1 virtual machine as Adatum\Administrator with the password
Pa$$w0rd.
2.
On the Start screen, type This PC, right-click This PC, and then click Manage.
3.
4.
Expand Keyboards, right-click Standard PS/2 Keyboard, and then click Update Driver Software.
5.
In the Update Driver Software Standard PS/2 Keyboard dialog box, click Browse my computer
for driver software.
6.
On the Browse for driver software on your computer page, click Let me pick from a list of
device drivers on my computer.
7.
In the Show compatible hardware list, click PC/AT Enhanced PS/2 Keyboard (101/102 Key), and
then click Next.
8.
Click Close.
9.
In the System Settings Change dialog box, click Yes to restart the computer.
Sign in to the LON-CL1 virtual machine as Adatum\Administrator with the password Pa$$w0rd.
2.
Type This PC, right-click This PC, and then click Manage.
3.
4.
Expand Keyboards, right-click PC/AT Enhanced PS/2 Keyboard (101/102 Key), and then click
Properties.
5.
In the PC/AT Enhanced PS/2 Keyboard (101/102 Key) Properties dialog box, click the Driver tab,
and then click Uninstall.
6.
7.
In the System Settings Change dialog box, click Yes to restart the computer.
8.
Sign in to the LON-CL1 virtual machine as Adatum\Administrator with the password Pa$$w0rd.
9.
Type This PC, in the results section, right-click This PC, and then click Manage.
Click Start.
2.
Type cmd, right-click Command Prompt, and then click Run as administrator.
3.
At the Command Prompt, type the following command, and then press Enter:
pnputil a
D:\Labfiles\Mod03\Intellipoint\ipoint\setup64\files\driver\point64\point64.inf
4.
At the Command Prompt, type the following command, and then press Enter:
pnputil e
5.
Take note of the published name for the driver that you just installed into the store.
6.
Completion Steps
After you complete this practice session, leave the virtual machines running for the next practice
session.
2.
3.
Note: Although you are editing the Default Domain Policy, it would be more typical to
create a new Group Policy Object (GPO) and link it to the domain.
4.
5.
6.
In Group Policy Management Editor, under Computer Configuration, expand Policies, expand
Administrative Templates, expand System, expand Device Installation, and then click Device
Installation Restrictions.
7.
In the right-pane, double-click Allow installation of devices using drives that match these device
setup classes.
8.
In the Allow installation of devices using drives that match these device setup classes dialog
box, click Enabled, and then click Show.
9.
Click File Explorer, in the address bar, type D:\Labfiles\Mod03\, and then press Enter.
2.
3.
Double-click ipoint.
4.
Double-click setup64.
5.
Double-click files.
6.
Double-click driver.
7.
8.
9.
Select and copy the GUID, including the opening and closing brackets {}.
2.
In the Show Contents dialog box, in the Value text box, paste the GUID that you just copied.
3.
Click OK twice.
4.
5.
6.
7.
Click Enabled, in the Detail Text text box, type Adatum Policy restricts installation of certain
devices, and then click OK.
8.
Completion Steps
After you have completed the practice session, revert the virtual machines in preparation for the lab:
1.
2.
In the Virtual Machines list, right-click 20688D-LON-CL1, and then click Revert.
3.
4.
Lesson 5
2.
3.
In the Registry Editor, click HKEY_LOCAL_MACHINE, expand SOFTWARE, expand Microsoft, expand
Windows NT, expand CurrentVersion, and then click Winlogon.
4.
5.
6.
In the File name text box, type Winlogon, and then click Save.
2.
3.
Scroll down the file, and locate the line that begins with DisableCAD.
4.
5.
6.
2.
3.
In the Registry Editor error dialog box, click OK. An error is expected as some of the settings are in
use.
4.
5.
Scroll down the details pane, and verify that the DisableCAD value is now zero.
6.
Right-click Start, point to Shut down or sign out, and then click Sign out.
7.
Completion steps
1.
2.
In the Virtual Machines list, right-click 20688D-LON-CL1, and then click Revert.
3.
4.
Question: Users are complaining that when they visit customer sites, they are unable to connect to their
customers printers because of device installation restrictions. What two possible actions could you take?
Answer: You could enable device installation for setup class GUID for printers, or you could add
the drivers to the driver store using Pnputil.exe.
Question: Help desk employees have tried to install a new driver for a user in the marketing department
to enable the user to use a new scanner. The driver is not part of the driver store, and Group Policy
prohibits installation of additional drivers. What GPO setting would you recommend changing to enable
this driver to install?
Answer: You do not need to change any GPO setting. Instead, it would be better to install the
driver directly into the store. Alternatively, you could change the setting for Allow installation of
devices using drivers that match these device setup classes. In Computer Configuration, click
Policies, click Administrative Templates, click System, and then click Device Installation\Device
Installation Restrictions.
Question: You decide to install the scanner driver into the driver store. Assuming the driver is in the
D:\scanner folder, and the driver .inf file is called Scanner.inf, what command would you use?
Answer: You would use the Pnputil.exe -a D:\scanner\scanner.inf command.
Module 4
Troubleshooting Remote Computers
Contents:
Module Review and Takeaways
Under what circumstances would you use Remote Desktop Connection or Remote Assistance?
Answer: You use Remote Desktop to access a computer remotely from another computer. For
example, you can use Remote Desktop to connect to your work computer from your home
computer. By using Remote Desktop, you have the potential to access to all of your programs,
files, and network resources as if you were sitting at your work computer.
You use Remote Assistance to provide or receive assistance remotely. For example, a technicalsupport person can access your computer from a remote location to help you with a computer
problem, or to show you how to complete a task. You can help someone else the same way. In
either case, both people see the same computer screen, and both can control the mouse pointer.
Question: With Windows PowerShell remoting, what is One-to-Many, or Fan-Out remoting?
Answer: With this form of remoting, you issue a command that will be executed on one or more
remote computers in parallel.
Question: What methods exist for requesting Remote Assistance?
Answer: You can save a Remote Assistance request to a file, or you can use email to send your
request to a trusted user.
Module 5
Resolving Network Connectivity Issues
Contents:
Lesson 2: Troubleshooting Network Connectivity Issues
Lesson 2
Switch to LON-CL1.
2.
Press the Windows + S keys, in the Search box, type Control, and then click Control Panel.
3.
4.
5.
In Network and Sharing Center, to the right of the Adatum.com Domain network, click
London_Network.
6.
In the London_Network Status dialog box, click Details. This window displays the same
configuration information for this adapter as the Ipconfig command would display.
7.
8.
In the London_Network Status dialog box, click Properties. You can configure protocols in this
window.
9.
Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties. You can configure the IP
address, subnet mask, default gateway, and Domain Name System (DNS) servers in this window.
10. Click Advanced. In the Advanced TCP/IP Settings window, you can configure additional settings, such
as additional IP addresses, DNS settings, and Windows Internet Name Service (WINS) servers for
NetBIOS name resolution.
11. Close all open windows without modifying any settings.
Click Start.
2.
3.
At the Windows PowerShell command prompt, type Get-NetIPAddress and then press Enter.
4.
At the Windows PowerShell command prompt, type Get-NetIPv4Protocol and then press Enter.
5.
At the command prompt, type netsh interface ipv4 show config, and then press Enter. The current
IPv4 configuration is displayed.
6.
At the Windows PowerShell command prompt, type ipconfig /all, and then press Enter.
Test connectivity
1.
At the Windows PowerShell command prompt, type test-connection LON-DC1, and then press
Enter.
2.
At the command prompt, type netstat -n, and then press Enter. Observe and describe the active
connections to 172.16.0.10. Most connections to services are transient.
3.
If no connections appear, then create a connection. To create a connection, click Start, type \\LONDC1, and then press Enter.
4.
5.
At the command prompt, type netstat -n, and then press Enter. Identify the services that LON-CL1
had connections to on LON-DC1.
6.
7.
In Windows Internet Explorer, in the Address bar, type http://LON-DC1, and then press Enter.
8.
9.
At the command prompt, type netstat n, and then press Enter. Identify the additional open
connections.
Click Start, type Windows Firewall, and then click Windows Firewall.
2.
3.
In Windows Firewall with Advanced Security, expand Monitoring, and then click Firewall. These are
the active firewall rules.
4.
5.
At the command prompt, type netsh advfirewall firewall show rule name=all dir=in, and then
press Enter.
6.
7.
2.
3.
4.
5.
6.
In Network and Sharing Center, to the right of the Adatum.com Domain network, click
London_Network.
7.
In the London_Network Status dialog box, click Properties. In this window, you can configure
protocols.
8.
9.
In the Properties dialog box, click Obtain an IP address automatically. Notice that when you click
this, the Alternate Configuration tab becomes available.
Completion Steps
After you have completed the practice session, leave the virtual machines running for the next
practice session.
Switch to LON-CL1.
2.
Click Start.
3.
4.
At the Windows PowerShell command prompt, type ipconfig /displaydns, and then press Enter.
5.
At the Windows PowerShell command prompt, type Get-DnsClientCache, and then press Enter.
6.
At the Windows PowerShell command prompt, type ipconfig /flushdns, and then press Enter.
7.
At the Windows PowerShell command prompt, type Clear-DnsClientCache, and then press Enter.
8.
At the Windows PowerShell command prompt, type ipconfig /displaydns, and then press Enter.
At the Windows PowerShell command prompt, type test-connection lon-dc1, and then press Enter.
2.
At the Windows PowerShell command prompt, type Get-DnsClientCache | fl, and then press Enter.
3.
At the Windows PowerShell command prompt, type ipconfig /displaydns, and then press Enter.
2.
Scroll to the end of the file, type 172.16.0.10 intranet, and then press Enter.
3.
4.
Close Notepad.
At the Windows PowerShell command prompt, type test-connection intranet, and then press Enter.
2.
At the Windows PowerShell command prompt, type Get-DnsClientCache | fl, and then press Enter.
3.
At the Windows PowerShell command prompt, type nslookup LON-DC1, and then press Enter.
2.
At the Windows PowerShell command prompt, type Resolve-Dnsname LON-DC1 | fl, and then press
Enter.
3.
At the Windows PowerShell command prompt, type nslookup d1 LON-DC1 > file.txt, and then
press Enter.
4.
At the command prompt, type notepad file.txt, and then press Enter.
5.
6.
Completion Steps
After you have completed the practice session, leave the virtual machines running for the next
practice session.
2.
3.
4.
At the Windows PowerShell prompt, type Clear-DnsClientCache, and then press Enter.
5.
6.
In the Microsoft Message Analyzer Wizard, on the Welcome to Microsoft Message Analyzer page,
click Do not update items, and then click OK.
7.
In the navigation pane, click Capture/Trace, and then in the Trace Scenarios section, click Firewall.
8.
9.
At the Windows PowerShell prompt, type ping LON-DC1.adatum.com, and then press Enter.
In Microsoft Message Analyzer, in the results pane, select the first ICMP packet group.
2.
In the result pane, click the plus (+) sign beside the selected packet group. Verify that it includes both
Echo Request and Echo Reply packets. This is a ping request.
3.
On the Microsoft Message Analyzer toolbar, in the View Filter section, type the following into the box:
*DestinationAddress == 172.16.0.10
2.
In the View Filter section, click Apply Filter. Verify that the packets are now being filtered to show
only packets that match the filter.
3.
4.
Completion Steps
After you have completed the practice session, leave the virtual machines running for the lab.
Question: After starting her computer, Amy notices that she is unable to access her normal resources.
What tool can she use to determine if she has a valid IP address?
Answer: Amy either can run IPConfig /All, or use Ping to verify her domain controllers IP
address.
Question: Amy notices that she cannot access normal enterprise websites. She knows that she has a valid
IP address, but wants to troubleshoot the DNS access of her computer. What tool must she use?
Answer: Amy can use NSLookup to troubleshoot DNS access issues.
Question: You are troubleshooting a network-related problem, and you suspect a name resolution issue.
Before conducting tests, you want to purge the DNS resolver cache. How do you do that?
Answer: To clear the DNS resolver cache, you can use the Windows PowerShell cmdlet ClearDnsClientCache. You can also use IPConfig /flushdns.
Module 6
Troubleshooting Group Policy
Contents:
Lesson 1: Overview of Group Policy Application
10
Lesson 1
On LON-CL1, click the Desktop tile, double-click Administrative Tools, and then double-click
Group Policy Management.
2.
Expand Forest: Adatum.com, expand Domains, expand Adatum.com, and then click Adatum.com.
3.
Click the Linked Group Policy Objects tab. Notice that the Default Domain Policy and Marketing
GPOs link to the root of the Adatum.com domain.
4.
Right-click Adatum.com, and then click Create a GPO in this domain, and Link it here.
5.
In the New GPO dialog box, in the Name box, type Preferences, and then click OK.
2.
Click Preferences.
3.
4.
5.
On the Settings tab, verify that no settings are defined in this GPO.
6.
In the left pane, right-click Preferences. Notice in the context menu that the link is enabled but not
enforced.
7.
8.
In the Group Policy Management Editor window, review the available information. Notice that there
are two categories of settings, User Configuration and Computer Configuration, which are divided
further into Policies and Preferences.
9.
Under User Configuration, expand Preferences, expand Windows Settings, and then click
Shortcuts.
Action: Create
Name: Notepad
Location: Desktop
2.
At the command prompt, type gpupdate /force, and then press Enter. The /force option ensures
that all policies are applied and not just updates.
3.
When the Group Policy update completes, close the Command Prompt window.
4.
Completion steps
After you have completed the practice session, leave the virtual machines running for the next
practice session.
Lesson 2
A GPO with user settings is not linked to a location where the user account resides.
A GPO with computer settings is not linked to a location where the computer account
resides.
A computer is not able to communicate with a domain controller to download the GPO due
to any of the following reasons:
o
Blocked inheritance
Enforcement
Link order
WMI filtering
2.
3.
In the Command Prompt window, at a command prompt, type gpresult /r, and then press Enter.
4.
5.
At the command prompt, type the following command, and then press Enter:
GPResult /h c:\results.html
6.
7.
8.
9.
10. View the report results and then close Internet Explorer.
2.
3.
In the Group Policy Management window, right-click Group Policy Results, and then click Group
Policy Results Wizard.
4.
5.
6.
7.
8.
On the Completing the Group Policy Results Wizard page, click Finish.
9.
10. Expand the Group Policy Results folder, right-click the Administrator on LON-CL1 report, and then
click Save Report.
11. In the Save GPO Report dialog box, click Desktop, and then click Save.
Right-click the Group Policy Modeling folder, and then click Group Policy Modeling Wizard.
2.
3.
4.
On the User and Computer Selection page, under User information, click User, and then click
Browse.
5.
In the Select User dialog box, type Ed Meadows, and then click OK.
6.
7.
In the Choose Computer Container dialog box, expand Adatum, click IT, and then click OK.
8.
9.
2.
In the details pane, click the Policy Events tab, and then review the events.
3.
4.
On the desktop, double-click Administrative Tools, and then double-click Event Viewer.
5.
In the console tree, expand Windows Logs, and then click the System log.
6.
7.
8.
9.
In the console tree, expand Applications and Services Logs, expand Microsoft, expand Windows,
expand Group Policy, and then click Operational.
10. Review the events, and then close all open windows.
Completion steps
After you have completed the practice session, revert the virtual machines in preparation for the lab:
1.
2.
In the Virtual Machines list, right-click 20688D-LON-CL1, and then click Revert.
3.
4.
Question: Do you use loopback policy processing in your organization? In which scenarios and for which
policy settings can loopback policy processing be helpful?
Answer: Answers will vary. Scenarios could include using loopback policy processing for
conference rooms and kiosks, on Virtual Desktop Infrastructures, and in other standard
environments.
Question: Your organization has a computer lab that it uses for training. When users log on to computers
in this lab, they should only have lab-specific settings. The instructor in the lab this week is indicating that
users are not seeing the default home page for the web application that they are using for training. You
know that a new GPO for the lab was created last Friday. What is the most likely cause of this problem?
Answer: The most likely cause of this problem is that the new GPO does not have loopback
processing enabled.
Question: A new user in accounting has called the help desk indicating that she does not have the
standard drive mappings for the accounting department. These drive mappings are configured by using
Group Policy Preferences. What is the most likely cause of this problem?
Answer: There is likely a configuration problem with the new user account. Depending on how
the drive mappings are configured for application, it is possible that the user is not in the correct
group, or the users account is not in the correct OU where the GPO is linked.
Module 7
Troubleshooting User Settings
Contents:
Module Review and Takeaways
Incorrect password
Locked account
Expired account
Deleted account
Module 8
Configuring and Troubleshooting Remote Connectivity
Contents:
Lesson 2: Troubleshooting NAP
10
Lesson 2
Troubleshooting NAP
Contents:
Demonstration: Configuring NAP Server Settings
Switch to LON-DC1.
2.
In Server Manager, click Tools and then click Network Policy Server.
3.
In the navigation pane, expand Network Access Protection, expand System Health Validators,
expand Windows Security Health Validator, and then click Settings.
4.
5.
6.
In the details pane, clear all check boxes except the A firewall is enabled for all network
connections check box.
7.
2.
3.
In the Create New Health Policy dialog box, under Policy name, type Compliant.
4.
Under Client SHV checks, verify that the Client passes all SHV checks is selected.
5.
Under SHVs used in this health policy, select the Windows Security Health Validator check box,
and then click OK.
6.
7.
In the Create New Health Policy dialog box, under Policy Name, type Noncompliant.
8.
Under Client SHV checks, click Client fails one or more SHV checks.
9.
Under SHVs used in this health policy, select the Windows Security Health Validator check box,
and then click OK.
2.
Disable the two default policies found under Policy Name by right-clicking the policies, and then
clicking Disable.
3.
4.
On the Specify Network Policy Name and Connection Type page, under Policy name, type
Compliant-Full-Access, and then click Next.
5.
6.
7.
In the Health Policies dialog box, under Health policies, click Compliant, and then click OK.
8.
9.
10. On the Configure Authentication Methods page, clear all check boxes, select the Perform
machine health check only check box, and then click Next twice.
11. On the Configure Settings page, click NAP Enforcement. Verify that Allow full network access is
selected, and then click Next.
12. On the Completing New Network Policy page, click Finish.
2.
On the Specify Network Policy Name and Connection Type page, under Policy name, type
Noncompliant-Restricted, and then click Next.
3.
4.
5.
In the Health Policies dialog box, under Health policies, select Noncompliant, and then click OK.
6.
7.
On the Specify Access Permission page, verify that Access granted is selected, and then click Next.
8.
On the Configure Authentication Methods page, clear all check boxes, select the Perform
machine health check only check box, and then click Next twice.
9.
On the Configure Settings page, click NAP Enforcement, and then click Allow limited access.
10. Clear the Enable auto-remediation of client computers check box, click Next, and then click
Finish.
2.
In DHCP, expand LON-DC1.Adatum.com, expand IPv4, right-click Scope [172.16.0.0] Adatum, and
then click Properties.
3.
In the Scope [172.16.0.0] Adatum Properties dialog box, click the Network Access Protection tab,
click Enable for this scope, and then click OK.
4.
5.
6.
In the DHCP Policy Configuration Wizard, in the Policy Name text box, type NAP Policy, and then
click Next.
7.
8.
In the Add/Edit Condition dialog box, in the Criteria list, click User Class.
9.
10. In the Value list, click Default Network Access Protection Class, and then click Add.
11. Click Ok, and then click Next.
12. On the Configure settings for the policy page, click No, and then click Next.
13. On the Configure settings for the policy page, in the Vendor class list, click DHCP Standard
Options.
14. In the Available Options list, select the 006 DNS Servers check box.
15. In the IP address field, type 172.16.0.10, and then click Add.
16. In the Available Options list, select the 015 DNS Domain Name check box.
17. In the String value text box, type restricted.adatum.com, and then click Next.
18. On the Summary page, click Finish.
19. Close DHCP.
Completion Steps
After you have completed the practice session, leave the virtual machines running for the lab.
Lesson 3
Troubleshooting DirectAccess
Contents:
Demonstration: Configuring DirectAccess by Using the Getting Started Wizard 7
Switch to LON-RTR.
2.
In Server Manager, click Tools, and then click Routing and Remote Access.
3.
In the Routing and Remote Access console, in the navigation pane, right-click LON-RTR (local), and
then click Disable Routing and Remote Access.
4.
Click Yes in Routing and Remote Access dialog box. This step is needed to disable the Routing and
Remote Access that was preconfigured for this lab.
5.
6.
7.
In the Network Connections window, verify that there are two network adapters: London_Network
and Internet.
8.
In the Network Connections window, right-click the London_Network adapter, and then click
Disable.
9.
In the Network Connections window, right-click the London_Network adapter, and then click
Enable.
Switch to LON-DC1.
2.
In Server Manager, click Tools, and then click Active Directory Users and Computers.
3.
In the Active Directory Users and Computers console tree, right-click Adatum.com, click New, and
then click Organizational Unit.
4.
In the New Object Organizational Unit dialog box, in the Name box, type DA_Clients OU, and
then click OK.
5.
In the Active Directory Users and Computers console tree, expand Adatum.com, right-click
DA_Clients OU, click New, and then click Group.
6.
In the New Object - Group dialog box, in the Group name box, type DA_Clients.
7.
Under Group scope, ensure that Global is selected, and under Group type, ensure that Security is
selected, and then click OK.
8.
9.
In the DA_Clients Properties dialog box, click the Members tab, and then click Add.
10. In the Select Users, Contacts, Computers, Service Accounts, or Groups dialog box, click Object
Types, select the Computers check box, and then click OK.
11. In the Enter the object names to select (examples) box, type LON-CL3, and then click OK.
12. Verify that LON-CL3 is displays under Members, and then click OK.
13. Close the Active Directory Users and Computers console.
Switch to LON-RTR.
2.
In Server Manager, click Tools, and then select Remote Access Management.
3.
In the Remote Access Management console, under Configuration, click DirectAccess and VPN.
4.
5.
6.
Verify that Edge is selected, and in Type the public name or IPv4 address used by clients to
connect to the Remote Access server box, type 131.107.0.10, and then click Next.
7.
8.
On the Remote Access Review page, verify that two GPO objects are created, Direct Access Server
Settings and DirectAccess Client settings.
9.
10. Select Domain Computers (Adatum\Domain Computers), and then click Remove.
11. Click Add, type DA_Clients, and then click OK.
12. Clear the Enable DirectAccess for mobile computers only check box, and then click Next.
13. On the DirectAccess Client Setup page, click Finish.
14. On the Remote Access Review page, click OK.
15. On the Configure Remote Access page, click Finish to finish the DirectAccess wizard.
16. In the Applying Getting Started Wizard Settings dialog box, click Close.
Completion steps
After you have completed the practice session, leave the virtual machines running for the lab.
Question: Users are complaining that they are unable to connect to the corporate network by using VPNs
following recent firewall configuration changes. The team responsible for implementing security policies
has determined that only TCP port 443 is allowed through into the internal network. Which tunneling
protocol supports this restriction?
Answer: SSTP uses HTTPS over TCP port 443.
Question: On a client computer, what steps must you perform to ensure that the clients health is being
assessed?
Answer: You must perform the following steps to ensure that the client computer can be
assessed for health:
1.
2.
3.
IASNAP.LOG. Contains information about NAP processes, Network Policy Server (NPS)
authentication, and NPS authorization.
Module 9
Troubleshooting Resource Access within a Domain
Contents:
Lesson 1: Troubleshooting File Access Issues
Lesson 1
2.
3.
4.
In the console tree, expand Forest: Adatum.com, expand Domains, expand Adatum.com, and then
click the Group Policy Objects container.
5.
In the Group Policy Objects folder, in the details pane, right-click the Default Domain Policy, and
then click Edit.
Note: It is not usual to edit the Default Domain Policy to store drive mappings.
6.
Expand User Configuration, expand Preferences, expand Windows Settings, right-click Drive
Maps, point to New, and then click Mapped Drive.
7.
In the New Drive Properties dialog box, in the Action list, click Create.
8.
9.
On the Common tab, select the Item-level targeting check box, and then click Targeting.
2.
In the Targeting Editor dialog box, click New Item, and then click Security Group.
3.
4.
In the Select Group dialog box, in the Enter the object name to select (examples) text box, type
Adatum\Research and then click OK.
5.
2.
At the command prompt, type the following command, and then press Enter:
gpupdate /force
3.
Restart LON-CL1.
4.
5.
6.
7.
Note: If a Welcome to the Research Lab dialog box displays, this is a user assigned logon
script. Click OK to close the dialog box.
Completion Steps
After you have completed the practice session, revert the virtual machines running in preparation for the
lab:
1.
2.
In the Virtual Machines list, right-click 20688D-LON-CL1, and then click Revert.
3.
4.
Lesson 2
Question: A user has called the help desk and complained about not being able to access some files. Help
desk passed the call to you, and you have determined that the user was not added to the correct group.
After you added the user to the correct group, the user is still unable to access the files. What other step is
required?
Answer: After adding a user to a group, the user must sign out and then sign back in to update
the security token that contains group membership information.
Question: One department in your organization is using a new application that creates two folders in the
root of drive C. One folder is for the program executable files, whereas the other folder is for program
data. What files permissions do you need to configure for these folders?
Answer: Users need Read and Execute permission for the folder with the program executables.
Users need Modify permission for the folder with the program data. You do not need to
configure any Share permissions.
Configuring and Troubleshooting Resource Access for Clients That Are Not Domain Members 10-1
Module 10
Configuring and Troubleshooting Resource Access for
Clients That Are Not Domain Members
Contents:
Module Review and Takeaways
Question: Your organization has an already working implementation of Work Folders that uses auto
discovery. A person has joined your organization. The user account for the new person has been created,
and he is attempting to access Work Folders. His attempts to access Work Folders are failing. What are
some likely sources of the problem?
Answer: Two potential problem sources are:
The user was not added to a group with permission to access a sync share on a Work Folders
server. A user must be give permission to have a Work Folder on a Work Folders server.
If there are multiple Work Folders servers, the user account might not have been updated
with the correct URL in the msDS-SyncServerURL attribute to locate the appropriate server.
Question: Your organization has implemented OneDrive for Business in SharePoint Online. A user wants
to share a document with a colleague outside the organization. Is this possible?
Answer: Yes. You can share documents from OneDrive for Business with external users. When
you share the document, you can specify the permission that are allowed and send an email to
the user that includes a URL for accessing the document.
Question: Your organization has implemented OneDrive for Business in an on-premises implementation
of SharePoint Server 2013. Some users are reporting that they are getting replication conflicts when they
use the OneDrive for Business Windows Sync client. What is the likely source of this problem?
Answer: You can collaborate with other users when using the OneDrive for Business Windows
Sync client only if you have Office 2013. If you are using Office 2010, replication conflicts occur if
another user is editing the document in the SharePoint library while you are editing the
synchronized version on your PC. To resolve this problem, upgrade to Office 2013 or edit the
document directly from the SharePoint library.
Configuring and Troubleshooting Resource Access for Clients That Are Not Domain Members 10-3
Module 11
Troubleshooting Applications
Contents:
Lesson 1: Troubleshooting Desktop App Installation Issues
11
13
14
Lesson 1
Missing dependencies. Many applications require additional software, such as operating system
features, to function. For example, many applications need to run on a specific version of
Microsoft .NET Framework.
Application is not compliant with User Account Control (UAC). UAC in Windows 8.1 runs all
processes with standard user permissions, even for administrative users. Applications must
request elevation to administrative permissions. Older applications designed for the Windows XP
operating system were developed prior to UAC, and do not request the elevated permissions
required for installation. In some cases, UAC recognizes the problem and elevates permissions
automatically, but not in all cases.
Licensing issues. Most desktop apps require a user license. It is possible that you may encounter
problems with the licensing process, or with the required license keys, that may result in
installation failure.
2.
3.
In the Local Group Policy Editor, expand Computer Configuration, expand Windows Settings, and
then expand Security Settings.
4.
5.
Click Windows Installer Rules, right-click Windows Installer Rules, click Create New Rule, and
then click Next.
6.
On the Permissions page, click Deny, and then click the Select button.
7.
In the Select User or Group dialog box, in the Enter the object names to select (examples) text
box, type Sales. Click Check Names, click OK, and then click Next.
8.
9.
10. In the Open dialog box, in the File name text box, type \\lon-dc1\sales\XmlNotepad.msi, and then
click Open.
11. Click Next.
Completion steps
After you have completed the practice session, leave the virtual machines running for the next
practice session.
Lesson 2
2.
3.
4.
5.
On the Stock Viewer toolbar, click Trends. In the Error dialog box, click OK.
6.
On the Tools menu, click Options. In the Unhandled exception has occurred dialog box, click
Continue.
7.
8.
9.
10. In File Explorer, right-click StockViewer, and then click Run as administrator.
11. In the User Account Control box, provide the following credentials, and then click Yes:
Password: Pa$$w0rd
2.
On the Start screen, beneath the desktop tile, click the down arrow.
3.
4.
In the Compatibility Administrator (32-bit) New Database (1) [Untitled_1] dialog box, rightclick New Database(1) [Untitled_1], and then click Rename.
5.
6.
In the Compatibility Administrator window, right-click AdatumACT [Untitled_1]*, click Create New,
and then click Application Fix.
7.
In the Create New Application Fix wizard, in the Name of the program to be fixed field, type
StockViewer.
8.
Click Browse.
9.
11. On the Compatibility Modes page, select the Run this program in compatibility mode for check
box, click the drop-down list, and then click Windows XP.
12. In the Additional compatibility modes section, scroll down, select the RunAsAdmin check box, and
then click Next.
13. On the Compatibility Fixes page, click Next.
14. On the Matching Information page, click Finish.
15. In the Compatibility Administrator window, click Save.
16. In the Save Database window, browse to d:\labfiles\mod11\.
17. In the File name field, type AdatumACT, and then click Save.
18. Close the Compatibility Administrator window.
19. Sign out of LON-CL1.
2.
On the Start screen, type cmd, right-click Command Prompt, and then click Run as administrator.
3.
In the User Account Control dialog box, enter the following credentials, and then click Yes:
Password: Pa$$w0rd
4.
5.
6.
7.
In the User Account Control dialog box, enter the following credentials, and then click Yes:
Password: Pa$$w0rd
8.
9.
Completion steps
After you have completed the practice session, revert the virtual machines in preparation for the lab:
1.
2.
In the Virtual Machines list, right-click 20688D-LON-CL1, and then click Revert.
3.
4.
Lesson 4
2.
3.
4.
In Internet Explorer , right-click the star to the right of the home symbol, and then click Menu bar.
5.
On the menu bar, click Tools, and then click Compatibility View settings.
6.
In the Internet Explorer Address bar, type http://LON-DC1, and then press Enter.
2.
Click the down arrow next to the Address bar to confirm that the address you typed in it is stored.
3.
4.
In the Internet Options dialog box, on the General tab, under Browsing history, click Delete.
5.
In the Delete Browsing History dialog box, clear the Preserve Favorites website data check box
and then click Delete.
6.
7.
Click the down arrow next to the Address bar to confirm that there are no addresses stored in the
Address bar.
Note: Bing may appear as a favorite in this list. Disregard it.
2.
In the Internet Explorer Address bar, type http://LON-DC1, and then press Enter.
3.
Confirm the address you entered is not stored by clicking on the down arrow next to the Address bar.
4.
2.
In the Manage Add-ons window, in the Add-on types pane, click Search Providers.
3.
4.
5.
6.
Download a file
1.
In the Internet Explorer Address bar, type http://lon-dc1, and then press Enter.
2.
3.
4.
5.
6.
7.
Close Excel.
8.
Completion steps
After you have completed the practice session, leave the virtual machines running for the next
lab.
Lesson 5
12
2.
On LON-CL5, on the Start screen, type Control, click Control Panel, and then click Programs.
3.
Click Programs and Features, and then in the Programs and Features window, click Turn Windows
Features on or off.
4.
In the Windows Features window, select the Hyper-V check box, and then click OK.
5.
In the Windows completed the requested changes window, click Restart Now.
6.
7.
8.
On LON-CL5, on the Start Screen, type Hyper-V, and then click Hyper-V Manager.
9.
In Hyper-V Manager, right-click LON-CL5, and then click Virtual Switch Manager.
10. In the Virtual Switch Manager window, in the Create virtual switch section, click Private, and then
click Create Virtual Switch.
11. In the Virtual Switch Properties section, in the Name field, type Private Network, and then click
OK.
12. In Hyper-V Manager, right-click LON-CL5, point to New, and then click Virtual Machine.
13. In the New Virtual Machine Wizard, click Next.
14. On the Specify Name and Location page, in the Name field, type Windows 8.1 Test, and then click
Next.
15. On the Specify Generation page, make sure Generation 1 is selected, and then click Next.
16. On the Assign Memory page, in the Startup memory field, type 1024, and then click Next.
17. On the Configure Networking page, in the Connection drop-down list box, click Private Network,
and then click Next.
18. On the Connect Virtual Hard Disk page, click Next.
19. On the Installation Options page, click Next.
20. On the Completing the New Virtual Machine Wizard page, click Finish.
21. In the Hyper-V Manager window, click LON-CL5.
22. In the Virtual Machines section, right-click Windows 8.1 Test, and then click Checkpoint. After a
few seconds, confirm that a new checkpoint displays in the Checkpoints section for Windows 8.1
Test.
23. Close Hyper-V Manager.
Completion steps
After you have completed the practice session, restart your computer:
1.
2.
In the Choose an operating system window, click Windows Server 2012 R2.
Question: Which Windows service must be running on the client computer in order to enforce AppLocker
Rules?
Answer: The Application Identity service.
Question: What does Internet Explorer 11 display when the browser detects a website that does not
adhere to HTML5 or CSS3 standards?
Answer: Internet Explorer 11 will display the web page in Compatibility Mode, which allows the
browser to continue attempting to display the web page correctly.
Question: When would you deploy Client Hyper-V to a Windows client computer in a corporate
environment?
Answer: Users can use Client Hyper-V to work with Hyper-V-based virtual machines for
troubleshooting and testing purposes. You also can use Client Hyper-V as an isolated test
environment, or for running multiple operating systems on the same computer.
Module 12
Maintaining Windows 8.1
Contents:
Lesson 2: Monitoring and Configuring Performance Options in Windows 8.1
Lesson 2
2.
3.
In the Performance Monitor window, click the Performance Monitor node. Notice that only %
Processor Time is displayed by default.
On the toolbar, click the plus (+) symbol to add an additional counter.
2.
In the Available counters area, expand PhysicalDisk, and then click % Idle Time.
3.
In the Instances of selected object box, click 1 C:, click Add, and then click OK.
4.
5.
In the left pane, expand Data Collector Sets, and then click User Defined.
2.
Right-click User Defined, point to New, and then click Data Collector Set.
3.
In the Name box, type CPU and Disk Activity, and then click Next.
4.
In the Template Data Collector Set box, click Basic, and then click Next. We recommend that you
use a template.
5.
Click Next to accept the default storage location for the data.
6.
Click Open properties for this data collector set, and then click Finish.
7.
In the CPU and Disk Activity Properties dialog box, on the General tab, you can configure general
information about the data collector set and the credentials that the data collector set uses when it is
running.
8.
Click the Directory tab. This tab lets you define information on how the collected data is stored.
9.
Click the Security tab. This tab lets you configure which users can change this data collector set.
10. Click the Schedule tab. This tab lets you define when the data collector set is active and collecting
data.
11. Click the Stop Condition tab. This tab lets you define when data collection is stopped, based on time
or data that is collected.
12. Click the Task tab. This tab lets you run a scheduled task when the data collector set stops. You can
use this to process the collected data.
13. Click Cancel. Notice that there are three kinds of logs in the right pane:
Performance Counter collects data that you can view in Performance Monitor.
Kernel Trace collects detailed information about system events and activities.
14. In the right pane, double-click Performance Counter. Notice that all Processor counters are
collected, by default.
15. Click Add.
16. In the Available counters area, click PhysicalDisk, click Add, and then click OK. All the counters for
the PhysicalDisk object are now added. Click OK.
17. In the left pane, right-click CPU and Disk Activity, and then click Start.
Examine a report
1.
Wait a few moments for the data collector set to stop automatically.
2.
Right-click CPU and Disk Activity, and then click Latest Report.
3.
Review the report, which shows the data that is collected by the data collector set.
4.
Completion Steps
After you have completed the practice session, leave the virtual machines running for the lab.
Lesson 3
2.
3.
On the Windows Defender Home tab, verify that the Quick scan option is selected, and then click
Scan now.
4.
2.
In the File Explorer address bar, type D:\Labfiles\Mod12\Malware, and then press Enter.
3.
In the Malware folder, double-click Sample.txt in Notepad. The Sample.txt file contains a text string
used to test malware detection.
4.
In Notepad, in the Sample.txt file, delete both instances of <remove> (including the angle brackets
and the blank line before and after the string of remaining text).
5.
6.
Close Notepad.
7.
8.
In Windows Defender, on the Home tab, click Custom, and then click Scan now.
9.
In the Windows Defender dialog box, select the Allfiles (D:) check box, and then click OK.
10. Verify that Windows Defender detects the potential malware in the text file. You may not receive a
notification. You can also verify that the D:\Labfiles\Mod12\Malware folder no longer contains the
Sample.txt file.
11. In Windows Defender, click the History tab.
12. Click Quarantined items, and then click View details.
13. Click Remove all.
2.
3.
Completion Steps
After you have completed the practice session, revert the virtual machines running in preparation for
the next module:
1.
2.
In the Virtual Machines list, right-click 20688D-LON-CL1, and then click Revert.
3.
4.
Question: If you have problems with your computers performance, how can you create a data collector
set to analyze a performance problem?
Answer: You can create a data collector set manually, from counters in the Performance Monitor
display, or by using a template.
Question: What is the benefit of configuring Windows Update by using Group Policy rather than by using
Control Panel?
Answer: Using Group Policy enables you to apply configuration settings to multiple computers
by performing a single action. It also prevents users from overriding the settings.
Module 13
Recovering Windows 8.1
Contents:
Lesson 1: File Recovery in Windows 8.1
Lesson 1
2.
3.
4.
5.
In the documents folder, right-click an area of free space, point to New, and then click Microsoft
Word Document.
6.
7.
8.
9.
In the First things first wizard, click Ask me later and then click Accept.
10. Click Next three times, and then click All done.
11. In Word, type This is my file, and then press the Ctrl+S keys.
12. Close Word.
2.
3.
In Control Panel, click System and Security, and then click File History.
4.
5.
In the File History window, click Advanced settings, review the options, and then click Cancel.
6.
7.
8.
9.
Double-click the Administrator@Adatum.com folder, which is the File History backup folder.
10. Double-click the LON-CL1 folder, and notice that it contains the backed-up files.
2.
3.
In File Explorer, on the ribbon, click the Home tab, and then click History.
4.
In Documents File History, right-click Recovery file.docx, and then click Restore.
5.
In File Explorer, notice that the Word document has been recovered.
6.
Completion Steps
After you have completed the practice session, leave the virtual machines running for the next
practice session.
Lesson 2
Switch to LON-CL1.
2.
Click Start.
3.
On the Start screen, press the Windows+C keys, and then click Settings.
4.
5.
6.
In Update and recovery, click Recovery, and then in the details pane, under Refresh your PC without
affecting your files, click Get started.
7.
8.
9.
At the Ready to refresh your PC prompt, click Refresh. Your computer restarts and the Refresh
process begins.
Note: Because this process takes an extended time, you will not complete it.
Password: Pa$$w0rd
Domain: Adatum
Right-click Start, point to Shut down or sign out, and then click Restart.
2.
When prompted to Press any key to boot from CD or DVD, press a key.
3.
In Windows Setup, click Next, and then click Repair your computer.
4.
On the Choose an option page, click Troubleshoot, and then click Reset your PC.
5.
6.
7.
On the Your PC has more than one drive page, click All drives.
8.
On the Do you want to fully clean your drive? page, click Fully clean the drive.
9.
On the All ready to go page, click Reset. The Reset your PC process begins.
Note: Wait until the reset process has begun, and then revert your virtual machines in
preparation for the lab, by following the instructions above.
Completion Steps
After you have completed the practice session, revert the virtual machines in preparation for the lab:
1.
2.
In the Virtual Machines list, right-click 20688D-LON-CL1, and then click Revert.
3.
4.
Question: How is a Refresh your PC operation different than when you perform a recovery using System
Image Recovery?
Answer: A system image includes all the drives required for Windows to run. It also includes the
Windows operating system and your system settings, programs, and files. Therefore, when you
perform a system image recovery, your computer is returned to the point in time when the
image was captured.
When you use Refresh your PC for recovery, although your files, your personalized settings, and
installed Windows Store apps are retained, all desktop apps are removed and all user computer
settings are reverted to their post-installation defaults.