20689D ENU Companion
20689D ENU Companion
20689D ENU Companion
20689D
Upgrading Your Skills to MCSA
Windows® 8
Companion Content
ii Upgrading Your Skills to MCSA Windows® 8
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with
any real company, organization, product, domain name, e-mail address, logo, person, place or event is
intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the
user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property
rights covering subject matter in this document. Except as expressly provided in any written license
agreement from Microsoft, the furnishing of this document does not give you any license to these
patents, trademarks, copyrights, or other intellectual property.
The names of manufacturers, products, or URLs are provided for informational purposes only and
Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding
these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a
manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links
may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not
responsible for the contents of any linked site or any link contained in a linked site, or any changes or
updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission
received from any linked site. Microsoft is providing these links to you only as a convenience, and the
inclusion of any link does not imply endorsement of Microsoft of the site or the products contained
therein.
Released: 05/2014
MICROSOFT LICENSE TERMS
MICROSOFT INSTRUCTOR-LED COURSEWARE
These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its
affiliates) and you. Please read them. They apply to your use of the content accompanying this agreement which
includes the media on which you received it, if any. These license terms also apply to Trainer Content and any
updates and supplements for the Licensed Content unless other terms accompany those items. If so, those terms
apply.
BY ACCESSING, DOWNLOADING OR USING THE LICENSED CONTENT, YOU ACCEPT THESE TERMS.
IF YOU DO NOT ACCEPT THEM, DO NOT ACCESS, DOWNLOAD OR USE THE LICENSED CONTENT.
If you comply with these license terms, you have the rights below for each license you acquire.
1. DEFINITIONS.
a. “Authorized Learning Center” means a Microsoft IT Academy Program Member, Microsoft Learning
Competency Member, or such other entity as Microsoft may designate from time to time.
b. “Authorized Training Session” means the instructor-led training class using Microsoft Instructor-Led
Courseware conducted by a Trainer at or through an Authorized Learning Center.
c. “Classroom Device” means one (1) dedicated, secure computer that an Authorized Learning Center owns
or controls that is located at an Authorized Learning Center’s training facilities that meets or exceeds the
hardware level specified for the particular Microsoft Instructor-Led Courseware.
d. “End User” means an individual who is (i) duly enrolled in and attending an Authorized Training Session
or Private Training Session, (ii) an employee of a MPN Member, or (iii) a Microsoft full-time employee.
e. “Licensed Content” means the content accompanying this agreement which may include the Microsoft
Instructor-Led Courseware or Trainer Content.
f. “Microsoft Certified Trainer” or “MCT” means an individual who is (i) engaged to teach a training session
to End Users on behalf of an Authorized Learning Center or MPN Member, and (ii) currently certified as a
Microsoft Certified Trainer under the Microsoft Certification Program.
g. “Microsoft Instructor-Led Courseware” means the Microsoft-branded instructor-led training course that
educates IT professionals and developers on Microsoft technologies. A Microsoft Instructor-Led
Courseware title may be branded as MOC, Microsoft Dynamics or Microsoft Business Group courseware.
h. “Microsoft IT Academy Program Member” means an active member of the Microsoft IT Academy
Program.
i. “Microsoft Learning Competency Member” means an active member of the Microsoft Partner Network
program in good standing that currently holds the Learning Competency status.
j. “MOC” means the “Official Microsoft Learning Product” instructor-led courseware known as Microsoft
Official Course that educates IT professionals and developers on Microsoft technologies.
k. “MPN Member” means an active Microsoft Partner Network program member in good standing.
l. “Personal Device” means one (1) personal computer, device, workstation or other digital electronic device
that you personally own or control that meets or exceeds the hardware level specified for the particular
Microsoft Instructor-Led Courseware.
m. “Private Training Session” means the instructor-led training classes provided by MPN Members for
corporate customers to teach a predefined learning objective using Microsoft Instructor-Led Courseware.
These classes are not advertised or promoted to the general public and class attendance is restricted to
individuals employed by or contracted by the corporate customer.
n. “Trainer” means (i) an academically accredited educator engaged by a Microsoft IT Academy Program
Member to teach an Authorized Training Session, and/or (ii) a MCT.
o. “Trainer Content” means the trainer version of the Microsoft Instructor-Led Courseware and additional
supplemental content designated solely for Trainers’ use to teach a training session using the Microsoft
Instructor-Led Courseware. Trainer Content may include Microsoft PowerPoint presentations, trainer
preparation guide, train the trainer materials, Microsoft One Note packs, classroom setup guide and Pre-
release course feedback form. To clarify, Trainer Content does not include any software, virtual hard
disks or virtual machines.
2. USE RIGHTS. The Licensed Content is licensed not sold. The Licensed Content is licensed on a one copy
per user basis, such that you must acquire a license for each individual that accesses or uses the Licensed
Content.
2.1 Below are five separate sets of use rights. Only one set of rights apply to you.
2.2 Separation of Components. The Licensed Content is licensed as a single unit and you may not
separate their components and install them on different devices.
2.3 Redistribution of Licensed Content. Except as expressly provided in the use rights above, you may
not distribute any Licensed Content or any portion thereof (including any permitted modifications) to any
third parties without the express written permission of Microsoft.
2.4 Third Party Notices. The Licensed Content may include third party code tent that Microsoft, not the
third party, licenses to you under this agreement. Notices, if any, for the third party code ntent are included
for your information only.
2.5 Additional Terms. Some Licensed Content may contain components with additional terms,
conditions, and licenses regarding its use. Any non-conflicting terms in those conditions and licenses also
apply to your use of that respective component and supplements the terms described in this agreement.
a. Pre-Release Licensed Content. This Licensed Content subject matter is on the Pre-release version of
the Microsoft technology. The technology may not work the way a final version of the technology will
and we may change the technology for the final version. We also may not release a final version.
Licensed Content based on the final version of the technology may not contain the same information as
the Licensed Content based on the Pre-release version. Microsoft is under no obligation to provide you
with any further content, including any Licensed Content based on the final version of the technology.
b. Feedback. If you agree to give feedback about the Licensed Content to Microsoft, either directly or
through its third party designee, you give to Microsoft without charge, the right to use, share and
commercialize your feedback in any way and for any purpose. You also give to third parties, without
charge, any patent rights needed for their products, technologies and services to use or interface with
any specific parts of a Microsoft technology, Microsoft product, or service that includes the feedback.
You will not give feedback that is subject to a license that requires Microsoft to license its technology,
technologies, or products to third parties because we include your feedback in them. These rights
survive this agreement.
c. Pre-release Term. If you are an Microsoft IT Academy Program Member, Microsoft Learning
Competency Member, MPN Member or Trainer, you will cease using all copies of the Licensed Content on
the Pre-release technology upon (i) the date which Microsoft informs you is the end date for using the
Licensed Content on the Pre-release technology, or (ii) sixty (60) days after the commercial release of the
technology that is the subject of the Licensed Content, whichever is earliest (“Pre-release term”).
Upon expiration or termination of the Pre-release term, you will irretrievably delete and destroy all copies
of the Licensed Content in your possession or under your control.
4. SCOPE OF LICENSE. The Licensed Content is licensed, not sold. This agreement only gives you some
rights to use the Licensed Content. Microsoft reserves all other rights. Unless applicable law gives you more
rights despite this limitation, you may use the Licensed Content only as expressly permitted in this
agreement. In doing so, you must comply with any technical limitations in the Licensed Content that only
allows you to use it in certain ways. Except as expressly permitted in this agreement, you may not:
• access or allow any individual to access the Licensed Content if they have not acquired a valid license
for the Licensed Content,
• alter, remove or obscure any copyright or other protective notices (including watermarks), branding
or identifications contained in the Licensed Content,
• modify or create a derivative work of any Licensed Content,
• publicly display, or make the Licensed Content available for others to access or use,
• copy, print, install, sell, publish, transmit, lend, adapt, reuse, link to or post, make available or
distribute the Licensed Content to any third party,
• work around any technical limitations in the Licensed Content, or
• reverse engineer, decompile, remove or otherwise thwart any protections or disassemble the
Licensed Content except and only to the extent that applicable law expressly permits, despite this
limitation.
5. RESERVATION OF RIGHTS AND OWNERSHIP. Microsoft reserves all rights not expressly granted to
you in this agreement. The Licensed Content is protected by copyright and other intellectual property laws
and treaties. Microsoft or its suppliers own the title, copyright, and other intellectual property rights in the
Licensed Content.
6. EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and regulations.
You must comply with all domestic and international export laws and regulations that apply to the Licensed
Content. These laws include restrictions on destinations, end users and end use. For additional information,
see www.microsoft.com/exporting.
7. SUPPORT SERVICES. Because the Licensed Content is “as is”, we may not provide support services for it.
8. TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you fail
to comply with the terms and conditions of this agreement. Upon termination of this agreement for any
reason, you will immediately stop all use of and delete and destroy all copies of the Licensed Content in
your possession or under your control.
9. LINKS TO THIRD PARTY SITES. You may link to third party sites through the use of the Licensed
Content. The third party sites are not under the control of Microsoft, and Microsoft is not responsible for
the contents of any third party sites, any links contained in third party sites, or any changes or updates to
third party sites. Microsoft is not responsible for webcasting or any other form of transmission received
from any third party sites. Microsoft is providing these links to third party sites to you only as a
convenience, and the inclusion of any link does not imply an endorsement by Microsoft of the third party
site.
10. ENTIRE AGREEMENT. This agreement, and any additional terms for the Trainer Content, updates and
supplements are the entire agreement for the Licensed Content, updates and supplements.
12. LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the laws
of your country. You may also have rights with respect to the party from whom you acquired the Licensed
Content. This agreement does not change your rights under the laws of your country if the laws of your
country do not permit it to do so.
13. DISCLAIMER OF WARRANTY. THE LICENSED CONTENT IS LICENSED "AS-IS" AND "AS
AVAILABLE." YOU BEAR THE RISK OF USING IT. MICROSOFT AND ITS RESPECTIVE
AFFILIATES GIVES NO EXPRESS WARRANTIES, GUARANTEES, OR CONDITIONS. YOU MAY
HAVE ADDITIONAL CONSUMER RIGHTS UNDER YOUR LOCAL LAWS WHICH THIS AGREEMENT
CANNOT CHANGE. TO THE EXTENT PERMITTED UNDER YOUR LOCAL LAWS, MICROSOFT AND
ITS RESPECTIVE AFFILIATES EXCLUDES ANY IMPLIED WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
14. LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. YOU CAN RECOVER FROM
MICROSOFT, ITS RESPECTIVE AFFILIATES AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP
TO US$5.00. YOU CANNOT RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL,
LOST PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES.
It also applies even if Microsoft knew or should have known about the possibility of the damages. The
above limitation or exclusion may not apply to you because your country may not allow the exclusion or
limitation of incidental, consequential or other damages.
Please note: As this Licensed Content is distributed in Quebec, Canada, some of the clauses in this
agreement are provided below in French.
Remarque : Ce le contenu sous licence étant distribué au Québec, Canada, certaines des clauses
dans ce contrat sont fournies ci-dessous en français.
EXONÉRATION DE GARANTIE. Le contenu sous licence visé par une licence est offert « tel quel ». Toute
utilisation de ce contenu sous licence est à votre seule risque et péril. Microsoft n’accorde aucune autre garantie
expresse. Vous pouvez bénéficier de droits additionnels en vertu du droit local sur la protection dues
consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties
implicites de qualité marchande, d’adéquation à un usage particulier et d’absence de contrefaçon sont exclues.
EFFET JURIDIQUE. Le présent contrat décrit certains droits juridiques. Vous pourriez avoir d’autres droits
prévus par les lois de votre pays. Le présent contrat ne modifie pas les droits que vous confèrent les lois de votre
pays si celles-ci ne le permettent pas.
Module 1
Windows 8.1 in an Enterprise Environment
Contents:
Lesson 2: Overview of Windows 8.1 2
Lesson 2
Overview of Windows 8.1
Contents:
Demonstration: Customizing the Windows 8.1 User Interface 3
Demonstration: Customizing Windows 8.1 Settings 3
Windows 8.1 in an Enterprise Environment 1-3
3. In the Photos app, move the pointer to the top of the screen, click, and then drag the pointer
towards the bottom of the screen until the app closes.
4. From the Start screen, right-click the Photos tile, click Resize, and then click Wide.
5. Click and drag the Photos tile above the Mail tile.
6. Right-click the Photos tile, and then click Unpin from Start.
7. From the Start screen, move the pointer to the bottom of the screen, and then click the down-arrow
icon.
10. On the desktop, right-click the Start button, and then click Command Prompt.
11. On the desktop, right-click the taskbar, and then click Properties.
12. On the Taskbar and Navigation Properties page, click the Navigation tab.
13. On the Navigation tab, in the Start screen section, select the When I sign in or close all apps on a
screen, go to the desktop instead of Start check box, and then click OK.
2. From the Desktop, click the Settings charm, and then click Change PC Settings.
4. On the PC and devices screen, in the Lock screen apps section, click the + icon, click Weather, and
then click the back arrow.
5. On the PC Settings screen, click Accounts, and then view the options available.
11. In the app list, click Finance, click Uninstall, and then click Uninstall.
14. On the Time and Language screen, under Time zone, click the drop-down box, and then click (UTC-
6:00) Central Time (US & Canada).
Answer: Answers will vary, but students might mention centralized management and
configuration with Group Policy, and centralized authentication with Active Directory® Domain
Services. Domains also provide logical and security boundaries that can help an organization to
provide a management structure for Windows 8.1–based computers.
Installing and Upgrading to Windows 8.1 2-1
Module 2
Installing and Upgrading to Windows 8.1
Contents:
Lesson 1: Preparing to Install and Deploy Windows 8.1 2
Lesson 1
Preparing to Install and Deploy Windows 8.1
Contents:
Question and Answers 3
Installing and Upgrading to Windows 8.1 2-3
Answer: No, you cannot use the Client Hyper-V feature on a 32-bit version of Windows 8.1
Enterprise. This feature is available only in the 64-bit version of Windows 8.1 Enterprise.
Answer: Yes, you can use Microsoft Office 2013 on Windows RT, because this app is part of
Windows RT by default. Note that you can install only Windows Store apps on Windows RT.
Answer: Installation from the default Windows 8.1 DVD media requires user interaction. You
need to perform the installation locally, on one computer at a time. You can use Windows 8.1
DVD media for deploying Windows 8.1 in small branch offices. However, because of the manual
intervention that is required, even small office environments typically use custom Windows 8.1
installation media.
Answer: 1 GB of memory is the recommended minimum for installing Windows 8.1. However,
you can install Windows 8.1 even if a computer or a virtual machine has less than 1 GB of
memory—for example, 512 megabytes (MB). If you are installing Windows 8.1 on a virtual
machine running on a Client Hyper-V virtualization platform, you can also use the Dynamic
Memory feature.
Answer: A 32-bit version of Windows 8.1 can use only 32-bit device drivers, and a 64-bit version
of Windows 8.1 can use only 64-bit device drivers. This means that you cannot use any device
driver from a 64-bit version of Windows 8.1 with a 32-bit version of Windows 8.1.
Answer: Windows 8.1 is backward compatible with older versions of Windows operating systems.
In general, you can run most programs that were developed for older versions of Windows
operating systems on Windows 8.1. However, some changes in Windows 8.1 can cause
compatibility issues. For example, if a program uses a component that is deprecated in Windows
8.1, you will not be able to run the program on Windows 8.1 by default, or sometimes, not at all.
Answer: Client Hyper-V is one of the features in the 64-bit version of Windows 8.1. You
can use Client Hyper-V to create a virtual machine, install Windows XP on the virtual
machine, and then install the application on the virtual machine. You should ensure that
you properly license the operating system that is running on the virtual machine.
Installing and Upgrading to Windows 8.1 2-5
Lesson 2
Installing Windows 8.1
Contents:
Question and Answers 6
2-6 Upgrading Your Skills to MCSA Windows®8
Answer: You should perform a clean installation of Windows 8.1 because you do not need the
applications and data on the refurbished computer. After you install Windows 8.1, you can install
the applications and migrate the settings and data from the computer you plan to replace.
Answer: If you perform a clean installation of Windows 8.1, the existing users, their settings, data,
and installed applications on the computer that is running Windows 7 are not migrated to
Windows 8.1. If you did not format the volume, this information will be preserved in the
Windows.old folder but will not be used in the Windows 8.1 environment.
Answer: No, you can perform an upgrade to Windows 8.1 only if you run Setup.exe from the
existing operating system. If you start the computer from the DVD, you can perform a clean
installation of Windows 8.1, but you cannot upgrade the existing operating system to Windows
8.1.
Answer: No, cross-architecture upgrade to Windows 8.1 is not supported. Therefore, you cannot
upgrade a 32-bit version of Windows 8 Pro to a 64-bit version of Windows 8.1 Pro.
Answer: While most of the scenario would suggest an in-place upgrade, you cannot upgrade
Windows XP directly to Windows 8.1. Therefore, in this scenario, you need to perform a
migration, retain the user’s settings, and reinstall applications.
Question: One of your users has been promoted to a new position, and the user has been given a new
computer. The user would like to have the new applications that the job requires installed. The user would
also like to have the documents and settings from the old Windows 7 computer transferred to the new
computer. How should you perform the Windows 8.1 installation?
Answer: You should perform a side-by-side migration in this scenario because a new computer
and a new set of applications are being used. After installing Windows 8.1 on the new computer
and installing new applications, you need to migrate the user’s documents and settings, which
are on the Windows 7 computer, to the new Windows 8.1 computer.
Installing and Upgrading to Windows 8.1 2-7
Answer: Answers may vary. You would typically use Windows To Go when you cannot or do not
want to install Windows 8.1 on a physical computer. For example, you can use Windows To Go
on personal devices that users bring to connect to organizational resources. With Windows To
Go, users can start their devices to a customized Windows 8.1 environment, which can be
domain-joined. This enables users to access company resources without modifying anything on
the device, including the installed operating system and user data. The device must be Windows
8.1 compatible for you to use it with Windows To Go.
Answer: Native boot from a virtual hard disk uses physical hardware and does not require the
Client Hyper-V feature. You can use native boot from a virtual hard disk even when the Client
Hyper-V feature is not enabled.
2-8 Upgrading Your Skills to MCSA Windows®8
Lesson 3
Volume Activation for Windows 8.1
Contents:
Question and Answers 9
Installing and Upgrading to Windows 8.1 2-9
Activation Options
Question: What is activation?
Answer: Activation establishes a relationship between the product key that is used in Windows
8.1 installation and the computer hardware on which the installation was performed.
Answer: You can determine if Windows 8.1 is activated by checking System properties, or by
running the slmgr –dli script. You can activate Windows 8.1 by running the slmg –ato script or
by using the Activate Windows settings page.
Answer: Yes, a Windows 8.1 computer can be a KMS host. However, we do not recommend this
configuration, because a computer that runs Windows 8.1 is not always connected to the
network, and end users use it. It is recommended that one of the servers running Windows Server
2012 or a newer operating system also act as a KMS host.
Answer: When a Windows 8.1 computer wants to activate, it establishes Lightweight Directory
Access Protocol (LDAP) communication with the domain controller. This is the same type of
connection for other interactions between client computers and domain controllers, so you do
not need to open any additional port on the firewall to allow Active Directory–based activation.
Answer: One of the features of VAMT is MAK Proxy Activation, which enables you to use VAMT
for activating all the clients on a network at once, without requiring the clients to have Internet
connectivity.
Answer: After Windows 8.1 is initially activated, it has up to 180 days for reactivation. During that
time, it will try to contact the activation server every seven days, or even more often. If one of the
attempts to reactivate is not successful—for example, if a KMS host is not available—the user will
not be notified. You can find such events in the event log. The user will be notified only if
Windows 8.1 is unable to activate in 180 days.
2-10 Upgrading Your Skills to MCSA Windows®8
Lesson 4
Migrating User State and Settings
Contents:
Question and Answers 11
Installing and Upgrading to Windows 8.1 2-11
Answer: Windows Easy Transfer is the best option in this scenario. A nontechnical user will
perform the migration on a small number of computers only, so the Windows Easy Transfer
wizard-based interface will be more familiar and easy to use.
Question: You have been asked to retain user settings for 200 users who are having their Windows 7
computers replaced with new Windows 8.1 computers. Which tool should you use for migrating user
settings?
Answer: USMT is the best option in this scenario. Migrating user states for 200 computers by
using Windows Easy Transfer would be time-consuming. You can use the command-line tools for
USMT in a script that can run on each computer.
Answer: Windows Easy Transfer can migrate settings and data from a source computer that has
an older Windows operating system installed to a Windows 8.1 destination computer. A Windows
8.1 computer cannot be a source computer for Windows Easy Transfer.
Answer: No, you do not need to install Windows ADK on the source computer. However, you
need to ensure that ScanState.exe and the XML files that you use during the capturing process
are available on the source computer. USMT can be made available on a network share, and you
can access the network share from the source computer and run USMT.
Answer: When you want to include additional settings and data in the migration—for example,
custom registry keys or folder structure—you can specify them in the additional XML
configuration files. Be aware that data that is not captured on the source computer cannot be
restored on the destination computer.
Answer: You can use encryption during the migration process. ScanState.exe can encrypt the
data while it is capturing it, and LoadState.exe can decrypt it during the restoration process.
2-12 Upgrading Your Skills to MCSA Windows®8
Answer: You can export or copy the virtual machines from Client Hyper-V on Windows 8.1, and
then import them to Windows Server 2012 R2 that is running the Hyper-V role in the production
environment.
Question: Could you use Windows 8.1 Pro in the situation that the lab presents?
Answer: The 64-bit edition of Windows 8.1 Pro will run on the hardware that is specified and it
will provide Client Hyper-V. However, Windows 8.1 Pro does not include the Windows To Go
Creator Wizard, which is required for the lab. Therefore, you cannot use Windows 8.1 Pro in the
situation that the lab presents.
Answer: You use the custom Config.xml file to include or exclude additional settings and files in
the migration. Your manager did not want several default folders to be migrated, so you had to
create and customize the Config.xml file.
Question: Why did you use XML files with the ScanState.exe command?
Answer: XML files configure which settings and data to capture and which data should be
included in the capture. If you do not specify the XML configuration files, only the default data
will be captured.
Configuring and Managing Windows 8.1 3-1
Module 3
Configuring and Managing Windows 8.1
Contents:
Lesson 2: Using Windows PowerShell to Configure and Manage Windows 8.1 2
Lesson 2
3. In Windows PowerShell Integrated Scripting Environment (ISE), at the Windows PowerShell command
prompt, type Get-ExecutionPolicy, and then press Enter. Confirm that the execution policy is
Unrestricted.
2. In the Open window, browse to E:\Labfiles\Mod03, click Services.ps1, and then click Open.
3. Read the script and explain what the script is doing. Note the following:
2. Read the output in the console pane. Notice that the line from the script appears in the console pane.
6. Read the output. Notice that it does not have multiple colors.
9. In the Windows PowerShell ISE dialog box, select the In the future, do not show this message
check box, and then click OK.
10. Read the output. Notice that running services are green and services that are not running are red.
11. On line 16, type Write-Host “A total of“ $services.count “services were evaluated”.
17. Click Copy, and then paste onto line 17 of the script.
2. At the Windows PowerShell command prompt, type Set-Location E:\Labfiles\Mod03, and then
press Enter.
2. To ensure that you have the correct execution policy in place, run the following command.
Set-ExecutionPolicy RemoteSigned
3. In the Execution Policy Change window, type Y to confirm the Execution Policy Change.
Enable-PSremoting
If you receive an error about a network connection being public, run the Enable-PSremoting –
SkipNetwork cmdlet instead. Point out the error to students; it is an error they will see often.
6. To open a one-to-one connection to LON-DC1, type the following command, and then press Enter.
7. To run the Get-Process command on LON-DC1, type the following command, and then press Enter.
Get-Process
8. To close the remote session, type the following command, and then press Enter.
Exit-PSSession
9. To run a cmdlet on multiple remote machines, type the following command, and then press Enter.
10. Leave the virtual machines running for the next demonstration.
Configuring and Managing Windows 8.1 3-5
Lesson 3
Using Group Policy to Manage Windows 8.1
Contents:
Demonstration: Configuring Group Policy Settings 6
Demonstration: Configuring Domain-Based GPOs 6
3-6 Upgrading Your Skills to MCSA Windows® 8
2. In the Local Group Policy Editor, under User Configuration, expand Administrative Templates, click
System, and then double-click Prevent access to registry editing tools.
3. In the Prevent Access to Registry Editing Tools window, click Enabled, and then click OK.
Edit the local GPO to allow administrators to use registry editing tools
1. On the Start screen, type mmc, and then click mmc.exe.
3. In the Add or Remove Snap-ins window, in the Available snap-ins box, click Group Policy Object
Editor, and then click Add.
5. In the Browse for a Group Policy Object window, click the Users tab, click Administrators, and then
click OK.
8. In the MMC, expand Local Computer\Administrators Policy, expand User Configuration, expand
Administrative Templates, click System, and then double-click Prevent access to registry editing
tools.
9. In the Prevent Access to Registry Editing Tools window, click Disabled, and then click OK.
10. On the Start screen, type regedit, and then click regedit.exe.
11. Leave the virtual machines running for the next demonstration
2. In Server Manager, click Tools, and then click Group Policy Management.
3. If necessary, expand Forest: Adatum.com, expand Domains, and then expand Adatum.com.
4. Select and then right-click the Group Policy Objects folder, and then click New.
5. In the New GPO dialog box, in the Name box, type Desktop, and then click OK.
2. In Group Policy Management Editor, under Computer Configuration, expand Policies, expand
Windows Settings, expand Security Settings, expand Local Policies, and then click Security
Options.
3. In the details pane, double-click Interactive logon: Do not display last user name.
4. In the Interactive logon: Do not display last user name Properties dialog box, select the Define
this policy setting check box, click Enabled, and then click OK.
7. In the Windows Installer Properties dialog box, select the Define this policy setting check box,
and then click OK.
8. Under User Configuration, expand Policies, expand Administrative Templates, and then click
Start Menu and Taskbar.
9. In the details pane, double-click Remove Search link from Start Menu.
10. In the Remove Search link from Start Menu dialog box, click Enabled, and then click OK.
11. Under the Administrative Templates folder, expand Control Panel, and then click Display.
13. In the Hide Settings tab dialog box, click Enabled, and then click OK.
Lesson 5
Configuring User State Virtualization
Contents:
Question and Answers 9
Configuring and Managing Windows 8.1 3-9
Overview of UE-V
Question: Can you use UE-V to synchronize application settings for a user who is already configured with
Folder Redirection?
Answer: Yes, you can configure UE-V and Folder Redirection for the same user. We recommend
using this method when you want to roam settings and user data between computers.
3-10 Upgrading Your Skills to MCSA Windows® 8
Answer: By default, Windows Firewall does not allow remote management. You need to update
Windows Firewall to allow remote management on the remote computer.
Question: One of the server administrators is complaining that he needs to use Remote Desktop and
connect to a domain controller to manage user accounts. He wants to manage accounts without having
to go through this process. In this case, what alternative will you suggest to administer user accounts from
a computer running Windows 8.1?
Answer: You can download and install the RSAT for Windows 8.1. RSAT includes the
management tools found on Windows Server 2012 R2.
Question: You have configured a public-use computer in the lobby for visiting clients. This computer is
not part of the AD DS domain. How can you secure this computer to prevent visiting clients from making
changes to it and still allow administrators to have full access?
Answer: As a first step, visiting clients should sign in with a standard user account. Then you can
use a local Group Policy to restrict the standard user account further. To allow administrators to
have full access, you can create a local Group Policy that removes restrictions from the items that
are restricted for standard users.
Configuring and Managing Windows 8.1 3-11
Answer: When you set block inheritance on the MachineFloor organizational unit, you ensured
that any GPOs that are applied to the domain will not be applied to computers in the
MachineFloor organizational unit unless a policy at the domain-level is enforced. LON-CL2 was in
the MachineFloor organizational unit.
Answer: UE-V clients update with the settings from the settings location catalog once daily, at
3:30 A.M. by default, when the scheduled task triggers. If you want to update the UE-V client
immediately with a new Settings Location Template, you should run
ApplySettingsTemplateCatalog.exe.
Implementing an Application Strategy for Windows 8.1 4-1
Module 4
Implementing an Application Strategy for Windows 8.1
Contents:
Lesson 2: Managing Windows Store Apps 2
Lesson 2
Managing Windows Store Apps
Contents:
Demonstration: How to Perform Sideloading of Windows Store Apps 3
Implementing an Application Strategy for Windows 8.1 4-3
3. Under Local Computer Policy in the left navigation pane, expand Computer Configuration, expand
Administrative Templates, expand Windows Components, and then click App Package
Deployment.
5. In the Allow all trusted apps to install dialog box, click Enabled, and then click OK.
7. Press the Windows logo key+X, and then on the Administrative menu, click Windows PowerShell.
8. In the Windows PowerShell® window, type gpupdate /force, and then press Enter.
Note: To sideload an app, Windows must trust the app. For purposes of this demonstration,
the app will be signed with a self-signed certificate. You will need to install the root certificate on
the client.
2. Expand drive E:, expand Labfiles, expand Mod04, expand LeXProductsGrid, right-click the
LeXProductsGrid81_1.1.0.2_AnyCPU.cer file, and then click Install Certificate.
3. On the Welcome to the Certificate Import Wizard page, click Local Machine, and then click Next.
4. On the Certificate Store page, click Place all certificates in the following store, click Browse, click
Trusted Root Certification Authorities, click OK, click Next, and then click Finish.
5. In the Certificate Import Wizard dialog box, confirm that the import was successful, and then click
OK.
Note: Windows Store apps must be signed digitally. You can install them only on
computers that trust the certification authority (CA) that provided the apps’ signing certificate.
2. On LON-CL1, on the Start screen, type PowerShell, and then press Enter.
4-4 Upgrading Your Skills to MCSA Windows® 8
3. At the Windows PowerShell command prompt, type the following command, and then press Enter:
add-appxpackage
E:\Labfiles\Mod04\LeXProductsGrid\LeXProductsGrid81_1.1.0.2_AnyCPU.appx
5. Verify that the six groups of tiles display in the TestAppTKL1 app.
Lesson 3
Configuring Internet Explorer Settings
Contents:
Question and Answers 6
Demonstration: How to Configure Internet Explorer 6
4-6 Upgrading Your Skills to MCSA Windows® 8
Answer: XSS Filter has visibility into all requests and responses that are flowing through the
browser. When the filter discovers a likely instance of XSS in a request, it identifies and neutralizes
the attack if it is replayed in the server’s response. XSS Filter helps protect users from website
vulnerabilities. It does not ask difficult questions that users are unable to answer, and it does not
harm the functionality on the website.
4. Right-click the bar to the left of the home symbol, and then click Menu bar.
5. On the menu bar, click Tools, and then click Compatibility View settings.
6. In the Compatibility View Settings dialog box, select the Display intranet sites in Compatibility
View check box, and then click Close.
2. Click the down arrow next to the address bar to confirm that the address you typed into it is stored.
5. In the Delete Browsing History dialog box, clear the Preserve Favorites website data check box,
select the Temporary Internet files and website files, Cookies and website data, and History
check boxes, and then click Delete.
7. Confirm that there are no addresses stored in the address bar by clicking the down arrow next to the
address bar.
3. To confirm the address you entered is not stored, click the down arrow next to the address bar.
6. Click Close.
Download a file
1. In the address bar, type http://LON-DC1, and then press Enter.
6. Close Excel and Internet Explorer, and then sign out from LON-CL1.
4-8 Upgrading Your Skills to MCSA Windows® 8
Lesson 4
Configuring Application Restrictions in an Enterprise
Contents:
Question and Answers 9
Demonstration: How to Configure AppLocker Rules 9
Demonstration: How to Enforce AppLocker Rules 9
Implementing an Application Strategy for Windows 8.1 4-9
Question: When testing AppLocker, you must consider carefully how you will organize rules between
linked GPOs. What do you do if a GPO does not contain the default AppLocker rules?
Answer: If a GPO does not contain the default rules, either add the rules directly to the GPO or
add them to a GPO that links to it.
Question: What is the command to manually update the computer's policy, and where do you run it?
Answer: The command to update a computer’s policy manually is gpupdate /force, and you run
it as an administrator at the command prompt or at a Windows PowerShell command prompt.
3. In the Local Group Policy Editor, expand Computer Configuration, expand Windows Settings,
expand Security Settings, expand Application Control Policies, and then double-click AppLocker.
4. Click and right-click Executable Rules, and then click Create New Rule.
7. In the Select User or Group dialog box, in the Enter the object names to select (examples) box,
type Marketing, click Check Names, click OK, and then click Next.
9. Click Browse Files. In the File name box, type C:\Windows\Regedit.exe, and then click Open.
2. In the Automatically Generate Script Rules dialog box, on the Folder and Permissions page, click
Next twice.
4. In the AppLocker dialog box, when prompted to create default rules, click Yes.
2. In the Properties dialog box, on the Enforcement tab, under Executable rules, click the Configured
check box, and then select Enforce rules.
3. On the Enforcement tab, under Script rules, select the Configured check box, and then click Audit
only, and then click OK.
2. At the Windows PowerShell command prompt, type the following command, and then press Enter:
gpupdate /force
4. Press the Windows logo key+X, and then on the Administrative menu, click Computer
Management.
5. In the Computer Management window, expand Event Viewer, expand Windows Logs, and then
click System.
6. In the results pane, locate and click the latest event with the Event ID 1502.
3. At the command prompt, type the following command, and then press Enter:
Regedit.exe
7. Press the Windows logo key+X, and then on the Administrative menu, click Computer
Management.
8. In the Computer Management window, expand Event Viewer, expand Application and Services
Logs, expand Microsoft, expand Windows, expand AppLocker, and then double-click EXE and DLL.
9. Review the entries in the results pane. Locate Event ID 8004. This shows Adam’s attempt to run
Regedit.exe.
• When you test AppLocker, consider carefully how you will organize rules between linked GPOs. If a
GPO does not contain the default rules, then either add the rules directly to the GPO, or add them to
a GPO that links to it.
• After you create new rules, you must configure enforcement for the rule collections, and then refresh
the computer's policy.
• By default, AppLocker rules do not allow users to open or run any files that are not specifically
allowed. Administrators must maintain a current list of allowed applications.
• If AppLocker rules are defined in a GPO, only those rules are applied. To ensure interoperability
between software restriction policies rules and AppLocker rules, define software restriction policies
rules and AppLocker rules in different GPOs.
• When you set an AppLocker rule to Audit Only, the rule is not enforced. When a user runs an
application that is included in the rule, the application is opened and runs normally, and information
about that application is added to the AppLocker event log.
• Allow your Internet Explorer 11 favorites, history, and typed URLs to be synced across all Windows
8.1–based devices by signing in to Windows 8.1 with a Microsoft account.
• Change your default search provider by opening Internet Options, selecting the Programs tab,
clicking Manage Add-ons, and selecting Search Providers.
• Do not turn off Enhanced Protected Mode in Internet Explorer 11 for the desktop.
• If Enhanced Protected Mode has been turned off, re-enable it under Security on the Advanced tab in
Internet Options.
• Tracking protection is turned on by default for both versions of Internet Explorer 11.
• For optimal reliability and cross-browser compatibility, the best practices are to use standards-based
technologies instead of critical plug-in functionality.
• When plug-in dependencies are removed, modern websites can benefit from better site
interoperability.
• Do not configure Anonymous authentication in addition to another authentication type for the same
website, because this will likely cause authentication problems.
• Authenticate the user with a method that is not anonymous, prior to allowing write access to the
website or File Transfer Protocol (FTP) site.
4-12 Upgrading Your Skills to MCSA Windows® 8
Review Question(s)
Question: What are some of the privacy features in Internet Explorer?
Answer: Microsoft InPrivate Browsing and Tracking Protection are two of the privacy features in
Internet Explorer.
AppLocker policies do not work Before you can enforce AppLocker policies, you must
correctly. start the Application Identity service.
Implementing an Application Strategy for Windows 8.1 4-13
Answer: Answers may vary. Organizations might have a corporate policy to restrict users from
accessing the Windows Store. In addition, some organizations might want to provide access to
the Windows Store only to the Bring Your Own Device (BYOD) users.
Answer: If there is no lock icon displayed next to the address bar, you will not be able to validate
the safety of the website. Such a website is not secure, and you should not enter any personal or
financial information on that website.
In the lab, you configured an executable path for the executable rule. What could you do if you wanted to
allow users to run an earlier version of Windows Media Player?
Answer: You can create a publisher executable rule and specify version 12.0.0.0 as the version to
be restricted, citing Wmplayer.exe as the reference file. Different versions will then be able to run.
Question: Trevor has implemented AppLocker. Before he created the default rules, he created a custom
rule that allowed all Windows processes to run except for Regedit.exe. Because he did not create the
default rules first, he is blocked from performing administrative tasks. What does he need to do to resolve
the issue?
Answer: Trevor must restart the computer in safe mode, add the default rules, delete any Deny
rules that are preventing access, and then refresh the computer policy.
Managing Devices and Resource Access 5-1
Module 5
Managing Devices and Resource Access
Contents:
Lesson 1: Options for Managing Non-Domain Member Devices 2
Lesson 1
Options for Managing Non-Domain Member Devices
Contents:
Question and Answers 3
Managing Devices and Resource Access 5-3
Answer: Because the accounting app cannot be installed locally on the employee’s personal
device, he or she can use the device to connect remotely to another computer that is running the
app and use the app from that computer. For example, the employee can use Remote Desktop to
connect to his or her domain member computer, which is running the app. Alternatively, the
employee can connect to his or her virtual desktop if the company has deployed the Virtual
Desktop Infrastructure (VDI) environment.
Answer: You cannot use Group Policies to manage devices that are not domain members. You
must manage each non-domain member device individually, or use products, such as Windows
Intune™ or System Center 2012 R2 Configuration Manager, to manage them centrally.
Answer: Assigned access allows you to limit user experience to a single Windows Store app.
Therefore, you can use assigned access only with standard users. If the user is a member of the
Administrators group, you cannot enable assigned access for him or her.
Question: How does remote business data removal enable you to comply with the company security
policy?
Answer: Remote business data removal enables you to remotely wipe a local copy of company
data from a user’s device, while leaving user data on the device intact. By using this feature, you
can remove company data from a lost device or from the device of an employee who has left the
company.
Answer: Before you can manage devices running Windows 8.1 by using Windows Intune, you
must install the Windows Intune agent.
5-4 Upgrading Your Skills to MCSA Windows® 8
Lesson 2
Configuring Workplace Join
Contents:
Question and Answers 5
Demonstration: Enrolling Devices 5
Managing Devices and Resource Access 5-5
Workplace Join
Question: What is the difference between accessing company resources from a domain member device
and accessing resources from a workplace-joined device?
Answer: From domain member devices, you have a SSO experience when accessing domain
resources, and you can access all domain resources to which you have permissions. From
workplace-joined devices, you have a SSO experience when accessing company resources that
support claims-based authentication only. For example, you can access internal company web
apps with SSO, but you cannot access network shares on the company file server.
Answer: No. Workplace Join is a Windows 8.1 feature, and it is not possible to use Workplace
Join to join devices that are running previous versions of the Windows operating system.
Answer: To enable Workplace Join on a device, you must configure the device with network
settings so that it can resolve company server names. You must also configure the device to trust
the company CA.
Answer: When you want to join a device by using Workplace Join, you need to enter a user ID. A
user ID looks like an email address, but it is actually a user principal name (UPN).
2. In the Internet Explorer® address bar, type https://lon-svr2.adatum.com/claimapp, and then press
Enter to access the company’s internal web app.
3. In the Windows Security dialog box, in User name box, type adatum\adam, in the Password box,
type Pa$$w0rd, and then click OK.
4. Confirm that the web page opens and Adam’s claims display.
7. In the Internet Explorer address bar, type https://lon-svr2.adatum.com/claimapp, and then press
Enter.
9. In the Windows Security dialog box, in the User name box, type adatum\adam, in the Password
box, type Pa$$w0rd, and then click OK. This confirms that you will be asked for the credentials each
time you access the company web app from the non-domain member device.
5-6 Upgrading Your Skills to MCSA Windows® 8
11. On the Start screen, type settings, and then click PC settings.
13. On the Network screen, click Workplace. In the Enter your user ID to get workplace access or
turn on device management box, type adam@adatum.com, and then click Join.
14. On the Connecting to Adatum page, verify that adam@adatum.com displays in the first box. In the
second box, type Pa$$w0rd, and then click Sign in.
15. Verify that the device has joined your workplace network and that the label of the button changed
from Join to Leave.
16. Move the pointer to the upper-left corner of the screen, and then click the Desktop tile.
17. On LON-DC1, on the Start screen, type active, and then click Active Directory Users and
Computers.
18. In Active Directory Users and Computers, on the View menu, click Advanced Features. In the
navigation pane, expand Adatum.com, and then click the RegisteredDevices node. Confirm that
one object of type msDS-Device displays in the details pane. This object represents the LON-CL4
computer that you joined to the workplace network. Note the name of the msDS-Device object.
20. With the Internet Explorer window open, press the Alt key. On the Tools menu, click Internet
options.
21. In the Internet Options dialog box, click the Content tab. In the Certificates section, click
Certificates.
22. In the Certificates dialog box, on the Personal tab, verify that one certificate displays, and that it has
a GUID in the Issued To box. This is the certificate that the Device Registration Service provided to
the user when the device was joined to the workplace. Verify that the GUID is the same as the name
of the msDS-Device object in Active Directory Users and Computers. Click Close, and then in the
Internet Options dialog box, click OK.
23. In the Internet Explorer address bar, type https://lon-svr2.adatum.com/claimapp, and then press
Enter to access the company’s internal web app.
24. In the Windows Security dialog box, in the User name box, type adatum\adam. In the Password
box, type Pa$$w0rd. Verify that the Remember my credentials check box is not selected, and then
click OK.
25. Confirm that a web page opens and that Adam’s claims display.
28. Re-open Internet Explorer, and then access the same company app at the https://lon-
svr2.adatum.com/claimapp URL.
29. Verify that this time the web page opens without asking you for credentials. You are not asked for
credentials because you accessed it from the workplace-joined device.
Lesson 3
Configuring Work Folders and Remote Business Data
Removal
Contents:
Question and Answers 8
Demonstration: Configuring Work Folders 9
5-8 Upgrading Your Skills to MCSA Windows® 8
Answer: By default, only a single user can access a Work Folder. However, one user can access a
Work Folder from multiple devices. You cannot share your Work Folder, but you can make a copy
of the Work Folder data and share the copy with coworkers. Note that the copy you make is a
static copy, and it does not synchronize with the content of your Work Folder.
Answer: No. In Windows 8.1, users can access only a single Work Folder. Users can have sync
access to multiple Work Folders, but only a single Work Folder will be used. They will not be able
to synchronize other Work Folders, even if they have sync access permissions to them.
Answer: No. By using Group Policy, you can set up Work Folders centrally only to domain
member devices. If a device is not domain joined, you can use local Group Policy on the device to
set up Work Folders.
Answer: No. Workplace Join and Work Folders are two independent features. It is a bit easier to
set up Work Folders on workplace-joined devices, because they already trust the company CA.
However, you can set up Work Folders on any device that trusts the company CA.
Answer: No, because neither Server Manager nor Work Folders cmdlets are part of Windows 8.1.
If you want to use them on computers running Windows 8.1, you need to install Remote Server
Administration Tools (RSAT).
Answer: Because some of the devices are domain joined while others are not, the user cannot
use Folder Redirection. The user cannot use OneDrive for Business because the company has not
deployed Microsoft SharePoint® Server 2013. Therefore, the user could use either Work Folders
or OneDrive. Because the user needs to synchronize work-related data, he or she should use
Work Folders.
Managing Devices and Resource Access 5-9
2. In Group Policy Management, in the navigation pane, expand Forest: Adatum.com, expand
Domains, expand Adatum.com, and then select the Marketing organizational unit.
3. Right-click Marketing, and then click Create a GPO in this domain, and Link it here. In the Name
box, type Deploy Work Folders, and then click OK.
4. In the navigation pane, expand Marketing. Right-click Deploy Work Folders, and then click Edit.
The Group Policy Management Editor displays.
5. In Group Policy Management Editor, under User Configuration, in the navigation pane, expand
Policies, expand Administrative Templates, expand Windows Components, and then click the
Work Folders node.
6. In the details pane, right-click Specify Work Folder settings, and then click Edit.
7. In the Specify Work Folder settings dialog box, click Enabled. In the Work Folders URL box, type
https://lon-dc1.adatum.com, select the Force automatic setup check box, and then click OK.
11. On the desktop, on the taskbar, click the File Explorer icon.
12. In the This PC window, in the details pane, double-click Work Folders.
13. Right-click in the details pane, click New, click Text Document, and then name the file On LON-CL1.
14. On LON-CL4, on the taskbar, right-click the Start button, and then click Control Panel.
15. In Control Panel, in the Search Control Panel box, type work, and then click Work Folders.
16. On the Manage Work Folders page, click Set up Work Folders.
17. On the Enter your work email address page, click Enter a Work Folders URL instead.
18. On the Enter a Work Folders URL page, in the Work Folders URL box, type https://lon-
dc1.adatum.com, and then click Next.
19. In the Windows Security dialog box, in the User name box, type adatum\adam. In the Password
box, type Pa$$w0rd, and then click OK.
20. On the Introducing Work Folders page, review the local Work Folders location, and then click Next.
21. On the Security policies page, select the I accept these policies on my PC check box, and then
click Set up Work Folders.
22. On the Work Folders has started syncing with this PC page, click Close.
23. In the Work Folders window, verify that the On LON-CL1.txt file displays.
24. In the WorkFolders window, right-click in the details pane, point to New, click Text Document, and
then name the file On LON-CL4.txt.
25. On LON-CL1, in the Work Folders window, verify that only the On LON-CL1 file displays.
5-10 Upgrading Your Skills to MCSA Windows® 8
26. In the details pane, right-click and click Sync Now. Press the F5 key to refresh the view, and verify
that the On LON-CL1 and On LON-CL4 files display.
Managing Devices and Resource Access 5-11
Answer: No, you do not need to grant the user any additional permissions. Domain users have
sufficient permissions to join their devices to a workplace by using Workplace Join.
Answer: On the device, you can open the PC Settings screen, navigate to the Network screen,
and then select Workplace to verify if the device is joined to a workplace. You can also verify if
the user has the digital certificate that was issued by the Device Registration Service. A domain
administrator can find the certificate in the RegisteredDevices AD DS container.
Question: Can you join the same device to a workplace that your coworker already joined by using
Workplace Join?
Answer: Yes. If you have a domain account, you can join a device to a workplace, even if it is
already workplace-joined by somebody else. Workplace Join is performed once per user per
device, and it associates the domain user account with the device. This means that each user who
is using the device can join the device to the workplace by using Workplace Join. Workplace Join
follows a different concept from joining a device to a domain, which is a system-wide
configuration.
Question: Can a user access the same Work Folder from domain member devices and from workgroup
devices?
Answer: Yes, the user can access the same Work Folder from all devices, regardless of his or her
domain membership. If a user is accessing Work Folders by using the same domain credentials
from all the devices, the user will access the same content.
Question: Can you access the content of Work Folders from a device that does not support Work
Folders?
Answer: You can connect to Work Folders only from devices that support Work Folders.
However, you can create an SMB share that points to the same folder on the Windows Server
2012 R2 file server. This will enable users to access the content from any device from which you
can connect to the shared folder.
Question: Can you access Work Folders content on a PC without network connectivity?
Answer: A PC that supports Work Folders creates a local copy of the Work Folders content. If
network connectivity is not available, you can still access and modify the local copy. When the
network connectivity is restored, local changes will transparently synchronize with the Work
Folder content on the file server.
Securing Windows 8.1 Devices 6-1
Module 6
Securing Windows 8.1 Devices
Contents:
Lesson 1: Authentication and Authorization in Windows 8.1 2
Lesson 1
Authentication and Authorization in Windows 8.1
Contents:
Question and Answers 3
Demonstration: Configuring a Picture Password or PIN for Authentication 3
Securing Windows 8.1 Devices 6-3
Answer: Windows operating systems use the Kerberos v5 protocol unless an enterprise is using
smart cards. In such cases, a Windows operating system uses the certificate mapping method for
authentication.
2. On the Start screen, type Picture, and then click Set up picture password.
3. In the Sign-in Options window, under the Picture password option, click Add.
4. In the Create a picture password dialog box, type the password Pa$$w0rd to verify your account
information, and then click OK.
7. Drag the picture to the correct position, and then click Use this picture.
8. Follow the onscreen instructions, and then draw three gestures on your picture.
10. Swipe down from the top middle of the app to close the Sign-in account app.
2. In the Sign-in Options window, under the PIN option, click Add.
4. On the Create a PIN page, follow the on-screen instructions, type a four-digit PIN password, and
then click Finish.
5. Swipe down from the top middle of the app to close the Sign-in account app.
2. In the Virtual Machines list, right-click 20689D-LON-CL4, and then click Revert.
Lesson 2
Securing Data by Using BitLocker
Contents:
Question and Answers 5
Securing Windows 8.1 Devices 6-5
BitLocker Modes
Question: What is a disadvantage of running BitLocker on a computer that does not have TPM 1.2?
Answer: Computers without TPM 1.2 or TPM 2.0 will not be able to use the system-integrity
verification that BitLocker provides during the startup process.
Question: You just received a new batch of 10 laptops that do not have a TPM. Is it still possible to
protect the contents of the hard drive by using BitLocker?
Answer: Yes, but you must configure the startup to require a password or a startup key on a USB
drive.
Answer: You can enable the Microsoft BitLocker Administration and Monitoring 2.0 self-service
portal to allow users to recover a BitLocker recovery password by themselves, without calling the
help desk.
Configuring BitLocker
Question: When turning on BitLocker on a computer that has TPM 1.2, why should you save the recovery
password?
Answer: If the TPM ever changes or cannot be accessed, if there are changes to key system files,
or if someone tries to start the computer from a product CD or DVD to circumvent the operating
system, the computer will switch to recovery mode and will remain there until the user provides
the recovery password. Storing the recovery password so that it is accessible to the user allows
the user to complete the startup process.
Answer: The recovery password is a 48-digit password that unlocks a system in the recovery
mode. The recovery password is unique to a particular BitLocker encryption, and you can store it
in AD DS. A computer's password ID is a 32-character password that is unique to a computer
name. You can find the password ID under a computer’s properties, which you can use to locate
recovery passwords that are stored in AD DS.
Answer: EFS keys are not available during the startup process. Therefore, if system files are
encrypted, the system file cannot start.
6-6 Upgrading Your Skills to MCSA Windows® 8.1
Lesson 3
Configuring UAC
Contents:
Question and Answers 7
Demonstration: Configuring UAC with GPOs 7
Securing Windows 8.1 Devices 6-7
Answer: A consent prompt displays to administrators in Admin Approval Mode when a user
attempts to perform an administrative task. It requests approval from the user to continue
performing the task. A credential prompt displays to standard users when they attempt to
perform an administrative task.
Answer: UAC security settings configured in Local Security Policy and in the Action Center in
Control Panel are the two configuration options that combine to produce the end-user elevation
experience.
Answer: The Detect Application Installations And Prompt for Elevation setting of User Account
Control detects when an application is being installed in Windows 8.1.
Answer: Answers may vary. However, you should try to understand what the user is doing to
cause UAC to be displayed. Also, educate the user on the benefits of UAC and its ability to help
keep the system secure from malicious attacks.
2. Open the Administrative menu by pressing the Windows logo key+X, and then click Run.
4. In the Local Group Policy Editor, expand Computer Configuration, expand Windows Settings,
expand Security Settings, expand Local Policies, and then click Security Options.
2. In the User Account Control: Behavior of the elevation prompt for standard users dialog box,
click Automatically deny elevation requests, and then click OK.
4. Sign out.
6-8 Upgrading Your Skills to MCSA Windows® 8.1
2. On the Start screen, type UAC, and then select Change User Account Control settings.
4. Sign out.
3. In the Local Group Policy Editor, expand Computer Configuration, expand Windows Settings,
expand Security Settings, expand Local Policies, and then click Security Options.
4. In the results pane, double-click User Account Control: Behavior of the elevation prompt for
standard users.
5. In the User Account Control: Behavior of the elevation prompt for standard users dialog box,
click Prompt for credentials, and then click OK.
2. On the Start screen, type UAC, and then select Change User Account Control settings.
6. Sign out.
Securing Windows 8.1 Devices 6-9
Lesson 4
Guarding Against Malware
Contents:
Question and Answers 10
Demonstration: Configuring Windows SmartScreen and Windows Defender Settings 10
6-10 Upgrading Your Skills to MCSA Windows® 8.1
What effect could malware such as a rootkit have on a computer? Additionally, if a user suspected
malware in the form of a rootkit, what action should the user take?
Answer: Answers may vary. The user should report the problem or suspicion to the help desk
support team, or attempt to remove the malware by using the Windows Defender Offline tool.
2. On the Start screen, type action, and then click Action Center.
4. Review the available settings, close the Windows SmartScreen dialog box, and then close Action
Center.
2. Click View by, select Large Icons, and then click Windows Defender.
2. In the Malware folder, open sample.txt in Notepad. The sample.txt file contains a text string that is
used to test malware detection.
3. In the sample.txt file, delete both instances of <remove>, including the brackets and the leading
space in the first line.
4. In Notepad, save the file, and then close the file. Immediately, Windows Defender detects a potential
threat.
5. Shortly thereafter, the sample.txt will be removed from the Malware folder.
6. Select the check box for Virus:DOS/EICAR_Test_File, and then click Remove.
2. In the Virtual Machines list, right-click 20689D-LON-CL1, and then click Revert.
Lesson 5
Configuring Windows Firewall
Contents:
Question and Answers 13
Demonstration: Configuring Inbound and Outbound Rules by Using GPOs 13
Securing Windows 8.1 Devices 6-13
Answer: Answers may vary. IPsec rules should be used whenever an organization requires
maximum security for connections between two computers that must be authenticated or
encrypted. IPsec rules can be of the following types: Isolation rules, authentication exemption
rules, server-to-server rules, tunnel rules or custom rules.
2. Right-click the Start button, click Windows PowerShell (Admin), type PING LON-CL1, and then
press Enter.
4. Select Run from the Administrative menu by pressing the Windows logo key+X, and then type
gpedit.msc.
6. In the navigation tree, click Inbound Rules, right-click Inbound Rules, and then click New Rule.
7. In the New Inbound Rule Wizard, select Custom, and then click Next twice.
8. On the Protocol and Ports page, select the ICMPv4 protocol type, and the click Next twice.
9. On the Action page, select Block the connection, and then click Next twice.
10. On the Name page, type Deny ping as the rule name, and then click Finish to exit the wizard.
11. Switch to LON-DC1, and then verify that you cannot now ping LON-CL1 by repeating the step 2
above.
2. Right-click the Start button, click Windows PowerShell (Admin), type PING LON-DC1, and then
press Enter.
3. Select Run from the Administrative menu by pressing Windows logo key+X, and then type
gpedit.msc.
5. In the navigation tree, click Outbound Rules, right-click Outbound Rules, and then click New Rule.
6-14 Upgrading Your Skills to MCSA Windows® 8.1
6. In the New Inbound Rule Wizard, select Custom, and then click Next twice.
7. On the Protocol and Ports page, select the ICMPv4 protocol type, and then click Next twice.
8. On the Action page, select Block the connection, and then click Next twice.
9. On the Name page, type Deny ping as the rule name, and then click Finish to exit the wizard.
10. Right-click the Start button, click Windows PowerShell (Admin), type PING LON-DC1, and then
press Enter.
2. In the Virtual Machines list, right-click 20689D-LON-CL1, and then click Revert.
• Because the user experience can be configured with Group Policy, there can be different user
experiences, depending on policy settings. The configuration choices that are made in your
environment affect the prompts and dialog boxes that standard users, administrators, or both, can
view. For example, you may require administrative permissions to change the UAC setting to Always
Notify Me or Always Notify Me and Wait For My Response. With this type of configuration, a yellow
notification appears at the bottom of the User Account Control Settings page, indicating the
requirement.
• Although UAC enables you to sign in by using an administrative user account to perform everyday
user tasks, it is still good practice to sign in by using a standard user account for these everyday tasks.
Sign in as an administrator only when necessary.
• A removable USB storage device, such as a USB flash drive. If your computer does not have TPM 1.2
or newer, BitLocker stores its key on the memory device.
• The most secure implementation of BitLocker takes advantage of the enhanced security capabilities
of TPM 1.2.
• On computers that do not have TPM 1.2, you can still use BitLocker to encrypt the Windows
operating system volume. However, this implementation will require the user to insert a USB startup
key to start the computer or resume from hibernation and does not provide the prestartup system-
integrity verification that BitLocker offers when it works with a TPM.
• Configure a local or remote computer by using either the Windows Firewall with Advanced Security
console or the cmdlets in the PowerShell NetSecurity module.
• Configure Windows Firewall with Advanced Security settings by using the Group Policy Management
Console or the cmdlets in the Windows PowerShell NetSecurity module.
• If you are configuring the Windows Firewall with Advanced Security settings by using Group Policy,
you need to ensure that the Windows Firewall service has the necessary NTFS write access permissions
to application locations.
• If you deploy Windows Firewall with Advanced Security by using Group Policy and then block
outbound connections, ensure that you enable the Group Policy outbound rules, and do full testing
in a test environment before deploying. Otherwise, you might prevent all of the computers that
receive the policy from updating the policy in the future, unless you intervene manually.
6-16 Upgrading Your Skills to MCSA Windows® 8.1
• When you use Windows Defender, you must have current definitions.
• To help keep your definitions current, Windows Defender automatically installs new definitions as
they are released. You also can set Windows Defender to check online for updated definitions before
it scans.
• When scanning your computer, select the advanced option of Create a System Restore Point Before
Applying Actions To Detected Items
Review Question(s)
Question: When you implement UAC, what happens to standard users and administrative users when
they perform a task that requires administrative privileges?
Answer: For standard users, UAC prompts the user for the credentials of a user with
administrative privileges. For administrative users, UAC prompts the user for permission to
complete the task.
Question: What are the requirements for BitLocker to store its own encryption and decryption key in a
hardware device that is separate from the hard disk?
Answer: This situation requires a computer with TPM or a removable USB flash drive. If your
computer does not have TPM 1.2 or newer, BitLocker stores its key on the USB flash drive.
Question: An administrator configures Group Policy to require that data can be saved only on data
volumes that are protected by BitLocker. Specifically, the administrator enables the Deny Write Access To
Removable Drives Not Protected By BitLocker setting and deploys it to the domain. Meanwhile, an end
user inserts a USB flash drive that is not protected with BitLocker. What will happen, and how can the user
resolve the situation?
Answer: Because the USB flash drive is not protected with BitLocker, Windows 8.1 displays an
informational dialog box indicating that the device must be encrypted with BitLocker. From this
dialog box, the user can choose to launch the BitLocker wizard to encrypt the volume, or
continue working with the device as read-only.
Securing Windows 8.1 Devices 6-17
Answer: Answers may vary. Windows Firewall blocks remote desktop connections by default. The
office computer will need to be configured to allow remote connections.
Configuring Remote Access 7-1
Module 7
Configuring Remote Access
Contents:
Lesson 1: Overview of DirectAccess 2
Lesson 1
Overview of DirectAccess
Contents:
Demonstration: Running the Getting Started Wizard 3
Demonstration: Identifying the Getting Started Wizard Settings 3
Configuring Remote Access 7-3
4. In the Properties dialog box, click the Members tab, and then click Add.
2. In the Remote Access Management console, under Configuration, click DirectAccess and VPN.
5. Verify that Edge is selected, and in the Type the public name or IPv4 address used by clients to
connect to the Remote Access server box, type 131.107.0.2, and then click Next.
7. On the Remote Access Review page, verify that two Group Policy Objects (GPOs) have been created:
DirectAccess Server Settings and DirectAccess Client Settings.
9. In the Remote Access Setup window, click Domain Computers (ADATUM\Domain Computers),
and then click Remove.
11. In the Select Groups window, type DA_Clients, and then click OK.
12. Clear the Enable DirectAccess for mobile computers only check box, and then click Next.
15. On the Configure Remote Access page, click Finish to finish the DirectAccess wizard.
16. In the Applying Getting Started Wizard Settings dialog box, click Close.
2. In the Remote Access Management console, in the left pane, click DirectAccess and VPN.
7-4 Upgrading Your Skills to MCSA Windows® 8
3. In the Remote Access Setup window, under the image of the client computer labeled as Step 1
Remote Clients, click Edit.
4. In the DirectAccess Client Setup window, click Deployment Scenario and review the default settings,
click Select Groups and review the default settings, and then click Network Connectivity Assistant
and review the default settings.
6. In the Remote Access Setup window, under the image of the client computer labeled as Step 2
Remote Access Server, click Edit.
7. In the Remote Access Server Setup window, click Network Topology and review the default settings,
click Network Adapters and review the default settings, and then click Authentication and review
the default settings.
9. In the Remote Access Setup window, under the image of the client computer labeled as Step 3
Infrastructure Servers, click Edit.
10. In the Infrastructure Server Setup window, click Network Location Server and review the default
settings, click DNS and review the default settings, click DNS Suffix Search List and review the
default settings, and then click Management and review the default settings.
12. In the Remote Access Setup window, under the image of the client computer labeled as Step 4
Application Servers, click Edit.
13. In the DirectAccess Application Server Setup window, review the default settings, click Cancel, and
then click OK.
Lesson 2
Advanced DirectAccess Infrastructure
Contents:
Demonstration: Monitoring and Troubleshooting DirectAccess Connectivity 6
7-6 Upgrading Your Skills to MCSA Windows® 8
2. In Server Manager, click Tools, and then click Remote Access Management.
All components should have a Status of Working and a green check mark beside them. If this is not the
case, click Refresh to update the Operations Status view. You might have to do this several times. If Status
does not show as working after 5-10 minutes, restart LON-SVR2 and repeat steps 1-3.
Verify DirectAccess Group Policy configuration settings for Windows 8.1 clients
1. Switch to LON-CL1 and sign in as Adatum\Administrator with a password of Pa$$w0rd.
2. On LON-CL1, open the Command Prompt window, and then type the following commands. Press
Enter after each command.
gpupdate /force
gpresult /R
3. Verify that DirectAccess Client Settings GPO displays in the list of the Applied Policy objects for the
Computer Settings.
2. From the Start screen, type ncpa.cpl, and then press Enter.
3. In the Network Connections window, right-click the Ethernet connection, and then click Disable.
4. In the Network Connections window, right-click the Ethernet 2 connection, and then click Enable.
ipconfig
3. Notice the IP address that starts with 2002. This is an Internet Protocol over Secure Hypertext Transfer
Protocol (IP-HTTPS) address.
4. At the command prompt, type the following command, and then press Enter.
2. On LON-SVR2, open the Remote Access Management console, and then in the left pane, click
Dashboard.
3. Review the information in the central pane, under the DirectAccess and VPN Client Status.
Configuring Remote Access 7-7
4. In the left pane, click Remote Client Status, and then in the central pane, review the information
under the Connected Clients list.
5. In the left pane, click Reporting, and then in the central pane, click Configure Accounting.
6. In the Configure Accounting window, under Select Accounting Method, click Use inbox
accounting, click Apply, and then click Close.
7. In the central pane, under Remote Access Reporting, review the options for monitoring historical
data.
7-8 Upgrading Your Skills to MCSA Windows® 8
Lesson 3
Configuring VPN Access
Contents:
Demonstration: Configuring a VPN Connection 9
Configuring Remote Access 7-9
3. In Control Panel, under Network and Internet, click View network status and tasks.
4. In the Network and Sharing Center window, under Change your networking settings, click Set up a
new connection or network.
5. In the Choose a connection option dialog box, click Connect to a workplace, and then click Next.
6. In the Connect to a workplace dialog box, click Use my Internet connection (VPN), and then
when prompted, select I’ll set up an Internet connection later.
7. In the Type the Internet address to connect to dialog box, specify an Internet address of
172.16.0.10 and a Destination name of HQ, and then click Create.
2. On the Network Connections page, right-click HQ, and then click Properties.
3. In the HQ Properties dialog box, click the Security tab, and then click Allow these protocols.
4. In the Type of VPN list, click Point-to-Point Tunneling Protocol (PPTP), and then click OK.
5. On the Network Connections page, right-click HQ, and then click Connect/Disconnect.
2. Enter the following information in the Network Authentication boxes, and then click OK:
o Password: Pa$$w0rd
Answer: The main benefits of using DirectAccess for providing remote connectivity are:
Improved security. Administrators can set and control the intranet resources
that are accessible through DirectAccess.
Answer: To configure DirectAccess clients, use Group Policy. When you use the Getting Started
Wizard to configure DirectAccess, two GPOs are created and linked to the domain. These two
GPOs define DirectAccess-related settings and are applied to DirectAccess clients.
Question: What type of remote access VPN solutions can you provide to Windows 8.1–based clients?
Answer: You can configure the following remote access solutions by using VPN in Windows 8.1:
Secure remote access to internal network resources for users who are on the
Internet. Windows 8.1 computers act as VPN clients that connect to Windows
Server 2012 R2, which acts as a VPN server.
Answer: Global unicast IPv6 addresses are automatically generated based on the network
infrastructure. As a result, Windows 8.1–based clients can connect to an organization’s intranet
and the Internet by using DirectAccess, without requiring that you configure IPv6 addresses.
Monitoring and Recovering Windows 8.1 8-1
Module 8
Monitoring and Recovering Windows 8.1
Contents:
Lesson 1: Monitoring and Troubleshooting Performance in Windows 8.1 2
Lesson 1
Monitoring and Troubleshooting Performance in
Windows 8.1
Contents:
Question and Answers 3
Demonstration: Using Performance Monitor
to Gather Performance-Related Data 3
Monitoring and Recovering Windows 8.1 8-3
2. In the Performance Monitor window, click the Performance Monitor node. Notice that only %
Processor Time is displayed by default.
2. In the Available Counters area, expand PhysicalDisk, and then click % Idle Time.
3. In the Instances of selected object box, click 0 C:, click Add, and then click OK.
4. Right-click % Idle Time, and then click Properties.
2. Right-click User Defined, point to New, and then click Data Collector Set.
3. In the Name box, type CPU and Disk Activity, and then click Next.
4. In the Template Data Collector Set box, click Basic, and then click Next. We recommend that you
use a template.
5. Click Next to accept the default storage location for the data.
6. Click Open properties for this data collector set, and then click Finish. On the General tab, you
can configure general information about the data collector set and the credentials that the data
collector set uses when it is running.
7. Click the Directory tab. This tab lets you define information on how the collected data is stored.
8. Click the Security tab. This tab lets you configure which users can change this data collector set.
9. Click the Schedule tab. This tab lets you define when the data collector set is active and collecting
data.
8-4 Upgrading Your Skills to MCSA Windows®8
10. Click the Stop Condition tab. This tab lets you define when data collection is stopped, based either
on time or data that is collected.
11. Click the Task tab. This tab lets you run a scheduled task when the data collector set stops.
12. Click Cancel. Notice that there are three kinds of logs in the right pane:
o Performance Counter collects data that you can view in the Performance Monitor.
o Kernel Trace collects detailed information about system events and activities.
13. In the right pane, double-click Performance Counter. Notice that all Processor counters are
collected by default.
15. In the Available Counters area, click PhysicalDisk, click Add, and then click OK. All of the counters for
the PhysicalDisk object are now added.
17. In the left pane, right-click CPU and Disk Activity, and then click Start.
Examine a report
1. Wait a few moments, and the data collector set will stop automatically.
2. Right-click CPU and Disk Activity, and then click Latest Report. This report shows the data that is
collected by the data collector set.
3. Close the Performance Monitor window.
Monitoring and Recovering Windows 8.1 8-5
Lesson 2
Troubleshooting Windows 8.1 Startup
Contents:
Demonstration: Resolving Startup Problems 6
8-6 Upgrading Your Skills to MCSA Windows®8
2. In the Open dialog box, in the File name box, type C:\Program Files\Microsoft
Learning\20689\Drives\ Win81Ent_EVAL.iso, and then click Open.
3. On LON_CL1, from the Desktop, right-click the Start button, click Shut down or sign out, and then
click Restart.
4. When you see the Press any key to boot from CD or DVD message, press Spacebar. Setup loads.
10. At the command prompt, type Bcdedit /enum, and then press Enter.
11. At the command prompt, type Bootrec /scanos, and then press Enter. This command scans disks for
installations that are compatible with Windows 8.1. This option displays installations that Bcdedit
/enum does not list. You can use the /RebuildBcd switch to add the missing installations to the boot
store.
12. At the command prompt, type diskpart, and then press Enter.
13. At the command prompt, type list disk, and then press Enter.
14. At the command prompt, type list volume, and then press Enter.
15. At the command prompt, type exit, and then press Enter.
16. At the command prompt, type exit, and then press Enter.
20. On the Startup Repair page, click Windows 8.1. The automatic repair starts.
22. On the Choose an option page, click Continue. Windows starts normally.
3. In the Apps list, right-click Command Prompt, and then click Run as administrator.
4. At the command prompt, type Bcdedit /copy {current} /d “Duplicate boot entry”, and then press
Enter.
5. At the command prompt, type Bcdedit /enum, and then press Enter.
Monitoring and Recovering Windows 8.1 8-7
6. At the command prompt, type shutdown /r, and then press Enter.
7. When Windows restarts, wait until the Choose an operating system menu appears.
Answer: You can use Bcdedit /enum to view the entries in the store. Then use Bcdedit to edit
the store to reflect the changes on the computer.
Question: After installing a new video driver, your user’s computer becomes unstable and will not start
correctly. What would you try first to resolve this problem?
Answer: You would use System Restore, and then roll back the configuration to a previous point.
If System Restore is unavailable, you could attempt a driver rollback.
Monitoring and Recovering Windows 8.1 8-9
Answer: Answers will vary. This question is intended to survey the students for their approach to
the exercise, and allow them to discuss those approaches with each other. You can guide the
discussion to highlight relevant points and connect student approaches to content covered in the
topics in this lesson.
Answer: A user’s computer failed to start correctly because of a corrupted BCD store.
Answer: The product DVD was used to access Setup and then manually repair the BCD store.
Module 9
Implementing Client Hyper-V in Windows 8.1
Contents:
Lesson 1: Overview of Client Hyper-V 2
Lesson 1
Overview of Client Hyper-V
Contents:
Question and Answers 3
Implementing Client Hyper-V in Windows 8.1 9-3
Answer: If you want to administer Client Hyper-V locally, you can use the Hyper-V module for
Windows PowerShell, which is installed automatically when you turn on the Hyper-V Windows
feature on a Windows 8.1–based computer. If you want to administer Client Hyper-V on a remote
computer, you must first turn on the Hyper-V module for Windows PowerShell feature.
Answer: Yes, you can run multiple virtual machines with the same name and TCP/IP settings in
the same Client Hyper-V environment without a conflict. Each virtual machine is isolated from
others and from the physical computer running Windows 8.1 by default, so there will not be any
conflict if you configure operating systems in virtual machines with the same settings.
Answer: If there is no virtual switch on a computer running Client Hyper-V and you deploy
multiple virtual machines on that computer, you will not be able to connect the virtual machines
to a network. The virtual machines will be unable to communicate with other computers on the
network or among themselves, even if they are running on the same physical computer. The
physical computer will still have network connectivity because a virtual switch is not required to
control its network traffic. However, as a best practice, always create one or more virtual switches
on a computer running Client Hyper-V.
Answer: If a virtual machine is connected to an internal virtual switch, its connectivity is generally
limited to:
• Other virtual machines that are running on the same physical computer and that are
connected to the same internal virtual switch.
However, if the physical Windows 8.1–based computer has Internet connectivity and is
configured with ICS, then the virtual machine could also have Internet connectivity.
9-4 Upgrading Your Skills to MCSA Windows® 8
Lesson 2
Creating Virtual Machines
Contents:
Question and Answers 5
Implementing Client Hyper-V in Windows 8.1 9-5
Answer: No. You can select a generation for the virtual machine only when you create the virtual
machine. You cannot change the generation after you create the virtual machine. If you already
have a Generation 1 virtual machine, you cannot convert it to a Generation 2 virtual machine,
regardless of the operating system that is installed on that virtual machine.
Answer: No, you cannot modify most of the virtual machine settings while the virtual machine is
running. If the virtual machine has Dynamic Memory enabled, you can decrease the minimum
RAM and increase the maximum RAM while the virtual machine is running. Irrespective of the
state of a virtual machine, you can always modify the memory weight.
Answer: When you import a virtual machine, its configuration (for example, the number of
processors and memory settings) is preserved. Import also preserves checkpoints and TCP/IP
settings of the network adapter. None of that is preserved when you create a new virtual
machine and configure it with the existing virtual hard disk.
Question: Can you use the enhanced session mode to start a virtual machine from a USB flash drive?
Answer: Enhanced session mode is available only after the supported operating system is already
running on the virtual machine. When the virtual machine is starting, enhanced session mode is
not available. Therefore, you cannot use USB device redirection to start the virtual machine from
the USB device.
9-6 Upgrading Your Skills to MCSA Windows® 8
Lesson 3
Managing Virtual Hard Disks
Contents:
Question and Answers 7
Implementing Client Hyper-V in Windows 8.1 9-7
Answer: Virtual hard disks have the same format, irrespective of the controller you use to
connect them to a virtual machine. The only difference is how the virtual machine accesses those
virtual hard disks and which options the controller offers. For example, you can add or remove
virtual hard disks from a virtual SCSI controller while the virtual machine is running. However, you
must first turn off the virtual machine if you want to add or remove a virtual hard disk from a
virtual integrated device electronics (IDE) controller.
Question: Can Client Hyper-V allocate more storage space to a differencing virtual hard disk than to the
parent disk to which it is linked?
Answer: A differencing virtual hard disk is always linked to a parent disk, which can be a fixed-
size virtual hard disk, a dynamically expanding virtual hard disk, or another differencing virtual
hard disk. When a differencing virtual hard disk is linked to a dynamically expanding or
differencing virtual hard disk, Client Hyper-V can allocate more space to it than it can to the
parent disk to which it is linked.
Answer: You would use shared virtual hard disks when you want to provide shared storage on a
virtual machine, most likely to configure failover clustering.
Answer: You can use storage migration to move all the virtual machine data files. This includes
virtual hard disks, which are usually the largest virtual machine data files, checkpoints, current
configuration, and Smart Paging files.
Answer: No, you do not need to be local administrator. You only need to be a member of the
Hyper-V Administrators group to be able to use Move Wizard.
9-8 Upgrading Your Skills to MCSA Windows® 8
Lesson 4
Managing Checkpoints
Contents:
Question and Answers 9
Implementing Client Hyper-V in Windows 8.1 9-9
Answer: You can create checkpoints of virtual machines that are running and virtual machines
that are turned off. However, the checkpoint of a virtual machine that is running includes
memory content, whereas the checkpoint of a virtual machine that is turned off has no memory
content. Therefore, the checkpoint of a virtual machine that is turned off will be smaller in size
than the checkpoint of a running virtual machine.
Answer: A virtual machine must be turned off for you to be able to configure most of the virtual
machine settings. However, you can never modify a virtual machine configuration in a
checkpoint, regardless of whether the virtual machine was running or turned off when you
created the checkpoint. Checkpoints contain virtual machine configurations from the past, which
you cannot modify.
Answer: No, you cannot prevent checkpoint creation from inside a virtual machine.
9-10 Upgrading Your Skills to MCSA Windows® 8
Answer: Users can use Client Hyper-V to work with virtual machines that run in Hyper-V for
troubleshooting and testing purposes. You also can use Client Hyper-V as an isolated test
environment, or to run multiple operating systems on the same computer.
Question: Why should you not use virtual machine checkpoints for backup and disaster recovery?
Answer: Checkpoints enable you to apply earlier point-in-time snapshots to a virtual machine.
However, checkpoints depend on the virtual machine files. If those files are not available, you
cannot use checkpoints, even if checkpoint files are still available. Therefore, if the physical disk
on which virtual machine files are stored fails, you will not be able to recover the virtual machine
only by using checkpoint files.
Question: Can you create a checkpoint of a virtual machine that is turned off?
Answer: Yes, you can create a checkpoint of a virtual machine providing it is not in a Paused
state. If you create a checkpoint of a virtual machine that is in an Off state, it will be smaller than
a checkpoint of a running virtual machine, because the checkpoint will not contain virtual
machine memory.
Question: When you opened Windows PowerShell and ran the New-VM cmdlet to create a new virtual
machine, you received an error that New-VM was not recognized as the name of a cmdlet. What was the
most probable reason for such an error?
Answer: New-VM is one of the cmdlets in the Windows PowerShell Hyper-V module. The most
probable reason for the error is that the Hyper-V module is not available on the computer. If you
want to use the cmdlet, you should turn on the Hyper-V Module for the Windows PowerShell
feature.
Tools
Tool Description Where to find it
Answer: An operating system that performs virtualization has to run directly on the computer’s
hardware. You cannot turn on the Client Hyper-V feature if Windows 8.1 is running on a virtual
machine. Therefore, you had to use native boot from a virtual hard disk for this lab. However, if
you want to manage Client Hyper-V remotely, you can turn on the Hyper-V Management tools
feature in the virtual machine.
Question: In the lab, you created a private virtual switch to which to connect the virtual machine. Would
a private virtual switch be the logical choice if you were using the virtual machine for testing Windows
Updates? Why or why not?
Answer: A private virtual switch would limit the virtual machine to connectivity with other virtual
machines that are running on the same Windows 8.1 Client Hyper-V. This would not be a good
choice for Windows Updates, because the computer will need Internet connectivity to download
the updates. The external virtual switch would be best suited for a virtual machine that you are
using to test Windows Updates.