8369-1 Windows OS Fundamentals
8369-1 Windows OS Fundamentals
8369-1 Windows OS Fundamentals
September 2012
Microsoft Technology Associate Series
© CCI Learning Solutions Inc.
Preface Table of Contents
Windows Operating System Fundamentals
Developers: Kenny Lee, Irina Heer
Publishers: Kelly Hegedus, Kevin Yulo
This courseware is one in a series prepared by CCI Learning Solutions Inc. for use by students and instructors in courses on computer
software applications. CCI designed these materials to assist students and instructors in making the learning process both effective and
enjoyable.
This training manual is copyrighted and all rights are reserved by CCI Learning Solutions, Inc. No part of this publication may be
reproduced, transmitted, stored in a retrieval system, modified, or translated into any language or computer language, in any form or by
any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without written permission of CCI Learning
Solutions, Canada: 1‐800‐668‐1669.
The information in this courseware is distributed on an “as is” basis, without warranty. While every precaution has been taken in the
preparation of this courseware, neither the author nor CCI Learning Solutions Inc. shall have any liability to any person or entity with
respect to any liability, loss, or damage caused or alleged to be caused directly or indirectly by the instructions contained in this
courseware or by the computer software and hardware products described therein.
CCI Learning Solutions Inc. would like to acknowledge the financial support of the Government of Canada through the Canada Book
Fund for our publishing activities.
CCI Learning Solutions Inc. is independent from Microsoft Corporation, and not affiliated with Microsoft in any manner. While this
publication may be used in assisting individuals to prepare for a Microsoft Business Certification exam, Microsoft, its designated
program administrator, and CCI Learning Solutions Inc. do not warrant that use of this publication will ensure passing a Microsoft
Business Certification exam.
© 2012 CCI Learning Solutions Inc. All rights reserved. ISBN: 978‐1‐55332‐339‐6 Printed in Canada
Working With the Data Files
The exercises in this courseware require you to use the data files provided for the book. Follow the instructions shown to
download the data files for this courseware.
1 Launch your browser and navigate to the CCI Web site location http://www.ccilearning.com/data.
2 Enter: 8369 in the Courseware # box and click .
3 Select the 8369‐1‐student‐data.exe file then click Run. Click Run again in the Internet Explorer – Security Warning
window, if necessary.
4 In the WinZip Self‐Extractor dialog box, use the Browse button to specify the Windows Desktop as the location to
unzip the file and then click Unzip.
5 The 8369 Student Files folder containing the required student work files has now been downloaded to your
desktop. It is recommended that you rename the folder using your own name before starting the exercises in this
courseware. You can reinstall and use the work files as many times as you like.
ii 8369‐1 v1.00 © CCI Learning Solutions Inc.
Table of Contents Preface
What is the Microsoft Technology Associate Certification?
The Microsoft Technology Associate (MTA) certification validates fundamental technology knowledge, allows you to
explore possible career paths, and helps prepare you for advanced studies and certifications. You can choose which
exam(s) you want to take according to which knowledge area(s) you want to validate. Some of the benefits of MTA
Certification include:
Build a foundation for a technology career
Validate fundamental knowledge with an official Microsoft certification
Explore different career paths
Get access to the Microsoft Certified Professional (MCP) online community
Get an edge for college admissions or prepare for internships and entry‐level jobs
Earn a Microsoft certification right in the classroom.*
The currently available Microsoft Technology Associate exams include*:
Software Developer Fundamentals
Windows Developer Fundamentals
Web Developer Fundamentals
Database Administration Fundamentals
Windows Server Administration Fundamentals
Networking Fundamentals
Security Fundamentals
What does the Microsoft Technology Associate Approved Courseware
logo represent?
The logo indicates that this courseware has been approved by Microsoft to cover the course objectives that will be
included in the relevant exam. It also means that after utilizing this courseware, you will be better prepared to pass the
exam required to become a certified Microsoft Technology Associate.
For more information:
To learn more about Microsoft Technology Associate exams, visit
http://www.microsoft.com/learning/en/us/certification/mta.aspx
To learn about other Microsoft approved courseware from CCI Learning Solutions Inc., visit www.ccilearning.com/mta
∗ The availability of Microsoft Technology Associate certification exams varies by Microsoft program, program version and language. MTA exams are only available
at academic institutions that have purchased an MTA Campus License or MTA vouchers. Contact your school administrator to find out if your school is an approved
MTA testing center. Visit www.certiport.com/mta for exam availability.
Microsoft is a trademark or registered trademark of Microsoft Corporation in the United States and/or other countries.
CCI Learning Solutions Inc. is independent from Microsoft Corporation, and not affiliated with Microsoft in any manner. While this publication may be used in
assisting end users to prepare for a Microsoft Technology Associate exam, Microsoft, its designated program administrator, and CCI Learning Solutions Inc. do not
warrant that use of this publication will ensure passing a Microsoft Technology Associate exam.
8369‐1 v1.00 © CCI Learning Solutions Inc. iii
Preface Table of Contents
Table of Contents
About This Courseware
Courseware Description ................................................................................................................................................................. viii
Course Design ................................................................................................................................................................................... ix
Course Objectives ............................................................................................................................................................................. ix
Conventions and Graphics ............................................................................................................................................................... xii
Lesson 1: Introduction to the Operating System
Lesson Objectives ............................................................................................................................................................................. 1
A Matter of Perspective .................................................................................................................................................................... 1
Reviewing the Basics ......................................................................................................................................................................... 2
Hardware, Drivers, OS and Apps ....................................................................................................................................... 2
Hardware Essentials .......................................................................................................................................................... 2
Operating System Essentials ............................................................................................................................................. 4
Windows Operating System Versions and Editions ......................................................................................................................... 7
Sub‐editions ...................................................................................................................................................................... 8
Comparing Edition Features .............................................................................................................................................. 8
Understanding 32‐bit and 64‐bit Operating Systems ........................................................................................................ 9
Understanding Windows Anytime Upgrade ................................................................................................................... 12
Planning for Windows 7 Installation ............................................................................................................................................... 13
System Requirements ..................................................................................................................................................... 13
Using the PC Upgrade Advisor ........................................................................................................................................ 14
Windows Compatibility Center ....................................................................................................................................... 17
Windows 7 Upgrade Versus Clean Install ....................................................................................................................................... 18
Upgrade .......................................................................................................................................................................... 18
Clean Install ..................................................................................................................................................................... 19
Identifying Upgrade Paths ............................................................................................................................................... 19
Application Compatibility ................................................................................................................................................ 20
Deployment Options ....................................................................................................................................................................... 20
Preliminary Concepts ...................................................................................................................................................... 21
Removable Media Installation ........................................................................................................................................ 21
Network‐based Installations ........................................................................................................................................... 23
Introducing Virtualization ............................................................................................................................................................... 24
Hypervisor ....................................................................................................................................................................... 24
XP Mode .......................................................................................................................................................................... 26
MED‐V ............................................................................................................................................................................. 31
Lesson Summary ............................................................................................................................................................................. 35
Review Questions ........................................................................................................................................................................... 36
Lesson 2: Operating System Configuration
Lesson Objectives ........................................................................................................................................................................... 37
Introducing the Desktop ................................................................................................................................................................. 38
What Lies Beneath .......................................................................................................................................................................... 40
Review of File Storage Basics .......................................................................................................................................... 40
Windows Explorer ........................................................................................................................................................... 41
Configuring Desktop Settings .......................................................................................................................................................... 42
Looking at Gadgets .......................................................................................................................................................... 42
Profiles ............................................................................................................................................................................ 44
Changing Display Settings ............................................................................................................................................... 47
Creating Shortcuts .......................................................................................................................................................... 50
Working with Aero .......................................................................................................................................................... 54
Understanding Native Applications and Tools ................................................................................................................................ 60
Snipping Tool .................................................................................................................................................................. 60
Windows Internet Explorer ............................................................................................................................................................. 62
Streamlined Interface ..................................................................................................................................................... 62
Useful Tools and Features ............................................................................................................................................... 63
Security Features ............................................................................................................................................................ 66
iv 8369‐1 v1.00 © CCI Learning Solutions Inc.
Table of Contents Preface
Media in Windows 7 ....................................................................................................................................................................... 69
Windows Media Center (WMC) ...................................................................................................................................... 69
Windows Media Player (WMP) ....................................................................................................................................... 70
Configuring Control Panel Options ................................................................................................................................................. 75
Configuring Administrative Tools .................................................................................................................................... 76
Configuring Accessibility Options .................................................................................................................................... 78
Using the System Configuration Tool .............................................................................................................................................. 82
Understanding Mobility .................................................................................................................................................................. 84
Windows Sync Center ..................................................................................................................................................... 84
Windows Mobility Center ............................................................................................................................................... 89
Lesson Summary ............................................................................................................................................................................. 92
Review Questions ........................................................................................................................................................................... 92
Lesson 3: Managing Users and Applications
Lesson Objectives ........................................................................................................................................................................... 93
Managing Windows ........................................................................................................................................................................ 93
User Accounts ................................................................................................................................................................................. 94
Controlling Access to Resources ..................................................................................................................................... 94
User Account Control (UAC) ............................................................................................................................................ 99
Configuring UAC ............................................................................................................................................................ 100
Installing and Uninstalling Applications ........................................................................................................................................ 102
Local Application Installation ........................................................................................................................................ 102
Network Application Installation .................................................................................................................................. 107
Installation through Group Policy ................................................................................................................................. 108
Understanding Services ................................................................................................................................................................ 108
Startup Types ................................................................................................................................................................ 110
Service Accounts ........................................................................................................................................................... 110
Service Dependencies and Managing Services ............................................................................................................. 111
Managing Remote Systems and Users .......................................................................................................................................... 112
Microsoft Management Console (MMC) ...................................................................................................................... 113
Group Policy .................................................................................................................................................................. 115
Remote Desktop Connection ........................................................................................................................................................ 119
Application Virtualization ............................................................................................................................................................. 127
App‐V ............................................................................................................................................................................ 128
Remote Desktop Services (RDS) .................................................................................................................................... 130
RemoteApp ................................................................................................................................................................... 131
RDS Infrastructure ......................................................................................................................................................... 135
Virtual Desktop Infrastructure ...................................................................................................................................................... 136
What is VDI? .................................................................................................................................................................. 136
Lesson Summary ........................................................................................................................................................................... 138
Review Questions ......................................................................................................................................................................... 139
Lesson 4: Working with File Systems
Lesson Objectives ......................................................................................................................................................................... 141
Understanding File Systems .......................................................................................................................................................... 141
Hard Drive Basics .......................................................................................................................................................... 141
File Systems Supported in Windows 7 .......................................................................................................................... 143
File Allocation Table (FAT) File System .......................................................................................................................... 143
New Technology File System (NTFS) ............................................................................................................................. 144
Formatting Drives ......................................................................................................................................................... 145
Converting the File System ........................................................................................................................................... 146
Viewing Disks, Partitions, Volumes and File Systems .................................................................................................... 146
Setting Up File and Print Sharing .................................................................................................................................................. 150
HomeGroups ................................................................................................................................................................. 151
Setting Up Shares .......................................................................................................................................................... 155
Mapping Drives ............................................................................................................................................................. 161
Understanding Permissions .......................................................................................................................................... 163
Sharing Printers ............................................................................................................................................................. 167
8369‐1 v1.00 © CCI Learning Solutions Inc. v
Preface Table of Contents
Understanding Encryption ............................................................................................................................................................ 171
Encryption Concepts ..................................................................................................................................................... 171
Encrypting File System (EFS) ......................................................................................................................................... 171
BitLocker ....................................................................................................................................................................... 175
Managing Encryption Keys ............................................................................................................................................ 175
Compression ................................................................................................................................................................. 178
Working with Libraries .................................................................................................................................................................. 179
Default Libraries ............................................................................................................................................................ 179
Using Libraries ............................................................................................................................................................... 180
Creating Custom Libraries ............................................................................................................................................. 184
Lesson Summary ........................................................................................................................................................................... 188
Review Questions ......................................................................................................................................................................... 189
Lesson 5: Managing Different Devices
Lesson Objectives ......................................................................................................................................................................... 191
Connecting Devices ....................................................................................................................................................................... 191
Drivers and the Operating System ................................................................................................................................ 191
Communicating with the Processor .............................................................................................................................. 194
Plug‐and‐Play (PnP) ....................................................................................................................................................... 194
Installing Third‐Party Software for Devices ................................................................................................................... 195
Understanding Storage ................................................................................................................................................................. 195
Storage Device Types .................................................................................................................................................... 196
Disk Types ..................................................................................................................................................................... 197
A Few Words about RAID .............................................................................................................................................. 197
Drive Types.................................................................................................................................................................... 198
Storing Items in the Cloud ............................................................................................................................................. 199
Understanding Printing Devices .................................................................................................................................................... 207
Printer Ports .................................................................................................................................................................. 207
Print Drivers .................................................................................................................................................................. 207
Print Spooler ................................................................................................................................................................. 207
Print Queue ................................................................................................................................................................... 208
Using Local versus Network Printers ............................................................................................................................. 210
Devices and Printers Page ............................................................................................................................................. 210
Connecting and Disconnecting Printers ........................................................................................................................ 211
Disconnecting a Printer ................................................................................................................................................. 215
Managing Printers ......................................................................................................................................................... 215
Printing to a File ............................................................................................................................................................ 216
Printing via the Internet ................................................................................................................................................ 217
Understanding System Devices ..................................................................................................................................................... 218
Using Video Devices ...................................................................................................................................................... 218
Using Audio Devices ...................................................................................................................................................... 218
Using Infrared Input Devices ......................................................................................................................................... 219
Using the Windows Device Manager ............................................................................................................................ 219
Lesson Summary ........................................................................................................................................................................... 223
Review Questions ......................................................................................................................................................................... 223
Lesson 6: Maintaining Your System
Lesson Objectives ......................................................................................................................................................................... 225
The Need for Security ................................................................................................................................................................... 225
Identifying Risks ............................................................................................................................................................................ 226
Malware (Malicious Software) ...................................................................................................................................... 226
Other Risks .................................................................................................................................................................... 227
Malware and the Windows Registry ............................................................................................................................................. 230
Mitigating Risks ............................................................................................................................................................................. 231
Firewalls ........................................................................................................................................................................ 231
Antispyware .................................................................................................................................................................. 232
Antivirus Software......................................................................................................................................................... 232
Maintaining a Secure Environment ............................................................................................................................... 233
User Awareness and Education ..................................................................................................................................... 234
vi 8369‐1 v1.00 © CCI Learning Solutions Inc.
Table of Contents Preface
Microsoft Malware Solutions ........................................................................................................................................................ 234
The Action Center ......................................................................................................................................................... 234
Malicious Software Removal Tool ................................................................................................................................. 236
Windows Defender ....................................................................................................................................................... 238
Microsoft Security Essentials ........................................................................................................................................ 241
Microsoft Forefront Endpoint Protection ..................................................................................................................... 243
Windows Backup Methods and Tools ........................................................................................................................................... 246
Backup and Restore Utilities ......................................................................................................................................... 247
System Images .............................................................................................................................................................. 251
System Protection (Restore Points) .............................................................................................................................. 252
Recovery Boot Options ................................................................................................................................................. 257
Understanding Updates ................................................................................................................................................................ 258
Microsoft Update Types ................................................................................................................................................ 259
Installing Application/Operating System Updates as Required .................................................................................... 259
Windows Update .......................................................................................................................................................... 259
Maintenance Tools ....................................................................................................................................................................... 264
Disk Maintenance Tools ................................................................................................................................................ 264
Task Scheduler .............................................................................................................................................................. 269
System Information....................................................................................................................................................... 273
Lesson Summary ........................................................................................................................................................................... 275
Review Questions ......................................................................................................................................................................... 276
Appendices
Appendix A: Courseware Mapping ............................................................................................................................................... A 2
Appendix B: Glossary of Terms ..................................................................................................................................................... A 4
Appendix C: Index ......................................................................................................................................................................... A 6
8369‐1 v1.00 © CCI Learning Solutions Inc. vii
Preface About This Courseware
Course Description
Windows Operating System Fundamentals provides students with fundamental operating system configuration and
administration concepts. Students who complete this course will have reviewed all of the exam objectives and be on
their way to preparing for Microsoft Technology Associate Exam #98‐349. It can also serve as a stepping stone to the
Microsoft Certified Technology Specialist exams.
Course Series
This Windows Operating System Fundamentals courseware is one in the Microsoft Technology Associate Series. Other
courses available in the series include:
Software Development Fundamentals
Database Administration Fundamentals
Networking Fundamentals
Windows Development Fundamentals
Web Development Fundamentals
Security Fundamentals
Windows Server Administration Fundamentals
The Microsoft Technology Associate Series contains exercises that students can use to learn each of the features
discussed. Additional resources to practice and apply the skill sets are available from the CCI Technology Associate
Microsite. Students are encouraged to register at http://mta.ccilearning.com in order access these additional activities
both during and after completing the course.
Instructor Resources are available and are produced specifically to help and assist an instructor in preparing to deliver
the course using the CCI materials. Contact your coordinator or administrator, or call your CCI Account Manager for
information on how to access these resources.
Course Prerequisites
Prior to taking this course, students must possess the following basic computer literacy and Windows skills.
Start and run Windows
Use Minimize, Restore Down/Maximize, or Close
Use the left and right mouse buttons appropriately
Understand file management techniques
Navigate between files, folders, or drives
System Requirements
Supported Architecture
x86 or x64
Single processor, 2 GHz or faster
1 GB RAM or higher
Supported Operating Systems (Note: This course was developed using Windows 7 Professional)
Any version of Windows 7.
The system must have TCP/IP installed and configured as the default networking protocol. If you use a standard
installation of Windows 7, TCP will be properly installed and configured.
Computer Setup:
Computers may be configured as part of a workgroup or as part of a domain.
Each computer should be configured to participate in a LAN within the classroom.
Each computer should be configured as a DHCP client.
Each computer should have Internet access. Internet access is required for completing exercises involving Internet
research.
viii 8369‐1 v1.00 © CCI Learning Solutions Inc.
About This Courseware Preface
Course Design
This course book was developed for instructor‐led training and will assist you during class. Together with comprehensive
instructional text and objectives checklists, this course book provides easy‐to‐follow hands‐on lab exercises and a
glossary of course‐specific terms.
This course book is organized in the following manner:
Tips and Tricks
Tech Notes
Exercises
Graphics
Tips and Tricks
Tech Notes
Lesson Summary
Lesson Review
Appendices
Courseware Mapping
Glossary of Terms
Index
When you return to your home or office, you will find this course book to be a valuable resource for reviewing exercises
and applying the skills you have learned. Each lesson concludes with questions that review the material. Lesson review
questions are provided as a study resource only and in no way guarantee a passing score on a certification exam.
Appendixes in the back of this course book provide additional information, resources, and answers to review questions.
Course Objectives
After completing this course, you will be able to:
Explain the difference between 32‐bit and 64‐bit operating systems.
Describe the Windows 7 operating system editions, including features, availability and minimum requirements.
Identify upgrade paths from various versions of Windows to Windows 7.
Explain the function and characteristics of Windows Anytime Upgrade.
Understand hardware and software compatibility issues and explain why upgrading to Windows 7 requires
planning.
Use the PC Upgrade Advisor.
Use the Windows 7 Compatibility Center to check for software and hardware compatibility issues.
Explain the difference between an in‐place upgrade and a clean install.
Explain different types of installation strategies, including High Touch installation, High Touch with Standard
Image, Lite Touch installation and Zero Touch installation.
Understand media‐based and network‐based installations.
8369‐1 v1.00 © CCI Learning Solutions Inc. ix
Preface About This Courseware
Explain cloud‐based software deployment.
Explain the purpose and advantages of virtualization.
Explain the function and characteristics of Windows XP Mode.
Explain the function and characteristics of MED‐V.
Identify the features and components of the Windows 7 Desktop.
Understand how to navigate a breadcrumb trail.
Identify the features and components of the Windows Explorer window.
Add and configure Desktop gadgets.
Describe and access user profile folders.
Configure display settings, including screen resolution and screen magnification and configure Windows 7 to
support multiple display devices.
Create and modify Desktop shortcuts, create Start menu shortcuts, and add system icons to the Desktop.
Use Aero features for window management.
Modify and apply Aero themes.
Use the Snipping Tool.
Describe the major features of Internet Explorer.
Describe the Windows Media Center.
Describe Windows Media Player.
Configure administrative tools.
Configure accessibility options.
Describe how to use MSCONFIG.
Explain the Windows Sync Center.
Explain the Windows Mobility Center.
Explain administrator and standard user accounts.
Describe the function of the User Account Control feature and describe its prompts and elevation levels.
Describe the process of local, network, and group policy application installation.
Install and remove application software.
Describe the function and characteristics of services, and identify startup types, service accounts and service
dependencies.
Describe the advantages provided by remote management tools.
Explain the Microsoft Management Console (MMC) and create a custom console.
Explain how group policy is useful for remote management.
Describe Windows PowerShell.
Describe the function of Remote Desktop and explain the necessary configuration settings and underlying
technologies.
Explain application virtualization and describe the features and functions of App‐V, Remote Desktop Services, and
RemoteApp.
Explain Virtual Desktop Infrastructure (VDI).
Explain disk partitions and logical drives.
Describe the file systems supported in Windows 7, including FAT32 and NTFS.
Describe how to format a drive and how to convert a drive from FAT32 to NTFS.
Explain the purpose and function of HomeGroups and describe how to create and join them.
Describe public shares, basic shares and advanced shares.
Explain how to map network shares to drive letters.
Describe share permissions, NTFS permissions and effective permissions.
Explain how to share printers.
Explain basic encryption concepts.
Describe the function of Encrypting File System (EFS) and BitLocker, and describe how to manage encryption keys.
Explain disk compression.
Explain the function and characteristics of libraries and describe how to use, customize, create and delete libraries.
Explain the purpose and function of device drivers.
Describe how compatibility issues between drivers and the operating system can affect the system.
x 8369‐1 v1.00 © CCI Learning Solutions Inc.
About This Courseware Preface
Describe how and when to update device drivers.
Explain system resources and resource allocation.
Explain the features and function of Plug‐and‐Play technology.
Explain when to install third‐party software for devices.
Describe storage device interfaces.
Describe the function of RAID.
Describe basic, dynamic and virtual hard disks.
Describe the process of using cloud storage.
Describe printer ports, printer drivers, the Print Spooler, and the Print queue.
Compare and contrast local printers and network printers.
Use the Devices and Printers page.
Explain how to connect and share a local printer.
Explain how to connect to a shared printer.
Explain how to disconnect printers.
Describe how to manage printers.
Explain the purpose and function of the Microsoft XPS Document Writer.
Describe how printing over the Internet works.
Explain video, audio, and infrared devices.
Describe how to use Windows Device Manager.
Identify various types of malware.
Identify security risks other than malware.
Explain how malware affects the Windows Registry.
Explain the use of firewalls.
Describe the function and purpose of anti‐spyware software.
Describe the function and purpose of antivirus software.
Describe how to avoid malware infection.
Understand the function of the Windows Action Center.
Explain and use the Malicious Software Removal Tool.
Describe and use Windows Defender.
Describe the function of Microsoft Security Essentials.
Describe the function of Microsoft Forefront Endpoint Protection.
Explain Windows Backup and Restore.
Describe the function of system images.
Describe the function of restore points.
Describe the function of previous versions.
Explain Advanced Boot Options, including Safe Mode and Last Known Good Configuration.
Describe Microsoft update types.
Explain how to use Windows Updates.
Explain and use Windows system maintenance tools, including Defrag and Disk Cleanup.
Explain how to use the Task Scheduler.
Describe the purpose and function of the System Information tool.
8369‐1 v1.00 © CCI Learning Solutions Inc. xi
Preface About This Courseware
Conventions and Graphics
The following conventions are used in CCI learning materials.
File Names or File names or database field names are indicated in italic font style.
Database Field Names
Exercise Text Content to be entered by the student during an exercise appears in Consolas font.
Procedures Procedures and commands you are instructed to activate are indicated in bold font style.
Features or Command Menu options and features are listed in the left hand column and corresponding descriptions
Options are in the right hand column.
The following graphics are used in CCI learning materials.
MMM Whenever you see this icon, navigate to http://mta.ccilearning.com for More Materials on
Go online for the Microsite. These additional activities include online exercises and additional review. Use
Additional the microsite in class or at home to practice some of the skills you are having trouble
Review and mastering, or to try your skills using different materials.
Activities
Objective This icon indicates the numbered objective from the Microsoft Technology Associate exam being covered
1.2 in this topic. Refer to the Appendix for a complete listing of exam objectives.
This symbol signifies the start of a step‐by‐step exercise
xii 8369‐1 v1.00 © CCI Learning Solutions Inc.
A Matter of Perspective
Regardless of the number of hours you may have logged as a computer user, you should approach this course with the
eyes of an emerging technology professional. At the most basic level, an IT professional is expected to know how to set
up (configure), update and maintain computer systems.
The specific job setting in which you may find yourself will often determine the method and approach you use. For
example, manually configuring and updating one or two systems in a residential office is an easy task. Configuring and
updating over a thousand machines across an enterprise network is a different story, and requires automated or semi‐
automated techniques, many of which may need to be deployed from a remote location.
To adequately prepare for the Microsoft Technology Associate Windows Operating System Fundamentals exam (98‐349),
you should:
Understand the essential tasks required to configure, update and maintain the Windows 7 operating system.
Understand the different challenges inherent in small residential networks, small‐to‐medium sized business
networks, and enterprise‐level networks.
Be aware of the wide variety of tools and techniques that allow administrators in various job settings to perform
essential tasks efficiently.
8369‐1 v1.00 © CCI Learning Solutions Inc. 1
This course will present the essential tasks of operating system configuration and maintenance and provide hands‐on
experience in a localized setting. Enterprise‐level and remote location deployments are beyond the scope of this course.
However, you will also be introduced to various Web sites where you can find detailed information and explicit
instructions on how to perform enterprise‐level deployments.
Hardware Essentials
Most modern computer systems are comprised of a system board and chip set, a central processing unit (CPU), one or
more hard drives, an optical drive and system memory (RAM).
A computer with a processor speed (or clock rate) of 500 MHz is running at 500,000,000 cycles per second. A computer
with a clock rate of 2.8 GHz is running at 2,800,000,000 cycles per second. CPUs need 1 to 4 cycles to execute each
instruction in a program, depending on the complexity of that instruction. Therefore, the general rule of thumb is that
computers with higher processor speeds will execute more instructions in the same time period than those with slower
speeds. This is a very simplistic view of how computer processing power is measured – computer manufacturers and
technology enthusiasts often have lively debates over the complex aspects of this topic, which is beyond the scope of this
course.
Operating systems and applications require a minimum processor speed to run successfully.
2 8369‐1 v1.00 © CCI Learning Solutions Inc.
By the mid‐80s and early 90s, however, the 32‐bit processor was common. Because the
instruction set for a 32‐bit processor is based on an expansion of the original 8086 chip Device drivers, operating
instruction set, the term x86 is commonly used to refer to the 32‐bit class of processors. systems and application
The 32‐bit processor can address up to 4 GB of system memory (although applications are software are written to
generally limited to 3.0 or 3.5 GB with the rest reserved for use by the operating system), conform to specific chip
and has found its way into servers, desktop systems and laptops all over the world. architectures – that is, they
Today, 64‐bit processors are widely available. The term x64 is used to refer to the 64‐bit are designed to take
class of processors. A 64‐bit processor can theoretically support up to 256 TB of physical advantage of the
system memory. However, system boards limit the amount of physical memory that can addressable memory made
be installed, and operating systems often impose limits on how much physical memory available.
can be addressed.
System Memory
Memory, specifically system random access memory (RAM) is the main memory of a computer. It stores data and
programs currently in use. RAM can store large amounts of information, but exists only when power to the computer is
turned on. Once you power off the machine, you lose any information stored in RAM.
Physically, memory consists of chips mounted on small circuit boards that plug into memory banks on the system board.
The more RAM a system contains, the faster its programs run. Considerable amounts of RAM are required for graphics,
media playback and online gaming.
Having sufficient RAM in a system is essential for good performance. In many cases, sluggish performance is the result of
too little RAM rather than inadequate processing power. Operating systems and applications require a minimum amount
of RAM to run as designed. If your system has less than the recommended minimum requirement, the program may not
run, or may perform poorly.
RAM capacity is typically measured in megabytes (MB) and gigabytes (GB). The following table lists standard capacity
measurements:
Measurement Abbreviation Equal to (approximately)… About the same as…
bit A single binary digit
byte Eight bits One character
kilobyte KB 1,024 bytes (a "thousand" bytes) Half a typewritten page
megabyte MB 1,024 KB (a "million" bytes) One 500‐page novel
gigabyte GB 1,024 MB (a "billion" bytes) One thousand 500‐page novels
terabyte TB 1,024 GB (a "trillion" bytes) One million 500‐page novels
8369‐1 v1.00 © CCI Learning Solutions Inc. 3
User Accounts
A Windows user account is a collection of information that controls what files and folders a particular user can access,
and what changes that user can make to the system. Several users can share one physical computer through distinct user
accounts. Each account is accessed through a user name and (optional) password.
The Windows 7 operating system provides three types of user accounts. These are:
Standard A standard user account is sufficient for normal computing. A standard user can generally run
application programs, print, and use the Internet. However, a standard user cannot install or uninstall
software, or make changes that affect other user accounts on the system.
Administrator An administrator account is a user account that allows the user to make changes to the system that will
affect other users. Administrators can change security settings, install and uninstall software and
hardware, and access all files on the system. When Windows 7 is installed on a system, it automatically
creates an administrator account to enable the installation and configuration of programs. The
administrator account can then be used to create other user accounts.
Guest A guest account is also automatically created when Windows 7 is first installed, but it is turned off by
default. The guest account is provided for users who do not have a permanent account on the
computer, but allows them to use the computer without providing access to the personal files of
standard or administrator accounts on the system. Guest accounts provide access to a printer or to the
Internet, for example.
4 8369‐1 v1.00 © CCI Learning Solutions Inc.
A server is a computer in the network that manages network resources and/or provides
information and services to clients on the network. For example, servers are used to run security
Windows 7 and Windows
software that determine who can access the network, and run routing software that directs
Server 2008 R2 are client
which programs and services a particular client system can use. Servers run a specialized server
and server operating
operating system, and are generally more powerful than client systems. For this reason, server
systems based on the same
operating systems support the use of multiple processors and some support server clustering
code. These two operating
(which is the process of combining the computing power of several servers in order to achieve
systems are used together
super‐computing speeds). Servers are expected to remain up and running at all times; in fact,
in corporate networks.
server operating systems require that you enter a reason for powering the system off. Windows
Server 2003, Windows Server 2008, and Windows Server 2008 R2 are examples of server
operating systems.
Peer‐to‐peer Networks
Most home and small office networks consist entirely of client systems. These types of network are called peer‐to‐peer
networks. A peer‐to‐peer network is one in which all the participating computers are more or less equal, and there is no
central server or centralized management of network resources. Each computer connected to a peer‐to‐peer network is
called a host, and hosts act as both clients and servers. When a host is sharing a resource (such as a file, a printer), it is
acting as a server. When a host requests a service or information from another host, it is acting as a client. The following
figure illustrates a peer‐to‐peer network:
Any computer on a peer‐to‐peer network can communicate with any other computer on the network. A Windows 7
HomeGroup (or in previous versions of the Windows operating system, a Microsoft Windows Workgroup) is an example
of a peer‐to‐peer network.
Server‐based Networks
In most business settings, networks are server‐based. A server‐based network is one in which one or more servers
centrally manage the network and control access to its resources. Individual computers and networking devices on a
server‐based network are referred to as nodes. Nodes interact with one another through one or more servers to which
they are all connected. A server‐based network is shown in the following figure:
Domains, Workgroups and HomeGroups
Domains, workgroups and HomeGroups represent different methods for organizing and managing computers and other
resources on a network.
Computers running Windows on a network must be part of either a workgroup or a domain. Computers running
Windows on home networks can also be part of a HomeGroup, but that is not required.
8369‐1 v1.00 © CCI Learning Solutions Inc. 5
Workgroups
A workgroup is a named group of computers on a peer‐to‐peer network. The default workgroup name in Windows 7 is:
WORKGROUP. Additionally,
All the computers in a workgroup are peers.
Each computer in the workgroup has its own set of user accounts. In order to access a particular computer in the
workgroup, you must have an account on that computer.
All computers in the workgroup must be on the same local network.
A workgroup is not protected by a password.
Theoretically, workgroups support up to 20 computers. However, in practical application, 10 systems is about the most
that can be well‐supported.
HomeGroups
Computers on a home network must belong to a workgroup, but they can also belong to a HomeGroup. Computers in a
HomeGroup:
Must explicitly join the HomeGroup by supplying the HomeGroup name and password.
Home Groups are
Can easily share pictures, music, video, documents and printers with other computers in not supported in
the HomeGroup without requiring an account on each computer in the HomeGroup. Windows Server
You will learn more about HomeGroups later in the course. 2008 R2.
Domains
Most corporate networks today are domain‐based or directory‐based networks. A domain is a
logical collection of network resources. The domain is centrally managed by a server designated as the domain
controller. In a domain, there is one master list of users and their corresponding privileges. Domain services were first
introduced in Windows NT networks.
Large‐scale network management today is usually handled through directory‐based networking or directory services. In a
directory‐based network, all network resources (servers, workstations, printers, users, files, etc.) are treated as objects.
Network objects are stored in a hierarchical directory. This directory is copied to directory servers throughout the
network.
In Windows networks, directory services are implemented through Active Directory. A (directory) server running Active
Directory is called a domain controller.
Active Directory was first released with Windows 2000 server, and has been revised and improved through successive
server operating systems. In Windows Server 2008 R2, the domain controller role was renamed Active Directory Domain
Services.
The following are important points to remember about domains:
One or more computers are servers. The servers manage and control the domain and all its resources.
Domain users must specifically log on to the domain by supplying a user name and password.
A domain user can log on to a domain from any computer connected to the network, regardless of whether the user
has a user account on that specific machine.
The users in a domain can be on different local networks.
Domains can support thousands of computers.
6 8369‐1 v1.00 © CCI Learning Solutions Inc.
There are three basic types of licensing options for Windows 7:
Retail You purchase the software from a retailer and bring it home in a box that includes a manual,
holographic discs and a license. A retail product can be activated as many times as necessary as
long as it is not installed on more computers than the license allows at the same time. The first
activation can typically be performed online, while subsequent activations require that you use
the telephone activation service, as you must confirm that you are not activating the product on
a second PC without having removed it from the first one.
Original Equipment The software comes preinstalled on a new PC. OEM licenses are meant to be used only on the PC
Manufacturer (OEM) with which they were originally supplied, and can be activated only on that original PC.
Volume Licensing Available to organizations that require five or more licenses. One product key is used for all the
installations and the software is usually supplied as a download or on Volume Licensing‐branded
discs. Activation for volume licenses can be performed through the use of either a Key
Management Service (KMS) or a Multiple Activation Key (MAK). A KMS runs on a server (called
the KMS host) in an organization’s local network. Individual systems connect to the KMS host for
activation instead of using Microsoft's hosted activation service. A MAK includes a pre‐
determined number of allowed activations per the terms of the volume licensing agreement.
Each time a system activates with Microsoft's hosted activation service, the number of
remaining allowed activations is decremented.
8369‐1 v1.00 © CCI Learning Solutions Inc. 7
Windows 7 Home Home Premium is the lowest edition available for purchase in retail stores in existing
Premium markets. (It is also available as an OEM license.) Home Premium supports a maximum of one
physical single or multi‐core CPU. The 32‐bit version can address up to 4 GB of RAM. The 64‐
bit version can address up to 16 GB of RAM. The full Aero interface is supported in Home
Premium.
Windows 7 Professional Professional includes all the features of Home Premium and is the lowest edition that
provides the ability to join a domain and the ability to operate as a remote desktop server. It
is also the lowest edition that supports two physical single or multi‐core CPUs, supports
backing up to a network location, and supports Windows XP mode. (You will learn about XP
mode later in this lesson.) Professional can be purchased OEM, retail or with volume
licensing. The 32‐bit version can address up to 4 GB of RAM. The 64‐bit version can address
up to 192 GB of RAM.
Windows 7 Ultimate Ultimate edition is available to anyone as an OEM or retail license. Ultimate includes all the
features of Professional and adds enhanced features such as BitLocker and AppLocker (you
will learn about these features later in the course) and support for Multilingual User Interface
(MUI) packages, UNIX applications and booting from a virtual hard disk. Ultimate supports a
maximum of two physical single or multi‐core CPUs. The 32‐bit version can address up to 4
GB of RAM. The 64‐bit version can address up to 192 GB of RAM.
Windows 7 Enterprise Enterprise edition is available only to volume licensing customers. It is essentially the same as
Windows 7 Ultimate, except that it is not available as an OEM or retail license.
Sub‐editions
Sub‐editions are editions of the operating system designed for sale in specific markets. The release of sub‐editions was a
response to legal pressures in certain countries regarding user freedom of choice in selecting and installing media player,
instant messaging and Internet browser software. There is no difference in cost between a "regular" edition and a sub‐
edition. For Windows 7, the following sub‐editions are available:
Windows 7 N (Starter, Home Premium, Professional, Ultimate and Enterprise) – designed for the European market.
This sub‐edition includes the same functionality as Windows 7 but does not include Windows Media Player 12 and
related programs, such as Windows Media Center or Windows DVD Maker. Users must install their own media
player and software to manage and play CDs, DVDs and other digital media. If the user wishes to install Windows
Media Player 12 and its related technologies, the software is available as a free download.
Windows 7 E – also designed for the European market, including the UK. This sub‐edition includes the same
functionality as Windows 7 but does not include Internet Explorer 8 (IE8).
Windows 7 K – designed for the Korean market. This sub‐edition includes the same functionality as Windows 7 and
includes links to a Media Player Center Web site and a Messenger Center Web site which allow users to download
third party media players or instant messaging software.
Windows 7 KN – also designed for the Korean market. This sub‐edition includes the same functionality as Windows
7 K but does not include Windows Media Player and its related technologies, does not include links to download
Windows Live Messenger or links to any third party Media Player or Messenger Center Web sites.
8 8369‐1 v1.00 © CCI Learning Solutions Inc.
8369‐1 v1.00 © CCI Learning Solutions Inc. 9
2. The Start menu displays the winver program at the top of the list. Click winver to open an About Windows dialog
box. Notice that the information indicates the edition, but not the bit level.
10 8369‐1 v1.00 © CCI Learning Solutions Inc.
3. Click OK to close the About Windows dialog box, then click Start, right‐click Computer, then click Properties to
open the System page of the Control Panel. The edition and bit level are indicated on this screen.
4. Close the Control Panel window.
In this exercise, you determined which edition of Windows 7 you are running.
8369‐1 v1.00 © CCI Learning Solutions Inc. 11
If you elect to go online, you are presented with the available upgrades.
12 8369‐1 v1.00 © CCI Learning Solutions Inc.
When you click the Buy button, you are prompted to enter your purchase information and will be provided with an
upgrade key.
System Requirements
You must ensure that a system meets the minimum requirements before installing any application or operating system.
The minimum requirements are determined by the software vendor.
The minimum system requirements to run Windows 7 Starter and Home Basic are:
1 GHz or faster x86 or x64 processor
512 MB RAM
16 GB hard disk space (Starter); 20 GB hard disk space (Home Basic) plus 15 GB free space
DirectX 9 graphics card with WDDM 1.0 and at least 32 MB video RAM
The minimum system requirements to run Windows 7 Home Premium, Professional, Ultimate and Enterprise are:
1 GHz or faster x86 or x64 processor
1 GB RAM (32‐bit); 2 GB RAM (64‐bit)
40 GB hard disk space plus 15 GB free space
DirectX 9 graphics card with WDDM 1.0 or higher and at least 128 MB video RAM
Keep in mind that minimum system requirements are the bare minimum required for the software to run. It is strongly
recommended that a system exceed the minimum requirements to ensure that the software performs well. Most
organizations establish a standard baseline for their systems to ensure uniform performance across the enterprise.
8369‐1 v1.00 © CCI Learning Solutions Inc. 13
A common baseline for Windows 7 is:
2 GHz total processing power (includes multiple cores and/or multiple processors)
2 GB RAM
DirectX 9 graphics card with WDDM 1.0 or higher with at least 512 MB video RAM
80 GB hard drive
Upgrade Advisor can be used on a system running a previous version of Windows to determine whether the system will
readily support Windows 7, or it can be used on a system currently running an edition of Windows 7 to determine if
Anytime Upgrade can be used to upgrade to a higher edition. Upgrade Advisor checks the system and any connected
devices (such as printers, cameras, scanners, etc.) and reports on system readiness to run Windows 7 and lists any
potential compatibility issues with devices, device drivers and installed applications.
The results screen indicates which editions you can use and tells if your system meets the minimum hardware
requirements. For example, the results screen in the following figure indicates that the system will support Windows 7
Home Premium or Ultimate. It also indicates that certain Windows Vista features, such as Windows Mail and Parental
Controls, are not supported in Windows 7.
14 8369‐1 v1.00 © CCI Learning Solutions Inc.
Upgrade Advisor will also list any device drivers or application programs that may have compatibility issues with
Windows 7. Where possible, Upgrade Advisor provides links for finding compatible program versions, compatible
hardware drivers, etc.
8369‐1 v1.00 © CCI Learning Solutions Inc. 15
You need to download and install PC Upgrade Advisor from the Microsoft Web site. Once installed, it can be launched
from the Windows Start menu. Note that you must be logged on with an Administrator account, or provide an
administrator user name and password in order to run Upgrade Advisor.
Note: Throughout this lesson and all subsequent lessons, when the User Account Control agent appears, click Yes
unless directed otherwise.
6. Select I accept the license terms, then click the Install button to begin the installation. When the installation is
complete, click the Close button.
7. Close the Web browser. You can now run the upgrade advisor from the Start menu.
8. Click Start, click All Programs, then click Windows 7 Upgrade Advisor to start the program.
9. As advised in the first screen, be sure to connect and turn on all devices so that the upgrade advisor can check
them, then click the Start check button to proceed. It may take several minutes for the upgrade advisor to run. At
completion, a results screen similar to the one shown below will display.
16 8369‐1 v1.00 © CCI Learning Solutions Inc.
10. Which higher editions (if any) of Windows 7 will your system support?
11. Scroll through the results. Are all your devices compatible? Are all your programs compatible?
12. When you are finished reviewing your results, click the Close button.
In this exercise, you used the PC Upgrade Advisor.
8369‐1 v1.00 © CCI Learning Solutions Inc. 17
By searching for a particular product, you can easily determine whether it will work with Windows 7, if an upgrade might
be required, or if there is no compatible version available.
You can use the site to download device drivers and software updates. The site also provides links to manufacturer Web
sites.
18 8369‐1 v1.00 © CCI Learning Solutions Inc.
Clean Install
When you perform a clean install, you should re‐format the hard drive before installing Windows 7. Thus, the operating
system files are installed fresh, user settings must be configured anew, user files and any programs that were installed on
the system prior to the clean install must be reinstalled and reconfigured. Any user documents that need to be retained
must be copied to back up media before the clean install, and then copied back onto the system after the new operating
system installation is complete.
You must perform a clean install if you want to change the bit‐level of the operating system or if you want to move from
a version of Windows prior to Windows Vista SP1 to Windows 7.
Because all existing settings, files and applications are destroyed when you perform a clean install, you must take steps
to migrate your files, folders and settings (if you want to retain them) to the new installation. This process involves
copying the data you want to retain to backup media and then transferring it to Windows 7 after the clean install has
been performed.
Windows Easy Transfer is a tool designed to facilitate the transfer of data and settings from one operating system to
another, and will work for transferring data between operating systems on the same computer or on different
computers. You can use Windows Easy Transfer to migrate settings, user accounts files, music, pictures, e‐mail, videos,
and Internet favorites.
Additionally, you must ensure that you have access to the installation discs for any applications you want to reinstall on
the new Windows 7 system. Windows Easy Transfer cannot migrate applications. You should also have access to any
required device drivers if they are not available through Windows.
Of course, you can also perform a clean install and elect to discard all previous settings and files.
From Windows XP
To upgrade from Windows XP you can:
Upgrade first to Windows Vista SP1, then upgrade to Windows 7,
Perform a clean install directly to Windows 7 and migrate all existing application program settings using Windows
Easy Transfer, or
Perform a clean install directly to Windows 7 and discard the old settings.
8369‐1 v1.00 © CCI Learning Solutions Inc. 19
Application Compatibility
There are various reasons that applications stop functioning or perform erratically after an operating system upgrade.
These reasons can include:
Applications may include artifacts which use a bit level that is no longer supported.
Applications may rely on features that were supported in previous versions of Windows but are no longer
supported.
Applications may be incompatible with new features in the upgraded operating system. For example, the Windows
User Account Control feature is designed to allow users to perform their work tasks while logged on to the system
as standard users. In previous versions of Windows, many users logged on as Administrators. Older applications may
expect the user to have administrative rights on the system and certain application functions may crash because the
user does not have sufficient rights or privileges.
Identifying Issues
As you have seen, using the Upgrade Advisor and the Compatibility Center can alert the system administrator to
potential application compatibility issues. These tools are well suited for a small computing environment. However,
identifying potential issues across an enterprise can be a different story.
In large enterprises, thousands of machines may be running various versions of application software on hardware
platforms of varying power. Microsoft provides the Application Compatibility Toolkit (ACT) for inventorying applications
and identifying and possibly creating fixes for potential compatibility issues. The toolkit includes:
Application Compatibility Creates modules that can be distributed to client computers to inventory hardware and
Manager (ACM) software and analyzes the collected information.
Standard User Analyzer (SUA) This tool is used to locate specific items in the application that cause a failure so that
these items can be corrected. The fixes that are discovered with this tool are collected
into a shim. A shim is a collection of fixes that are intended to make an application work
on Windows 7. Shims are stored in shim databases.
Compatibility Administrator This tool is used to view and manage shim databases.
Remediating Issues
Some applications that won't work in Windows 7 can be made to work through the use of application shims. Other
applications may need to be upgraded to a version that is compatible with Windows 7.
It may seem an obvious solution that if an application won't function in Windows 7, it should be updated to a newer
compatible version or replaced with another software package that can perform the same tasks. In many cases, this can
be the appropriate solution.
However, consider the cost of upgrading thousands of copies of a software package. Consider also that some applications
are custom‐built for an organization and that upgrades or replacements may not be available. For these situations,
virtualization may offer the best solution. (You will learn about virtualization shortly.)
Deployment Options
Upgrading one or two PCs in a home or very small business make take an hour or two. However, as you increase the
Objective number of systems to be upgraded, the time required to sit at each one and perform a manual installation adds up
2.3 quickly. In large enterprises, the number of systems that require updating may be truly staggering, which makes it highly
impractical for even a large IT staff to perform all the installations "live and in‐person."
For this reason, various tools and methods are available for installing Windows 7. Some are suited for home users and
small businesses, while others are geared for large enterprises which support a substantial infrastructure. These
installation methods and deployment strategies are discussed in the following sections.
20 8369‐1 v1.00 © CCI Learning Solutions Inc.
Preliminary Concepts
Before examining installation methods, you should understand the following concepts about how computers locate and
load operating system software.
Boot disk A removable medium from which a computer can load and run an operating system or utility
program. The process of loading such a program is called "booting." Boot disks are used for several
purposes, including data recovery, hardware and software troubleshooting, and operating system
installation. A boot disk must be created in a specific manner so that it is bootable – that is, you
cannot simply copy operating system files to a DVD or flash drive and use it to boot a system. You
must take specific steps to make the media bootable.
Boot sequence Most computers boot (load the operating system) from the hard drive. However, a computer can
also load an operating system from a CD‐ROM, DVD, or flash drive. The boot sequence determines
the order in which each drive is accessed when the system is looking for the operating system files.
Most systems check the hard drive (usually drive C) first, then they may search optical drives or USB
devices. If a system checks the hard drive before any other drive, and a valid operating system is
installed on the hard drive, then the system will boot from the hard drive regardless of whether
bootable media exists in an optical drive or USB port. If you want to force a system to boot from a
drive other than the hard drive, you can change the boot sequence by adjusting the system BIOS.
Basic Input Output BIOS software is built into a computer and is the first code run by a PC when it is powered on. When
System (BIOS) the computer starts, it performs the power‐on self‐test (POST), which initializes the system and
identifies system devices such as the CPU, RAM, video card, keyboard, mouse, hard drive, optical
drive, etc. The next job of the BIOS is to locate boot loader software which loads the operating
system (boots the computer).
BIOS setup utility Any user can access the BIOS setup utility at startup in order to change the boot sequence, thereby
instructing the computer to search the optical drive first, for example. Because the BIOS is built‐in, it
is accessible before the operating system is loaded. Power the system on, then watch for an
"entering setup" message during the first few seconds of startup. The message indicates the key(s)
you need to press in order to enter the BIOS setup utility.
ISO image A single file that is an "image" of an entire CD, DVD or Blue ray disc. Because an ISO is a complete
image, you can download an ISO file from the Internet, or access it on a network, and then burn the
image to an optical medium. If the ISO is an image of an installation program, such as for Windows
7, you can burn the image to optical media and then use the media as a boot disc.
DVD
For an end user, installing Windows 7 is a matter of inserting the installation DVD and answering the questions presented
during the interactive installation setup procedure. Because the program requires the user to answer questions as the
operating system is being installed, this type of installation is referred to as a "high‐touch" installation (HTI).
Installing from a DVD can take several minutes to over an hour, depending on the speed of your machine. The computer
will reboot automatically when the installation process completes. The following steps describe how to perform a clean
installation of Windows 7 from the installation DVD. (If you prefer to perform an upgrade, select Upgrade in step 6):
1. Insert the Windows 7 disc into the DVD drive and power on the machine.
2. Select the option to boot from the DVD.
3. Specify your regional settings and click Next.
4. Click Install Now to start the installation.
5. Read and accept the license agreement, then click Next.
6. Select Custom to perform a clean install.
8369‐1 v1.00 © CCI Learning Solutions Inc. 21
7. Click Next to allow the installation engine to prepare (format and partition) the hard disk and begin the process
of extracting and copying the installation files.
8. After the system reboots, you will be prompted to enter a user name and a computer name. The user account
created is automatically an Administrator account. The computer name should be unique on the network.
Enter the user name and computer name, then click Next.
9. Enter and confirm a password for the user account. You can optionally specify a password hint. (Note that
although a password is not required, it is strongly recommended that you add a password to each user account
on the machine.)
10. Specify whether you want to configure the system to receive automatic updates from Windows Update. You
can postpone the decision by selecting Ask Me Later. (You will learn more about Windows Update in a later
lesson.)
11. Specify the appropriate data and time zone settings, then click Next.
12. If the system is connected to a network, you will be asked to specify the network type (Home, Work or Public).
When the installation is complete, the Windows 7 Desktop appears.
USB
Installing Windows 7 from a flash drive is faster than installing from DVD, and provides a method for installing to a
Netbook computer (which usually doesn't include an optical drive). To perform a USB‐based installation, you must create
a bootable flash drive and then copy the installation files from the original installation DVD onto the flash drive.
The process requires a USB flash drive with at least 4 GB of space. Note that the procedure will completely erase all data
on the flash drive.
To make a flash drive bootable, you must open a command prompt window as an administrator and launch the Diskpart
utility, which allows you to create and view disk partitions. A command prompt window is a text‐based interface you use
to interact with the operating system. That is, you enter and execute commands in a non‐graphical environment.
To open a command prompt window as an administrator, click Start, then type: cmd in the Search bar. When the
command prompt shortcut appears in the Start menu, right‐click it and then select Run as administrator.
Enter the following commands by typing the command name and pressing ENTER. These steps will launch the Diskpart
utility to make the flash drive bootable:
1. Diskpart (launches the utility)
2. List Disk (the output from this command will show the number assigned to the USB drive on the system)
3. Select Disk x (replace x with the number assigned to the USB drive. This command selects the USB drive.)
4. Clean (removes all information from the USB drive)
5. Create Partition Primary (creates a primary partition on the flash drive)
6. Active (marks the primary partition as active)
7. Format fs=FAT32 quick (formats the flash drive)
8. Assign (prepares the USB drive so that it can be assigned a drive letter when you connect it to a system)
9. Exit (exits the Diskpart utility)
After you have exited the Diskpart utility, click the close button at the upper‐right corner of the command prompt
window to close it.
Use Windows Explorer to drag and drop all the files on the Windows 7 installation CD onto the flash drive. The flash drive
can now be used as installation media.
22 8369‐1 v1.00 © CCI Learning Solutions Inc.
Automated Installations
Because the interactive installation process is time‐consuming and would be impractical for deploying Windows on a
large number of systems, Microsoft provides tools and methods for automating the installation process. Automated
installation strategies use an answer file, which is an Extensible Markup Language (XML) file that provides answers to the
questions asked during installation. The Microsoft Automated Installation Kit (AIK) provides tools for creating answer
files.
High Touch with Standard Image
This strategy involves creating a customized installation image for the new systems. Typically, this customized image
includes settings, device drivers, installed applications, etc. Using a customized image for clean installs allows the IT staff
to deploy systems more quickly. This strategy is recommended for companies with an IT person on staff and an
unmanaged network of between 100 to 200 computers.
Lite Touch Installation (LTI)
Lite touch installation requires that the technician manually boot the system and begin the installation. The answer file
provides the answers to the questions and the installation proceeds unattended. This deployment strategy is
recommended for organizations with a dedicated IT staff and a managed network with between 200 and 500 client
computers.
Zero Touch Installation (ZTI)
Zero touch installation does not require any physical interaction from the technician. The entire process can be started
from a network server. This deployment strategy is recommended for organizations with managed networks of 500 or
more computers, and an IT staff with advanced network management, configuration and deployment skills.
ZTI requires substantial infrastructure – Active Directory Domain Services (AD DS), Microsoft System Center
Configuration Manager (SCCM), and the Microsoft Deployment Toolkit (MDT).
Network‐based Installations
Network‐based installations are performed from network shares or special installation servers running Windows
Deployment Services (WDS).
To perform an installation from a network share, you must install the Microsoft Deployment Toolkit (MDT) which
includes tools for creating the shares, creating answer files and importing and customizing installation images. The MDT
creates a custom Windows Preinstallation Environment (PE) boot disc that can be used to boot a computer and install
the operating system from the network.
The Windows PE is a minimal operating system with limited services that is used to prepare a computer for Windows
installation, to copy disk images from a network server, and to initiate Windows Setup.
8369‐1 v1.00 © CCI Learning Solutions Inc. 23
When WDS is used for network‐based installation, a custom image of the operating system is created and imported into
the WDS server. Client systems are booted and then the custom image is installed. Client systems can be booted
manually using a boot disc, or they can be connected to the network via specialized Preboot Execution Environment
(PXE) –compliant adapters. A PXE‐compliant network adapter allows a client system to boot from a server on the
network.
Introducing Virtualization
In the context of computing, the word virtual refers to the way a particular component or environment appears to a
Objective
user. For example, a virtual machine (VM) is a software implementation of a computing environment that executes
2.4 programs like a physical machine. That is, a VM is a simulated collection of computer hardware that exists and behaves
3.5 like a real (physical) computer. You create a VM using virtualization software.
The machine that runs the virtualization software is the host. Each VM running on the host can run its own guest
operating system and application software. The guest operating system and application software will function exactly as
if they were installed on a physical computer system.
The host machine stores and provide resources to VMs which run on it. Therefore, each VM will have a CPU and RAM to
perform computations, a keyboard and mouse connection, a display driver for the monitor, and a network interface card
(NIC) to connect to the network. You can also specify the size of a (virtual) hard drive, and decide to connect an optical
drive, and USB ports.
Hypervisor MMM
Virtual Machines
The software that runs the virtual machines is called a hypervisor. There are two types of – an Extended
hypervisors: Discussion
bare metal (Type 1), and
hosted (Type 2)
A hosted hypervisor is like any other application software that runs on top of an operating system. Examples of hosted
hypervisors are Microsoft Virtual PC, Microsoft Server, Oracle VirtulBox, and VMware Server. A bare metal hypervisor is
designed to run exactly as the name implies: directly on top of the computer hardware without an operating system in
between. Examples are: Microsoft Hyper‐V Server, VMware ESX, and Citrix XenServer.
24 8369‐1 v1.00 © CCI Learning Solutions Inc.
Guest Operating Guest Operating
App App App App App App App App System System
software software software software software software software software
Host Operating System
Hypervisor Software
Computer Hardware Computer Hardware
Each hypervisor is able to run one or more guest operating systems (e.g., UNIX, Linux, Mac OS X). The only limitation
imposed on the operating system is that it must be compatible with the virtual hardware created by the hypervisor. The
maximum number and type of guest operating systems that can be supported is only limited by the amount of RAM and
the number of CPU cores on the host machine.
The following screenshot shows a hypervisor software called VirtualBox running on top of Windows 7. The VirtualBox is
running four guest operating systems at the same time: two different Windows XP machines, one Windows Server 2003
machine, and one Ubuntu (Linux) machine.
8369‐1 v1.00 © CCI Learning Solutions Inc. 25
Microsoft offers two virtualization products with Windows Server 2008 and Windows 7:
Hyper‐V Runs on Windows Server 2008 and Windows Server 2008 R2 and runs VMs for an enterprise. Hyper‐V
does not run on Windows 7, but can run Windows 7 as a guest operating system within a VM.
Windows Runs VMs on all editions of Windows 7 and is an optional component that can be freely downloaded and
Virtual PC installed. Windows Virtual PC can be used to run properly‐licensed versions of Windows Vista, Windows 7
or Windows XP in a virtual environment. Windows Virtual PC is required to run Windows XP Mode (which
you will read about in the next section.)
XP Mode
New in Windows 7 is a feature called XP Mode, which enables you to create and run a Windows XP virtual machine on
your Windows 7 Desktop. Any application software installed inside a VM functions as though it is installed on a physical
machine, but interacts only with the virtual environment. By installing legacy applications in the Windows XP virtual
machine, you are able to run application software that runs correctly in Windows XP, but is unable to run in Windows 7.
In other words, Windows XP Mode is used to allow applications that will not run on Windows 7 natively to run in a VM
on your Windows 7 computer. When an application runs in Windows XP Mode, you see the application windows on your
local Windows 7 Desktop as if it were running locally, but it is actually running in a background Windows XP VM.
The following screenshot shows the Windows XP Mode running on the Windows 7 Desktop:
Once running in XP Mode, your application software will have access to all peripherals on the computer. For example,
when you install your software in XP Mode, you can insert the installation DVD in your real computer’s DVD drive, and
the Virtual PC software will be able to connect to it. Similarly, you can access USB ports and send output to printers that
are actually connected to the underlying physical computer. The Virtual PC performs all of the work of creating and
maintaining these connections between XP Mode and the physical computer.
26 8369‐1 v1.00 © CCI Learning Solutions Inc.
App App
software software
Win XP Virtual Machine
Computer Hardware (Virtual PC)
H
Windows 7
Computer Hardware
Keep in mind that you will most likely need a separate software license for any application you install in XP Mode. From a
licensing point of view, a VM is a computer separate from (even though it is running on) your physical computer. For
example, you will need two licenses of MS Word if it is already installed in Windows 7, and you want another copy in XP
Mode.
Software applications installed in XP Mode will appear under the Windows XP Mode Applications folder in the Start, All
Programs menu. This arrangement makes it easier for users to see what applications are available on both their physical
Windows 7 system and their Windows XP Mode virtual machine.
Installation and Requirements
Windows XP Mode is a special version of the Windows XP Professional (SP3) operating system designed specifically to
run on Windows 7 as a guest operating system. Windows Virtual PC must be installed on the Windows 7 system in order
for Windows XP Mode to run.
Note that while Windows Virtual PC will run on all editions of Windows 7, XP Mode is supported only in the Professional,
Ultimate and Enterprise editions. (You can, however, install Windows Virtual PC on a lower edition of Windows 7 and
then install a purchased, licensed copy of Windows XP or any other operating system and run it as a guest operating
system in a VM.)
Windows XP Mode is an optional component of Windows 7 and is available for download free of charge at
http://www.microsoft.com/windows/virtual‐pc/default.aspx. No license is required to run Windows XP Mode.
It is possible run Windows XP Mode on a computer with as little as 1 GB of RAM. However, for optimal performance the
system should have at least a 4 core CPU, 4 GB RAM, and a 7200 rpm hard drive or SSD. Using an under‐powered system
as the host can cause application software to perform slowly or inconsistently because of the extra processing power
required to run the VM itself.
8369‐1 v1.00 © CCI Learning Solutions Inc. 27
7. When prompted to run, save or cancel the executable file, click Run to start the Windows XP Mode setup wizard.
8. Click Next twice, then click Finish.
9. On the Windows Virtual PC Web page, locate Step 3 Windows Virtual PC, then click the blue Download button
below Windows Virtual PC and click Open to begin downloading and installing the application.
28 8369‐1 v1.00 © CCI Learning Solutions Inc.
10. When prompted to install the software update, click Yes.
11. Click I Accept to accept the license agreement and install the update.
12. When the installation is complete, click Restart Now to restart the computer.
13. Log back onto the system using an Administrator account.
14. Click Start, click All Programs, then click Windows Virtual PC to make sure that Windows XP Mode displays in the
Start menu.
15. In the open Start menu, click Windows XP Mode to begin configuring XP Mode. You will need to configure XP Mode
to ensure it functions properly.
16. Accept the license terms and click Next to view the Installation folder and credentials screen. By default, the user
name is set to XPMUser.
17. Specify and confirm a password. If you leave the Remember credentials (Recommended) option selected, you will
not need to enter the password when you use XP Mode. Click Next.
8369‐1 v1.00 © CCI Learning Solutions Inc. 29
18. Select Help protect my computer by turning on Automatic Updates now. (recommended). Windows XP Mode
relies on the Windows Update service to obtain updates for Windows XP with SP3. To ensure that Windows XP with
SP3 receives updates, both the host computer and the virtual machine must be connected to the Internet—and the
Windows Update service must be configured in the virtual machine that runs Windows XP Mode. Click Next.
19. Next you must share the drives on the physical computer with Windows XP Mode.
20. Click Start Setup, then wait while Windows sets up XP Mode on your system. This process can take several minutes.
When setup is complete, Windows XP Mode will appear as a window on your Windows 7 Desktop.
30 8369‐1 v1.00 © CCI Learning Solutions Inc.
MMM
Installing apps
and using XP
Mode
21. Click the close button in the upper‐right corner of the Windows XP Mode window to put XP Mode into hibernation.
In this exercise, you installed and set up Windows XP Mode.
MED‐V
Microsoft Enterprise Desktop Virtualization (MED‐V) is essentially an enterprise‐wide version of the XP Mode in
Objective
Windows 7. It is packaged together with other products as part of the Microsoft Desktop Optimization Pack (MDOP).
3.5
Like Windows XP Mode, MED‐V allows enterprise users to continue using applications that were designed to run in
(32‐bit) Windows XP, but are incompatible with Windows 7 to some degree or another. MED‐V eliminates conflicts and
allows older applications to run well on Windows 7.
MED‐V is designed for enterprises; it allows you to use a centralized system management tool to create, configure, and
deploy virtual Windows machines (called workspaces) to end user computers. This is a tremendous advantage over using
XP Mode, as it would be very time‐consuming to manually install and configure XP Mode on every user's computer.
A typical large enterprise may include thousands of users. To help organize and manage all those users, it makes sense to
define groups of users who have common needs and use a common group of applications. For example, all users in the
Accounts Payable department likely need access to several treasury and payment applications, and it therefore makes
sense to create an Accounts Payable users group.
In MED‐V, you create an image of a virtual machine (VM) and upload it using the Microsoft Enterprise Desktop
Virtualization (MED‐V) Management Console. You can think of an image as a template or a master copy; when a user is
set up to use MED‐V, the central server will create a new workspace by copying the image down to the user’s local
computer. All Accounts Payable users would then have an A/P workspace on their computer – that is, a copy of the A/P
MED‐V image. Sales users, on the other hand, would have their own Sales workspace.
8369‐1 v1.00 © CCI Learning Solutions Inc. 31
Each image is further configured to identify which users are permitted to access this image. This setting is known as a
usage policy, and is stored in Active Directory. This will ensure that the Sales users cannot download the A/P image onto
their computers, for example.
32 8369‐1 v1.00 © CCI Learning Solutions Inc.
The MED‐V image is then configured to run selected applications, as shown in the following screen capture.
When a user is set up to access his or her MED‐V workspace, the image is downloaded to his or her local machine as
shown in the following screen captures.
Once installed, MED‐V applications will simply appear in the Start‐All Programs list, under the MED‐V Applications
folder. These applications can also be configured as individual shortcuts appearing at the top of the All Programs list.
8369‐1 v1.00 © CCI Learning Solutions Inc. 33
When the MED‐V administered software starts up, a border will appear around the application window to indicate that it
is running under MED‐V. Other than that indicator, a user cannot easily detect that the software is running in a virtual
machine.
Microsoft has pursued seamless integration in other ways to make MED‐V easy to use. For example, printers will appear
in the application as if they were installed on the local machine. Similarly, the local My Document folders and USB drives
will also appear when users open and save data files. To access or save data files located in other locations such as on
networked drives, the user must use the File Transfer tool to move files to and from the virtual PC workspace.
34 8369‐1 v1.00 © CCI Learning Solutions Inc.
Specific URLs (e.g., finance.companyname.com) can also be reserved to automatically run under MED‐V instead of the
default web browser installed on the user’s computer. This capability is very useful because many software vendors offer
a web front‐end for their applications. Like WinXP applications, these web pages may be incompatible with the newer
version of Internet Explorer.
For example, suppose you open the current version of Internet Explorer in your Windows 7 machine and enter the
address of the website for your corporate finance system. MED‐V can be configured to intercept this address, start up an
older version of Internet Explorer and load the finance system for you in a separate window. Again, this seamless
integration relieves you from having to remember which websites must run on older web browsers.
One of the Microsoft websites offers a hands‐on demonstration (called virtual labs) of setting up, managing, and using
MED‐V. Go to http://technet.microsoft.com/en‐us/virtuallabs/ and click the Windows 7 link.
Lesson Summary
In this lesson, you learned how to plan for an operating system upgrade, about the various Windows 7 editions and
installation options and about how virtualization can support legacy applications in Windows 7. You are now able to:
Explain the difference between 32‐bit and a 64‐bit operating systems.
Describe the Windows 7 operating system editions, including features, availability and minimum requirements.
Identify upgrade paths from various versions of Windows to Windows 7.
Explain the function and characteristics of Windows Anytime Upgrade.
Understand hardware and software compatibility issues and explain why upgrading to Windows 7 requires planning.
Use the PC Upgrade Advisor.
Use the Windows 7 Compatibility Center to check for software and hardware compatibility issues.
Explain the difference between an in‐place upgrade and a clean install.
Explain different types of installation strategies, including High Touch installation, High Touch with Standard Image,
Lite Touch installation and Zero Touch installation.
Understand media‐based and network‐based installations.
Explain cloud‐based software deployment.
Explain the purpose and advantages of virtualization. MMM
Go online for
Explain the function and characteristics of Windows XP Mode.
Additional
Explain the function and characteristics of MED‐V. Review and Case
Scenarios
8369‐1 v1.00 © CCI Learning Solutions Inc. 35
Review Questions
1. In order to make changes to a system that will affect other users, you must be logged on with a(n):
a. power account c. administrator account
b. standard user account d. guest account
2. Windows XP mode is supported in which Windows 7 edition(s)?
a. Starter, Home Premium and Enterprise c. Enterprise only
b. Professional, Ultimate and Enterprise d. Professional only
3. What is the amount of RAM required to run Windows 7 Home Premium 64‐bit?
a. 1.0 GB c. 3.5 GB
b. 2.0 GB d. 4.0 GB
4. The software that runs the virtual machines on a server is called:
a. hypervisor software c. ISO software
b. Remote Desktop software d. cloud deployment software
5. Which of the following Windows 7 installation strategies requires substantial network infrastructure, Active Directory
Domain Services, and Microsoft System Center Configuration Manager (SCCM)?
a. High Touch Installation c. Lite Touch Installation
b. High Touch with Standard Image d. Zero Touch Installation
36 8369‐1 v1.00 © CCI Learning Solutions Inc.
8369‐1 v1.00 © CCI Learning Solutions Inc. 37
Introducing the Desktop
In this lesson, you will learn how to configure Windows 7 to enable users to work productively and comfortably. You will
begin by examining the Windows 7 Desktop.
The Windows 7 Desktop is the main interface for the end user. It includes a Start menu, Desktop icons, shortcuts and
gadgets. The Desktop is also the place where applications run.
Gadgets
38 8369‐1 v1.00 © CCI Learning Solutions Inc.
Taskbar The Taskbar is the long horizontal bar at the bottom of the screen. It includes three main sections: the
Start button, the middle section (which displays the taskbar buttons for open programs and files), and
the notification area (which includes a clock and icons that communicate the status of certain programs
and computer settings).
Taskbar When you open a program, folder or file Windows creates a corresponding button on the Taskbar. The
buttons button shows an icon that represents the open program. When several files for applications are open,
the highlighted button on the taskbar indicates the file or application that is currently active. If several
files are open within the same program (for example, if you have three open Word documents), you can
point to the taskbar button to switch to another open application, click its taskbar button to see a
thumbnail preview of its open documents, and then click the thumbnail of the document you want to
make active. (Note: The thumbnail preview is available only if your computer supports the Aero
interface and if you are using Windows 7 theme.) You can rearrange taskbar icons by dragging them. You
can also pin your frequently‐used programs to the Taskbar for easy access.
Notification The notification area is at the far right end of the Taskbar. It includes a clock and icons that
area communicate the status of certain programs and computer settings. For example, the network status
and volume control icons display here. When you point to an icon, its name or the status of its setting
will appear. You can double‐click an icon to open the program or setting associated with it. Occasionally,
an icon will display information in a pop‐up window (called a notification) to inform you of something.
For example, a notification will display when you connect a USB device, or when Windows has installed
updates. You can manually close the notification, or wait for it to fade from view. Windows hides icons
in the notification area when you have not used them in a while. You can click the Show Hidden Icons
button to temporarily display the hidden icons.
Show Desktop The Show desktop button is a rectangular bar at the far right end of the taskbar. It provides quick access
button to an uncluttered Desktop. You can point to it to make all open windows transparent, so you can see the
Desktop for a moment. Or you can click it to instantly minimize all open windows on the Desktop. You
can restore all the windows to their previous state by clicking it again.
Desktop The Desktop workspace is the empty area on the Desktop on which you can place icons, shortcuts and
workspace gadgets. You can also customize this area with Wallpaper.
Shortcuts Desktop shortcuts are links to applications, folders or documents the user can access quickly. Often
when you install a program, you are asked whether the installer should create a Desktop shortcut.
Desktop shortcuts include a blue arrow in the lower‐left corner. You can manually create Desktop
shortcuts to folders and files.
Gadgets Gadgets are mini programs that provide information and easy access to frequently used tools. Calendar,
Clock, CPU Meter, Currency, Feed Headlines, Picture Puzzle and Slide Show are the gadgets that come
with Windows 7, and you can find more online. In Windows Vista, gadgets were lined to a sidebar and
could not be placed anywhere on the Desktop. In Windows 7 gadgets are managed by an application
named Sidebar, but can be placed anywhere on the Desktop.
Application Applications run on the Windows Desktop in their own windows. At any given time an application can be
window in one of three states: minimized, maximized or restored. When an application window is maximized, it
completely covers the Desktop and only the Taskbar remains visible. When an application is minimized,
it is no longer visible on the Desktop, but you can access it quickly by clicking its button in the Taskbar.
When an application window is restored, it is constrained to a size that does not completely cover the
Desktop. The application window shown in the preceding figure is in a restored state. Nonstandard
applications, such as full‐screen games or videos, may completely cover the Desktop and the Taskbar.
Recycle Bin The Recycle Bin exists on each internal hard drive in the computer and is a hidden folder into which
deleted files are copied, allowing you to restore them at a later time if you decide you want to keep
them. The Recycle Bin is a system component and is the only icon automatically placed on the Desktop
after installing Windows 7 (unless you customize the installation process with an answer file). A Desktop
icon appears different than a shortcut; it does not include a blue arrow.
8369‐1 v1.00 © CCI Learning Solutions Inc. 39
What Lies Beneath
While users interact primarily with the Desktop, it is important to understand that the Desktop is an interface. It provides
a single location from which a user can launch programs or open files regardless of where they are physically stored on
the hard drive.
The image used to illustrate the file path includes other folders. There are numerous folders and subfolders on a
Windows 7 system, and you can use Windows Explorer to see how they are laid out.
40 8369‐1 v1.00 © CCI Learning Solutions Inc.
Breadcrumbs
A navigation aid used in Windows Vista and Windows 7 is the breadcrumb trail. It represents the hierarchy of folders and
each part of the trail is an active control. The backslashes of the conventional file path are replaced by arrowheads that
provide access to any lower branch of the directory tree. The following figure is the breadcrumb trail for the
(conventional) file path C:\Users\Student2\My Documents\.
Windows Explorer
Windows Explorer is the tool to use to navigate the directory structure of any disk or drive. It is also the file and folder
management system for Windows. You should already be familiar with Windows Explorer; however the following
diagram reviews the terminology for referring to particular parts of the window.
The following figure shows the main panes of the Windows Explorer interface.
Title bar Address bar Breadcrumb trail Toolbar Search box Help
8369‐1 v1.00 © CCI Learning Solutions Inc. 41
Help Access Windows Help and Support options.
Navigation pane You can click icons and folders in this pane to navigate the entire directory structure of the computer.
Details pane Displays detailed information about the icon(s) or file selected in the Contents pane.
Contents pane Displays the contents of the current folder.
Preview pane When you select a file in the Contents pane, the Preview pane displays a preview of the file's
contents when possible. If it cannot display a preview, it displays the text No preview available.
You will use Windows Explorer periodically throughout the course.
Looking at Gadgets
Gadgets are mini programs that run on the Desktop instead of in an application window. Generally, they display
information or perform a simple function. For example, a gadget can display the current date, while another can convert
one currency into another.
Eight gadgets are installed in Windows 7 by default. These are: Calendar, Clock, CPU Meter, Currency, Feed Headlines,
Picture Puzzle, Slide Show, and Weather. To view the installed gadgets, right‐click a blank area of the Desktop, then click
Gadgets to open the Gadget Gallery.
Double‐click a gadget in the Gadget Gallery to add it to the Desktop.
You can easily install additional gadgets from the Microsoft Desktop Gadgets Web site. Click the Get more gadgets online
link to access the Web site.
Most gadgets include configurable settings. You can right‐click a gadget and then select Options from the shortcut menu.
If Options is not available, then the gadget does not include configurable options. All gadgets include universal settings,
such as the Always on Top setting and an Opacity (controls transparency) setting. Most gadgets can also be sized, and all
of them can be repositioned anywhere on the Desktop.
42 8369‐1 v1.00 © CCI Learning Solutions Inc.
Gadgets also include buttons which allow you to configure their appearance. You can point to a gadget to display its
buttons. Gadget buttons can include a close button (which looks like an "x"; clicking it removes the gadget from the
Desktop), a sizing button (which looks like an arrow; clicking it can increase or reduce the size of the gadget), an options
button (which looks like a wrench; clicking it opens the Options menu), and a drag button (which looks like a grid; you
can drag the gadget by its drag button).
15. To remove a gadget from the Desktop, click its close button. On the Desktop, point to the World Clock gadget, then
click its close button to remove it from the Desktop.
8369‐1 v1.00 © CCI Learning Solutions Inc. 43
16. To remove a gadget from the gallery, uninstall it. In the Gadget gallery, right‐click the World Clock gadget, then
select Uninstall. Click the Uninstall button to confirm your selection and remove the gadget from the gallery.
17. On the Desktop, right‐click the Clock gadget, then select Close gadget to remove it from the Desktop.
18. In the Gadget gallery, double‐click Slide Show to add the slide show gadget to the Desktop, then close the Gadget
gallery.
19. Enlarge the slide show gadget, then point to it and click on the Next button several times. The gadget should show
a series of images; such as the eight default images in your Sample Pictures folder.
20. Remove the slide show gadget from the Desktop.
21. Consider how gadgets may be used and for what purposes. Which of the available gadgets on the Web site might
be suitable for your business? Are there gadgets you might like to add to your home computer? Do you think office
workers should be allowed to add gadgets to their office machines without restriction?
In this exercise, you worked with Desktop gadgets.
Profiles
A user profile is a collection of settings that make the computer look and function in a particular manner. It is comprised
of various Windows configuration settings for a specific user, including settings for Desktop background, screen saver,
pointer preferences, network and printer connections, and mail settings. Whenever a user logs onto a machine, the
settings in the associated user profile are loaded and affect what is displayed on the Windows Desktop and start menu.
A user profile is different from a user account. A user account is required to log on to Windows, and the settings
associated with the user account control the user's rights on the system, such as which files and folders the user can
access and what changes the user can make to the system. A user profile is part of a user account. (You will learn
about user accounts in detail in a later lesson.)
Windows creates three specific profile types on the local machine:
Public profile Contains universal icons and items that should be available to all users. When you install an application
and the installation wizard asks if you want to install the program for all users or only the current user,
your answer determines which profile is updated. If you elect to make the program available to all users,
the application settings and shortcuts are placed in the Public profile. Any shortcuts or files added to the
Public profile are available to all user profiles on the machine – both existing ones and ones that will be
created in the future.
User profile Contains settings that are specific to an individual user. The user's preferences for window color,
wallpaper, Desktop theme, screen magnification, etc., are saved to that user's profile. Documents that
are placed on the Desktop are actually stored in a subfolder of the user's profile folder. When a user logs
on to Windows, the condition and behavior of the Desktop are determined by settings in both the user's
profile and the Public profile.
Default profile The profile used by Windows as the boilerplate or template for creating new user profiles. If an
enterprise elects to design and implement a standardized user profile, the system administrator can edit
the default profile so that each new user profile will automatically include the standardized elements.
This is accomplished with an answer file and customized system image.
In Windows 7, user profiles are stored in the Users folder on the root of the system drive – typically drive C. The Users
folder contains a single folder for each user profile. Each folder is named after the user. The Users folder also includes a
folder for the Public profile and a folder for the Default profile. You can view the folders in Windows Explorer.
44 8369‐1 v1.00 © CCI Learning Solutions Inc.
The Default folder is a hidden folder. To view hidden folders and files, you must specifically configure Windows Explorer
to display them. You will learn how in the following exercise.
6. In the Contents pane double‐click My Pictures to view the contents of the folder. Notice that the folder is empty.
7. In the address bar at the top of the Windows Explorer window, click Users in the breadcrumb trail to move back up
through the directory structure.
8. In the Contents pane, double‐click Public to access the public profile folder. Notice that the folders are similar to,
but not exactly the same as, the ones in your personal profile.
8369‐1 v1.00 © CCI Learning Solutions Inc. 45
9. In the Contents pane, double‐click Public Pictures, then double‐click Sample Pictures to view the image files that
are available to all user profiles on the system. Notice that these are the eight image files that were displayed by
the slide show gadget when you added it to your Desktop. Even though these image files are not saved in your user
profile, programs running under your profile can access them because they are part of the Public profile.
10. In the address bar at the top of the Windows Explorer window, click Users in the breadcrumb trail to move back up
through the directory structure.
11. In the Windows Explorer toolbar, click Organize, then click Folder and search options to open the Folder Options
dialog box.
12. In the Folder Options dialog box, click the View tab, then under Hidden files and folders, select Show hidden files,
folders, and drives.
13. In the Folder Options dialog box, click Apply, then click OK to apply the new settings. The previously hidden Default
folder is now visible.
14. In the Contents pane, double‐click Default to view the subfolders. Do not change any of the files in the Default
folder.
15. Close the Windows Explorer window.
In this exercise, you viewed various user profile folders.
46 8369‐1 v1.00 © CCI Learning Solutions Inc.
When you change the screen resolution, it affects all users who log on to the system.
8369‐1 v1.00 © CCI Learning Solutions Inc. 47
Adjusting Screen Magnification
It is also possible to adjust the size of text and other items on the screen without changing the screen resolution setting.
There are three possible screen magnification settings – Smaller (100%), Medium (125%), and Larger (150%).
You can adjust magnification settings in the Display dialog box.
In addition to configuring the screen magnification, you can use the Magnifier tool to enlarge different parts of the
screen. The Magnifier tool will be discussed in the accessibility options section later in this lesson.
48 8369‐1 v1.00 © CCI Learning Solutions Inc.
When you connect an external monitor or projector to a laptop, the same image of the Desktop appears on the external
monitor by default. Before you can drag a window from the laptop screen to the external monitor, you must configure
the external monitor as an extended display. In the Screen Resolution dialog box, display the Multiple displays drop‐
down list and select Extend these displays.
When you connect a second monitor to a Desktop PC, the display is set to "extended" by default and you should be able
to drag a window from one screen to another without changing any settings.
4. Click Revert to abandon the changes. Some of the icons on your Desktop may have moved to a different position as
a result of your temporarily making the Desktop smaller. Also, any open application windows may now be smaller
for the same reason.
5. If necessary, change the Resolution back to the original resolution (it should be the one marked recommended).
6. In the Screen Resolution dialog box, click the Make text and other items larger or smaller link to open the Display
dialog box.
7. Select an option that is not currently selected. An alert that some items may not fit on the screen may appear in the
dialog box.
8. Click Apply to keep the new setting. Note that you must log off the computer in order to apply the changes. Unlike
screen resolution settings, screen magnification settings are specific to individual user profiles.
9. Click Log off now.
10. Log back on and notice the change in appearance.
11. Change the magnification back to its previous setting, log off and log back on.
In this exercise, you adjusted display settings.
8369‐1 v1.00 © CCI Learning Solutions Inc. 49
Creating Shortcuts
A shortcut points to an executable file (i.e. a program), a document or a folder, and makes it possible to locate and open
a file or launch a program with a single click. Without shortcuts, you would be required to browse through the files on
the hard drive and locate the one you want each time you want to use it.
Shortcuts save time and allow users and support staff to work more efficiently. You can create shortcuts to programs,
files or resources. For example, you can create a shortcut to a network printer that would allow you to view the current
print queue or printer properties.
The shortcut itself is a small file that includes information on where the application, file or resource is located. You can
configure properties that affect the appearance of the shortcut (such as its name or icon). You can also configure settings
that are passed as parameters to the application being opened. For example, you can control the state of the window. In
some cases, you can specify colors and other settings for the application itself.
50 8369‐1 v1.00 © CCI Learning Solutions Inc.
14. Click OK to apply the new setting. The shortcut is now configured to open the file using WordPad.
15. Click OK to close the Shortcut Properties dialog box.
16. On the Desktop, double‐click the Treasure shortcut. This time the file opens in WordPad.
17. Close the WordPad window.
Next, you will create and modify a Desktop shortcut to the Notepad application.
18. Click the Start button, point to All Programs, click Accessories, locate the Notepad application, right‐click Notepad,
point to Send to, then click Desktop (create shortcut) to create a shortcut on the Desktop.
19. Click anywhere outside the Start menu to close the menu and view the newly created shortcut icon.
20. Double‐click Notepad on the Desktop to test the shortcut, then close the program.
21. On the Desktop, right‐click Notepad and browse the options in the shortcut menu. Notice that you can pin the
shortcut to the Taskbar and/or to the Start Menu.
22. In the shortcut menu, click Properties to open the Notepad Properties dialog box. You can use the dialog box to
configure how the shortcut will appear and behave. The available options depend on the application. The contents
of the Target box show the path to the Notepad application.
8369‐1 v1.00 © CCI Learning Solutions Inc. 51
23. Display the Run drop‐down list. You can configure the shortcut to open the application in a normal (restored)
window, a minimized window (i.e., a button on the Taskbar), or a maximized window. Select Minimized, then click
OK.
24. On the Desktop, double‐click Notepad to open the application in a minimized state.
25. Click the Notepad icon in the Taskbar to restore the window.
26. Close the Notepad application.
27. On the Desktop, right‐click Notepad, select Rename, type: Text Editor and press ENTER to rename the shortcut.
Next, you will create a Desktop shortcut to the Command Prompt application, and set parameters that control the
application's appearance.
28. Click the Start button, point to All Programs, click Accessories, locate Command Prompt, right‐click Command
Prompt, point to Send to, then click Desktop (create shortcut) to create a shortcut on the Desktop.
29. Click anywhere outside the Start menu to close it.
30. On the Desktop, right‐click Command Prompt, then click Properties. Notice that the Properties dialog box for the
command prompt shortcut contains more tabs that the one for Notepad.
31. Click the Layout tab, then in the Window size area, change the Width setting to 100 and the Height setting to 45.
32. Click the Colors tab. Ensure that Screen background is selected, then click the navy blue square to set the screen
background to blue.
33. Click OK to save the changes, then double‐click the Command Prompt shortcut to open a blue command prompt
window.
34. Close the Command Prompt window.
You can also add administrator requirements to a shortcut; that is, you can require that only an administrator or a user
who can supply administrative credentials can use the shortcut.
52 8369‐1 v1.00 © CCI Learning Solutions Inc.
35. Right‐click the Command Prompt shortcut, then select Run as administrator. Notice that the User Control Agent
asks for confirmation that you want to allow the program to make changes to the computer. (If you were logged on
as a standard user, you would be prompted to supply the user name and password of an administrator account.)
36. Click No.
37. Display the properties for the Command Prompt shortcut, click the Shortcut tab if necessary, then click the
Advanced button, to open the Advanced Properties dialog box.
38. Select Run as administrator, then click OK.
39. Click OK once more.
40. On the Desktop, double‐click the Command Prompt shortcut. This time the User Account Control agent appears
because the shortcut automatically specifies to run the program as an Administrator.
41. Enter the password for the administrator account if necessary and click Yes to open the command prompt window.
Notice that Administrator: Command Prompt displays in the title bar.
42. Close the Command Prompt window.
43. On the Desktop, right‐click the Text Editor shortcut, select Delete, then click Yes.
44. On the Desktop, click the Command Prompt shortcut, press the DELETE key, then click Yes.
45. Delete the Treasure shortcut.
Finally, you will create a Start menu shortcut.
46. Click the Start button, point to All Programs, click Accessories, locate Paint, right‐click Paint, then click Pin to Start
Menu.
47. Click anywhere outside the Start menu to close it.
48. Click the Start button. Notice that Paint now appears at the top of the Start menu.
49. In the Start menu, click Paint to open the application.
50. Close the Paint window.
In this exercise, you worked with shortcuts.
8369‐1 v1.00 © CCI Learning Solutions Inc. 53
To add or remove system icons to the Desktop:
1. Right‐click an open area of the Desktop, then click
Personalize.
2. Click the Change Desktop Icons link in the left panel to
open the Desktop Icon Settings dialog box.
3. In the dialog box, select or clear the check boxes as
appropriate to indicate which icons you want to display on
the Desktop, then click OK.
After adding the icons to the Desktop, you can quickly access
them to browse files, manage the Recycle Bin, or access
Control Panel. You can also use them for quick access to
administrative tools. For example, you can right‐click the
Computer icon on the Desktop and select Properties to view
the Control Panel System page.
Aero Shake If you have several windows open, you can click the title bar of one window and then jiggle the
mouse back and forth to minimize all other windows. Perform the action again, and the other
windows return to their previous states.
54 8369‐1 v1.00 © CCI Learning Solutions Inc.
Flip 3D Allows you to arrange your open windows in the 3‐dimensional stack that you can quickly flip
through without having to click the Taskbar. Press and hold WINDOWS+TAB to flip through the open
windows in a continuous motion, or press and hold WINDOWS then press TAB once to open the view,
then press TAB to advance through the windows one window at a time.
8369‐1 v1.00 © CCI Learning Solutions Inc. 55
Taskbar Previews Allows you to see thumbnail previews of the windows. Thumbnails show running video, you can
play and pause video and songs in a thumbnail, and close the windows without restoring them. If
you point to a thumbnail, you can see a full‐sized preview of the window. Click a thumbnail to
access the window.
Translucent Aero themes use transparent (or partially transparent)
windows window frames, which allows you to see through the title bars
to the application windows and objects behind the window
currently on top.
Improved window When you press ALT+TAB to switch between open windows, you can see live previews of the
switching windows for each open program instead of just a program icon.
To use the Aero features, your system must meet the following hardware requirements:
64 MB of graphics memory for resolutions up to 1280×1024
128 MB of graphics memory for resolutions higher than 1280×1024 and up to 1600×1200
256 MB of graphics memory for resolutions higher than 1600×1200
Additionally, you must use an Aero theme and you must have the Aero settings enabled.
Aero Themes
Aero themes are Windows 7 themes that include support for Aero features. The two primary types of themes available in
Windows 7 are Aero themes and basic themes. Basic themes do not support Aero features. Windows 7 comes with seven
Aero themes, and you can get additional themes online.
A theme is a combination of pictures, colors and sounds. Each theme includes a Desktop background, a window border
color, sounds and a screensaver. Right‐click an open area of the Desktop, then click Personalize to open the
Personalization window of the Control Panel.
56 8369‐1 v1.00 © CCI Learning Solutions Inc.
There are four types of themes:
My Themes These are themes you have customized, saved or downloaded. When you make changes to a theme,
the new settings appear in this section as an unsaved theme.
Aero Themes These themes include Aero glass effects and many include a desktop background slide show.
Installed Themes These are themes that are created by computer manufacturers or non‐Microsoft providers. Not every
system includes installed themes.
Basic and High These themes are designed to improve computer performance or to make items easier to see. These
Contrast Themes themes do not include Aero glass effects and therefore do not support all of the Aero features.
Click any theme in the dialog box to select it. For the selected theme, you can change the window color, sounds and
screen saver settings. Simply click the theme component at the bottom of the Personalization window to access the
configuration settings.
Supporting the Aero features can impact the performance of the system, especially if the system only barely meets the
hardware requirements.
You can adjust which features are supported by enabling or disabling the individual features of an Aero theme in the
Performance Options dialog box. To open this dialog box, click the Start button, right‐click Computer, then click
Properties. Click the Advanced system settings link in the left panel of the System window, click the Advanced tab if
necessary, in the Performance area click the Settings button to open the Performance Options dialog box and click the
Visual Effects tab if necessary.
8369‐1 v1.00 © CCI Learning Solutions Inc. 57
You can also select one of the options at the top of the dialog box – Let Windows choose what is best for my computer,
Adjust for best appearance, Adjust for best performance, or Custom. Once you begin clearing or selecting check boxes,
the Custom option is selected automatically. You can return to the original settings by specifying to allow Windows to
choose.
58 8369‐1 v1.00 © CCI Learning Solutions Inc.
4. Click the background of your choice, then click Save changes to specify a Desktop background and return to the
Personalization window.
5. Below the Themes area, click Window Color to access the Window Color and Appearance window. Here you can
select a color for the windows borders, the Start menu and taskbar. You can also specify whether to enable
transparency, and you can set the color intensity. On some systems, enabling transparency can put a strain on
system resources.
6. Click one of the colors to select it, then either select or clear the Enable transparency check box according to your
preference. Note that disabling transparency does not affect the function of the Aero features. When you have
made your selections, click Save changes to apply your color settings and return to the Personalization window.
7. Below the Themes area, click Sounds to open the Sound dialog box. The sound settings for specific program events
are grouped into named sound schemes. You can customize a Windows theme by specifying any sound scheme you
like. You can also change individual sounds within the sound scheme.
8. Display the Sound Scheme drop‐down list, select Garden, then click OK to save the settings. Your modifications are
currently saved to the Unsaved Theme in the My Themes section of the window.
9. Click the Save theme link to open the Save Theme As dialog box. Type: Classroom, then click Save. Your named
theme appears in the My Themes section of the window.
8369‐1 v1.00 © CCI Learning Solutions Inc. 59
10. In the Aero Themes section, click Windows 7 to apply the built‐in theme. Notice the immediate change on the
Desktop behind the open dialog box. You should also hear the Windows Change Theme sound specified in the
Windows Default sound scheme.
11. In the My Themes section, click Classroom to apply your customized theme. You hear the Windows Change Theme
sound specified in the Garden sound scheme.
12. Keep whichever theme you prefer, then close the Personalization window.
In this exercise, you modified the settings for a Windows 7 Aero theme.
Snipping Tool
You can use the Snipping Tool to capture a screen shot (called a snip) of any object on the screen. You can capture an
area of the screen, a window or dialog box, or you can capture the entire screen. Once the snip is captured, you can
annotate it, save it and even send it in an e‐mail message.
You can save the captured image in the following formats:
Portable Network Graphics (PNG)
Graphics Interchange Format (GIF)
Joint Photographic Experts Group (JPEG)
Single file HTML (MHT)
When you capture an image from a browser window, the suggested file format is MHT.
The snipping tool is easy to use and can be a useful tool in the trouble‐shooting process. For example, a user can capture
a screen shot of an error message and e‐mail it to the support staff. If an IT person cannot provide on‐site help (for
example, the user is a remote employee), he or she can send an e‐mail message that includes an annotated snip
highlighting particular settings that should be used.
60 8369‐1 v1.00 © CCI Learning Solutions Inc.
10. In the Snipping Tool toolbar, click the drop‐down arrow to the right of the Send Snip button to view the options for
sending the snip in an e‐mail message. You can send the image in‐line with the message text if the file format is
MHT and if the e‐mail client creates messages in HTML format. You can also specify to send the image as an
attachment to the e‐mail message.
11. Click in a blank area of the Snipping Tool window, then in the Snipping Tool toolbar click the Save Snip button to
open the Save As dialog box.
12. In the Navigation pane, click Desktop, type: FreeLinks as the file name, display the Save as type drop‐down list,
then select Portable Network Graphics file (PNG), then click Save.
13. Close the Snipping Tool and close the browser.
14. On the Desktop, double‐click the FreeLinks file to open in it Windows Photo Viewer to see that it is a standard
image file.
15. Close Windows Photo Viewer.
In this exercise, you used the Snipping Tool.
8369‐1 v1.00 © CCI Learning Solutions Inc. 61
Windows Internet Explorer Windows 7 comes with
A Web browser’s primary function is to retrieve pages from a Web server and display
Objective Internet Explorer 8.0
those pages on the screen. Millions of people use browsers every day for research,
1.3 installed, but Internet
shopping, entertainment, etc. While just about anybody can open a browser and
Explorer 9 is the current
browse the Web, an IT professional can understand the processes at work, identify and
standard. If a system is
avoid potential risks, and configure a browser to suit the working styles of employees
configured to download and
and conform to any corporate standards.
install automatic updates, it
will be updated to Internet
Streamlined Interface Explorer 9.
As with any "new and improved" version of software, certain new features or revised
layouts can cause confusion among users. Internet Explorer 9 has a stream‐lined appearance; the
Favorites bar, menu bar, command bar and status bar are turned off by default, as shown in the following figure:
Users can display these familiar tools by right‐clicking an empty area of the
title bar, then selecting the items they want to show.
62 8369‐1 v1.00 © CCI Learning Solutions Inc.
You can also view Favorites by clicking the Favorites button at the right edge
of the window to open the Favorites center, which can be resized, or moved
to the left edge of the window.
Useful Tools and Features
The following tools and features can help individuals work more efficiently and more securely. You may have occasion to
demonstrate these tools and features to employees within your organization.
Accelerators
An accelerator allows you to start an online service from another Web page without navigating away from the current
page. You can select text or other objects to access the usable accelerator services (such as opening a blog, or viewing a
map to a selected location.) The purpose of an accelerator is to eliminate the need to copy and paste content between
Web pages.
For example, if a corporate team‐building event were scheduled to take place at Grand Canyon National Park in Arizona,
you could select the text Grand Canyon National Park and an accelerator button would automatically appear, as shown.
Click the accelerator button to view the available accelerators, and then click one to launch it.
Accelerators are add‐ons – small programs that add features such as extra toolbars, stock tickers, etc., to the Web
browser. Add‐ons are often provided by a third party vendor. The default accelerators built in to Internet Explorer 9 are:
E‐mail with Windows Live, Map with Bing, Search with Bing, and Translate with Bing. You can add more from the Internet
Explorer Gallery at www.iegallery.com.
To manage add‐ons (including disabling or removing them), click the Tools button, then click Manage add‐ons.
8369‐1 v1.00 © CCI Learning Solutions Inc. 63
Searching from the Address Bar
You can now search directly from the Address bar instead of first accessing a search engine page. Simply click in the
Address bar and start typing. If you enter a complete URL, you will go directly to the Web site. If you enter a search term
or an incomplete address, click a search provider in the menu to launch a search using the currently selected search
engine.
You can also click Turn on suggestions to display a list of suggested search terms.
You can also click the Add button in the drop‐down menu to add search providers (such as Google or Ask.com) from the
Internet Explorer Gallery Web site.
Compatibility View
Certain older Web sites that were designed for earlier versions of the Internet Explorer Web browser may not display
correctly in Internet Explorer 9. (For example, they use deprecated tags or rely on server extensions that are no longer
supported.) This can often be the case with sites designed for a corporate intranet, or sites on a corporate partner's
extranet.
You can force these pages to display correctly using Compatibility view. In most cases, Internet Explorer will detect a
compatibility problem with a particular Web site and will automatically display the Compatibility View button in the
Address bar.
64 8369‐1 v1.00 © CCI Learning Solutions Inc.
Click the Compatibility View button to display the site in Compatibility View. Click it again to disable Compatibility View.
To specify that a particular Web site should always display in Compatibility View, navigate to the site, then in the Internet
Explorer menu bar, click Tools, then click Compatibility View Settings to open the Compatibility View Settings dialog box.
Click the Add button to add the site to the list box, then click the Close button.
Notice that by default, intranet sites are set to display in Compatibility View.
In some organizations, it may be the standard to configure the browser to set all Web sites to display in Compatibility
View. If a website doesn't display correctly, you can turn off Compatibility View by clicking the Compatibility View button.
InPrivate Browsing
The InPrivate Browsing feature enables anonymous browsing. That is, users can use the browser and leave no evidence
on the hard drive of the sites or content they have browsed.
As you browse the Web, the History folder stores the URLs of sites you have accessed within a defined period of time,
and provides a convenient way to revisit Web sites, especially if you cannot remember the exact URL. In Internet
Explorer, the default amount of time to keep pages in History is 20 days.
Additionally, as you surf, content is copied to the browser cache. The browser cache is a folder on your hard drive that
stores downloaded files (such as Web pages, images, fonts, etc.). The cache improves your browser’s performance
because it allows you to view previously accessed Web pages without having to request them from the server again. For
example, if you click a hyperlink on a Web page, then click the browser's Back button, the browser can pull the previously
viewed page from the cache.
When a user opens an InPrivate browsing session, a new window opens. The window is clearly identified as an InPrivate
Browsing window.
8369‐1 v1.00 © CCI Learning Solutions Inc. 65
Any browsing conducted within that window leaves no trace on the hard drive. For example, cookies and temporary
Internet files are stored only in memory (they are cleared when you close the browser), and the URLs of the sites you
visit are not recorded in the Web page history.
While many people may first think of InPrivate Browsing mode as a way to conceal visits to inappropriate Web sites on
company time, the feature has legitimate business applications. For example, an HR employee may need to visit web
sites that contain sensitive information such as financial or medical information; an IT employee may need to visit
administrative Web sites that contain tools that control the organization's computer systems.
By using InPrivate Browsing, such Web sites can be accessed securely from any computer on the premises without
leaving a trail after the browsing session is complete.
To open an InPrivate Browsing window, click the Tools button, point to Safety, then click InPrivate Browsing. You can
also press CTRL+SHIFT+P to open an InPrivate Browsing window.
Security Features
Because Web browsing can expose a system to malicious code, every Web browser includes built‐in security features
that help to keep the user safe while online. These built‐in features control how the browser handles active content,
scripts and Java programs.
Active content consists of any active, or moving, objects on a Web page, such as ActiveX controls and Java applets. Both
ActiveX controls and Java applets allow information to be downloaded and run on your system, and there are inherent
security risks with each. Internet Explorer can provide added security by controlling active content downloading and the
execution of Java programs.
Some corporate IT departments require that company browsers be configured to disable all active content. Disabling
these features reduces bandwidth use over the corporate network, and reduces security risks. However, certain Web
page elements may not function as designed.
66 8369‐1 v1.00 © CCI Learning Solutions Inc.
You can adjust the security settings of the various zones in the Security tab of the Internet Options dialog box. Click the
Tools button, then click Internet Options to open the dialog box.
You can adjust the security level by dragging the slider bar.
Each safety level performs certain actions, depending on the content of the Web page. For example, if the security level
is set to High, and a Web page with active content is encountered, the active content will not display and a notification
message will appear. The High safety level does not give you the option to view the active content.
If the security level is set to Medium High, you may receive a warning message when you start to download a file. The
message will give you the option to open the file in its current location, save it to your disk, cancel the download or
request more information.
If the security level is set to Medium, you will still be prompted when downloading potentially unsafe content and
unsigned ActiveX controls, but more content will be allowed through than with higher safety level settings.
You can also click the Custom level button to open the individual settings for the selected zone. You can use this dialog
box to specify how to handle active content, downloads, scripts and authentication.
8369‐1 v1.00 © CCI Learning Solutions Inc. 67
In situations where a site does not function properly with the Internet zone security settings applied, it is considered best
practice to add that site to the Trusted sites zone, rather than lowering the settings for the Internet zone.
When you add a site to the Trusted sites zone, you will be limited to adding secure sites only to that zone. A secure site is
one whose address starts with https:// rather than http://. You can, however, eliminate this restriction by clearing the
Require server verification (https:) for all sites in this zone check box.
SmartScreen Filter
The SmartScreen Filter is a feature in Internet Explorer that helps detect phishing Web sites and helps protect users from
downloading or installing malware (malicious software).
Phishing is the process of trying to gather sensitive information such as a password, or credit card details from an
unsuspecting victim by pretending to be a trustworthy entity. Typically, a phisher sends a legitimate‐looking e‐mail
message that directs the recipient to visit a fake Web site that looks identical to a legitimate site. Victims are then asked
to update personal information (such as password, credit card, or bank account numbers) on the fake Web site. The
phisher can then use the captured information for malicious purposes.
SmartScreen Filter provides protection in the following ways:
As you browse the Web, it analyzes Web Pages and searches for characteristics that might be suspicious. If it finds
any suspicious characteristics, it will display a warning.
It checks Web pages against a dynamic list of reported phishing sites and malicious software sites (maintained by
Microsoft). If it finds a match, it will display a warning that says the site has been blocked for your safety. You can
also report a Web site that you suspect might be unsafe.
It checks files you download from the Web against a list of reported malicious software sites and programs known
to be unsafe. It will warn you if it finds a match. It will also alert you if the file you are downloading is not on a list of
well‐known and often‐downloaded files.
If a malicious site is detected, Internet Explorer 9 blocks the entire site. It can also exercise a "surgical block" of malware
or phishing hosted on legitimate Web sites by blocking malicious pages without affecting the rest of the site.
SmartScreen Filter also works with Download Manager to help protect you from malicious downloads. Potentially risky
downloads are blocked immediately. Download Manager clearly identifies higher risk programs so that the user can
make an informed decision to delete, run, or save the download.
Sometimes sites are blocked inadvertently, and warnings may make users uncomfortable. If you know that a particular
site is safe (for example, a site on a partner's extranet), but SmartScreen filter flags the site as suspicious, you can add
the site to the list of Trusted sites within Internet Explorer, and then turn off checking for the Trusted sites zone.
68 8369‐1 v1.00 © CCI Learning Solutions Inc.
Keep in mind that SmartScreen Filter interrupts the ability to navigate to and download from sites known to host
malicious content. However, users can elect to ignore the warning and continue. (You can use Group Policy to prevent
users from overriding the warning. You will learn about Group Policy in a later lesson.)
Pop‐Up Blocker
A pop‐up is a small browser window that suddenly opens in front of the page you are viewing. Pop‐ups contain command
buttons or options that must be selected before you can continue with the current task. Pop‐ups can remind a visitor to
log on or to enter required information, but they are also used extensively for advertising on the Web, and many users
find them annoying because they remain open until you click an option or manually close them.
Pop‐up windows are also often used in connection with installing malware. Unsuspecting users may click links in a pop‐
up window that starts a download.
Internet Explorer provides a configurable pop‐up blocker – you can fine‐tune the way it functions so important messages
(for example, log on windows, or session time‐out warnings) are allowed to display. To allow pop‐ups from particular
Web sites, you add those sites to an exception list.
To access the pop‐up blocker settings, click the Tools button, click Internet options, click the Privacy tab, select the Turn
on Pop‐up Blocker if necessary, then click the Settings button.
Type the address of the Web site you want to add to the exception list, then click the Add button.
MMM
Configuring
Internet
Note that you can also specify the blocking level by selecting an option from the drop‐down list. Explorer
Media in Windows 7
Objective Video and audio are integral components of modern computing. Online tutorials, e‐learning products, even customer
1.3 service solutions include video and audio. Windows 7 provides two primary applications for handling media – Windows
Media Player (WMP) and Windows Media Center (WMC)
8369‐1 v1.00 © CCI Learning Solutions Inc. 69
WMC is often used in full‐screen mode and can be navigated using a remote control.
Digital Media and Digital Rights Management (DRM)
Digital Rights Management (DRM) is a technology used by content providers to control how digital music and video files
you obtain from them are used and distributed. Some online stores sell and rent songs and movies that have DRM
applied to them. A file that has DRM applied to it is considered a protected file. In Windows Media Player, DRM is known
as Windows Media Digital Rights Management.
Media usage rights are permissions to use a protected file in specified ways. For example, usage rights might allow you to
play a file (a play right), burn the file to an audio CD (a burn right), or to sync the file to a portable device (a sync right).
These rights are sometimes called licenses.
When you purchase and play songs or videos, WMP automatically downloads the usage rights (DRM) as required.
70 8369‐1 v1.00 © CCI Learning Solutions Inc.
When you try to use a protected file in Windows Media Player, the Player checks to see if you have valid media usage
rights installed on your computer. If the media usage rights permit you to perform the action you have requested, the
Player performs that action for you. If the Player does not find valid media usage rights, or if the rights do not permit you
to perform the requested action, the Player will not perform the action, and typically displays an error message or an
information button that you can click for more information.
Supported Formats
The default file formats are Windows Media Video (WMV), Windows Media Audio (WMA), and Advanced Systems
Format (ASF), but WMP supports most popular audio and video formats (e.g., MP3, MPEG‐4, AVI, MOV).
WMP also supports playlists in a format called Windows Playlist (WPL).
Business Uses
While WMC is intended for home entertainment, WMP has several practical business applications. Many Web sites use
the WMP engine to embed media into their Web pages, and WMP is used to play streaming media.
WMP is used in businesses every day for e‐learning applications, online tutorials, and other Web‐based training.
Within the Navigation pane (left pane), you can choose a category (such as Music, Pictures, or Videos) to view in the
details pane (center pane). You can also drag items from the details pane to the list pane (right pane) to create playlists,
burn CDs or DVDs or sync to devices such as portable music players.
You can play media in either mode. You can also start playing media in one mode and switch to the other mode. To
switch from Player Library mode to Now Playing mode, click the Switch to Now Playing button in the lower‐right corner
of the WMP window.
8369‐1 v1.00 © CCI Learning Solutions Inc. 71
Now Playing mode is the mode most often used for playback. When you double‐click a media file, or begin streaming
media from a Web site, WMP opens in Now Playing mode (shown below).
To switch from Now Playing mode to Player Library mode, click the Switch to Library button at the upper‐right corner of
the WMP window.
Configuring WMP
You can use the Options dialog box to configure WMP. To access the Options dialog box, press CTRL+M if necessary to
make the menu bar visible, then select Tools, Options.
The Windows Media Player Options dialog box contains the following tabs:
Player Contains settings for the player, including when to check for updates.
Rip Music Ripping is the process of adding music to the Player Library by copying audio files from a CD and storing
them as digital files on the computer. This tab includes settings for file formats and file locations.
Devices Contains settings for optical drives, the display and speakers.
72 8369‐1 v1.00 © CCI Learning Solutions Inc.
Burn Contains settings for burning audio and data discs, including burn speed and whether to eject the disc
after burning.
Performance Contains settings for detecting the connection speed for streaming media, network buffering and DVD
and video playback.
Library Contains settings for organizing the digital media collection on the computer, including whether to
retrieve additional information pertaining to media content from the Internet.
Plug‐ins Allows you to add and configure WMP plug‐ins.
Privacy Contains settings for automatically retrieving media information from the Internet, downloading usage
rights, and sending Player usage data to Microsoft.
Security Contains settings for running scripts and accessing security zone settings.
DVD Contains settings that affect DVD playback, such as playback restrictions based on content rating, and
language selection for audio, subtitles and DVD menus.
Network Contains settings for playing streaming media, such as which network protocols to use and whether
media is streamed through a proxy server.
8. In the Rip settings section, display the Format drop‐down list to view the available file formats, then click in an
empty area of the dialog box.
8369‐1 v1.00 © CCI Learning Solutions Inc. 73
9. In the Audio quality section, drag the slider to the left and to the right so see how increasing or decreasing the
sound quality affects the storage requirements.
10. Click the Library tab. Notice that the default setting is to add video files found in the Picture library.
11. Click the Security tab. Notice that by defaults scripts are run only when the Player is in a Web page.
12. Click the Privacy tab and examine the settings. Do you think most users are comfortable sending Player usage data
to Microsoft?
13. Click Cancel to abandon the revised settings, then close Windows Media Player.
In this exercise, you examined some of Windows Media Player's configuration settings.
74 8369‐1 v1.00 © CCI Learning Solutions Inc.
Icons view presents an alphabetical listing of the Control Panel components. You can specify to show large icons or small
icons. Icons view is shown below.
You can browse the Control Panel or use the Search box at the top of the window to find the tool you need.
8369‐1 v1.00 © CCI Learning Solutions Inc. 75
Configuring Administrative Tools
All Windows operating systems include a special set of tools that have been traditionally called Administrative tools.
These tools allow you to manage the system configuration and typically require administrative privileges to operate. The
Administrative tools are shown below.
The administrative tools are:
Component Services Configure and administer Component Object Model (COM) components. Microsoft COM
technology enables software components to communicate. COM is used by developers to create
re‐usable software components, link components together to build applications, and take
advantage of Windows services.
Computer Provides a single, consolidated desktop tool that you can use to monitor system events, manage
Management system performance, and view and control devices.
Data Sources (ODBC) Used to move data from one type of database into another.
Event Viewer Allows you to view event logs. Logs provide a record of specific events that take place in a
computer system.
iSCSI Initiator Used to configure and manage the Internet Small Computer Systems Interface (iSCSI) Initiator – a
device driver and service in Windows 7 that allows access to iSCSI‐based storage area networks
(SANs).
Local Security Policy Allows you to easily access the security settings for the local computer.
Performance Monitor Allows you to view information about the CPU, memory, hard disk and network performance.
Print Management Allows you to manage printers and print servers on the network. You can also view drivers and
manage print queues.
Services Allows you to view the services that run in the background on the computer. (A service is a
program or process that runs in the background and provides support to other programs.)
System Configuration Opens the System Configuration tool which is a utility in Windows 7 that you can use to identify
and isolate problems that may prevent Windows from starting correctly.
Task Scheduler Allows you to schedule programs or other tasks to run automatically.
Windows Firewall Allows you to configure firewall settings on the local machine and on remote systems. (A firewall
with Advanced is hardware or software that protects a computer from hackers and malicious software.)
Security
76 8369‐1 v1.00 © CCI Learning Solutions Inc.
Windows Memory Runs a diagnostic program that will check the system memory to ensure that it is functioning
Diagnostic correctly.
Windows PowerShell Runs a PowerShell session with all available modules loaded automatically. (You will learn about
Modules PowerShell in a later lesson.)
14. Scroll the list of services. Are you surprised at how many there are? If the status of a service is Started, then the
service is running. Any service with a startup type of Automatic should be running on the system.
8369‐1 v1.00 © CCI Learning Solutions Inc. 77
15. Click the name of a service to display its description in the dialog box. Some services include Start, Stop and Restart
links, allowing you to control how they run. (You will learn more about services in a later lesson.)
16. Close the Services window.
17. In the right pane, double‐click Event Viewer to view information about significant events, such as a program
starting or stopping, or a security error.
18. Maximize the Event Viewer window and explore a few of the logged events. Are there more errors and warnings
than you had expected?
19. Close the Event Viewer window.
20. In the right pane, double‐click Computer Management to open the Computer Management console. Notice that
you can perform a wide variety of tasks from this one location.
21. Close the Computer Management console.
22. Close the Administrative Tools, then close the Control Panel.
In this exercise, you navigated the Control Panel and explored a few of the administrative tools.
You can find more information on administrative tools on the TechNet Web site at:
http://technet.microsoft.com/en‐us/default.aspx?ocid=fwlink
78 8369‐1 v1.00 © CCI Learning Solutions Inc.
The Ease of Access Center includes:
Quick access to accessibility tools such as Magnifier, On‐Screen Keyboard, Narrator and High Contrast.
A questionnaire that provides a personalized list of recommended settings based on the answers to a series of
questions regarding the user's eyesight, dexterity and hearing.
Settings that are organized by category. For example, you can find how to use the computer without a display, or
how to make the mouse easier to use, or how to use text or visual alternatives to sound.
8369‐1 v1.00 © CCI Learning Solutions Inc. 79
Other Accessibility Tools and Features
Windows 7 includes several other accessibility tools and features. You have already investigated some of these when you
configured display settings. Others include:
Speech Allows you to command your PC with your voice, including the ability to dictate into almost any
Recognition application, such as Microsoft Word or Microsoft Excel, or Microsoft Outlook. You can also surf the
Web by saying what you want to see. Speech recognition requires a microphone. The setup process is
streamlined and an interactive tutorial is available to help you familiarize yourself with speech
commands.
Windows Touch Allows you to use a touchscreen monitor to scroll, resize windows, play media, pan and zoom.
Sticky Keys When turned on, this feature allows you to press one key at a time to enter key combinations (such
as CTRL+ALT+DELETE).
Mouse Keys Allows you to use the arrow keys on the numeric keypad to move the pointer instead of the mouse.
Filter Keys Ignores keystrokes that occur in rapid succession and keystrokes that are held down for several
seconds unintentionally.
Visual Replaces system sounds with visual cues, such as a flash on the screen, so that system alerts are
Notifications announced visually instead of aurally.
80 8369‐1 v1.00 © CCI Learning Solutions Inc.
13. Close the Notepad document without saving, then drag a corner or an edge of the On‐Screen Keyboard. Notice you
can make it as large or small as you want.
14. In the On‐Screen Keyboard, click the Close button.
15. In the Ease of Access Center, scroll down and click the Make the keyboard easier to use link to display the available
options. Notice that you can set up mouse keys, set up sticky keys, turn on toggle keys and set up filter keys.
16. Click the Back button at the top of the window to return to the Ease of Access Center.
17. Investigate some of the other links in the Ease of Access Center.
18. In the Ease of Access Center, click the Get recommendations to make your computer easier to use link to take the
interactive questionnaire. Indicate that you have some type of impairment so that Windows can make specific
recommendations based on your answers. When you are done, review the recommended settings. Did you know
that the suggested configurations were possible?
19. Close the Ease of Access Center.
In this exercise, you investigated settings in the Ease of Access Center.
8369‐1 v1.00 © CCI Learning Solutions Inc. 81
Using the System Configuration Tool
Objective
The System Configuration tool (called MSCONFIG) is a utility in Windows 7 that you can use to identify and isolate
1.3 problems that may prevent Windows from starting correctly.
You can use MSCONFIG to start Windows with common services and startup programs turned off and then turn them
back on, one at a time. If a problem doesn't occur when a service is turned off, but does occur when that service is
turned on, then the service could be the cause of the problem.
The System Configuration dialog box is shown below.
The System Configuration dialog box includes the following tabs:
General Lists choices for startup configuration, including Normal, Diagnostic and Selective startup.
Boot Shows configuration options for the operating system. For example, you can boot into safe mode and
load only particular drivers, and specify to work in a GUI or a command‐line environment. You can
also specify whether networking is enabled.
Services Lists all of the services that start when the computer starts, along with their current status (Running
or Stopped). You can enable or disable individual services at startup to troubleshoot which services
might be causing startup problems.
Startup Lists applications that run when the computer starts up, along with the name of their publisher, the
path to the executable file, and the location of the registry key or shortcut that causes the application
to run. (You will learn about registry keys in a later lesson.)
Tools Presents a list of diagnostic and other advanced tools. You can launch the tools from the dialog box.
82 8369‐1 v1.00 © CCI Learning Solutions Inc.
3. Click the Services tab to view the services that start when the computer boots up. By default, all are enabled.
4. Click the Disable all button to clear all the checkboxes. You can add services back in one by one, or you can enable
them all and then remove services one by one.
5. Click the Enable all button to reselect the checkboxes.
6. Select the Hide all Microsoft services option. Now the list displays only third party services that are started at
bootup.
7. Clear the Hide all Microsoft services checkbox, then click the Startup tab to view the applications that run when
the computer starts up. You can clear the check boxes to prevent these programs from starting in order to see if
one of them might be causing trouble at bootup.
8. Click the Tools tab to view the available tools. You can launch tools directly from the System Configuration dialog
box.
8369‐1 v1.00 © CCI Learning Solutions Inc. 83
9. In the list box, click System Properties, then click Launch to open the System page of the Control Panel. This screen
shows information about the system, including the operating system edition, the processor speed, the bit‐level, etc.
Close the Control Panel window.
10. In the list box, click Internet Options, then click Launch to open the Internet Properties dialog box used to configure
Internet Explorer. Close the Internet Properties dialog box.
11. In the list box, click Command Prompt, then click Launch to open a command prompt window. Close the command
prompt window.
12. Explore a few of the available tools. (However, avoid launching the Registry Editor. You will use the Registry Editor
under controlled conditions in a later lesson.)
13. When you are done, close the System Configuration dialog box.
In this exercise, you explored some of the tools in the System Configuration tool (MSCONFIG).
Understanding Mobility
Mobile computing occurs when a computer is transported from location to location as part of its normal usage. Mobile
Objective
users are everywhere; you see them in airports and train depots and local coffee houses with their laptops at the ready.
1.4
Mobility has become increasingly important for business users – and not only for those who travel extensively as part of
4.4
their job. More and more, users are taking their portable PCs home so they can work after hours or over the weekend.
Most business users work with files that are stored in a shared folder on their company's network. If mobile users require
access to those files while they are away from the network, they can use offline files. Offline files are copies of network
files stored on the local machine (or on removable media) so that they can be accessed even when mobile users are
away from the network.
Once users save their changes to these offline files, the operating system must provide a method for synchronizing this
revised offline content with the network. In Windows 7, you can use the Windows Sync Center.
Another aspect of mobility is that laptops are used more than ever today. You can use the Windows Mobility Center to
help prolong battery life and make connectivity with other devices fast and easy.
84 8369‐1 v1.00 © CCI Learning Solutions Inc.
Note: Sync Center is designed to help you sync with files in network locations. If you want to sync a mobile device
with your computer, such as a mobile phone or portable music player, Windows provides other options. You can
install the sync software that some manufacturers include with their devices, or you can use the new Device Stage
feature in this version of Windows if your device supports this feature.
Setting Up Offline Files
By default, this feature is turned off in Windows 7. To enable it, go to the Control Panel, click on Sync Center, and click
Manage offline files in the left pane of the Control Panel. Click on Enable offline files, and reboot your computer.
This feature is only available in the Professional, Enterprise, and Ultimate editions of Windows 7, and Windows Server
2003 and later versions.
8369‐1 v1.00 © CCI Learning Solutions Inc. 85
Synchronizing Files with the Network
The next time you connect to the network, Windows will automatically sync your offline files with the original files in the
network folder.
You can also manually synchronize the files, or schedule a synchronization to occur at a specific time or when an event
(such as logging on to the computer) occurs.
If conflicts occur when you synchronize files, the Sync Center can help you to resolve them. A synchronization conflict
may happen when you have more than one person sharing the same folder and working on the same file and all want to
synchronize.
When you perform synchronization, any conflicts are clearly indicated so that you can choose whether to view options to
resolve the conflict, ignore it or view the properties of the conflict.
86 8369‐1 v1.00 © CCI Learning Solutions Inc.
5. Display the Permission Level drop‐down list for the Everyone group, then select Read/Write to change the
permission from Read to Read/Write.
6. Click the Share button. When the File Sharing wizard has completed configuring the folder, it will display a message
that the folder is shared.
7. Click Done to close the File Sharing wizard and return to the Sharing tab of the Properties dialog box.
8. Click the Advanced Sharing button to open the Advanced Sharing dialog box, then click the Permissions button to
view the share permissions for the directory. Notice that the Everyone group has Full Control permissions.
9. Click OK twice, then click the Security tab.
8369‐1 v1.00 © CCI Learning Solutions Inc. 87
10. In the Group or user names list box, click Everyone, then examine the applied permissions in the Permissions for
Everyone box at the bottom of the tab. If there is no check mark in the Allow column for the Full Control
permission, click the Edit button, click the Allow check box for the Full Control permission, then click OK. The
Buried directory is now a network share. The Security tab should appear as shown below:
11. Close the Properties dialog box.
Now map the Buried directory to your computer so that you can access it from there.
12. Computer: Open Windows Explorer.
13. If necessary, click Computer in the left pane, then click Map network drive in the menu bar.
14. Click the Drive drop‐down button and select a drive letter that is available.
15. In the Folder text box, enter the server name and share name to which you want to map the selected drive letter,
and click Finish. Use the syntax: \\server name\share name. The figure below shows that you want to map drive L:
on the local machine to a directory named Buried on the root directory of a remote system named CCI‐HPAMD.
16. If necessary, enter your logon ID and password to access the server.
17. In Windows Explorer, click the mapped drive letter to see the contents of the Buried directory on the server.
Now copy a sample text file onto the server and make it available offline.
18. Copy the file Treasure.txt that was created in the preceding exercise, to the Buried directory on the server.
19. Right‐click the Treasure.txt file on the server, and click Always available offline.
88 8369‐1 v1.00 © CCI Learning Solutions Inc.
Shut down the server and make changes to your local copy of the Treasure.txt file.
20. Server: Shut down the server so that it is turned off.
21. Computer: Right‐click the Treasure.txt file on your local machine and click Edit to open it in Notepad (or WordPad).
22. Add more words of your choosing to the file, then save and close it.
Notice that the left pane in Windows Explorer indicates that the mapped drive is offline.
23. Server: Power up the server again and log on to it.
24. Open Windows Explorer on the server and open the Treasure.txt file in C:\Buried to confirm that this version of the
file does not contain the newly added text. Close the file.
25. Computer: Click the mapped network drive to access the Buried directory on the server, then click the Treasure.txt
file on the server to select it.
26. Click the drop‐down button next to Sync in the Windows Explorer menu bar, and click Sync offline files in this
folder.
27. Server: On the server, open the Treasure.txt file in C:\Buried.
The file on the server is now synchronized with the updates you made to the file on the local machine while the
server was offline.
28. Close the Treasure.txt file on the server.
29. Computer: If desired, right‐click the mapped drive on your computer and click Disconnect to remove the
connection, and click Yes if a warning message is displayed (be sure that you closed the Treasure.txt file before
doing so).
In this exercise, you practiced making a file available offline, making changes to that file while the server was offline, and
synchronizing files when the server was online again.
8369‐1 v1.00 © CCI Learning Solutions Inc. 89
Each square in the interface is called a tile and each tile contains one piece of information about a particular system
component, as well as action items related to that component. You can click an icon on a tile to quickly open options for
related setting. For example, you can click the battery icon to open the Power Options dialog box. The tiles that appear
depend on the system.
Not all settings are available on all laptops. If a setting does not appear it may be because the required hardware is
missing or turned off. For example, if you are not connected to a wireless network and the Turn wireless on button is not
available, it could be because your laptop does not include a wireless network adapter, or it could be because the
wireless network adapter is turned off.
You can access the Windows Mobility Center through the Control Panel, or in the Accessories folder on the Start menu. It
is not accessible on non‐mobile computers.
You can use the Windows Mobility Center to view and control the following features:
Brightness Adjusts the brightness of the screen. You can drag the slider to temporarily adjust the brightness,
or you can click the icon to open the Power Plan options.
Volume Adjusts the speaker volume. You can drag the slider to adjust the volume, or you can select the
Mute checkbox.
Battery Status Shows how much charge remains on the battery in your mobile PC. You can also select a power
plan from the list.
Wireless Network Shows the status of your wireless connection. You can also turn the wireless network adapter on
or off.
Screen Rotation Changes the orientation of your Tablet PC screen from portrait to landscape or vice versa.
(Available on Tablet PCs.)
External Display Allows you to connect an additional monitor to your mobile PC or customize the display settings.
Sync Center Shows the status of an in‐progress file sync. You can also start a new sync, set up a sync
partnership, or change your settings in the Sync Center.
Presentation Settings Adjust settings such as speaker volume and Desktop background in preparation for delivering a
presentation. You can also connect your laptop to a projector and then click Turn on to get the
computer ready to display a presentation. For example, the laptop will not sleep and system
notifications will be turned off. Presentation settings are not available in Windows 7 Home
Premium; they are available in Windows 7 Professional, Ultimate and Enterprise editions.
3. In the Presentation Settings tile, click the Change presentation settings icon to open the Presentation Settings
dialog box. Notice that when you specify you are giving a presentation, the laptop will not enter sleep mode, and
the system notifications are turned off. By default the screen saver is turned off as well. These settings ensure that
your presentation will not be interrupted by events that occur on your computer.
90 8369‐1 v1.00 © CCI Learning Solutions Inc.
4. Select the Set the volume to check box, then drag the slider to High. If your presentation includes audio, you can
ensure that the audience can hear the audio file.
5. Select the Show this background check box, then scroll the images and select one that you like.
6. Click OK to apply the settings. Notice that the selected background displays on the Desktop.
7. If you have access to a projector, connect it to the laptop and then in the Mobility Center, click Connect Display in
the External Display tile and configure an appropriate setting. If no projector is available, skip to Step 8.
8. Access the Windows Mobility Center again, and in the Presentation Settings tile click Turn off to return the laptop
settings to their original values.
9. Close the Windows Mobility Center.
In this exercise, your instructor demonstrated how to use the Windows Mobility Center to prepare a laptop to deliver a
presentation.
8369‐1 v1.00 © CCI Learning Solutions Inc. 91
Lesson Summary
In this lesson, you learned to configure various operating system components and features including Control Panel
options and Desktop settings. You also learned about native applications and tools, and learned how Windows supports
mobility. You are now able to:
Identify the features and components of the Windows 7 Desktop.
Understand how to navigate a breadcrumb trail.
Identify the features and components of the Windows Explorer window.
Add and configure Desktop gadgets.
Describe and access user profile folders.
Configure display settings, including screen resolution and screen magnification and configure Windows 7 to
support multiple display devices.
Create and modify Desktop shortcuts, create Start menu shortcuts, and add system icon to the Desktop.
Use Aero features for window management.
Modify and apply Aero themes.
Use the Snipping Tool.
Describe the major features of Internet Explorer.
Describe the Windows Media Center.
Describe Windows Media Player.
Configure administrative tools.
Configure accessibility options.
Describe how to use MSCONFIG. MMM
Explain the Windows Sync Center. Go online for
Additional
Explain the Windows Mobility Center. Review and Case
Scenarios
Review Questions
1. In which of the following situations might it be preferable to change screen magnification instead of screen resolution?
a. When the monitor is a flat panel c. When the monitor is a CRT
b When more than one user uses the system d. When a user is an administrator
2. Dean is using the System Configuration (MSCONFIG) utility on a Windows 7 system. What he is most likely trying to do?
a. Troubleshoot a bootup issue c. Change the appearance of the Desktop
b Configure accessibility options for a disabled user d. Synchronize offline files with files in a network share
3. Ken is viewing the user profile folders on his Windows 7 system. Which tool is he using?
a. MSCONFIG c. Windows Explorer
b Computer Management Console d. Registry Editor
4. Which Aero feature can you use to make all open windows transparent?
a. Aero Peek c. Aero Invisible
b Aero Snap d. Aero Shake
5. Which Internet Explorer feature is designed to help users avoid known phishing Web sites?
a. InPrivate Browsing c. the Internet security zone
b SmartScreen Filter d. Internet Explorer accelerators
92 8369‐1 v1.00 © CCI Learning Solutions Inc.
Managing Windows
Throughout your career as an IT professional, you will perform tasks related to the management of hardware, software,
and users. The term management can apply to setting up and configuring systems for end‐user use, installing, configuring
or removing applications, controlling which particular features will be accessible to users, or controlling which user has
access to which resources.
Windows provides a wide variety of tools and features that allow you to configure and manage both local and remote
Windows computers. In this lesson, you will explore several of these tools and features.
In computing, there are local machines and remote machines. For example, consider that Ed and Ron work in the same
office and that each has his own computer. The computer that Ed logs on to and sits in front of is his local machine.
Additionally, the computer that Ron logs on to and sits in front of is Ron's local machine, but to Ed, Ron's computer
would be a remote machine because it is not at his immediate location.
8369‐1 v1.00 © CCI Learning Solutions Inc. 93
User Accounts
You learned in Lesson 1 that there are three different types of user accounts in Windows 7: standard user accounts,
Objective administrator accounts, and a guest account. (The guest account is created during operating system installation and is
3.2 turned off by default.)
Each type of account has a specific level of permission associated with it. Permissions are rules associated with objects on
a computer, such as files, folders and settings. Permissions determine whether you can access an object and what you
can do with it. Creating and using the appropriate types of user accounts provide a first step in managing a Windows
system.
The two account types you deal with most often on a Windows 7 system are:
Administrator Lets you make changes to the system that will affect other users.
The guest account has
account Administrators can change security settings, install and uninstall software
very limited permissions.
and hardware, and create or make changes to other user accounts on the
People using the guest
system. When Windows 7 is installed, it automatically creates an
account have limited
administrator account. You use this account to install programs, configure
access and cannot change
the system and create and change other user accounts.
settings, install hardware
Standard user Lets you use most of the capabilities of the computer. You can use most or software or create a
account programs that are installed on the computer and change settings that password.
affect your user account. However, you can't install or uninstall some
software and hardware, you can't delete files that are required for the
computer to work, you can’t access files stored in other users’ profile
folders, and you can't change settings that affect other users or the
security of the computer.
94 8369‐1 v1.00 © CCI Learning Solutions Inc.
You can perform several account maintenance tasks from the User Accounts page, including changing your account
picture or password, or removing your password. When you are logged on as an administrator, you can also change your
account name, your account type, the user account control settings, or manage accounts other than your own.
8369‐1 v1.00 © CCI Learning Solutions Inc. 95
3. Click Manage another account to open the Manage Accounts page. From this page, you can manage any account
on the system, turn the Guest account on or off, or create a new account.
4. Click Create a new account to open the Create New Account page. Notice that you can create either a standard
user account or an administrator account.
5. Type: JDoe in the New account name box, ensure that Standard user is selected and click the Create Account
button to create the new standard user account. Windows creates the account and lists it in the Manage Accounts
page. You can now manage various features of the account.
96 8369‐1 v1.00 © CCI Learning Solutions Inc.
6. Click the JDoe Standard user account to view the available management options.
7. Click the Create a password link to open the Create Password page.
Notice the warning concerning losing access to EFS‐encrypted files, personal certificates and stored passwords. This
warning does not apply when you are first creating a user account, nor does it apply when a user logs in and
changes his or her own password or first adds one to the account. The typical case where this warning applies is
when a user has forgotten his or her password and an administrator must create a new one.
8369‐1 v1.00 © CCI Learning Solutions Inc. 97
8. Type: anon in the New password box, press TAB, then type: anon in the Confirm new password box. (This is not an
example of a strong password and is used here for the sake of simplicity.) When you have entered the new
password twice, click Create password to add the password to the account.
Next, you will log off as administrator and log on as the new standard user.
9. Close the Control Panel.
10. Click the Start button, display the Shut down options, then click Log off.
11. On the Windows 7 login screen, click JDoe, type: anon in the Password box, then press ENTER to log on using the
new standard user account. It may take a few moments for Windows to prepare the new user profile and Desktop.
12. When you are logged in, click the Start button, click Control Panel, display the View by drop‐down list and select
either Large or Small icons, then click User Accounts to open the User Accounts page of the Control Panel.
Notice that the options presented here are slightly different than the ones presented to the administrator account
in Step 6. The last four items include a User Account Control (UAC) symbol, indicating that an administrator
password must be entered to access that particular option. (You will learn about the UAC in the next section.)
13. Click Change your password to open the Change Your Password page. You can change your password as often as
necessary as long as you can correctly enter the current password.
14. Click the Back button at the top of the window, then click Remove your password to open the Remove Your
Password page. Again, you can remove your password as long as you can correctly enter the current password.
15. Click Cancel.
16. Click Change your picture, click a picture in the gallery, then click the Change Picture button.
17. Click the Start button. Notice that the new account picture displays above your user name in the Start menu.
18. Press ESC to close the Start menu.
19. Click one of the remaining options. You are prompted to type an administrator password and then click Yes before
Windows will allow the Control Panel to make changes to the computer.
20. Click No.
Next, you will log back on as administrator and delete the new standard user account.
21. Close the Control Panel, click the Start button, display the Shut down options, then click Log off to log off the
standard user account.
22. Log back in using your administrator account.
23. Open the Control Panel, then open the User Accounts page.
24. Click Manage another account, then click JDoe Standard user Password protected.
98 8369‐1 v1.00 © CCI Learning Solutions Inc.
25. Click Delete the account, click the Delete Files button, then click Delete Account to confirm that you want to delete
the standard user account you created. When you specify to delete files, these are the contents of the user
Desktop, Documents, Favorites, Music, Pictures and Video folders. If you specify to keep the files, Windows will
copy them to a folder on your Desktop. The folder is named with the user account.
26. Close the Control Panel.
In this exercise, you created, used and deleted a standard user account.
If you are logged on as a standard user, you (or someone else with an administrator account on the system) must
select the administrator account presented in a dialog box and enter the administrator password.
If you click Yes, or enter the administrator password, your permission level is temporarily elevated to allow you to
complete the task, then your permission level is returned to that of a standard user.
UAC works by adjusting the permission level of your user account. If you are performing tasks that can be accomplished
as a standard user (such as reading email, or creating documents), you have the permissions of a standard user, even if
you are logged on as an administrator.
Because UAC issues a notification regardless of which type of account you have used to log on, you are always made
aware when a program is about to make a change that requires administrator‐level permission. This notification process
can therefore prevent malicious software and spyware from being installed or making changes to the system without
your knowledge.
8369‐1 v1.00 © CCI Learning Solutions Inc. 99
UAC presents four different types of notification dialog boxes, depending on who published the item that needs
permission to continue. Windows can tell who published an item by checking its digital signature. A digital signature is an
electronic security mark that can be added to a file. It allows you to verify the publisher of a file and helps verify that the
file has not changed since it was digitally signed. The UAC notification dialog boxes are outlined in the following table:
Icon Type Description
A setting or feature that is part of Microsoft is the publisher of the item.
Windows needs permission.
A program that is not part of Windows The program has a valid digital signature, but Microsoft is not
needs your permission to start. the publisher.
A program with an unknown publisher The program does not have a valid digital signature from its
needs your permission to start. publisher. This does not necessarily imply that the program is
unsafe; simply that it is unsigned. Be sure that you obtained the
file from a trusted source.
You have been blocked by the system The program has been blocked because it is known to be
administrator from running this untrusted. You cannot proceed. If you need to run the program,
program. you must contact the system administrator.
When you are notified, your Desktop is dimmed and you must either approve or deny the request in the UAC dialog box
before you can do anything else on the computer. The dimming of the Desktop is referred to as the secure desktop
because no programs can run while the Desktop is dimmed. You can, however, configure UAC not to dim the Desktop.
Configuring UAC
Some users feel that UAC issues too many notifications; others want to know about every change made to the system.
As an IT administrator, you must consider company policy and configure the systems accordingly. You can configure UAC
to provide notifications that suit your needs and preferences.
Configuration adjustments can be made using the User Account Control Settings dialog box in the Control Panel.
100 8369‐1 v1.00 © CCI Learning Solutions Inc.
Drag the slider to one of the four positions described below.
Setting Description Security impact
Always notify You will be notified before programs make changes to the This is the most secure setting.
system or to Windows settings that require administrator‐level
permissions.
Notify me only You will be notified before programs make changes to the This is the default setting. You
when programs system. are advised to be careful about
try to make You will not be notified if you try to make changes to Windows which programs you allow to
changes to my settings that require administrator‐level permissions. run on your computer.
computer You will be notified if a program outside of Windows tries to
make changes to a Windows setting.
Notify me only You will be notified before programs make changes to the Essentially the same as "Notify
when programs system. me only when programs try to
try to make You will not be notified if you try to make changes to Windows make changes to my
changes to my settings that require administrator‐level permissions. computer," but you are not
computer (do not You will be notified if a program outside of Windows tries to notified on the secure desktop.
dim my desktop) make changes to a Windows setting.
Never notify You will not be notified before any changes are made to your Turns off UAC.
computer. If you are logged on as an administrator, programs This is the least secure setting
can make changes to your computer without your knowing and is not recommended.
about it.
If you are logged on as a standard user, any changes that
required administrator‐level permissions will be automatically
denied.
Requires a restart to complete the process of turning off UAC.
Once UAC is turned off, people that log on as administrator will
always have the permissions of an administrator.
You must be logged on as an administrator in order to modify UAC settings.
If you are logged on using a standard user account, you will be prompted to enter the administrator password when you
try to modify the UAC settings. Upon entry, the UAC Settings screen will offer a slightly different set of options:
8369‐1 v1.00 © CCI Learning Solutions Inc. 101
102 8369‐1 v1.00 © CCI Learning Solutions Inc.
In most cases, these installations are interactive. When performing a local installation, you are most commonly asked to
specify:
the name of the user
a product ID key or serial number
an installation location (if different than the suggested default location)
whether the application should be made available for all users on the system or only for the current user.
Installation Engine
Most application setup programs make use of the Windows Installer engine. Windows Installer is an installation and
application configuration service that runs on Windows operating systems. When application setup programs use
Windows Installer, the installation information and the installation files are contained in installation packages known as
MSI files. These files can also be launched directly by double‐clicking them.
MSI files rely on Windows Installer to copy files, create folders and create registry entries during the installation process.
The Windows registry is a database that stores configuration settings and other options on Windows machines. All
installed programs are represented by entries known as keys in the registry. (You will learn more about the registry in a
later lesson.) Registry keys for uninstalling the application are also created at this time.
Some applications use a custom‐coded installation engine, which manually copies files and configures registry entries.
8369‐1 v1.00 © CCI Learning Solutions Inc. 103
You may be given the opportunity to select particular components to include in the installation. Explore the options
carefully. For instance, if the only language you plan to use is English, you may not want to install all the different
language files.
6. Expand the Typing Lessons tree by clicking on the + icon, then select which courses you want to install by either
selecting or clearing the appropriate check boxes, then click Next.
Sometimes you are asked to specify in which Start Menu folder you want to create the program's shortcut.
7. Click Install to begin the installation.
8. When the Completing the RapidTyping Setup Wizard screen appears, clear the Check the latest version at
rapidtyping.com check box, then click Finish.
The wizard completes the installation and should place a shortcut on the Desktop (unless you opted to not have the
program create a shortcut).
9. To start the program, double‐click the RapidTyping icon on the Desktop. Alternately, you can click Start, All
Programs, RapidTyping, RapidTyping.
Depending on which check boxes you selected or cleared during the installation, you may be able to select from several
different languages when you first open the program.
10. Select the language you want to use (this exercise uses English) and click Next.
11. Select the correct (or the closest) keyboard type for your system and click Finish.
104 8369‐1 v1.00 © CCI Learning Solutions Inc.
The installation is now complete and the program is ready to use.
12. Click the close button to exit the program.
In this exercise, you installed a local application.
Uninstalling
When you install a program, configuration information is added to the Windows registry so the operating system will
identify the installed program. If you try to remove a program by simply deleting its files using Windows Explorer, the
obsolete configuration information is left in the registry.
To properly remove a program, uninstall it using the Programs and Features Control Panel. Display the installed
programs, then in the list box, select the program you want to remove and click the Uninstall or Uninstall/Change button
that appears in the command bar at the top of the list box.
8369‐1 v1.00 © CCI Learning Solutions Inc. 105
4. Click Next.
5. Confirm the location where this program was installed (if you changed the default installation location when you
installed the program, you will need to confirm that location is accurately displayed before proceeding) and click
Uninstall.
6. Click Finish.
The program no longer appears in the list box in the Control Panel window.
7. Close the Control Panel window.
In this exercise, you uninstalled a program.
106 8369‐1 v1.00 © CCI Learning Solutions Inc.
A shortcut must be added to the Start/All Programs menu and/or the Desktop to allow users to access the
application. This shortcut must use the mapped drive described above.
If necessary, add any registry settings to the local computer required by the application.
8369‐1 v1.00 © CCI Learning Solutions Inc. 107
The main disadvantage of running an application from a network server is that all computers depend on that remote
server to be running whenever the software is needed. Servers are designed to run continuously (they are generally shut
down only for maintenance); however, in a very small office environment you may not have any servers to perform this
function. Therefore, if a desktop PC is designated to act as the application server for the group of networked computers,
then that PC must be powered on at all times or be powered up first before the others.
Cloud‐based applications are another form of networked applications. They are accessed by client systems using a web
browser. In this configuration, the application is designed to run on remote servers that are typically offered by an
external service provider. An interesting aspect of cloud‐based applications is that no part of the application is
downloaded to the local machine: the application software is designed to be used by any user at any location using any
variety of computer that is capable of running a web browser and java applets, including PC, Mac, or Linux.
There are also other configurations that allow multiple users to share an application program including remote desktop
connection and VDI. These are described in more detail later in this lesson.
Understanding Services
A service is nothing more than an application program that runs in the background. The unique characteristic of services
Objective
is that they are designed to run without any direct interaction with users. Services are generally supplied by three types
2.4 of providers: Microsoft, third‐party hardware manufacturers and software developers, and in‐house software
3.4 developers.
The software with which you are most familiar requires some kind of user interaction. Specifically, you decide when to
start and exit the software, and you enter various commands and data into the program as you use it. In contrast, a
service does not have any interaction with the user, it starts automatically when the computer is powered up, stops
automatically when the system shuts down, and is designed to communicate with other devices or systems. It is these
characteristics that make them ideally suited for enterprises with many complex systems. For example, during a recovery
from a power outage, system operators are usually very busy working through checklists to bring all systems back online.
Services are exceptionally easy to handle – the operators simply ensure the server is successfully powered on; the
services will automatically start up on their own and no one needs to log in to press a Start button, for example. This
level of simplicity ensures that services become available as quickly as possible and avoids failures caused by human
error. As a result, corporate in‐house developers predominantly design software to run as services or other similar
autonomously‐run software on servers.
108 8369‐1 v1.00 © CCI Learning Solutions Inc.
Microsoft also provides many services required to support core operating system features, such as Web serving, event
logging, file serving, printing and error reporting.
Microsoft‐developed services with which you may be familiar include:
Cryptographic Provides for the management of digital certificates for authentication and encryption.
services
DHCP client Allows a system to receive an IP address from a Dynamic Host Configuration Protocol (DHCP)
server on a network. Each system on a network needs an IP address.
Encrypting File Provides file encryption technology used to store encrypted files on NTFS file system volumes.
System (EFS)
Netlogon Used to log into an Active Directory Domain Services domain. Without this service, you cannot
join a machine to a domain.
Print Spooler Provides local and network printing queues enabling a single printer to handle more print jobs
than its internal memory would allow. If you want to share a printer on your machine, you must
run this service.
Remote Desktop Allows a user to connect to and manage a remote computer.
Services
Task Scheduler Monitors the system for scheduled tasks and executes them at the defined time.
Windows Event Log This service logs (records) specific events that you can view with the Event Viewer.
Windows Firewall Provides a software firewall to prevent unauthorized users from gaining access to the computer
through the Internet or a network connection.
Windows Update Enables the detection, download and installation of updates for Windows and other programs.
Third‐party software such as antivirus software are also designed as Windows services that run silently in the
background, but generate pop‐up messages to alert you when necessary. Hardware manufacturers may also supply
services to be installed on your computer to work in conjunction with the equipment that you purchased. For example, a
network scanner is designed to efficiently scan large volumes of paper documents into images. Because the scanner is
not connected directly to any computer, there must be a method of transferring the images to the correct destination. If
the software for performing this function is embedded into the hardware, it becomes more difficult and time‐consuming
to upgrade it. But if the manufacturer takes an alternate path by designing the software to run as a service under
Windows, upgrades are easier and faster.
If you examine the list of services running on your computer, you will be surprised at how many there are. The particular
services that are installed and running on a Windows machine varies from system to system based on the type of
software and features that are installed. To view the services on a system, click Start, then type: services.msc in the
Search field to open the Services snap‐in. (A snap‐in is a special type of administrative tool.)
8369‐1 v1.00 © CCI Learning Solutions Inc. 109
The downside is that each running service consumes system resources and adds to system overhead, and each service
may be in one of several states at any given time. These states include stopped, started, and paused. Notice that in the
Services snap‐in shown above, only certain services are running (Started). If your computer is experiencing very sluggish
performance, you should review the running services; you may have installed some of them with devices or other
software that you are no longer using.
You can also access Services through the Computer Management console: click Start, right‐click Computer, select
Manage, then locate and expand the Services and Applications node in the console tree. (You will learn about the
Computer Management console and snap‐ins a little later in this lesson.)
Startup Types
There are four startup types for Windows services:
Automatic The service will start automatically when the operating system starts.
Automatic The service will start automatically after all the services configured for Automatic start. That is, the
(Delayed Start) startup of the service is delayed briefly to allow other services to start first.
Manual The service will not start automatically, but it may be started when needed by a user or by an
application that requires it.
Disabled The service will not start automatically and cannot be started manually. You can disable a service to
optimize operating system performance, but you must be certain that the service is not needed;
otherwise you inadvertently cause system failures or other problems.
Even if they start successfully, services may fail from time to time. If a service fails, Windows supports various recovery
actions. These include restarting the service, running a program, restarting the computer, or doing nothing.
Service Accounts
When you log into a computer as an end user, you are entering your security credentials so that Windows will
understand which resources you are allowed to access and what type of access to grant you. However, automatic
services (those with a startup type of Automatic) will start immediately when a computer is powered on, so they need
their own logon ID to present as security credentials to Windows.
For example, a service may attempt to perform any of the following operations:
Read and write registry entries
Access remote servers
Access internal system hardware
Read and write files from or to the file system
You must, therefore, ensure that a service uses an account that has sufficient privileges to perform the operations that it
is designed to perform.
To enter or change the logon ID, right‐click the service and click Properties, then select the Log On tab:
You can specify either a user account (e.g. your own ID) or one of the Windows special accounts as the logon ID. If you
want to use on of the Windows internal accounts, you can choose any of the following:
110 8369‐1 v1.00 © CCI Learning Solutions Inc.
The Local System account – represented as NT AUTHORITY\LocalSystem. This account has full authority and access
to everything on the local computer, including accessing the network. You should avoid using this account because
it has unlimited access privileges on the computer.
The Network Service account – represented as NT AUTHORITY\NetworkService. This is a limited service account
with network access rights. It is similar to a standard user account’s access privileges on the local computer.
The Local Service account – represented as NT AUTHORITY\LocalService. This is a limited service account similar to a
standard user account on the local computer, but with no network access rights.
All of these special accounts are configured with a null password.
In an enterprise environment, you should avoid using any of these Windows service accounts. The security policies in
some enterprises may go further and actually prohibit their use because a misbehaving service or a security attack on the
service can cause damage to the computer or other systems on the network. Instead, you should request that a
dedicated user account be created in the enterprise Active Directory with sufficient access privileges to run these
services. For your own home computer, you should use the Local Service account.
You use the Recovery tab to specify how the computer responds when the service fails. Notice that you can specify what
action to take after the first, second and subsequent failures.
8369‐1 v1.00 © CCI Learning Solutions Inc. 111
You use the Dependencies tab to view service dependencies. Notice that the dialog box shows both which components
the selected service depends on, and any components that depend upon it.
112 8369‐1 v1.00 © CCI Learning Solutions Inc.
The file type for a snap‐in is Microsoft Common Console Document, and the file name extension is .msc. Most snap‐ins
are located in the C:\Windows\System32 or C:\Windows\Winsxs directory. Several of the tools in the Administrative
Tools folder in the Control Panel, such as Computer Management, Event Viewer, and Task Scheduler, are MMC snap‐ins.
The Computer Management snap‐in is actually a collection of MMC snap‐ins, including the Device Manager, Disk
Defragmenter, Internet Information Services (if installed), Disk Management, Event Viewer, Local Users and Groups
(except in the home editions of Windows), Shared Folders, and other tools.
The Computer Management snap‐in is key for configuring and controlling remote machines, and it is used to configure
Remote Desktop Connections, which you will read about later in this lesson.
Other commonly‐used MMC snap‐ins include:
Microsoft Exchange Server
Active Directory Users and Computers, Domains and Trusts, and Sites and Services
Group Policy Management, including the Local Security Policy snap‐in included on all Windows 2000 and later
systems. (This snap‐in is disabled in the home editions of Windows.)
Services snap‐in, for managing Windows services
Performance snap‐in, for monitoring system performance and metrics
Event Viewer, for monitoring system and application events
Adding snap‐ins to the console is as easy as selecting them from a list box. The combination of a snap‐in and the MMC is
also referred to as a console.
8369‐1 v1.00 © CCI Learning Solutions Inc. 113
3. In the Available snap‐ins list box, click Computer Management, then click the Add button. When prompted to
select the computer you want the snap‐in to manage, ensure that Local computer is selected, then click Finish.
4. Click OK to close the Add or Remove Snap‐ins dialog box. The Computer Management snap‐in is now added to the
MMC.
The left pane of the console is called the console tree. The tree always begins with the console root and currently
includes one node – the Computer Management node.
5. In the console tree, expand the Computer Management node, expand the System Tools node, expand the Local
Users and Groups node, then click Users. (Note that the Users and Groups node is unavailable in Windows 7 Home
Premium edition. It displays only in Windows 7 Professional, Ultimate/Enterprise.) The middle pane is the display
area. It displays information related to the node selected in the console tree. It currently displays the user accounts
on the local system. The right pane is the Actions panel. Various available actions display here depending on what is
selected in the left or middle pane.
6. In the Actions panel, click More Actions to display a menu of possible actions. Notice that you can add a new user.
7. Press ESC to close the menu.
114 8369‐1 v1.00 © CCI Learning Solutions Inc.
8. In the display pane, click one of the user accounts. Notice that the user name and additional actions now display in
the Actions panel.
9. Display the possible actions for the selected user account. Notice that you can set a password, delete or rename the
account, or view all of account's properties. In the More Actions menu, select Properties to open the <user>
Properties dialog box and click the various tabs to view the properties for the current account.
10. Click Cancel to close the Properties dialog box.
You can add as many snap‐ins as you like to a MMC.
11. In the File menu, click File, Add/Remove Snap‐in to open the Add or Remove Snap‐ins dialog box.
12. In the Available snap‐ins list box, click Services, then click the Add button. When prompted to select the computer
you want the snap‐in to manage, ensure that Local computer is selected, click Finish, then click OK to close the Add
or Remove Snap‐ins dialog box. (You will work with local services shortly.)
13. In the console tree, collapse the Computer Management node.
14. In the menu, select File, Save As to open the Save As dialog box.
15. Navigate to the Desktop, type: MyConsole as the File name, then click the Save button to save the custom MMC
to the Desktop.
16. Close the MyConsole console, click Yes to save the current settings. Note that the file is saved as MyConsole.msc.
In this exercise, you created a custom MMC.
Group Policy
You were briefly introduced to Group Policy earlier in this lesson. Group Policy is a feature in Windows that allows
Objective
system administrators to manage users' access to programs, Windows features, and even hardware.
3.1
Group Policy is used to manage systems in Active Directory domains. In Windows Server 2008 R2, administrators use a
MMC snap‐in called Group Policy Management Console (GPMC) to create and modify policies.
Microsoft has also released a tool called Advanced Group Policy Management (AGPM), which is available to any
organization that has licensed the MS Desktop Optimization Pack (MDOP). This advanced tool allows administrators to
institute a check in/check out process for modification of Group Policy Objects. That is, several administrators can work
on various GPOs, and the tool will track changes to Group Policy Objects. To use this tool, you must license all Windows
Active Directory clients for MDOP.
8369‐1 v1.00 © CCI Learning Solutions Inc. 115
To modify a policy's setting, double‐click it to open its properties.
116 8369‐1 v1.00 © CCI Learning Solutions Inc.
4. In the display pane, click the Edit policy setting link to edit the setting.
5. Select Enabled, click Apply, then click OK.
6. Minimize the Local Group Policy editor window, open the Control Panel, then open the Programs and Features
page. You are not able to use the features of this Control Panel page.
8369‐1 v1.00 © CCI Learning Solutions Inc. 117
7. Close the Control Panel, then restore the Local Group Policy editor window.
8. Change the policy setting back to Not Configured, click Apply, then click OK.
9. Open the Control Panel once more and open the Programs and Features page. This time, you are able to use the
features on the page.
10. Close the Control Panel.
11. Close the Local Group Policy editor.
In this exercise, you edited a Group Policy setting and observed the results.
Windows PowerShell
Another management interface available in Windows 7 is Windows PowerShell 2.0. PowerShell is a
task‐based command‐line shell and a scripting language rolled into one. PowerShell is designed MMM
especially for system administration. PowerShell is similar in appearance to a command prompt Taking
window, but is much more powerful because: PowerShell for
you can use it to automate tasks, and a test drive
you can use it to run those automated tasks on both local and remote systems.
Consider for a moment the steps required to set the new company intranet home page as the home page on your
browser. There aren't many steps involved – you would open the browser, type the URL of the intranet home page into
the Address bar, then you would open the Internet Options dialog box and click the Use Current button on the General
tab to set the page as the browser home page. You could then click OK and close the browser. It would probably take less
than a minute.
Now, how long would it take to set the home page on 10 systems in your department? How long to reconfigure the
browsers on 100 systems in your building? How long would it take to reconfigure the browsers on 15,000 systems across
the enterprise? Here is where the power of scripting becomes apparent: by using Windows PowerShell, you can create a
simple script that sets the new home page and then send the script to (and run it on) all the systems that require it – all
in a matter of minutes.
PowerShell is an interactive shell that looks similar to the command prompt window (in fact, you can execute the same
commands you can enter at the command prompt); you can enter commands and retrieve information.
Unique to PowerShell are cmdlets (pronounced "command‐lets"); these are the native commands in PowerShell, and
they follow a <verb><noun> naming pattern. For example, the cmdlet Get‐Process (shown in the following figure)
retrieves a list of all processes running on the machine. The cmdlet Get‐Service retrieves a list of all services running on
the machine. The cmdlet Get‐Help displays help about PowerShell cmdlets and concepts.
You use cmdlets to carry out specific system functions, such as managing services, editing the registry or reviewing event
logs.
118 8369‐1 v1.00 © CCI Learning Solutions Inc.
PowerShell also includes a task‐based scripting language, which can perform complex operations. You can issue cmdlets
in PowerShell or develop your own scripts to be run on a particular machine or remote machines. You can also use
PowerShell to automate many of the same tasks you perform using the Group Policy Management Console. To help you
perform these tasks, Group Policy in Windows Server 2008 R2 provides more than 25 cmdlets.
To open a Windows PowerShell session, click the Start button, click All Programs, double‐click Accessories, double‐click
Windows PowerShell, then click Windows PowerShell.
8369‐1 v1.00 © CCI Learning Solutions Inc. 119
The Remote Desktop Connection window has several tabs for the various options:
The General tab identifies:
Computer
Name of the host computer that you want to connect to.
User name
User ID to use for logging into the host computer.
Allow me to save credentials
An option to save the host computer name, your logon ID, and
your password to save the effort of entering this data again in
the future.
Connection settings
An option to save the RDC settings to this host computer as a
file. You can then double‐click on this file (e.g., on the
Windows Desktop) to simplify the task of connecting to this
host computer.
The Display tab identifies:
Display configuration
Selects the size of the screen on which to display the host
computer’s monitor output. This is similar to connecting a
different‐sized monitor to your computer; the hardware will
automatically adjust the display area to the amount of space
available. Moving the slider bar to the far right will cause the
host computer display to take the full screen of your local
display monitor.
Colors
Selects the color range to display the host computer’s monitor
output. A lower‐quality setting reduces the amount of data
sent through the network, which is beneficial for low‐
bandwidth lines such dial‐up modem connections.
Display the connection bar when I use the full screen
If selected, the connection bar below is displayed at the top
when in full screen mode. The host computer name displayed
here will remind you that you are interacting with that
computer and not your local client computer.
RDC (version 6.0 and higher) can support high‐resolution monitors up to 4096 x 2048 pixels by using the /w(idth) and
/h(eight) modifiers when launching the RDC software. It is also capable of spanning across multiple monitors, by using the
/span modifier when launching the RDC software.
120 8369‐1 v1.00 © CCI Learning Solutions Inc.
The Local Resources tab enables or disables features:
Remote audio
Enables or disables audio output from the host computer to
play on your client computer, and audio recording to be sent
to the host computer.
Keyboard
Enables or disables the Windows key combinations on your
local keyboard to be sent to the host computer.
Local devices and resources
Makes locally‐connected devices such as printers, Windows
Clipboard, local hard drives, and USB devices available for use
by the host computer in a process called redirection.
USB devices that are redirected will not be available for use by
the local computer until the Remote Desktop session has
ended. Before redirecting USB devices, you should be sure
they are not actively in use on the local computer, or data loss
may occur.
Additionally, each device you redirect will increase the amount of
data exchanged with the host computer and therefore increase
the load on the network.
The Programs tab allows you to select specific application
software to run immediately after connecting to the host
computer. Note that if this option is specified, the host
computer will run only this software; when you exit from the
software, the connection will also terminate.
8369‐1 v1.00 © CCI Learning Solutions Inc. 121
The Advanced tab has the following settings:
Server authentication
This is used to verify that you are connecting to the correct
host computer.
Connect from anywhere
This is used to connect to the Remote Desktop Gateway server
in a Remote Desktop Services (RDS) installation. This topic will
be discussed in more detail shortly.
To enable other users to use RDC to connect to a Windows Server 2003 computer, you must enable the logon IDs of all
users who are permitted to connect to the computer. This is a security feature to prevent a server from being accessible
to everyone by default; you must explicitly add the authorized users:
1. Click the Start button, then click All Programs, Administrative Tools, Computer Management.
2. In the Computer Management window, expand the Local Users and Groups tree and click Groups.
122 8369‐1 v1.00 © CCI Learning Solutions Inc.
3. In the right pane, double‐click Remote Desktop Users to view the properties.
4. Click Add in the Remote Desktop Users Properties window.
5. Enter the logon IDs of the user(s) and click OK.
On a Windows Server 2008 (or 2008 R2) server, any user identified as an administrator is automatically allowed to
RDC to the server.
In a home or small business network, the user IDs must be added to the list of local users before they can be added
as remote desktop users.
8369‐1 v1.00 © CCI Learning Solutions Inc. 123
In enterprise networks, user logon IDs are a little more complex because most enterprise networks use Active
Directory domains, and most, if not all, computers will be part of the enterprise domain. In this case, the From this
location field must contain the domain name. Alternatively, the user ID must be prefaced by the domain name (e.g.,
domainname\userID). In an enterprise, you should use domain IDs as much as possible to take advantage of the
improved security and easier administration provided by Active Directory.
The completed Remote Desktop Users Properties window now lists all authorized users.
On a Windows 7 or Windows Server 2008 computer, RDC is turned off by default. You must both enable it and add
the users to the RDC list:
6. Click the Start button, right‐click Computer, and click Properties.
7. Click Remote settings in the left pane to display the System Properties dialog box.
8. Enter the administrator password in the User Account Control box if necessary.
9. Click the Remote tab.
Once the servers or host computers are set up, you can initiate the RDC session using these steps:
124 8369‐1 v1.00 © CCI Learning Solutions Inc.
10. On your computer, click Start, All Programs, Accessories, Remote Desktop Connection.
11. At the Remote Desktop Connection dialog box, enter the name of the host computer to which you want to
connect.
12. If necessary, click Options and change any of the connection options.
13. Click Connect.
If the host computer is running and responding to RDC requests, the Log On to Windows dialog box is displayed on
your monitor. If you do not enter anything into this window for one minute, it will time out and close automatically.
Note that RDC requires that the host computer’s IP address be reachable from your IP address. For example, if your
computer and the host are in the same enterprise‐wide network, then you will be able to establish the connection.
If you are at home or working in a hotel room, then you will not be able to access the host computer at your
workplace because the latter will be behind the corporate firewall; you will need to establish a VPN (Virtual Private
Network) connection first. Alternatively, you can configure your RDC to connect using the Remote Desktop Gateway
server (described in more detail below). Similarly, if you are using your work computer, you will not be able to use
RDC to connect to your computer at home because your home computer will likely be connected to a router with a
built‐in firewall.
If the host computer is joined to a domain (authenticated using Active Directory) in an enterprise network, the Log
On to Windows dialog box will also display the Log on to field for the domain name:
8369‐1 v1.00 © CCI Learning Solutions Inc. 125
After you have successfully logged in, the Desktop of the host computer will display (if Start the following program on
connection was not specified as an option). For example, the following screen capture shows a Windows Server 2003
RDC session displayed on a Windows 7 Desktop.
On the server side, you can identify any users who are currently connected. Click Start, All Programs, Administrative
Tools, Terminal Services Manager. The Console session is the keyboard, mouse, and monitor devices that are connected
directly to the server hardware. These devices are usually accessible only to technicians because servers are generally
locked in a small room at the back of an office, retail store, or warehouse, or are located in an air‐conditioned data
center with many other servers stacked on racks.
126 8369‐1 v1.00 © CCI Learning Solutions Inc.
In summary, remote desktop connection is a useful tool that allows you to operate a computer located elsewhere in the
network. All hardware, application software, and data that you access and control during the remote session reside on
the host computer. The client computer simply acts as an extension of the monitor, keyboard, and mouse to the host
computer. Because RDC does not require much processing power to run, your client computer does not need to be a
very powerful computer.
Application Virtualization
Microsoft Application Virtualization (App‐V) runs designated application software in a virtual environment. Like MED‐V
Objective
(which you learned about in Lesson 1), App‐V is designed to allow enterprises to deploy applications by minimizing
3.5 conflicts with the operating system environment.
MED‐V is designed to eliminate conflicts between application software and the operating system (and the hardware
underneath) by creating a virtual machine environment in which the application is designed to work.
However, conflicts can also occur between different applications running on the same system.
In the enterprise environment, application software can be highly specialized and require specific versions of third‐party
drivers and utility software (e.g., IIS, java, .NET, or SQL Server). If a server hosts two (or more) applications that depend
on these external utilities, a conflict can occur if for example one application requires that the external utilities to be
upgraded to a newer version while other applications are not compatible with the newer versions. To prevent these
conflicts, enterprises usually install only one application on each server. This general rule is one of the main reasons for
the rapid proliferation of servers in data centers.
8369‐1 v1.00 © CCI Learning Solutions Inc. 127
App‐V
App‐V is a Microsoft product designed to prevent conflicts between applications by sequencing (or publishing) an
application to a client computer. To the user, the sequenced application appears to be installed on the local machine. In
the background, however, the application is streamed from a central server to run in a virtualized sandbox on the user's
computer. (Streaming means that the application software is retrieved to your computer only when it is needed.)
A virtualized sandbox is a self‐enclosed environment, kept separate from the contents on the rest of the computer. For
example, most applications that are locally installed on a computer put entries into the registry. App‐V applications do
not affect the computer’s registry because they run inside a sandbox.
Unlike a virtual machine such as Microsoft Virtual PC, the App‐V runtime environment does not have an operating
system installed and will run only one application inside it. However, your computer can access and run many App‐V
applications at the same time. This design feature allows a user to run Word 2003, Word 2007, and Word 2010 all at the
same time, as an example.
Normally, users will uninstall the older version of MS Office products when upgrading to a new version in order to
prevent conflicts between the versions. With App‐V, users can run any combination of applications that are individually
compatible with the locally‐installed operating system, but may conflict with each other.
Once installed, the App‐V application will appear in the Start, All Programs menu like any other locally installed
application. When the program is started, it will also behave like a locally installed application – able to open and save
data files on local or network hard drives. The application can also be configured to run in “standalone” mode; that is, it
can be used even when there is no network connection to the App‐V central servers.
To publish an application for App‐V, system administrators must prepare it using the Application Virtualization
Sequencer. This sequencing process is required to convert the application software into the special format used by
App‐V.
Once the package is created, the system administrator will configure the deployment settings to run in the operating
systems that are used by the various users:
128 8369‐1 v1.00 © CCI Learning Solutions Inc.
After the virtualized package is created, it can be deployed using a centralized streaming server (using either the App‐V
Management Console or the System Center Configuration Manager) or manually installed on client computers. The
system administrators must also use Active Directory to assign the application to users. To deactivate the App‐V
application, they simply remove that assignment.
8369‐1 v1.00 © CCI Learning Solutions Inc. 129
On the client computers, the App‐V Client connects to the App‐V server to obtain a list of all available applications
accessible by the current user.
The following screen capture shows the application XML Notepad 2007 available in the Start, All Programs menu. Note
that there is no obvious indication that it is an App‐V application:
One of the Microsoft websites offers a hands‐on demonstration (called virtual labs) of setting up, managing, and using
App‐V. Go to http://technet.microsoft.com/en‐us/virtuallabs/ and select the Windows 7 link.
In summary, App‐V applications are installed on a centralized server, and then streamed down to run on client
computers on demand. When running on the client computer, each of these applications runs in its own sandbox in
order to avoid conflicts with other App‐V applications or with locally installed applications running at the same time.
Even though these applications run in a sandbox, they access the hardware on the local computer, have access to all data
on local and network hard drives, and appear in the same Start, All Programs menu as locally installed applications.
130 8369‐1 v1.00 © CCI Learning Solutions Inc.
Configuring and maintaining applications on a central server (or bank of servers) can be substantially easier than
installing and upgrading software on end user systems scattered throughout an enterprise. When an application update
becomes available, the appropriate server is updated and all clients automatically use the updated application.
Provisioning Remote Desktop Services requires a bank of very powerful servers that can handle hundreds of
simultaneous users. RDS was designed to address three main areas: load balancing, security, and licensing.
Remote Desktop Services in Windows Server 2008 R2 includes RemoteApp and Remote Desktop Connection, which
enables you to make applications or virtual desktops that are accessed remotely through Remote Desktop Services
appear as if they are running on the end user's local computer. These programs are referred to as RemoteApp programs.
Instead of being presented to the user in the desktop of the RD Session Host server, the RemoteApp program is
integrated with the client's desktop. The RemoteApp program runs in its own resizable window, can be dragged between
multiple monitors, and has its own entry in the taskbar.
RemoteApp
Another way of publishing a virtualized application to end users is to use the remote desktop protocol (RDP). As is the
case with App‐V, a client computer can access and run many different RemoteApp applications. Unlike App‐V,
RemoteApp applications actually run on a server within the Remote Desktop Services infrastructure. On the client
computer, the user sees the results of the application that is actually running on that remote server.
8369‐1 v1.00 © CCI Learning Solutions Inc. 131
To use a RemoteApp application, you must first sign in to the Enterprise Remote Access using Internet Explorer.
Once you are validated as a user, the web page displays the RemoteApp applications that you are permitted to access:
When you run a RemoteApp application for the first time on a computer, a warning message may display asking you to
verify that you are connecting to the correct servers.
132 8369‐1 v1.00 © CCI Learning Solutions Inc.
The system administrators use the RemoteApp Manager to set up the applications that will be available for publishing.
The main screen lists the applications that have been installed in the Remote Desktop Session Host servers:
8369‐1 v1.00 © CCI Learning Solutions Inc. 133
Adding more applications to the list is as simple as selecting the checkbox in a wizard:
From this list, the individual applications are assigned to individual or groups of users. This list controls which RemoteApp
applications are displayed for each user.
In summary, RemoteApp applications are installed on centralized servers and users use a specialized version of Remote
Desktop Connection to see which ones are available for them to access. When a user selects an application, it runs on a
centralized server using the hardware and network connections on that server. The user’s computer is used only to run
Internet Explorer to control the application.
134 8369‐1 v1.00 © CCI Learning Solutions Inc.
RDS Infrastructure
A key feature of RDS is the ability to manage and deliver virtualized applications across an enterprise. To accomplish this,
it employs an infrastructure that can provide load balancing, security, and licensing.
The entry point for a user (RD Client) into the RDS infrastructure is a simple URL entered into a web browser such as
Internet Explorer in the following format: https://domainname/rdweb. For example, a user could enter the following
URL: https://finance.companyname.com/rdweb.
This URL is sent to the Remote Desktop Web Access (RDWA) server, which returns a list of the RemoteApp programs that
this user is authorized to use. Initially, the user is prompted to enter his credentials (i.e., user name and password), which
are validated against the Active Directory database. Entries in Active Directory are used to assemble the access control
list for this user (that is, to determine which objects the user may access). The access control list is then used as a filter
on the list of all available RemoteApp programs so that only programs to which the user has access will appear. For
example, an accounts payable clerk in the Finance division may see only five programs listed in a menu, when there are
perhaps hundreds of programs that exist for all Finance users.
If the user is outside the corporate firewall (e.g. employee working from home, contract worker, or vendor) the
connection request is directed from the Internet to the Remote Desktop Gateway (RDG). Here, the request is screened to
verify that it came from an authorized user.
The role of the Remote Desktop Connection Broker (RDCB) is similar to that of a telephone exchange; when a remote
user initially makes a connection request, the RDCB will direct the request to the correct server. Once the access request
is validated, the RDCB is responsible for maintaining the integrity of the connection. While this may appear to be a simple
task, keep in mind that there could be thousands of connections at any given time.
The Remote Desktop Session Host (RDSH) is where the application software is actually installed. It is responsible for
loading the software into RAM, executing the instructions, and generating the output to send back to the user. The same
application may be installed on multiple physical servers to serve multiple users at the same time. A load balancer will
typically be used to even out the workload across these servers and ensure that response time is minimized for
everyone. When load balancing technology is used, users will not notice if a physical server crashes or becomes
unavailable for any reason because the workload will simply be redistributed among the remaining servers.
The Remote Desktop Virtualization Host (RDVH) is the server that runs the Hypervisor‐V software that creates the virtual
machines (VMs). When serving a VM‐based request, an associated RDVH will automatically start an intended VM, if the
VM is not already running, and a user will always be prompted to enter credentials when accessing a virtual desktop.
However, a RDVH does not directly accept connection requests and it uses a designated RDSH as a “redirector” for
serving VM‐based requests. The pairing of a RDVH and its redirector is defined in Remote Desktop Connection Broker
(RDCB) when adding a RDVH as a resource.
8369‐1 v1.00 © CCI Learning Solutions Inc. 135
What is VDI?
Virtual Desktop Infrastructure (VDI) has been described in some literature as "delivering desktops from the data center."
VDI occurs when enterprise desktop computers are virtualized (moved onto servers in the data center), and then
presented to users over the network.
All the benefits of virtualization apply to virtualized desktops. For example, an enterprise with 2,000 desktop and other
types of computers can reduce them to 200 servers (assuming each server hosts 10 VMs). This reduction quickly results
in significant savings in electricity and air conditioning costs. Although office computers do not require special cooling
requirements, collectively they generate a large amount of heat that places an extra burden on a building’s HVAC
(Heating, Ventilation, And Cooling) system.
The provisioning process is also drastically simplified: a request to add a new VM or to upgrade a VM can be done in
minutes with virtual equipment. This can provide a strategic advantage that allows a business to rapidly ramp up or
down in a department or business line. For example, a call center can be expanded in several weeks instead of several
months because less equipment must be physically purchased, installed, and tested.
Every user in the enterprise can have his or her own VM, and each VM is unaware that it is only one of many other VMs
hosted together on the same physical server.
136 8369‐1 v1.00 © CCI Learning Solutions Inc.
Once VDI is implemented, end user systems are typically replaced with thin‐client machines, resulting in significant cost
savings.
The big difference with virtualized desktops, compared to a using a physical computer, is that the user’s data, operating
system, and internal computer components are now stored inside a virtual machine (VM) running in the IT central data
center. A large scale hypervisor such as Microsoft Hyper‐V Server is used to host the VM’s.
VDI cannot be implemented by simply creating a large number of VM’s, and making them available on the network. VM
technology provides a number of benefits including cost savings by combining many desktop machines together.
Microsoft did not implement VDI as a single product because it is too large and complex. Instead, VDI is an umbrella term
for many products working together. Applications may be delivered to users using any combination of RemoteApp,
App‐V, and MED‐V, depending on the situation and the needs of the users.
These products allow system administrators to make applications available to users quickly, and allow them to resolve
incompatibilities between applications and hardware – keeping users happy and productive. With these Microsoft
products in place, VDI can now be implemented; application software need no longer be installed directly on user
computers!
http://au.wyse.com/products/hardware/thinclients/Z90/index.asp http://wyse.com/products/cloud‐clients/mobile‐clients/x90m7
Here is a comparison between a regular “fat client” against a typical thin client computer:
Component Typical Desktop PC Wyse V30LE
CPU Two (or more) core CPU Single core 1.2 GHz CPU
RAM 4 GB (gigabytes) and up 512 MB (megabytes)
Monitor connectors DVI or VGA DVI, but able to support 2 monitors
Hard drive 500 GB hard drive 128 MB flash drive
DVD drive Yes None
USB ports 6 3
Power consumption 150 watts 13 watts
Price $500 $500
Windows operating system Included Embedded into the firmware
This table illustrates that a thin client computer is not very powerful; but since remote desktop places very low demands
on the user’s hardware, this is not a concern. In fact, there are very striking similarities between thin client computers
and the ancient “dumb terminals” that were connected to large mainframe computers.
An alternative money‐saving approach would be to use near‐obsolete computers (that cannot meet the heavy demands
of current application software) as the client systems.
8369‐1 v1.00 © CCI Learning Solutions Inc. 137
Why would an enterprise purchase specially‐built thin client computers when they are the same price as full desktop
computers? One compelling reason is that they are very durable because there are no moving parts inside, such as a hard
drive or a DVD drive. Regular computers and laptops suffer breakdowns and failures because of heat buildup or rough
handling. Thin clients are designed to operate in harsh conditions such as factories, warehouses, and retail shops where
dust, dirt, heat, and power fluctuations are common. The Mean Time Before Failure (MTBF) rating of the Wyse V30LE is
150,000 hours (17 years of continuous operation at 24 hours per day). The MTBF of a typical PC in the same work
environment is 3 years.
A thin client device also uses far less power than a fat client PC. Therefore they are more environmentally friendly and
cost less to operate.
Another advantage of VDI is that thin client computers are well‐suited for handling highly sensitive data. In VDI, all the
data stays in the data center; none of it is stored on the local machine. Therefore, if a thin client device is lost or stolen,
there is no loss of confidential data.
Extended further, thin client computers do not need to be dedicated to specific end users; any user can use any thin
client. When a user logs into a thin client, the VDI system will activate the correct VM for that user based on login ID. This
is convenient for workers who wish to continue working from home after the end of the normal work day, or for mobile
professionals switching between their office and mobile thin client computers.
However, virtualized desktop technology is not ideal for every user. Workers who place very heavy demands on the
processing power of their systems should continue using dedicated physical computers. As with virtualized servers,
hypervisors and other VDI components impose additional processing overhead on the servers to manage the many VM’s
in the system. The VMs, therefore, have poorer performance than equivalent physical equipment. For most users, the
performance penalty is not noticeable (assuming that very powerful hardware is used to support VDI).
Another significant disadvantage of VDI is its dependence on the network infrastructure. If the network is having
throughput problems (capacity) or is shut down, no one will be able to work.
Lesson Summary
In this lesson, you explored some of the tools and features that allow an administrator to manage users and computers.
You are now able to:
Explain administrator and standard user accounts.
Describe the function of the User Account Control feature and describe its prompts and elevation levels.
Describe the process of local, network, and group policy application installation.
Install and remove application software.
Describe the function and characteristics of services, and identify startup types, service accounts and service
dependencies.
Describe the advantages provided by remote management tools.
Explain the Microsoft Management Console (MMC) and create a custom console.
Explain how group policy is useful for remote management.
Describe Windows PowerShell.
Describe the function of Remote Desktop and explain the necessary configuration settings and underlying
technologies.
Explain application virtualization and describe the features and functions of App‐V,
Remote Desktop Services, and RemoteApp. MMM
Explain Virtual Desktop Infrastructure (VDI). Go online for
Additional
Review and Case
Scenarios
138 8369‐1 v1.00 © CCI Learning Solutions Inc.
Review Questions
1. Amy is logged on as a standard user and begins to download and install a device driver. What will happen?
a. The device driver will install successfully c. UAC will ask if she wants to continue
b. UAC will prompt for an administrator password d. She will not be allowed to install the driver
2. Eloise is trying to run a program, but UAC displays a message that the program has been blocked by the system
administrator. What should Eloise do?
a. Click Yes to run the program anyway c. Contact the system administrator
b. Enter an administrator password d. Try running the program from the command prompt
3. Dean is about to deploy an application to 5,000 users using Group Policy. What type of installation file must he place on
the network share?
a. a .MSI file c. a cmdlet
b. a .msc file d. a .cpl file
4. Mike wants to create a custom MMC that he plans to use for monitoring system and application events. Which of the
following snap‐ins should he add to his console?
a. Task Scheduler c. Services
b. Performance d. Event Viewer
5. Thom is logged on as a standard user and is about to change his account password. What must he provide in order to
successfully change his password?
a. His current account password c. A password reset disk
b. An administrator password d. He does not need to provide anything
8369‐1 v1.00 © CCI Learning Solutions Inc. 139
140 8369‐1 v1.00 © CCI Learning Solutions Inc.
8369‐1 v1.00 © CCI Learning Solutions Inc. 141
Each track is divided into sectors, which are the smallest units of data storage with which read/write heads can work.
Each sector stores a fixed amount of user data. Traditional formatting provides space for 512 bytes or 2048 bytes of user
data per sector. Newer hard drives used 4096 byte sectors.
Contiguous sectors are grouped into clusters. A cluster is a group of sectors used as the basic unit of data storage. File
systems refer to clusters to identify the physical location of each piece of data on the disk.
Tracks
Sectors
Clusters
Partitions and Logical Drives
A hard disk needs to be partitioned and formatted before you can store data on it. A partition, sometimes also called a
volume, is an area on a hard disk that can be formatted with a file system and identified with a letter of the alphabet
(drive letter). For example, drive C on most Windows computers is a partition.
Even if you want to use only a single drive in the system, that drive must be partitioned before it can be recognized by
the operating system. Many computers are partitioned as a single partition equal to the size of the hard disk. Partitioning
a hard disk into several smaller partitions is not required, but can be useful for organizing data on the hard disk. For
example, some users prefer to have separate partitions for operating system files, programs, and personal data.
There are two types of partitions you can create on a basic disk. These are:
Primary partition Can be used to start an operating system. A basic disk can contain up to four primary partitions, or
three primary partitions and an extended partition with multiple logical drives. A primary partition
is treated as a single logical drive. In Windows 7, if you use the Disk Management snap‐in to create
partitions, the first three partitions you create are primary partitions. If you require an additional
partition, the fourth partition is created as an extended partition.
Extended partition A container that can hold one or more logical drives. A hard disk can have only one extended
partition. The extended partition itself is not formatted or assigned a drive letter. The logical
drives created within the extended partition are formatted and assigned drive letters. A logical
drive is technically not a partition (logical drives are created within the one allowable extended
partition on a disk); but the operating system treats it in the same manner it treats a partition.
Each logical drive is a volume, and is assigned its own drive letter. Logical drives function like
primary partitions except that they cannot be used to start an operating system.
If you partition a hard disk into multiple primary partitions, then you must identify one partition as the active partition.
The active partition is read first at boot time. If no active partition exists, or if the operating system files are corrupted or
missing, the computer will report error messages.
There can be only one active partition. In cases where the hard disk is partitioned into a single primary partition, then
that partition is the active partition.
Logical Drive Letters
The system drive will be identified as Drive C. Drive letters D through Z are available for assignment. Drives A and B can
be used as drive identifiers for floppy disk drives only. Drive identifiers are also assigned to CD drives, DVD drives, and
USB flash drives. They are also used to identify connections to network shares.
142 8369‐1 v1.00 © CCI Learning Solutions Inc.
Formatting
After you define a partition/logical drive, you must format it. The formatting process prepares the drive for use by the
operating system; it creates the file system root directory and the files used to track the disk space (clusters) used for
data storage. This type of formatting is known as high‐level formatting.
Note: Different file systems are used on optical media, such as CDs, DVDs and BDs. One of the oldest optical media
file systems is Compact Disc File System (CDFS). Today, most optical media uses the Universal Disk Format (UDF) file
system.
8369‐1 v1.00 © CCI Learning Solutions Inc. 143
Uses
FAT is still widely supported by most PC‐based operating systems and embedded operating systems, and is the default
file system for removable media (except for optical media such as CDs and DVDs); thus, it is commonly found on floppy
disks, memory cards, USB flash drives, PDAs, digital cameras, and mobile phones.
Up through Windows ME, FAT was also commonly used on hard disks. On Windows systems, however, its use has
declined since the introduction of Windows XP, which primarily uses the newer NTFS format.
The main reason to format a hard disk or partition with FAT32 today is to support a multiboot configuration that includes
Windows 95, Windows 98, or Windows Millennium Edition in addition to Windows 7. A multiboot configuration allows
you to install more than one operating system on a computer, and select which one you want to use when you boot up
the system.
To set up a multiboot configuration that includes one of these earlier versions of Windows, you need to install the earlier
operating system on a FAT32 (or FAT16) partition and ensure that it is a primary partition. Any additional partitions that
you need to access when using the earlier versions of Windows must also be formatted using FAT32.
The fact that NTFS uses a 64‐bit structure for tracking and managing files on disk in no way constrains its use to 64‐bit
editions of Windows. NTFS can be used in both 32‐bit and 64‐bit editions.
NTFS Versus FAT32
NTFS is the preferred file system for Windows 7. It has many benefits over the earlier FAT32 file system, including:
The ability to recover from some disk‐related errors automatically.
Improved support for larger hard disks.
Better security because you can use permissions and encryption to restrict access to specific files for certain users.
One of the primary benefits of an NTFS file system is that it allows you to secure resources. NTFS allows you to set
permission bits on system resources (for example, files and directories). With NTFS, you can protect files so that only
certain users or groups of users can read them. One group of users may be able to execute applications in a directory,
whereas another group may have full access to all the files within that directory.
Files and folders on an NTFS volume include a Security tab in the Properties dialog box, and allow you to specify either
compression or encryption as advanced attributes. Click the Advanced button in the Attributes section of the General tab
to open the Advanced Attributes dialog box.
144 8369‐1 v1.00 © CCI Learning Solutions Inc.
FAT32 doesn't have the same security‐related features as NTFS, so if you have a FAT32 hard disk or partition in
Windows 7, anyone who has access to your computer can read any file on it.
A drawback of NTFS is its overhead – it does not perform well on small volumes.
Formatting Drives
Generally, you need to format a drive only when adding storage such as a new hard drive to a computer. However, you
can format removable media as well.
For example, you could format a USB drive at the command prompt using the following command:
Format volume /FS:filesystem
Replace volume with the letter of the drive you want to format, and replace filesystem with the file system you want to
use, such as NTFS, FAT32, FAT.
You can also format a volume from Windows Explorer or from the Disk Management snap‐in.
8369‐1 v1.00 © CCI Learning Solutions Inc. 145
The system shown in the figure contains three disks. On the system shown in the figure, Disk 0 is a 300 GB hard disk,
Disk 1 is a 1 GB SD memory card, and Disk 2 is a 4 GB USB flash drive. (Note that optical media is not represented as a
disk.)
You can view the partitions on a disk by selecting the disk and using the list partition command.
Disk 0 has three primary partitions, Disk 1 and Disk 2 are each a single primary partition.
You can also use the Diskpart list volume command to display the volumes on the system.
146 8369‐1 v1.00 © CCI Learning Solutions Inc.
The list volume command shows all the volumes on the system, including those on optical media.
By comparing partition and volume size between the two figures, you can determine that the three partitions on the
hard drive are:
Volume 1 (a reserved 100 MB partition that has not been assigned a drive letter) – This volume is created during
Windows 7 installation. Because it is not assigned a drive letter, users cannot accidentally access this volume and
write or remove files on it.
Volume 2 (the C: drive)
Volume 3 (the D drive)
Additionally, Volume 4 is the SD memory card (Drive F); Volume 5 is the USB flash drive (Drive G); and Volume 0 is a DVD
(Drive E).
You can also use the Disk Management snap‐in for a graphic view of the disks, partitions and volumes on a system.
Notice that in the figure, the active partition is the 100 MB partition reserved by the operating system. When Windows 7
is installed, it creates and reserves this 100 MB partition for BitLocker information and files required for booting a system
with an encrypted system drive. (You will learn about BitLocker and encryption later in this lesson.)
You can also use the Disk Management snap‐in to format drives.
8369‐1 v1.00 © CCI Learning Solutions Inc. 147
8. Type: exit and press ENTER to exit the diskpart utility.
Next, you will identify file systems in the Disk Management snap‐in.
9. Click the Start button, then right‐click Computer and select Manage to open the Computer Management Console.
10. In the console tree, expand the Computer Management node if necessary, expand the Storage node, then click
Disk Management.
11. In the display area, click the various volumes and notice which sections are highlighted in the disk detail section at
the bottom of the window. Which file systems are in use? Does the system include a partition (with a volume name
such as Tools or Factory Image) that was added by the system manufacturer? If so, what file system is used on that
partition? Why do you think that particular file system was chosen?
148 8369‐1 v1.00 © CCI Learning Solutions Inc.
12. Close the Computer Management Console.
Next, you will view disk information using Windows Explorer.
13. Right‐click the Start button, then click Open Windows Explorer.
14. In the navigation pane, right‐click the USB flash drive and select Properties. Notice that the volume label, drive
letter and file system are indicated on the General tab of the Properties dialog box.
15. Close the Properties dialog box.
Next, you will copy files to the flash drive and inspect a few properties.
16. In the navigation pane, click Desktop, double‐click the Student Data folder in the contents pane, right‐click the
Lesson04 folder, then select Copy.
17. In the navigation pane, click the flash drive, right‐click in an empty area in the contents pane, then select Paste to
copy the Lesson04 folder to the flash drive.
18. In the contents pane, double‐click the Lesson04 folder, right‐click the Instructional folder and select Properties.
Note the three tabs that are available for the folder: General, Sharing, and Customize. The Security tab is not
available. On a FAT32 volume, there are no security options available. Notice also that there is no Advanced button
in the Attribute section of the dialog box. On a FAT32 volume, you cannot set attributes for compression or
encryption.
19. Close the Properties dialog box, then close Windows Explorer.
Next, you will convert the file system on the flash drive from FAT32 to NTFS. This exercise is for demonstration purposes
only. Normally, you would convert a hard drive partition, as flash drives function very well with the FAT32 file system.
20. Open a command prompt window.
21. Type the following command substituting the drive letter for the USB flash drive for the <drive letter> parameter:
convert <drive letter>: /fs:ntfs
8369‐1 v1.00 © CCI Learning Solutions Inc. 149
22. Press ENTER to convert the volume.
23. When the conversion is complete, open the diskpart utility again and use the list volume command to confirm that
the file system on the flash drive is now NTFS.
24. Exit the diskpart utility and close the command prompt window.
Finally, you will view the file and folder properties available on an NTFS volume.
25. Open Windows Explorer, navigate to the flash drive, and open the Lesson04 folder. Notice that all the data on the
flash drive remains intact. Converting from FAT32 to NTFS does not destroy any data.
26. Right‐click the Instructional folder, then select Properties.
Now there are four tabs in the Properties dialog box: General, Sharing, Security and Customize. Notice also that the
Advanced button displays in the Attribute section of the dialog box. (You will explore the advanced options later in
this lesson.)
27. Close the Properties dialog box for the folder, then close Windows Explorer.
In this exercise, you viewed disks and volumes, explored properties, and converted a drive from FAT32 to NTFS.
150 8369‐1 v1.00 © CCI Learning Solutions Inc.
HomeGroups
The easiest way to share files on Windows 7 client systems on a network is to create or join a HomeGroup. (Note that
HomeGroups are not available on Windows Server 2008 R2.)
A HomeGroup enables you to share documents, music, pictures, videos and printers between networked computers at
home or in a small business without using a server. All computers in the HomeGroup must be running Windows 7. By
default, the documents, music, pictures and videos folders in Windows 7 are arranged into structures called libraries. You
will learn about libraries later in this lesson. For now, it is sufficient to understand that you may see references to
"libraries" in the Windows help documentation concerning HomeGroups.
If you have Windows 7 and your system detects a new network connection (e.g. new computer started up for the first
time or you start up your laptop at the local coffee shop), you are asked to specify the type of network to which you are
connected – Home network, Work network or Public network.
MMM
Working with
HomeGroups
The Home network option is intended for use in a home environment where all computers are operating in a trusted
network. That is, it is protected from the Internet by a residential gateway (router with a hardware NAT firewall), but the
HomeGroup enables users to access shared libraries on the other computers as easily as on their own computer. The
Work network option is intended for computers in a work environment, and security requirements are higher than a
home network even though it is a trusted network. In this network, you must have your account created on a target
machine before you are allowed to access its files, whether you are logging on directly onto that computer or through
the network. If you are using your computer at a local coffee shop offering free wifi, you should select the Public network
to prevent other computers that are sharing the same wifi connection from accessing the files on your computer.
If you select Home network and a HomeGroup does not already exist on your network, you will be prompted to create
one. If a HomeGroup does exist, you will be asked if you want to join it.
When you join a HomeGroup, you specify which folders or libraries you want to share. Windows 7 automatically shares
your Pictures, Music, and Videos libraries. You can check or clear boxes to specify more or fewer. You can also specify to
share your printers.
Libraries are available in all editions of Windows 7; however, in Starter and Home Basic editions you can join a
HomeGroup but not create one. Computers that belong to a domain can join a HomeGroup but they can't share files.
These systems, can however, access files shared by others in the HomeGroup.
HomeGroups are protected by a password, and you must know the HomeGroup password before you can join. You can
display and print the HomeGroup password on the system that originally created the HomeGroup, or on any system that
has subsequently joined the HomeGroup.
8369‐1 v1.00 © CCI Learning Solutions Inc. 151
To view and print the HomeGroup password, open the Control Panel in either Large or Small icons view, then click the
HomeGroup link, then click the View or print the homegroup password link to open the View and print your homegroup
password page.
Joining a HomeGroup
When you are prompted to join a HomeGroup on your network (or when you click the HomeGroup link in the Control
Panel before you have joined a HomeGroup), the HomeGroup page appears.
152 8369‐1 v1.00 © CCI Learning Solutions Inc.
Click the Join now button to open the Join a HomeGroup dialog box.
Select or clear the checkboxes for the libraries/printers that you want to share, then click Next.
8369‐1 v1.00 © CCI Learning Solutions Inc. 153
Enter the HomeGroup password, then click Next. When you have successfully joined the HomeGroup, click Finish.
Once a system belongs to a HomeGroup, you can adjust the HomeGroup settings in the HomeGroup page of the Control
Panel.
154 8369‐1 v1.00 © CCI Learning Solutions Inc.
Controlling What is Shared
When you join a HomeGroup, libraries are initially shared with Read access – other people can look at or listen to what is
in the library, but can't make changes to the files in it. In order to make changes to files, or to paste copied files onto
another system, a user must have Read/Write access.
You can control which specific files and folders are shared, and you can control the level of access using the Share with
menu. The Share with menu can be used to control how files and folders are shared both within a HomeGroup, and
outside a HomeGroup.
To control sharing and the level of access, open Windows Explorer, select the item you want to configure, click Share
with in the toolbar, then in the shortcut menu:
To prevent the item from being shared, click Nobody.
To share the item with some people but not others, click Specific people, select each person you want to share with,
then click Add. Click Share when you are finished.
To change the level of access, select either Homegroup (Read) or Homegroup (Read/Write).
You will learn more about using the Share with menu in the next section.
Setting Up Shares
You create network shares to allow users to access local resources across the network. A share is a shared folder; that is,
it is a folder that has been configured to be available to other users on the network. There are four share types you can
create: public, basic advanced, and hidden.
Public Shares
Public shares are the Public folders in each of the four default Windows libraries. These are the Public Documents, Public
Music, Public Pictures and Public Videos folders, and they are pre‐configured to be shared.
8369‐1 v1.00 © CCI Learning Solutions Inc. 155
When you copy a file or folder into a public share, that file or folder becomes immediately available to other users on
your computer or other people on your network.
Any file or folder you put in a public folder is automatically shared with people who have access to your public folders.
You cannot restrict people from seeing or updating files in a public folder; that is, they can not only open and read those
files, but they can also modify or delete them. It is an all‐or‐nothing proposition.
Public folder sharing is turned off by default, except on a HomeGroup. When public sharing is turned on, anyone on your
computer or network can access your public folders. When public sharing is turned off, only people with a user account
and password on your computer have access.
If you need to turn on public folder sharing, open the Control Panel, open the Network and Sharing Center, then click the
Change advanced sharing settings link to open the Advanced sharing settings page. Expand your current network profile
if necessary, scroll down to the Public folder sharing section, then select Turn on sharing so anyone with network access
can read and write files in the Public folders.
You can limit public folder access to people with a user account and password on your computer by turning on Password
protected sharing (also found on the Advanced sharing settings page).
Basic Shares
You can share individual files and folders (that are not in a Public Folder) and exercise a degree of control over the type
of access granted by creating a basic share. To create a basic share, select an option in the Share with menu. In Windows
Explorer, select the item you want to share, then click Share with in the toolbar.
156 8369‐1 v1.00 © CCI Learning Solutions Inc.
You can select from the following options:
Nobody Does not share the item, or stops sharing an item that was
previously shared.
Homegroup Shares the item with your entire HomeGroup, but people in the
(Read) HomeGroup can only open the item; they can't modify or delete it.
Homegroup Shares the item with your entire HomeGroup and lets them open,
(Read/Write) modify or delete it.
Specific people Opens the File Sharing wizard, which allows you to select individual
people with whom to share the item.
You can use the File Sharing wizard to select specific people with whom to share files and folders. Click the arrow next to
the text box, select a name from the drop‐down list, then click the Add button.
After you have added a name to the list, click in the Permission Level column and select the type of permission you want
to grant. Your options are:
Read – recipients can open, but not modify or delete the file
Read/Write – recipients can open, modify or delete the file
When you have finished adding people, click the Share button.
In Windows Explorer it is easy to tell which items are shared and with whom. Select an item in the contents pane, then
look at the details pane. The state of the selected item indicates whether it is shared.
You can point to the state indicator and a pop‐up box will display the names of the individuals or groups with whom the
item is shared.
Note that there are some locations in Windows that can't be shared directly using the Share with menu. For example,
you cannot share your entire C: drive in a basic share. When you try to share locations such as these, the Share with
menu displays only one option: Advanced sharing.
Click the Advanced sharing button to create an advanced share, which you will read about in the next section.
8369‐1 v1.00 © CCI Learning Solutions Inc. 157
Advanced Shares
Advanced shares allow you to set permissions on a share with more granularity than on a basic share. To create an
advanced share, right‐click the file or folder, then select Properties to open the Properties dialog box. Click the Sharing
tab.
Clicking the Share button will open the File Sharing wizard, which you can use to create a basic share. Click the Advanced
Sharing button to open the Advanced Sharing dialog box.
In the Advanced Sharing dialog box, select the Share this folder check box. You can accept the suggested share name or
type a new name for the share.
To specify users or change permissions, click the Permissions button.
158 8369‐1 v1.00 © CCI Learning Solutions Inc.
By default, everyone will have the ability to read files on the share if you turn on sharing for those files or folders. Click
the Add button or the Remove button to add or remove specific users or groups.
Enter the name of the user or group you want to share with, then click OK to add the user or group and return to the
Share Permissions page.
8369‐1 v1.00 © CCI Learning Solutions Inc. 159
On the Share Permissions page you can select check boxes for the permissions you want to assign. When you are
finished, click OK to close the Share Permissions page, click OK to close the Advanced Sharing dialog box, then click Close
to close the Properties dialog box.
Hidden Shares
You can create a hidden shared folder by appending a ‘$’ to the end of the share name. When you use this technique,
other users will not see the share name displayed when they use Windows Explorer or the Net View command to list the
shares that are accessible on a server. To open this hidden share, you must enter the full UNC (see Mapping Drives
below) with the ‘$’ at the end; for example:
\\ANOTHERALTO‐PC\Users\AnotherAlto\Documents\ShareMe$
\\ANOTHERALTO‐PC\C$
This feature is commonly referred to as administrative shares because it is typically used by system administrators to
access the C: drive (or any other volume) directly at the root directory on the many servers that they manage. It is poor
security practice to allow users to have access to the root directory of any server, so the share is hidden and the
permissions are set to permit access only to system administrators. The term administrative share is actually a misnomer
because non‐administrative access privileges can be assigned instead of allowing full control. Hidden shares can be set up
on any folder in the folder hierarchy on any drive volume.
With the introduction of stronger security in Windows Vista and then Windows 7, this feature has been disabled by
default on any computer that is not joined to a domain. To enable it manually on a computer that is in a Workgroup
network (i.e. not part of a domain and has only local user accounts), you must use regedit and navigate to the following:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
You must then add a new 32‐bit DWORD key named LocalAccountTokenFilterPolicy and set the value to 1.
If you want to disable hidden shares, you can set the value to 0 (zero) or delete the key. (You will learn more about the
Windows Registry in Lesson 6.)
To ensure that file sharing will work, you must also verify that the File and Printer sharing option is turned on:
1. Open the Control Panel and select Network and Internet.
2. Open the Network and Sharing Center.
3. Click Change advanced sharing settings.
4. Open the Home or Work network profile, and turn on the File and Printer sharing option.
Finally, you must ensure that the computer is not connected to a HomeGroup. If the computer is connected, you can
open hidden shares on other computers but others cannot access hidden shares set up on this computer.
1. Open the Control Panel and select Network and Internet.
2. Open the HomeGroup.
3. Click Leave the homegroup.
If hidden shares is still not working, you should check that the Windows Firewall is opened for sharing:
1. Open the Control Panel and select System and Security.
2. Click Windows Firewall.
3. Click Allow a program or feature through Windows Firewall.
4. Scroll down the list of Allowed programs and features, and ensure that the File and Printer Sharing check box is
turned on for Home/Work.
160 8369‐1 v1.00 © CCI Learning Solutions Inc.
Mapping Drives
Once you have created shares, you may find it convenient to map drives to the shares to provide easy access. When you
map a drive, you create a shortcut to a network location and that shortcut is represented by a drive letter. Mapped
drives appear in Windows Explorer as if they were local drives.
The following steps illustrate how to map a network drive. Open Windows Explorer, then click Computer.
In the toolbar, click Map network drive to open the Map Network Drive dialog box.
Windows suggests a drive letter you can assign to the map. Select any available letter in the drop‐down list, then in the
Folder box, type the path of the folder or computer.
You can type a path using the Universal Naming Convention (UNC). A UNC consists of a computer name and a share
name. For example, to refer to a share named "ShareMe" in the My Documents folder on a computer named
AnotherAlto‐PC, the UNC would be:
\\ANOTHERALTO‐PC\Users\AnotherAlto\Documents\ShareMe.
8369‐1 v1.00 © CCI Learning Solutions Inc. 161
You can also click the Browse button to navigate to the
folder or computer to see the shared folders available to
you.
When you navigate to the share
folder, select it, then click OK to
add the path to the Folder box.
To connect every time you log on to your computer, select the Reconnect at logon check box. Click Finish to complete
the process. The mapped network drive now appears in Windows Explorer as if it were a local drive.
To "unmap" or disconnect a (share) drive, right‐click the share in the navigation pane, then select Disconnect.
162 8369‐1 v1.00 © CCI Learning Solutions Inc.
Understanding Permissions
Permissions are rules associated with objects on a computer or network, such as files and folders. Permissions determine
whether you can access an object and what you can do with it when you access it. For example, you might have access to
a document on a shared folder on a network. And even though you can read the document, you might not have
permissions to make changes to it.
There are two types of permissions that control the types of actions users can perform on network resources. These two
types of permissions are: share permissions and NTFS file system permissions.
Share Permissions
Share permissions are used to control who can access shared folders, and to control the actions users can perform when
they access those folders from a remote computer over the network. There are three share permissions:
Read User can view the names of files and folders within the share, view the contents of files, and execute
application program files.
Change Users can view the names and contents of files and folders, and can create new files and folders, modify
the contents of files, and delete files and folders.
Full Control Users can perform all the actions allowed by the Change permission, and they can manage permissions on
the share.
Share permissions are set on the Sharing tab of the Properties dialog box, by clicking Advanced Sharing, and then clicking
the Permissions button (see Advanced Shares topic above).
8369‐1 v1.00 © CCI Learning Solutions Inc. 163
By default, all remote users (using the Everyone group) have read access to a shared file or folder.
NTFS Permissions
If the volume is formatted as FAT16 or FAT32, you do not have the ability to set file system permissions. Therefore
anyone who logs onto that computer can view or change any of the files or folders in that volume. If the volume is
formatted as NTFS, you can protect files and folders by defining how they can be accessed and by whom. NTFS
permissions also offer more options for control access than share permissions; this will give you a greater degree of
control over what users can do with files and folders.
NTFS permissions may be:
Explicit An explicit permission is one that is set on an individual folder or file.
Inherited An inherited permission is one that is passed on from a parent folder to the files or subfolders stored within
it. By default, a file inherits the permissions of the folder in which it was created. Subfolders also inherit the
permissions of their parent folders.
Large enterprises will typically have a very large number of files and folders stored on many servers, as well as many
users who want access to them. Therefore, you should always try to keep permissions simple and easy to manage by
following two guidelines:
Assign permissions to groups of users who have similar needs instead of individual users.
Set the explicit permissions as high as possible in the folder hierarchy (i.e. closer to the root directory) of a volume.
Use inherited permissions for as many subfolders underneath as possible.
The standard NTFS file and folder permissions are described in the following table. Note that not all permissions apply to
all objects:
Permission level Description
Read Users can see the contents of a folder and open files and folders.
Write Users can see the contents of a folder, open files and folders, create new files and folders and
make changes to existing files and folders.
Read and execute Users can see the contents of a folder, open files and folders and run programs in a folder.
List folder contents Users can view contents of folders and run program files, but not read the contents of the files
contained within the folders. This permission can only be applied to folders.
Modify Users can see the contents of a folder, open files and folders, create new files and folders, make
changes to existing files and folders, run programs in a folder, and delete files and folders.
164 8369‐1 v1.00 © CCI Learning Solutions Inc.
Explicit denial of a
permission overrides the
granting of that
permission through any
other group membership
or user account.
You can also specify that a permission type be explicitly denied.
Under the NTFS file system, every object has an owner. In most cases, the person who created the file or folder is the
owner. However, if the system created the object, then the owner is the Administrators group. To change NTFS security
permissions, you must be the owner of the file or folder or have permission granted to you by the owner to change that
object’s security settings. However, any member of the Administrators group automatically has the ability to Take
Ownership of any file or folder on the system. In addition, groups or users who have been granted Full Control on a
folder can delete files and folders within that folder regardless of the permissions protecting those files and folders.
8369‐1 v1.00 © CCI Learning Solutions Inc. 165
The Effective Permissions tab now displays the permissions that apply for the selected user or group:
166 8369‐1 v1.00 © CCI Learning Solutions Inc.
Note that this tool will calculate the effective permissions that apply only to the file system. It does not factor in share
permissions that may reduce the access privileges.
Sharing Printers
If you have a printer attached to your computer, you can share it with anyone on the same network. It doesn't matter
what type of printer you have, as long as it's installed on your computer and is directly attached with a USB cable or
other type of printer cable.
A shared printer is one that is directly connected to a computer on the network. When users access a shared printer,
they access that printer through the computer to which it is connected. For this reason, if the computer that is sharing
the printer is sleeping or turned off, the printer will be unavailable. A shared printer is not the same as a network printer.
A network printer is one that is connected directly to a network device such as a switch or router. Users on the network
can connect to a network printer directly, without having to go through an intermediate network node. (You will learn
about network printers in Lesson 5.)
Share the printer in the Devices and Printers page of the Control Panel.
2. Open the Devices and Printers page of the Control Panel, right‐click the printer you want to share, then select
Printer properties to open the Printer Properties dialog box. Click the Sharing tab. Select the Share this printer
check box and either accept the suggested share name or specify a new share name. Select the Render print
jobs on client computers option to alleviate some of the processing overhead for the local computer (this
option is selected by default), then click OK.
8369‐1 v1.00 © CCI Learning Solutions Inc. 167
Providing Printer Drivers
If you are sharing your printer with computers running different versions of Windows, you can provide the printer drivers
that these systems need to use to print on your printer. (A printer driver is a program that enables a printer to
communicate with the operating system.) For example, if you are running a 64‐bit version of Windows 7 and another
computer on your network is running a 32‐bit version of Windows, that system will need 32‐bit printer drivers.
When you provide the drivers, a system running the 32‐bit operating system will automatically download and install the
drivers when it first attempts to connect to the printer. In order to make these drivers available you must install them.
You will need access to the CD or other media that contains the drivers that shipped with the printer. You may also
download additional drivers from the manufacturer's Web site.
To install the additional drivers, click the Additional Drivers button on the Sharing tab of the Printer Properties box to
open the Additional Drivers dialog box. You can specify to install drivers for Itanium systems, 64‐bit systems and 32‐bit
system. Select the drivers you want to install, then click OK.
If you do not provide the printer drivers, other users will have to find and install them before they can use your shared
printer.
168 8369‐1 v1.00 © CCI Learning Solutions Inc.
2. Select the printer to which you want to connect, then click Next. Windows displays a message when it
successfully connects to the printer.
3. Click Next and you can specify whether you want to make the shared printer your default printer. You can also
print a test page. When you are done, click Finish.
8369‐1 v1.00 © CCI Learning Solutions Inc. 169
Managing Printer Shares
You can control what other users are allowed to do while accessing your shared printer by managing the printer share.
To manage a printer share, open the Security tab of the Printer Properties dialog box.
You can specify the following permissions for each user or group:
Print The user can print.
Manage this printer The user can rename, delete, share, choose preferences and manage printer permissions.
Manage documents The user can manage print jobs, pause and restart print jobs, or delete print jobs.
Special permissions The user can change ownership of the printer.
170 8369‐1 v1.00 © CCI Learning Solutions Inc.
Understanding Encryption
Encryption is the process of converting data into an unreadable form of text. Decryption is the process of converting the
Objective
encrypted data back to its original form. Encryption and decryption are performed through keys. A key is a mathematical
4.3 algorithm. The more complex the encryption algorithm, the harder it is to decipher the encrypted message without
5.2 access to the key. Encrypted data is referred to as ciphertext; unencrypted data is referred to as plaintext.
Encrypted text cannot be read without the correct decryption key to decrypt, or decipher, the encrypted data back into
plaintext. Because encrypted text is unreadable by anyone who does not possess the correct key, data encryption helps
secure sensitive data stored on hard drives or network shares.
Encryption can be applied to data at rest, such as data stored on computer hard drives or removable USB flash drives, or
to transmitted data such as email, Internet traffic, wireless networks, and cell phone calls. In all of these applications, the
intent is to prevent others from seeing the contents of the data, and to protect the integrity of the data by preventing
data from being lost and extra data from being inserted.
Encryption Concepts
There are three encryption models. These are: symmetric‐key, asymmetric‐key and hash.
8369‐1 v1.00 © CCI Learning Solutions Inc. 171
In EFS, symmetric encryption is used to encrypt the actual data, and then asymmetric encryption is used to encrypt the
FEK. When the user accesses the encrypted data, the FEK is decrypted with user's private key, then the FEK is used to
decrypt the data.
Encryption and decryption occur automatically as long as the user who initially encrypted the data is logged on to the
machine.
Some programs create a temporary copy of a file while a user is editing it. The temporary file remains open until all
changes are saved to disk and the file is closed. Windows 7 sees this as a security issue because the temporary file will
not be encrypted if its parent folder is not encrypted. Windows 7 offers you the option of encrypting the parent folder as
well.
To encrypt a folder:
1. Navigate to the folder in Windows Explorer
2. Right‐click the folder and select Properties
3. On the General tab, click the Advanced button
4. Check the Encrypt contents to secure data check box, then click OK
When you encrypt a folder, you are given the option to apply changes to the folder only, or to the folder and its
subfolders and files.
When you encrypt a file or folder, it displays in green in Windows Explorer.
172 8369‐1 v1.00 © CCI Learning Solutions Inc.
Backing Up Certificates and Keys
The first time you use EFS on a system, a balloon appears in the notification area advising you to back up your encryption
keys. You can export a copy of the file encryption certificate and the FEK to removable media. It is important to have a
backup copy, in case the certificate and key stored on the system becomes lost or corrupted.
Click the balloon to view options for backing up your file encryption certificate and key.
Select Back up now (recommended) to open the Certificate Export Wizard.
8369‐1 v1.00 © CCI Learning Solutions Inc. 173
Click Next.
Certificates can be exported in a variety of file formats. The default file format – Personal Information Exchange ‐ PKCS
#12 (.PFX) – is suitable for exporting a key to a USB flash drive. After you select a file format and click Next, you are asked
to enter and confirm a password.
After you enter and confirm a password and click Next, you are asked to supply a file name and location for the exported
file. You can browse to a location or type the path and file name. Once you click Next, the certificate and key are
exported. Click Finish to close the wizard, and click OK to close the message box that tells you the export was successful.
If your certificate and key embedded in the system becomes lost or corrupted, you can double‐click the exported file to
launch the Certificate Import Wizard, which imports the certificate and key back onto the system.
174 8369‐1 v1.00 © CCI Learning Solutions Inc.
BitLocker
While you can use EFS to encrypt file or folders, you can use BitLocker on Windows 7 Ultimate/Enterprise systems to
encrypt entire volumes. You can use it to encrypt:
Volumes that contain an operating system – to encrypt an OS volume, a separate volume of approximately 100 MB
must exist to provide access to files needed at boot time. These files are accessed before the OS volume has been
decrypted. This 100 MB volume is created automatically when Windows 7 is installed.
Storage‐only volumes (hard disks or partitions that do not contain an operating system) – to encrypt a storage‐only
volume, the system must include a Trusted Platform Module (TPM) chip for storage of encryption keys or a USB
flash drive for storage of encryption keys.
USB flash drives – to encrypt a USB flash drive, you can use BitLocker To Go.
You can access BitLocker and BitLocker To Go through the Control Panel and following the prompts presented in the
wizard. You will be asked for either a password or a smartcard to use as the unlock mechanism for the drive. You will also
be prompted to save recovery information so that you can restore the drive and access the encrypted data.
If you are using BitLocker on an internal drive, you are also given the option to automatically unlock the drive so that a
password is not required each time you boot up.
8369‐1 v1.00 © CCI Learning Solutions Inc. 175
3. If the server responded with a greeting, it will also send one or more certificates to the client. This is like saying “My
name is …..” because it is presenting its identity card back to the client.
4. Depending on the encryption scheme, the server may ask the client for its digital certificate. This is like the server
asking “And who are you?”
5. The client inspects the certificate(s) sent by the server and validates the information. If a problem is found, a
message is displayed on the screen to warn the user that the server could not be authenticated (“This identity card
is fraudulent!”).
6. If the server’s certificate is valid, then the client system creates a secret key, encrypts it using the server’s public
encryption key from the certificate, and sends it to the server.
The secret key must be encrypted because anyone who gets a hold of it will be able to listen in on the conversation and
decrypt everything. The purpose of the server’s public key is to keep the client's secret key secret. Only the server that
sent the public key has the private key to decrypt any messages that have been encrypted using the public key. Not even
the client system can decrypt the message that it just created using the server's public key because it is a one‐way
encryption (hence the term asymmetric) scheme.
7. If the server asked for a certificate, the client will also send it to the server.
8. If the client responds with “No certificate” or the client’s certificate cannot be validated, the server will most likely
stop responding. Otherwise, the server will decrypt the client’s secret key using its private key.
9. Both the client and server use the secret key to create the session key.
This session key is the symmetric key that both the client and server will use to encrypt and decrypt all future messages
to each other.
10. The client and server both switch to encryption mode and the user is now able to use the secure website in privacy.
Although there have been numerous attempts (some were successful) to crack parts of this encryption scheme, this
communication process has many layers to ensure that it is a practical and secure method of exchanging data between
two systems.
The procedures described above and the rules that your web browser and websites must follow to establish the secure
communication are all part of the Public Key Infrastructure designed to ensure you can trust the communication; that is,
ensuring the other party is who they claim they are, no one else is spying on your communication, and no one else can
modify any part of the communication being exchanged. This is a critical component for enabling business to consumer
(B2C), business to business (B2B), and business to government (B2G) transactions. In addition to authenticating the
identity of the entity owning a key pair, PKI also provides the ability to revoke a key if it is no longer valid. A key becomes
invalid if, for example, a private key is cracked or made public.
SSL certificates can also be used internally within an enterprise or over the Internet for non‐public communications. For
example, an enterprise may restrict web service access to a server (for example, a server containing confidential
employee salary information) by requiring the client system (which may be another server) to present a SSL certificate
when it wants to communicate with the server. In these applications, certificates are used to replace the need for a logon
ID and password. As a result, a regular payroll run can occur and data transmitted between servers (e.g. sending direct
deposit information to banks) without any person having to log on to a computer, thereby improving the overall security
of the data and the payroll processing system. To maintain good security, system administrators will need to ensure the
certificates are added only to computers that require them.
Similarly, doctors and pharmacists exchange patient medical data with government and private health providers using
SSL certificates. The health organization will issue a unique digital certificate to each healthcare professional, who adds it
to their computer system. Medical data can then be exchanged between these servers in realtime instead of requiring a
person to press an “Update now” button. The health organization can identify who the user is by their SSL certificate,
and control their access privileges accordingly. The SSL certificates are created, managed, and terminated by the health
organization. However, the certificate will identify only the user’s computer system that is connected. Each individual
user (e.g. doctor) in the healthcare practitioner’s office must still log on with their personal ID and password when they
need to enter data or run inquiries from their client system.
176 8369‐1 v1.00 © CCI Learning Solutions Inc.
A pop‐up box is displayed. It displays the name of the third party certificate authority (VeriSign in this example), and
allows you to examine the SSL certificate that has been issued by the Bank of America Corporation. VeriSign uses its
reputation to confirm that this SSL certificate is genuine.
If the address bar is green, this indicates that the website is using an extended validation certificate, an enhanced version
of a SSL certificate.
3. Click View certificates at the bottom of the pop‐up box.
4. In the Certificate window, scan through the contents of the General tab to view the certificate information.
5. Click on the Details tab, then scroll down and click on Public key to display it
8369‐1 v1.00 © CCI Learning Solutions Inc. 177
This screen example shows a public key that is 2,048 bits long, and displayed as 256 groups of two hexadecimal digits
(each hex digit is 4 bits long). This public key is used to encrypt data to be sent to the Bank of America, but can’t be used
to decrypt data; only the Bank of America has a corresponding private key that is able to perform the decryption, hence
the term asymmetric keys. However, asymmetric key encryption allows only one way communication. Your system then
uses the public key to encrypt one or more symmetric keys (called session keys) that are used for two‐way
communications between your system and Bank of America. Because a symmetric key is used for both encrypting and
decrypting data, both parties can exchange data but anyone trying to intercept and read the data will see only a string of
apparently random characters. The Bank of America will use their private key to decrypt your message containing the
symmetric keys and will then begin encrypting all future communications with your system using these keys. When you
complete your business transaction with the Bank of America – or you do not send another secure message to them
within a period of time (your session is “timed out”) – your session keys become invalidated and any further
communication with the Bank of America website will create a new set of session keys (and any memory of your previous
session is lost).
6. Click OK to close the Certificate window.
In this exercise, you examined the digital certificate for a secure website.
Compression
One of the advanced attributes you can apply to a file or folder is compression. In fact, you can compress an entire NTFS
volume. While compression saves disk space, it requires calculation and CPU resources. Compressing a folder or volume
that contains files which are regularly updated can negatively impact system performance.
The compression attribute is configurable through Windows Explorer. You can either compress a file or folder or encrypt
it; you cannot do both.
178 8369‐1 v1.00 © CCI Learning Solutions Inc.
When you compress a file or folder, it displays in blue in Windows Explorer.
To compress a volume:
1. Right‐click the volume in Windows Explorer and select Properties.
2. On the General tab, select the Compress this drive to save disk space check box, then click OK.
Default Libraries
When you install Windows 7, four default libraries are created: Documents, Music, Pictures and Videos.
8369‐1 v1.00 © CCI Learning Solutions Inc. 179
Note that on some systems these libraries may be limited by Group Policy. For example, as a way of discouraging
employees from spending their time downloading music or YouTube videos, enterprise systems may not include the
Music or Videos libraries.
The default libraries are created for each user profile. They are also created in the public profile. When a user accesses
the default libraries, he or she will see folders specific to the user account as well as the public folders.
Using Libraries
Libraries do more than simply aggregate your files and folders into one location; they allow you to organize and view
your collected files and folders in various ways to help you find exactly what you are looking for.
For example, the typical My Documents folder contains a large number of files created by various applications. Have you
ever searched for an Excel spreadsheet among hundreds of Word documents and PowerPoint presentations? What if you
have picture files in the folder too?
Libraries are designed to help you sort through your files. The following figure shows a few of the ways you can organize
the Documents library.
180 8369‐1 v1.00 © CCI Learning Solutions Inc.
Each library is optimized for the specific type of data it is meant to contain. These optimization settings control the
attributes by which you can arrange the items in the library. These attributes appear in the Arrange by drop‐down list.
By default, you can arrange libraries by the following attributes:
Documents – Folder, Author, Date modified, Tag, Type or Name
Music – Folder, Album, Artists, Song, Genre, Rating
Pictures – Folder, Month, Day, Rating, Tag
Videos – Folder, Year, Type, Length, Name
Selecting options in the Arrange by drop‐down list allows you to customize the way your files and folders appear.
If you want to change the optimization settings for a library (thereby changing the attributes that appear in the drop‐
down list), right‐click the library you want to change, then click Properties. In the Optimize this library for list, click a file
type, and then click OK.
8369‐1 v1.00 © CCI Learning Solutions Inc. 181
You can also add or update various file attributes while viewing files in the libraries. For example, you can add tags to a
picture file, or update the author information for a document. Simply click the attribute in the details pane, type a new
value, then click Save.
Including Folders in a Library
You can include multiple folders in a single library.
To include a folder in a library, open Windows Explorer, navigate to the folder you want to include, and click it once to
select it. In the Windows Explorer toolbar, click Include in library, and then click a library.
The newly added folder displays in the library. Notice that the library indicates how many separate locations are
included. In the following figure, the Documents library includes three locations.
182 8369‐1 v1.00 © CCI Learning Solutions Inc.
You can use the same method to include folders from external hard drives and some USB drives. If a USB drive appears
under the Computer heading in Windows Explorer, then you can include folders from the drive in a library. Some USB
flash drives do not appear here, and if they do not, you cannot include folders from them. You cannot include folders
from optical drives.
If the Include in library option is not available, it means that the network folder is not indexed or is not available offline.
Removing a folder from a library is distinctly different than accessing a folder through a library and then deleting the
folder. Any actions you take directly on a file or folder that you access through a library are carried out on that file or
folder on the disk.
8369‐1 v1.00 © CCI Learning Solutions Inc. 183
To remove a folder from a library, click a library in Windows Explorer, then click the locations link.
Clicking the locations link opens the Library Locations dialog box.
Click the folder you want to remove, click the Remove button, then click OK.
Notice that the Library Locations dialog box also includes an Add button. You can click the Add button, navigate to a
folder you want to include in the library, select the folder, then click the Include folder button to add the selected folder
to the library.
184 8369‐1 v1.00 © CCI Learning Solutions Inc.
Before you can copy, move or save files to the new library, you must first include a folder in the library so that the library
will know where to store the files. This folder automatically becomes the default save location for the library.
To include the first folder, click the Include a folder button, navigate to a folder you want to include, click the folder to
select it, then click the Include folder button.
The selected folder is added to the library.
8369‐1 v1.00 © CCI Learning Solutions Inc. 185
You can add subsequent folders to the custom library in the same manner as you can for the default libraries. The
custom library appears in the Include in library drop‐down list.
186 8369‐1 v1.00 © CCI Learning Solutions Inc.
8369‐1 v1.00 © CCI Learning Solutions Inc. 187
29. Drag the Equations document from the Desktop, to the ClassStuff library, then display the ClassStuff library if
necesseary. Notice that the file is copied to the NewDocs folder. This folder is the default save location.
Deleting libraries does not remove the folders or files that were included in them. (You can restore deleted libraries from
the Recycle Bin.)
30. In the navigation pane, click the ClassStuff library, press DELETE, then click Yes to confirm the deletion.
31. Confirm that the Networking folder and the Equations document still reside in the Student Data\Lesson04 folder on
the Desktop.
If you delete one of the default libraries, you can restore it from the navigation pane. However, if you included folders
other than the default ones, those are not restored.
32. Delete the Documents library, which currently includes the My Documents, Public Documents,
C:\Users\<user name>\Desktop\Student Data\Lesson04\Instructional, and
C:\Users\<user name>\Desktop\StudentData\Lesson04\Networking folders.
33. In the navigation pane, right‐click the Libraries heading, then select Restore default libraries. The restored library
includes the My Documents and Public Documents folders.
34. Delete the C:\Users\<user name>\NewDocs folder.
MMM
35. Close all open windows.
The inside
In this exercise, you worked with libraries. scoop on
libraries
Lesson Summary
In this lesson, you learned how to manage and share files and folders. You are now able to:
Explain disk partitions and logical drives.
Describe the file systems supported in Windows 7, including FAT32 and NTFS.
Describe how to format a drive and how to convert a drive from FAT32 to NTFS. MMM
Explain the purpose and function of HomeGroups and describe how to create and join them. Go online for
Describe public shares, basic shares and advanced shares. Additional
Review and Case
Explain how to map network shares to drive letters. Scenarios
Describe share permissions, NTFS permissions and effective permissions.
Explain how to share printers.
Explain basic encryption concepts.
Describe the function of Encrypting File System (EFS) and BitLocker, and describe how to manage encryption keys.
Explain disk compression.
Explain the function and characteristics of libraries and describe how to use, customize, create and delete libraries.
188 8369‐1 v1.00 © CCI Learning Solutions Inc.
Review Questions
1. Where is information about the size, data content and permissions for each file on a disk stored on an NTFS volume?
a. In the file allocation table c. In the master file table
b. In the Info library d. In the extended partition
2. Why is the NTFS file system preferred over FAT32?
a. It supports permissions and encryption. c. It won't let users compress files.
b. It is a 16‐bit file system. d. It prevents file fragmentation.
3. Which of the following is a drawback of HomeGroups?
a. They are not password‐protected c. They don't support printer sharing
b. They don't work with XP or Vista d. They don't support Read/Write permissions
4. Mike is accessing a folder on a network share. The share provides Read permission, and the folder Mike needs to access
within the share provides NTFS Modify permissions. What permissions will Mike have on the folder?
a. He will have no permissions at all. c. He will have Modify permissions.
b. He will have Read permission. d. He will have Full Control.
5. For what purpose would you use BitLocker?
a. To encrypt an entire volume c. To compress an entire volume
b. To encrypt individual files and folders d. To compress individual files and folders
8369‐1 v1.00 © CCI Learning Solutions Inc. 189
190 8369‐1 v1.00 © CCI Learning Solutions Inc.
Connecting Devices
A device is any piece of equipment that can be attached to a network or computer, such as a mouse, printer, monitor,
Objective
game controller, video card, or any other peripheral equipment. Devices may be connected externally through
5.1 connection ports, or internally through slots or other connections to the system board. Regardless of whether a device is
internal or external, a device driver is required to enable Windows to use and manage the device.
Every device requires a device driver to function with Windows.
8369‐1 v1.00 © CCI Learning Solutions Inc. 191
Windows operating systems usually come with several device drivers out of the box. When you install a new device that
Windows recognizes, Windows will automatically install drivers for the device. The following are just a few of the devices
that may not have their device drivers already included with Windows and you have to install the one supplied by the
manufacturer:
Video cards
Audio cards
USB‐based devices
Printers
192 8369‐1 v1.00 © CCI Learning Solutions Inc.
You should avoid installing unsigned drivers. Device drivers interact directly with the operating system, and a badly
written driver poses a much higher risk of causing your system to crash. Therefore if you have an older device for which
you are unable to find a signed driver from the manufacturer or Microsoft, you should consider leaving it behind.
If you do decide to install a device driver to override any that may be in the built‐in Windows driver store, there are
several methods for installing device drivers. Some are provided in executable containers that perform the installation
for you. For these, you can simply launch the installation and follow the prompts to install the driver.
Sometimes, drivers come in a compressed archive, such as a ZIP file. You have to extract the files to a folder before you
can install the drivers, and the drivers themselves have an .INF file name extension. You can use the Device Manager to
install them. (You will learn about the Windows Device Manager later in this lesson.)
Note that in some cases when you are installing multiple device drivers, the drivers must be installed in a specific order.
You should always check the documentation or release notes on the manufacturer website for instructions on installing
drivers in a specific order. Some manufacturers provide a driver management utility that will automatically detect the
drivers you need, and download and install them in the correct order.
8369‐1 v1.00 © CCI Learning Solutions Inc. 193
Devices themselves often had to be configured manually through the use of jumpers or setting DIP switches. Today,
however, plug‐and‐play technology has virtually eliminated the need for manual configuration.
Plug‐and‐Play (PnP)
Plug‐and‐Play is a technology that allows for the automatic configuration of hardware resources. It enables Windows to
detect and configure hardware with little or no user involvement. With PnP, you simply plug the device in and let the OS
do the configuration work.
PnP monitors the bus and detects and responds to the presence of new devices and components. For example you can
insert a new video card into an expansion slot, close up the case and power on the system. When Windows boots up,
PnP will detect the new hardware, find the right driver from its built‐in driver store and install it, allocate resources to the
new card and create any required Registry entries. If windows can't find an appropriate driver, it will launch the Add New
Hardware wizard and allow you to specify where suitable drivers are located.
The Plug‐and‐Play Manager is the component responsible for determining the hardware resources (e.g., I/O ports, IRQs,
memory locations) requested by each device and assigning hardware resources appropriately. The PnP Manager
reconfigures resource assignments when necessary, such as when a new device added to the system requires resources
already in use.
194 8369‐1 v1.00 © CCI Learning Solutions Inc.
Plug and Play makes it easier to add and configure hardware on a computer running Windows without special user
knowledge of hardware configurations. For Windows 7, certain classes of devices are fully supported for PnP, including
PCI, PCI Express (PCIe), ExpressCard, and PCMCIA mounted cards, as well as any device that can be connected using USB
or Firewire. Older devices that connect using the parallel or serial port may be PnP compatible but most are not.
Some PnP devices are designed to be hot‐pluggable; that is, they can be inserted while the system is running and you do
not need to reboot the system. For example, you can insert a USB flash drive into a USB port and Windows will
automatically detect it, load any necessary drivers, and allocate system resources without requiring a reboot. Other
devices are designed to be hot‐swappable; these components can be removed and replaced by a similar component
without the need to shut down the system. For example, many servers have RAID drives (described in more detail below)
that can be removed if they fail during operation and replaced with a new RAID drive. Since the server is not shut down
during this entire procedure, it continues running without any loss of service. This is a necessity for banks, airlines, and
other companies that need to maintain continuous round‐the‐clock services.
However, you need to understand that only certain types of devices are designed to be hot‐plugged or hot‐swapped. For
example, you must never open a computer case and touch any of the components inside while the power is on; you will
most likely get an electrical shock. Hot‐pluggable and hot‐swappable devices have handles, latches, or connectors on the
outside of the computer that are designed to be inserted or removed easily.
8369‐1 v1.00 © CCI Learning Solutions Inc. 195
Understanding Storage
Data in a PC is stored on various types of media – hard disks, tape, optical disks and flash drives. The primary storage
Objective
location, however, is on one or more hard disks. The storage media used in a hard disk can be magnetic or flash‐based
5.2 (solid state).
Each hard disk is contained within a hard disk drive and is connected to a hard disk controller which enables the CPU to
communicate with the hard disk.
Hard disk drives can be internal (housed within the system) or external. Regardless of the type of drive used, hard disk
drives connect to the PC via one of several standard interfaces. An interface is a communication standard that defines
how data flows to and from the disk drive.
196 8369‐1 v1.00 © CCI Learning Solutions Inc.
USB 2.0 Maximum transfer rate of 480 Mbps. Communication is half‐duplex. USB 2.0 is the
current de facto standard.
USB 3.0 Maximum transfer rate of 4.8 Gbps. Communication is full‐duplex and USB 3.0 includes
power management which allows devices to move into idle, suspend and sleep modes.
USB 3.0 is not yet in wide use, although a few companies have begun implementing the
standard on their mass storage devices, video capture cards and expansion cards.
Disk Types
As you learned in Lesson 4, Windows 7 supports the FAT, FAT32 and NTFS file systems. The advantage to using NTFS is
that it offers built‐in security through permissions and encryption. You can use Encrypting File System (EFS) to encrypt
individual files and folders on an NTFS volume, and BitLocker to encrypt entire NTFS volumes.
8369‐1 v1.00 © CCI Learning Solutions Inc. 197
Drive Types
In Lesson 4, you were introduced to primary and extended partitions. You learned that primary partitions can be used to
start an operating system, and that a basic disk can contain up to four primary partitions, or three primary partitions and
one extended partition. An extended partition can hold one or more logical drives. Each logical drive is a volume, and
each is assigned its own drive letter. Logical drives function like primary partitions except that they cannot be used to
start an operating system.
This section introduces the concepts of basic, dynamic and virtual disks. All types of disks can be managed using the Disk
Management snap‐in.
Basic Disks
A basic disk is a physical disk that can contain primary partitions, an extended partition, and logical drives. Partitions and
logical drives on basic disks are known as basic volumes. Basic disks provide the basic features and functions required for
typical storage tasks. However, they do not support software‐based RAID.
The following tasks can be performed on basic disks, but cannot be performed on dynamic disks:
Creating and deleting primary or extended partitions
Creating and deleting logical drives
Formatting partitions
Marking partitions as active
Dynamic Disks
Dynamic disks are not
A dynamic disk is a disk that provides features that basic disks do not, such as the ability to supported on portable
create volumes that span multiple disks. These are called spanned volumes. You can also computers, removable
use dynamic disks to create fault‐tolerant (mirrored) RAID 1 volumes. disks, or detachable
To change a basic disk into a dynamic disk, follow these steps. disks that use USB or
1. In the Disk Management snap‐in, right‐click the basic disk you want to convert. FireWire interfaces.
198 8369‐1 v1.00 © CCI Learning Solutions Inc.
MMM
Creating and
Attaching a
VHD
A particularly useful feature of VHDs is that you can detach them from one machine and then attach them to another. All
the files contained on the VHD are then instantly available on the system to which the VHD is attached.
Windows Live
Windows Live is the brand name for a set of services from Microsoft. Many of these services are Web applications,
accessed through a web browser.
Windows Live Essentials is a suite of freeware applications by Microsoft that offers integrated and bundled email, instant
messaging, photo‐sharing, blog publishing, security services and other Windows Live entities. Essentials programs are
designed to integrate well with each other, with Microsoft Windows, and with other Windows Live web‐based services
such as SkyDrive and Hotmail, so that they operate as a “seamless whole.”
8369‐1 v1.00 © CCI Learning Solutions Inc. 199
The Windows Live Essentials suite includes the following applications:
Windows Live Family Safety Windows Live Photo Gallery
Windows Live Mail Windows Live Sign‐in Assistant
Windows Live Mesh Windows Live Writer
Windows Live Messenger Bing Bar
Windows Live Messenger Companion Microsoft Outlook Hotmail Connector
Windows Live Movie Maker Microsoft Silverlight
Windows Live Essentials applications can be installed on Windows Vista SP2, Windows 7, Windows Server 2008 SP2 or
Windows Server 2008 R2.
To use any/all of these applications, a Windows Live ID is required. A Windows Live ID is composed of an email address
and password. You can then use the Live ID to sign in to Hotmail, Xbox Live, and all Windows Live services (including
SkyDrive and Messenger).
If you use Hotmail, Windows Live Messenger, or Xbox Live, you already have a Windows Live ID. If you don’t have a
Windows Live ID, you can create one by completing an online form at the Windows Live Signup page at
https://signup.live.com/signup.aspx?lic=1. You can also create a Hotmail or Live.com email account at the same time.
200 8369‐1 v1.00 © CCI Learning Solutions Inc.
8369‐1 v1.00 © CCI Learning Solutions Inc. 201
8. In the navigation bar across the top of the page, click SkyDrive to access your SkyDrive page. The default folders are
already prepared for you, and you should have 7 GB of free space. (Note: If the default folders have not been
created, you can create them at any time.)
You can drag folders from your local system right into SkyDrive.
9. Open Windows Explorer, make sure that the window is not maximized, navigate to the Student Data folder on the
Desktop, then navigate to the Lesson05 folder.
10. Click on the Documents link in SkyDrive to navigate into that folder, and then click Add files.
The Add files drop box may appear in front of the SkyDrive.
202 8369‐1 v1.00 © CCI Learning Solutions Inc.
11. Arrange your windows so that you can see both Windows Explorer and SkyDrive, then drag the three Word
documents from the Lesson05 folder in Windows Explorer to the Add files drop box on SkyDrive. (If the Add files
drop box did not appear, drag the Word documents onto the Documents folder in SkyDrive.) A small window opens
to show the progress of uploading the selected files.
12. Close the upload window if it does not close itself automatically.
13. In SkyDrive, click one of the documents to open it.
14. Click the browser Back button twice to view the SkyDrive folders. Alternatively, you can click the close icon located
at the upper right of the Microsoft Word Web App window, and then click the Files link in SkyDrive to view all
folders.
15. Next, click Add files in SkyDrive again and drag a few of the image files from the Lesson05 folder in Windows
Explorer to the Add files drop box. The files should appear similar to the following figure.
16. If necessary, click the Files link in SkyDrive to view all files at this folder level in SkyDrive. If Documents is selected,
then only document‐type files are displayed.
You can also move files on SkyDrive.
17. If you do not have a Pictures folder in SkyDrive, click New folder to create a new folder and change the name to
Pictures. Click the check box next to it to turn it off.
18. In SkyDrive, select the check boxes for the three image files, then in the right area of the page, click the Move to
link.
19. In the box that appears, click the Pictures folder to specify that you want to move the images to the SkyDrive
Pictures folder.
8369‐1 v1.00 © CCI Learning Solutions Inc. 203
20. Click the Move button to move the files.
21. In SkyDrive, click the Pictures folder to view its contents, and then click the browser Back button.
You can specify to share files and folders on SkyDrive.
22. Select the check box for the Pictures folder, and then look at the right side of the page under Sharing. The folder is
currently not shared.
23. Click the Share link. SkyDrive may display the following message asking if you are sure you want to share the folder.
24. In the message box, click the share this folder link. SkyDrive gives you the option of sending an email link to the
people you want to share with, sharing the folder on Facebook, Twitter or LinkedIn, or generating a link that will
allow recipients to view, or to view and edit your shared files. You can then copy and paste the generated link into
an email message that you compose and send on your own.
25. Enter your home email address in the To box, clear the Recipients can edit check box, and then click Send.
204 8369‐1 v1.00 © CCI Learning Solutions Inc.
26. You may be prompted to complete a security check.
27. Click the Please complete this security check link in the message box.
SkyDrive opens a Hotmail tab in the browser and then asks you to enter the characters you see on the screen. This
type of check is called a CAPTCHA – it is used to verify that a human being is sending messages and not an
automated program. This type of test helps to reduce spam.
28. Complete the form, then click Continue.
29. Close the Hotmail tab and click Send again to send your email message. When you open your email, you will receive
a message with a link that will allow you to view the Pictures folder without signing in to SkyDrive. The figure below
shows the email message text. Click the View photos link and your browser will open and display the shared
SkyDrive folder.
8369‐1 v1.00 © CCI Learning Solutions Inc. 205
30. The Shared with setting for the Pictures folder should now read: Some people. The right side of the SkyDrive
window should also indicate that the folder is shared and list the people who have permissions. You can stop
sharing the folder at any time by clicking the Delete button at the right of any of the listed email addresses.
31. Click the Manage storage link at the left side of the page to view options for adding more storage.
Are the fees higher or smaller than you thought they would be? How much storage do you think a home user might
require? What about a business user?
32. Click the browser's Back button, then click the Get SkyDrive apps link to view the available apps for PCs, phones
and Macs.
33. Click the browser's Back button.
34. In the upper‐right corner of the page, click sign out.
35. Close your browser.
In this exercise, you explored SkyDrive.
206 8369‐1 v1.00 © CCI Learning Solutions Inc.
Printer Ports
Print devices are connected to computers through ports. A port is a hardware‐ or software‐based interface used to
transfer information between a computer and other devices. Hardware ports are physical connections that are visible on
the outside of the computer. Software ports are the numbered interfaces in programs that software programs use to
exchange information. Modern printers connect directly to a PC through a USB port. Older printers connect directly to a
PC through a line printer terminal (LPT) or serial (COM) port. Printers with networking capability are accessed using the
static IP address (it is not a good idea to use dynamic IP addresses for printers) assigned to them or by their printer name
(which the DHCP server will resolve to the IP address assigned to the printer). Of these two methods, the printer name is
more flexible and allows you to change routers and wireless access points without disabling your network printers until
the IP addresses are corrected.
Print Drivers
Each print device requires a print driver, which is a program that converts the data to be printed to the form specific to
the printer. Windows will automatically install drivers for printers it detects, but in most cases the vendor‐supplied
installation CD should be used to ensure feature‐rich printing.
Many printing issues can be related to an inappropriate print driver. Drivers should be loaded for the appropriate model
and can be obtained from the manufacturer’s website. Microsoft Update can also be a resource for driver updates.
Print Spooler
By default, in Windows, all print jobs go to the print spooler. The print spooler is software that intercepts a print job on
its way to the printer and sends it to a folder on the computer where print jobs are stored until they can be printed. Each
printer has its own set of jobs retained for it until they may be printed. The print spooler is managed by a service that is
displayed as Print Spooler in the Services console.
The Print Spooler is needed because printers operate much slower than the CPU. It was originally developed for the early
generation of PC’s when DOS was the operating system. At that time, DOS could only perform one task at a time.
Therefore if it concentrated on printing, the user could not do anything until the entire document was printed. Unlike
today’s laser printers, the early generation of printers could only print a single character at a time. A document can then
take several minutes to completely print. The Print Spooler was developed for DOS to allow the computer to multi‐task:
i.e. allow users to continue working while the system is printing in the background.
8369‐1 v1.00 © CCI Learning Solutions Inc. 207
The Print Spooler service manages all print jobs and print queues thereby controlling printing on a Windows system. If
you stop the print spooler, the computer will be unable to print.
Restarting the Print Spooler service is a troubleshooting technique when printers stop responding. Restarting the Print
Spooler service will clear all the print queues.
Print Queue
A print queue is a representation of a print device in Windows. Each printer on a Windows system has a print queue.
Opening a print queue displays active print jobs and their status. That is, you can see the job that is currently printing and
all the jobs waiting to print.
You can access the print queue using the Devices and Printers page of the Control Panel or you can double‐click the
printer icon in the notification area of the taskbar. This icon displays when you first send a print job to the printer. To
access a print queue from the Devices and Printers page, click Start, click Devices and Printers, click the icon of the
printer for which you want to view the print queue, then click the See what's printing button in the toolbar.
Once you have accessed a print queue, you can pause, restart, or cancel one or more print jobs in the queue. Selections
made from the Printer menu affect all jobs in the queue.
208 8369‐1 v1.00 © CCI Learning Solutions Inc.
Selections made from the Document menu affect the currently selected print job in the print queue.
You can also open the properties page for a print job by selecting the job in the queue and clicking Properties in the
Document menu, or by right‐clicking a print job and selecting Properties. From here you can schedule the job, set a
priority, and even view the layout and paper/quality settings used when the job was created.
When you increase the priority of a job, you indicate that it should print before other jobs in the queue with a lower
priority. If someone has submitted a very large job, you can use the options in the Schedule section to schedule the print
job to run after hours so that it does not interfere with print jobs during the work day.
8369‐1 v1.00 © CCI Learning Solutions Inc. 209
Note: You can also connect older printers (which do not have internal networking capabilities) to a network print
server. The network print server has a built‐in connector to the network, and includes one or more parallel or USB
ports for connecting to printers.
Print devices are listed in the Printers and Faxes section. The Fax device allows a user to send a document to the Fax
device (as if it were being sent to a printer). It will send the document to a fax modem if one is configured. The Microsoft
XPS Document writer allows a user to print a document to an XML Printer Specification (XPS) format. This is referred to
as printing to a file. You can also configure your printer to send a print job to a Print to File port, and the print job will be
written to a file with a .prn extension.
210 8369‐1 v1.00 © CCI Learning Solutions Inc.
Note that each type of device has different menu options. In the preceding figure, a printer is selected, and the available
menu options relate to printers/scanners. In the following figure, a USB flash drive is selected and the Browse files option
is available.
Alternatively, you can pre‐install the vendor‐supplied software and then connect the printer according to the
manufacturer's directions, as described in the previous section.
If you are adding an older model printer that connects using a serial or parallel port, follow these steps:
1. Open Device and Printers.
2. Click the Add a printer button.
8369‐1 v1.00 © CCI Learning Solutions Inc. 211
3. In the Add Printer wizard, click Add a local printer.
4. On the Choose a printer port page, make sure that the Use an existing port button and the recommended
printer port are selected, then click Next.
5. On the Install the printer driver page, select the printer manufacturer and model, and then click Next. (If your
printer isn't listed, click Windows Update and then wait while Windows checks for additional drivers. If none
are available and you have the installation CD, click Have Disk, and then browse to the folder where the printer
driver is located.)
6. Complete the additional steps in the wizard, such as giving the printer a user‐friendly name and specifying
whether you want to share it, then click Finish.
To view a video on adding a printer in Windows, visit http://windows.microsoft.com/en‐US/windows7/Install‐a‐printer.
Sharing a Printer
If a computer is participating on a network, and that computer has a printer directly attached to it, the user may opt to
share the printer with other users on the network by enabling printer sharing. This is different from making a printer a
network printer. When a user has enabled print sharing, other computers connect to the printer through the user's
computer. Therefore, the computer with the printer attached must be turned on and logged onto the network in order
for anyone else to send a document to the printer.
Sharing a printer in Windows 7 is a two‐part process. First you must enable file and printer sharing, then you need to
share your printer.
To turn on file and printer sharing:
1. Open the Control Panel and open the Network and Sharing Center.
2. Click the Change advanced sharing settings link to access the Advanced sharing settings screen.
3. In the File and printer sharing section, select Turn on file and printer sharing, then click Save changes.
4. Close the open Control Panel windows.
To share the printer:
1. Click Start, then click Devices and Printers.
2. Right‐click the printer you want to share, and then click Printer properties.
3. Click the Sharing tab, click the Share this printer check box, as shown in the following figure, then click OK.
212 8369‐1 v1.00 © CCI Learning Solutions Inc.
You can clear the Share this printer check box at any time to stop sharing the printer. When you elect to share a printer,
you may choose to install additional printer drivers on your system. Doing so makes the drivers available to other users
who want to connect to your printer.
To view a video on sharing a printer in Windows, visit http://windows.microsoft.com/en‐us/windows7/share‐a‐printer.
3. Select the printer to which you want to connect, then click Next. Windows connects to the printer and installs
the required drivers. (If you are asked to install the appropriate drivers, do so and then click Next.)
8369‐1 v1.00 © CCI Learning Solutions Inc. 213
4. When a successful connection is made, Windows displays a success message.
5. Click Next. Windows gives you the option to set the newly added printer as the default printer, and gives you
the option to print a test page.
6. Click Finish.
Network Printers
Printers can also be set up as network printers. A network printer is different from a shared printer. When you share a
printer, other users connect to the shared printer through the computer to which the printer is directly attached. A
network printer, on the other hand, is not directly attached to a computer. Rather, the printer is connected to the
network.
In order to be set up as a network printer, the print device itself must include an interface for connecting to a network.
For example, many printers can be set up as wireless network printers. These connect to a network using wireless
networking protocols. Other printers include a network port for wired connectivity. You can plug one end of a network
cable into the network port on the printer, and plug the other end into an appropriate device on the network, such as a
switch or router.
Setting Up a Wired Network Printer
When you first set up a printer as a network printer, you must initially connect the printer directly to a PC via a USB cable
so you can configure the printer for network use. The PC to which you connect the printer should have an active
connection to the network.
You begin by inserting the installation CD into the computer and starting the install program. For printers that include
networking options, the installation CDs offer a menu of setup configurations. You would choose an option equivalent to
“set up the printer for network use for the first time.” Follow the prompts in the installation program and do not connect
any cables until instructed to do so.
214 8369‐1 v1.00 © CCI Learning Solutions Inc.
Generally, the vendor‐supplied installation and setup programs will take care of the necessary configurations for you.
The procedure usually unfolds in the following sequence: Some initial drivers are loaded onto the PC, and you are then
instructed to connect the printer to the PC using the USB cable. The printer and the installation software will
communicate with the PC to detect the current network settings. The printer will be given its own network address and
the appropriate settings will be configured on the printer. You will be instructed to disconnect the USB cable and connect
the printer to a network device using a network cable. You will now be able to access the printer through the network
without being directly connected to it.
After the networked printer is configured, you can set up additional PCs or portables to use the printer by installing the
appropriate drivers on each machine. Make sure the computer is connected to the network, and then insert the
installation CD that came with the printer. Specify that the printer is already set up and that you now want to be able to
access it from an additional computer. Usually, the setup program will detect the networked printer on the network and
automatically configure the required settings on your computer.
Setting Up a Wireless Network Printer
To set up a printer as a wireless printer, you must have a functioning wireless access point as part of your network before
you begin. (A wireless access point is the networking device that makes wireless networks possible.) You will need to
know the name of the wireless network (also called the SSID – pronounced “Sid”), and you will need to know the security
passphrase. Most wireless networks use encryption as a security measure. The passphrase is required for wireless
devices to gain access.
To set the printer up for the first time, the printer must initially be connected via USB to a computer that is connected to
the network. The PC itself does not need a wireless connection to the network; it just needs to be on the same network
as the wireless access point.
Insert the installation CD that shipped with the printer, and follow the prompts for setting up a wireless printer for the
first time. Connect the USB cable when instructed to do so. Some printers can automatically detect settings for wireless
access points; simply follow the instructions that appear on the screen. Some printers will prompt you to supply
information on wireless properties such as the SSID and passphrase. Disconnect the USB cable when instructed to do so.
After the printer has been properly configured, you can load the drivers on each computer that wants to access the
wireless printer. Usually you insert the installation CD, specify that the printer is already set up, and indicate that you
want to configure an additional client to use the wireless printer.
Disconnecting a Printer
You must be logged on as an administrator to disconnect (remove) a printer. To disconnect a printer:
1. Open Devices and Printers.
2. Select the printer you want to disconnect.
3. Click the Remove device button in the toolbar.
4. Confirm that you want to remove the device by clicking Yes.
Managing Printers
You can use the Devices and Printers page to install, view and manage your printers. Right‐click a printer to manage it.
Management options include:
See What’s Printing Opens the print queue.
Set As Default Printer Sets the printer as the one that applications will send print jobs to automatically. Users do not
have to select the printer every time they print.
Printing Preferences Opens the Printing Preferences dialog box, which you can use to select paper orientation, duplex
printing, print quality, etc.
Printer Properties Allows you to manage printer properties such as sharing and security.
Remove Device Disconnects (removes) the printer.
8369‐1 v1.00 © CCI Learning Solutions Inc. 215
The Printer Properties dialog box contains several tabs that you can use to manage features and settings for the selected
print device.
The tabs of the Printer Properties dialog box include:
General Provides descriptive information about the printer. You can access printer preferences and print
test pages from this tab.
Sharing Allows you to adjust the sharing settings and specify whether to provide additional drivers to other
versions of Windows that may connect to the printer through the share.
Ports Defines ports for the computer and specifies which port is being used for printing. Ports can be
physical ports, software TCP/IP ports, or File (Print To File) ports.
Advanced You can use this tab to select or update drivers and manage spool settings.
Security Allows you to grant or deny access to the printer, and define who can manage the printer and its
documents and queues.
<Device settings> The name of this tab varies with each printer. Generally, this tab provides access to specific features
on the printer, such as color management or tray and paper handling, etc.
Printing to a File
Many individuals and businesses respect the need to protect natural resources, and more and more organizations are
moving toward paperless methods of conducting business. One way to reduce paper consumption is print to files of
various types instead of producing printed output on paper.
Windows 7 provides a file type called XPS (XML Paper Specification), which is a Microsoft standard for storing complex
documents in XML format. You can print to an XPS file from any application by selecting the Microsoft XPS Document
Writer as the printer for the print job.
Although you can create XPS documents using any program that you can print from in Windows, you can view XPS
documents only by using the XPS Viewer. The following figure shows a Microsoft Access report printed as an XPS file and
opened in the XPS Viewer.
216 8369‐1 v1.00 © CCI Learning Solutions Inc.
The XPS viewer includes two toolbars. Each toolbar provides options for viewing and managing XPS documents,
including:
Saving a copy of the XPS document to your computer.
Finding a word or phrase in the read‐only XPS document.
Going to a specific page by typing a page number or by navigating forward and back through the document pages.
Zooming in or out to make text and pictures easier to read.
Viewing one or more pages at a time on your screen.
Digitally signing the XPS document.
Determining who can access the document and for how long by applying document permissions.
8369‐1 v1.00 © CCI Learning Solutions Inc. 217
4. The user connects to the printer to which he desires to print. If a driver must be installed, the screens will
prompt for driver installation.
5. Once the connection exists, the user can send print jobs to the printer as if it were a local printer.
218 8369‐1 v1.00 © CCI Learning Solutions Inc.
You can view a listing of the devices installed on a system, view device driver details, find updated drivers and view or
change the current status (enabled or disabled) of each device. Devices are arranged in categories, such as Display
adapters, Keyboards, Network adapters, etc. To expand a category, click the arrow to the left of the category name.
8369‐1 v1.00 © CCI Learning Solutions Inc. 219
By right‐clicking on a device in the Device Manager window, and selecting Properties, you open the Properties dialog box
for the selected device.
The tabs in the Properties dialog box will vary depending on the type of device selected. The tabs in the preceding figure
will indicate if the device is working properly, show advanced settings for the device, supply details about the device
driver, supply details about the device itself, show which resources are allocated to the device, and show the available
power management options.
Click the Driver tab to view information about the driver provider, date and version. The Driver tab also includes buttons
for viewing details about the driver files, updating drivers automatically, rolling back a driver, disabling the device and
uninstalling the device.
220 8369‐1 v1.00 © CCI Learning Solutions Inc.
Disabling Drivers
If you suspect that a device driver is interfering with the operation of a system, you can use the Device Manager to
temporarily disable the driver and the device to see if the problem is resolved. To disable a device, open the Device
Manager, expand the category, right‐click the device in question and select Disable from the shortcut menu. Click Yes to
confirm that you want to disable the device. When a device is disabled, it displays a small down‐facing arrow in the icon
to the left of the device name. To enable a device, right‐click the disabled device and select Enable from the shortcut
menu.
When you disable a device in the device manager, you make it nonfunctional. For example, if you disable a wireless
network card, you cannot use the device until you enable it once again. Disabling a device frees the resources that were
allocated to the device.
8369‐1 v1.00 © CCI Learning Solutions Inc. 221
7. Expand the Network adapters, and then list the adapters that are installed.
a. _______________________________________
b. ________________________________________
c. _______________________________________
8. Right‐click a network adapter (preferably an Ethernet adapter if one is installed) and select Properties. Who is the
manufacturer listed on the General tab?
______________________________________________________________________________________________
9. Click the Advanced tab to view a list of property settings for the device. If they are available, record the values for
the following properties:
Priority & VLAN _____________________________
Speed & Duplex _____________________________
Note these properties may be named a little differently for your adapter (depending on the manufacturer);
however the name(s) will be similar.
10. If the Speed & Duplex property is available, display the drop‐down list and note the variety of choices. When this
property is set to Auto Negotiation, the network card will adjust to the speed and communication flow used by the
device with which it is in communication.
11. Click the Driver tab and record the following information:
Driver Provider _____________________________
Driver Date _____________________________
Driver Version _____________________________
Digital Signer _____________________________
12. Is the Roll Back Driver option available? What does this indicate?
______________________________________________________________________________________________
13. Click Cancel to exit the Properties dialog box.
14. Right‐click the same adapter, select Uninstall and click OK to acknowledge the warning. Do NOT select the Delete
the driver software for this device option.
15. Try to access the Internet. Are you able to?
16. Did the appearance of the network icon in the notification area of the taskbar change? If so, in what way?
______________________________________________________________________________________________
17. Return to the Device Manager and in the Menu bar click Action, then select Scan for hardware changes.
18. Did Windows find the network adapter and install the appropriate drivers for it?
19. Can you access the Internet now?
20. Close all open windows and dialog boxes.
In this exercise, you used the Device Manager to view device properties, uninstall a device and then scan for hardware
changes.
222 8369‐1 v1.00 © CCI Learning Solutions Inc.
Lesson Summary
In this lesson, you learned how to manage devices connected to your computer. You are now able to:
Explain the purpose and function of device drivers.
Describe how compatibility issues between drivers and the operating system can affect the system.
Describe how and when to update device drivers.
Explain system resources and resource allocation.
Explain the features and function of Plug‐and‐Play technology.
Explain when to install third‐party software for devices.
Describe storage device interfaces.
Describe the function of RAID.
Describe basic, dynamic and virtual hard disks.
Describe the process of using cloud storage.
Describe printer ports, printer drivers, the Print Spooler, and the Print queue.
Compare and contrast local printers and network printers.
Use the Devices and Printers page
Explain how to connect and share a local printer.
Explain how to connect to a shared printer.
Explain how to disconnect printers.
MMM
Describe how to manage printers. Go online for
Explain the purpose and function of the Microsoft XPS Document Writer. Additional
Review and Case
Describe how printing over the Internet works.
Scenarios
Explain video, audio, and infrared devices.
Describe how to use Windows Device Manager.
Review Questions
1. Mikayla wants to add a printer to her PC. Where should she go to add the printer?
a. The Devices and Printers page c. The Computer Management console
b. The Windows Device Manager d. The Disk Management snap‐in
2. What is the minimum number of disks required for RAID 5?
a. Two. c. Four.
b. Three. d. Five.
3. Which of the following is required for using SkyDrive?
a. 4 GB RAM c. A Windows Live ID
b. A 2.8 GHz processor d. SkyDrive 3.2 device drivers
4. By default, where do all print jobs in Windows go?
a. To the COM1 port. c. To the Print Spooler.
b. To the Microsoft XPS Document Writer d. To the Windows Device Manager.
5. Print jobs can be sent across the Internet using which protocol?
a. Hypertext Markup Language (HTML) c. Internet Print Protocol (IPP)
b. XML Paper Specification (XPS) d. Hypertext Transfer Protocol (HTTP)
8369‐1 v1.00 © CCI Learning Solutions Inc. 223
224 8369‐1 v1.00 © CCI Learning Solutions Inc.
8369‐1 v1.00 © CCI Learning Solutions Inc. 225
To combat these risks, IT professionals design and implement specific policies related to security. The rules and
procedures defined in the security policy should address three principles: confidentiality, integrity and availability.
Confidentiality The ability to keep data secret and viewable only by authorized parties. To protect confidentiality, a
security policy must ensure that information can flow across the network without being intercepted.
Messages are encrypted before being sent across the network.
Integrity Verifying that data has not been illicitly changed or tampered with. Digital certificates and digital
signatures are used to verify data integrity. Policies designed to protect data integrity also include
rules for backup procedures.
Availability Ensuring that authorized parties can readily access information. To ensure availability, networks are
designed with redundant connections to eliminate single points of failure; backup systems use hot‐
swappable drives and networks are monitored for any suspicious activity which may preclude an
attack.
Furthermore, security policies must be in place to keep enterprise assets operating at peak efficiency, to ensure that they
are free from malware, and to ensure that data is regularly backed up to protect against catastrophic loss.
As you read about risks and ways to combat them you should notice that user education and cooperation are vital to the
success of IT security policies.
Identifying Risks
Whether you are an IT professional, or an avid user, you should be aware of potential risks you face when you connect to
a network or to the Internet.
Viruses
A virus is a malicious program designed to damage computer systems. Specifically, a virus is a program that takes control
of system operations, and damages or destroys data. Viruses are loaded onto your computer without your knowledge
and run without your consent. All computer viruses are human made and are often designed to spread to other
computer users through networks or email address books.
Viruses can be transferred via email attachments, program or file downloads, and by using infected disks, CDs, or flash
drives. If you pass an infected drive to a co‐worker, that co‐worker's system can also be infected. Similarly, a colleague
might inadvertently send you an email attachment infected by a macro virus. If you attempt to open or print the file, the
virus will engage. Email attachments have become the most effective way to spread viruses.
A virus can:
Display harmless messages on the screen.
Use all available memory, thereby slowing or halting all other processes.
Corrupt or destroy data files.
Erase the contents of an entire hard disk.
Worms
A worm is a self‐replicating program that consumes system and network resources. The difference between a worm and
a virus is that a worm automatically spreads from one computer to another, whereas a virus requires some form of
action; for example a user must pass an infected disk to someone else, or must forward an infected email message.
A worm can reside in active memory and replicate on the network. Worms can spread to all computers connected to a
network and are commonly spread over the Internet via email attachments.
226 8369‐1 v1.00 © CCI Learning Solutions Inc.
Trojan Horses
A Trojan horse is a program designed to allow a hacker remote access to a target computer system. The code for a Trojan
horse is hidden inside seemingly harmless applications, such as games. Trojan horses are installed on the target system
when the user runs the infected application. Unlike worms and viruses, Trojan horses do not replicate themselves or
copy themselves to other files and disks.
Once installed on the target system, the Trojan horse can allow a hacker to take control of the target system, steal
information, install other software (including malware), download or upload files, or crash the system.
Trojan horses can be accidentally installed through software downloads (e.g., a Trojan horse is included as part of a
software application downloaded from a network), through websites containing active content (e.g., a Trojan horse in
the form of an ActiveX control), or through an email attachment.
Spyware / Adware
Spyware is a software application that is secretly placed on a user's system and gathers personal or private information
without the user's consent or knowledge. Adware is a software application that automatically displays or downloads
advertisements.
Many Internet‐based applications contain spyware. Companies with both good and bad reputations have included
spyware code in their software. Spyware can also be placed on a user's system by a virus or by an application
downloaded from the Internet.
Once installed, spyware monitors the user's activity on the Internet and conveys the information to the spyware
originator. The originator can then gather website usage, email and even password information from the user, then use it
for advertising purposes or malicious activities.
Spyware can consume memory resources and bandwidth. Spyware has the ability to:
Scan files on hard drives.
Read cookies.
Monitor keystrokes.
Install other spyware applications.
Change the default home page in web browsers.
Automatically send information to the spyware developer.
Although cookies themselves are not dangerous, they can be used to store user names and passwords if you click "Yes"
when your browser asks you if you want to store this information. Cookies also track browser activities, such as sites you
visit and options you select.
In a normal Internet transaction, cookies are read only by the server that placed them on your system; however, a hacker
who gains physical access to your system or successfully installs spyware can steal your cookies, and with them, any
stored user names and passwords.
You can download and install freeware spyware/adware applications, or you can use Windows Defender to monitor your
system for spyware. Antispyware applications are discussed later in this lesson.
Bots / Zombies
A "bot" is a type of malware which allows an attacker to gain control over an affected computer for the purposes of
fraudulent use, such as sending spam, hosting phishing websites or attaching websites. Computers that are infected with
a bot are generally referred to as zombies because their legitimate users have no knowledge that the systems are being
used for illicit purposes.
Bot programs run in the background undetected by legitimate users. The best way to protect against bot infection is to
run antivirus/antispyware software and to keep the operating system up to date.
Other Risks
Most of the risks described in this section are associated with taking advantage of uninformed users. Consider these risks
when determining the type of user account to assign to employees.
8369‐1 v1.00 © CCI Learning Solutions Inc. 227
Social Engineering
Social engineering is the practice of tricking employees into giving out passwords or other types of access information.
Social engineers pose as fellow employees, technical consultants or cleaning staff, in order to gain the trust of real
employees.
Social engineers count on people's desire to be helpful. For example, a social engineer may wait near a secured door that
requires a smartcard for access and wait until a legitimate employee is about to enter. The social engineer could then
approach the door carrying an armload of boxes. Out of courtesy, the real employee may then hold the door open so the
social engineer can enter.
Social engineers also attempt to imitate a legitimate user by confusing a switchboard operator or a security guard. In
several instances, a social engineer has actually called a company, posing as the systems manager. After explaining that
he had accidentally locked himself out of the computer, he convinced someone in the company to change administrative
access according to his instructions. All the social engineer then had to do was log on to the machine, and he had full
administrative access.
Typical targets of the social engineering strategy include anyone who has access to information about systems they do
not use, including secretaries, janitors, some administrators and even security staff.
Reducing the Risk of Social Engineering
The best way to guard against becoming a victim of social engineering is to recognize common social engineering
practices. Following is a brief list of social engineering strategies:
Posing as a technician and using that implied authority to cause employees to divulge information, to make
configuration changes to servers, or to obtain sensitive information.
Confusing or intimidating an employee or guard into allowing physical access to a building.
Sending official‐looking email messages to all employees with instructions that cause them to reveal sensitive
information.
To reduce the risk of social engineering, consider the following strategies:
Educate all employees.
To protect a truly sensitive resource, make sure the security policy requires that a certain number of employees
must first give approval to gain access to that resource. This way, no single employee can be tricked into allowing
illicit access to an essential resource.
Phishing
Phishing is the process of trying to gather sensitive information such as a password, or credit card details from an
unsuspecting victim by pretending to be a trustworthy entity. Typically, a phisher sends a legitimate‐looking email
message that directs the recipient to visit a fraudulent website that looks identical to a legitimate site. Victims are then
asked to update personal information (such as password, credit card or bank account numbers) on the fraudulent
website. The phisher can then use the captured information for malicious purposes, including identity theft. A sample
email phishing scam is shown:
228 8369‐1 v1.00 © CCI Learning Solutions Inc.
To combat phishing:
Enable the antiphishing features in your browsers.
Check an unknown site manually. (In Internet Explorer, click Tools, point to Safety, then click Check This Website.)
Avoid clicking links in email messages. If a message appears to have come from a bank, credit card company or
government agency, call the organization directly to discuss the email message. Often you will be informing the
genuine company that a fraud scheme is in place so they can send appropriate notices to their clients.
Before logging in to a secure site, check the Address bar to be sure the address starts with the legitimate site name.
Identity Fraud
When a hacker obtains a legitimate user name and password, he can log on to a network. The level of access the hacker
gains depends upon the rights and privileges associated with the stolen account. However, most network administrators
configure the network to track user logons. If a hacker logs on using your account, and manages to damage the network,
the electronic trail may lead to you. If you suspect that your account has been compromised, contact the network
administrator immediately so you can change your user name and password.
Similarly, most smartcard readers on doors to secured areas maintain logs. The logs indicate who entered through the
door and when. If a hacker enters a secured area using your stolen card and damages the network, the logs may point to
you. If you misplace your access card, notify the proper person immediately.
Pop‐ups
A pop‐up is a small window that suddenly appears and usually displays
advertising content. While the pop‐up window itself is not dangerous,
pop‐ups can include links to malware or may prompt users to install
software which might contain a virus or spyware.
Proceed with caution when granting a pop‐up permission to install
software. Keep in mind, however, that inexperienced users may not be
aware of the dangers of indiscriminately clicking links in pop‐up windows.
Configuring a browser to suppress pop‐ups is often the safest choice.
Accidental Mis‐configuration
Sometimes holes are accidentally created in otherwise secure networks through mis‐configurations. Mis‐configurations
include:
Accounts with easily‐guessed passwords.
Corporate web browsers configured to allow Java and other active content.
Storing sensitive data on servers that are accessed from the unsecured public network. For example, you should not
store confidential employee records on a web or FTP server.
Mis‐configured network equipment, such as firewalls that do not sufficiently screen incoming or outgoing traffic.
8369‐1 v1.00 © CCI Learning Solutions Inc. 229
Malware often adds or modifies registry entries. The following registry locations are affected by malware:
\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion – this location contains folders (Run,
RunOnce, RunServices, and RunServicesOnce) that are part of the autostart registries. The applications in these
folders are what Windows executes immediately after a system is started.
\HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion – this location also contains autostart
registry folders Run, RunOnce, RunServices, and RunServicesOnce.
\HKEY_CLASSES_ROOT ‐ this location contains entries that determine which applications or programs to run for
certain file extensions. Malware applications can modify the associations of commonly used file extensions and
launch more malware when the user or a program tries to open a particular file type.
At times, antimalware applications may not be able to clean or remove infected files, and you may have to remove
illegitimate registry entries in order to clean the system. Always follow the instructions carefully, and always back up
registry entries before modifying or deleting them.
230 8369‐1 v1.00 © CCI Learning Solutions Inc.
You can back up a registry entry by opening the Registry in the Registry Editor, right‐clicking the entry and selecting
Export. Save the exported entry to a file. After creating a backup, you can delete or modify the registry key. If you find
that what you deleted is a normal entry and not a malware entry, you can restore it from the backup.
Mitigating Risks
Firewalls help protect systems from unauthorized access. Antimalware software (antispyware/antivirus applications)
protects systems from malware.
Firewalls
A firewall is a security barrier that prevents unauthorized access to or from private networks. A firewall can prevent
outside users from accessing proprietary data on the corporate network from the Internet. Firewalls are also used to
control employee access to Internet resources.
A firewall works by monitoring and regulating traffic between two points, such as a single computer and a network
server. Firewalls can be implemented through hardware or software.
When you connect your computer to the Internet, you are potentially connecting to all the computers on the Internet.
This relationship works in reverse as well: All other computers on the Internet are connected to yours, and perhaps to all
the computers on your corporate LAN.
By connecting to the Internet through corporate firewalls, no computer on the LAN is actually connected to the Internet,
and any requests for information must pass through the firewall. This feature allows users on the LAN to request
information from the Internet, but to deny any requests from outside users for information stored on the LAN.
Firewalls can be considered the first line of defense against LAN security breaches because they provide data
confidentiality. Firewalls do not ensure data integrity because they do not encrypt or authenticate data. In many
corporate settings, one firewall protects all the stations on the LAN.
Desktop Firewalls
Also known as personal firewalls, desktop firewalls offer protection for an individual system instead of an entire network.
Tools such as Norton 360 or ZoneAlarm Internet Security Suite can detect and respond to attacks on a computer system.
Desktop firewalls offer many firewall features, such as inspection of all incoming transmissions for security threats. When
a firewall is used in conjunction with antivirus software, a personal computer is secure, provided that the user updates
these applications frequently.
Many operating systems now include built‐in (native) desktop firewall software. Windows, for example, includes
Windows Firewall which is enabled by default. You can configure the Windows Firewall to suit your needs, and you can
turn it on or off. The Windows Firewall is shown in the following figure.
8369‐1 v1.00 © CCI Learning Solutions Inc. 231
Antispyware
You can detect the presence of spyware by purchasing a spyware detection application, or by using Windows Defender.
Antispyware applications scan a computer's hard drive, memory and network connections, and look for suspicious
activity.
Spyware detection applications contain lists of known spyware. These lists are known as definitions. As new forms of
spyware emerge, the application vendor updates the definitions and makes them available for download and installation.
Most antispyware applications can be configured to look for and install updated definitions automatically. It is very
important to keep antispyware software updated.
Network and systems administrators can detect the presence of spyware by doing the following:
Using a network analyzer to capture and study network transmissions for suspicious packets.
Using the netstat utility to review all open ports. (Netstat is a TCP/IP utility that reads network data structures.) If
the administrator finds a suspicious port open on the system, he or she can conduct a web‐based search on that
port. The administrator may discover that it is a port used by spyware installed on the system.
End users can combat spyware by:
Deleting the application that contains the spyware.
Using a desktop firewall to block transmissions between the system and the spyware vendor.
Antivirus Software
The best protection against a virus is to know the origin of each program or file you install on your computer, or open
from your email or instant message client. However, because knowing the origins of everything is nearly impossible, use
antivirus software to scan email attachments and files for known viruses, and to eliminate any viruses that are
discovered.
Antivirus applications are available from many vendors. Some include freeware versions of their programs as well as
enhanced versions for purchase. All versions include free and frequent updates to the virus definition files that enable
the program to recognize and remove the latest viruses.
Some popular antivirus programs include:
AVG McAfee
Avast Microsoft Security Essentials
Avira Norton Antivirus/Norton 360
ClamWin
As soon as you install antivirus software, scan the computer for any possible viruses that could already be resident, and
subscribe immediately for automatic updates (or notices of updates) for the virus definition files and patches for the
program. It is generally a good practice to scan the system again after updates are installed. It is important to schedule
regular system scans and to configure the application to automatically scan email messages as they are delivered to your
Inbox.
If and when a virus is detected, you can use the antivirus software to disinfect the system. Antivirus software that is kept
current knows the signatures of the latest viruses, and works by scanning the infected file or program for these known
signatures. If the virus is found, your hard drive can often be disinfected immediately so that the virus cannot infect
other files or cause more damage.
When an antivirus program is running, it will scan the files you select; when it finds a virus or threat, it will give you the
option to quarantine or remove the threat.
If you elect to quarantine the infected files, the antivirus program will place the infected file in a quarantined or
vault area where it cannot infect other files. Quarantined files can usually be deleted at any time.
If you elect to remove the file, the antivirus program will permanently delete this file from your system. You usually
do not need to do anything else.
If the antivirus finds a virus that cannot be removed, it will still quarantine the infected file. You may be able to find
a removal tool for this virus on the antivirus program's website. Generally you will need to download a file and then
follow the instructions for removing the virus from your system. Alternatively, you may need to research how to
remove the infected file manually.
232 8369‐1 v1.00 © CCI Learning Solutions Inc.
If the virus is in active memory and you are not able to launch the antivirus software, turn off the computer and
reboot from a known, clean bootable disk to start the system without the virus in memory. You should then be able
to launch the antivirus software and begin the disinfection process.
Remember to check all your disks and backup files with the antivirus software, and remove the virus from them if
necessary.
Replace any file or programs that have been damaged or changed by the virus with backup copies or reinstall
programs from original installation media.
Be sure to find and remove all copies of the virus on your system.
It bears repeating that it is extremely important to keep antivirus software up to date and configured to automatically
download updates. It is equally important to keep the email scanner and resident scanner portions of the application
turned on. Regular system scans are recommended, and these can be scheduled. You can also manually start a scan at
any time.
Avoiding Viruses
Conducting regular scheduled scans, and enabling the resident scanner and email scanner portions of the application can
provide reasonable assurance that a system is not infected. Other steps to take to avoid infection include:
Saving files you download from the Internet to a folder other than your data folder. Scan all downloaded files before
opening them, especially if they are executable files.
Scan any removable media (CD, DVD or flash drive) before copying or opening files contained on the media.
If you share files with other people using portable devices, scan any files you plan to give to others to ensure you do
not inadvertently pass a virus on to them.
Because email is the most common method for spreading viruses, always set your antivirus program to
automatically scan all incoming and outgoing messages.
Always scan email attachments before opening them, even if they come from someone you know.
Be suspicious of any unexpected attachments you receive with email or instant message transmissions. If you
receive an attachment you did not expect or do not recognize:
– Do not open the attachment.
– Try to contact the message sender (using a method other than email) and determine whether the attachment
is legitimate.
– If you are unable to contact the sender or the sender is unaware of the attachment, delete the attachment
from the message.
– Open your Deleted Items folder and delete the attachment from it to permanently remove the attachment
from your system.
The best protection is prevention. But if your system is infected, most viruses can be removed without permanent
damage.
8369‐1 v1.00 © CCI Learning Solutions Inc. 233
As a member of the IT staff, you should periodically view the quarantine files on corporate systems to see how much
virus activity has been discovered and possibly to identify systems that are more at risk than others. If it is discovered
that employees are turning off scheduled scans, the rights on the system can be adjusted as appropriate. Limiting a
user's rights on a computer can be a sensitive area, however, and increasing user awareness and education may provide
better results
To keep track of portables, you may need to require employees to periodically bring in their laptops for routine
maintenance.
234 8369‐1 v1.00 © CCI Learning Solutions Inc.
The following figure shows the Action Center.
Red items in the Action Center are labeled important and indicate significant issues that require fairly immediate
attention. Yellow items are suggested tasks that you should consider addressing.
If you expand the Security section, the Action Center will notify you about the status of the following security features:
Windows Update
Internet security settings
Network firewall
Spyware protection (Windows Defender)
User Account Control
Virus protection
8369‐1 v1.00 © CCI Learning Solutions Inc. 235
You can change the notification settings by clicking the Change Action Center settings link. Use this page to turn
messages on or off.
236 8369‐1 v1.00 © CCI Learning Solutions Inc.
8. Read the welcome screen, then click Next.
9. Ensure that Quick scan is selected, then click Next.
The scan may take a few minutes. When the scan is complete, the MSRT displays a report of its findings.
10. Click Finish.
11. Close your browser.
In this exercise, you downloaded the MSRT and scanned for malware.
8369‐1 v1.00 © CCI Learning Solutions Inc. 237
Windows Defender
Windows Defender is a pre‐installed antispyware application that comes with Windows 7. It detects and removes known
spyware from a client system. Defender runs automatically when it's turned on and offers:
Real‐time protection Defender alerts you when spyware attempts to install itself or to run on your computer. It also
alerts you when programs attempt to change important settings.
Scanning options You can scan for spyware that might be installed on your computer, schedule scans on a regular
basis, and automatically remove anything that's detected during a scan.
Spyware‐detection applications can report false positives, in which legitimate applications are incorrectly categorized as
spyware. As you use a spyware‐detection application, be sure to examine the results carefully so you do not remove
legitimate applications.
You can use the Tools and Settings screen to configure specific options, view and work with quarantined items, and
indicate specific programs that you want Windows Defender to ignore.
You use the settings on the Options screen to configure:
Automatic scanning – set the frequency, time
and type of scan to perform. You can also
specify to check for updated definitions before
running an automatic scan.
238 8369‐1 v1.00 © CCI Learning Solutions Inc.
Real‐time protection – specify whether you
want to use real‐time protection and specify
which security agents you want to run. Real‐
time protection runs in the background and
monitors downloaded files and attachments
and/or programs that are running on the
system.
Excluded files and folders – specify files or locations not to scan.
Excluded file types – specify types of files not to scan.
Advanced – specify which files to
scan. You can also specify to create
a restore point. Restore points
allow you to return a system to a
previous configuration. You will
learn more about restore points
later in this lesson.
Administrator – specify to turn Windows Defender on or off and whether to view items from all users or only the
current user.
Defender can be configured to work with Windows Update to automatically install new definitions as they're released.
You can also manually check online for updated definitions before scanning.
If you plan to install another antivirus/antispyware application on the system, it is recommended that you turn off
Windows Defender to avoid conflicts. Some antivirus applications automatically disable Windows Defender when they
are installed. Some antivirus applications such as Microsoft Security Essentials must be uninstalled before Windows
Defender can be re‐enabled.
8369‐1 v1.00 © CCI Learning Solutions Inc. 239
3. Click the click here to turn it on link to open Windows Defender.
If Windows Defender had not previously been turned on, or has not been used for a while and is not configured to
automatically search for updates, you can click the Check for updates now button.
4. If the Check for updates now button is not visible, you can still manually check for updates. In the toolbar at the top
of the window, click the drop‐down arrow to the right of the Help button and select Check for updates.
It may take several minutes for updates to be downloaded and installed. When Windows Defender is up to date,
the Status will indicate either that the program is up‐to‐date or that no new definitions or updates are available.
5. To begin a scan, click the Scan button in the toolbar.
240 8369‐1 v1.00 © CCI Learning Solutions Inc.
The scan may take a few minutes. When complete, Windows Defender will display the scan results.
6. In the toolbar, click the Tools button to open the Tools and Settings window.
7. Take some time to explore the options presented in the Tools and Settings window, then click the Options link to
open the Options window. Take some time to explore these settings.
8. In the left pane of the Options widow, click the Administrator link, then clear the Use this program check box.
Clearing the check box turns Windows Defender off. In many cases, antivirus programs also scan for spyware, and it
is not recommended that you run two antispyware applications at the same time.
9. Click the Save button
Check with your
10. When the notification that Windows Defender has been turned off appears, click the instructor before
Close button. turning off
11. Close the Control Panel. Windows
In this exercise, you turned on Windows Defender, downloaded and installed updated Defender.
definition files, scanned the system and turned Windows Defender off.
8369‐1 v1.00 © CCI Learning Solutions Inc. 241
Like Windows Defender, Microsoft Security Essentials can be used for real‐time protection and scanning‐based
protection. The Settings tab provides virtually the same options as Windows Defender.
Microsoft Security Essentials is free for home use and for business use for up to ten PCs.
242 8369‐1 v1.00 © CCI Learning Solutions Inc.
When you select a main item in the tree, a dashboard is displayed, which provides administrators a global view (e.g.
using the green/yellow/red color scheme) and selected statistics for the enterprise. Administrators can determine the
overall health of the network with just a quick glance using this window.
8369‐1 v1.00 © CCI Learning Solutions Inc. 243
Different policies can be set up within FEP to handle the different antimalware protection settings for different groups of
endpoints. For example, all servers in the head office may require a weekly scan on Saturday starting at 3:00 AM:
244 8369‐1 v1.00 © CCI Learning Solutions Inc.
FEP can be configured to generate alerts immediately whenever an outbreak occurs. The alerts are sent via email to a
selected group of administrators:
Reports can also be set up to monitor activity during any given time period:
On endpoint systems, the FEP software locks many of the option settings because these are managed by the system
administrator.
8369‐1 v1.00 © CCI Learning Solutions Inc. 245
The overall design creates a good balance between end users and security administrators. Users are able to concentrate
on their own tasks without having to worry about maintaining the security of their systems. Security administrators can
be confident system security is maintained consistently on every endpoint.
One of the Microsoft websites offers a hands‐on demonstration (called virtual labs) of setting up, managing, and using
ForeFront Endpoint Protection. Navigate to http://technet.microsoft.com/en‐us/virtuallabs/ and select the Forefront
Security link.
246 8369‐1 v1.00 © CCI Learning Solutions Inc.
If Windows Backup has not been set up, you can set it up by clicking the Set up backup link.
8369‐1 v1.00 © CCI Learning Solutions Inc. 247
3. Click a location in the Backup Destination list box, then click Next.
4. When asked what you want to back up, accept the default setting for letting Windows choose. This option backs up
files saved in libraries, on the Desktop and in default Windows folders. Click Next.
You can save the settings and run the backup immediately, or you can click the Change schedule link to edit the
configuration.
248 8369‐1 v1.00 © CCI Learning Solutions Inc.
6. Use the drop‐down lists to configure the backup the way you want it, then click OK.
7. Click the Save settings and run backup button. Windows Backup begins to run in the background. If you selected an
optical drive as a backup location Windows will prompt you to label and insert a blank disc.
8. If you have blank disc, insert it into the optical drive and click OK. (If you do not have a blank disc, click the Stop
backup button.)
9. If prompted to format the media, click the Format button (Windows may format the media automatically). If
prompted, insert additional discs.
In this exercise, you set up and ran the Windows Backup utility.
Restoring Files
In the event of a disk failure, or accidental deletion or other damage that has made one or more files non‐recoverable,
you can restore data to a hard drive from the saved backup media. To restore files, open the Backup and Restore
window. Click the Restore my files button to open the Restore Files window.
8369‐1 v1.00 © CCI Learning Solutions Inc. 249
To browse the contents of the backup media, click the Browse for files button or the Browse for folders button. (If you
want to view individual files, use the Browse for files button). You can select specific files that you want to restore, or you
can choose to restore all the files by selecting the highest level folder. After you have selected the files and/or folders,
click Next.
You can restore files to their original location, or you can specify a different location. Specify the location, then click the
Restore button. Windows restores the files to the specified location. Click the Finish button to close the Restore Files
window, then close the Backup and Restore window of the Control Panel.
You can also use the Backup and Restore utility to create system images.
250 8369‐1 v1.00 © CCI Learning Solutions Inc.
System Images
A system image is an exact image of a hard drive; it includes Windows and your system settings, programs, and files. You
can use a system image to restore the contents of a computer if the hard drive fails or the computer stops working.
When you restore a computer from a system image, it is a complete restoration; you cannot choose individual items to
restore, and all your current programs, system settings, and files are replaced.
System images use the virtual hard disk (VHD) format used by Hyper‐V and Windows Virtual PC. You can create a system
image after installing Windows and other important applications and then easily revert to that state at any time in the
future.
You create system images with the Backup and Restore utility.
You can also use the Backup and Restore utility to create a system repair disk, which allows you to boot the computer if it
becomes unbootable, and then restore the computer from a system image backup. The system repair disk is a bootable
CD or DVD disk with the Windows Preinstallation Environment installed.
To create a system image:
1. Log on as an administrator.
2. Open the Backup and Restore window.
3. In the left pane, select Create a system image.
4. Choose the destination for the system image (a hard disk, one or more DVDs, or a network location) and click Next.
8369‐1 v1.00 © CCI Learning Solutions Inc. 251
5. On the Confirm your backup settings screen, verify that the proper drives are listed for backup and click Start
backup.
6. A screen will appear, telling you that Windows is saving the backup. Depending on the size of the backup the
process can take from several minutes to more than an hour. You can click Stop Backup at any time to cancel the
backup.
7. When the backup completes, you may be asked to create a System Repair Disk.
8. Click Close when you see a screen indicating the system image has been created.
252 8369‐1 v1.00 © CCI Learning Solutions Inc.
The following information is included in a restore point:
System files
Registry settings
Executable files
Script files
Batch files
Shadow copies of user data files (copies of the files retained on the system for recoverability purposes)
If your computer is running slowly or is not working properly, you can revert the computer to its previous settings using a
restore point. Reverting to a restore point restores system settings, installed programs and drivers. However, reverting to
a restore point does not affect personal files and settings. Reverting to a restore point will not recover a data file or your
browsing history, for example.
If you accidentally modify or delete a file or folder, you can restore it to a previous version that has been saved as part of
a restore point.
Previous Versions
Previous versions are copies of files and folders that Windows automatically saves as part of system protection. You can
use previous versions to restore files or folders that you accidentally modified or deleted, or that were damaged. If
system protection is turned on, Windows automatically creates previous versions of files and folders that have been
modified since the last restore point was made. Typically, restore points are made once a day. If your disk is partitioned
or if you have more than one hard disk on the system, you need to turn on system protection for the other partitions or
disks. Previous versions are also created by Windows Backup when you back up your files.
To restore a file or folder to a previous version, navigate to the file in Windows Explorer, right‐click it and then select
Restore previous versions in the shortcut menu. Windows will display the previous file versions.
It is important to understand that when you restore a previous version, the file or folder will replace the current version
on your computer, and the replacement cannot be undone. Before restoring a previous version, select a version in the
dialog box, and then click Open to view it and make sure that it is the version you want.
Note that you cannot open or copy previous versions of files that were created by Windows Backup, but you can restore
them. To restore a previous version, select it in the dialog box, then click Restore.
If the Restore button is not available, you cannot restore a previous version of the file or folder to its original location.
However, you might be able to open it or save it to a different location.
8369‐1 v1.00 © CCI Learning Solutions Inc. 253
3. Click the Configure button.
254 8369‐1 v1.00 © CCI Learning Solutions Inc.
You can specify settings for each drive on which System Protection is turned on. In the Restore Settings section, you
can control how much information Windows preserves. In the Disk Space Usage section, you can adjust the
maximum amount of disk space allocated for system protection files. You can also delete all restore points, system
settings and previous versions (except the very latest).
4. Click Cancel to close the System Protection dialog box.
5. In the System Protection tab of the System Properties dialog box, click the Create button to open the Create a
restore point window, type a description to help you identify the restore point, then click the Create button.
When Windows has finished creating the system restore point, the Restore point was created successfully window
appears.
6. Click the Close button to close the notification window.
7. Click the System Restore button to open the Restore system files and settings window.
8. Click Next to view the available restore points.
8369‐1 v1.00 © CCI Learning Solutions Inc. 255
Windows displays several restore points. Notice that the most recently created one If your system does
appears at the top of the list. Notice also that Windows indicates a type for each not display any
restore point. restore points,
9. Click the oldest restore point listed to select it, then click the Scan for affected select the Show
programs button. Windows displays a list of any programs that would be affected if more restore points
you rolled back the system to the selected restore point. check box.
10. Click the Close button, click the Cancel button, then close any open dialog boxes.
In this exercise, you examined system protection settings and manually created a restore point.
256 8369‐1 v1.00 © CCI Learning Solutions Inc.
To start Windows in a particular mode, or to start a diagnostic tool, select one of the options and press ENTER. The
Advanced Boot Menu provides the following options:
Repair Your Computer Displays a list of system recovery tools you can use to repair startup problems, run
diagnostics or restore the system.
Safe Mode Starts Windows with only the core drivers and services. Use this option when you
cannot boot after installing a new drive or driver.
Safe Mode with Networking Starts Windows with core drivers, plus networking support.
Safe Mode with Command Starts Windows with core drivers, and launches the command prompt.
Prompt
Enable Boot Logging Creates a file called ntbtlog.txt, which lists all drivers that load during startup, including
the last file to load before a failure. You can reference this log and determine which
driver was last successfully loaded, and arrive at a starting point for troubleshooting.
Enable low‐resolution video Starts Windows in low‐resolution display mode. This option does not change the display
(640x480) driver, but is useful when the screen resolution has been changed to one that
the monitor you're using does not support, thereby providing you an opportunity to
start Windows at a universally accepted resolution so you can then configure the
resolution at an appropriate setting.
Last Known Good Starts Windows with the drivers and registry data that were recorded the last time
Configuration (advanced) Windows was successfully started and then shut down.
Directory Services Restore Starts Windows in Directory Services Repair Mode, which repairs the directory service.
Mode This option applies only to Windows domain controllers.
8369‐1 v1.00 © CCI Learning Solutions Inc. 257
Debugging Mode Enables the Windows kernel debugger. This is an advanced diagnostic mode in which
data about Windows is sent to a debugger.
Disable automatic restart on Prevents Windows from automatically rebooting after a serious system failure, such as a
system failure Blue Screen of Death.
Disable Driver Signature Allows unsigned drivers or drivers containing improper signatures to be loaded.
Enforcement
Start Windows Normally Starts Windows using its regular settings.
Understanding Updates
All operating systems and applications are vulnerable to attack as hackers and malware creators discover new
Objective
weaknesses. For this reason, vendors continually release updates in various general forms.
6.3
A patch is a file of programming code that is inserted into an existing executable program to fix a known problem, or bug.
Patches are designed to provide an immediate solution to a particular programming problem and can often be
downloaded from the software vendor’s website. However, patches are intended to be only temporary solutions until
problems can be permanently repaired.
Generally, a software vendor will provide permanent solutions to program bugs in later product releases, known as
updates. An update is any file or collection of software tools that resolves system liabilities and improves software
performance. Updates are released periodically when deemed necessary by the vendor. A major update with significant
software improvements may be marketed as a new release.
258 8369‐1 v1.00 © CCI Learning Solutions Inc.
A service pack is a collection of updates, and is typically released after enough updates have accumulated to warrant the
release. Service packs typically contain all previous updates, which include security patches, bug fixes, new features,
utilities and applications.
Windows Update
Windows Update is a service provided by Microsoft that provides updates for the Microsoft Windows operating system
and its installed components, including Internet Explorer.
In Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012
you use the Control Panel to configure update settings and check for updates. Updates are downloaded from the
Windows Update website.
There are different kinds of updates. Security updates or critical updates protect against vulnerabilities to malware and
security exploits. Other updates correct errors that aren't related to security, or enhance functionality.
8369‐1 v1.00 © CCI Learning Solutions Inc. 259
Security updates are routinely provided on the second Tuesday of each month, but can be made available at any time
when a new vulnerability is discovered. Other updates are not released on a regular schedule, only as the need arises.
Windows Update can be configured to install critical updates automatically.
Automatic Updating
You can configure Windows Update to automatically check for the latest updates. Depending on the settings you choose,
Windows can install updates automatically or simply alert you that they are available. If you did not turn on automatic
updating when you first set up the computer, you can still turn it on at any time.
If you don't use automatic updating, you should manually check for updates at least once every week. Microsoft typically
releases important updates on the second or fourth Tuesday of the month. However, updates could be released at any
time.
If you turned on automatic updating, then most security, reliability, and compatibility updates will be downloaded and
installed automatically. Many updates, however, are not installed automatically; these include optional updates and
updates that require you to accept new terms of use.
Update Categories
Updates are categorized based on their importance. There are three categories for updates:
Important These updates include security and critical updates, as well as reliability improvements.
Recommended These updates include software updates and new or improved features. If you selected Use
recommended settings when you set up Windows Update, then recommended updates will be shown
together with important updates. If you selected Install important updates only, recommended
updates will be shown together with optional updates.
Optional These updates include updates and software that you can install manually, such as new or trial
Microsoft software or optional device drivers from Microsoft partners.
Microsoft Update
An optional feature enables access to Microsoft Update (instead of Windows Update). Microsoft Update is an expanded
version of the update service which provides updates not just for the operating system and Internet Explorer, but also for
other Microsoft software running under Windows, such as Microsoft Office, Windows Live applications, and Microsoft
Expression Studio.
260 8369‐1 v1.00 © CCI Learning Solutions Inc.
The Windows Update Control Panel shows the current status of available updates. You can click an update link to view
details about the update.
From the Windows Update Control Panel, click the Change settings link to configure how updates are downloaded and
installed.
8369‐1 v1.00 © CCI Learning Solutions Inc. 261
Notice that you can specify how important updates are downloaded and installed. The following options are available:
Install updates automatically (recommended)
Download updates but let me choose whether to install them
Check for updates but let me choose whether to download and install them
Never check for updates (not recommended)
You can also specify how recommended updates should be managed. By selecting the Give me recommended updates
the same way I receive important updates check box, you are configuring Windows Update to automatically download
(and possibly install, depending on the setting) recommended updates at the same time as important updates.
Optional updates are not downloaded or installed automatically. You can, however, manually install optional updates.
Click the link for the available optional updates shown in the Windows Update Control Panel to view the details. Click the
name of any update to view specific information about the update. Select the check box for any update you want to
manually install.
Click OK to save your selections and return to the Windows Update Control Panel. Click the Install updates button to
install the selected updates immediately. After updates are installed, you may be prompted to restart the system.
By selecting the Give me updates for Microsoft products and check for new optional Microsoft software when I update
Windows check box, you are configuring the update service to use Microsoft Update.
From the Windows Update Control Panel, you can click the View update history link to view a history of when updates
have been installed.
262 8369‐1 v1.00 © CCI Learning Solutions Inc.
From the Windows Update Control Panel, you can also click the Check for updates link to manually check for updates.
To install new update software, click the Install now button and follow the prompts on the screen. Windows Update may
automatically close and reopen.
8369‐1 v1.00 © CCI Learning Solutions Inc. 263
Maintenance Tools
Windows 7 provides several built‐in tools for system maintenance. These include the Disk Defragmenter and Disk
Objective
Cleanup utilities, the Task Scheduler, Action Center, and System Information tools.
6.2
You explored the Action Center earlier in this lesson. Its role in system maintenance is much like its role in system
security – it provides a central place to view alerts and take actions that can help keep the system maintained and
performing well.
264 8369‐1 v1.00 © CCI Learning Solutions Inc.
If you suspect that fragmented files are causing performance problems, you can start the Disk Defragmenter manually at
any time. To run the Disk Defragmenter, click Start, then click Computer to open the Computer window.
In the Computer window, right‐click a hard drive and select Properties, then click the Tools tab of the Properties dialog
box.
Click the Defragment now button to open the Disk Defragmenter dialog box, shown in the following figure. This dialog
box shows the current schedule for Disk Defragmenter and shows the current fragmentation status of the various drives
on the system.
8369‐1 v1.00 © CCI Learning Solutions Inc. 265
To analyze the hard disks, click the Analyze disk button. To run the Disk Defragmenter, click the Defragment disk button.
You can also change the schedule for defragmentation by clicking the Configure schedule button.
You can specify which disks to defragment by clicking the Select disks button.
266 8369‐1 v1.00 © CCI Learning Solutions Inc.
If you choose to have Windows fix file system errors automatically, the scan will be scheduled for the next time you
restart the computer. If you clear the Automatically fix file system errors check box, then errors will be reported but not
acted upon and the scan will begin as soon as you click the Start button.
As a disk scan is underway, Windows shows a progress meter.
When the check is complete, Windows displays the results.
You can open the See details drop‐down list to see the full results of the check disk utility.
8369‐1 v1.00 © CCI Learning Solutions Inc. 267
Disk Cleanup Utility
Operating systems generate temporary files that you should periodically delete to conserve disk space. In some cases,
deleting temporary files and directories will help you recover from application failures and from failed application
installations.
The Disk Cleanup utility enables you to recover the disk space used by temporary files, unused applications, files in the
Recycle Bin, files you downloaded as part of web pages, and files created when the check disk utility attempts to recover
lost file fragments.
Disk Cleanup scans your drive for files that can be safely deleted, but gives you the option to keep or delete them.
You can access the Disk Cleanup utility from the System Tools
menu. Click Start, All Programs, Accessories, System Tools,
Disk Cleanup. On a system that includes multiple hard drives,
you begin by specifying which drive you want to clean up.
268 8369‐1 v1.00 © CCI Learning Solutions Inc.
Click OK to allow the utility to analyze the selected drive. On a
system that contains only one hard drive, the analyzing phase
begins immediately without your needing to specify which
drive to clean. When the analyzing phase is complete, the Disk
Cleanup dialog box opens.
In the Files to delete list, select or clear the check boxes to
specify which files you want to delete, then click the OK
button. You are prompted to confirm that you want to delete
the indicated files.
Click the Delete Files button to begin the cleanup process.
Windows reports its progress.
The Disk Cleanup dialog box closes automatically when the
process is complete.
Task Scheduler
The Task Scheduler is a service that monitors for scheduled tasks and executes them at the defined
time. Many tasks, such as the Disk Defragmentation task are built into the operating system. MMM
However, you can modify when and how these tasks are run using the Task Scheduler. Scheduling
The Task Scheduler allows you to: Tasks
Create scheduled tasks
Display running tasks
Import scheduled tasks exported from other computers
8369‐1 v1.00 © CCI Learning Solutions Inc. 269
Tasks can run on a schedule or they can run based on triggers (occurrences or environmental conditions). The available
triggers for the Task Scheduler are:
System startup
User logon
System idle
Creation of an Event Log entry
Workstation locked
Workstation unlocked
To open the Tasks Scheduler, click Start, All Programs, Accessories, System Tools, Task Scheduler. The Task Scheduler is
shown in the following figure.
Tasks are stored in folders in the Task Scheduler library. To view or perform an operation on an individual task, select the
task in the Task Scheduler library and click on a command in the Action menu.
270 8369‐1 v1.00 © CCI Learning Solutions Inc.
7. Click the Triggers tab in the dialog box, then click the Edit button to open the Edit Trigger dialog box. Notice that
you can change the day, time and frequency with which the Defrag task is executed.
8. Click Cancel twice.
You can create a new task using the Basic Task wizard.
9. In the left pane, click Task Scheduler (Local).
10. In the right pane, click Create Basic Task to start the Create Basic Task Wizard.
11. In the name box, type: Class‐Note, press TAB, in the description box, type: Open Notepad when I log on
then click Next.
8369‐1 v1.00 © CCI Learning Solutions Inc. 271
12. In the When do you want the task to start column, select When I log on, to specify the logon event as the trigger for
the task, then click Next.
13. Ensure that Start a program is selected for the action, then click Next.
14. Click the Browse button, navigate to the C:\Windows\System32 folder, scroll the list, click Notepad.exe, then click
Open to specify the path and application name.
15. Click Next.
16. Select the Open the Properties dialog box for this task when I click Finish check box.
17. Click Finish. Task Scheduler creates the task, adds it to the Windows schedule, and opens the Properties dialog box
for the Class‐Note task.
18. Examine the tabs in the Properties dialog box to familiarize yourself with the task settings. When you are done, click
OK.
272 8369‐1 v1.00 © CCI Learning Solutions Inc.
19. Close the Task Scheduler.
Now you can test your new task.
20. Click Start, point to the arrow next to Shut down, then select Log off to log off the system.
21. Log back on to the system. When you log back on, Notepad opens.
22. Close the Notepad window.
23. Open the Task Scheduler.
24. In the left pane, click Task Scheduler Library, then in the middle pane, click the Class‐Note task.
25. In the right pane, click Delete, click Yes to confirm the deletion, then close the Task Scheduler.
In this exercise, you examined task properties, and created, tested, and deleted a new task.
System Information
System Information is a graphical tool for viewing system configuration settings and properties. To open System
Information, click Start, Accessories, System Tools, System Information.
You can view information on hardware resources, such as conflicts, I/O addresses, IRQs, etc.
8369‐1 v1.00 © CCI Learning Solutions Inc. 273
You can also view information on installed components, including input devices, network cards, sound devices, disks and
drives, printers and USB devices.
You can also view information about the current software environment, including system drivers, print jobs, network
connections, running tasks, services and startup programs.
274 8369‐1 v1.00 © CCI Learning Solutions Inc.
Lesson Summary
In this lesson, you learned about various tools and methods for maintaining a Windows 7 system. You are now able to:
Identify various types of malware.
Identify security risks other than malware.
Explain how malware affects the Windows Registry.
Explain the use of firewalls.
Describe the function and purpose of antispyware software.
Describe the function and purpose of antivirus software.
Describe how to avoid malware infection.
Understand the function of the Windows Action Center.
Explain and use the Malicious Software Removal Tool.
Describe and use Windows Defender.
Describe the function of Microsoft Security Essentials.
Describe the function of Microsoft Forefront Endpoint Protection.
Explain Windows Backup and Restore.
Describe the function of system images, restore points and previous versions.
Explain Advanced Boot Options, including Safe Mode and Last Known Good Configuration.
Describe Microsoft update types.
Explain how to use Windows Updates.
Explain and use Windows system maintenance tools, including Defrag and Disk Cleanup.
MMM
Explain how to use the Task Scheduler. Go online for
Describe the purpose and function of the System Information tool. Additional
Review and Case
Scenarios
8369‐1 v1.00 © CCI Learning Solutions Inc. 275
Review Questions
1. Which of the following tools can you use to check the status of Windows Update, virus protection, and the firewall all in
one place?
a. The Action Center c. The Task Scheduler
b. The System Information window d. The Disk Management snap‐in
2. Which of the following antimalware tools must be downloaded from Microsoft before it can be used?
a. Windows Defender c. The Windows firewall
b. The Malicious Software Removal Tool d. The Windows Action Center
3. Which of the following tools can you use to restore a folder that you accidentally deleted?
a. A system restore point c. Previous versions
b. The Disk Management snap‐in d. Safe Mode
4. Under which of the following conditions would you use the Last Known Good Configuration option?
a. When Windows fails to boot successfully
b. When you want to restore a file that was deleted
c. When you want to roll back a driver to a previous state
d. When you want to edit the Windows Registry
5. Which of the following tools can you use to stop the Defrag utility from running automatically?
a. The Action Center c. The advanced Boot Options menu
b. The System Information window d. Task Scheduler
276 8369‐1 v1.00 © CCI Learning Solutions Inc.
Appendices
Appendix A: Courseware Mapping
Appendix B: Glossary of Terms
Appendix C: Index
8369‐1 v1.00 © CCI Learning Solutions Inc. A 1
Courseware Mapping
Exam 98‐349
Windows Operating System Fundamentals
Objective Domain Topic Title Lesson #
1. Understanding Operating System Configurations
1.1 Configure Control Panel options. Configuring Control Panel Options 2
1.2 Configure desktop settings. Configuring Desktop Settings 2
1.3 Understand native applications and tools. Understanding Native Applications and Tools, Using 2
the System Configuration Tool
1.4 Understand mobility. Understanding Mobility 2
Remote Desktop Connection 3
1.5 Understand remote management and assistance. Managing Remote Systems and Users 3
2. Installing and Upgrading Client Systems
2.1 Identify Windows operating system editions. Windows Operating System Versions and Editions 1
2.2 Identify upgrade paths. Understanding Windows Anytime Upgrade, Identifying 1
Upgrade Paths
2.3 Understand installation types. Deployment Options 1
2.4 Understand virtualized clients. Introducing Virtualization 1
Remote Desktop Connection, Remote Desktop Services 3
(RDS), Virtual Desktop Infrastructure
3. Managing Applications
3.1 Understand application installations. Installing and Uninstalling Applications, Group Policy 3
3.2 Understand user account control (UAC). User Accounts 3
3.3 Remove malicious software. Microsoft Malware Solutions 6
3.4 Understand services. Understanding Services 3
3.5 Understand application virtualization. MED‐V 1
Application Virtualization, Virtual Desktop 3
Infrastructure
4. Managing Files and Folders
4.1 Understand file systems. Understanding File Systems 4
4.2 Understand file and print sharing. Setting Up File and Print Sharing 4
4.3 Understand encryption. Understanding Encryption 4
4.4 Understand libraries. Working with Libraries 1, 4
A 2 8369‐1 v1.00 © CCI Learning Solutions Inc.
5. Managing Devices
5.1 Connect devices. Connecting Devices, Understanding Printing Devices 5
5.2 Understand storage. Understanding File Systems 4
Understanding Storage 5
5.3 Understand printing devices. Understanding Printer Devices 5
5.4 Understand system devices. Understanding System Devices 5
6. Understanding Operating System Maintenance
6.1 Understand backup and recovery methods. Windows Backup Methods and Tools 6
6.2 Understand maintenance tools. Microsoft Malware Solutions 6
6.3 Understand updates. Understanding Updates 6
8369‐1 v1.00 © CCI Learning Solutions Inc. A 3
Glossary of Terms
adware – a software application that automatically displays or endpoint – any intelligent computing device (such as a server,
downloads advertisements. desktop or laptop computer, tablet, or handheld computer
antivirus applications – applications designed to detect and that has a CPU and is capable of running application software)
eliminate viruses and other malware. connected to others in a network.
application software – software that is used to perform farm – a bank of servers used to provide services to a
certain functions such as word processing or database network.
functions. firewall – a security barrier that prevents unauthorized access
asymmetric‐key encryption – an encryption method which to or from private networks.
uses two keys, a public key and a private key. The public and Get‐Help – PowerShell cmdlet that displays help about
private keys are mathematically related so only the public key PowerShell cmdlets and concepts.
can be used to encrypt messages, and only the corresponding Get‐Process – PowerShell cmdlet that retrieves a list of all
private key can be used to decrypt them. Together, these keys processes running on the machine.
are known as a key pair
Get‐Service – PowerShell cmdlet that retrieves a list of all
backup – a duplicate copy of a program, a disk, or data, made services running on the machine.
either for archiving purposes or for safeguarding files from
hacker – any person who attempts to gain unauthorized
loss if the active copy is damaged or destroyed.
access to a computer system.
bare metal (Type 1) – hypervisor software that runs directly
hash – a number generated by an algorithm from a string of
on top of the computer hardware without an operating
text. The hash is as unique to the text string as fingerprints are
system in between.
to an individual. Also called a message digest.
clean install – a method of installing Windows wherein the
hash encryption – an encryption method in which hashes are
operating system files are installed fresh, user settings must
used to verify the integrity of transmitted messages. Also
be configured anew, user files and any programs that were
called one‐way encryption.
installed on the system prior to the clean install must be
reinstalled and reconfigured. hosted (Type 2) – hypervisor software that runs on top of an
operating system.
client – a system that requests a service or information from
another computer on the network. hypervisor – the software that runs one or more virtual
machines.
cloud computing – the practice of using applications or
storage space on the Internet rather than on your own image – a template or master copy of a virtual machine used
computers and servers. All that is required to use cloud in MED‐V implementations.
computing services is a Web browser and an Internet key – a piece of information that determines the output of an
connection; no other software needs to be installed. encrypting algorithm. Encrypted text cannot be read without
decryption – the process of converting the encrypted data the correct decryption key to decrypt, or decipher, the
back to its original form. encrypted data back into plaintext.
device – any piece of equipment that can be attached to a load balancer – a tool used to even out the workload across
network or computer, such as a mouse, printer, monitor, host servers and ensure that response time is minimized for all
game controller, video card, or any other peripheral clients.
equipment. malware (malicious software) – refers to programs or files
device driver – a small program that enables a device to whose specific intent is to harm computer systems. Malware
communicate with the operating system. A device driver is an electronic form of vandalism that can have global
"talks" to the hardware device and "talks" to the operating implications.
system, functioning as a type of communication liaison MED‐V – virtualization software that is designed for
between hardware and software. enterprises; it allows you to use a centralized system
directory – the organization of folders and subfolders on any management tool to create, configure, and deploy virtual
given storage media. Windows machines to end user computers.
drive‐by downloads – files found on poisoned Web sites network – a group of two or more computers connected in
which download Trojan horses, spyware, viruses or other such a way that they can communicate, share resources and
malware without the user's knowledge or consent. exchange data with one another.
encryption – the process of converting data into an operating system – a software program that controls all
unreadable form of text. hardware and application software on the computer.
A 4 8369‐1 v1.00 © CCI Learning Solutions Inc.
operating system edition – a specific distribution of an streaming – the process of transferring data or applications
operating system that determines which features are from a server to a client in a continuous data stream. App‐V
available. applications are
operating system version – a reference to the specific code symmetric‐key encryption – an encryption method in which
base that was used to develop the operating system. one key is used to encrypt and decrypt messages. Also known
Examples include Windows XP, Windows Vista, and Windows as single‐key encryption.
7. system drive – the hard drive on which the operating system
patch – a file of programming code that is inserted into an is installed.
existing executable program to fix a known problem, or bug. time out – an event that occurs at the end of a predetermined
Patches are designed to provide an immediate but temporary period of time to prevent a system from waiting indefinitely
solution to a particular programming problem. for something to happen. A predetermined waiting period will
peer‐to‐peer network — a network in which all the be aborted after the timeout period has elapsed.
participating computers are more or less equal, and there is Trojan horse – a program designed to allow a hacker remote
no central server or centralized management of network access to a target computer system. Unlike worms and
resources. viruses, Trojan horses do not replicate themselves or copy
permission bits – file bits that the owner of a file can set to themselves to other files and disks.
allow or disallow access to other users. update – any file or collection of software tools that resolves
NTFS allows you to set permission bits. system liabilities and improves software performance.
permissions – rules associated with objects on a computer, Updates are released periodically when deemed necessary by
such as files, folders and settings. Permissions determine the vendor.
whether you can access an object and what you can do with it. upgrade – a method of installing Windows wherein all existing
poisoned Web sites – Web sites that contain malicious user settings, files and installed applications are retained and
content designed to harm computers. Simply visiting a you do not need to reinstall them.
poisoned Web site can infect or destroy the data stored on a usage policy – configurations specific to a MED‐V image; used
system. to identify which users are permitted access to the image, and
restore point – a component of Windows ME, XP, Vista and stored in Active Directory.
Windows 7 that allows you to roll back system files, registry virtual – in computing, refers to the way a particular
keys and installed programs to a previous state. You can think component or environment appears to a user.
of a restore point as a saved "snapshot" of a computer's data virtual machine (VM) – a simulated collection of computer
and settings at a specific point in time. hardware that exists and behaves like a real (physical)
root directory – the highest level of any directory. computer, but is in fact a software implementation of a
sandbox – a security mechanism that keeps running programs computing environment. You create a VM using virtualization
separated from one another, and provides a tightly controlled software.
set of resources for guest programs to run in. virus – a malicious program designed to damage computer
server – a computer in the network that manages network systems. Viruses are loaded onto your computer without your
resources and/or provides information and services to clients knowledge and run without your consent
on the network workspaces – Windows virtual machines created with MED‐V
sequencing – in APP‐V, sequenced applications are streamed software.
to client computers from a centralized server, but appear to worm – a self‐replicating program that consumes system and
be installed on the local machine. network resources. A worm automatically spreads from one
service – an application program that runs in the background. computer to another without requiring human action.
service pack – a collection of updates typically released after x64 – a reference to the 64‐bit class of processors.
enough updates have accumulated to warrant the release. x86 – a reference to the 32‐bit class of processors
Service packs typically contain all previous updates, which XP Mode – virtualization software which enables you to create
include security patches, bug fixes, new features, utilities and and run a Windows XP virtual machine on your Windows 7
applications. Desktop.
spyware – a software application that is secretly placed on a
user's system and gathers personal or private information
without the user's consent or knowledge.
8369‐1 v1.00 © CCI Learning Solutions Inc. A 5
Index
32‐bit C Domain, 150
Domains, 5
32‐bit, 1, 3, 7, 8, 9, 10, 12, 13, 17, 31 CA, 175 Drive Types, 198
Central Processing Unit, 2 Basic Disks, 198
64‐bit certificate authority (CA), 175 Dynamic Disks, 198
64‐bit, 1, 3, 7, 8, 9, 10, 12, 13, 17, 18 Check Disk, 267 Virtual Hard Disks (VHDs), 198
Chkdsk utility, 267 drive‐by downloads, 229
A ciphertext, 171 Drivers, 191
Accessibility Clients, 4 Graphics, 4
Accessibility Tools, 79 Cloud Storage, 199 Installing, 192
Accessibility Options, 78 Compatibility Locating and Downloading, 192
Accessibility Tools, 79 Application, 20 Updating, 193
Action Center, 234 Issues, 20 Drives
active content, 66 Remediating Issues, 20 Mapping, 161
Address bar, 41 Compatibility Administrator, 20
Administrative Tools, 76 Compression, 178 E
Adware, 227 Configuring
Encrypting File System (EFS), 171
Aero, 54 User Account Control, 100
encryption, 171
Themes, 56 Control Panel, 75
Encryption, 171
Anti‐spyware, 232 Accessibility Options, 78 BitLocker, 175
anti‐virus software, 232 Administrative Tools, 76
Certificates and Keys, 173
Antivirus Software, 232 Configuring, 75
Digital Certificates, 175
APIs, 4 Convert utility, 146
Encrypting File System (EFS), 171
Application, 2 CPU, 2, See Hash, 171
Application Compatibility Manager Managing Keys, 175
(ACM), 20 D
One‐way, 171
Application Virtualization, 127 decryption, 171 Public Key Infrastructure (PKI), 175
App‐V, 128 Decryption, 171 Single‐key, 171
Applications defragmentation, disk, 264 Symmetric‐key, 171
Configuring, 105 Deployment, 20 encryption, hash, 171
Default Installation Locations, 103 Desktop, 38 encryption, one‐way, 171
Installation Engine, 103 Aero, 54
Installation through Group Policy, Configuring, 42 F
108 Gadgets, 42
FAT, 143
Installing, 102 Shortcuts, 50
File Sharing, 150
Local Installation, 102 System Icons, 53 File Systems, 141, 143, 146
Network Installation, 107 Device driver, 2 Converting, 146
Uninstalling, 102, 105 Device Manager, 219
File Allocation Table (FAT) file system,
Asymmetric‐key Encryption, 171 Disabling Drivers, 221
143
asymmetric‐key encryption, 171 Rolling Back a Driver, 221 New Technology File System (NTFS),
Audio Devices, 218 Devices, 191 144
Avoiding viruses, 233 Audio, 218
firewall, 231
Connecting, 191
B fragmentation, disk, 264
Infrared, 219
Backup and Restore, 247 Third‐Party Software for, 195 G
Backups, 246 Video, 218
Gadgets, 39
Backup and Restore, 247 Devices and Printers Page, 210
Gigahertz, 2
Restoring Files, 249 Disk Cleanup utility, 268
Group Policy, 115
System Images, 251 Disk Defragmenter, 264
Local Group Policy Editor, 116
Basic Input Output System (BIOS), 21 Disk Defragmenter utility, 264
BitLocker, 175 Disk Maintenacne H
Boot disk, 21 Defragmenter, 264
Hacker, 225
Boot Options Disk Maintenance, 264
Hard Drives, 3, 141
Advanced, 257 Check Disk, 267
Formatting, 143, 145
Recovery, 257 Disk Cleanup, 268
Logical Drive Letters, 142
Boot sequence, 21 Display Settings, 47
Logical Drives, 142
Breadcrumb trail, 41 Multiple Display Devices, 48
Partitions, 142
browser security, 66 Screen Magnification, 48
Tracks and Sectors, 141
Bus, 194 Screen Resolution, 47
hash, 171
A 6 8369‐1 v1.00 © CCI Learning Solutions Inc.
hash encryption, 171 Malware Solutions Plug‐and‐Play
Hash Encryption, 171 Action Center, 234 Connecting Devices, 195
Help, 42 Malicious Software Removal Tool, Connecting Printers, 195
Hertz, 2 236 Plug‐and‐Play (PnP), 194
High Touch with Standard Image, 23 Microsoft Forefront Endpoint poisoned Web sites, 229
HomeGroup, 150 Protection, 243 Pop‐ups, 229
File Sharing, 155 Microsoft Security Essentials, 241 Previous Versions, 253
Joining, 152 Windows Defender, 238 Print Drivers, 207
HomeGroups, 5, 151 Megahertz, 2 Print Queue, 208
Memory, 3 Print Sharing, 150
I message digest, 171 Print Spooler, 207
Identity fraud, 229 Microsoft Application Virtualization Printer Ports, 207
Infrared Devices, 219 (App‐V), 127 Printers, 167
Installing Applications, 102 Microsoft Enterprise Desktop Connecting, 211
Installing Windows Virtualization (MED‐V), 31 Disconnecting, 211, 215
Automated Installations, 23 Microsoft Forefront Endpoint Drivers, 168
Clean Install, 18 Protection, 243 Local, 210
Cloud‐based Deployment, 24 Microsoft Management Console (MMC), Managing, 215
Compatibility Center, 17 113 Network, 210, 214
DVD, 21 Group Policy Management Console Printer Shares, 167, 168
Network‐based Installations, 23 (GPMC), 115 Sharing, 167, 212
PC Upgrade Advisor, 14 snap‐ins, 113 Printing Devices, 207
Planning, 13 Microsoft Security Essentials, 241 Printing to a File, 216
System Requirements, 13 Microsoft XPS Document Writer, 216 Microsoft XPS Document Writer, 216
Upgrade, 18 Mobility, 84 processor, 2
Upgrade Paths, 19 MSCONFIG. See System Configuration Processor, 194
USB, 22 Tool processor speed, 2
Internet Profiles, 44
Security Zones, 67 N Default, 44
Internet Explorer, 62 Native Applications, 60 Local, 46
Accelerators, 63 Internet Explorer, 62 Public, 44
Compatibility View, 64 Windows Media Center (WMC), 69 Roaming, 46
InPrivate Browsing, 65 Windows Media Player (WMP), 70 Public Key Infrastructure (PKI), 175
Pop‐Up Blocker, 69 Native Tools, 60 Public‐key Encryption, 171
Searching from Address Bar, 64 Snipping Tool, 60 public‐key encryption, 171
Security Features, 66 System Configuration Tool, 82
Security Zones, 67 Windows Mobility Center, 89 R
Internet Printing, 217 Windows Sync Center, 84 RAID, 197
ISO image, 21 Network Printers, 210 Disk Mirroring, 197
Notification area, 39 Disk Striping, 197
K NTFS, 144 Disk Striping with Parity, 197
key, 171 random access memory (RAM), 3
O RDS Infrastructure, 135
L Offline Files, 85 Recycle Bin, 39
Libraries, 179 one‐way encryption, 171 Registry, 230
Custom, 184 One‐way Encryption, 171 and Malware, 230
Default, 179 Operaating System Remote Desktop Connection (RDC), 119
Using, 180 64‐bit, 9 Remote Desktop Services (RDS), 130
Lite Touch Installation (LTI), 23 operating system, 2 Infrastructure, 135
Local Printers, 210 Operating System, 4, 191 Remote Systems, 112
32‐bit, 9 Remote Users, 112
M Optical Drives, 3 RemoteApp, 131
Maintenance Tools, 264 Restore Points, 252
Malicious Software Removal Tool, 236
P Restoring files, 249
malware, 226 Partitions, 146 Risks, 226
Malware, 226, 230 patch, 258 Social Engineering, 228
Bots / Zombies, 227 Peer‐to‐peer Networks, 5
Solutions, 234 permission bit, 144 S
Trojan Horses, 227 permissions, 94 Search box, 38, 41
Viruses, 226 Permissions, 163 Security
Worms, 226 Effective, 166 Internet Zones, 67
NTFS, 164 Security principles, 226
Share, 163 Server‐based Networks, 5
Phishing, 68, 228
8369‐1 v1.00 © CCI Learning Solutions Inc. A 7
Servers, 4 U Windows Anytime Upgrade, 12
service pack, 259 Windows Compatibility Center, 17
Services, 108 Unauthorized Access Windows Defender, 238
Dependencies, 111 Adware, 227 Windows Desktop, 38
Managing, 111 Identity fraud, 229 Windows Device Manager, 219
Service Accounts, 110 Phishing, 228 Windows Explorer, 41
Startup Types, 110 Spyware, 227 Windows Media Center (WMC), 69
Shares, 155 Uninstalling Applications, 102 Windows Media Player (WMP), 70
Advanced, 158 update, 258 Configuring, 72
Basic, 156 Updates, 258 Library Mode, 71
Hidden, 160 Installing, 259 Now Playing Mode, 71
Public, 155 Types, 259 Windows Mobility Center, 89
Shortcuts, 39, 50 User Account Control (UAC), 99 Windows PowerShell, 118
single‐key encryption, 171 User Accounts, 4, 94 Windows Sync Center, 84
Single‐key encryption, 171 Administrator, 4 Offline Files, 85
Snipping Tool, 60 Administrator account, 94 Synchronizing Files, 86
social engineering, 228 Guest, 4 Windows Update, 259, 260
Social Engineering, 228 Standard, 4 Automatic Updating, 260
Software Installation Standard user account, 94, 95 Microsoft Update, 260
Digital Rights Management, 70 Types, 4 Update Categories, 260
spyware, 227 User Awareness, 234 Workgroup, 150
spyware detection, 232 User profile, 44 Workgroups, 5
Standard User, 95 User Profiles, 44 worm, 226
Standard User Analyzer (SUA), 20 V
Start menu, 38 X
Storage, 195 Video Devices, 218 x64, 3, 13
Cloud, 199 Virtual Desktop Infrastructure, 136 x86, 3, 13
Device Types, 196 Thin Client Hardware, 137 XP Mode, 26
Disk Types, 197 Virtualization, 24 Installation, 27
RAID, 197 Hypervisor, 24 Requirements, 27
symmetric‐key encryption, 171 MED‐V, 31
Symmetric‐key encryption, 171 XP Mode, 26 Z
System Configuration Tool, 82 virus, 226
Zero Touch Installation (ZTI), 23
System Devices, 218 Viruses
System Images, 251 Avoiding, 233
System Information, 273 Volumes, 146
System Protection
Previous Versions, 253
W
Restore Points, 252 Web Pages
Pop‐ups, 229
T Windows
Task Scheduler, 269 Activation, 6
Taskbar, 39 Edition Features, 8
Terahertz, 2 Editions, 7
trojan, 227 Licensing, 6
Sub‐editions, 8
Versions, 7
A 8 8369‐1 v1.00 © CCI Learning Solutions Inc.