moc.20687a.configuring.windows.8.setup.guide.trainer.handbook.2012.retail.ebook lms

528
MCT USE ONLY. STUDENT USE PROHIBITED OFFICIAL MICROSOFT LEARNING PRODUCT 20687A Configuring Windows ® 8

Upload: martin-barbarozas

Post on 04-Dec-2014

218 views

Category:

Documents


11 download

DESCRIPTION

MOC.20687A.configuring.windows.8.Setup.guide.trainer.handBook.2012

TRANSCRIPT

MCT USE ONLY. STUDENT USE PROHIBITED

O F F I C I A L

M I C R O S O F T

L E A R N I N G

P R O D U C T

20687A

Configuring Windows 8

MCT USE ONLY. STUDENT USE PROHIBITED

ii

Configuring Windows 8

Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.

The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein. 2012 Microsoft Corporation. All rights reserved.Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty /Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners

Product Number: 20687A Part Number: X18-48640 Released: 08/2012

MCT USE ONLY. STUDENT USE PROHIBITED

MICROSOFT LICENSE TERMS OFFICIAL MICROSOFT LEARNING PRODUCTS MICROSOFT OFFICIAL COURSE Pre-Release and Final Release Versions

These license terms are an agreement between Microsoft Corporation and you. Please read them. They apply to the Licensed Content named above, which includes the media on which you received it, if any. These license terms also apply to any updates, supplements, internet based services and support services for the Licensed Content, unless other terms accompany those items. If so, those terms apply. BY DOWNLOADING OR USING THE LICENSED CONTENT, YOU ACCEPT THESE TERMS. IF YOU DO NOT ACCEPT THEM, DO NOT DOWNLOAD OR USE THE LICENSED CONTENT. If you comply with these license terms, you have the rights below. 1. DEFINITIONS.

a. Authorized Learning Center means a Microsoft Learning Competency Member, Microsoft IT Academy Program Member, or such other entity as Microsoft may designate from time to time. b. Authorized Training Session means the Microsoft-authorized instructor-led training class using only MOC Courses that are conducted by a MCT at or through an Authorized Learning Center.

c. Classroom Device means one (1) dedicated, secure computer that you own or control that meets or exceeds the hardware level specified for the particular MOC Course located at your training facilities or primary business location. d. End User means an individual who is (i) duly enrolled for an Authorized Training Session or Private Training Session, (ii) an employee of a MPN Member, or (iii) a Microsoft full-time employee. e. Licensed Content means the MOC Course and any other content accompanying this agreement. Licensed Content may include (i) Trainer Content, (ii) software, and (iii) associated media. f.

Microsoft Certified Trainer or MCT means an individual who is (i) engaged to teach a training session to End Users on behalf of an Authorized Learning Center or MPN Member, (ii) currently certified as a Microsoft Certified Trainer under the Microsoft Certification Program, and (iii) holds a Microsoft Certification in the technology that is the subject of the training session.

g. Microsoft IT Academy Member means a current, active member of the Microsoft IT Academy Program.

h. Microsoft Learning Competency Member means a Microsoft Partner Network Program Member in good standing that currently holds the Learning Competency status. i.

Microsoft Official Course or MOC Course means the Official Microsoft Learning Product instructorled courseware that educates IT professionals or developers on Microsoft technologies.

MCT USE ONLY. STUDENT USE PROHIBITED

j.

Microsoft Partner Network Member or MPN Member means a silver or gold-level Microsoft Partner Network program member in good standing.

k. Personal Device means one (1) device, workstation or other digital electronic device that you personally own or control that meets or exceeds the hardware level specified for the particular MOC Course. l. Private Training Session means the instructor-led training classes provided by MPN Members for corporate customers to teach a predefined learning objective. These classes are not advertised or promoted to the general public and class attendance is restricted to individuals employed by or contracted by the corporate customer.

m. Trainer Content means the trainer version of the MOC Course and additional content designated solely for trainers to use to teach a training session using a MOC Course. Trainer Content may include Microsoft PowerPoint presentations, instructor notes, lab setup guide, demonstration guides, beta feedback form and trainer preparation guide for the MOC Course. To clarify, Trainer Content does not include virtual hard disks or virtual machines. 2. INSTALLATION AND USE RIGHTS. The Licensed Content is licensed not sold. The Licensed Content is licensed on a one copy per user basis, such that you must acquire a license for each individual that accesses or uses the Licensed Content. 2.1 Below are four separate sets of installation and use rights. Only one set of rights apply to you.

a. If you are a Authorized Learning Center: i. If the Licensed Content is in digital format for each license you acquire you may either: 1. install one (1) copy of the Licensed Content in the form provided to you on a dedicated, secure server located on your premises where the Authorized Training Session is held for access and use by one (1) End User attending the Authorized Training Session, or by one (1) MCT teaching the Authorized Training Session, or 2. install one (1) copy of the Licensed Content in the form provided to you on one (1) Classroom Device for access and use by one (1) End User attending the Authorized Training Session, or by one (1) MCT teaching the Authorized Training Session. ii. You agree that: 1. you will acquire a license for each End User and MCT that accesses the Licensed Content, 2. each End User and MCT will be presented with a copy of this agreement and each individual will agree that their use of the Licensed Content will be subject to these license terms prior to their accessing the Licensed Content. Each individual will be required to denote their acceptance of the EULA in a manner that is enforceable under local law prior to their accessing the Licensed Content, 3. for all Authorized Training Sessions, you will only use qualified MCTs who hold the applicable competency to teach the particular MOC Course that is the subject of the training session, 4. you will not alter or remove any copyright or other protective notices contained in the Licensed Content,

5. you will remove and irretrievably delete all Licensed Content from all Classroom Devices and servers at the end of the Authorized Training Session, 6. you will only provide access to the Licensed Content to End Users and MCTs, 7. you will only provide access to the Trainer Content to MCTs, and 8. any Licensed Content installed for use during a training session will be done in accordance with the applicable classroom set-up guide.

b. If you are a MPN Member. i. If the Licensed Content is in digital format for each license you acquire you may either: 1. install one (1) copy of the Licensed Content in the form provided to you on (A) one (1) Classroom Device, or (B) one (1) dedicated, secure server located at your premises where the training session is held for use by one (1) of your employees attending a training session provided by you, or by one (1) MCT that is teaching the training session, or 2. install one (1) copy of the Licensed Content in the form provided to you on one (1) Classroom Device for use by one (1) End User attending a Private Training Session, or one (1) MCT that is teaching the Private Training Session. ii. You agree that: 1. you will acquire a license for each End User and MCT that accesses the Licensed Content, 2. each End User and MCT will be presented with a copy of this agreement and each individual will agree that their use of the Licensed Content will be subject to these license terms prior to their accessing the Licensed Content. Each individual will be required to denote their acceptance of the EULA in a manner that is enforceable under local law prior to their accessing the Licensed Content, 3. for all training sessions, you will only use qualified MCTs who hold the applicable competency to teach the particular MOC Course that is the subject of the training session, 4. you will not alter or remove any copyright or other protective notices contained in the Licensed Content, 5. you will remove and irretrievably delete all Licensed Content from all Classroom Devices and servers at the end of each training session, 6. you will only provide access to the Licensed Content to End Users and MCTs, 7. you will only provide access to the Trainer Content to MCTs, and 8. any Licensed Content installed for use during a training session will be done in accordance with the applicable classroom set-up guide. c. If you are an End User: You may use the Licensed Content solely for your personal training use. If the Licensed Content is in digital format, for each license you acquire you may (i) install one (1) copy of the Licensed Content in the form provided to you on one (1) Personal Device and install another copy on another Personal Device as a backup copy, which may be used only to reinstall the Licensed Content; or (ii) print one (1) copy of the Licensed Content. You may not install or use a copy of the Licensed Content on a device you do not own or control.

MCT USE ONLY. STUDENT USE PROHIBITED

d. If you are a MCT. i. For each license you acquire, you may use the Licensed Content solely to prepare and deliver an Authorized Training Session or Private Training Session. For each license you acquire, you may install and use one (1) copy of the Licensed Content in the form provided to you on one (1) Personal Device and install one (1) additional copy on another Personal Device as a backup copy, which may be used only to reinstall the Licensed Content. You may not install or use a copy of the Licensed Content on a device you do not own or control. ii.

Use of Instructional Components in Trainer Content. You may customize, in accordance with the most recent version of the MCT Agreement, those portions of the Trainer Content that are logically associated with instruction of a training session. If you elect to exercise the foregoing rights, you agree: (a) that any of these customizations will only be used for providing a training session, (b) any customizations will comply with the terms and conditions for Modified Training Sessions and Supplemental Materials in the most recent version of the MCT agreement and with this agreement. For clarity, any use of customize refers only to changing the order of slides and content, and/or not using all the slides or content, it does not mean changing or modifying any slide or content.

2.2 Separation of Components. The Licensed Content components are licensed as a single unit and you may not separate the components and install them on different devices.

2.3 Reproduction/Redistribution Licensed Content. Except as expressly provided in the applicable installation and use rights above, you may not reproduce or distribute the Licensed Content or any portion thereof (including any permitted modifications) to any third parties without the express written permission of Microsoft.

2.4 Third Party Programs. The Licensed Content may contain third party programs or services. These license terms will apply to your use of those third party programs or services, unless other terms accompany those programs and services. 2.5 Additional Terms. Some Licensed Content may contain components with additional terms, conditions, and licenses regarding its use. Any non-conflicting terms in those conditions and licenses also apply to that respective component and supplements the terms described in this Agreement. 3.

PRE-RELEASE VERSIONS. If the Licensed Content is a pre-release (beta) version, in addition to the other provisions in this agreement, then these terms also apply: a. Pre-Release Licensed Content. This Licensed Content is a pre-release version. It may not contain the same information and/or work the way a final version of the Licensed Content will. We may change it for the final version. We also may not release a final version. Microsoft is under no obligation to provide you with any further content, including the final release version of the Licensed Content.

b. Feedback. If you agree to give feedback about the Licensed Content to Microsoft, either directly or through its third party designee, you give to Microsoft without charge, the right to use, share and commercialize your feedback in any way and for any purpose. You also give to third parties, without charge, any patent rights needed for their products, technologies and services to use or interface with any specific parts of a Microsoft software, Microsoft product, or service that includes the feedback. You will not give feedback that is subject to a license that requires Microsoft to license its software, technologies, or products to third parties because we include your feedback in them. These rights

MCT USE ONLY. STUDENT USE PROHIBITED

MCT USE ONLY. STUDENT USE PROHIBITED

survive this agreement.

c. Term. If you are an Authorized Training Center, MCT or MPN, you agree to cease using all copies of the beta version of the Licensed Content upon (i) the date which Microsoft informs you is the end date for using the beta version, or (ii) sixty (60) days after the commercial release of the Licensed Content, whichever is earliest (beta term). Upon expiration or termination of the beta term, you will irretrievably delete and destroy all copies of same in the possession or under your control. 4. INTERNET-BASED SERVICES. Microsoft may provide Internet-based services with the Licensed Content, which may change or be canceled at any time.

a. Consent for Internet-Based Services. The Licensed Content may connect to computer systems over an Internet-based wireless network. In some cases, you will not receive a separate notice when they connect. Using the Licensed Content operates as your consent to the transmission of standard device information (including but not limited to technical information about your device, system and application software, and peripherals) for internet-based services.

b. Misuse of Internet-based Services. You may not use any Internet-based service in any way that could harm it or impair anyone elses use of it. You may not use the service to try to gain unauthorized access to any service, data, account or network by any means. 5. SCOPE OF LICENSE. The Licensed Content is licensed, not sold. This agreement only gives you some rights to use the Licensed Content. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the Licensed Content only as expressly permitted in this agreement. In doing so, you must comply with any technical limitations in the Licensed Content that only allows you to use it in certain ways. Except as expressly permitted in this agreement, you may not: install more copies of the Licensed Content on devices than the number of licenses you acquired; allow more individuals to access the Licensed Content than the number of licenses you acquired; publicly display, or make the Licensed Content available for others to access or use; install, sell, publish, transmit, encumber, pledge, lend, copy, adapt, link to, post, rent, lease or lend, make available or distribute the Licensed Content to any third party, except as expressly permitted by this Agreement. reverse engineer, decompile, remove or otherwise thwart any protections or disassemble the Licensed Content except and only to the extent that applicable law expressly permits, despite this limitation; access or use any Licensed Content for which you are not providing a training session to End Users using the Licensed Content; access or use any Licensed Content that you have not been authorized by Microsoft to access and use; or transfer the Licensed Content, in whole or in part, or assign this agreement to any third party.

6.

RESERVATION OF RIGHTS AND OWNERSHIP. Microsoft reserves all rights not expressly granted to you in this agreement. The Licensed Content is protected by copyright and other intellectual property laws and treaties. Microsoft or its suppliers own the title, copyright, and other intellectual property rights in the Licensed Content. You may not remove or obscure any copyright, trademark or patent notices that appear on the Licensed Content or any components thereof, as delivered to you.

MCT USE ONLY. STUDENT USE PROHIBITED

7.

EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and regulations. You must comply with all domestic and international export laws and regulations that apply to the Licensed Content. These laws include restrictions on destinations, End Users and end use. For additional information, see www.microsoft.com/exporting. LIMITATIONS ON SALE, RENTAL, ETC. AND CERTAIN ASSIGNMENTS. You may not sell, rent, lease, lend or sublicense the Licensed Content or any portion thereof, or transfer or assign this agreement. SUPPORT SERVICES. Because the Licensed Content is as is, we may not provide support services for it.

8.

9. 10.

TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you fail to comply with the terms and conditions of this agreement. Upon any termination of this agreement, you agree to immediately stop all use of and to irretrievable delete and destroy all copies of the Licensed Content in your possession or under your control.

11.

LINKS TO THIRD PARTY SITES. You may link to third party sites through the use of the Licensed Content. The third party sites are not under the control of Microsoft, and Microsoft is not responsible for the contents of any third party sites, any links contained in third party sites, or any changes or updates to third party sites. Microsoft is not responsible for webcasting or any other form of transmission received from any third party sites. Microsoft is providing these links to third party sites to you only as a convenience, and the inclusion of any link does not imply an endorsement by Microsoft of the third party site. ENTIRE AGREEMENT. This agreement, and the terms for supplements, updates and support services are the entire agreement for the Licensed Content.

12.

13.

APPLICABLE LAW. a. United States. If you acquired the Licensed Content in the United States, Washington state law governs the interpretation of this agreement and applies to claims for breach of it, regardless of conflict of laws principles. The laws of the state where you live govern all other claims, including claims under state consumer protection laws, unfair competition laws, and in tort. b. Outside the United States. If you acquired the Licensed Content in any other country, the laws of that country apply.

14.

LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the laws of your country. You may also have rights with respect to the party from whom you acquired the Licensed Content. This agreement does not change your rights under the laws of your country if the laws of your country do not permit it to do so.

15.

DISCLAIMER OF WARRANTY. THE LICENSED CONTENT IS LICENSED "AS-IS," "WITH ALL FAULTS," AND "AS AVAILABLE." YOU BEAR THE RISK OF USING IT. MICROSOFT CORPORATION AND ITS RESPECTIVE AFFILIATES GIVE NO EXPRESS WARRANTIES, GUARANTEES, OR CONDITIONS UNDER OR IN RELATION TO THE LICENSED CONTENT. YOU MAY HAVE ADDITIONAL CONSUMER RIGHTS UNDER YOUR LOCAL LAWS WHICH THIS AGREEMENT CANNOT CHANGE. TO THE EXTENT PERMITTED UNDER YOUR LOCAL LAWS, MICROSOFT CORPORATION AND ITS RESPECTIVE AFFILIATES EXCLUDE ANY IMPLIED WARRANTIES OR CONDITIONS, INCLUDING THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.

MCT USE ONLY. STUDENT USE PROHIBITED

16.

LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. TO THE EXTENT NOT PROHIBITED BY LAW, YOU CAN RECOVER FROM MICROSOFT CORPORATION AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO USD$5.00. YOU AGREE NOT TO SEEK TO RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES FROM MICROSOFT CORPORATION AND ITS RESPECTIVE SUPPLIERS.

This limitation applies to o anything related to the Licensed Content, services made available through the Licensed Content, or content (including code) on third party Internet sites or third-party programs; and o claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence, or other tort to the extent permitted by applicable law. It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential or other damages.

Please note: As this Licensed Content is distributed in Quebec, Canada, some of the clauses in this agreement are provided below in French. Remarque : Ce le contenu sous licence tant distribu au Qubec, Canada, certaines des clauses dans ce contrat sont fournies ci-dessous en franais.

EXONRATION DE GARANTIE. Le contenu sous licence vis par une licence est offert tel quel . Toute utilisation de ce contenu sous licence est votre seule risque et pril. Microsoft naccorde aucune autre garantie expresse. Vous pouvez bnficier de droits additionnels en vertu du droit local sur la protection dues consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties implicites de qualit marchande, dadquation un usage particulier et dabsence de contrefaon sont exclues. LIMITATION DES DOMMAGES-INTRTS ET EXCLUSION DE RESPONSABILIT POUR LES DOMMAGES. Vous pouvez obtenir de Microsoft et de ses fournisseurs une indemnisation en cas de dommages directs uniquement hauteur de 5,00 $ US. Vous ne pouvez prtendre aucune indemnisation pour les autres dommages, y compris les dommages spciaux, indirects ou accessoires et pertes de bnfices. Cette limitation concerne: tout ce qui est reli au le contenu sous licence , aux services ou au contenu (y compris le code) figurant sur des sites Internet tiers ou dans des programmes tiers ; et les rclamations au titre de violation de contrat ou de garantie, ou au titre de responsabilit stricte, de ngligence ou dune autre faute dans la limite autorise par la loi en vigueur.

Elle sapplique galement, mme si Microsoft connaissait ou devrait connatre lventualit dun tel dommage. Si votre pays nautorise pas lexclusion ou la limitation de responsabilit pour les dommages indirects, accessoires ou de quelque nature que ce soit, il se peut que la limitation ou lexclusion ci-dessus ne sappliquera pas votre gard.

EFFET JURIDIQUE. Le prsent contrat dcrit certains droits juridiques. Vous pourriez avoir dautres droits prvus par les lois de votre pays. Le prsent contrat ne modifie pas les droits que vous confrent les lois de votre pays si celles-ci ne le permettent pas. Revised December 2011

MCT USE ONLY. STUDENT USE PROHIBITED

x

Configuring Windows 8

MCT USE ONLY. STUDENT USE PROHIBITEDxi

Configuring Windows 8

Acknowledgments

Microsoft Learning would like to acknowledge and thank the following for their contribution towards developing this title. Their effort at various stages in the development has ensured that you have a good classroom experience.

Andrew J. Warren Content Developer

Andrew Warren has more than 25 years of experience in the IT industry, many of which he has spent teaching and writing. He has been involved as the subject matter expert (SME) for many of the Windows Server 2008 courses and the technical lead on a number of other courses. He also has been involved in developing TechNet sessions on Microsoft Exchange Server 2007. Based in the United Kingdom, he runs his own IT training and education consultancy.

David Susemiehl Content Developer

David Susemiehl has worked as consultant, trainer, and courseware developer since 1996. David has extensive experience consulting on Microsoft Systems Management Server and Microsoft System Center Configuration Manager 2007, as well as Active Directory, Exchange Server, and Terminal Server/Citrix deployments. David has developed courseware development for Microsoft and Hewlett-Packard, and delivered those courses successfully in Europe, Central America, and across North America. For the last several years, David has been writing courseware for Microsoft Learning, and consulting on infrastructure transitions in Michigan.

Jason Kellington - Content Developer

Jason Kellington is a Microsoft Certified Trainer (MCT), Microsoft Certified IT Professional (MCITP), and a Microsoft Certified Solutions Expert (MCSE), as well as a consultant, trainer and author. He has experience working with a wide range of Microsoft technologies, focusing on the design and deployment of enterprise network infrastructures. Jason works in several capacities with Microsoft, as a SME for Microsoft Learning courseware titles, a senior technical writer for Microsoft IT Showcase, and an author for Microsoft Press.

Seth Dietz Technical Reviewer

Seth Dietz is a Microsoft Certified Technology Specialist (MCTS), Microsoft Certified Solutions Associate (MCSA), and MCITP, and he has more than 15 years of IT experience. He currently works as a Sr. Technical Account Manager with In-Touch Computer Services, Inc. in Charlotte, NC, where he focuses on implementing outsourced IT solutions for small and medium business. Seth has worked as a SME on several development projects for Microsoft certification exams since 2008. His specializations include virtualization, backup and disaster recovery, mobility and wireless, Remote Desktop Services, Microsoft Office 365, network infrastructure, and Microsoft Small Business Server. Seth has been a projectmanagement professional since 2004.

MCT USE ONLY. STUDENT USE PROHIBITED

xii

Configuring Windows 8

ContentsModule 1: Installing and Deploying Windows 8Lesson 1: Introducing Windows 8 Lesson 2: Preparing to Install Windows 8 Lesson 3: Installing Windows 8 Lab A: Installing Windows 8 Lesson 4: Automating the Installation of Windows 8 Lab B: Performing an Unattended Installation of Windows 8 Lesson 5: Activating Windows 8 1-2 1-7 1-14 1-18 1-21 1-32 1-35

Module 2: Upgrading and Migrating to Windows 8Lesson 1: Upgrading to Windows 8 Lesson 2: Migrating to Windows 8 Lesson 3: Migrating User Data and Settings Lab: Migrating to Windows 8 2-2 2-7 2-11 2-18

Module 3: Managing Disks and Device DriversLesson 1: Managing Disks, Partitions, and Volumes Lesson 2: Maintaining Disks, Partitions, and Volumes Lesson 3: Working with Virtual Hard Disks Lab A: Managing Disks Lesson 4: Installing and Configuring Device Drivers Lab B: Configuring Device Drivers 3-2 3-13 3-17 3-21 3-26 3-38

Module 4: Configuring and Troubleshooting Network ConnectionsLesson 1: Configuring IPv4 Network Connectivity Lesson 2: Configuring IPv6 Network Connectivity Lesson 3: Implementing Automatic IP Address Allocation Lab A: Configuring Network Connection Lesson 4: Implementing Name Resolution Lesson 5: Troubleshooting Network Connectivity Lab B: Troubleshooting Network Connectivity 4-2 4-9 4-16 4-22 4-25 4-28 4-33

Module 5: Implementing Wireless Network ConnectionsLesson 1: Overview of Wireless Networks Lesson 2: Implementing a Wireless Network Lab: Planning the Implementation of Wireless Network Connections 5-2 5-8 5-13

MCT USE ONLY. STUDENT USE PROHIBITEDxiii

Configuring Windows 8

Module 6: Implementing Network SecurityLesson 1: Overview of Threats to Network Security Lesson 2: Configuring Windows Firewall Lab A: Configuring Inbound and Outbound Firewall Rules Lesson 3: Securing Network Traffic Lab B: Configuring Connection Security Rules Lesson 4: Configuring Windows Defender Lab C: Implementing Host-Based Virus and Malware Protection 6-2 6-8 6-16 6-18 6-28 6-30 6-33

Module 7: Configuring File Access and Printers on Windows 8 ClientsLesson 1: Managing File Access Lesson 2: Managing Shared Folders Lesson 3: Configuring File Compression Lab A: Configuring File Access Lesson 4: Managing Printers Lab B: Configuring Printers Lesson 5: Overview of SkyDrive 7-2 7-12 7-20 7-24 7-27 7-30 7-32

Module 8: Securing Windows 8 DesktopsLesson 1: Authentication and Authorization in Windows 8 Lesson 2: Implementing GPOs Lab A: Implementing Local GPOs Lesson 3: Securing Data with EFS and BitLocker Lab B: Securing Data Lesson 4: Configuring User Account Control Lab C: Configuring and Testing UAC 8-2 8-6 8-14 8-17 8-37 8-39 8-46

Module 9: Configuring ApplicationsLesson 1: Install and Configure Applications Lesson 2: Managing Apps from the Windows Store Lesson 3: Configuring Internet Explorer Settings Lab A: Configuring Internet Explorer Security Lesson 4: Configuring Application Restrictions in the Enterprise Lab B: Configuring AppLocker (Optional) 9-2 9-11 9-15 9-21 9-23 9-30

Module 10: Optimizing and Maintaining Windows 8 Client ComputersLesson 1: Optimizing the Performance of Windows 8 Lab A: Optimizing Windows 8 Performance Lesson 2: Managing the Reliability of Windows 8 Lesson 3: Managing Windows 8 Updates Lab B: Maintaining Windows Updates 10-2 10-11 10-14 10-19 10-26

MCT USE ONLY. STUDENT USE PROHIBITED

xiv

Configuring Windows 8

Module 11: Configuring Mobile Computing and Remote AccessLesson 1: Configuring Mobile Computers and Device Settings Lab A: Configuring a Power Plan Lesson 2: Configuring VPN Access Lab B: Implementing a VPN Connection Lesson 3: Configuring Remote Desktop and Remote Assistance Lab C: Implementing Remote Desktop Lesson 4: Overview of DirectAccess 11-2 11-10 11-12 11-19 11-21 11-24 11-26

Module 12: Implementing Hyper-VLesson 1: Overview of Hyper-V Lesson 2: Creating Virtual Machines Lesson 3: Managing Virtual Hard Disks Lesson 4: Managing Snapshots 12-2 12-5 12-10 12-13

Module 13: Troubleshooting and Recovering Windows 8Lesson 1: Backing Up and Restoring Files in Windows 8 Lesson 2: Recovery Options in Windows 8 Lab: Recovering Windows 8 13-2 13-5 13-17

Appendix A: Using Windows PowerShellLesson 1: Introduction to Windows PowerShell 3.0 Lesson 2: Windows PowerShell Remoting Lesson 3: Using Windows PowerShell Cmdlets A-2 A-11 A-18

Lab Answer KeysModule 1 Lab A: Installing Windows 8 Module 1 Lab B: Performing an Unattended Installation of Windows 8 Module 2 Lab: Migrating to Windows 8 Module 3 Lab A: Managing Disks Module 3 Lab B: Configuring Device Drivers Module 4 Lab A: Configuring Network Connection Module 4 Lab B: Troubleshooting Network Connectivity Module 5 Lab: Planning the Implementation of Wireless Network Connections Module 6 Lab A: Configuring Inbound and Outbound Firewall Rules Module 6 Lab B: Configuring Connection Security Rules Module 6 Lab C: Implementing Host-Based Virus and Malware Protection Module 7 Lab A: Configuring File Access Module 7 Lab B: Configuring Printers Module 8 Lab A: Implementing Local GPOs Module 8 Lab B: Securing Data L1-1 L1-3 L2-5 L3-7 L3-12 L4-15 L4-18 L5-21 L6-25 L6-27 L6-29 L7-31 L7-34 L8-37 L8-40

MCT USE ONLY. STUDENT USE PROHIBITEDxv

Configuring Windows 8

Module 8 Lab C: Configuring and Testing UAC Module 9 Lab A: Configuring Internet Explorer Security Module 9 Lab B: Configuring AppLocker (Optional) Module 10 Lab A: Optimizing Windows 8 Performance Module 10 Lab B: Maintaining Windows Updates Module 11 Lab A: Configuring a Power Plan Module 11 Lab B: Implementing a VPN Module 11 Lab C: Implementing Remote Desktop Module 13 Lab: Recovering Windows 8

L8-42 L9-45 L9-47 L10-51 L10-54 L11-57 L11-58 L11-60 L13-63

MCT USE ONLY. STUDENT USE PROHIBITED

MCT USE ONLY. STUDENT USE PROHIBITEDxvii

About This Course

About This CourseCourse Description

This section provides you with a brief description of the course, audience, suggested prerequisites, and course objectives.

Note: This first release (A) MOC version of course 20687A has been developed on prerelease software (Release Preview (RP)). Microsoft Learning will release a B version of this course after the RTM version of the software is available.

This course will provide you with the knowledge and skills to install, manage, secure, and support Windows 8-based computers, devices, user accounts, and network resources. This course will teach you how to configure Windows 8 and troubleshoot various issues related to networking, data management, wireless connectivity and remote access. This course will also provide guidelines, best practices, and considerations that will help you optimize performance and minimize errors and security threats in Windows 8 client computers.

Audience

This course is intended for IT professionals, who have prior experience in configuring the Windows 8 operating system, and troubleshooting issues, and providing user support for Windows 8-based computers and devices. These IT professionals could be consultants, full-time desktop support technicians, or IT generalists who provide support for Windows 8 computers as part of their broader technical duties. IT professionals seeking certification in the 70-687 Windows 8 Configuring exam also may take this course.

Student PrerequisitesThis course requires that you meet the following prerequisites: Experience managing computers running on the Windows 8 operating system.

Technical knowledge of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS).

Familiarity with Active Directory Domain Services (AD DS) principles and the fundamentals of AD DS management. Understanding of the Public Key Infrastructure (PKI) components and working knowledge of the fundamentals of Active Directory Certificate Services (AD CS). Knowledge of Microsoft Windows Server 2008 or Windows Server 2008 R2 fundamentals.

Knowledge of Microsoft Windows client fundamentals; for example, working knowledge of Windows XP, Windows Vista, and/or Windows 7. Understanding of the fundamentals of management and experience using the Microsoft Office 2010 system or the Microsoft Office 2007 system. Knowledge of Windows Automated Installation Kit (WAIK) components including Windows PE, Windows System Image Manager (SIM), Volume Activation Management Tool (VAMT), ImageX, User State Migration Tool (USMT), and Deployment Image Servicing and Management (DISM) concepts and fundamentals.

MCT USE ONLY. STUDENT USE PROHIBITED

xviii

About This Course

Course ObjectivesAfter completing this course, students will be able to: Plan and perform the installation of Windows 8. Install Windows 8 on computers that are running an existing operating system. Configure disks, partitions, volumes, and device drivers in a Windows 8 system. Configure network connectivity and troubleshoot connectivity issues. Install, configure, and maintain wireless network connections. Implement Windows 8 technologies to secure network connections. Share files and printers. Implement tools and technologies that can help secure Windows 8 desktops. Configure and control applications in Windows 8. Optimize and maintain Windows 8-based computers. Configure mobile computer settings and remote access. Describe Hyper-V for Windows 8, and describe how to use it to support legacy applications. Determine how to recover Windows 8 from various failures. Describe how to use Windows PowerShell to manage Windows 8.

Course OutlineThis section provides an outline of the course:

Module 1, Installing Windows 8" describes the key features of Windows 8, and the differences between the various versions. This module also describes how to install and activate Windows 8 on a computer. Module 2, Upgrading and Migrating to Windows 8" describes how to install Windows 8 on computers that are running on other operating systems. The module describes the processes of upgrading or migrating to Windows 8, and discusses the differences between both.

Module 3, Managing Disks and Device Drivers" describes how to configure and manage disks, partitions, and volumes in a Windows 8 system. Additionally, this module describes how to install, configure, and troubleshoot device drivers. Module 4, Configuring and Troubleshooting Network Connections" compares IPv4 and IPv6 addresses, and describes how to configure both. The module also describes how to implement Automatic IP address Allocation and name resolution. The module concludes with a lab on troubleshooting network connectivity.

Module 5, Implementing Wireless Network Connections" provides an overview of wireless networks, and describes how to install, configure, and troubleshoot them. Module 6, Implementing Network Security" provides an overview of common network security threats, and how to mitigate them by configuring inbound and outbound firewall rules, connection security rules, Windows Defender, and host-based virus and malware protection.

MCT USE ONLY. STUDENT USE PROHIBITEDxix

About This Course

Module 7, Configuring File Access and Printers on Windows 8 Clients" describes how to manage file access, and configure NTFS file-system permissions for files and folders. The module also provides an overview of shared folders, file compression, and the impact of moving and copying compressed files and folders. The module then goes on to describe how to create and share printers, and concludes with an overview of Windows Live SkyDrive. Module 8, Securing Windows 8 Desktops" describes new authentication and authorization features in Windows 8. The module also describes how to implement local Group Policy objects, secure data with Encrypting File Service (EFS) and BitLocker drive encryption, and configure User Account Control (UAC). Module 9, Configuring Applications" describes how to install and configure applications, application compatibility, and application restrictions in Windows 8. Additionally, the module describes how to configure and test Windows Internet Explorer security settings, and AppLocker rules that restrict the running of applications.

Module 10, Optimizing and Maintaining Windows 8 Client Computers" describes how to identify issues with performance and reliability, and use tools such as Resource Monitor, Data Collector Sets, and Performance Monitor. The module also describes how to optimize Windows 8 performance, and manage and maintain Windows updates. Additionally, the module describes how to manage Windows 8 reliability by using Windows diagnostic tools. Module 11, Configuring Mobile Computing and Remote Access" describes how to configure mobile computer settings and power plans, and provides an overview of mobile device sync partnerships and power-saving options. The module also describes how to enable and configure virtual private network (VPN) access, create and test a VPN, and configure remote desktop and remote assistance. The module concludes with an overview of DirectAccess, and how it works for internal and external clients.

Module 12, Implementing Hyper-V" describes the fundamentals of Hyper-V for Windows 8 and scenarios for using it. The module also describes how to create and configure virtual machines in Hyper-V, and how to manage virtual hard disks (VHDs) and snapshots. Module 13, Troubleshooting and Recovering Windows 8" describes how to back up data and use recovery options such as System Restore to recover Windows 8.

Appendix A, Using Windows PowerShell" describes the fundamentals of Windows PowerShell, and how to use Windows PowerShell cmdlets and remote commands.

MCT USE ONLY. STUDENT USE PROHIBITED

xx

About This Course

Course Materials

The following materials are included with your kit: Course Handbook A succinct classroom learning guide that provides all the critical technical information in a crisp, tightly-focused format, which is just right for an effective in-class learning experience.

Lessons: Guide you through the learning objectives and provide the key points that are critical to the success of the in-class learning experience. Labs: Provide a real-world, hands-on platform for you to apply the knowledge and skills learned in the module. Module Reviews and Takeaways: Provide improved on-the-job reference material to boost knowledge and skills retention. Lab Answer Keys: Provide step-by-step lab solution guidance at your finger tips when its needed.

Course Companion Content on the http://www.microsoft.com/learning/companionmoc Site: Searchable, easy-to-navigate digital content with integrated premium on-line resources designed to supplement the Course Handbook. Modules: Include companion content, such as questions and answers, detailed demo steps and additional reading links, for each lesson. Additionally, they include Lab Review questions and answers and Module Reviews and Takeaways sections, which contain the review questions and answers, best practices, common issues and troubleshooting tips with answers, and real-world issues and scenarios with answers.

Resources: Include well-categorized additional resources that give you immediate access to the most up-to-date premium content on TechNet, MSDN, and Microsoft Press.

Student Course files on the http://www.microsoft.com/learning/companionmoc Site: Includes the Allfiles.exe, a self-extracting executable file that contains all the files required for the labs and demonstrations. Course evaluation At the end of the course, you will have the opportunity to complete an online evaluation to provide feedback on the course, training facility, and instructor.

To provide additional comments or feedback on the course, send e-mail to [email protected]. To inquire about the Microsoft Certification Program, send e-mail to [email protected].

MCT USE ONLY. STUDENT USE PROHIBITEDxxi

About This Course

Virtual Machine EnvironmentVirtual Machine Configuration

This section provides the information for setting up the classroom environment to support the business scenario of the course.

In this course, you will use Microsoft Hyper-V to perform the labs. Important At the end of each lab, you must close the virtual machine and must not save any changes. To close a virtual machine without saving the changes, perform the following steps: 1. On the virtual machine, on the Action menu, click Close. 2. In the Close dialog box, in the What do you want the virtual machine to do? list, click Turn off and delete changes, and then click OK. The following table shows the role of each virtual machine used in this course: Virtual machine 20687A-LON-DC1 20687A-LON-CL1 20687A-LON-CL2 20687A-LON-CL3 20687A-LON-CL4 Role Domain controller in the Adatum.com domain Domain member Domain member Domain member Blank with no operating system installed, but is linked to the Windows 8 Enterprise client ISO

Software ConfigurationThe following software is installed on each VM: Windows Server 8 Windows 8 Client (Windows 8 Enterprise) Microsoft Office 2010 On the server, possibly also Windows Automated Installation Kit (AIK)

Classroom SetupEach classroom computer will have the same virtual machine configured in the same way.

MCT USE ONLY. STUDENT USE PROHIBITED

xxii

About This Course

Course Hardware LevelTo ensure a satisfactory student experience, Microsoft Learning requires a minimum equipment configuration for trainer and student computers in all Microsoft Certified Partner for Learning Solutions (CPLS) classrooms in which Official Microsoft Learning Product courseware are taught. Intel Virtualization Technology (Intel VT) or AMD Virtualization (AMD-V) processor Dual 120 gigabyte (GB) hard disks 7200 RM Serial ATA (SATA) or better* 8 GB RAM DVD drive Network adapter Super VGA (SVGA) 17-inch monitor Microsoft Mouse or compatible pointing device Sound card with amplified speakers

*Striped

In addition, the instructor computer must be connected to a projection display device that supports SVGA 1024 x 768 pixels, 16-bit colors.

MCT USE ONLY. STUDENT USE PROHIBITED1-1

Module 1Installing and Deploying Windows 8Contents:Module Overview Lesson 1: Introducing Windows 8 Lesson 2: Preparing to Install Windows 8 Lesson 3: Installing Windows 8 Lab A: Installing Windows 8 Lesson 4: Automating the Installation of Windows 8 Lab B: Performing an Unattended Installation of Windows 8 Lesson 5: Activating Windows 8 Module Review and Takeaways 1-1 1-2 1-7 1-14 1-18 1-21 1-32 1-35 1-39

Module Overview

Windows 8 is the latest Microsoft client operating system. With new features and capabilities, it builds on the strong core functionality of Windows 7 to provide a stable and feature rich client experience, across many form factors. This module will introduce you to some new features of Windows 8, provide guidance on installing Windows 8, and introduce you the Windows 8 licensing environment.

ObjectivesAfter completing this module, you will be able to: Describe the different editions of Windows 8. Prepare a computer for Windows 8 installation. Install Windows 8. Automate the installation of Windows 8. Explain Windows 8 licensing and activation.

MCT USE ONLY. STUDENT USE PROHIBITED

1-2

Installing and Deploying Windo 8 ows

Lesson 1

Introducing Window 8 W ws

Win ndows 8 is desi igned to meet a large scope of computing needs, and e t e g enable users to perform tasks o effic ciently. Windows 8 enables you to take advantage of co y omputing devic from tradit ces tional platform ms, and the latest tab and phone platforms. Th lesson will i ntroduce you to the key Win blet e his ndows 8 features and the different Windows 8 ed ditions that are available. The lesson also w describe why and when y e e will you mig select a spe ght ecific Windows edition. s

Les sson Objec ctivesAfte completing this lesson, yo will be able to: er ou n Describe the key features in Windows 8. Explain the differences betw ween Windows 8 editions. Understand the implication of using the 32-bit or 64-b versions on Windows 8. ns bit n

Int troducing Windows 8Built on the solid foundation of Windows 7, f Win ndows 8 is desi igned to help users perform their task efficiently an effectively by incorporating ks nd b the latest in comp puting technology. Windows 8 s prov vides integrate connections to important ed t info ormation and applications. Additionally, a A Win ndows 8 can meet your organizations business m and data-security needs by prov viding features such as full-screen immersive ap h n pplications, bu uilt-in malware protectio strong auth on, hentication, an nd data encryption. Windows 8 pro a W ovides an impr roved user experience along with a more secure and r d man nageable platf form.

The design of Win ndows 8 enables it to support the unique w working styles of many diffe s erent people. T The new user interface and app mod increases users producti w e del u ivity, and the d design of the n new Start scree en mak it the centr hub of user activity and data integratio kes ral r d on.

New Features in Windows 8 w

Win ndows 8 repres sents Microsof most signif fts ficant change i operating sy in ystem design s since the intro oduction of th Microsoft Windows 95 operating syste Therefore, Windows 8 co he W o em. ontains more t than 300 new features. The following section highlights some of the most imp . g f portant feature and changes es s:

Start screen. The Start scree represents a significant sh in the way users find and interact with T en hift d h applications and informatio in Windows 8. The Start S a on s Screen is tile-b based, and its c configurable ti iles can display liv information and provide an interactive hub experienc for users. W its touchve n ce With friendly layou it is significa ut, antly different from the Start button interf t face that has b been implemented in Windows since Windows 95. s s Cloud integra ation. Window 8 provides in ws ncreased integ gration with clo oud-based ser rvices and information. Users signing in to a Window 8 desktop c ws computer can connect to the information and settings instantly that are im mportant to th hem. Windows 8 ensures a consistent user experience ac s r cross any computer, regardless of the compute location. o ers

C Configuring Windows 8 s

Reset and refresh your PC By using Res and Refres h, users and IT staff can retu a compute to a r C. set T urn er specific def fault state, or recover Windo 8 from erro or corrupt operating system files: r ows ors o o

Reset your PC remo y oves all personal data, apps, and settings fr rom the PC, an reinstalls W nd Windows. Refresh your PC kee all persona data, deskto eps al op-style apps, a other imp and portant setting and gs, reinstalls Windows, retaining the user experience and user dat e ta.

ws ctioning copy of Windows 8 that Windows To Go. Window To Go enables you to sup ply a fully func can start an run from a universal seria bus (USB) sto nd al orage device. W When users bo from a Win oot ndows To Go-enab bled USB devic they get a complete Win ce, ndows 8 experi ience, along w all of their with applications, files, and set ttings.

Remote De esktop Services Windows 8 now includes R s. n Remote Deskto Services (RD capability, which op DS) enables mu ultiple users to connect remo otely to the sa me computing infrastructure, each in an isolated g session. You can use Windows 8 in Virtual Desktop In u nfrastructure (V VDI) scenarios to provide robust and univers access to Windows 8 desktops. sal W Hyper-V. Hyper-V on Windows 8 prov W vides a flexible and high-per e rforming client virtualization n environmen You can tak advantage of this environ nt. ke nment to test a applications an IT scenarios in nd s multiple op perating system configuratio by using a single compu m ons, uter. By using H Hyper-V, IT departments can provide a consolidate and efficien virtual enviro e ed nt onment through virtual mac chine compatibility with Windo Server 201 ows 12.

MCT USE ONLY. STUDENT USE PROHIBITED1-3

Support for multiple form factors. Wind r m dows 8 is the f first Windows operating syst tem to provide e support for both the x86 and the ARM platform. Win r ndows 8 runs o PCs, as well as tablets and similar on d onment for us devices, pro oviding more ubiquitous acc u cess to the Win ndows 8 enviro sers.

Understand U ding Wind dows 8 EditionsWindows 8 com in four diff W mes ferent editions that s sp two distinc processor-architecture typ pan ct pes.

Windows 8 Editions W EWindows 8 com in three separate edition on W mes ns th x86 platform he m: Windows 8. This is the mo basic editio ost on available. It contains the key features t necessary for general hom and smallme business us se. Windows 8 Pro. This edition is designed to d support the needs of bus e siness and tech hnical professiona and supports a broader set of Window 8 technologies, including e als, s ws encryption, virtualizatio computer management, and domain c on, m connectivity.

Windows 8 Enterprise. Th edition supports the full s of Window 8 functionality, and additio his set ws onally includes en nterprise-level security, mobi ility, and confi guration.

MCT USE ONLY. STUDENT USE PROHIBITED

1-4

Installing and Deploying Windows 8

Key Feature ComparisonThe following table represents the key features available in each edition of Windows 8. Feature BitLocker and BitLocker To Go Boot from virtual hard disk (VHD) Client Hyper-V Domain Join Encrypting File System Group Policy AppLocker BranchCache DirectAccess Side-load Metro apps Virtualization through RemoteFX Windows To Go Windows 8 Windows 8 Pro X X X X X X Windows 8 Enterprise X X X X X X X X X X X X

Understanding Windows RT

Windows 8 is the first Windows client operating system that supports the ARM processor architecture that is commonly found in mobile devices such as tablets and phones. Windows RT is designed specifically to run apps built on the Metro platform, and it is available only as a preinstalled operating system on tablets and similar devices with ARM processors. ARM provides a lightweight form factor with excellent battery life, specifically for mobile devices. Windows RT is preloaded with touch-optimized versions of Microsoft Office applications, and is limited to running apps built using the Metro style UI. Note: Further detail on Windows RT is outside of the scope of this course. It is mentioned here for reference only. Unless otherwise noted, all references to Windows 8 in this course are for the x86 and x64 editions.

C Configuring Windows 8 s

MCT USE ONLY. STUDENT USE PROHIBITED1-5

Advantages of 64-bit Windows 8 Version A t s nsEa licensed ed ach dition of Wind dows 8, which in ncludes Windows 8, Window 8 Pro, and ws Windows 8 Ente W erprise, is avail lable in both 32-bit 3 an 64-bit versi nd ions. The 64-b versions of bit Windows 8 are designed to work with comp W w puters th utilize the 64-bit processor architecture hat 6 e. While the 64-bit versions are similar in featu W ures to th 32-bit cou heir unterparts, there are several ad dvantages of using a 64-bit edition of u Windows 8, incl W luding:

Improved performance. The 64-bit processors p T can process more data fo each clock cycle, s or c enabling yo to scale you applications to run faster or support mo users. How ou ur s ore wever, to benef from fit this improv processor capacity, you must install a 6 ved c m 64-bit edition of the operati system. ing

Enhanced memory. A 64- operating system can m m -bit make more effic cient use of random access m memory (RAM), and it can address memory abo 4 gigabyte (GB). This is unlike all 32-b operating sy s ove es bit ystems, including all 32-bit editio of Window 8, which are limited to 4 G of addressa ons ws e GB able memory.

Improved device support Although 64-bit processor have been available for so d t. rs ome time, in th past it he nly was difficult to obtain third-party drive for common used devic such as pri ers ces, inters, scanner and rs, other comm office equ mon uipment. Since the re elease of the 64-bit versions of Windows V 6 Vista and Win ndows 7, the a availability of d drivers for these de evices has imp proved greatly. Because Wind . dows 8 is built on the same kernel as Windows 7, t most of the drivers that work with Wind e w dows 7 also w work with Wind dows 8.

Improved security. The ar s rchitecture of 64-bit process sors enables a more secure o operating syste em environmen through Kernel Patch Protection (KPP), mandatory ke nt ernel-mode dr river signing, and Data Execution Prevention (DE P EP). Support for the Client Hy r yper-V feature. This feature i only support in the 64-b versions of is ted bit f Windows 8. Hyper-V requ uires 64-bit pr rocessor archit tecture that supports second level address d s translation.

Choosing Wi C indows 8 Ve ersions for Installation I

In most cases, a computer will run the version of Window 8 that corres n ws sponds to its p processor ar rchitecture. A computer with a 32-bit proc c h cessor will run the 32-bit ver rsion of Windo 8, and a co ows omputer with a 64-bit pr w rocessor will ru the 64-bit version of Wind un v dows 8. You ca use the foll an lowing list to de etermine whic version of Windows 8 should be installe on a compu ch W ed uter. You can ins stall 64-bit versions of Windo 8 only on computers wi 64-bit proc ows ith cessor architec cture.

You can ins stall 32-bit versions of Windo 8 on com puters with 32 ows 2-bit or 64-bit processor architecture When you in e. nstall a 32-bit version of Win ndows 8 on a 32-bit process architectur the sor re, operating system does no take advant s ot tage of any 64 4-bit processor architecture f r features or functionalit ty. 32-bit drive will not wo in 64-bit ve ers ork ersions of Wind dows 8. If you have hardwar that is suppo re orted by 32-bit drivers only, you must use a 32-bit version of Windows 8 regardless of the compute 3 8, f ers processor architecture. a You can ins stall 32-bit versions of Windo 8 on 64-b architecture computers to support earli ows bit e o ier versions of applications or for testing purposes. o p

MCT USE ONLY. STUDENT USE PROHIBITED

1-6

Installing and Deploying Windows 8

Limitations of the 64-Bit Versions

The 64-bit editions of Windows 8 do not support the 16-bit Windows on Windows (WOW) environment. If your organization requires earlier versions of 16-bit applications, they will not run natively in Windows 8. One solution is to run the application within a virtual environment by using Client Hyper-V.

C Configuring Windows 8 s

MCT USE ONLY. STUDENT USE PROHIBITED1-7

Lesson 2 n

Prepa aring to Install Windows 8 o

Th first step in installing Win he ndows 8 on a computer is to ensure that th hardware a software b c o he and being ru on the computer will be compatible wit Windows 8.. As a part of p un c th preparing for t Windows 8 the in nstallation proc cess, you need to understand minimum ha d ardware requir rements, ident problemat tify tic de evices, drivers, and applications, and unde , erstand the ins stallation meth hods available.

Th lesson will introduce you to these conc his cepts, and equ ip you with in formation that you need to plan a su uccessful Wind dows 8 installat tion.

Lesson ObjectivesAfter completin this lesson, you will be able to: ng y Describe minimum recom m mmended hard dware requirem ments for insta alling Window 8. ws Explain how to check for device and screen resolutio n compatibilit w ty. Understand and identify common application-compa d atibility issues.. Identify me ethods for mitigating applica ation-compati bility issues. Describe th options available for installing Windows 8. he s

Hardware Requireme H R ents for Ins stalling W Windows 8Windows 8 take advantage of new and po W es o owerful co omputing hard dware. It also supports the la s atest in nnovative devic for an uncompromising user ces ex xperience. How wever, Window 8 also is cap ws pable of ru unning on earlier configurati ions of compu uters, an many comp nd puters in enter rprises today meet m th minimum hardware requirements easily he y. Th following se he ections list the minimum e re ecommended hardware requ uirements for Windows 8. Win W ndows 8 will in nstall if some of these o re equirements ar not met, bu user experience and re ut op perating system performanc may be ce co ompromised if the computer does not meet or exceed t following s f the specifications: 1 gigahertz (GHz) or faste processor z er 1 GB RAM (32-bit) or 2 GB RAM (64-bit G t) 16 GB available hard disk space (32-bit or 20 GB (64 k t) 4-bit) DirectX 9 graphics devic with a Wind ce dows Display D Driver Model (W WDDM) 1.0 or newer driver r

Th Windows 8 kernel has be refined and improved fro Windows 7 and, in many cases, you may see he een d om y im mprovements in general perf i formance on the same comp t puter in severa different are al eas.

MCT USE ONLY. STUDENT USE PROHIBITED

1-8

Installing and Deploying Windo 8 ows

Hardware Req quirements for Importa Features f ant s

In addition to the requirements listed in the preceding sect s p tion, Windows 8 contains sev veral features that requ a specific hardware configuration befo they will in uire ore nstall or run co orrectly:

The Windows 8 secured bo process req s oot quires a BIOS b based on Unified Extensible Firmware Interface EFI (UEFI). The se ecured boot pr rocess takes ad dvantage of UE to prevent the launching of unknown or g potentially un nwanted opera ating-system boot loaders b b between the sy ystems BIOS st tarting and the e Windows 8 operating system start.

While the sec cure boot proc cess is not man ndatory for Wi indow 8, it gre eatly increases the integrity o the of boot process. . Client Hyper- requires a 64-bit processo architecture that supports second level address translation -V 6 or e s (SLAT). SLAT reduces the ov verhead incurr during the virtual-to-phy red e ysical address mapping proc cess performed fo virtual mach or hines. The BitLocker feature requires a compute that support Trusted Plat r er ts tform Module (TPM) to prov vide the most seam mless and secu BitLocker experience. TP allows the s ure e PM storage of BitL Locker encrypt tion keys within a microcontroller on a compu uters motherb board.

De etermining Device Co g ompatibili and Scr ity reen Resol lutionApa from the minimum hardw art ware requireme ents, you also must det termine the co ompatibility of othe computer hardware. Devices such as er h prin nters, wireless keyboards, and wireless mice are k d e easy to identify visually, and you should check y u them to ensure th they are co m hat ompatible with h Win ndows 8, and they have a fun nctioning device driv for the app ver propriate Wind dows 8 edition. .

How wever, there ar other device and comput re es ter hard dware compon nents that mus have drivers st s load as well. Cr ded ritical system components, su uch as hard drive cont h trollers, chipse graphics ets, adapters, network adapters, and other import k d tant system de evices, must ha drivers to f ave function prope erly.

Che ecking Hard dware Comp patibility

The Windows 8 se etup process will check the installation com w mputer autom matically for device and drive er com mpatibility. How wever, when an organization is deploying multiple insta n allations of Win ndows 8 at once, its best to be sure that the comput hardware for those comp t ter f puters is comp patible with Windows 8. Con nfirming hardw ware compatib bility enables a smoother inst tallation proce ess.

Com mpatibility Center for Windows 8 W

The Compatibility Center for Windows 8 website on Micros y soft.com provid informatio about des on Win ndows 8 progra and device compatibility The website contains a cat am e y. talog of programs and devic ces, and pertinent com mpatibility info ormation including: Device make and model Links to more information about the device e a Compatibility status y Driver version available (32 ns 2-bit or 64-bit t)

C Configuring Windows 8 s

Th Compatibility Center for Windows 8 we he ebsite also ena ables commun interaction where users can nity n, provide feedbac for devices to confirm compatibility. ck

MCT USE ONLY. STUDENT USE PROHIBITED1-9

Windows 8 Screen Reso W S olution

A new requirem ment in Window 8 is that Me ws etro-style app plications should have a mini imum of 1024x x768 sc creen resolutio and 1366x7 for the sna feature. Thi s enables you to snap a Met app to the side of on, 768 ap tro th desktop, ma he aking it viewab while you use other Met ro or tradition apps. If you attempt to la ble u nal u aunch a Metro style app with less than this required resolution, yo will receive an error mess M p n d ou sage. Th maximum supported reso he s olution for Win ndows 8 is 256 60x1440, allow wing for large f format traditio onal di isplays, or high h-pixel density displays on smaller form-fa y actor devices. Additiona Reading: ht al ttp://www.mic crosoft.com/en n-us/windows/ /compatibility/ /en-US /C CompatCenter r/Home.

Common Application C A n-Compati ibility Prob blemsAn application written for a sp w pecific operati ing sy ystem can caus problems when you install it on se w a computer with a different operating syste for h o em, se everal reasons. Generally, applications and . ha ardware that work on Windo 7 will cont w ows tinue to work on Windows 8. To troub w bleshoot and address a an compatibility issues effect ny tively, it is imp portant to be aware of the general areas that typica o t ally ca ause the most issues.

Setup and In nstallation of Applicatio o ons

During applicat tion setup and installation, an ap pplication mig try to copy files and shor ght rtcuts to fo olders that exis sted in a previo Windows operating syst ous tem, but no lo nger exist for the new opera ating sy ystem. This can prevent the application fro installing p n a om properly or eve installing at all. en t

User Accoun Control U nt

User Account Control (UAC) adds security to Windows by controlling administrator-level access to the a y co omputer, and by restricting most users to run as standar users. When users attemp to launch an rd n pt n ap pplication that requires adm t ministrative per rmissions, the s system promp them to con pts nfirm their inte ention to do so. o

UAC also limits the context in which a proce executes, t minimize th ability of use to inadvert n ess to he ers tently ex xpose their computer to viru uses or other malware. This c m change affects any applicatio installer or update s on th requires ad hat dministrator pe ermissions to run, performs u r unnecessary a dministrator c checks or actio or ons, at ttempts to writ to a nonvirt te tualized registr location. ry ssues: However, UAC may result in the following compatibility is m t c Custom installers, uninsta allers, and upd daters may not be detected a elevated t run as t and to administrat tor.

Standard user application that require administrativ privileges to perform their tasks may fai or ns e ve o r il might not make this task available to st m tandard users..

MCT USE ONLY. STUDENT USE PROHIBITED

1-10 Installing and Deploying Windows 8

Applications that attempt to perform tasks for which the current user does not have the necessary permissions may fail. How the failure manifests itself is dependent upon how the application was written. Control panel applications that perform administrative tasks and make global changes may not function properly and may fail.

Dynamic link library (DLL) applications that run using RunDLL32.exe may not function properly if they perform global operations. Standard user applications writing to global locations will be redirected to per-user locations through virtualization.

Windows Resource Protection

Windows Resource Protection (WRP) protects Windows resources, such as files, folders, and registries, in a read-only state. This affects specific files, folders, and registry keys only. WRP restricts updates to protected resources to the operating system trusted installers, such as Windows Servicing. This enables better protection for the components and applications that ship with the operating system from the impact of other applications and administrators. However, WRP may result in the following compatibility issues:

Application installers that attempt to replace, modify, or delete operating system files and/or registry keys that WRP protects may fail, with an error message indicating that the resource cannot be updated. This is because access to these resources is denied.

Applications that attempt to write new registry keys or values to protected registry keys may fail with an error message that indicates that the change failed because access was denied. Applications that attempt to write to protected resources may fail if they rely on registry keys or values.

64-Bit ArchitectureWindows 8 fully supports the 64-bit architecture. The 64-bit version of Windows 8 can run all 32-bit applications with the help of the WOW64 emulator. Considerations for the 64-Bit Windows 8 include:

Applications or components that use 16-bit executables, 16-bit installers, or 32-bit kernel drivers will either fail to start or will function improperly on a 64-bit edition of Windows 8.

Installation of 32-bit kernel drivers will fail on the 64-bit system. If an installer manually adds a driver by editing the registry, the system will not load this driver, and this can cause a system failure. Installation of 64-bit unsigned drivers will fail on the 64-bit system. If an installer manually adds a driver by editing the registry, the system will not load the driver during load time if it is not signed.

Windows Filtering Platform

Windows Filtering Platform (WFP) is an application program interface (API) that enables developers to create code that interacts with the filtering that occurs at several layers in the networking stack and throughout the operating system. If you are using a previous version of this API in your environment, you may experience failures when running security-class applications, such as network scanning, antivirus programs, or firewall applications.

Operating System Version Changes

The operating system version number changes with each operating system release. For Windows 7, the internal version number is 6.1, whereas for Windows 8, the internal version number is 6.2. The GetVersion function returns this value when it is queried by an application. This change affects any application or application installer that specifically checks for the operating system version, and might prevent the installation from occurring or the application from running.

MCT USE ONLY. STUDENT USE PROHIBITED1-11

Co onfiguring Windows 8

Kernel-Mode Drivers K e

Ke ernel-mode dr rivers must sup pport the Wind dows 8 operat ting system or be redesigned to follow the Userr d e Mode Driver Fra M amework (UMDF). UMDF is a device drive r developmen platform tha was introduc in nt at ced Windows Vista. W

Methods fo Mitigati Comm Applic M or ing mon cation-Com mpatibility Issues yYo can use the Application Compatibility Toolkit ou e C T (A ACT) to determ mine whether your applicatio are y ons co ompatible with Windows 8. ACT also helps you h A s de etermine how an update to the new versio will on af ffect your applications. You can use the AC c CT fe eatures to: Verify your application, device, and com d mputer compatibility with a new version of the e Windows operating syste o em. Verify a Windows update compatibilit e's ty. Become inv volved in the ACT communit and A ty, share your risk assessmen with other ACT users. nt A

Test your web application and website for compati bility with new releases and security upda w ns es w ates to Windows In nternet Explore . er

Mitigating an application com M mpatibility issu typically dep ue pends on vario factors, suc as the type of ous ch ap pplication and current suppo for the app ort plication.

Mitigation Methods M MSo ome of the mo common mitigation met ore m thods include t following: the

Modifying the configurat t tion of the exis sting applicatio There can be compatibil issues that require on. lity a modificat tion to the app plication config guration, such as moving file to different folders, modifying h es registry ent tries, or changing file or fold permission s. der tandard User A You can use tools such as the Compatib e s bility Administ trator or the St Analyzer (insta alled with ACT) to detect and create applicat t c tion fixes (also called shims) to address compatibility issues. o Contact the software ven e ndor for inform mation about a additional compatibility solutions. any

Applying updates or serv packs to th application.. Updates or se vice he ervice packs m be available to may address ma of the com any mpatibility issue and they he the applica es, elp ation to run w the new op with perating system environment. Afte applying the update or se er e ervice pack, ad dditional applic cation tests can ensure that the compatib t bility issue has been mitigate ed. Upgrading the applicatio to a compat on tible version. If a newer, com f mpatible versio of the application on exists, the best long-term mitigation is to upgrade to the newer ve b m o ersion. Using th approach, y his you must consid both the cost of the upg der c grade and any potential prob blems that ma arise with ha ay aving two different versions of the application.

t onfiguration. If your compat f tibility issues a ppear to be pe ermissions-rela ated, Modifying the security co a short-term solution is to modify the security config m o s guration of the application. U e Using this approach, you must conduct a full-r analysis an gain consen risk nd nsus from your organization security team ns regarding the modificatio For examp you can m t ons. ple, mitigate the Int ternet Explorer Protected mo by r ode adding the site to the tru usted site list or by turning o Protected M off Mode, which w do not recommend. we

MCT USE ONLY. STUDENT USE PROHIBITED

1-12 Installing and Deploying Wind dows 8

Running the application in a virtualized environment. If all other met a e f thods are unav vailable, you m may be able to run the applicati in an earlie version of W n ion er Windows using virtualization tools such as g Hyper-V. Late sections of this course will provide more details about Hyper-V. er t l e t

Using applica ation-compatib bility features. You can mitig gate applicatio issues, such as operatingon system versio oning, by runni the applica ing ation in compa atibility mode. You can acce this mode b ess by right-clicking the shortcut or .exe file, and then applyin Windows Vista or Window XP compatibility o d ng ws mode from th Compatibility tab. he You also can use the Progra Compatibility Wizard to assist in config am guring an app plications compatibility mode. The Pr rogram Compa atibility Wizard is in Control Panel, under Programs and d Features.

Selecting ano other applicatio that performs the same b on business functi r ion. If another compatible application is available, con nsider switching to the comp patible applica ation. When us sing this appro oach, you must con nsider both the cost of the application and the cost of em e d mployee supp port and trainin ng.

Op ptions for Installing Windows 8 I WYou can install Wi u indows 8 in a number of diff n ferent way including: ys, Clean installation. A clean installation of Windows 8 occurs when the hard disk to which you are installing Windows contain no e ns previous Windows operatin system ng information, or when you erase the disk prior o e p to installation To perform a clean installa n. ation on a compute without an operating syst er o tem, start the computer directly from the DVD If D. the computer already has an operating r a system, run se etup.exe to st the installa tart ation. You can run setup.exe from the followin sources: s m ng o o o DVD Network share USB Key

You also can use an image to perform a clean installati on. c Upgrade insta s allation. Perfor an upgrade which also is known as an in-place upgr rm e, n rade, when you want to replace an existing version of Windows with W Windows 8 and you need to r retain all user applications, files, and settings.

To perform an in-place upg grade to Windows 8, run the Windows 8 in e nstallation pro ogram (setup.e exe), and select Up pgrade. You ca run setup.e from the p roduct DVD or from a netwo share. Dur an exe ork ring an in-place upgrade, the Windows 8 insta W allation progra retains all u am user settings, d data, hardware e device setting applications, and other co gs, onfiguration in nformation au utomatically. A Always back up all of p your important data before performing an upgrade. e a

Migration. Yo perform a migration when you have a c ou m computer alrea running W ady Windows 7, and d need to move files and sett e tings from you old operatin system (source computer) to the Windo 8ur ng ) ows based compu (destinatio computer). Perform a mig uter on gration by doing the following: o Back up the users setti t ings and data

MCT USE ONLY. STUDENT USE PROHIBITED1-13

Configuring Windows 8

o o o

Perform a clean installation Reinstall the applications Restore the users settings and data

There are two migration scenarios: side-by-side, and wipe and load. In side-by-side migration, the source computer and the destination computer are two different computers. In wipe and load migration, the target computer and the source computer are the same. To perform wipe-and-load migration, you perform a clean installation of Windows 8 on a computer that already has an operating system, by running the Windows 8 installation program, and then selecting Custom (advanced). Automated installation. You perform an automated installation when you use one of the above methods of installation in combination with an automation tool, to make the installation more seamless, or to remove repetitive tasks from the installation process.

Automated installations can take many forms, including pushing precreated images to computers, using an enterprise-level tool such as the Microsoft Deployment Toolkit (MDT), Windows Deployment Services (WDS) and the Windows Assessment and Deployment Kit, or even by creating an answer file manually to provide information directly to the installation process.

MCT USE ONLY. STUDENT USE PROHIBITED

1-14 Installing and Deploying Wind dows 8

Lesson 3

Installi Win ing ndows 8

Alth hough you can perform Windows 8 installa n ation by using a number of different meth hods, the imag gebase nature of th installation process and the desired res ed he sulta properly functioning Windows 8 etermining wh com mputerremai consistent, regardless of the method. De in r hich method to use and how to o w best implement th method are important parts of the pla t hat p anning proces for a Window 8 installatio ss ws on.

This lesson will he you analyze the reasons behind using c s elp e b certain methods, help you to understand how o you can implement those methods, and introduce the Wind dows To Go m method, which is new in Win ndows 8.

Les sson Objec ctivesAfte completing this lesson, yo will be able to: er ou Decide when to perform a clean installati of Window 8. ion ws Explain the methods that yo can use to perform a clea installation. m ou an Describe Windows To Go. Explain comm installation errors. mon

Dis scussion: Deciding When to Pe D W erform a C Clean Insta allationA clean installatio is the most straightforwar and on s rd simple installation method for Windows 8. A clean n W c installation involves the least nu umber of variables in th installation process, and it also results in a he i new default installation of Wind w, dows 8. Question: When do you ty ypically perform a m clean installat tion of Window ws?

Me ethods for Performin a Clean Installatio r ng n onYou can perform a clean installa u ation of Windo 8 ows by running setup.exe from the DVD or from a r D netw work share. Yo also can per ou rform a clean installation by dep ploying an ima age.

Run nning Wind dows 8 Insta allation from m DV VDInstalling from the product DVD is the simple e D est way to install Win y ndows 8, and in ncludes the follo owing steps: 1. Insert the Win ndows 8 DVD.

MCT USE ONLY. STUDENT USE PROHIBITED1-15

Configuring Windows 8

2.

If your computer does not currently have an operating system, start the computer by using the product DVD. If your computer already has an operating system, you also can start the computer with the old operating system, and then run the Windows 8 installation from the product DVD on that operating system. Complete the wizard.

3.

Running Windows 8 Installation from a Network Share

Instead of a DVD, you can store the Windows 8 installation files in a network share. Generally, the network source is a shared folder on a file server. Perform the following steps to install Windows 8 from a network share: 1. If your computer does not currently have an operating system, start the computer by using the Windows Preinstallation Environment (Windows PE). You can start Windows PE from bootable media, such as a DVD or a USB flash drive, or from a network PXE boot, by using WDS. If your computer already has an operating system, you can start the computer with the old operating system. Connect to the network share that contains the Windows 8 files. Run the Windows 8 installation program (setup.exe) from the network share. Complete the wizard.

2. 3. 4.

Installing Windows 8 by Using an ImagePerform the following steps to install Windows 8 by using an image: 1. 2.

Install Windows 8 to a reference computer, and then prepare the reference computer for duplication. Create a WIM image of the reference computer by using ImageX. You can run ImageX from a command prompt or from Windows PE. ImageX captures a volume image to a WIM file. WIM files are not tied to a particular hardware configuration, and you can modify them after capture to add new drivers, patches, or applications.

Use one of the following tools to deploy the image: ImageX WDS MDT

Note: You typically use the deployment tools in the preceding list in enterprise environments. Discussion of these tools is outside the scope of this course.

MCT USE ONLY. STUDENT USE PROHIBITED

1-16 Installing and Deploying Wind dows 8

Wh Is Wind hat dows To Go? GWin ndows To Go is a Windows 8 feature that s enables users to boot Windows from a USBb connected external drive. In a Windows To Go W o installation, the en ntire operating system, prog g gram files user data, an settings are self-contained s, nd d with the USB me hin edia. Windows To Go users s simply plug their USB drive into a Windows 8 o com mpatible comp puter, start the computer, and boo directly to th copy of Win ot he ndows 8 that is installed on the USB drive. Win ndows To Go drives can use the same imag d t ge that enterprises use for their de t esktops and lap ptops, and you can manage them in th same way. Windows To G does not re he W Go eplace desktop or laptops, n ps nor doe it supplant other mobility offerings. Rath it provides support for e es o her, s efficient use of resources for f r alternative workplace scenarios.

Con nsiderations for Windo ows To GoThere are some co onsiderations that you should keep in min as you use W t nd Windows To G Go: Hibernate and sleep are dis sabled by defa ault. To help pr rotect Window To Go installations from ws accidental data corruption, hibernate and sleep are dis abled in Wind d dows To Go. Yo can reenable ou them by using Group Policy settings. g y

Internal disks are offline. To ensure data is not disclosed accidentally,, internal hard disks on the h o i d host computer are offline, by de e efault, when bo ooted into a W Windows To Go Similarly, if a Windows To Go o. drive is insert into a runn ted ning system, Windows Explo rer will not dis W splay the Wind dows To Go dr rive.

TPM is not us sed. When you use BitLocker Drive Encryp tion, a preope u r erating system boot passwor will rd be used for se ecurity rather than the TPM. This is becaus the TPM is t . se tied to a specific computer, and Windows To Go drives will move between computers. n Windows Rec covery Environment is not av vailable. In the rare case that you need to recover your e t Windows To Go drive, you should reimag it with a fre sh image of W ge Windows. Push Button Reset is not av R vailable. Resett ting to the ma nufacturers st tandard for the computer do e oes not really app when running Windows To Go, so the f ply T feature was di isabled. Creating a Windows To Go USB drive is only possible in Windows 8 E o n Enterprise

Roa aming with Windows To Go T

You can boot Win u ndows To Go drives on multiple computer During the f d rs. first boot on a computer, Win ndows To Go will detect all hardware on th computer, a then insta ll drivers. Whe returning to that w h he and en o com mputer, Windows To Go will identify the co omputer, and t then load the correct drivers automatically s y. Users can do this on multiple co omputers with the same Win ndows To Go d drive, which en nables the abil to lity roam between the m em.

Win ndows To Go Requirem G mentsThe requirements for Windows To Go are: s

32GB or large USB drive th you format with NTFS file system. This drive can be f er hat t e flash memory or an external hard drive. A computer that fulfills the minimum har t rdware require ements for Win ndows 8. Windows 8 En nterprise license for creating the drives. g

MCT USE ONLY. STUDENT USE PROHIBITED1-17

Co onfiguring Windows 8

Discussion: Common Installatio Errors D n onTh installation of Windows 8 is robust and he tr rouble-free if your hardware meets the minimum y re equirements. However, a var H riety of problem can ms oc ccur during an installation, and a methodi n a ical ap pproach helps solve them.

Troubleshoo oting Appro oachYo can use the following fou ou e ur-step approa in ach an troubleshoo ny oting environm ment: 1. . 2. . 3. . 4. . Determine what has chan nged. Eliminate th possible cau he uses to determ mine the probable ca ause. Identify a so olution. Test the sol lution.

If the problem persists, go back to step thre and repeat the process. p ee, t Question: What potentia issues might you encounte when install al t er ling Windows? ?

MCT USE ONLY. STUDENT USE PROHIBITED

1-18 Installing and Deploying Windows 8

Lab A: Installing Windows 8ScenarioYou have been asked to perform the installation of Windows 8 on a laptop computer from one of the Windows 8 testers at A. Datum Corp. You must ensure that the computer meets the requirements for Windows 8, install the operating system in the cleanest state possible, and confirm the success of the installation.

Objectives Determine that the target computer meets the requirements of the intended Windows 8 edition. Perform a clean installation of Windows 8. Verify the successful installation.

Lab SetupEstimated Time: 40 minutes Virtual Machine (s) User Name Password 20687A-LON-DC1 Adatum\Administrator Pa$$w0rd

For this lab, you will use the available virtual machine environment. Before you begin the lab, you must complete the following steps: 1. 2. 3. 4.

On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20687A-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Log on using the following credentials: User name: Adatum\Administrator Password: Pa$$w0rd

Exercise 1: Planning to Install Windows 8ScenarioPrior to installing window, establish an installation plan by reading the request. A. Datum Wireless Network Requirements Document reference: HD-02-05-12 Document author Date Holly Dickson May 2, 2012

Requirements Overview We want to create a test environment for a new application that we are developing. Ideally, we would like to be able to test the application on a number of different operating systems, but we have only been provided one system. We have been told that Windows 8 supports the same virtualization as the servers in our production environment, so maybe we could do it that way?

MCT USE ONLY. STUDENT USE PROHIBITED1-19

Configuring Windows 8

A. Datum Wireless Network Requirements

The computer that we have been given has a quad core, 2.0GHz processor and 4 GB of RAM. The processor supports Intel VT, I was told that was important. It also has