Www.futas.net
Exam 70-620 Simulations
You are configuring the drivers for your Windows Vista computer. You want to find and install the latest driver for your network card automatically. You also want to roll back the driver for your sound card because the newest driver you got from the manufacturer made the sound card quit working.
Your task in this lab is to do the following:
• Update the network adapter driver, searching for the driver automatically.
• Roll back the sound card driver.
Automatically Update a Device Driver
1. Click the Start button, then right-click Computer and select Manage.
2. Select Device Manager in the left pane, then expand the node for the device for which you wish to update the driver.
3. Right-click the appropriate device and choose Update Driver Software....
4. Select Search automatically for updated driver software.
5. Click Close when you get the message that the software installed successfully.
Roll Back a Driver
1. Click the Start button, then right-click Computer and select Manage.
2. Select Device Manager in the left pane, then expand the node for the device on which you wish to rollback the driver.
3. Double-click the device, then click the Driver tab.
4. Click the Rollback Driver button.
5. Click Yes to confirm the roll back operation.
6. Click OK to restart your computer.
************************************************************
You are configuring the drivers for your Windows Vista computer. You want to find and install the latest driver for your network card automatically. You also want to roll back the driver for your sound card because the newest driver you got from the manufacturer made the sound card quit working.
Your task in this lab is to do the following:
• Update the network adapter driver, searching for the driver automatically.
• Roll back the sound card driver.
Open Device Manager
1. Click Start.
2. Right-click Computer and select Manage.
3. Click Device Manager.
Enable or Disable a Device Driver
1. In Device Manager, browse to the device you want to enable or disable.
2. Right-click the device and click Enable or Disable. (Click Yes to confirm when disabling a device.)
Scan for Plug and Play Hardware Changes
Right-click any node in Device Manager and select Scan for hardware changes.
************************************************************
You installed a new graphics card in your machine and updated the drivers to support the graphics card. However, you do not see the Windows Aero features on the screen. Your task in this lab is to check your Aero compatibility by updating your computer's performance score.
To complete this lab, go to the Control Panel, System and Maintenance, then Performance Information and Tools. Click the Update my score link.
************************************************************
You have a customer who wants to be able to monitor her children's computer activities. You have already created an administrator account for her called Patty. Your task in this simulation is to do the following:
• Create the following standard user accounts:
o Cindy
o Joseph
• For each account, enable the following:
o Parental Controls
o Activity Reporting
• For the Joseph account, create the following game controls:
o Block unrated games
o Grant access only to rated games with a Teen or lower rating
The Parental Controls in Windows Vista allow you to monitor and control the computing habits of other users who have access to the computer. Parental controls are not, however, enabled by default for new standard user accounts. If you wish to use parental controls, access the account and enable them after you've created the account.
To complete this lab,
1. Create the Cindy and the Joseph user accounts as standard users.
2. In Parental Controls, select each account and choose On, enforce current settings. Note: Activity reporting is enabled by default after you enable Parental Controls.
3. For the Joseph account, use the Games link to configure the following settings:
o If a game has no rating, can Joseph play it? = Block game with no rating
o Which games are ok for Joseph to play? = TEEN
Following are the steps an expert might take to complete this lab:
Create User Accounts
1. Click Start/Control Panel.
2. Under User Accounts and Family Safety, select Add or remove user accounts. (Provide confirmation as necessary to proceed.)
3. Select Create a new account.
4. Enter the account name and select the type of account you wish to create.
5. Click Create Account.
Enable Parental Controls
1. Click Start/Control Panel.
2. Under User Accounts and Family Safety, select Set up parental controls for any user. (Provide confirmation as necessary to proceed.)
3. Select the appropriate user account.
4. Under Parental Controls, select On, enforce current settings.
5. Click OK.
Allow or Block Games
1. Click Start/Control Panel.
2. Under User Accounts and Family Safety, select Parental Controls. (Provide confirmation as necessary to proceed.)
3. Select the appropriate user account.
4. Under Windows Settings, select Games.
5. To allow the user account to access games, select Yes, or select No to block games.
6. To control game access by rating or content, click Set game ratings.
7. For games that do not have a rating, select Allow games with no rating or Block games with no rating.
8. Choose a rating level. (Note: The user account can access all game ratings below the highest level you assign.)
9. Under Block these types of content, you can block games based on specific types of content.
10. Click OK three times to apply the changes and return to parental controls.
************************************************************
You have two children who want to access the Internet. You have agreed to allow them to access the Internet during certain times. Your task in this lab is to do the following:
• For the Jen user account, allow access during the following times:
o 5 PM to 6 PM each week day
o 2 PM to 4 PM each Saturday and Sunday
• For the John user account, allow access during the following times:
o 7 PM to 8 PM each week day
o 4 PM to 6 PM each Saturday and Sunday
• Restrict each account to Web sites approved for children only
• Prohibit each account from performing file downloads
To complete this lab, you must use the Parental Controls in the Control Panel to do the following:
• For the Jen user account, allow access during the following times:
o Monday through Friday 5 PM to 6 PM
o Saturday and Sunday 2 PM to 4 PM
• For the John user account, allow access during the following times:
o Monday through Friday 7 PM to 8 PM
o Saturday and Sunday 4 PM to 6 PM
• For each account, configure the following:
o Choose a web restriction level = High
o Block file downloads = Enabled
Following are the steps an expert might take to complete this lab:
Configure Time Limits for User Accounts
1. Click Start/Control Panel.
2. Under User Accounts and Family Safety, select Parental Controls. (Provide confirmation as necessary to proceed.)
3. Select the appropriate user account.
4. Beside Time Limits:, select Off.
5. Click the square in the grid that corresponds to the time when you want to begin blocking access, then drag the cursor to the square in the grid that corresponds to the time when you want to stop blocking access. Blocked time is marked in blue.
6. Click OK.
Configure Automatic Web Restrictions
1. Click Start/Control Panel.
2. Under User Accounts and Family Safety, select Parental Controls. (Provide confirmation as necessary to proceed.)
3. Select the appropriate user account.
4. Select Windows Vista Web Filter.
5. Make sure Block some websites or content is selected.
6. Under Block web content automatically, select the desired restriction level.
7. Click OK.
8. Click OK again to exit the user account dialog.
Configure Automatic Web Restrictions
1. Click Start/Control Panel.
2. Under User Accounts and Family Safety, select Parental Controls. (Provide confirmation as necessary to proceed.)
3. Select the appropriate user account.
4. Select Windows Vista Web Filter.
5. At the bottom of the window, select the Block file downloads box.
6. Click OK.
7. Click OK again to exit the user account dialog.
************************************************************
You have just finished installing Windows Vista for your home computer. You would like to customize Internet Explorer settings to match your preferences.
Your task in this lab is to edit the Advanced options in Internet Options to configure the following settings:
• Enable personalized favorites menu
• Enable websites to use the Search pane
• Use inline AutoComplete
• Do not search from the address bar
To complete this lab, use the Advanced tab in the Internet Properties dialog to make the following configuration changes:
• Enable personalized favorites menu = Enabled
• Enable websites to use the Search pane = Enabled
• Use inline AutoComplete = Enabled
• Do not search from the address bar = Enabled
Following are the steps an expert might take to complete this lab:
Open Internet Options
1. Click Start/Control Panel.
2. Click Network and Internet.
3. Click Internet Options.
Modify Advanced Internet Explorer Behavior Settings
1. In Internet Options, click the Advanced tab.
2. Scroll down the list to locate and enable or disable the desired options.
3. Click OK.
************************************************************
You are logged on to your home computer through the administrator account Patty. You want to stop the system from giving you UAC prompts every time you perform a task that requires administrative permissions. You also want to prevent your family from trying to elevate their own permissions from their standard user accounts. Your task in this lab is to do the following:
• Set the UAC behavior for the administrator account to elevate permissions without the prompt.
• Set the UAC for standard users to deny elevation requests automatically.
Note: To change the security policy settings, go to Start/All Programs/Administrative Tools/Local Security Policy.
To complete this lab, you must use the Local Security Policy to configure the following local security policies:
• User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode = Elevate without prompting
• User Account Control: Behavior of the elevation prompt for standard users = Automatically deny elevation requests
Following are the steps an expert might take to complete this lab:
Change UAC Behavior through Local Security Policy
1. Click Start and highlight All Programs, then open Administrative Tools/Local Security Policy. (Provide confirmation as necessary to proceed.)
2. Select Security Options, then locate the policy you wish to modify in the right pane.
3. Double-click the policy to open it.
4. Configure the policy settings.
5. Click OK.
************************************************************
You are attending a conference as part of your work. You are using a kiosk computer set up in the exhibition hall. You have just finished using Internet Explorer to check your e-mail, print your boarding pass, and send off a few bills from your banking website. You are concerned about the browser keeping track of your browsing history.
Your task in this lab is to delete all items in the browser history including information saved by add-ons.
Delete all cookies
Delete form data
Delete saved passwords
Delete temporary Internet files
Delete website history
Delete data for add-ons
To complete this lab, open the Delete Browsing History dialog, then click Delete all... and select Also delete files and settings stored by add-ons. Using the Delete all... button is the only way to delete files and settings stored by add-ons.
Following are the steps an expert might take to complete this lab:
Open Internet Options
1. Click Start/Control Panel.
2. Click Network and Internet.
3. Click Internet Options.
Delete Browsing History
1. In Internet Options, click Delete... on the General tab.
2. Click the button for each type of browsing history you want to delete, or select Delete all... to delete everything at once.
3. Click Yes. (Tip: If you select Delete all... you have the option of also selecting Also delete files and settings stored by add-ons.)
************************************************************
You have a Windows Vista Ultimate computer at work that you share with two other users. You are concerned about security in Internet Explorer and would like to take steps to customize add-ons and how they are allowed to run.
Your task in this lab is to take the necessary actions to accomplish the following:
• Prevent all add-ons that display (Not verified) in the Publisher column from running when you are logged on.
• Prevent the StreamPlayer add-on from running when you are logged on.
• Remove the Instruct-O-Magic add-on to prevent all users from using it.
To complete this lab, use the Programs tab in Internet Options to manage add-ons. To disable and remove all add-ons required by the lab, be sure to check each category of add-ons (don't just look in the Add-ons that have been used by Internet Explorer list as this will only show you add-ons that have been used). Complete the following:
• Under Add-ons that have been used by Internet Explorer, disable the following:
o CBroswerHelperObject Object
o DriveLetterAccess
o Sun Java Console
o StreamPlayer
• Under Add-ons that run without requiring permission, disable the Java Plug-in 1.4.2_03.
• Under Downloaded ActiveX Controls (32bit), delete the Instruct-O-Magic ActiveX Control.
Following are the steps an expert might take to complete this lab:
Manage Add-ons
1. Click Start/Control Panel.
2. Click Network and Internet.
3. Under Internet Options, select Manage Browser add-ons.
4. Click Manage add-ons.
5. Select the category of add-on you wish to view from the Show list.
6. Select the add-on in the list, then click Enable or Disable. (Note: If the add-on is an ActiveX control, you can also click the Delete button.)
7. Click OK.
************************************************************
You would like to improve the security of Internet Explorer. You task in this lab is to configure the following Advanced settings in Internet Options:
• Do not save encrypted pages to disk
• Empty the Temporary Internet Files folder when the browser is closed
• Enable memory protection
• Warn when changing between secure and not secure mode
• Do not save encrypted pages to disk
• Configure Temporary Internet Files to empty when the browser is closed
• Enable memory protection
• Warn if changing between secure and not secure mode
To complete this lab, use the Advanced tab in the Internet Properties dialog to make the following configuration changes:
• Do not save encrypted pages to disk = Enabled
• Empty Temporary Internet Files folder when browser is closed = Enabled
• Enable memory protection to help mitigate online attacks = Enabled
• Warn if changing between secure and not secure mode = Enabled
Following are the steps an expert might take to complete this lab:
Open Internet Options
1. Click Start/Control Panel.
2. Click Network and Internet.
3. Click Internet Options.
Modify Advanced Internet Security Settings
1. In Internet Options, click the Advanced tab.
2. Scroll to Security, then enable or disable the desired options.
3. Click OK.
You work for a biotech research firm and are trying to access a new internal Web server called acct.westsim.private. After logging on, you see a warning message that instructs you to add the site to your trusted site list. The site does not support SSL (https).
You have also been getting complaints about two Web sites that appear to be running scripts and ActiveX controls. You can't block access to these sites completely because they provide links used by the research department, but you'd like to disable the running of this content when visiting those sites.
Your task in this lab is to do the following:
• Add the domain to the Trusted sites zone. Do not require HTTPS.
• Add the and domains to the Restricted sites zone.
To complete this lab, use the Internet Options link in the Control Panel to configure the following:
• Trusted sites: =
• Restricted sites: =
o
o
Following are the steps an expert might take to complete this lab:
Open Internet Options
1. Click Start/Control Panel.
2. Click Network and Internet.
3. Click Internet Options.
Add a Trusted Site
1. In Internet Options, click the Security tab.
2. Select the Trusted Sites zone.
3. Click the Sites button.
4. If the site does not use server verfication, deselect the Require server verification (https:) for all sites in this zone option.
5. Type the URL for the Web site.
6. Click Add.
7. Click OK.
8. Click OK to close the Internet Options.
Add a Restricted Site
1. In Internet Options, click the Security tab.
2. Select the Restricted sites zone.
3. Click the Sites button.
4. Type the URL for the Web site.
5. Click Add.
6. Click OK.
7. Click OK to close the Internet Options.
************************************************************
You work on a Windows Vista Ultimate computer. You are concerned about your privacy when surfing the Web and would like to increase it. You want your computer to block cookies and pop-ups from banner ad companies such as , but you also want your computer to accept cookies and pop-ups from legitimate sites, such as your bank's Web site.
Your task in this lab is to edit the privacy settings in Internet Options to implement the following settings:
• Always allow 1st party cookies
• Always block 3rd party cookies
• Accept session cookies
• Allow cookies from
• Configure the pop-up blocker level to block all pop-ups
• Allow pop-ups from
To customize cookie handling, edit the Advanced Privacy Settings on the Privacy tab in Internet Options. Configure the following settings for this lab:
• Override the default cookie handling
• Always allow 1st party cookies
• Always block 3rd party cookies
• Accept session cookies
• Add to the list of managed Web sites with Allow permission
• Add as an exception to the pop-up blocker filter
• Set the filter level to High: Block all pop-ups (Ctrl+Alt to override)
Following are the steps an expert might take to complete this simulation:
Open Internet Options
1. Click Start/Control Panel.
2. Click Network and Internet.
3. Click Internet Options.
Override Automatic Cookie Handling
1. In Internet Options, click the Privacy tab.
2. Click the Advanced... button.
3. Select Override automatic cookie handling.
4. Set the desired behavior for first-party and third-party cookies.
5. If desired, allow session cookies.
6. Click OK.
7. Click OK.
Block or Allow Cookies from Specific Sites
1. In Internet Options, click the Privacy tab.
2. Click the Sites button.
3. Enter the address of the appropriate Web site, then click Block or Allow.
4. Click OK.
Allow Pop-ups from Specific Sites
1. In Internet Options, click the Privacy tab.
2. Click the Settings button.
3. Enter the address of the Web site for which you wish to allow pop-ups, then click Add.
4. Click Close.
Configure Pop-up Blocker Filter Levels
1. In Internet Options, click the Privacy tab.
2. Click the Settings button.
3. From the Filter level: list, select the appropriate degree of pop-up filtering.
4. Click Close.
************************************************************
You have a Windows Vista Ultimate computer that runs outside of a domain. You are concerned about the security of the machine when accessing Internet sites, so you want to increase your protection. Your task in this lab is to do the following:
• Set the security level for the Internet zone to high.
• Set the phishing filter to check Web sites automatically.
To complete this lab, use Internet Options in the Control Panel to do the following:
• Internet zone security level = High
• Phishing Filter = Turn on automatic Web site checking
Following are the steps an expert might take to complete this simulation:
Open Internet Options
1. Click Start/Control Panel.
2. Click Network and Internet.
3. Click Internet Options.
Edit Zone Security Settings
1. In Internet Options, click the Security tab.
2. Select the zone you want to edit.
3. Use the slider to modify the security level using preset values. To configure custom settings:
1. Click the Custom Level... button.
2. Modify the desired settings.
3. Click OK.
4. Click OK.
Modify Phishing Filter Settings
1. In Internet Options, click the Advanced tab.
2. Scroll to Phishing Filter, then select the desired option.
3. Click OK.
************************************************************
The company you work for has just come out with a policy for Windows Defender settings. Your task in this lab is to configure Windows Defender as follows:
• Perform a full system scan every Saturday at midnight.
• Check for updates before performing the scan.
• Take the following default actions when items are found:
o High level alerts = Remove
o Medium level alerts = Remove
o Low level alerts = Ignore
To complete this lab, you need to apply the following configuration settings in Windows Defender:
• Frequency = Saturday
• Approximate time = 12:00 AM
• Type = (Full system scan)
• Check for updated definitions before scanning = Enabled
• Apply default actions to items detected during a scan = Enabled
• High level alerts = Remove
• Medium level alerts = Remove
• Low level alerts = Ignore
Following are the steps an expert might take to complete this lab:
Configure Automatic Scanning Options in Windows Defender
1. Click Start/Control Panel.
2. Click Security, then click Windows Defender.
3. Click Tools, then under Settings, click Options.
4. To allow Windows Defender to scan the computer automatically, make sure Automatically scan my computer (recommended) is selected.
5. With automatic scanning enabled, configure the following:
o Frequency Configure scanning to occur daily or on a specific week day.
o Approximate time Configure a time for scanning to occur.
o Type Configure the type of scan you want to perform (a quick scan checks the areas of the computer spyware is likely to affect, and a full scan checks all files and programs on the computer).
6. To make sure definitions are up-to-date prior to a scan, select the Check for updated definitions before scanning.
7. To remove spyware automatically, select Apply default actions to items detected during a scan.
8. Click Save.
************************************************************
Windows Defender runs automatically on your computer. However, it only runs once a day, so it doesn't offer you real-time protection from spyware, and it does not run under a non-administrator account. Your task in this lab is to do the following:
• Enable real-time protection using all agents except for:
o Internet Explorer Configurations
o Services and Drivers
• Configure Windows Defender to only notify you of changes made by known software.
• Configure Windows Defender to always notify you, even if it does not take an action.
• Allow all users to run a Windows Defender scan
Windows Defender gives you the option of tracking spyware in real-time. If a suspect piece of software tries to install itself or run on your computer, if real-time protection is turned on, Windows Defender alerts you and gives you several options for dealing with the software. To complete this lab:
• Under Real-time protection options, enable Use real-time protection (recommended).
• Disable the Internet Explorer Configurations and the Services and Drivers agents.
• Enable Changes made to your computer by software that is permitted to run.
• For the icon in the notification area, choose Always.
• Under Administrator options, select Allow everyone to use Windows Defender.
Following are the steps an expert might take to complete this lab:
Enable Real-time Protection
1. Click Start/Control Panel.
2. Click Security, then click Windows Defender.
3. Click Tools, then under Settings, click Options.
4. Under Real-time protection options, select Use real-time protection (recommended).
5. Click Save. If necessary, click Continue.
Enable Windows Defender for All Users
1. Click Start/Control Panel.
2. Click Security, then click Windows Defender.
3. Click Tools, then under Settings, click Options.
4. Under Administrator Options, select Allow everyone to use Windows Defender.
5. Click Save. If necessary, click Continue.
************************************************************
A security message informed you that Windows Firewall is not running on your computer. You want to protect your computer, but you also want to continue using remote access features. Your task in this lab is to do the following:
• Enable the Windows Firewall.
• Allow Remote Desktop and Remote Assistance through the firewall.
You can configure the Windows Firewall settings through the Control Panel. To complete this lab, configure the following settings for Windows Firewall:
• Select On to enable the firewall.
• Set Remote Assistance and Remote Desktop to be exceptions.
Following are the steps an expert might take to complete this lab:
Configure the Windows Firewall
1. Click Start/Control Panel.
2. Click Security, then select the Windows Firewall link.
3. Select the Change settings link.
4. If necessary, click Continue.
5. Under the General tab, select On to enable the firewall.
6. To allow specific kinds of network traffic, click the Exceptions tab.
7. Select the check boxes for the types of traffic you wish to allow. (You can also deselect check boxes for the types of allowed traffic that you do not want to permit.)
8. Click OK.
************************************************************
You have just purchased a new multi-player game, SuperBlast, that you want to play on your home network with some of your friends. They have brought their computers to your house and connected them to your Ethernet network. You check the product documentation and find that the game uses connectionless communications over ports 5040 and 5041.
Your task in this lab is to create a port exception to allow the application only within your local subnet.
To complete this lab, use the Windows Firewall to do the following:
• Add the following UDP ports to the exceptions list:
o 5040
o 5041
• Change the scope to My network (subnet) only
Following are the steps an expert might take to complete this lab:
Manually Configure Windows Firewall Exceptions
1. Click Start/Control Panel.
2. Click Allow a program through Windows Firewall. Click Continue as necessary to proceed.
3. To add a program as an exception, do the following:
o Click Add program....
o Select the program in the list, then click OK.
4. To add a port as an exception, do the following:
o Click Add port....
o Enter a name for the port exception, the port number, and the protocol then click OK.
5. Click OK.
Change the Scope for a Port or Program Firewall Exception
1. Click Start/Control Panel.
2. Click Allow a program through Windows Firewall. Click Continue as necessary to proceed.
3. After adding a program or port as an exception, click Change scope....
4. Select the desired scope option, and if necessary, enter the data for a custom list.
5. Click OK.
************************************************************
You are connecting a Windows Vista Ultimate computer to your network. Currently, your network uses manual IP addressing, and two DNS servers for name resolution.
Your task in this lab is to configure the TCP/IP properties for the Local Area Connection network connection to use the following static values:
• IP Address = 192.168.1.14
• Subnet Mask = 255.255.255.0
• Default Gateway = 192.168.1.254
• Preferred DNS server = 192.168.1.1
• Alternate DNS server = 192.168.2.1
To complete this lab, you must use the Network and Sharing Center to configure the following static values for the Local Area Connection network connection:
• IP Address = 192.168.1.14
• Subnet Mask = 255.255.255.0
• Default Gateway = 192.168.1.254
• Preferred DNS server = 192.168.1.1
• Alternate DNS server = 192.168.2.1
Following are the steps an expert might take to complete this lab:
Configure Static TCP/IP and DNS Values
1. Click Start/Control Panel.
2. Under Network and Internet, select View network status and tasks.
3. Click View Status to open the Local Area Connection Status dialog.
4. Click the Properties button. (Provide confirmation as necessary to proceed.)
5. Select Internet Protocol Version 4 (TCP/IPv4), then click Properties.
6. To configure static IP addressing, select Use the following IP address:, then enter the values for the following:
o IP address
o Subnet mask
o Default gateway
7. To configure DNS values, select Use the following DNS server addresses, the enter the values for the following:
o Preferred DNS server
o Alternate DNS server
8. Click OK.
************************************************************
You have a laptop that runs Windows Vista Ultimate. You configured a static connection to your home network, but you cannot connect to the network at your office, which uses a DHCP server for IP address configuration. You need to configure the laptop to work on both networks.
Your task in this lab is to do the following:
• Configure the laptop to obtain IP and DNS addresses automatically.
• Copy the static configuration settings to create an alternate TCP/IP connection.
To complete this lab, use the Network and Sharing Center to access the Internet Protocol Version 4 (TCP/IPv4) Properties for the LAN adapter to do the following:
• On the General tab, set the following:
o Obtain an IP address automatically
o Obtain DNS server address automatically
• On the Alternate Configuration tab, set the following:
o IP Address = 192.168.1.14
o Subnet Mask = 255.255.255.0
o Default Gateway = 192.168.1.254
o Preferred DNS Server = 192.168.1.1
Following are the steps an expert might take to complete this lab:
Configure Automatic DHCP and DNS Addressing
1. Click Start/Control Panel.
2. Under Network and Internet, select View network status and tasks.
3. Click View Status to open the Local Area Connection Status dialog.
4. Click the Properties button. (Provide confirmation as necessary to proceed.)
5. Select Internet Protocol Version 4 (TCP/IPv4), then click Properties.
6. To configure automatic IP addressing through DHCP, select Obtain an IP address automatically.
7. To configure automatic DNS addressing, select Obtain DNS server address automatically.
8. Click OK to close the Local Area Connection Properties dialog.
9. Click Close to return to the Network and Sharing Center.
Configure Alternate TCP/IP Addressing
1. Click Start/Control Panel.
2. Under Network and Internet, select View network status and tasks.
3. Click View Status to open the Local Area Connection Status dialog.
4. Click the Properties button. (Provide confirmation as necessary to proceed.)
5. Select Internet Protocol Version 4 (TCP/IPv4), then click Properties.
6. Click the Alternate Configuration tab.
7. To configure alternate IP settings, select User configured, then enter the values for the following, as necessary:
o IP address
o Subnet mask
o Default gateway
o Preferred DNS server
o Alternate DNS server
o Preferred WINS server
o Alternate WINS server
8. Click OK.
9. Click OK to close the Local Area Connection Properties dialog.
10. Click Close to return to the Network and Sharing Center.
You have received a new laptop with a built-in wireless network adapter. SSID broadcast has been disabled on the company access point, so you need to manually configure the network profile to make a connection.
Your task in this lab is to create a new wireless network profile as follows:
• Use WLBIX for the SSID.
• Use WPA2-Personal authentication.
• Use AES for encryption.
• Define 1a2b3c4d5e as the security key.
• Make sure the connection starts automatically and can connect if SSID broadcast is turned off.
To complete this lab, use the Network and Sharing Center to create a wireless network profile manually with the following settings:
• Network name (SSID) = WLBIX
• Security type = WPA2-Personal
• Encryption type = AES
• Security Key/Passphrase = 1a2b3c4d5e
• Start this connection automatically = Enabled
• Connect even if the network is not broadcasting = Enabled
Following are the steps an expert might take to complete this lab:
Configure Network Sharing and Discovery
1. Click Start/Control Panel.
2. Under Network and Internet, select View network status and tasks.
3. In the Tasks column, click the Manage wireless networks.
4. Click Add to create a wireless network profile.
5. To create a profile manually, select Manually create a network profile.
6. Enter values for the following settings as necessary:
o Network name
o Security type
o Encryption type
o Security Key/Passphrase
7. Additionally, you can enable the following options:
o Start this connection automatically
o Connect even if the network is not broadcasting
8. Click Next to add the wireless network profile.
9. Click Close to create the wireless network profile.
You are configuring a new Vista machine that is part of a workgroup. The computer administrator is Tracy Cunningham (username tcunningham). He wants to allow his assistant, Casey Lewis (username clewis) to connect to the machine remotely. He also wants to be able to receive remote assistance on the machine, should he need it.
Your task in this lab is to do the following:
• Enable any type of remote desktop connection to the current machine.
• Add clewis to the access list.
• Allow Remote Desktop through the firewall.
• Enable Remote Assistance and require invitations to expire after 2 hours
You can configure the Remote Desktop settings through the System Properties dialog box. To complete this lab, do the following:
• Configure the computer to allow connections from any computer running Remote Desktop.
• Add clewis to the access list.
• When you enable Remote Desktop, an exception is automatically added in the Windows firewall. You should verify that the setting was changed appropriately.
• Select the Allow Remote Assistance connections to this computer check box in System Properties.
• When you enable Remote Assistance, an exception is automatically added in the Windows Firewall. You should verify that the setting was changed appropriately.
• Under the Advanced tab, enter 2 as the maximum amount of time for invitations.
Following are the steps an expert might take to complete this simulation:
Enable Remote Desktop
1. Click the Start button, then right-click Computer and select Properties.
2. Select the Remote settings link.
3. Under the Remote tab, select from the following options:
o Don't allow connections to this computer
o Allow connections from computers running any version of Remote Desktop (less secure)
o Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure)
4. Click OK.
Add Remote Desktop Users
1. Click the Start button, then right-click Computer and select Properties.
2. Select the Remote settings link. (Click Continue as necessary to proceed.)
3. Click the Select Users... button.
4. Click Add....
5. Click Advanced....
6. Click Find Now.
7. Select the name from the list, then click OK.
8. Click OK until you exit System Properties.
Configure the Windows Firewall
1. Click Start/Control Panel.
2. Click Security, then select the Windows Firewall link.
3. Select the Change settings link.
4. If necessary, click Continue.
5. Under the General tab, select On to enable the firewall.
6. To allow specific kinds of network traffic, click the Exceptions tab.
7. Select the check boxes for the types of traffic you wish to allow. (You can also deselect check boxes for the types of allowed traffic that you do not want to permit.)
8. Click OK.
Enable Remote Assistance
1. Click the Start button, then right-click Computer and select Properties.
2. Select the Remote settings link.
3. Under the Remote tab, select Allow Remote Assistance connections to this computer.
4. Click OK.
Configure Remote Assistance Invitation Expiration
1. Click the Start button, then right-click Computer and select Properties.
2. Select the Remote settings link.
3. Under the Remote tab, make sure the Allow Remote Assistance connections to this computer check box is selected.
4. Click Advanced....
5. Enter the appropriate number in the Set the maximum amount of time invitations can remain open text box, then select one of the following:
o Minutes
o Hours
o Days
6. Click OK, then click OK again.
You have received increasingly large volumes of junk e-mail over the past month. You want to increase the filter level for junk e-mail, and you want to block e-mails from three sending domains. You also want better protection from phishing e-mails.
Your task in this lab is to do the following:
• Set the junk e-mail filter to High.
• Add the following senders to the Blocked Senders list:
o rx-
o
o .ua
• Configure phishing e-mails to be sent to the Junk Mail folder
To complete this lab, you must use the Junk E-mail Options... under the Tools menu in Windows Mail to do the following:
• Select the High level of junk e-mail protection.
• Add the following domains to the Blocked Senders list:
o rx-
o
o .ua
• Enable the Move phishing E-mail to the Junk Mail folder setting. (Tip: To enable this option, you must first enable Protect my Inbox from messages with potential Phishing links.)
Following are the steps an expert might take to complete this lab:
Configure Junk E-mail Filtering Levels
1. Click Start/All Programs, then select Windows Mail.
2. Click Tools, then select Junk E-mail Options....
3. On the Options tab, select the desired level of filtering.
4. Click OK.
Add Senders to Blocked Senders List
1. Click Start/All Programs, then select Windows Mail.
2. Click Tools, then select Junk E-mail Options....
3. On the Blocked Senders tab, click Add.
4. Enter the e-mail address or domain, then click OK. Repeat as necessary to add senders.
5. Click OK.
Configure Phishing Options for Junk E-mail
1. Click Start/All Programs, then select Windows Mail.
2. Click Tools, then select Junk E-mail Options....
3. On the Phishing tab, enable (or disable) the following options:
o Protect my Inbox from messages with potential Phishing links. (Note: This option is enabled by default.)
o Move phishing E-mail to the Junk Mail folder. (Note: This option is available only if the first option is enabled.)
4. Click OK.
************************************************************
You are using Windows Mail as your default mail client. You are starting to receive more and more junk e-mail. You want to stop receiving them completely and only receive e-mail from people you know.
Your task in this lab is to configure Windows Mail to receive e-mails only from people you specifically approve. Allow e-mails from the following:
• jane@
• john@
• mscalis@
• Trusted contacts
• Anyone that you send e-mails to
To complete this lab, you must use the Junk E-mail Options under the Tools menu in Windows Mail to do the following:
• Select the Safe List Only junk e-mail filter option.
• Add the following e-mail addresses to the Safe Senders List:
o jane@
o john@
o mscalis@
• Enable the Also trust e-mail from my Windows Contacts option.
• Enable the Automatically add people I e-mail to the Safe Senders List option.
Following are the steps an expert might take to complete this lab:
Configure Junk E-mail Filtering Levels
1. Click Start/All Programs, then select Windows Mail.
2. Click Tools, then select Junk E-mail Options....
3. On the Options tab, select the desired level of filtering.
4. Click OK.
Add Senders to Safe Senders List
1. Click Start/All Programs, then select Windows Mail.
2. Click Tools, then select Junk E-mail Options....
3. On the Safe Senders tab, click Add....
4. Enter the e-mail address or domain, then click OK. Repeat as necessary to add senders.
5. You can also automatically people to the list by enabling the following:
o Also trust e-mail from my Windows Contacts
o Automatically add people I e-mail to the Safe Senders List
6. Click OK.
************************************************************
You work for a small company that does business directly with customers and businesses in both Korea and Vietnam. Your colleague has been having problems receiving e-mails in Windows Mail. She says that she set up her junk e-mail filters to block e-mails from some domains, but now she suspects that too much is being blocked while other things are getting through that should not. She reports the following problems:
• Mail from myamar.de should be blocked, but it keeps getting through.
• I need to be able to get mail from mary@.
• I haven't gotten any e-mails from my contacts in Vietnam.
• I get e-mails from my contacts in Korea, but the text is practically unreadable.
• When I check my Junk E-mail folder, there's nothing there, even though people tell me they've sent me stuff.
Your task in this lab is to correct the reported problems while making as few changes to the filtering settings as possible.
To complete this lab, you must use the Junk E-mail Options under the Tools menu in Windows Mail to do the following:
• Disable the Permanently delete suspected junk e-mail instead of moving it to the Junk E-mail folder option.
• Remove myamar.de from the Safe Senders List.
• Add mary@ to the Safe Senders List.
• In the Blocked Top-Level Domain List, disable the restriction for VN (Vietnam).
• In the Blocked Encodings List, disable the restriction for Korean.
Following are the steps an expert might take to complete this lab:
Delete Junk E-mail Automatically
1. Click Start/All Programs, then select Windows Mail.
2. Click Tools, then select Junk E-mail Options....
3. On the Options tab, select Permanently delete suspected junk e-mail instead of moving it to the Junk E-mail folder. (Tip: Clear this option if you suspect that non-junk e-mails are being filtered as junk and deleted.)
4. Click OK.
Remove Senders from the Safe Senders List
1. Click Start/All Programs, then select Windows Mail.
2. Click Tools, then select Junk E-mail Options....
3. On the Safe Senders tab, select the e-mail address or domain you wish to remove, then click Remove.
4. Click OK.
Add Senders to Safe Senders List
1. Click Start/All Programs, then select Windows Mail.
2. Click Tools, then select Junk E-mail Options....
3. On the Safe Senders tab, click Add....
4. Enter the e-mail address or domain, then click OK. Repeat as necessary to add senders.
5. You can also automatically people to the list by enabling the following:
o Also trust e-mail from my Windows Contacts
o Automatically add people I e-mail to the Safe Senders List
6. Click OK.
Manage the Blocked Top-Level Domain List
1. Click Start/All Programs, then select Windows Mail.
2. Click Tools, then select Junk E-mail Options....
3. On the International tab, click Blocked Top-Level Domain List....
4. Enable (or disable) the desired countries or regions.
5. Click OK.
Manage the Blocked Encodings List
1. Click Start/All Programs, then select Windows Mail.
2. Click Tools, then select Junk E-mail Options....
3. On the International tab, click Blocked Encoding List....
4. Enable (or disable) the desired encodings.
5. Click OK.
************************************************************
You want to set up faxing through the modem on your Windows Vista Ultimate machine.
Your task in this lab is to create a fax account called Computer Fax that uses your fax modem. Configure the account to receive faxes manually
To complete this lab, use the Fax Setup wizard to create a fax account with the following settings:
• Select Connect to a fax modem
• Name = Computer Fax
• Select Notify me to receive faxes
Following are the steps an expert might take to complete this lab:
Create a Fax Modem Fax Account
1. Select Start/All Programs, then click Windows Fax and Scan.
2. In the Tools menu, select Fax Accounts....
3. Click Add....
4. Select Connect to a fax modem.
5. Enter a name for the account, then click Next.
6. To receive faxes, select one of the following:
o Answer automatically (recommended)
o Notify me (requires you to answer faxes manually)
7. Click Continue as necessary to proceed.
************************************************************
The accountant in your office has recently set up a fax account on the computer that she shares with two other accountants, each of whom use their own user accounts. The fax account connects to a local fax modem that is connected to a dedicated phone line used only by the fax device. She reports the following problems:
• She can send faxes, but when an outside fax account dials her modem, the line just rings and the modem never answers the call and does not receive the fax. If she's at her desk, she can receive the fax manually, but she needs to make sure that incoming faxes are received after two rings, even when she's out of the office.
• She would like to automatically save a copy of all faxes in the C:\Faxes folder.
• The other two users on her computer, mhall and clewis, cannot send or receive faxes.
Edit the Fax Settings to resolve all problems and requests.
Note: When adding the path to save a copy of the fax, type the path instead of browsing and selecting it.
To complete this lab, use the Fax Settings dialog to modify fax account with the following settings:
• On the General tab, configure the following receive options:
o Allow the device to receive fax calls
o Automatically answer after
o 2 rings
• Under More options..., select Save a copy to and enter C:\Faxes as the location to which to save faxes.
• On the Security tab, add the following users and give them Fax permissions:
o mhall
o clewis
Following are the steps an expert might take to complete this lab:
Configure Fax Receive Behavior
1. Select Start/All Programs, then click Windows Fax and Scan.
2. In the Tools menu, select Fax Settings.... (Click Continue as necessary to proceed.)
3. To enable the device to answer incoming faxes, select Allow the device to receive fax calls. Then configure one of the following:
o Manually answer
o Automatically answer after, then specify the desired number of rings.
4. To save or print a copy of the fax, click More options....
5. Select from the following:
o Print a copy to: and enter a print location.
o Save a copy to: and enter a save to location.
6. Click OK.
Add Fax Users and Permissions
1. Select Start/All Programs, then click Windows Fax and Scan.
2. In the Tools menu, select Fax Settings.... (Click Continue as necessary to proceed.)
3. Select the Security tab.
4. To add a user to the access list, click Add.
5. Enter the user name, then click OK. (To add multiple users, separate each user name with a semi-colon.)
6. To set the permission level, click the user name in the Name box, then select the permission level.
7. Click OK.
************************************************************
You are configuring a Windows Vista Ultimate computer. The previous user did not use Windows Sidebar. However, you would like to use it.
Your task in this lab is to configure Windows Sidebar to do the following:
• Run when the computer boots.
• Stay behind open windows.
• Be positioned on the left side of the screen.
Note: The Sidebar does not display in the simulator.
To complete this lab, use the Control Panel to edit the Windows Sidebar Properties to enable the following properties:
• Start Sidebar when Windows starts
• Sidebar is always on top of other windows = Disabled
• Display Sidebar on this side of the screen: Left
Following are the steps an expert might take to complete this lab:
Configure Windows Sidebar Properties
1. Click Start/Control Panel.
2. Select Appearance and Personalization.
3. Click Windows Sidebar Properties.
4. Enable (or disable) the properties you wish to modify, then click OK.
************************************************************
You are configuring a new computer for a new employee. You want to configure the computer to conform to the update policy, which requires systems to download and install updates with an Important designation automatically. You also want to make sure that all available updates designated Important have been installed.
Your task in this lab is to do the following:
• Configure Important updates to download and install each Wednesday at 2 AM.
• Configure Windows Update to not include Recommended updates.
• Restore and install hidden updates that have an Important designation.
To complete this lab, you need to configure the computer download and install updates according to the following schedule:
• Every Wednesday
• 2:00 AM
Also, you need to restore the hidden update designated Important. After restoring the hidden update, click the Install updates button to install it.
Following are the steps an expert might take to complete this lab:
Configure Automatic Updates
1. Click Start/Control Panel.
2. Click the System and Maintenance link.
3. Click Windows Update.
4. To set an update schedule, click Change Settings.
5. Select Install updates automatically, then a day and a time.
6. Click OK.
Restore and Install Hidden Updates
1. Click Start/Control Panel.
2. Click the System and Maintenance link.
3. Click Windows Update, then click Restore hidden updates.
4. Select the update you wish to restore, then click Restore. (Provide confirmation as necessary to proceed.)
5. Click the Install updates button.
************************************************************
You have a folder, C:\finances, that you use for storing financial information for your small company. You would like other users in your workgroup to be able to view, add, and change files in this folder through the network.
Your task in this lab is to use File and Folder Sharing to do the following:
• Share the C:\finances folder.
• Add the following users:
o mhall
o clewis
• Give each user enough permissions to view and change files.
• Allow only those with local user accounts to access shares by enabling password protected sharing.
To complete this lab, you must use Windows Explorer to do the following:
• Share the C:\finances folder
• Add the following users:
o mhall
o clewis
• Set each user permission level to Contributor
• Enable Turn on password protected sharing in Network and Sharing Center
Following are the steps an expert might take to complete this lab:
Share a File or Folder
1. Click Start, then right-click Computer and select Explore.
2. Right-click the file or folder you wish to share, and select Share....
3. To allow a user to access the file or folder, select the name from the drop-down list (or enter the name), then click Add.
4. To set the permission level, click the user name in the Name box, then select the permission level.
5. Click Share.
Modify Password Protected Sharing
1. Click Start/Control Panel.
2. Under Network and Internet, select View network status and tasks.
3. In the Sharing and Discovery section, click the arrow to the right of Password protected sharing.
4. Select one of the following settings:
o Turn on password protected sharing
o Turn off password protected sharing
5. Click Apply. (Provide confirmation as necessary to proceed.)
************************************************************
You have a Vista computer that you use at home. You have set up a small network, and you would like to share some files with other members of your family.
Your task in this lab is to share the C:\Users\Public folder. Allow users on other computers to view and edit all files in this folder.
Note: Advanced sharing is not available in the simulation.
To complete this lab, use the Network and Sharing center to enable Public folder sharing. Select Turn on sharing so anyone with network access can open, change, and create files.
Following are the steps an expert might take to complete this lab:
Enable Public Folder Sharing
1. Click Start, then Control Panel.
2. Click Network and Internet.
3. Click Network and Sharing Center.
4. Click the down button next to Public folder sharing, then select the option that turns Public Folder Sharing on or off.
5. Click Apply, then Continue.
************************************************************
You want to protect the files on your computer by doing routine backups.
Your task in this lab is to create an automatic backup schedule with the following settings:
• Use the DVD drive as the backup device.
• Back up the following types of files:
o E-mail
o Documents
o Compressed files
o Additional files
• Have the backup performed every Friday at 6 PM.
Save the settings and run the backup after you create the schedule
To complete this lab, use the Set up automatic file backup wizard to create a backup schedule with the following settings:
• Save the backup to the SONY9871 (D:) DVD drive
• Back up the following types of files:
o E-mail
o Documents
o Compressed files
o Additional files
• How often: = Weekly
• What day: = Friday
• What time: = 6:00 PM
To save the schedule and create the backup, click Save settings and start backup.
Following are the steps an expert might take to complete this lab:
Perform a Complete PC Backup
1. Select Start/All Programs/Accessories/System Tools, then click Backup Status and Configuration.
2. Click Set up automatic file backup. (Click Continue as necessary to proceed.)
3. Select the backup device, then click Next.
4. Select the types of files you wish to include in the backup, then click Next.
5. Select settings for the following:
o How often:
o What day:
o What time:
6. Click Save settings and start backup.
************************************************************
You have finished installing and configuring your Windows Vista Ultimate machine. Now you want to back it up in case something happens to it.
Your task in this lab is to back up your computer and all user data so you can use System Restore to recover if there is ever a problem. Save the backup to DVD discs.
To complete this lab, use the Complete PC Backup wizard. Use the SONY9871 (D:) DVD drive as the backup device.
Following are the steps an expert might take to complete this lab:
Perform a Complete PC Backup
1. Select Start/All Programs/Accessories/System Tools, then click Backup Status and Configuration.
2. Click Complete PC Backup, then click Create backup now. Click Continue as necessary to proceed.
3. Select the backup device, then click Next.
4. Click Start backup.
5. When the backup is complete, click Close.
************************************************************
You are preparing to install proprietary applications on a user's computer. Prior to performing the install, you want to set a system restore point. Your task in this lab is to create a system restore point called App Install RP.
To complete this lab, you must create a system report point called App Install RP.
Following are the steps an expert might take to complete this lab:
Create a System Restore Point
1. To create a restore point, click Start/Control Panel.
2. Click System and Maintenance.
3. Click Backup and Restore Center.
4. Click the Create a restore point or change settings link. (Click Continue as necessary to proceed.)
5. Click Create....
6. Enter a name for the restore point, then click Create.
7. Click OK to confirm the restore point creation.
************************************************************
You have just been hired in a new position. You have been given the laptop of the person who had the position previously. You want to modify the Power Plan settings to maximize performance and increase security.
Your task in this lab is to do the following:
• Set the computer to use the High Performance power plan.
• Modify the plan so that the display turns off after 5 minutes and the computer goes to sleep after 30 minutes while running on battery power.
• Modify the plan so that the computer never sleeps and the display never turns off when plugged in.
• Set the following power button behaviors:
o Hibernate the computer when on battery.
o Sleep when plugged in.
• Require a password when the computer returns from a sleep state.
To complete this lab, you must use the Power Options in the Control Panel to do the following:
• Select the High performance plan.
• Modify the plan so that when running on battery:
o Turn off the display: = 5 minutes
o Put the computer to sleep: = 30 minutes
• When plugged in:
o Turn off the display: = Never
o Put the computer to sleep: = Never
• Configure the power button to force the machine to
o Hibernate when running on battery.
o Sleep when plugged in.
• Set the configuration to Require a password when the computer returns from a sleep state.
Following are the steps an expert might take to complete this lab:
Choose a Power Plan
1. Click Start/Control Panel.
2. Click System and Maintenance.
3. Click Power Options.
4. Select a power plan.
5. If you wish, click Change plan settings to modify the plan.
6. Select the sleep and display settings for the computer to use.
7. Click Save changes.
Configure Power Button Behavior
1. Click Start/Control Panel.
2. Click System and Maintenance.
3. Click Power Options.
4. Select the Choose what the power button does link.
5. Under Power button settings, choose the action you wish to occur when you press the power button for both battery and plugged in conditions.
6. Click Save changes.
Configure Password Behavior
1. Click Start/Control Panel.
2. Click System and Maintenance.
3. Click Power Options.
4. Select the Require a password on wakeup link.
5. Click Change settings that are currently unavailable. (Click Continue as necessary to proceed.)
6. With the password options available, make the appropriate selection.
7. Click Save changes.
************************************************************
You are preparing your laptop for a presentation. You expect the machine to be plugged in during the presentation. However, while you prepare the presentation, you expect to run on battery power. You want to create a power plan to accommodate both conditions that won't interfere with your presentation if you cannot plug the machine into a power source.
Your task in this lab is to do the following:
• Create a custom power plan called Presentation based on the Balanced plan.
• When running on battery:
o Turn off the monitor after 1 hour.
o Put the computer to sleep after 2 hours.
o Turn off the hard disk after 15 minutes.
o Hibernate the computer when the low battery level is reached.
• When plugged in:
o Never turn off the monitor.
o Never go to sleep.
o Never turn off the hard disk.
o Shut down the computer when the low battery level is reached.
• Make the new power plan the current plan.
To complete this lab, you must use the Power Options in the Control Panel to create a custom power plan with the following settings:
• Use Balanced as the plan basis
• Enter Presentation as the plan name
• When running on battery:
o Turn off the display: = 1 hour
o Put the computer to sleep: = 2 hours
o Hard disk/Turn off hard disk after = 15 minutes
o Low battery action/On battery: = Hibernate
• When plugged in:
o Turn off the display: = Never
o Put the computer to sleep: = Never
o Hard disk/Turn off hard disk after = Never
o Low battery action/On battery: = Shut down
Following are the steps an expert might take to complete this lab:
Create a Power Plan
1. Click Start/Control Panel.
2. Click System and Maintenance.
3. Click Power Options.
4. In the left column, click Create a power plan.
5. Select the plan closest to the final settings you want, then enter a name for the plan and click Next.
6. Select the sleep and display settings for the computer to use.
7. Click Create.
Change Advanced Power Plan Settings
1. In Power Options, select a power plan, then click Change plan settings to modify the plan.
2. Click Change advanced power settings.
3. Expand the node for the advanced setting you wish to change, then configure the settings. Repeat as necessary for multiple options.
4. Click OK.
************************************************************
1. Change the default search engine in IE.
To change the default search engine:
1. Open Internet Explorer.
2. Click the drop down arrow beside the Live Search field.
3. You will see a window listing various search engines. Click the search engine you want as the default.
4. A window will appear asking if you want to add the search provider to Internet Explorer. Click the box beside the Make this my default search provider option.
5. Click Add Provider.
Start IE7 -> Click Down Arrow Next To Live Search -> Change Default Settings
2.Set up Dial Up connection with the given settings.
Control panel ->network center -> setup aconnection or network-> Setup A Dialup Connection -> THEN Configure Requested Options that will given to you
3.Import emails to Windows Mail from Outlook.
Start-> All Programs -> Windows Mail->File -> Import -> Messages
4.Backup files.
Start -> Control Panel ->System And Maintenance -> Backup and Restore Center -> Backup Files
5.Set up Remote Assistance in two computers: the one who invited and the one who accepted the invitation
HOST
Start -> Help And Support -> Windows Remote Assistance -> Invite Someone You Trust To Help You -> Use Email To Send An Invitation or Save This Invitation To A File
HELPER
Start -> Help And Support -> Windows Remote Assistance -> Offer To Help Someone -> Choose A Way To Connect To The Other Person’s Computer-> Browse For Invitation or Enter IP of Other Computer.
6.Set up Remote Desktop and add exception in Windows Firewall
Start -> Control Panel -> Network And Internet -> Windows Firewall -> Change Settings - > Exceptions Tab-> (Check ) Remote Desktop
7.Enable User Account Setting
Start -> Computer (Right Click) -> Manage -> Computer Management -> Local Users And Groups -> Users -> (Double Click Account) -> MembersOf Tab -> Add
8.Parental control (deny access to games and only allow navigation in pany´s site)
Start -> User Accounts And Family Safety -> Parental Control -> ( Click Account ) -> User Controls -> (click ) Parental Controls on, enforce current settings , (Click ) Windows Vista web Filter -> (check ) Only Allow Websites Which Are On The Allow List, (Click) Edit The Allow And Block List -> Enter Website Address
9.Defender (scan drive c: and manual scan)
Start -> All Programs -> Windows Defender -> (Click) Arrow Next To Scan -> Custom Scan -> (Select) Scan Selected Drives And Folders ->
(Click) Select –> (Check) Local Disk C
10.Setup VPN Connection With Given Userid , Password
Set Up A Connection or Network -> Connect To A Workplace -> (Click) Next
11.Configure Automatic Update For Saturday At 11 pm
Start -> Control Panel -> System Maintenance -> Windows Update ->
Change Settings ->
12. Protect your computer by User Account control
Control panel -> user account-> User -> turn user account on or off -> check on Use User Account Control(UAC) ->ok
13. Run the Windows Vista Upgrade Advisor
|a.| Click Start, point to All Programs, and then click Windows Vista Upgrade Advisor. |
|b.| In the Windows Vista Upgrade Advisor 1.0 window, click Start Scan. |
|c.| To view the results of the scan, click See Details in the Windows Vista Upgrade Advisor 1.0 window. |
|d.| Review any issues that are identified by the scan, and then resolve any issues that will prevent you from installing Windows Vista. |
14. Windows Calendar
Windows Calendar can be accessed from within Windows Mail by clicking Tools _ Windows Calendar. If Windows Mail is not open, you can access Windows Calendar by clicking Start _ All Programs _ Windows Calendar
| |
| |You can view your calendar by day, work week, week, or month. |
| | |
| |• |
| |Click the View menu, and then click the view you want. A check mark appears next to the view you select. |
| | |
Exam 70-620 Tips
One- Minute Test Tips #1
Know your Network and Wireless settings:
Vista supports three types of network categories: private, public, and domain.
Private networks are usually home or small office networks. The computers are members of a workgroup and are not connected directly to the internet but usually use a device such as a router to connect to the internet. By default, Vista turns on Network Discovery that enables you to see other computers and devices on your network and file and printer sharing.
Public networks are usually wireless "hot spot" connections in public places,where you are connected directly to the internet. By default, Vista turns off Network Discovery and file and printer sharing to make the computer more secure.
Domain networks applies to networks that are part of a corporate domain. By default, discovery and file sharing are allowed.
IPv4 32-bit addresses are expressed as four separate decimal values, such as 192.168.0.5
IPv6 128-bit addresses are expressed as eight 16-bit blocks separated by colons and in hexadecimal format, such as FEC0:0:0:02BC:FF:BECB:FE4F:961D
If you assign an IP address manually (IPv6) you must have a valid IP address, the subnet mask for this IP and a default gateway to use for internetwork communication.
Wireless adapters run in one of two modes:
Ad Hoc- adapter connected directly to other computers with wireless adapters
Infrastructure- adapter connects to an access point instead of directly
As a security precaution, some wireless networks are set up with the network namebroadcasting (SSID) disabled. This means that when you display the list of networks within range networks that don't broadcast their SSID don't appear in the list.
If you know that a network is within range but it doesn't appear in the list of available networks, you can still add the network manually. Click the Set Up a Connection or Network link, click Manually Connect to a Wireless Network, and then click Next. Use this dialog box to enter the network particulars, including the SSID (the Network Name), Security Type, Encryption Type, and Security Key (if required). Click Next to connect. Be aware of these options and choose accordingly:
Connect automatically when the network is in range
Connect even if the network is not broadcasting
Keep this connection active when the computer is on (recommended
****************************************************
One Minute Test Tips#2
More Wireless
Setting Up Per-User Wireless Network Connections
By default, when you set up a wireless connection, it is available to all users of your computer.
You can optionally make a connection available only to the user currently logged on.
To set this up:
1. In Network And Sharing Center, click Manage Wireless Networks.
2.Click Profile Types
3.Select Use All-User And Per-User Profiles.
When you set up a new wireless network, Vista asks whether you want the network to be available
to all users or only to yourself. You can’t apply this setting to an existing network. You must first
delete the network and then re-create the network .
Setting Up an Ad Hoc Network
An ad hoc network is a temporary network connecting two or more wireless computers
and devices without requiring a hub or wireless access point. The network adapters talk directly
with each other. An ad hoc network is handy when you need to exchange files or share an
internet connection with someone who is not part of your network.
To setup an aAd Hoc network:
1. Open Network And Sharing Center and in the Tasks list, click Set Up A Connection Or Network.
2. Select Set Up A Wireless Ad Hoc (Computer-to-Computer) Network and click Next.
On the next page, click Next.
3. Specify a network name..
4. Specify a security type. Ad hoc networks support only WEP encryption; the only
other option is an open, unsecured network.
5. If you selected WEP, enter a security key
6. If you plan to use the ad hoc network again in the future, select Save This Network
7. Click Next. If your computer is connected directly to the internet (through a network adapter other than the wireless adapter
you’re using for the ad hoc network) and you want to share the internet connection, click Turn On Internet Connection Sharing.
8. Click Close
The network is now set up and ready to use. Others can join the network by:
1. Clicking the network icon in the taskbar’s notification area
2. Click Connect To A Network (or Connect Or Disconnect if already connected to a wireless network).
3. Select the ad hoc network and click Connect.
4. If the ad hoc network is secured with WEP encryption, another box asks for the security key
5. Click Connect
**********************************************************
One-minute testing tips#3
Know your firewall, part 1
Windows Firewall is enabled by default for all connections. By default:
• The firewall drops all inbound traffic except traffic sent in response to a request by your computer, and traffic allowed by an exception.
• All outgoing traffic is allowed unless it matches an exception.
• Windows Firewall supports both incoming and outgoing network traffic.
Windows Firewall With Advanced Security console has more configuration options, and it can be configured remotely. Configuration of Internet Protocol Security (IPsec), which provides for authentication, encryption, and filtering of network traffic, is also done in the Windows Firewall. In Advanced Security console, firewall exceptions can be configured for services,
Windows Firewall maintains a separate profile (settings, rules and exceptions for various programs, services, and ports) for each of the network location types:
• Domain Used when your computer is joined to an Active Directory domain
• Private Used when your computer is connected to a Home or Work network in a workgroup
• Public Used when your computer is connected to a network in a public location,
Settings you make in the Windows Firewall Settings dialog box affect only the firewall profile for the network location you’re currently using. The settings in a profile apply to all networks (of the particular location type) to which you connect.
The only reason to turn off Windows Firewall is if you have installed another third-party firewall that you plan to use instead of Windows Firewall
One-minute testing tips #4
Know Your Firewall, part 2
When The Block All Incoming Connections check box on the General tab is selected, Windows Firewall rejects all unsolicited incoming traffic. including traffic that would be permitted by an exception. Use this mode when extra security against outside attack is needed (using a public wireless hotspot).
Windows Firewall monitors all network connections for unwanted traffic. In some situations, you might want to disable its protection for one or more connections while leaving it on for others. (For a device on your connection that won’t work with Windows Firewall).
1. In Windows Firewall, click the Advanced tab.
2. Clear the check box of each connection for which you want to disable Windows Firewall.
You may want to allow other computers to connect to your computer (to use Windows Meeting Space, play games, etc).For this you set up an exception in Windows Firewall, in the Exceptions tab. The list of programs and services that initially appears on the Exceptions tab depends on which services and programs are installed. To enable an exception, that’s already been defined, simply select its check box. You should clear the check box for all exceptions you don’t need. Exceptions are also created (but not enabled) when a program tries to set up an incoming connection. You can create an exception in any of three ways:
• Click Unblock when Windows Firewall blocks a program and asks if you want to keep blocking.
• Set up a program exception on the Exceptions tab in Windows Firewall.
• Open a port on the Exceptions tab in Windows Firewall.
Windows Firewall allows the exception only while the program is running, An exception created for a port you open is allowed whenever Windows itself is running, regardless of whether the program is actually running.
The first time you run a program that tries to set up an incoming connection, Windows Firewall asks for your permission by displaying a dialog box. If the answer to any of these questions is no. click Keep Blocking.
If you later find that a needed program isn’t working properly, you can open Windows Firewall Settings and enable the exception.
From the Exceptions tab, you can set up a program exception manually:
1. Click Add Program.
2. Select the program for which you want to allow incoming connections. Or click Browse and navigate to the program’s executable file if it isn’t shown in the Programs list.
3. Click Change Scope to display the dialog box and select the range of computers from which you want to allow incoming connections:
• Any Computer—any computer on your network or on the internet.
• My Network (Subnet)- allows inbound connections only from computers in the same subnet as yours
• Custom List lets you specify one or more computers by their IP address (on your local area network or on the internet.)
•
Another way to create an exception for an incoming connection is to open a port, if a program or a service you want to use needs to use a particular port.
1. In Windows Firewall, click the Exceptions tab.
2. Click Add Port.
3. In the Add A Port dialog box, make the following entries:
• Name box, type a descriptive name for the program or service.
• Port Number box, type the port number needed by the program or service. Select either TCP or UDP to match the protocol needed by the program or service.
4. Click Change Scope, select the range of computers from which you want to allow incoming connections.
**********************************************************
One-minute Vista Testing Tips #5
Know the UAC
Windows Vista has two types of user accounts:
• Standard user
• Administrator
Standard users can perform any general tasks and any support tasks that do not affect other users or the security of the computer. Administrators have complete access to the computer and can make changes that affect other users and the security of the computer.
Whether you are logged on as a standard user or an administrator, you see a User Account Control (UAC) prompt whenever you attempt to perform a task that requires administrator permissions. If you are logged on with a standard user account, you are prompted to provide administrator credentials. In a local PC, the prompt lists each local administrator account by name. To proceed, you must click an account, type the account's password, and then click OK. On a domain, the prompt shows the logon domain and requires the administrator account username and password , and then click OK. If you are already logged on with an administrator account, you are prompted for consent to continue.
The process of getting a user's approval prior to running an application in administrator mode and prior to performing actions which change system settings is known as elevation. Elevation enhances security by reducing the exposure to the operating system. It does this by providing notification when you are about to perform an action that could impact system settings, such as installing an application, and eliminating the ability for malicious programs to invoke administrator privileges without your knowledge and consent.
Windows Vista switches to a secure desktop prior to displaying the prompt. The purpose of switching to the secure desktop is to prevent other processes or applications from providing the required permissions or consent. All other running programs and processes continue to run, it is only the prompt itself that runs on the secure desktop.
You can disable User Account Control and all its related features on a per-account basis. Rather than completely disabling UAC, you can enable or disable individual features through policy settings. These policy settings are found under Security Settings\Local Policies\Security Options.
On a local computer, you can turn User Account Control on or off for your account:
1. Click Start, then click Control Panel.
2. Click the User Accounts heading, then click User Accounts again.
3. Click Turn User Account Control On Or Off.
4. You are prompted for permissions or consent.
5. To disable User Account Control, clear the Use User Account Control checkbox. To enable User Account Control, select the Use User Account Control checkbox. Click OK.
6. When prompted, click Restart Now or Restart Later. You will need to restart your computer for this change to take effect.
In a domain, you cannot turn User Account Control on or off, since these features will more than likely be secured so that they cannot be configured unless you are an administrator for the domain.
*credit to Paul Marquardt, and William R. Stanek , whose excellent article on I used
*******************************************************
One-minute testing tips #6
Control the UAC
You can customize the User Account Control by using group policies. Go to the Local Security Settings snap-in (press Windows logo +R, type secpol.msc, click OK). Open the Security Settings, Local Policies, security Options. Here you will find policies that control the UAC.
User Account Control: Behavior of the Elevation Prompt for Administrators in Admin Approval Mode
This policy controls the prompt that appears when an administrator requires elevated privileges. The default is Prompt for Consent, where the administrator clicks Continue or Cancel. You can choose the setting Prompt for Credentials to prompt the administrator to type their credentials. If you choose No Prompt, the administrator will not be prompted at all, preventing administrators from elevating their privileges. They can still right-click an application shortcut and select Run As Administrator, to enter credentials.
User Account Control: Behavior of the Elevation Prompt for Standard Users
This policy controls the prompt that appears when a standard user requires elevated privileges. The default is Prompt for Credentials, which require typing in of an administrator’s credentials. You can choose No Prompt to prevent standard users from elevating their privileges by supplying administrator credentials. They can still right-click an application shortcut and select Run As Administrator, to enter credentials.
User Account Control: Delete Application Installs and Prompt for Elevation
To enable or disable automatic privilege elevation while installing programs.
User Account Control: Only Elevate Executables That Are Signed and Validated
To enable or disable whether Vista checks the security signature of any program that asks for elevated privileges.
User Account Control: Run All Administrators in Admin Approval Mode Users
To enable or disable running administrators (except the Built-in Administrator account) as standard users.
**********************************************************
One-minute testing tips #7
New Features and Tools
Windows Easy Transfer is a wizard that helps you transfer your user accounts, personal files and folders, email messages, settings and contacts, program data files, media, and Windows and Internet settings from your old computer to your new machine. Programs (applications) are not transferred.
You can easily transfer your entire user account or all user accounts on the computer, or you can make custom selections of the data and folders to transfer. Windows Easy Transfer provides a number of ways for you to connect two computers to transfer your data.
Windows ReadyBoost
Adding system memory is often the best way to improve a PC’s performance. However, cost considerations and limited memory expansion capabilities, make it difficult to add RAM.
Windows Vista introduces Windows ReadyBoost, a new concept where you can use non-volatile flash memory, such as a USB flash drive, to improve performance without having to add additional memory to the systemboard. The flash memory device serves as an additional memory cache, memory that the computer can access much more quickly than it can access data on the hard drive. Windows ReadyBoost relies on the intelligent memory management of Windows SuperFetch and can significantly improve system response.
Using Windows ReadyBoost is easy. When a removable memory device is first inserted into a port, Windows Vista checks to see if its performance is fast enough to work with Windows ReadyBoost. If so, you are asked if you want to use this device to speed up system performance. You can choose to allocate part of a USB drive’s memory to speed up performance and use the remainder to store files. You can remove the memory device at any time while using Windows ReadyBoost without any loss of data or negative impact to the system; however, performance returns to the level experienced without the device. Finally, data on the storage device is encrypted to prevent inappropriate access.
RSS (Really Simple Syndication)
Web feeds allow you to avoid having to constantly check a news site or blog to find out if anything new has been posted. When you use Internet Explorer as a feed reader, you can subscribe to an RSS feed and allow the browser to download the feed on a schedule you set up. When a new post appears, the link for that site turns bold and clicking it shows the unread material in your browser window. To get started with RSS feeds, click the orange RSS icon on any webpage.
To view all feeds on your subscribed list, open the Feed list in Favorites Center. After you add a feed to your list of subscriptions, you can adjust its properties by right-clicking the feed name in the Favorites Center and choosing Properties. You can give the feed a new name (but you can’t change its URL). You can choose a different value from the Use Custom Schedule drop-down list to change the retrieval schedule for the feed from its default of once per day to a custom schedule of your choosing. To change the default retrieval schedule, click Settings and adjust the options. You can also control the number of items stored for each feed (1-2500, 200 is the default).
**********************************************************
Testing Tips# 8
Windows Sidebar
Windows Sidebar is a area on your desktop for mini-programs called gadgets . By default, Windows Sidebar is found on the right edge of your screen, but you can move it to the left or to a secondary monitor. You can make it rise above all other windows at all times , you can make it start automatically when Windows starts ( default ), and you can close and open it. You can also easily add or remove gadgets.
• There is a gadget gallery that comes with Windows but there is a link to a much larger online gallery. To add a gadget, right-click anywhere in the sidebar and choose Add Gadgets. The gadget gallery then pops up. To install a gadget, you can either just drag it to the sidebar or right-click it and choose Install. To remove a gadget, right-click it and choose Close Gadget.
• If Windows Sidebar is not currently open, you can open it by clicking the Start button and typing Sidebar in the Start menu’s Search box. Then click Windows Sidebar on the menu.
• To customize Windows Sidebar, right-click any part of the sidebar other than on a gadget, and choose Properties. There are severval options. You can select a checkbox if you want the Sidebar to be on top of any open windows rather than having windows on top of the Sidebar. Clear another check box if you don't want the Sidebar to start every time you start Windows. You can also specify on which side of your Desktop you want the Sidebar to be displayed.
• To close Windows Sidebar and hide all your gadgets, first drag any gadgets that lie outside
the sidebar back into the sidebar. (otherwise they remain open ) Then right-click Windows Sidebar and choose Close Sidebar. If you don't want to use the Sidebar at all, right-click the Sidebar icon, and choose Exit . If you want to use the Sidebar again, you'll need to start again it from the Start menu.
Laptop Presentations
If you have a laptop, Vista has two features designed to help with your presentation, Presentation Settings and External Display. In Presentation Settings, you can:
• Diasable Window’s popups and notifications
• Control the speaker volume
• Disable the screen saver
• Display a desktop background to reduce distraction or to display your logo
• Disable the automatic shutdown (sleeep)
To go to Presentation Settings, click Start>Control Panel>Mobile PC>Adjust Settings Before giving a Presentation.
If you use a certain projector or external monitor, you can tell Windows to use these presentation settings automatically whenever that display is connected. To do this, attach the monitor or projector, click Connected Displays and check “I always give a Presentation when I use This Display”, and save your prefered settings by clicking OK. Whenever you give a presentation with this equipment, open the Windows Mobility Center (Windows Key + X) or Start>All Programs>Accessories>Windows Mobility Center. Then in the Presentation Setting tile , click Turn On.
To use an external display, attach an external display or projector to your PC. Then go to the Windows Mobility Center,in the external display tile, click the Connect Display button. The New Display Detected box appears, which you can setup settings. The settings are:
• Duplicate my Desktop on all Displays- to display what you see on your laptop screen
• Show Different Parts of My Desktop on Each Display- to show your audience one thing while you view something else on your laptop screen. You can drag windows back and forth between the displays.
• Show My Desktop on the External screen Only- to blackout your laptop’s screen
************************************************
Testing Tips #9
Configuring Add-ons in Internet Explorer
IE allows you to install add-ons to extend the functions of the browser.
To install, enable or disable add-ons, you should expand the Tools toolbar option in IE and select Manage Add-ons. The Manage Add-ons menu contains two items: Enable or Disable Add-ons and Find More Add-ons. Add-ons can be installed by clicking Find More Add-ons and selecting the desired add-on from the list. The add-on will be downloaded and you can install the add-on. Once installed, you can enable or disable the add-on by accessing the Manage Add-ons menu and clicking Enable or Disable Add-ons. Any add-ons that are currently loaded in IE will be also be displayed.
The Show list of the Manage Add-ons dialog box provides several options for viewing and
managing add-ons installed in IE.
• Add-ons That Have Been Used by Internet Explorer -Displays a complete list of all the add-ons installed
• Add-ons Currently Loaded in Internet Explorer -Displays a list of add-ons used for the currently loaded Web page
• Add-ons That Run Without Requiring Permission-Displays a list of add-ons that have been preapproved by Microsoft
• Downloaded ActiveX Controls -Displays a list of ActiveX controls installed on the computer
Sometimes add-ons may cause the browser to become unstable or may interfere with other applications. To find out if add-ons are causing problems, IE provides the ability to load into “Add-ons Disable Mode” where only critical system add-ons are loaded. To load IE without loading any installed add-ons, you should click Start>All Programs> Accessories >System Tools>Internet Explorer (No Add-ons).
If you find that an add-on is causing IE to become unstable, you can use the Manage Add-ons dialog box to disable the add-on.
1. Open Internet Explorer> Tools> expand Manage Add-ons>click Enable or Disable Add-ons.
3. Select the “Add-ons That Have Been Used by Internet Explorer” to display a list of add-ons installed on your computer.
4. Select an add-on from the list, and click Disable, then click OK.
Configuring the Pop-up Blocker
Pop-up Blocker is a to prevent pop-ups from being displayed by web pages.
By default, Pop-up Blocker is enabled. When visiting a site that displays pop-ups, a message appears in the Information Bar indicating that a pop-up was blocked. You can disable Pop-up Blocker by opening IE>Tools>, expand Pop-up Blocker, and click Turn Off Pop-up Blocker. In the Pop-up Blocker dialog box, click Yes to disable Pop-up Blocker. Disabling Pop-up Blocker will allow any site to display pop-ups.
If you want to enable pop-ups for just select sites, add those sites to the Allowed Sites list of the Pop-up Blocker Settings instead of disabling Pop-up Blocker.
**********************************************************
Testing Tips#10
Know the Calendar
Windows Calendar is scheduling application where you can record appointments and tasks. The program supports iCalendar which lets you share your own schedule with others. You can e-mail specific appointment information or an entire calendar to someone else or publish your calendar to a website.You can also subscribe to public schedules which can be updated automatically at set schedules.
To share your entire calendar, select its name in the Calendars section> choose Share> Send Via E-Mail.
A message form in your e-mail program will appear, with an .ics file attached, which you then can email. The recipients will then be able to import the attachment into their calendar programs.
To publish a calendar to a website, select the calendar name in the Calendars section> choose Share> Publish. Supply a URL, select the check boxes to indicate the level of detail you want to include, and
then click Publish
**********************************************************
Test tips #11
Know you Meeting Space
Windows Meeting Space is a program for the sharing of documents, images, and desktops between as many as ten users in a peer-to-peer setting. Each of the meeting participants must be running Vista. The first time each user runs Meeting Space, he or she will be prompted to enable file replication and sign into People Near Me. These steps require administrative credentials.
You can either start a new meeting or join one in progress. If you choose to start a new meeting, you’ll be asked to name it and create a password that your attendees will have to use. By default, a meeting you create will be available to others on your network who have signed in to People Near Me and happen to be running Windows Meeting Space. If you prefer that your meeting not be available, click Options on the screen where you establish your meeting and select Do Not Allow People Near Me To See This Meeting.
After you have named the meeting and created the password, clicking the green arrow to the right of the Password box takes you to the meeting screen. You can use the Invite button on the command bar to let people know about the meeting. The Invite People dialog box lists everyone on your local network who has signed in to People Near Me. To invite someone who is not on this list, click Invite Others. This will
let you send invitations by e-mail or instant messaging.
To begin sharing programs or your desktop, click the Share button. Windows Meeting Space will display a list of your open programs and documents. You can then select the item you want to share (or select Desktop). If what you want to share isn’t on the list, you can click Browse For A File To Open And Share. If you initiate the sharing, you control the action. A banner across the top of your screen indicates that you are sharing, and a Give Control button in the upper right corner allows you to pass the control to another participant
To leave the meeting, choose Meeting> Leave Meeting or Meeting,>Exit. The meeting will still continue until all participants have left.
**********************************************************
Test Tips #12
Vista Deployments
If you have done deployments before you will be familiar with the use of images, network shares and the PE environment, if not, I will explain as we go along since Vista has new tools and processes for their Vista and Office deployments.
New Computer Installation
In a new computer installation, you will install Vista on new hardware, or install Vista on an existing computer, but not save any of the information currently on the computer. To do this you:
1. Modify the Vista image to add the necessary drivers and optional components.
2. Install this image on a test computer, and then add additional applications (i.e. Microsoft Office) and any additional configurations
3. Save the image onto a network share or removable medium (i.e. DVD)
4. Provide the medium to the user to install Windows Vista. You can also configure computers to automatically start using Windows PE and connect to the image in the network share to install Windows Vista
5. When the installation starts, the user is asked personalization questions and installation continues automatically. You can also use an answer file to perform a complete unattended installation.
If you are upgrading existing hardware to Windows Vista, you need to choose a new computer installation of Windows Vista when:
• No operating system exists on the computer.
• The installed operating system does not support an upgrade to Windows Vista.
• The computer has more than one partition and will support a multiple-boot configuration (Windows Vista and the current operating system).
Upgrade Computer Installation
In this scenario, all of the user settings and data will be preserved during the upgrade. The first three steps are the same. But in this scenario, the user is not asked any questions during the installation. Windows Vista Setup completes the installation by upgrading the user’s data, settings, and applications to the new Windows Vista desktop.
Windows Vista upgrades from Windows Vista, Microsoft Windows XP Professional, and Windows 2000 Professional, otherwise you need to choose a new computer installation.
Computer to Computer
To install Windows Vista on a new computer while still maintaining the user data and application settings from another computer, choose to use a computer-to-computer deployment.
1. Use the User State Migration Tool (USMT) to gather data and settings from the old computer and store the information on a network location or on removable media.
2. Create the installation image using the new computer deployment installation.
3. Use the installation image with the settings and data from the old computer to install Windows Vista on the new computer. The installation is unattended, and the user data and settings are maintained on the new computer
You can use the USMT when migrating from computers running Windows 2000 or newer. You can migrate settings to new computers running Windows XP or Windows Vista.
**********************************************************
Test tips#13
Windows Imaging Format
Most medium-to-large organizations use an image-based deployment to deploy desktop operating systems. Vista uses Windows Imaging Format, a new hardware-independent image-file format that contains the files and folders that duplicate a Vista installation on a disk.
Windows Imaging Format has the following features:
• WIM does not require that the destination hardware match the source hardware so you need only one image to address many different hardware configurations. In the past, you needed the PC hardware configuration to be the same as the machine the image was created from. If you had different hardware setups, a different image had to be created. With WIM, you can create WIM files and then add drivers for other machines and hardware.
• WIM lets you store multiple images within one file. Each image can be extracted to make individual images, or you can leave it as one file. You store images with and without applications in a single image file. You can make one of the images bootable, if you want, allowing you to start a computer from a disk image contained in a WIM file.
• WIM enables compression and single instancing, reducing the size of image files. Single instancing allows you to store two or more copies of a file for the space cost of one copy.
• WIM allows you to service an image offline therefore you can add or delete system components, patches, and drivers without creating a new image. This means that you can update an image in minutes and service the image offline.
• WIM lets you install a disk image on partitions of any size, unlike other image formats that require you to deploy an image to a partition that is the same size or larger than the source disk.
With prior imaging solutions, adding new hardware, language packs, updates, and drivers usually required creating new images. To address this issue, Vista is modularized so that the setup file that installs the operating system is composed of multiple components rather than a single file. Modularization allows you to:
• Add device drivers, service packs, and updates to the image file used to deploy Vista. You can add these offline without actually installing the image on a computer.
• Update individual component in the installation image without recreating the entire image.
• Deploy multiple language versions of Windows Vista with a single image file. Languages, including English, are optional components and can be added separately.
**********************************************************
Test Tips#14
Windows Vista is built and distributed as a single image with the WIM file format. You can customize Vista installations before you begin the actual installation and during the installation. You can modify the installation during the following phases:
1. During the Offline servicing phase when updates are applied to a Windows image, before deploying it to a computer. Offline servicing applies service packs, language packs, and other security updates to a Windows image.
2. During the Windows PE phase which is used to configure Microsoft Windows PE options and basic Windows Setup options. These options include specifying the disk configurations, selecting the specific image to install, and the product key to apply.
3. During the Online configuration phase (generalize/specialize passes), these passes apply settings to Vista during installation. The generalize pass is used to configure basic operating system components. The specialize pass applies system-specific information.
4. During the optional First boot phase (auditSystem/auditUser passes), this is run only if you start using audit mode. It is optional and runs only if you use Sysprep to start using audit mode. Audit mode is used to install additional device drivers or other applications that cannot be installed as part of the Setup. The auditSystem configuration pass processes settings before a user logs on to the system, and the auditUser configuration pass processes settings after a user logs on to the system.
5. Out of box experience (OOBE) phase (oobeSystem pass) applies settings to Windows before an end user logs on. During this pass, the user will accept the end-user license agreement (EULA), configure the computer name and user accounts, and configure network connectivity and regional settings. This pass is the only configuration pass exposed to an end user.
Check out Windows Vista Virtual Labs to start practicing
hxxp://technet/traincert/virtuallab/vista.mspx
Check out the Top On-Demand Webcasts to learn deployment,Imaging and using BDD
hxxp://events/series/technetvista.aspx? ab=webcasts
Check out Microsoft TechNet for Vista for Step-by-Steps guide and more
hxxp://technet.en-us/windowsvista/default.aspx
**********************************************************
Test tip#15
Planning a Vista deployment
1. The first step is to identify all applications that are currently in place.
2. After you have inventoried all of the applications, analyze the applications to see if they work on Vista. Microsoft has for download, the Application Compatibility Toolkit (5.0) to help you analyze the applications and migrate the applications to Windows Vista.
3. Decide for each application whether to migrate the application or make it Vista compatible, if they currently are no.
4. Determine what user settings and data to migrate. Windows Vista can move application settings, desktop settings, and data as part of an upgrade. Vista includes the User State Migration Tool (USMT) to assist you in migrating user-specific information
**********************************************************
Test tips #16
Vista implements User Account Protection, in which all users, including administrators, run in a limited user account. Administrators can run applications with their full privileges if they provide approval. This new security model means that some applications may not run on Vista. Microsoft has for download an Application Compatibility Toolkit (ACT) 5.0 which provides:
• The ACT Configuration Wizard, which guides you through the initial configuration of your ACT project, database, and log processing service.
• Data collection abilities that enable you to gather your compatibility status information and configure your compatibility evaluator settings and schedule from one central location.
• Data analysis that enable you to view compatibility reports for your applications, computers, devices, Web sites, and Microsoft Windows Updates, to filter your reports for specific data, and save and export your reports.
• Data organization abilities that enable you to categorize and prioritize your application inventory, to select your application compatibility assessments, and to track your deployment status.
It has Compatibility evaluators specific to Windows Vista:
--Inventory Collector
--Internet Explorer Compatibility Evaluator (IECE)
--User Account Control Compatibility Evaluator (UACCE)
--Update Compatibility Evaluator (UCE)
--Vista Compatibility Evaluator (VCE).
It contains a data collection components, the Application Compatibility Toolkit Data Collector (ACT-DC) that enable you to maintain your evaluator scheduling, collect your compatibility data, and upload the compatibility issue data to your ACT database.
It includes developer and tester tools:
--Internet Explorer Compatibility Test Tool --Setup Analysis Tool (SAT)
--Standard User Analyzer (SUA).
It also links you to the online ACT Community, where you can share your application compatibility testing information with other ACT Community members. Additionally, the ACT Community provides comprehensive compatibility assessment details including My Assessments, Community Assessments, and assessments from both Microsoft Corporation and the software or hardware vendor.
With ACT, you can:
• Analyze your portfolio of applications, Web sites, and computers.
• Evaluate operating system deployments, the impact of operating system updates, and your compatibility with Web sites.
• Centrally manage compatibility evaluators and configuration settings.
• Rationalize and organize applications, Web sites, and computers.
• Prioritize application compatibility with filtered reporting.
• Add and manage issues and solutions for your enterprise-computing environment.
• Deploy automated mitigations to known compatibility issues.
• Send and receive compatibility information from the Microsoft Compatibility Exchange
***For more specific information on ACT's components, use the search in to download the ACT 5.0 Product Evaluation Guide
**********************************************************
Test Tips#17
Know the User State Migration Tool
The User State Migration Tool (USMT) version 3.0 allows you to save and restore users’ settings (user accounts, desktop and application settings) and user files to minimize the time required to configure users’ computers after installing Vista. You can use it to perform unattended migrations and to migrate files and settings for computers with multiple users. You also have the ability to encrypt and compress the store. You can use it when migrating from computers running Windows 2000, or Windows XP. If you are performing an upgrade computer installation, you do not need to use USMT.
USMT includes two command-line tools:
• Running ScanState on the source computer collects and stores the user files and settings.
• Running LoadState on the destination computer restores these files and settings to the destination computer, using the store.
USMT 3.0 also has three default migration rule (.xml) files named MigApp.xml, MigUser.xml, and MigSys.xml. You can alter the default .xml files and you can also create customized .xml files. Depending on what you want to migrate, you can specify all or none of the default .xml files on the command line.
The .xml rules enable you to:
• Choose what to copy and what not to copy.
• Arbitrate conflicts between the source computer and destination computer.
• Change data and data locations.
• Emulate missing settings.
• Remove settings from the destination computer.
Windows Vista also provides an updated version of Files and Settings Transfer Wizard now called Windows Easy Transfer which provides a user interface to migrate user state from one computer to another.
I strongly recommend you check the Microsoft Windows Vista TechNet , hxxp://technet2.WindowsVista/en/library/91f62fc4-621f-4537-b311-1307df0105611033.mspx?mfr=true ,
To learn the step by step on using the USMT 3.0 Tool and further details on its components
**********************************************************
Test tips #18
The Windows Automated Installation Kit
The Windows Automated Installation Kit (WAIK) is designed to help original equipment manufacturers (OEM), system builders, and IT professionals deploy Windows onto new hardware. The WAIK includes deployment tools and documentation that describes the current methods, tools, and requirements for deploying Windows Vista:
• Windows Installation- is a collection of documents providing detailed information about how to deploy Windows Vista onto new hardware. This section is organized into five installation phases to help you build, deploy, and maintain your Windows Vista installations:
• Phase 1: Preinstallation Planning
• Phase 2: Preinstallation Preparation
• Phase 3: Preinstallation Customization
• Phase 4: Image Deployment
• Phase 5: Image Maintenance
• Deployment Tools Technical Reference-is a comprehensive technical discussion of the technologies used in the WAIK, including:
• Command-line tools.
• Windows Setup Technical Reference.
• Sysprep Technical Reference.
• XImage Technical Reference.
• Windows PE Technical Reference.
• Windows System Image Manager Technical Reference.
• Troubleshooting Installation Problems-is a collection of common problems and solutions.
• Glossary-is a collection of terms and definitions used in the WAIK.
Documentation included are the :
• Getting Started with the Windows Automated Installation Kit (Windows AIK), which provides instructions on building an end to end deployment.
• Windows Automated Installation Kit User's Guide (Waik.chm), which guides you through planning, preparing the environment, creating and customizing an image, capturing, modifying and testing the image and deploying, maintaining and servicing the image.
• Windows Preinstallation Environment (Windows PE) User's Guide (Winpe.chm), provides instructions on creating a customized version of Windows PE and Enabling PE to boot from different media.
• Unattended Windows Setup Reference (Unattend.chm), which provides coverage of all the customizable settings in the Unattend.xml file.
• Imaging APIs for Windows (Wimgapi.chm), provides coverage of all the Windows imaging APIs.
• Component Platform Interface (CPI) Reference (Cpiapi.chm), Documents the APIs used in Windows System Image Manager (Windows SIM).
**********************************************************
Test tips#19
Another tools to know:
Windows System Image Manager (WSIM) is a tool used to create and manage unattended Windows Setup, XML-based answer files. The answer files are used to customize and automate the installation of Windows Vista. You can create an answer file by using information from a Windows image (.wim) file and a catalog (.clg) file. The answer file is used during Windows Setup to apply the settings to the Windows installation. It does not modify the settings in a Windows image file itself.
Usually, an administrator creates a catalog file that contains the configurable settings in a Windows image. You can open this catalog in WSIM to view the settings for the image. You can then add these settings to your answer file. You can choose when to apply a specific setting during Windows Setup by adding that setting to a particular configuration pass.
An answer file is associated with a specific Windows image. New component settings, packages and or other updates can be added to a configuration pass in the answer file. Using WSIM, you can open the Windows Image (or catalog), open the existing answer file, and then make the changes you want to the answer file. WSIM will validate the settings in the answer file against the settings available in the Windows image or catalog.
You can also add additional third party applications, out- of- box device drivers, additional language packs, service packs and other updates that you want to be installed during Windows Setup by using Windows SIM.. By opening a distribution share, you can view the complete list of the available out-of-box device drivers and applications that you can add to an answer file. Typically, these out-of-box drivers are processed during the auditSystem configuration pass.
**********************************************************
Test tips#20
Office Migration Planning Manager (OMPM)
collection of tools that helps you prepare for migration to Office 2007.Included are:
-OMPM File Scanner (offscan.exe) is a command-line tool that scans files for conversion issues. The scan results are stored in XML log files on the computer it scans. The scanner does not scan documents that are password protected or IRM-protected. It also does not scan embedded objects within documents, but it does report that the document has embedded objects.
-Utilities that automate the creation of a new database (SQL 2000, 2005 or Express) and import the xml log files generated.
-there is a Access 2007 based reporting solution that provides reports for analysis and defines file sets for automated processing.
-Office File Converter (OFC) allows you to convert specific files to the new Office 2007 release file formats in bulk. All computers that contain files to convert are required by the OFC to install the Microsoft Office Compatibility Pack.
-Version Extraction Tool (VET) allows you to extract saved versions of a file in Word 2003 (or earlier) to different files.
**********************************************************
Test tips#21
Application Compatibility Tools
Microsoft Application Compatibility Toolkit (ACT) 5.0 is a tool that assists in identifying,analyzing, and managing your issues and solutions with your application portfolio,Web Sites, and computers. It evaluates deployments,the impact of updates as well as compatibility and migration issues.
Compatibility Administrator enables you to resolve potential application compatibility issues before deploying a new version of Windows. It provides compatibility fixes,and compatibility modes to resolve issues. It also allows you to create custom fixes,compatibility modes and compatibiity databases.
Windows Vista Hardware Assessment allows you to assess current PC readiness for Vista upgrades. It remotely connects to PCs on a network,assess hardware and device compatibility with Vista and create a report with assessment results and upgrade recommendations for each PC.
Windows Vista Upgrade Advisor is a downloadable Web application that helps Windows XP users identify which Vista edition meets their needs, whether the PC is ready for upgrade to Vista and which feature will run on their existing PCs.
**************************************************************
F.Y.I Category View
the View is a matter of preference for you BUT be aware that in Vista the Categories and their contents are different than what you are used to in XP. There are 10 categories in a desktop computer and 11 on a mobile computer. You also have Additional Options which only appears when you install some third party programws that add applets to the Control panel (Java, Quicktime). The Mobile PC category is not present on desktop computers.The new categories ( or new names) are:
Welcome Center - provides shortcuts for common tasks and some offers from MS
Backup and Restore Center-for file ackup and restore. Business and Ultimate editions also include Complete PC backup/restore for disaster recovery.
Indexing Options-to configure the searcha dn indexing feature
Problem Reports and Solutions - for reporting, getting help for problems from MS
Performandce Information and Tools- tips for improving performance and the Windows Experience score
Windows Defender-antispyware application
Parential Controls
Bitlocker Drive Encryption-found in Ultimate and Enterprise edition for encrypting a drive's contents
Network and Sharing Center-to configure settings and check network status
People Near Me- for use with Windows Collaboration
Sync Center- to synchronize with other PCs and devices
AutoPlay-configure autoplay
Personalization-adjust visual, display and sound settings
Windows Sideshow- to set up secondary displays
Pen and Input devices- for tablet and pen devices
Tablet PC settings- to calibrate Tablet PC/input devices
Windows Sidebar Properties-configure and install gadgets in Sidebar
Windows Mobility Center-configure settings for laptops and Tablet PCs
Windows Cardspace-create and configure Information Cards for logging in to password protected sites
Ease of Access Center-configure user interface for hearing impaired or limited vision users
Use what you like , just know where to find things.I get confused all the time but I'm getting used to it..I cheat by using the "Search" feature to find them.
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- personal financial management marine net pdf
- company net worth lookup
- comenity net dental first financing
- marine net financial management pdf
- amazon net sales 2017
- average net profit small business
- amazon net profit 2018
- marine net personal finance answers
- hong kong net scheme
- https www municipalonlinepayments
- business net worth lookup
- free net worth search