Learn your way! Get started

Configuring Windows Devices 70-697

with expert Patrick Loner


Course at a glance


Release date 7/15/2018
Level
Runtime 15h 4m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams N/A


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

This series describes how to configure Windows devices. Students will learn about what's new in Windows 10 and how to deploy it, configuring device settings, connecting Windows 10 to networks, sharing data and printers, managing apps, securing Windows 10 devices, monitoring and maintaining Windows 10, managing users in the enterprise, managing desktops and applications in the enterprise, and managing devices in the enterprise.

Prerequisites

There are no prerequisites.

Meet the expert

Patrick Loner has certifications for MCSA, MCSE, MCITP, A+, Network+, Security+, and more. He has been working as a Microsoft Certified Trainer, network administrator, and network consultant for over ten years. He has over a decade of experience working with and teaching about Windows networks with client and server operating systems. He has guided many students toward Microsoft and CompTIA certifications. Most recently, he has worked as a freelance trainer and network consultant specializing in Windows Server 2008 and Microsoft Exchange 2007 and Exchange 2010 implementations, design, and upgrades. Patrick continues to branch out now working with and training on Windows Server 2012, Windows 8, Exchange 2013, and System Center Configuration Manager 2012.

Course outline



Windows 10 Overview

What Makes Windows 10 Different (11:10)
  • Introduction (00:12)
  • Introduction (04:29)
  • What Makes Windows 10 Different? (06:20)
  • Summary (00:08)
Primary Feature Overview (14:27)
  • Introduction (00:08)
  • Introduction (07:54)
  • Primary Feature Overview (02:46)
  • New and Enhanced Features in Pro and Enterprise (03:30)
  • Summary (00:08)
Navigating Windows 10 (36:06)
  • Introduction (00:08)
  • Demo: Start Menu (06:36)
  • Demo: User Experience Enhancements (06:24)
  • Demo: Cortana (05:04)
  • Navigating and Using Windows 10 (03:38)
  • Demo: Settings App (04:48)
  • Changes to the Desktop (02:58)
  • Cortana (02:28)
  • Settings App (03:50)
  • Summary (00:08)

Standard Windows 10 Deployment

Preparing for Windows 10 Deployment (31:27)
  • Introduction (00:12)
  • Deploy the Operating System (01:32)
  • Prepare for Deployment (02:38)
  • Demo: Windows 10 Versions (03:52)
  • 32- and 64-Bit Versions (03:24)
  • Installation Requirements (05:18)
  • Compatibility (02:04)
  • Compatibility Center (02:39)
  • Application Compatibility Toolkit (02:27)
  • Demo: Windows Assessment and Deployment Kit (02:15)
  • Installation Options (00:54)
  • Installation Types (03:59)
  • Summary (00:08)
Standard Windows 10 Deployment (39:26)
  • Introduction (00:08)
  • Installation Options (01:42)
  • Overview of Image Based Deployment (01:09)
  • Windows to Go (02:34)
  • Boot to Native VHD (04:43)
  • Demo: Manual Installation (05:30)
  • Upgrading (03:00)
  • Upgrade Process (02:58)
  • Demo: In-Place Upgrade (04:46)
  • Migrating (02:53)
  • Migration Process (01:38)
  • Migration Tools (03:48)
  • Upgrade Failure (01:40)
  • Demo: Revert an Upgrade (02:42)
  • Summary (00:08)

Enterprise Deployment and Hyper-V

Image-Based Installation (30:16)
  • Introduction (00:08)
  • Enterprise Deployment Strategies (05:07)
  • Image Based Deployment Process (10:17)
  • Overview of Image-Based Deployment Continued (02:15)
  • Automating Installations (01:39)
  • Answer Files (02:29)
  • Reference Systems (01:37)
  • SYSPREP (03:21)
  • Demo: SYSPREP (03:11)
  • Summary (00:08)
Automation and Installation (22:37)
  • Introduction (00:08)
  • Windows PE (01:19)
  • Automating Installations (01:53)
  • DISM (03:17)
  • Demo: DISM (04:23)
  • Windows Activation (04:41)
  • Volume Activation Technologies (01:52)
  • KMS Activation (03:02)
  • Active Directory Based Activation (01:51)
  • Summary (00:08)
Introduction to Client Hyper-V (09:41)
  • Introduction (00:08)
  • Virtual Windows 10 Desktops (02:06)
  • Introduction to Client Hyper-V (02:13)
  • Demo: Client Hyper-V (05:05)
  • Summary (00:08)
Creating Virtual Machines (14:52)
  • Introduction (00:08)
  • Creating Virtual Machines (02:13)
  • Virtual Machine Components (02:53)
  • Import and Export Virtual Machines (00:39)
  • Demo: Create a Virtual Machine (04:01)
  • Demo: Virtual Machine Settings (04:47)
  • Summary (00:08)
Manage VM Storage and Snapshots (11:17)
  • Introduction (00:08)
  • Virtual Machine Storage (01:37)
  • VHD and VHDX (01:37)
  • Checkpoints (02:01)
  • Demo: Managing VHDs and Snapshots (04:12)
  • Summary (01:32)
  • Summary (00:08)

Configuring Windows 10

Overview of Configuration Tools (11:43)
  • Introduction (00:12)
  • Configure Device Settings (01:36)
  • Overview of Configuration Tools (02:50)
  • Demo: Management Tools (04:29)
  • Demo: PowerShell (02:27)
  • Summary (00:08)
Comon Configuration Options (17:45)
  • Introduction (00:08)
  • Finding Configuration Options (01:06)
  • System Options (01:56)
  • Devices Options (00:55)
  • Network and Internet Options (01:06)
  • Personalization Options (00:56)
  • Accounts Options (01:37)
  • Time and Language, Ease of Access, and Privacy (00:36)
  • More Configuration Options (00:51)
  • Demo: Settings App (04:20)
  • Demo: Settings App Continued (04:02)
  • Summary (00:08)
Managing User Accounts (20:16)
  • Introduction (00:08)
  • Managing User Accounts (02:53)
  • Creating Accounts (01:29)
  • Local Accounts (01:32)
  • Demo: Local Accounts (06:07)
  • Domain-Based User Accounts (02:41)
  • Joining the Domain (02:18)
  • Demo: Add Computer to Domain (02:57)
  • Summary (00:08)
Using Control Panel (07:26)
  • Introduction (00:08)
  • Control Panel (02:30)
  • Demo: Control Panel (04:39)
  • Summary (00:08)

Admin Tools and PowerShell

Using Admin Tools (28:34)
  • Introduction (00:08)
  • Admin Tools (01:30)
  • Microsoft Management Console (03:24)
  • Demo: Administrative Tools (04:23)
  • Remote Server Administrative Tools (01:07)
  • Demo: RSAT (03:37)
  • Remote Management (03:18)
  • Graphical Utilities (03:35)
  • Demo: Remote Assistance and Remote Desktop (03:18)
  • Demo: Remote Connections (04:01)
  • Summary (00:08)
Using PowerShell (43:13)
  • Introduction (00:08)
  • PowerShell (03:45)
  • Cmdlet Syntax (02:59)
  • Accessing with PowerShell (02:38)
  • Demo: PowerShell Basics (04:58)
  • Demo: Using Variables (04:57)
  • Demo: Filtering and Aliases (04:27)
  • Windows PowerShell ISE (02:08)
  • Demo: PowerShell ISE (05:10)
  • Remote Command Line Administration (01:05)
  • Remoting Types (01:23)
  • Native and Non-native Cmdlets (00:56)
  • ComputerName Parameter (01:05)
  • Demo: Remote Management (03:15)
  • Demo: Invoke Commands (04:03)
  • Summary (00:08)

Local Connectivity

TCP/IP Connectivity (37:25)
  • Introduction (00:12)
  • Network Connection (02:28)
  • TCP/IP Network Connectivity (05:36)
  • Local Area Networks (02:40)
  • IPv4 Fundamentals (04:14)
  • Demo: Subnet Masks (05:25)
  • IPv4 Configuration Tools (03:12)
  • Demo: Configure Network Connections (02:29)
  • IPv6 (04:19)
  • IPv6 Addresses (03:13)
  • IPv6 Address Types (02:21)
  • IPv6 Autoconfiguration (01:03)
  • Summary (00:08)
Name Resolution (10:35)
  • Introduction (00:08)
  • Name Resolution (02:28)
  • Ways to Resolve Names (04:29)
  • Demo: Name Resolution (03:21)
  • Summary (00:08)

Wireless Connectivity

Wireless Connectivity (21:13)
  • Introduction (00:08)
  • Wireless Connectivity (02:14)
  • Network Types (02:32)
  • Windows 10 Wireless Connectivity (02:45)
  • Wireless Security (03:54)
  • Additional Security Methods (03:08)
  • Wireless Components (02:06)
  • Manage Wi-Fi Settings (01:33)
  • Demo: Wireless Connectivity (02:42)
  • Summary (00:08)
Remote Access Overview (18:42)
  • Introduction (00:08)
  • Remote Connections (00:33)
  • VPNs (01:16)
  • VPN Connections (01:38)
  • Tunneling Protocols (01:54)
  • Tunneling Protocols Continued (02:26)
  • Demo: Connect to VPN (04:05)
  • Direct Access (02:01)
  • DirectAccess Continued (04:28)
  • Summary (00:08)
Troubleshoot Connectivity (22:25)
  • Introduction (00:08)
  • Connectivity Issues (02:01)
  • Troubleshooting Connectivity (02:26)
  • Demo: Troubleshoot Connectivity (05:51)
  • Demo: Pinging a Remote Network (04:43)
  • Demo: Troubleshoot Name Resolution (05:16)
  • Summary (01:49)
  • Summary (00:08)

Data Storage

Managing Hard Disks (35:13)
  • Introduction (00:12)
  • Sharing Data (01:56)
  • Partition Styles (02:40)
  • Disk Management Tools (01:40)
  • Demo: Disk Management Tools (04:01)
  • Initialize a Disk (01:39)
  • MBR Disks (01:17)
  • Volume Types (02:09)
  • RAID (02:09)
  • Mount Points and File System (01:24)
  • Resizing Volumes (01:10)
  • Demo: Disk Management (06:23)
  • Fragmentation (03:01)
  • Defragmentation (01:46)
  • Disk Quotas (01:34)
  • Virtual Hard Drives (01:02)
  • Creating Virtual Hard Drives (00:55)
  • Summary (00:08)
Manage Storage Spaces (06:27)
  • Introduction (00:08)
  • Storage Spaces (01:36)
  • Demo: Storage Spaces (04:34)
  • Summary (00:08)
Overview of Data Access (09:37)
  • Introduction (00:08)
  • Data Access (00:38)
  • Authetication and Authorization (02:31)
  • Authorization (01:03)
  • Network Models (03:58)
  • Homegroups (01:09)
  • Summary (00:08)

Sharing

Configure and Manage File Access (24:43)
  • Introduction (00:08)
  • Network Models (02:03)
  • NTFS Permissions (00:34)
  • Printer Installation (01:27)
  • Special Permissions (01:30)
  • NTFS Permissions Rules (04:48)
  • Configuring and Managing File Access (02:22)
  • Demo: Access Control Lists (01:39)
  • Demo: Inheritance (05:38)
  • Inheritance (02:41)
  • Compression (01:40)
  • Summary (00:08)
Manage Shared Folders (12:38)
  • Introduction (00:08)
  • Shared Folders (01:04)
  • Types of Sharing (03:01)
  • Sharing Methods (00:57)
  • Demo: Sharing Folders (04:27)
  • NTFS and Shared Folders (02:51)
  • Summary (00:08)
Understanding Work Folders (05:35)
  • Introduction (00:08)
  • Work Folders (01:42)
  • Work Folder Components (01:51)
  • Configure Work Folders (01:45)
  • Summary (00:08)
Managing Printers (14:30)
  • Introduction (00:08)
  • Printers (04:52)
  • Printer Permissions (01:01)
  • Printer Management (01:14)
  • Demo: Manage Printers (05:00)
  • Summary (02:06)
  • Summary (00:08)

Applications and Local Security

Install and Configure Applications (06:30)
  • Introduction (00:12)
  • Applications (01:18)
  • Install Applications (03:03)
  • Configure Applications (01:48)
  • Summary (00:08)
Manage Apps from the Windows Store (05:37)
  • Introduction (00:08)
  • Modern Apps (02:59)
  • Administrator Control (02:21)
  • Summary (00:08)
Manage Web Browsers (20:42)
  • Introduction (00:08)
  • Web Browsers (04:16)
  • Microsoft Edge (00:48)
  • Demo: Microsoft Edge (04:57)
  • Demo: Microsoft Edge Continued (04:08)
  • Internet Explorer 11 (01:23)
  • Privacy Features (02:03)
  • Security Features (01:34)
  • Summary (01:13)
  • Summary (00:08)
Security Overview (08:10)
  • Introduction (00:08)
  • Security (02:01)
  • Defense in Depth (03:41)
  • Possible Security Scenarios (02:10)
  • Summary (00:08)
Configure Local Security (19:49)
  • Introduction (00:08)
  • Local Security (01:24)
  • UAC (02:34)
  • Security Prompt (01:33)
  • UAC Notifications (02:27)
  • Demo: Local Security (04:35)
  • Malware (01:54)
  • Windows Defender (02:26)
  • Demo: Windows Defender (02:36)
  • Summary (00:08)

Network and Data Security

Securing Network Communications (31:08)
  • Introduction (00:08)
  • Network Security (04:04)
  • Network Security Configuration (02:12)
  • Network Profiles (01:00)
  • Demo: Configure Windows Firewall (06:14)
  • IPSec (04:15)
  • IPSec Protocols (03:08)
  • Tools to Configure IPSec (02:14)
  • IPSec Authentication (02:27)
  • Monitor Connection Security Rules (00:58)
  • Demo: IPSec (04:14)
  • Summary (00:08)
Configure Data Security (26:33)
  • Introduction (00:08)
  • Data Security (04:09)
  • EFS (03:07)
  • Encryption Process (04:06)
  • Additional EFS Options (01:24)
  • BitLocker (02:22)
  • BitLocker ToGo (01:38)
  • BitLocker Modes (02:46)
  • Demo: BitLocker (05:08)
  • Summary (01:32)
  • Summary (00:08)

Updates and Monitoring

Working with Updates (05:21)
  • Introduction (00:12)
  • Updates (01:33)
  • Manage Updates (01:13)
  • Configure Updates with GPOs (02:14)
  • Summary (00:08)
Monitoring and Optimizing (35:44)
  • Introduction (00:08)
  • System Performance (03:03)
  • Performance Monitor (03:01)
  • Resource Monitor (01:10)
  • Demo: Task Manager and Resource Monitor (04:40)
  • Demo: Performance Monitor (05:41)
  • Reliability (01:24)
  • Troubleshoot Reliability (02:36)
  • Demo: Reliability Monitoring Controls (04:15)
  • Event Viewer (02:56)
  • Demo: Event Viewer (03:27)
  • Demo: Event Viewer Continued (03:08)
  • Summary (00:08)
Managing Device Drivers (14:15)
  • Introduction (00:08)
  • Device Drivers (01:40)
  • Plug and Play (02:19)
  • Management Tools (01:29)
  • Driver Updates (02:05)
  • Driver Privileges (01:08)
  • Demo: Manage Device Drivers (05:15)
  • Summary (00:08)

User Profiles

Recovering Files and Devices (19:05)
  • Introduction (00:08)
  • File History (01:43)
  • Windows Backup Utility (02:41)
  • Demo: FIle History (03:15)
  • Startup Files and Process (02:41)
  • Step by Step (01:09)
  • Windows Recovery Environment (01:40)
  • System Restore and msconfig (01:37)
  • Advanced Boot Options (02:26)
  • Summary (01:34)
  • Summary (00:08)
Manage User Profiles (18:50)
  • Introduction (00:08)
  • User Profiles (01:27)
  • Types of Profiles (03:14)
  • Folder Redirection (03:44)
  • Primary Computer Setting (01:48)
  • Demo: Manage User Data (02:39)
  • Demo: Manage Profiles in Active Directory (05:38)
  • Summary (00:08)
User State Virtualization (09:06)
  • Introduction (00:08)
  • User State Virtualization (02:12)
  • UE-V Components (01:25)
  • Synchronization Process (01:03)
  • Prepare the Environment (02:40)
  • Deploy UE-V (01:28)
  • Summary (00:08)
User Profile Migration (12:17)
  • Introduction (00:08)
  • User Profile Migration (01:08)
  • USMT Tools (01:06)
  • USMT Process (01:09)
  • Features (02:24)
  • Components (01:24)
  • The config.xml File (00:44)
  • Scanstate (01:50)
  • Loadstate (00:56)
  • Summary (01:16)
  • Summary (00:08)

Group Policy and Intune

Group Policy on Windows 10 Devices (40:00)
  • Introduction (00:12)
  • Group Policy (01:18)
  • Types of Policies (03:51)
  • Policy Settings (02:08)
  • Demo: Group Policy (04:07)
  • Demo: Group Policy Preferences (03:17)
  • Local Computer Policies (01:48)
  • Group Policy Objects (03:00)
  • Order of Precedence (03:31)
  • Link GPO to Container (05:39)
  • GPO Management (01:28)
  • Troubleshooting (01:28)
  • Demo: Troubleshooting GPOs (03:30)
  • Demo: Troubleshooting GPOs Continued (04:28)
  • Summary (00:08)
Manage Apps with Group Policy (19:16)
  • Introduction (00:08)
  • Manage Apps with Group Policy (01:16)
  • AppLocker Rules (01:50)
  • Default Rules (02:02)
  • Software Restriction Policies (01:47)
  • Demo: Manage Apps (06:42)
  • Distribute Software with Group Policy (02:31)
  • Software Distribution Process (01:40)
  • Summary (01:08)
  • Summary (00:08)
Enterprise Mobility Suite (26:48)
  • Introduction (00:08)
  • Enterprise Mobility Suite (02:19)
  • Requirements (02:21)
  • Azure Active Directory Premium (02:35)
  • Windows 10 Integration and RMS (04:42)
  • Azure RMS (00:40)
  • Intune (03:02)
  • Sign up for Intune (01:01)
  • Intune Management Portals (01:31)
  • Demo: Sign up for Intune (03:54)
  • Demo: Managing InTune (04:22)
  • Summary (00:08)
Manage Desktops and Mobile Clients (07:00)
  • Introduction (00:08)
  • Install Client Software (01:13)
  • The Intune Client (01:08)
  • Deploy the Intune Client (01:11)
  • Intune Policies (01:30)
  • Mobile Devices (01:40)
  • Summary (00:08)
Manage Updates and Endpoint Protection (04:34)
  • Introduction (00:08)
  • Updates (01:23)
  • Apply Updates (01:28)
  • Endpoint Protection (01:26)
  • Summary (00:08)
Manage Applications (04:44)
  • Introduction (00:08)
  • Manage Applications (00:48)
  • Installer Types (01:08)
  • Application Deployment Process (00:50)
  • Summary (01:40)
  • Summary (00:08)