ITE7 Chapter 11: Windows Configuration PDF

Summary

This document provides an overview of Windows configuration topics. It covers sections on Windows Desktop and File Explorer, configuring Windows with Control Panels, System Administration, Command-Line Tools, Windows Networking and more. The topics are suitable for professional IT training.

Full Transcript

Chapter 11: Windows Configuration IT Essentials v7.0 Chapter 11 - Sections & Objectives 11.1 Windows Desktop and File Explorer  Configure the Windows Desktop and File Explorer Compare versions of Windows 7, 8, 8.1, and 10. Use features of the Windows desktop. Use Windows Tas...

Chapter 11: Windows Configuration IT Essentials v7.0 Chapter 11 - Sections & Objectives 11.1 Windows Desktop and File Explorer  Configure the Windows Desktop and File Explorer Compare versions of Windows 7, 8, 8.1, and 10. Use features of the Windows desktop. Use Windows Task Manager to manage running processes and services. Use File Explorer to manage files, folders, and applications. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Chapter 11 - Sections & Objectives (Cont.) 11.2 Configure Windows with Control Panels  Configure Windows using Control Panels Use Microsoft Windows control panel utilities. Configure user accounts with control panels. Configure internet and network connectivity using control panels. Configure Windows display settings. Use System and Power Options control panels. Use hardware and sound control panels. Use the clock, region, and language control panels or settings to configure a computer for a location. Use the Programs and Features control panel to manage Windows software. Explain how the Windows troubleshooting control panel to investigate system issues. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Chapter 11 - Sections & Objectives (Cont.) 11.3 System Administration  Use Windows tools and utilities to manage Windows systems. Manage system resources with Microsoft Windows utilities. Use Microsoft Windows utilities to manage system operation. Manage system volume storage with Microsoft Windows utilities. Manage software applications. 11.4 Command-Line Tools  Use Microsoft Windows command line tools.. Use the Windows command window CLI. Use file system CLI commands to work with the Windows file system. Use disk CLI commands to work with Windows disks. Use task and system CLI commands to control Windows operation. Use other CLI commands to accomplish Windows tasks. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Chapter 11 - Sections & Objectives (Cont.) 11.5 Windows Networking  Configure a Windows computer to work on a network. Configure a Windows computer to share resources on a network. Configure local resources to be shared with other network users. Configure wired network interfaces in Windows. Configure wireless network interfaces in Windows. Use Windows applications to access remote computers. Use remote Windows Remote Desktop and Remote Assistance to work with remote computers. 11.6 Common Preventive Maintenance Techniques for Operating Systems  Use common preventive maintenance techniques for Microsoft Windows operating systems. Perform preventive maintenance on a computer using Microsoft Windows tools. Perform system restore procedures. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Chapter 11 - Sections & Objectives (Cont.) 11.7 Basic Troubleshooting Process for Windows Operating Systems  Troubleshoot Microsoft Windows operating systems. Explain the six steps of troubleshooting a Microsoft Windows operating system. Describe common problems and solutions related to Microsoft Windows operating systems. Troubleshoot advanced Windows operating systems problems. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 11.1 Windows Desktop and File Explorer © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Comparing Windows Versions Windows Versions  Since 1985 there have been over 25 versions of Windows.  Windows comes in 32-bit or 64 bit editions.  In the case of Windows 10, twelve editions were developed and released, however, only nine are currently offered. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Comparing Windows Versions Windows 7  Released in October 2009, Windows 7 was quite successful.  Offered improvements to the interface, performance, and File Explorer, including the first appearance of Libraries and HomeGroup file sharing.  Microsoft offers extended support for Windows 7 until January of 2020. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Comparing Windows Versions Windows 8  Released in October 2012, Windows 8 included a major revision in the Windows interface.  Windows 8 was designed to be more compatible with touch screen, tablets and mobile devices.  The interface changes were unpopular and made it difficult for some users to learn. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Comparing Windows Versions Windows 8.1  Windows 8.1 was released one year after Windows 8 in October 2013.  Windows 8.1 included a Start screen familiar to users, and a full Start menu button in the taskbar.  It included new functionalities and easier configuration options for the desktop GUI interface. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Comparing Windows Versions Windows 10  Windows 10 offers a return to a desktop-oriented interface.  Windows 10 supports universal apps that run on desktop and mobile devices.  Windows 10 introduced the Microsoft Edge web browser.  Charms were replaced with the Windows Action Center with notifications and quick settings.  New update model with feature updates twice yearly and quality or cumulative updates monthly. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 The Windows Desktop The Windows 7 Desktop  Windows 7 has a default theme named Aero.  Windows 7 Versions and above have the following features: Shake – minimize all windows not being used by clicking and shaking the window. Peek - View the desktop icons that are behind open windows by placing your cursor over the Show desktop button found at the right edge of the taskbar. Snap - Resize a window by dragging it to one of the edges of the screen. Note: Microsoft has retired the Gadgets  Users can place Gadgets on the desktop. Gadgets feature in versions following Windows 7 are small applications, such as games, sticky notes, because of security concerns. a calendar, or a clock. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 The Windows Desktop The Windows 8 Desktop Windows 8 desktop included:  Tiles on the Start screen  Desktop optimized for mobile devices  Revised task manager  Ribbon menu on the File Explorer  Windows Defender native antivirus  Charms bar of five icons, accessed by placing the cursor in the upper-right corner of the screen or swiping your finger in from the right side of the screen on a touchscreen © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 The Windows Desktop The Windows 8.1 Desktop The Windows 8.1 desktop interface includes:  Taskbar  Start button  Pinned program icons Clicking the Start button displays the Start screen that is very similar to the Windows 8 Start screen. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 The Windows Desktop Personalizing the Windows Desktop  Themes - fastest way to change the look and feel of the Windows GUI  Apps Environment - desktop start screen Tiles - click and drag the tiles to rearrange them. Start screen - right-click the desired Windows app and select Pin to Start. Search - start typing the name of the app to auto search.  Personalization Window - you can change the desktop appearance, display settings, and sound settings © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 The Windows Desktop Video Explanation – The Windows 10 Desktop © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 The Windows Desktop Tiles for Apps arranged by category, such as The Windows 10 Start Menu games, creative software, etc. Applications in alphabetical order, including most used and recently installed Shortcuts to common libraries, including settings and shutdown buttons © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 The Windows Desktop The Windows 8.1 and 8.0 Start Menu  Windows 8 Start screen and Apps screen  Windows 8.1 Limited Start Menu © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 The Windows Desktop The Windows 7 Start Menu  The Start Menu displays: All of the applications installed on the computer A list of recently opened documents A list of other elements, such as the search feature, Help and Support, and Control Panel  To customize the Start Menu in Windows 7 right-click an empty section of the taskbar and choose Properties > Start Menu > Customize © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 The Windows Desktop The Taskbar  The Start Menu displays: All of the applications installed on the computer A list of recently opened documents A list of other elements, such as the search feature, Help and Support, and Control Panel  To customize the Start Menu in Windows 7, right-click an empty section of the taskbar and choose Properties > Start Menu > Customize © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 The Windows Desktop Lab – Configure the Windows Desktop In this lab, you will explore the Windows Desktop, Start Menu, and Taskbar. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Windows Task Manager Video Explanation – Working with Task Manager in Windows 10 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Windows Task Manager Windows Task Manager Functions Processes – a set of instructions started by the user, a program, or the OS. Performance – dynamic system performance graphs for a variety of options, including CPU, Memory, Disk, Ethernet, etc. App History – displays historical resource utilization such as CPU time, network data usage, data uploads and downloads. Startup – shows the processes that automatically begin during Windows startup. Users – shows who is currently connected to the PC and the system resources they are using. Details – makes is possible to change the level of COU priority for a given process. Services – shows all available services and their status. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Windows Task Manager  Windows 7 Task Manager has six tabs: Task Manager in Windows 7 Applications – shows all running applications. You can create, switch to, or close any applications. Processes - this tab shows all running processes. You can end processes or set process priorities. Services - available services, including their operational status. Services identified by their PID. Performance - This tab shows the CPU and page file usage Networking - This tab shows the usage of all network adapters Users - This tab shows all users that are logged on the computer  Task Manager Differences in Windows 10: Applications and Processes tabs have been combined in Windows 10. Networking tab is included with the Performance tab in Windows 10. Users tab has been enhanced in Windows 10 to not only show the users that are connected but also the resources that they are using. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Windows Task Manager Lab – Work with Task Manager In this lab, you will use Task Manager to monitor system performance. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Windows File Explorer File Explorer  File Explorer is used for file management in Window 8 and Windows 10.  Windows Explorer is used for file management in Windows 7 and earlier.  The Ribbon is used for common tasks, such as copying and moving files and creating new folders.  The Tabs at the top change based on what is selected.  File Explorer is used to: Navigate the file system Manage files, folders and subfolders Manage applications on storage media Preview some types of files © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Windows File Explorer Video Explanation – Working with File Explorer © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Windows File Explorer This PC  In Windows 10 and 8.1, the This PC feature allows you to access the various devices and drives installed in the computer.  In Windows 7, this same feature is called Computer.  To open This PC, open File Explorer, and it will display the This PC feature by default.  In Windows 8.0, or 7, click Start and select Computer. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Windows File Explorer Run as Administrator  Modern operating systems improve security by only allowing users with enough permissions to access files.  System files, other user files, or files with elevated permissions are examples of files that could lead Windows to deny access to a user.  To override this behavior and gain access to those files, you must open or execute them as the system administrator.  To open or execute a file using elevated permission, right-click the file and choose Run as Administrator as shown in the figure. Choose Yes in the User Account Control (UAC) window. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Windows File Explorer Windows Libraries  Windows Libraries allow you to easily organize content including removable media, without actually moving the files.  A library is a virtual folder that presents content from different locations within the same view.  When Windows 10 is installed, each user has six default libraries, as shown in the figure.  In Windows 10 and Windows 8.1, the libraries are hidden by default.  Right-click the left pane of the File Explorer window for the context menu option that can show the libraries. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Windows File Explorer Directory Structures  The root level of the Windows directory structure, the partition, is usually labeled drive C.  Directories may contain additional directories called subfolders.  The number of nested folders is limited by the maximum length of the path to the folders.  In Windows 10, the default limit is 260 characters.  The figure shows several nested folders in File Explorer along with the equivalent path. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 Windows File Explorer User and System File Locations Users Folder – Windows stores more of the files created by users in the Users Folder, C:\Users\User_name\. System Folder – Most files used to run a Windows OS computer are found in the folder C:\\Windows\system32. Program Files – This folder is used by most application installation programs to install software. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 Windows File Explorer File Extensions  Files adhere to the Windows naming convention: A maximum of 255 characters is allowed Characters such as a slash or a backslash (/ \) are not allowed An extension of three or four letters is added to the filename to identify the file type Filenames are not case sensitive By default, file extensions are hidden In Windows 10 and Windows 8.1 in the File Explorer ribbon, click the View tab. Then click to check File name extensions. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 Windows File Explorer File Attributes  These are the most common file attributes: R - The file is read-only. A - The file will be archived the next time that the disk is backed up. S - The file is marked as a system file, and a warning is given if an attempt is made to delete or modify the file. H - The file is hidden in the directory display. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 Windows File Explorer Video Explanation – Application, File, and Folder Properties © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Windows File Explorer Lab – Working with File Explorer In this lab, you will explore and use the File Explorer (Windows Explorer) to navigate the Windows file system. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 11.2 Configure Windows with Control Panels © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 Control Panel Utilities Windows 10: Settings and Control Panels  Windows 10 offers two ways to configure the operating system The Settings app The Control Panel © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 Control Panel Utilities Introduction to Control Panel  System Admins prefer the Control Panel to the Settings App.  To start the Control Panel, type Control Panel into the Search box and click the Control Panel Desktop app that appears in the results.  If you right-click on the result, you can pin it to the Start menu to make it easier to find.  You can also open it from the Command Prompt by typing control. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 Control Panel Utilities Control Panel Views  The Windows 10 Control Panel opens to the Categories view by default  Both views also provide a search box which will return a list of Control Panel items Category View Small Icons View © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 Control Panel Utilities Define Control Panel Categories System and Security – View and configure security settings such as Windows Defender Firewall. Network and Internet - Configure, verify, and troubleshoot networking and file sharing. Hardware and Sound - Configure devices such as printers, media devices, power, and mobility. Programs – Change installed programs and Windows updates, including removal. User Accounts – Administer Windows user accounts and user account control (UAC). Ease of Access - Access options that make Windows easier to use, especially for people who require accommodations for physical or perceptual challenges. Clock and Region – Configure time and date settings and formats. Appearance and Personalization – Configure taskbar and navigation, file explorer, and available fonts. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 Control Panel Utilities Lab – Explore Control Panel Categories In this lab, you will investigate the options provided in the various commonly used Control Panel items. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 User and Account Control Panel Items  The User Accounts Control Panel provides User Accounts options to help you create, change, and delete user accounts.  An administrative account is created when Windows is installed.  To create a user account, open the User Accounts Control Panel.  Standard user accounts can manage most configuration settings that don't affect other users.  Standard user accounts can only access their own files and folders.  Some features of the User Accounts utility require administrative privileges and will not be accessible with a standard user account. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 User and Account Control Panel Items User Account Control Settings  The User Account Control (UAC) monitors programs on the computer and warns users when an action might present a threat to the computer.  In Windows versions 7 through 10, you can adjust the level of monitoring that the UAC performs.  The default UAC setting for the primary account is "Notify me only when programs try to make changes to my computer“.  Adjust the UAC level to change when you are notified about changes that programs may make to your computer. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45 User and Account Control Panel Items Lab – User Accounts In this lab, you will work with User Accounts Control Panel item create and modify users. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46 User and Account Control Panel Items Credential Manager  Credential Manager helps you to manage passwords that are used for websites and Windows applications.  These passwords and usernames are stored in a secure location.  You can view, add, edit, or delete the credentials that are stored by Credential Manager.  Web credentials are not saved for sites accessed by browsers other than Internet Explorer and Edge. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47 User and Account Control Panel Items Sync Center  Sync Center allows files to be edited from multiple Windows devices.  Sync Center allows a form of version control.  Using Sync Center requires activation of the Offline Files feature. This sets up a local file location that will store the files to be synchronized. It also requires you to set up a sync partnership with the networked file location.  Files can be synchronized manually and synchronization can also be scheduled to occur automatically.  Microsoft OneDrive offers a similar service. OneDrive is a cloud storage service that is available to Microsoft Windows users. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48 Network and Internet Control Panels Network Settings  The Network Status app in Windows 10 combines many different functions into one high-level app.  The Network Status App links to various other Settings App screens.  It also links to Control Panel items like the Network and Sharing Center.  Some of the options, such as Airplane Mode, Mobile Hotspot, and Data Usage are more relevant to mobile devices than to desktop computers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49 Network and Internet Control Panels Internet Options  General Tab  Security Tab  Privacy Tab © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50 Network and Internet Control Panels Internet Options (Cont.)  Content Tab  Connections Tab  Programs Tab © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 Network and Internet Control Panels Internet Options (Cont.)  Advanced Tab © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52 Network and Internet Control Panels Network and Sharing Center  Network and Sharing Center allows an administrator to configure and review nearly all network settings on a Windows computer.  View network status and internet connectivity.  Change properties of protocols and services running on a network adapter.  Configure file and device sharing through the use of network profiles.  Network profiles enable basic sharing settings to change depending on whether it is a private or public network. This enables sharing to be inactive on an insecure public network but active Windows 10 on a private secure network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 Network and Internet Control Panels  They are intended to make networking in the HomeGroup home easier by requiring a minimum of configuration.  You can share your library folders on the network, making it easy for other devices to access your music, videos, photos, and documents.  Users will need the homegroup password in order to join the homegroup and access shared resources..  Homegroups were used in Windows 7 and 8 but Microsoft has been phasing out the homegroup functionality.  In Windows 8.1 homegroups cannot be created, however Windows 8.1 computers can join existing home groups.  Homegroups simplify sharing files on simple  In newer versions of Windows 10 (version 1803 networks. and higher), home group functionality is not available. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 Network and Internet Control Panels Lab – Configure Browser Settings In this lab, you will configure browser settings in Microsoft Internet Explorer. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55 Display Settings and Control Panel Display Settings and Configuration  The Windows 10 display settings are reached by right-clicking an empty area of the desktop and selecting Display settings from the context menu.  Change the appearance of the desktop by modifying the resolution that is output by the graphics adapter.  If the screen resolution is not set properly, you might get unexpected display results from different video cards and monitors.  You can also change the magnification of the desktop and text size in Windows interface elements. Display Settings in Windows 10 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56 Display Settings and Control Panel  Windows 8 and 7 Display control panel item: Display Features  Display - configure multiple monitors  Screen resolution - number of pixels horizontally and vertically. Higher numbers provides better resolution, 1920 x 1080 for example  Orientation - This determines whether the display appears in Landscape, Portrait, flipped Landscape, or flipped Portrait orientation  Refresh rate - how often the screen image is redrawn expressed in Hertz (Hz). The higher the refresh rate, the steadier the screen image appears  Display colors - The higher the bit depth, the greater the number of colors.  Multiple displays - two or more monitors attached to the same computer. The desktop can be extended to make one large display, or mirrored, with the same image shown on all displays © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57 Power and System Control Panels Power Options  Power Options Control Panel allows you to change the power consumption of certain devices or the entire computer.  Use Power Options to maximize battery performance or conserve energy by configuring a power plan.  One important difference from Windows 7 and 8 is that the setting that requires a password when the computer wakes has been moved from Power Options to User Accounts in Windows 10. This is an important setting for data security.  Windows has preset power plans. Use the default settings or create your own customized plans. Power Options Control Panel in Windows 10  Note: Power Options settings will vary based on the hardware that is detected. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 Power and System Control Panels Power Options Settings  In Windows 8 you can choose from the following options: Require a password on wakeup (Windows 7 and 8 only) Choose what the power buttons do Choose what closing the lid does (for laptops only) Create a power plan Choose when to turn off the display Change when the computer sleeps © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 Power and System Control Panels Power Options Actions  If users do not want to completely shut down a computer, the following options may be available: Do nothing - The computer continues to run at full power. Sleep – Documents, applications, and the state of the OS are saved in RAM. This allows the computer to power on quickly. Hibernate – Documents, applications, and the state of the OS are saved to a temporary file on the hard drive. With this option, the computer takes a little longer to power on than the Sleep state, but does not use any power. Turn off the display - The computer operates at full power. The display is turned off. Shut down - Shuts down the computer. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 Power and System Control Panels System Control Panel Item  The System Control Panel item allows all users to view basic system information, access tools, and configure advanced system settings.  The Windows 10 System Control Panel item is shown here. The System Control Panel item is very similar in Windows 7 and 8.  The various settings can be accessed by clicking the links on the left panel. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 Power and System Control Panels System Properties  Computer Name – View or change the computer name, workgroup, or domain  Hardware – Access the Device Manager or adjust the device installation settings  Advanced – Configuration settings for performance, user profiles, startup and recovery  System Protection – Access system restore and enable system restore points and the amount of disk space to store them  Remote – Adjust settings for remote assistance and remote desktop © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 Power and System Control Panels Increasing Performance  To enhance the performance of the OS, you can change the virtual memory configuration settings, as shown in the figure.  When Windows determines that system RAM is insufficient, it will create a paging file on the hard drive that contains some of the data from RAM.  This process is much slower than accessing RAM directly. If a computer has a small amount of RAM, consider purchasing additional RAM.  Another form of virtual memory is the use of an external flash device and Windows ReadyBoost to enhance system performance. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63 Power and System Control Panels Lab – Manage Virtual Memory In this lab, you will use the System Control Panel item to configure and manage virtual memory. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 Hardware and Sound Control Panels Device Manager  Device Manager displays a list of all the devices installed in the computer, allowing you to diagnose and resolve device problems.  The Device Manager utility uses icons to indicate the types of problems that may exist with a device. Update a driver - Change the currently installed driver. Roll back a driver - Change the currently installed driver to the previously installed driver. Uninstall a driver - Remove a driver. Disable a device - Disable a device. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65 Hardware and Sound Control Panels Lab – Use Device Manager In this lab, you will open Device Manager to display devices listed on your computer. You will also display the monitor settings. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66 Hardware and Sound Control Panels  Devices displayed in the Devices and Printers Devices and Printers Control Panel item are typically external devices you can connect to your computer through a port such as USB, or a network connection.  Devices and Printers also allows you to quickly add a new device to the computer.  In most cases, Windows will automatically install any necessary drivers that are required by the device.  Note that the desktop computer device in the figure shows a yellow triangle alert, indicating that there is a problem with the driver.  The green check mark next to a device indicates that is to be used as the default device.  Devices and Printers is very similar in Windows versions 7, 8, and 10. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67 Hardware and Sound Control Panels Sound  Use the Sound Control Panel item to configure audio devices or change the sound scheme of the computer.  For example, you can change the email notification sound from a beep to a chime.  Sound also allows a user to choose which audio device is to be used for playback or recording.  The Sound Control Panel utility is largely unchanged between Windows 7, 8, and 10. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68 Clock, Region, and Language Clock  Windows allows you to change the system time and date through the Date and Time control panel item, as shown in the figure.  You can also adjust your time zone.  Windows will automatically update the time settings when time changes occur.  The Windows clock will automatically synchronize with a time authority on the internet. This ensures that the time value is accurate.  Time and Date is accessed through the Clock and Region Control Panel category in Windows 10. In Windows 7 and 8, it is accessed through the Clock, Language, and Region Control Panel category. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69 Clock, Region, and Language Region  Windows allows you to change the format of numbers, currencies, dates, and times by using the Region Control Panel item.  Windows 10 attempts to use location services to automatically detect the location of the computer. The location can also be set manually if the location can't be determined.  Date and time setting formats can be changed by changing the display patterns available in the Date and Time formats area.  Click Additional settings to change number and currency formats and the measurement system used in the region.  Additional date and time formats are also available. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70 Clock, Region, and Language Language  In Windows 7 and Windows 8, language can be configured through Control Panel items. This allowed users to install language packs that included fonts and other resources required by different languages.  In Windows 10, this was moved to the Region settings app, shown in the figure. When adding a language, you can even choose to install Cortana support for voice commands in that language, if available. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71 Clock, Region, and Language Lab – Region and Language Options In this lab, you will examine region and language options in Windows. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72 Programs and Features Control Panels Programs  Use the Program and Features Control Panel items to uninstall a program from your computer.  It is important that applications be uninstalled either through the Programs and Features Control Panel item or from an uninstallation menu choice that is associated with the application in the Start menu.  In addition, you can repair the installation of some programs that may have problems.  You can troubleshoot problems with programs that were made for older versions of Windows.  Finally, you can choose to manually install software from the network. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73 Programs and Features Control Panels Windows Features and Updates  You can also activate or deactivate Windows features, as shown in the figure.  Programs and Features also allows you to view the Windows updates that have been installed, and uninstall specific updates if they are causing problems and don't have dependencies with other installed updates or software. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74 Programs and Features Control Panels Default Programs  The Default Programs Control Panel item provides the means to configure the way that Windows handles files and the applications that are used to work with them.  Example: if you have multiple web browsers installed, you can choose which web browser will open to view a link that you have clicked on in an email or other file.  Choose default applications, or which application opens for a specific file type.  For example, you can configure a JPEG graphics file to open in a browser, for viewing, or in a graphics editor. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75 Other Control Panels Troubleshooting  The Troubleshooting Control Panel item has a number of built-in scripts that are used to identify and solve common problems with many Windows components.  The scripts run automatically and can be configured to automatically make the changes to fix the problems that are found.  You can also view when the troubleshooting scripts have been run in the past by using the View History feature. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76 Other Control Panels BitLocker Drive Encryption  BitLocker is a service provided with Windows that will encrypt an entire volume of disk data so that it can't be read by unauthorized parties.  Data can be lost if your computer or disk drives are stolen.  In addition, when the computer is taken out of service, BitLocker can help insure that the hard drive can't be read when it has been removed from the computer and scrapped.  The BitLocker Control Panel item enables you to control the way BitLocker operates. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77 Other Control Panels File Explorer and Folder Options  File Explorer Options in Windows 10 permit changing a variety of settings regarding the way files are displayed in Windows Explorer or File Explorer.  Folder Options in Windows 7 and 8 is very similar.  In Windows 10, many of the most commonly used file and folder options can be found in the File Explorer ribbon.  In Windows 8.1 some functions are present in the ribbon, but the selection is not as comprehensive as it is in Windows 10.  In Windows 7, there is no ribbon, so the Control Panel must be used. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78 11.3 System Administration © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79 Administrative Tools Administrative Tools Control Panel Item  The Administrative Tools Control Panel item is a collection of tools that are used to monitor and configure Windows operation.  This Control Panel item has evolved over time. In Windows 7 it was somewhat limited.  Microsoft added many different utilities in Windows 8.1.  In Windows 10, the available tools changed slightly.  The Administrative Tools Control Panel item is unusual in that it is a collection of shortcuts to an application. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80 Administrative Tools Computer Management  One of the Administrative Tools items is the Computer Management console.  It allows you to manage many aspects of your computer and remote computers in one tool.  The Computer Management console provides access to three groups of utilities. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81 Administrative Tools Event Viewer  Event Viewer allows viewing the history of application, security, and Windows system events.  Windows logs many events by their type or level: Information - A successful event. A driver or program has executed successfully. Warning - Indication of a potential problem with a software component. Error - A problem exists, but no immediate action is required. Critical - Immediate attention is required. Usually related to system or software crashes or lockups. Success Audit (security only) - A security event has been successful. For example, a successful logon. Failure Audit (security only) - A security event that has not been successful like failed attempts by someone attempting to log on. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82 Administrative Tools  Local Users and Groups provides an efficient way of managing users. Local Users and Groups  You can create new users and assign those users to membership in Groups.  Groups have rights and permissions assigned that are suitable for different types of users.  Windows provides default user accounts and groups to make managing users easier: Administrators - Full control of the computer and access to all folders. Guests - Guests can access the computer through a temporary profile that is created at logon and deleted on logoff. Guest accounts are disabled by default. Users - Users can perform common tasks such as running applications and accessing local or network printers. A user profile is created and persists on the system. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83 Administrative Tools Performance Monitor  The Performance Monitor is different from the performance information that is available through Task Manager and Resource Monitor.  The purpose of the Performance Monitor administrative tool is the creation of detailed custom reports from very specific counters. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84 Administrative Tools Component Services and Data Sources  Component Services is an administrative tool used by administrators and developers to deploy, configure, and manage Component Object Model (COM) components.  COM is a way to allow the use of software components in distributed environments such as in enterprise, internet, and intranet applications. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85 Administrative Tools Services  The Services console (SERVICES.MSC) allows you to manage all the services on your computer and remote computers.  A service is a type of application that runs in the background to achieve a specific goal, or wait for service requests.  To reduce security risks, only start the necessary services. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86 Administrative Tools Data Sources  Data Sources is a tool used by administrators to add, remove, or manage data sources using Open Database Connectivity (ODBC). ODBC is a technology that programs use to access a wide range of databases or data sources. The tool is shown in the figure. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87 Administrative Tools Print Management  The Print Management utility provides a detailed view of all of the printers that are available to a computer.  It is not available in all Windows editions. It is available in Windows servers, Pro, Enterprise, and Ultimate editions.  It enables efficient configuration and monitoring of directly attached and network printers, including print queues for all printers to which it has access.  It also allows the deployment of a printer configuration to multiple computers on a network through the use of group policies. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88 Administrative Tools Windows Memory Diagnostics  The Windows Memory Diagnostics tool schedules a memory test that will be executed when the computer starts.  It can be configured to automatically restart the computer or execute the test the next time the computer starts.  The type of diagnostics to be run can be configured by pressing F1 from the diagnostic as it runs, as shown in the figure.  The results of the test can be viewed by finding the memory diagnostic test result in the Windows Log folder in Event Viewer. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89 Administrative Tools Lab – Monitor and Manage System Resources In this lab, you will use administrative tools to monitor and manage system resources. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90 System Utilities  Administrators can use the System Information System Information tool to collect and display information about local and remote computers.  The System Information tool is designed to quickly find information about software, drivers, hardware configurations, and computer components.  You can also create a file containing all the information about the computer. To export a System Information file, select File > Export, type the filename, choose a location, and click Save.  The System Information utility can also display the configuration of other machines on the network.  It can be opened from the command prompt by typing msinfo32, or it can be found in the Administrative Tools Control Panel item. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91 System Utilities System Configuration  System Configuration (MSCONFIG) is a tool used to identify problems that keep Windows from starting correctly: General – Displays Normal startup, Diagnostic startup, and Selective startup. Boot – Choose the OS version to boot if more than one is present, or Safe boot. Services – Lists services that are started with the OS. Allows individual services to not be loaded on boot for troubleshooting purposes. Startup – In 7, it displays a list of all applications the automatically run when Windows starts. In 8.1 and 10, the user is referred to the same settings in Task Manager. Tools – Displays a list of diagnostic tools for help with troubleshooting. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92 System Utilities The Registry  Every setting in Windows is stored in the Registry. When a user makes changes, the changes are stored in the Registry.  The registry consists of a hierarchical arrangement of keys and subkeys represented as a tree. Levels of the subkey tree can be deeply nested with a maximum of 512 levels permitted.  The registry exists as database files, called hives, associated with each of the top level registry keys.  Each key has values. The values consist of the name of the value, its data type, and the setting or data that is associated with the value. The values tell Windows how to operate. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93 System Utilities Regedit  The Registry Editor allows an administrator to view or make changes to the Windows Registry.  Using the Registry Editor utility incorrectly could cause hardware, application, or OS problems, including having to reinstall the OS.  The registry editor can only be opened from a search or command prompt.  You can search for regedit and open it from the search results, or you can  The figure shows the regedit utility open a command or PowerShell with the value of the OneDrive subkey prompt and type regedit. open for modification. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94 System Utilities Microsoft Management Console  Microsoft Management Console (MMC) is an application that allows the creation of custom management consoles for collections of utilities and tools from Microsoft or other sources.  When initially opened, the console is empty. Utilities and tools, known as snap-ins, can be added to the console. You can also add web page links, tasks, ActiveX controls, and folders.  The console can then be saved and reopened when needed. This allows the construction of management consoles for specific purposes.  The figure shows a new empty console with the dialog box for selecting and adding snap-ins. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95 System Utilities DxDiag  DxDiag stands for DirectX Diagnostic Tool.  It displays details for all DirectX components and drivers that are installed in a computer, as shown in the figure.  DxDiag is run from a search or from the command line.  DirectX is a software environment and interface for multimedia applications, especially games. It defines interfaces for 2D and 3D graphics, audio, media encoders and decoders, etc. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96 System Utilities Lab – System Utilities In this lab, you will use Windows utilities to configure operating system settings. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97 System Utilities Lab – Manage System Files In this lab, you will use Windows utilities to gather information about the computer. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98 Disk Management  The Disk Management utility can be opened by Disk Management Utility right-clicking This PC or Computer and selecting Manage. It can also be opened through the Computer Management Control Panel or in its own Window by using the Win+X menu and selecting Disk Management.  In addition to extending and shrinking partitions, you can also use the Disk Management utility to complete the following tasks: View drive status Assign or change drive letters Add drives Add arrays Designate the active partition © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99 Disk Management Drive Status  Disk Management utility displays the status of each disk. The drives display one of the following conditions:  Foreign - A dynamic disk that has  Missing - A dynamic disk that is  Online (Errors) - I/O errors been moved from another computer corrupted, turned off, or detected on a dynamic disk running Windows disconnected  Offline - A dynamic disk that is  Healthy - A volume that is functioning  Not Initialized - A disk that does corrupted or unavailable properly not contain a valid signature  Unreadable - A basic or dynamic  Initializing - A basic disk that is being  Online - A basic or dynamic disk disk that has experienced hardware converted into a dynamic disk that is accessible and shows no failure, corruption, or I/O errors problems © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100 Disk Management Mounting a Drive  Mounting a drive refers to making a disk image file readable as a drive.  ISO files can have their contents written to disk but they can also be mounted on virtual drives.  To mount an image, open File Explorer, select an ISO file, in the ribbon select the Manage menu under Disk Image Tools and select Mount.  The ISO file will be mounted as a removable media drive.  The drive is an ISO image mounted as a volume.  You can also create a mount point which is similar to a shortcut.  You can create a mount point that makes an entire drive appear as a folder. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101 Disk Management Adding Arrays  In Windows disk management, you can create mirrored, spanned, or RAID 5 arrays from multiple dynamic disks.  This is done by right-clicking a volume and selecting the type of multidisc volume that you want to create.  There must be two or more initialized dynamic drives available on the computer.  Storage Spaces is available in Windows 8 and 10.  Storage Spaces is the disk array technology recommended by Windows. It creates pools of physical hard drives from which virtual disks (storage spaces) can be created.  Like other disk arrays, Storage Spaces offer mirrored, striped, and parity options. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102 Disk Management  To maintain and optimize disk storage, use various tools Disk Optimization within Windows.  A disk defragmenter gathers the noncontiguous data into one place, making the OS run faster.  Do not perform disk defragmentation on SSDs.  SSDs are optimized by their own controller and firmware.  It should not be harmful to defragment Hybrid SSDs because they use hard disks to store data.  In Windows 8 and 10, the option is called Optimize. In Windows 7, it is called Defragment Now accessed from the disk properties menu or from the File Explorer ribbon in Windows 8 and 10.  The Optimize Drives utility allows analysis of the drive prior to optimization.  You can also optimize the available space by doing a disk Cleanup operation. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 103 Disk Management  The Disk Error-Checking tool checks the integrity of Disk Error-Checking files and folders by scanning the hard disk surface for physical errors.  The tool fixes file system errors and checks the disk for bad sectors. It also attempts to recover data from bad sectors.  In File Explorer or File Manager, right-click the drive and select Properties. Select the Tools tab and select Check or Check Now in Windows 7.  In Windows 8, select Scan Drive to attempt to recover bad sectors. In Windows 7, select Scan for and attempt recovery of bad sectors and click Start.  In Windows 8 and 10, click Check Results after scanning. This will open an Event Viewer window that will allow you to view the log entry for the scan. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104 Disk Management Lab – Hard Drive Maintenance In this lab, you will perform hard drive maintenance tasks including defragmentation and error checking. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 105 Application Installation and Configuration System Requirements  Before purchasing or attempting to install an application, you should verify that the system requirements are met. Requirements are normally defined in the software packaging or on the software download page: Processor speed - 32 or 64-bit, x86 or other RAM - sometimes as minimum or recommended capacities Operating System - and version Hard disk space - available Software dependencies - runtime and other frameworks or environments may be required to be present in order for the software to run Graphics and display Network access - if any Peripheral devices © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 106 Application Installation and Configuration Installation Methods  Most applications use an automatic installation process when the application disc is inserted in the optical drive.  The user is required to click through the installation wizard and provide information when requested.  Most Windows software installations are attended, meaning the user must be present to interact with the installer software to provide input about the options to use when installing the software.  The various types of installations are defined in the figure. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 107 Application Installation and Configuration  Local installation can occur from the hard drive, Installing an Application CD, DVD, or USB media.  To perform a local, attended installation, insert the media or drive, or open the downloaded program file.  If the software installation does not start automatically you will need to browse the installation media in order to find and execute the installer.  Installer software usually has an EXE or MSI (Microsoft Silent Installer) file extension.  If there are problems, repair or uninstall the application.  In addition to the process described above, Windows 8 and 10 provide access to the Microsoft Store, as shown in the figure. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108 Application Installation and Configuration Compatibility Mode  Older applications may not run properly on newer Windows operating systems.  If older software is not running properly, locate the executable file for the application. This can be done by right-clicking a shortcut for the application and selecting Open file location.  Right-click the executable file and choose Properties.  From the Compatibility tab, shown in the figure, you can run the Windows compatibility troubleshooter or manually configure the Compatibility Mode environment for the application. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 109 Application Installation and Configuration Uninstalling or Changing a Program  If an application is uninstalled incorrectly, you might be leaving files on the hard drive and unnecessary settings in the registry, which wastes hard drive space and system resources.  Unnecessary files might also reduce the speed at which the registry is read. Microsoft recommends that you always use the Programs and Features Control Panel utility when removing, changing, or repairing applications.  The utility guides you through the software removal process and removes every file that was installed, as shown in the figure.  Some applications may include an uninstall feature that is located in the Windows Start menu with the application. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 110 Application Installation and Configuration Lab – Install Third-Party Software In this lab, you will install and remove a third-party software application supplied by your instructor. You will install the Packet Tracer Windows application. Note: You can skip this lab if you already did it previously in this curriculum and Packet Tracer is currently installed on the PC. Note: You should skip Part 2 if you are using Packet Tracer later in this curriculum. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 111 Application Installation and Configuration Security Considerations  Allowing users to install software on computers that are owned by a business organization can be a security risk.  Users can be tricked into downloading malicious software that can cause data loss, either through theft or destruction.  Malicious software, known as malware, can infect all computers that are attached to a network and can cause widespread damage and loss.  As a technician, it is important to enforce policies regarding software installation and ensure that antimalware software, such as Windows Defender, is active and up to date. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 112 11.4 Command-Line Tools © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 113 Using Windows CLI  The old Windows command line application was PowerShell replaced in the Windows Power User menu Win+X with PowerShell.  The original command line still exists in Windows 10, and can be opened by typing cmd into the search field on the Taskbar. You can also change which command line is displayed in the menu by changing a Taskbar setting.  PowerShell is a more powerful command line utility. It offers advanced features, such as scripting and automation. It comes with its own scripting development environment, called PowerShell ISE.  PowerShell uses "cmdlets", or small applications, that represent the commands that are available. PowerShell also allows naming of cmdlets with aliases.  The figure shows Windows ISE. PowerShell can also be opened as the command line shell alone. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 114 Using Windows CLI The Command Shell  Windows has two command line utilities. PowerShell and the classic command application, known as cmd.  CMD has been the default command line for Windows until PowerShell with Windows 10 build 14791  To open the command shell, type cmd in the search box and click the app in the results.  Or, use the Win+R key to open a run box and type cmd in the run box and click OK.  Press Ctrl+Shift+Enter to run the command prompt as an administrator.  All commonly used commands are supported by Windows 7, 8, and 10. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 115 Using Windows CLI Basic Commands  help – get information on commands  command /? – get help on a specific command  cls – clear the screen  Up-arrow keys – move through previously entered commands  F7 key – display command history in an overlay window  Ctrl+C key – exit a running command process or script  exit – close the command window © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 116 Using Windows CLI Video Demonstration – Managing Command Line Sessions © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 117 Using Windows CLI Lab – Work in the Windows Command Shell In this lab, you will practice techniques for working in the Windows Command Shell. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 118 File System CLI Commands Command Syntax Conventions  Many conventions used by Microsoft for CLI commands are summarized in the figure.  Special characters, called wildcards, can be substituted for characters or groups of characters in filenames.  Wildcards can be used when you only know part of a filename that you are trying to find or when you want to perform a file operation on a group of files that share elements of a filename or extension.  The two wildcards that can be used at the Windows command line are: The asterisk (*) - This character matches groups of characters, including entire filenames and file extensions. The question mark (?) - This character stands for any single character. It does not stand for a group of characters. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 119 File System CLI Commands File System Navigation  When working at the command line, there is no File Explorer to help you get to the files and folders that you want to work with. Instead, you need to move through the folder structure using a combination of commands, normally displaying the contents of a drive or directory and changing directories until you find what you are looking for. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 120 File System CLI Commands File System Navigation - Commands  : – display contents from a different drive like: d:  dir – display the contents of the current directory  cd – change directory © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 121 File System CLI Commands Video Demonstration – Working with Files and Folders © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 122 File System CLI Commands Manipulating Folders - Commands  md – make directory. Create a new directory  rd – remove directory. Delete a directory  move – move a file or directory from one directory to another  ren – rename a directory or file © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 123 File System CLI Commands Manipulating Files - Commands  > – redirect. Send the output of a command to a file example: dir > directory.txt  type – display the contents of a file  more – display the contents of a file one screen at a time  del – delete a file or folder  copy – make a copy of a file  xcopy – extended copy. Copy files or entire directory trees  robocopy – robust copy. Copy files and entire directory trees  move – move a file from a source location to a destination location © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 124 File System CLI Commands Lab - File System Commands In this lab, you will use CLI commands to manage files and folders in Windows. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 125 Disk CLI Commands Disk Operations - Commands  chkdsk – check disk. Checks a file system for errors, including errors with physical media  format – creates a new file system for a disk. May also check for physical disk errors  diskpart – starts a separate command interpreter with commands for working with disk partitions © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 126 Disk CLI Commands Lab - Disk CLI Commands In this lab, you will work with disk CLI commands. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 127 Task and System CLI Commands System CLI Commands  tasklist - displays a list of the processes that are currently running on the local or remote computer  taskkill - allows a running process to be killed  dism - Deployment Image Servicing and Management. Used to work with system images before they are deployed  sfc - verifies and repairs Windows system files  shutdown - power off a local or remote computer © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 128 Task and System CLI Commands Lab - Task and System CLI Commands In this lab, you will work with task and system CLI commands. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 129 Other Useful CLI Commands Other Useful Commands  gpupdate - group policy update /target:computer – force update of another computer /force – force and update even if Group Policy has not changed /boot – restart computer after update  gpresult - display Group Policy Resultant Set of Policy (RSoP) information /s – the system to view the result on, name or ip address /r – displays summary data  net use - display and connect to network resources  net user - display and change information about computer users © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 130 Other Useful CLI Commands  The Windows run line utility can be opened by Running System Utilities pressing the Win+R keys and entering cmd to open the command line window, as shown here. The following windows utilities and tools can also be run by entering the commands shown in the run line utility:  EXPLORER - Opens File Explorer or Windows Explorer  MMC - Opens Microsoft Management Console (MMC). Specify the path and.msc filename to open a saved console  MSINFO32 - Opens the System Information window, which shows a summary of system components, including hardware components and software information  MSTSC - Opens the Remote Desktop utility  NOTEPAD - Opens the Notepad basic text editor © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 131 Other Useful CLI Commands Lab - Other Useful Commands In this lab, you will work with other useful commands. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 132 11.5 Windows Networking © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 133 Network Sharing and Mapping Drives Domain and Workgroup  Domain - A domain is a group of computers and electronic devices with a common set of rules and procedures administered as a unit. Computers in a domain can be located in different locations in the world. A specialized server called a domain controller manages all security-related aspects of users and network resources, centralizing security and administration.  Workgroup - A workgroup is a collection of workstations and servers on a LAN that are designed to communicate and exchange data with one another. Each individual workstation controls its user accounts, security information, and access to data and resources. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 134 Network Sharing and Mapping Drives  Homegroup has been removed from Windows 10 Homegroup  There can only be one homegroup per workgroup on a network and computers can only be a member of one homegroup at a time.  Homegroups are secured with a simple password.  One user in the workgroup creates the homegroup. The other users can join the homegroup, provided they know the homegroup password.  Homegroup availability depends on your network location profile: Home Network - allowed to create or join a homegroup Work Network - not allowed to create or join a homegroup, but you can view and share resources with other computers Public Network - homegroup not available  When a computer joins a homegroup, all user accounts on the computer, except the Guest account, become members of the homegroup. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 135 Network Sharing and Mapping Drives Video Demonstration - Connecting to a Workgroup or Domain © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 136 Network Sharing and Mapping Drives Network Shares and Mapping Drives  Network file sharing and mapping network drives is a secure and convenient way to provide easy access to network resources.  Permissions define the type of access a user has to a file or folder: Read - the user can view the file and subfolder names, navigate to subfolders, view data in files, and run program files. Change - in address to Read permissions the user can add files and subfolders, change the data in files and delete subfolders and files. Full Control - in addition to change and read permissions, the user can change the permission of files and folders in an NTFS partition and take ownership of files and folders. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 137 Network Sharing and Mapping Drives Administrative Shares  Administrative shares, also called hidden shares, are identified with a dollar sign ($) at the end of the share name.  By default, Windows creates several hidden administrative shares. These include the root folder of any local drives (C$), the system folder (ADMIN$), and the print driver folder (PRINT$).  Administrative shares are hidden from users and only accessible by members of the local administrators’ group.  The figure shows administrative shares on a Windows 10 PC. Note the $ after each share name, making them hidden shares.  Adding a $ sign to the end of any local share name will cause it to become a hidden share. It will not be visible by browsing but can be accessed via the command-line by mapping a drive to the share name. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 138 Sharing Local Resources with Others Sharing Local Resources  Windows 10 controls which resources are shared and how they are shared by turning specific sharing features on and off.  Advanced Sharing Settings, located in the Network and Sharing Center, manages the sharing options for three different network profiles; Private, Guest or Public, and All Networks.  Different options can be chosen for each profile. The following items

Use Quizgecko on...
Browser
Browser