Index

A note on the digital index

A link in an index entry is displayed as the section title in which that entry appears. Because some sections have multiple index markers, it is not unusual for an entry to have several links to the same section. Clicking on any link will take you directly to the place in the text in which the marker appears.

Symbols

$ (dollar sign), Any folder sharing
3-D printing support, Choose the ideal Windows 8.1 edition
32-bit operating systems
device drivers and, Install and manage drivers with Device Manager
in-place upgrades and, Choose the ideal Windows 8.1 edition
Windows PE and, Explore the User State Migration Tool
3DES (Triple DES), Objective 5.1: Configure remote connections, Authentication protocols
64-bit operating systems
clean installations and, Choose the ideal Windows 8.1 edition
device drivers and, Install and manage drivers with Device Manager
unsigned drivers and, Use Device Stage
Windows PE and, Explore the User State Migration Tool

A

accelerators, managing in IE11, Manage add-ons, toolbars, extensions, search providers, and more
access control
configuring authentication and authorization, Objective 4.3: Configure authentication and authorization
configuring file and folder access, Objective review
configuring shared resources, Configure access to resources
for apps, Objective 2.2: Install and configure desktop apps and Windows Store apps
for hardware, Objective 2.3: Control access to local hardware and applications, Objective 2.2: Review
for removable devices, Configure application restrictions using Software Restriction Policies
for Windows Store, Explore the Application Compatibility Toolkit
objective summary and review, Objective 2.2: Review, Objective 4.1: Review
access control entries (ACEs), Permission terminology and rules
access control lists (ACLs), Create and manage checkpoints
Account Lockout Duration policy, Password policies
Account Lockout Threshold policy, Account Lockout policies
ACEs (access control entries), Permission terminology and rules
ACLs (access control lists), Create and manage checkpoints
ACT (Application Compatibility Toolkit), Perform readiness tests, Explore Windows PE, MSIExec
ACT LOG Processing Service, Explore the Application Compatibility Toolkit
Action Center
installing device drivers, Install and manage drivers with Device Manager
optimizing network performance, Configure event subscriptions
troubleshooting tools, Action Center troubleshooting tools
Active Directory Domain Services domain, Connect to a network, Configure access to resources
Active Directory permissions, Objective 4.2: Configure file and folder access
Add Counters dialog box, Performance Monitor
Add-AppxPackage cmdlet, Update Windows Store apps
address resolution, Objective 3.1: Configure IP settings, Configure network locations
ADK (Assessment and Deployment Toolkit)
described, Use the Windows Easy Transfer Wizard on stand-alone workstations, Explore the custom Windows 8.1 installation
USMT support, Explore the User State Migration Tool
Volume Activation Management Tool, Explore Windows PE
Windows PE support, Explore the User State Migration Tool
Administrators group
backing up from command line, Configure File History
configuring user rights, Use biometrics
editing permissions for, Basic and advanced permissions
installing device drivers, Create a driver update policy
shared printers, Share and configure a printer manually
tokens and, Configure User Account Control behavior
Advanced Attributes dialog box, Encrypt files and folders using EFS
Advanced Encryption System (AES), Create authenticated exceptions
Advanced Options dialog box, Configure indexing options
advanced permissions, Permission terminology and rules
Advanced Properties dialog box, Enable VPN Reconnect
Advanced Security Settings For dialog box, Basic and advanced permissions, Icacls.exe, Configure object access auditing
advanced sharing, Configure network locations, Public folder sharing, Objective 5.2: Configure mobility options
Advanced Sharing dialog box, Public folder sharing, Objective 5.2: Configure mobility options
Advanced Startup
additional information, Perform a refresh or recycle
described, Perform a refresh or recycle
installing unsigned drivers, Use Device Stage
rebooting using devices, Configure Windows To Go
Windows RE and, Configure a recovery drive
AES (Advanced Encryption System), Create authenticated exceptions
alerts for audited events, Configure object access auditing
All Network profile, Configure network locations
Allow permission, Public folder sharing, Share and configure a printer manually, Permission terminology and rules
Always Offline mode, Objective 5.2: Configure mobility options
Any folder sharing, Public folder sharing
APIPA (Automatic Private IP Addressing), Objective 3.1: Configure IP settings
AppData folder, Explore and configure a Microsoft Account profile
Application Compatibility Manager, Explore the Application Compatibility Toolkit
Application Compatibility Toolkit (ACT), Perform readiness tests, Explore Windows PE, MSIExec
Application log, Configure and analyze event logs
applications (apps)
allowing through Windows Firewall, Allow an app through the Windows Firewall
associating file types with, Objective 2.2: Install and configure desktop apps and Windows Store apps
automatic updates, Choose the ideal Windows 8.1 edition, Objective 6.1: Configure and manage updates
configuring, Objective 2.2: Install and configure desktop apps and Windows Store apps
configuring restrictions using AppLocker, Objective 2.3: Control access to local hardware and applications
configuring restrictions using Software Restriction Policies, Configure application restrictions using Software Restriction Policies
installing and repairing, Objective 2.2: Install and configure desktop apps and Windows Store apps
managing access to Windows Store, Explore the Application Compatibility Toolkit
objective summary and review, Disable access using group policies, Objective 2.1: Review
saving credentials, Credentials
screen resolution and, Choose the ideal Windows 8.1 edition
sideloading technique, Choose the ideal Windows 8.1 edition, Disable access using group policies, Update Windows Store apps
updating Windows Store, Objective 6.1: Configure and manage updates
AppLocker
applying rules, Objective 2.3: Control access to local hardware and applications
comparing Windows 8.1 editions, Choose the ideal Windows 8.1 edition
configuring app restrictions, Objective 2.3: Control access to local hardware and applications
controlling updates, Update Windows Store apps
disabling access to Windows Store, Explore the Application Compatibility Toolkit
.appx file extension, Disable access using group policies, Objective 2.3: Control access to local hardware and applications
ARP/ND Poisoning (spoofing) protection, Create and manage checkpoints
Assessment and Deployment Toolkit (ADK)
described, Use the Windows Easy Transfer Wizard on stand-alone workstations, Explore the custom Windows 8.1 installation
USMT support, Explore the User State Migration Tool
Volume Activation Management Tool, Explore Windows PE
Windows PE support, Explore the User State Migration Tool
Assigned Access feature, Choose the ideal Windows 8.1 edition, Manage installation of and access to removable devices
Attrib tool, Command-line tools
Audit Object Access Properties dialog box, Configure object access auditing
Auditing Entry For dialog box, Configure object access auditing
auditing, object access, Encrypt files and folders using EFS
Auditpool tool, Command-line tools
authenticated exceptions, Configure connection security rules (IPsec)
authentication and authorization
biometrics and, Use biometrics
configuring for VPNs, Configure Remote Desktop settings
configuring in workgroups and domains, Configure authentication in workgroups and domains
configuring User Account Control behavior, Configure User Account Control behavior
configuring user rights, Use biometrics
configuring virtual smart cards and biometrics, Account Lockout policies
connection security rules and, Configure connection security rules (IPsec)
described, Objective 4.3: Configure authentication and authorization
managing credentials and certificates, Configure user rights
Multifactor Authentication for BYOD support, Choose the ideal Windows 8.1 edition
objective summary and review, Configure User Account Control behavior, Objective 4.2: Review
protocols supporting, VPN protocols
remote authentication, Objective 5.1: Configure remote connections
setting up and configuring Microsoft account, Objective 4.3: Configure authentication and authorization
smart cards and, Account Lockout policies
Authentication Exemption rule type, Configure connection security rules (IPsec)
authorization. (see authentication and authorization)
Automatic Private IP Addressing (APIPA), Objective 3.1: Configure IP settings
Automatic Updates policies, Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates
automating installations, Use the Windows Easy Transfer Wizard on stand-alone workstations
AutoPlay settings, changing, Objective 2.2: Install and configure desktop apps and Windows Store apps

C

.cat file extension, Use Pnputil.exe to manage the Driver Store
Certificate Export Wizard, Encrypt files and folders using EFS, Certificates
Certificate Manager (certmgr.msc), Encrypt files and folders using EFS, Credentials
certificate rules, Configure application restrictions using Software Restriction Policies
certificates
backing up, Certificates
certificate rules, Configure application restrictions using Software Restriction Policies
described, Configure user rights, Credentials
exporting, Encrypt files and folders using EFS, Certificates
managing, Configure user rights, Credentials
personal encryption, Encrypt files and folders using EFS
certmgr.msc (Certificate Manager), Encrypt files and folders using EFS, Credentials
Challenge-Handshake Authentication Protocol (CHAP), VPN protocols
Change permission, Public folder sharing, Any folder sharing, Objective review
CHAP (Challenge-Handshake Authentication Protocol), VPN protocols
Check Disk tool, Monitor and maintain Windows clients, Use Diskpart
checkpoints, creating and managing, Install integration services
child disks, Create and manage checkpoints
Chkdsk command, Use Diskpart
Cipher tool, Command-line tools, Encrypt files and folders using EFS
clean installations
64-bit operating systems and, Choose the ideal Windows 8.1 edition
choosing, Perform readiness tests
described, Objective 1.2: Install Windows 8.1
performing, Perform manual installations and upgrades
Client Hyper-V
comparing Windows 8.1 editions, Choose the ideal Windows 8.1 edition
creating and configuring virtual disks, Create and configure virtual switches
creating and configuring virtual machines, Objective 2.5: Configure Hyper-V
creating and configuring virtual switches, Create and manage checkpoints
creating and managing checkpoints, Install integration services
described, Objective review
evaluating compatibility, Perform readiness tests
installing, Objective 2.5: Configure Hyper-V
minimum requirements, Perform readiness tests
moving virtual machines, Create and configure virtual disks
objective summary and review, Move a virtual machine, Objective 2.4: Review
Cmdkey tool, Credentials
.cmd file extension, Objective 2.3: Control access to local hardware and applications
collector computers, Configure event subscriptions
collector initiated subscriptions, Configure event subscriptions
command line. , Manage add-ons, toolbars, extensions, search providers, and more
(see also specific tools)
backing up from, Configure File History
executing commands from, Make modifications remotely using an MMC
managing encryption from, Encrypt files and folders using EFS
sharing from, Any folder sharing
storing credentials at, Credentials
compatibility
Application Compatibility Toolkit, Perform readiness tests, Explore Windows PE, MSIExec
evaluating for hardware, Perform readiness tests
Program Compatibility Troubleshooter, Perform readiness tests, Objective 2.2: Install and configure desktop apps and Windows Store apps
Compatibility View (IE11), Objective 2.4: Configure Internet Explorer 11 and Internet Explorer for the desktop
Compatibility View Settings dialog box, Configure Compatibility View and explore Group Policy settings
compmgmt.msc (Computer Management Console)
accessing Device Manager, Objective 2.1: Configure devices and device drivers
making modifications remotely, Configure and use Remote Assistance
shortcuts opening, Disable access using group policies
System Tools node, Objective 2.1: Configure devices and device drivers
viewing groups, Use biometrics
Computer Management Console (compmgmt.msc)
accessing Device Manager, Objective 2.1: Configure devices and device drivers
accessing Disk Management, Terms you need to know
accessing Event Viewer, Configure and analyze event logs
making modifications remotely, Configure and use Remote Assistance
shortcuts opening, Disable access using group policies
System Tools node, Objective 2.1: Configure devices and device drivers
viewing groups, Use biometrics
.com file extension, Objective 2.3: Control access to local hardware and applications
Config.xml file, Explore USMT
Configure Automatic Updates policy, Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates
Connect To A Workplace dialog box, Configure Remote Desktop settings
connection security rules, Configure Windows Firewall with Advanced Security, Configure connection security rules (IPsec)
connectivity, network. (see network connectivity)
Contacts folder, Explore and configure a Microsoft Account profile
Control Panel
biometric devices, Use biometrics
changing level of UAC, Configure User Account Control behavior
configuring BitLocker, Configure BitLocker
configuring BitLocker To Go, Configure BitLocker using Manage-BDE
configuring update settings, Configure update settings
creating Microsoft account, Set up and configure a Microsoft account
Default Programs window, Objective 2.2: Install and configure desktop apps and Windows Store apps
Devices And Printers window, Configure devices, Configure location-aware printing, Configure file libraries
File History window, Configure System Restore and create a restore point, Recover files from SkyDrive
installing Client Hyper-V, Objective 2.5: Configure Hyper-V
installing Windows features, Use the Windows Easy Transfer Wizard on stand-alone workstations
Program Compatibility Troubleshooter, Perform readiness tests
switching power plans, Configure power policies
Copype.cmd, Explore the custom Windows 8.1 installation
counters, performance, Performance Monitor
.crd file extension, Credentials
Create A Shared Folder Wizard, Share using an MMC
Create A Windows To Go Workspace Wizard, Create a workspace with the Create a Windows To Go Workspace Wizard
Create Custom View dialog box, Configure and analyze event logs
Credential Locker, Credentials
Credential Manager, Credentials
credential roaming, Credentials
credentials
configuring BitLocker, Configure BitLocker
described, Configure user rights
managing, Configure user rights
personal hotspots and, Configure broadband tethering
saving, Credentials
storing at command line, Credentials
UAC prompt and, Configure User Account Control behavior
Critical events, Configure and analyze event logs
Critical updates, Manage update history
Cryptographic Message Syntax Standard, Certificates
Cumulative Security Updates, Manage update history
custom installations, Perform manual installations and upgrades, Use the Windows Easy Transfer Wizard on stand-alone workstations, Explore the custom Windows 8.1 installation
Custom rule type, Configure connection security rules (IPsec)
custom rules, Configure Windows Firewall with Advanced Security
Custom.xml file, Explore USMT

D

Data Collector Sets, Performance Monitor
Data Encryption Standard (DES), Objective 5.1: Configure remote connections, Authentication protocols
Data Recovery Agents (DRAs), Configure BitLocker To Go
DCHP scope, Explore the Local Area Network Connections Properties dialog box
default gateways, Explore the Local Area Network Connections Properties dialog box
Default Programs window (Control Panel), Objective 2.2: Install and configure desktop apps and Windows Store apps
Deny permission, Public folder sharing, Any folder sharing, Permission terminology and rules, Basic and advanced permissions
Deployment Imaging Servicing and Management (DISM), Install to VHD, Explore Windows PE, Command-line tools
DER (Distinguished Encoding Rules) format, Certificates
DES (Data Encryption Standard), Objective 5.1: Configure remote connections, Authentication protocols
desktop apps. , Allow an app through the Windows Firewall
(see also applications (apps))
accessing SkyDrive, Set up and configure SkyDrive
ACT support, MSIExec
configuring IE11 for, Objective 2.4: Configure Internet Explorer 11 and Internet Explorer for the desktop
Desktop folder, Explore and configure a Microsoft Account profile, Share using windows powershell
Desktop library, Share using windows powershell
device lockdown technology, Manage installation of and access to removable devices
Device Manager
accessing, Objective 2.1: Configure devices and device drivers
Action menu, Install and manage drivers with Device Manager
biometric hardware support, Use biometrics
changing views, Install and manage drivers with Device Manager
described, Objective 2.1: Configure devices and device drivers
determining hardware conflicts, Install and manage drivers with Device Manager
disabling and rolling back drivers, Install and uninstall
expanding nodes, Objective 2.1: Configure devices and device drivers
File menu, Install and manage drivers with Device Manager
Help menu, Install and manage drivers with Device Manager
installing and uninstalling drivers, Install and manage drivers with Device Manager
installing legacy hardware, Install and uninstall
menus supported, Install and manage drivers with Device Manager
performing driver rollback, Perform a driver rollback
View menu, Install and manage drivers with Device Manager
Device Stage, Use Devices and Printers
devices and device drivers
automatic app updates, Choose the ideal Windows 8.1 edition
configuring devices, Configure devices
configuring recovery drives, Perform a driver rollback
creating driver update policy, Use Pnputil.exe to manage the Driver Store
device lockdown technology, Manage installation of and access to removable devices
driver rollback, Install and uninstall, Perform a driver rollback
installing and managing drivers with Device Manager, Objective 2.1: Configure devices and device drivers
managing Driver Store with Pnputil.exe, Use Pnputil.exe to manage the Driver Store
managing installation and access to removable devices, Configure application restrictions using Software Restriction Policies
objective summary and review, Create a driver update policy, Answers
virtual machines and, Create and configure virtual switches
Devices And Printers window (Control Panel)
adding printers, Configure file libraries
configuring devices, Configure devices
configuring location-aware printing, Configure location-aware printing
DHCP (Dynamic Host Configuration Protocol), Objective 3.1: Configure IP settings, Explore the Local Area Network Connections Properties dialog box, Configure name resolution
DHCP Guard Protection, Create and manage checkpoints
differencing disks, Create and manage checkpoints
digital signatures, Use Device Stage
DirectAccess, Choose the ideal Windows 8.1 edition, Create authenticated exceptions, Enable VPN Reconnect
Disable Inheritance button, Basic and advanced permissions, Basic and advanced permissions
Disable-ComputerRestore cmdlet, Configure System Restore and create a restore point
Disk Cleanup tool, Monitor and maintain Windows clients, Use Diskpart
Disk Defragmenter tool, Monitor and maintain Windows clients, Manage file system fragmentation
Disk Management (diskmgmt.msc)
creating multiboot systems, Perform manual installations and upgrades
described, Monitor and maintain Windows clients, Terms you need to know
installing to VHDs, Install as Windows To Go
shortcuts opening, Disable access using group policies
disk quotas, Icacls.exe
disk space. (see hard disk space)
disk volumes. , Perform manual installations and upgrades
(see also Disk Management (diskmgmt.msc))
Check Disk tool, Monitor and maintain Windows clients, Use Diskpart
common terminology, Objective 6.2: Manage local storage
creating, Use Disk Management
Disk Cleanup tool, Monitor and maintain Windows clients, Use Diskpart
DiskPart command, Command-line tools, Use Disk Management
types supported, Terms you need to know
viewing options for, Use Disk Management
diskmgmt.msc (Disk Management)
creating multiboot systems, Perform manual installations and upgrades
described, Monitor and maintain Windows clients, Terms you need to know
installing to VHDs, Install as Windows To Go
shortcuts opening, Disable access using group policies
DiskPart command, Command-line tools, Use Disk Management
DISM (Deployment Imaging Servicing and Management), Install to VHD, Explore Windows PE, Command-line tools
Distinguished Encoding Rules (DER) format, Certificates
DLL (dynamic link library), Use Pnputil.exe to manage the Driver Store, Configure application restrictions using AppLocker
DNS (Domain Name System)
described, Explore the Local Area Network Connections Properties dialog box
name/address resolution and, Objective 3.1: Configure IP settings, Configure network locations
performance monitoring, Performance tab
port number filtering, Configure Windows Firewall
Documents folder, Share using windows powershell
Documents library, Share using windows powershell
dollar sign ($), Any folder sharing
Domain Name System (DNS)
described, Explore the Local Area Network Connections Properties dialog box
name/address resolution and, Objective 3.1: Configure IP settings, Configure network locations
performance monitoring, Performance tab
port number filtering, Configure Windows Firewall
Domain profile, Configure Windows Firewall with Advanced Security
domains
configuring authentication in, Configure authentication in workgroups and domains
credentials and, Credentials
Domain Join feature, Choose the ideal Windows 8.1 edition
evaluating readiness in, Perform readiness tests
Microsoft account in, Set up and configure a Microsoft account
Download Manager (IE11), Configure Download Manager
Downloads folder, Understand the local user profile, Share using windows powershell
Downloads library, Share using windows powershell
DRAs (Data Recovery Agents), Configure BitLocker To Go
Driver Store, Use Pnputil.exe to manage the Driver Store
Dynamic Host Configuration Protocol (DHCP), Objective 3.1: Configure IP settings, Explore the Local Area Network Connections Properties dialog box, Configure name resolution
dynamic link library (DLL), Use Pnputil.exe to manage the Driver Store, Configure application restrictions using AppLocker

E

EAP (Extensible Authentication Protocol), Objective 5.1: Configure remote connections
EAP-MSCHAPv3, VPN protocols
EAP-TLS (Extensible Authentication Protocol-Transport Layer Security), VPN protocols
Echo Request messages (ICMP), Action Center troubleshooting tools
EFI (Extensible Firmware Interface) boot partitioning, Objective 6.2: Manage local storage
EFS (Encrypting File System), Encrypt files and folders using EFS, Objective 5.3: Configure security for mobile devices
elevated privileges, Configure User Account Control behavior
Enable-ComputerRestore cmdlet, Configure System Restore and create a restore point
Enable-WindowsOptionalFeature cmdlet, Objective 2.5: Configure Hyper-V
Encrypting File System (EFS), Encrypt files and folders using EFS, Objective 5.3: Configure security for mobile devices
encryption
AES support, Create authenticated exceptions
automatic app updates, Choose the ideal Windows 8.1 edition
DES support, Objective 5.1: Configure remote connections, Authentication protocols
EFS support, Encrypt files and folders using EFS, Objective 5.3: Configure security for mobile devices
FAT32 file system and, Objective review, Encrypt files and folders using EFS
managing from command line, Encrypt files and folders using EFS
personal encryption certificates, Encrypt files and folders using EFS
reversible, Password policies
Store Passwords Using Reversible Encryption policy, Password policies
Enforce Password History policy, Password policies
Error events, Configure and analyze event logs
Ethernet network connections, Connect to a wireless network, Configure event subscriptions
evaluating hardware readiness and compatibility
choosing ideal Windows 8.1 edition, Objective 1.1: Evaluate hardware readiness and compatibility
choosing installation options, Perform readiness tests
cost considerations, Perform readiness tests
objective summary and review, Choose an installation option (clean or upgrade), Answers
performing readiness tests, Choose the ideal Windows 8.1 edition
event logs, Configure and analyze event logs
event subscriptions, Configure event subscriptions
event trace data, Performance Monitor
Event Trace Sessions, Performance Monitor
Event Viewer (eventvwr.msc)
configuring and analyzing event logs, Configure and analyze event logs
configuring event subscriptions, Configure event subscriptions
creating custom views in, Configure and analyze event logs
object access auditing and, Configure object access auditing, Configure object access auditing
shortcuts opening, Disable access using group policies
events, audited, Configure object access auditing
eventvwr.msc (Event Viewer)
configuring and analyzing event logs, Configure and analyze event logs
configuring event subscriptions, Configure event subscriptions
creating custom views in, Configure and analyze event logs
object access auditing and, Configure object access auditing, Configure object access auditing
shortcuts opening, Disable access using group policies
Everyone group, Any folder sharing, Share and configure a printer manually
Exchange ActiveSync, Choose the ideal Windows 8.1 edition
.exe file extension, Objective 2.3: Control access to local hardware and applications
exFAT file system, Configure BitLocker using Manage-BDE, Terms you need to know
explicit permissions, Permission terminology and rules, Basic and advanced permissions
exporting certificates, Encrypt files and folders using EFS, Certificates
extended partitions, Objective 6.2: Manage local storage
Extensible Authentication Protocol (EAP), Objective 5.1: Configure remote connections
Extensible Authentication Protocol-Transport Layer Security (EAP-TLS), VPN protocols
Extensible Firmware Interface (EFI) boot partitioning, Objective 6.2: Manage local storage
extensions, managing in IE11, Manage add-ons, toolbars, extensions, search providers, and more
external virtual switches, Create and manage checkpoints

F

Family Safety feature, Choose the ideal Windows 8.1 edition
FAT file system
configuring BitLocker To Go, Configure BitLocker using Manage-BDE
converting partitions, Use Diskpart
disk quotas and, Objective review, Icacls.exe
disk volumes and, Terms you need to know
encrypting files and folders and, Objective review, Encrypt files and folders using EFS
Fsutil tool and, Use Disk Management
NTFS permission inheritance and, Basic and advanced permissions
object access auditing and, Objective review
securing network resources, Any folder sharing
FAT32 file system
configuring BitLocker To Go, Configure BitLocker using Manage-BDE
disk quotas and, Objective review
disk volumes and, Terms you need to know
encrypting files and folders and, Objective review, Encrypt files and folders using EFS
Fsutil tool and, Use Disk Management
NTFS permission inheritance and, Basic and advanced permissions
object access auditing and, Objective review
securing network resources, Any folder sharing
Favorites folder, Understand the local user profile
Fdisk command, Command-line tools
features (Windows), installing, Use the Windows Easy Transfer Wizard on stand-alone workstations
FhManagew.exe tool, Configure File History
file and folder management. , Permission terminology and rules
(see also permissions)
associating file types with apps, Objective 2.2: Install and configure desktop apps and Windows Store apps
configuring disk quotas, Icacls.exe
configuring file libraries, Share using windows powershell
configuring file recovery, Objective review
configuring mobility options, Objective review
configuring object access auditing, Encrypt files and folders using EFS
configuring shared folder permissions, Configure HomeGroup settings
encryption using EFS, Encrypt files and folders using EFS, Objective 5.3: Configure security for mobile devices
executable file rule collections, Objective 2.3: Control access to local hardware and applications
folder redirection, Explore USMT
managing file system fragmentation, Manage file system fragmentation
managing file types with AppLocker, Configure application restrictions using AppLocker
objective summary and review, Configure object access auditing, Objective 4.1: Review
offline file policies, Objective 5.2: Configure mobility options
syncing files, Configure offline file policies
syncing folders, Objective 5.2: Configure mobility options
File Explorer
configuring disk quotas, Configure disk quotas
Share tab, Configure HomeGroup settings
showing libraries in, Share using windows powershell
syncing folders, Objective 5.2: Configure mobility options
file hash rules, Configure application restrictions using AppLocker
File History feature, Configure System Restore and create a restore point, Recover files from SkyDrive
file recovery
described, Objective review
File History and, Configure System Restore and create a restore point, Recover files from SkyDrive
objective summary and review, Objective summary, Objective 7.1: Review
restoring previous versions of files and folders, Restore previous versions of files and folders
SkyDrive support, Objective review
File Signature Verification tool (Sigverif.exe), Use Device Stage, Disable access using group policies
file systems. , Use Diskpart
(see also specific file systems)
converting partitions between, Use Diskpart
managing fragmentation, Manage file system fragmentation
File Transfer Protocol (FTP), Configure Windows Firewall
file types
associating with programs, Objective 2.2: Install and configure desktop apps and Windows Store apps
managing with AppLocker, Configure application restrictions using AppLocker
filtering, Windows Firewall, Configure Windows Firewall, Configure Windows Firewall with Advanced Security
firewalls. (see Windows Firewall; Windows Firewall With Advanced Security)
folder redirection, Explore USMT
folders. (see file and folder management)
Format-Volume cmdlet, Use Diskpart
Forwarded Events log, Configure and analyze event logs
FQDNs (fully qualified domain names), Specify Intranet Microsoft Update Service Location
fragmentation, file system, Manage file system fragmentation
Fsutil tool, Command-line tools, Configure disk quotas, Use Disk Management
FTP (File Transfer Protocol), Configure Windows Firewall
Full Control permission, Public folder sharing, Any folder sharing, Objective review, Permission terminology and rules
fully qualified domain names (FQDNs), Specify Intranet Microsoft Update Service Location

G

Get-AppxPackage cmdlet, Update Windows Store apps
Get-ComputerRestorePoint cmdlet, Configure System Restore and create a restore point
Get-SmbShare cmdlet, Share using an MMC
gpedit.msc (Group Policy Editor)
accessing removable device policies, Configure application restrictions using Software Restriction Policies
AppLocker rules, Objective 2.3: Control access to local hardware and applications
biometrics settings, Use biometrics
disabling access to Windows Store, Disable access using Group Policy Editor
Software Restriction Policies, Configure application restrictions using Software Restriction Policies
GPMC (Group Policy Management Console)
disabling Windows Store access, Disable access using Group Policy Editor
enabling Always Offline mode, Configure offline file policies
managing smart cards, Account Lockout policies
GPT (GUID Partition Table), Use biometrics, Objective 6.2: Manage local storage
Grant-SmbShareAccess cmdlet, Share using an MMC
graphics adapters, minimum requirements, Choose the ideal Windows 8.1 edition, Perform readiness tests
Group Policy
app update settings, Objective 6.1: Configure and manage updates
biometric hardware, Use biometrics
BitLocker settings, Configure BitLocker from Control Panel
BitLocker To Go settings, Configure BitLocker from Control Panel
comparing Windows 8.1 editions, Choose the ideal Windows 8.1 edition
described, Upgrade from Windows 8
driver update policy, Create a driver update policy
event forwarding setting, Configure event subscriptions
File History settings, Configure File History
forced reboots, Configure application restrictions using AppLocker
InPrivate Browsing settings, Configure security and privacy settings
Internet Explorer 11 settings, Configure Compatibility View and explore Group Policy settings
Microsoft account and, Set up and configure a Microsoft account
Offline Files, Configure offline file policies
password creation, Configure authentication in workgroups and domains
power policies, Create power policies, Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates
remote management and, Make modifications remotely using an MMC
sideloading technique, Disable access using group policies
Windows Store access, Explore the Application Compatibility Toolkit
Windows To Go settings, Configure Windows To Go
Windows Update settings, Roll back updates
WinRM settings, Make modifications remotely using Windows PowerShell
WSUS server, Windows Server Update Services
Group Policy Editor (gpedit.msc)
accessing removable device policies, Configure application restrictions using Software Restriction Policies
AppLocker rules, Objective 2.3: Control access to local hardware and applications
biometrics settings, Use biometrics
disabling access to Windows Store, Disable access using Group Policy Editor
Software Restriction Policies, Configure application restrictions using Software Restriction Policies
Group Policy Management Console (GPMC)
disabling Windows Store access, Disable access using Group Policy Editor
enabling Always Offline mode, Configure offline file policies
managing smart cards, Account Lockout policies
Guest Or Public profile, Configure network locations
Guests group, Use biometrics
GUID Partition Table (GPT), Use biometrics, Objective 6.2: Manage local storage

H

hard disk space
configuring disk quotas, Icacls.exe
managing disk volumes, Objective 6.2: Manage local storage
minimum requirements, Choose the ideal Windows 8.1 edition, Perform readiness tests
hardware. , Choose the ideal Windows 8.1 edition
(see also devices and device drivers)
configuring Hyper-V, Objective review, Objective 2.4: Review
configuring Internet Explorer for desktop, Objective 2.4: Configure Internet Explorer 11 and Internet Explorer for the desktop, Objective 2.3 Review
controlling access to, Objective 2.3: Control access to local hardware and applications, Objective 2.2: Review
evaluating compatibility, Perform readiness tests
evaluating readiness, Objective 1.1: Evaluate hardware readiness and compatibility, Answers
hard disk space, Choose the ideal Windows 8.1 edition, Perform readiness tests, Icacls.exe, Objective 6.2: Manage local storage
installing and configuring apps, Objective 2.2: Install and configure desktop apps and Windows Store apps, Objective 2.1: Review
installing legacy, Install and uninstall
minimum requirements, Choose the ideal Windows 8.1 edition
Homegroup Troubleshooter, Connect to a network
homegroups
configuring settings, Objective 4.1: Configure shared resources
Homegroup Troubleshooter, Connect to a network
shared printers and, Configure file libraries
user names and passwords, Credentials
HomeUsers group, Permission terminology and rules, Use biometrics
hosted networks, Configure Wi-Fi Direct
HTTP (Hypertext Transfer Protocol), Configure Windows Firewall, Configure event subscriptions
HTTP Secure (HTTPS), Configure Windows Firewall, Configure event subscriptions
HTTPS (HTTP Secure), Configure Windows Firewall, Configure event subscriptions
Hyper-V Administrators group, Use biometrics
Hyper-V Manager
creating and configuring virtual switches, Create and configure virtual switches
creating and managing checkpoints, Install integration services
creating virtual disks, Create and configure virtual disks
creating virtual machines, Create and configure a virtual machine
moving virtual machines, Create and configure virtual disks
Hyper-V. , Choose the ideal Windows 8.1 edition
(see also Client Hyper-V)
creating and configuring virtual disks, Create and configure virtual switches
creating and configuring virtual machines, Objective 2.5: Configure Hyper-V
creating and configuring virtual switches, Create and manage checkpoints
creating and managing checkpoints, Install integration services
described, Objective review
Integration Services package, Install integration services
moving virtual machines, Create and configure virtual disks
objective summary and review, Move a virtual machine, Objective 2.4: Review
Hypertext Transfer Protocol (HTTP), Configure Windows Firewall, Configure event subscriptions
hypervisors, Explore Windows PE, Objective review

I

Icacls tool, Command-line tools, Icacls.exe
ICM (Invoke-Command cmdlet), Make modifications remotely using Windows PowerShell
ICMP (Internet Control Message Protocol), Action Center troubleshooting tools
IKE (Internet Key Exchange), Objective 5.1: Configure remote connections
IMAP (Internet Message Access Protocol), Configure Windows Firewall
Import Virtual Machine Wizard, Move a virtual machine
import-module.appx, Disable access using group policies
Important updates, Manage update history
importing virtual machines, Move a virtual machine
in-place upgrades, Choose the ideal Windows 8.1 edition, Perform readiness tests
inbound rules, Configure Windows Firewall with Advanced Security, Configure connection security rules (IPsec)
Indexing Options dialog box, Monitor system resources
Information events, Configure and analyze event logs
.inf file extension, Use Pnputil.exe to manage the Driver Store
inherited permissions, Permission terminology and rules, Basic and advanced permissions
InPrivate Browsing, Configure security and privacy settings
installing device drivers, Install and manage drivers with Device Manager
installing Windows 8.1
custom installations, Perform manual installations and upgrades, Use the Windows Easy Transfer Wizard on stand-alone workstations, Explore the custom Windows 8.1 installation
described, Objective 1.2: Install Windows 8.1
installation options, Perform readiness tests
installing additional Windows features, Use the Windows Easy Transfer Wizard on stand-alone workstations
installing as Windows To Go, Switch between keyboards
installing to VHD, Install as Windows To Go
migrating from previous versions of Windows, Upgrade from Windows 8
objective summary and review, Explore the custom Windows 8.1 installation, Objective 1.1: Review
performing clean installations, Perform manual installations and upgrades
performing manual installations and upgrades, Objective 1.2: Install Windows 8.1
upgrading from Windows 7, Choose an installation option (clean or upgrade), Perform a clean installation
upgrading from Windows 8, Choose an installation option (clean or upgrade), Upgrade from Windows 8
upgrading from Windows Vista, Choose an installation option (clean or upgrade), Upgrade from Windows 8
upgrading from Windows XP, Choose an installation option (clean or upgrade), Upgrade from Windows 8
InstantGo feature, Choose the ideal Windows 8.1 edition
Integration Services package, Install integration services
internal virtual switches, Create and configure virtual switches
Internet Control Message Protocol (ICMP), Action Center troubleshooting tools
Internet Explorer 11
automatic app updates, Choose the ideal Windows 8.1 edition
Compatibility Test Tool, Explore the Application Compatibility Toolkit
configuring Compatibility View, Objective 2.4: Configure Internet Explorer 11 and Internet Explorer for the desktop
configuring Download Manager, Configure Download Manager
configuring security and privacy settings, Configure Compatibility View and explore Group Policy settings
Group Policy settings, Configure Compatibility View and explore Group Policy settings
Manage Add-On dialog box, Manage add-ons, toolbars, extensions, search providers, and more
objective summary and review, Objective 2.3 Review
Internet Key Exchange (IKE), Objective 5.1: Configure remote connections
Internet Message Access Protocol (IMAP), Configure Windows Firewall
Internet Options dialog box, Configure Compatibility View and explore Group Policy settings, Manage add-ons, toolbars, extensions, search providers, and more
Internet service providers (ISPs), Objective 3.1: Configure IP settings
Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX), Explore Windows PE
Invoke-Command cmdlet (ICM), Make modifications remotely using Windows PowerShell
IP addresses
configuring devices, Configure devices
configuring name resolution, Configure network locations
configuring network locations, Connect to a network
configuring settings, Configure network connectivity
connecting to networks, Connect to a network
Local Area Network Connection Properties dialog box, Explore the Local Area Network Connections Properties dialog box
objective summary and review, Command-line tools, Answers
Port Access Control Lists and, Create and manage checkpoints
resolving connectivity issues, Configure name resolution
viewing, Configure name resolution
Windows Firewall filtering, Configure Windows Firewall
Ipconfig tool, Command-line tools
IPsec (IP Security extension)
benefits of, Configure connection security rules (IPsec)
configuring connection security rules, Configure connection security rules (IPsec)
L2TP support, Objective 5.1: Configure remote connections
Windows Firewall With Advanced Security and, Configure Windows Firewall with Advanced Security, Configure Windows Firewall with Advanced Security
IPv4 addresses, Explore the Local Area Network Connections Properties dialog box
IPv6 addresses, Explore the Local Area Network Connections Properties dialog box, Objective 4.1: Configure shared resources
IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange), Explore Windows PE
Isolation rule type, Configure connection security rules (IPsec)
ISPs (Internet service providers), Objective 3.1: Configure IP settings

K

keyboards
adding layout for languages, Switch between keyboards
switching between, Switch between keyboards

L

L2TP (Layer 2 Tunneling Protocol), Objective 5.1: Configure remote connections, Authentication protocols
languages
adding, Install additional features
adding keyboard layout for, Switch between keyboards
changing display language, Download and install language packs
downloading and installing language packs, Download and install language packs
switching between keyboards, Switch between keyboards
Layer 2 Tunneling Protocol (L2TP), Objective 5.1: Configure remote connections, Authentication protocols
legacy hardware, installing, Install and uninstall
licensing, volume, Choose an installation option (clean or upgrade), Use the Windows Easy Transfer Wizard on stand-alone workstations
Links folder, Understand the local user profile
List Folder Contents permission, Permission terminology and rules
Lite-Touch, High-Volume Deployment strategy, Use the Windows Easy Transfer Wizard on stand-alone workstations
LoadState command, Explore the User State Migration Tool, Explore USMT
Local Area Network Connections Properties dialog box, Explore the Local Area Network Connections Properties dialog box
Local Group Policy Editor
accessing, Disable access using group policies
configuring biometrics, Use biometrics
configuring BitLocker, Configure BitLocker
configuring IE11 settings, Configure security and privacy settings
configuring Windows Update settings, Roll back updates
controlling driver installation, Create a driver update policy
creating power policies, Create power policies
disabling Windows Store access, Explore the Application Compatibility Toolkit
object access auditing, Configure object access auditing
Windows To Go settings, Configure Windows To Go
Local Security Policy
Account Lockout policies, Password policies
creating password policies, Configure authentication in workgroups and domains
defining UAC configuration, Configure User Account Control behavior
local security settings, Use biometrics
viewing user rights, Use biometrics
Local Security Settings (secpol.msc), Disable access using group policies, Configure authentication in workgroups and domains
LOCAL SERVICE group, Use biometrics
local storage
described, Objective review
managing disk volumes, Objective 6.2: Manage local storage
managing file system fragmentation, Manage file system fragmentation
objective summary and review, Manage Storage Spaces, Objective 6.1: Review
Storage Spaces, Choose the ideal Windows 8.1 edition, Manage Storage Spaces
local user profiles, Explore and configure a Microsoft Account profile
location-aware printing, Manage preferred wireless networks
logs, event, Configure and analyze event logs

M

MAC addresses, Configure devices, Create and manage checkpoints
Malicious Software Removal Tool, Manage update history
Manage Add-On dialog box, Manage add-ons, toolbars, extensions, search providers, and more
Manage Documents permission, Add a printer and configure sharing
Manage This Printer permission, Add a printer and configure sharing
Manage-BDE, Configure BitLocker from Control Panel
mandatory user profiles, Understand the mandatory user profile
manual installations and upgrades, Objective 1.2: Install Windows 8.1
Master Boot Record (MBR), Objective 6.2: Manage local storage
Maximum Password Age policy, Password policies
MBR (Master Boot Record), Objective 6.2: Manage local storage
MDT (Microsoft Deployment Toolkit), Use the Windows Easy Transfer Wizard on stand-alone workstations, Explore USMT
Media Center, Install additional Windows features
Media Player, Choose the ideal Windows 8.1 edition
memory management
minimum requirements, Choose the ideal Windows 8.1 edition, Perform readiness tests
optimizing network performance, Configure event subscriptions
metered connections, Install and uninstall
Microsoft account
accessing SkyDrive data, Share and configure a printer manually
credentials and, Credentials
described, Configure folder location
minimum requirements, Choose the ideal Windows 8.1 edition
setting up and configuring, Objective 4.3: Configure authentication and authorization
syncing, Configure folder location
Microsoft Application Virtualization software (MS App-V), Perform readiness tests
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP), Objective 5.1: Configure remote connections
Microsoft Deployment Toolkit (MDT), Use the Windows Easy Transfer Wizard on stand-alone workstations, Explore USMT
Microsoft Management Consoles (MMCs)
Certificate Manager, Encrypt files and folders using EFS, Credentials
Local Security Policy, Configure authentication in workgroups and domains
making modifications remotely, Configure and use Remote Assistance
Shared Folders, Share using an MMC
Microsoft SQL Server, Explore the Application Compatibility Toolkit
Microsoft SQL Server Express, Explore the Application Compatibility Toolkit
MigApp.xml file, Explore USMT
MigDocs.xml file, Explore USMT
migrating
from previous versions of Windows, Upgrade from Windows 8
user data, Objective review, Understand the mandatory user profile, Objective 1.2: Review
MigUser.xml file, Explore USMT
migwiz. (see WET (Windows Easy Transfer))
Minimum Password Age policy, Password policies
Minimum Password Length policy, Password policies
MiraCast Wireless Display standard, Choose the ideal Windows 8.1 edition
mirror storage spaces, Manage Storage Spaces
mirrored volumes, Terms you need to know
MMCs (Microsoft Management Consoles)
Certificate Manager, Encrypt files and folders using EFS, Credentials
Local Security Policy, Configure authentication in workgroups and domains
making modifications remotely, Configure and use Remote Assistance
Shared Folders snap-in, Share using an MMC
mobile devices
configuring BitLocker, Objective 5.3: Configure security for mobile devices
configuring security for, Objective 5.3: Configure security for mobile devices, Objective 5.2: Review
mobile broadband network connections, Choose the ideal Windows 8.1 edition, Connect to a wireless network, Enable VPN Reconnect
personal hotspots, Choose the ideal Windows 8.1 edition, Enable VPN Reconnect
mobility options
configuring Offline Files policies, Objective 5.2: Configure mobility options
configuring power policies, Configure power policies
configuring sync options, Configure sync options
configuring Wi-Fi Direct, Configure Wi-Fi Direct
configuring Windows To Go, Configure Wi-Fi Direct
described, Objective review
Modify permission, Permission terminology and rules
monitoring
resources, Monitor system resources
system performance, Objective review, Objective 6.3: Thought experiment
Windows Firewall, Configure Windows Firewall, Configure Windows Firewall with Advanced Security
Move Folder dialog box, Configure folder location
MS App-V (Microsoft Application Virtualization software), Perform readiness tests
MS-CHAP (Microsoft Challenge Handshake Authentication Protocol), Objective 5.1: Configure remote connections
Msconfig tool (System Configuration tool), Disable access using group policies, App History tab, Use Windows RE
.msi file extension, Objective 2.3: Control access to local hardware and applications
MSIExec command. (see Windows Installer)
msinfo32.exe (System Information tool), Perform readiness tests
.msp file extension, Objective 2.3: Control access to local hardware and applications
.mst file extension, Objective 2.3: Control access to local hardware and applications
mstsc.exe. (see Remote Desktop Connection dialog box)
multicast addresses, Explore the Local Area Network Connections Properties dialog box
Music folder, Share using windows powershell
Music library, Share using windows powershell
My Documents folder, Understand the local user profile
My Music folder, Understand the local user profile
My Pictures folder, Understand the local user profile
My Videos folder, Understand the local user profile

N

name resolution, Objective 3.1: Configure IP settings, Configure network locations
NAP (Network Access Protection), Enable VPN Reconnect
NAT (Network Address Translation), Objective 3.1: Configure IP settings
native-boot VHDs, Install as Windows To Go
Near Field Communication (NFC), Share and configure a printer manually
net share command, Any folder sharing
Netsh tool
configuring IP addresses, Explore the Local Area Network Connections Properties dialog box
described, Command-line tools
forgetting networks, Manage preferred wireless networks
pairing compatible devices, Configure Wi-Fi Direct
Netstat tool, Command-line tools
Network Access Protection (NAP), Enable VPN Reconnect
network adapters, configuring, Configure location-aware printing
Network Address Translation (NAT), Objective 3.1: Configure IP settings
Network And Sharing Center
accessing network adapters, Configure location-aware printing
advanced sharing, Configure network locations
configuring Network Discovery, Configure Network Discovery
creating and joining homegroups, Objective 4.1: Configure shared resources
creating VPNs, Configure Remote Desktop settings
Public folder sharing, Configure HomeGroup settings
troubleshooting tools, Configure name resolution
viewing connection status, Configure name resolution
Network And Sharing Wizard, Connect to a network
network connectivity
configuring and maintaining network security, Objective review
configuring IP settings, Configure network connectivity, Answers
configuring location-aware printing, Manage preferred wireless networks
configuring network adapters, Configure location-aware printing
configuring remote connections, Configure remote access and mobility, Answers
configuring remote management, Objective review, Objective 3.3: Review
connecting to wireless networks, Objective review
connectivity options, Connect to a network
forgetting connections, Manage preferred wireless networks
managing preferred wireless networks, Connect to a wireless network
objective summary and review, Answers
optimizing network performance, Configure event subscriptions
resolving issues, Configure name resolution
troubleshooting, Optimize networking performance
viewing status, Configure name resolution
Network Discovery, Objective review
network interface cards (NICs), Create and manage checkpoints, Configure location-aware printing
Network List service, Configure location-aware printing
Network Location Awareness service, Configure location-aware printing
network locations, configuring, Connect to a network
network traffic monitoring, Create and manage checkpoints
network zone rules, Configure application restrictions using Software Restriction Policies
New Inbound Rule Wizard, Configure Windows Firewall with Advanced Security
New Simple Volume Wizard, Use Disk Management
New Technology File System (NTFS)
configuring BitLocker To Go, Configure BitLocker using Manage-BDE
configuring disk quotas, Icacls.exe
configuring object access auditing, Encrypt files and folders using EFS
configuring permissions, Public folder sharing, Objective 4.2: Configure file and folder access
converting partitions, Use Diskpart
disk volumes and, Terms you need to know
encryption using EFS, Encrypt files and folders using EFS
Fsutil tool and, Use Disk Management
objective summary and review, Configure object access auditing, Objective 4.1: Review
New Virtual Machine Wizard, Create a virtual machine
New-Partition cmdlet, Use Diskpart
New-SmbShare cmdlet, Share using an MMC
NFC (Near Field Communication), Share and configure a printer manually
NICs (network interface cards), Create and manage checkpoints, Configure location-aware printing
notifications, update, Specify Intranet Microsoft Update Service Location
Nslookup tool, Command-line tools
NTFS (New Technology File System)
configuring BitLocker To Go, Configure BitLocker using Manage-BDE
configuring disk quotas, Icacls.exe
configuring object access auditing, Encrypt files and folders using EFS
configuring permissions, Public folder sharing, Objective 4.2: Configure file and folder access
converting partitions, Use Diskpart
disk volumes and, Terms you need to know
encryption using EFS, Encrypt files and folders using EFS
Fsutil tool and, Use Disk Management
objective summary and review, Configure object access auditing, Objective 4.1: Review
NTFS permissions
basic and advanced permissions, Permission terminology and rules
configuring, Objective 4.2: Configure file and folder access
described, Public folder sharing, Objective review
moving and copying, Basic and advanced permissions
Share permissions and, Any folder sharing, Objective review, Permission terminology and rules

P

packaged apps, rule collections, Objective 2.3: Control access to local hardware and applications
PAP (Password Authentication Protocol), VPN protocols
parent disks, Create and manage checkpoints
parity storage spaces, Manage Storage Spaces
partitions
common terminology, Objective 6.2: Manage local storage
converting between file systems, Use Diskpart
EFI, Objective 6.2: Manage local storage
multiboot systems and, Perform manual installations and upgrades
shrinking, Use Disk Management
viewing options for, Use Disk Management
Password Authentication Protocol (PAP), VPN protocols
Password Must Meet Complexity Requirements policy, Password policies
password protected sharing, Share and configure a printer manually
passwords
Account Lockout policies, Password policies
creating password policies, Configure authentication in workgroups and domains
managing, Credentials
password protected sharing, Share and configure a printer manually
protecting authentication and, Configure authentication in workgroups and domains
startup key storage and, Configure BitLocker To Go
path rules, Configure application restrictions using AppLocker
PC Settings
configuring sync options in, Sync Center and configuring Sync Options
switching from local to Microsoft account, Set up and configure a Microsoft account
viewing update settings, Configure update settings
PCL (printer control language), Share and configure a printer manually
PEAP (Protected Extensible Authentication Protocol), Objective 5.1: Configure remote connections
perfmon.msc (Performance Monitor), Disable access using group policies, Performance Monitor
performance counters, Performance Monitor
Performance Monitor (perfmon.msc), Disable access using group policies, Performance Monitor
performance monitoring
described, Objective review
event logs, Configure indexing options
event subscriptions, Configure event subscriptions
indexing options, Monitor system resources
networking performance, Configure event subscriptions
objective summary and review, Performance Monitor, Objective 6.3: Thought experiment
system resources, Monitor system resources
Task Manager, Disable access using group policies, Configure Task Manager
Permissions Entry For dialog box, Basic and advanced permissions
Permissions For dialog box, Objective 4.2: Configure file and folder access
permissions. , Permission terminology and rules
(see also NTFS permissions; Share permissions)
ACT LOG Processing Service, Explore the Application Compatibility Toolkit
assigning, Share and configure a printer manually
configuring for homegroups, Objective 4.1: Configure shared resources
configuring for shared folders, Configure HomeGroup settings
inheritance, Permission terminology and rules, Basic and advanced permissions
terminology and rules, Objective 4.2: Configure file and folder access
user rights and, Configure user rights
personal encryption certificates, Encrypt files and folders using EFS
personal hotspots, Enable VPN Reconnect
Personal Identity Verification (PIV) standard, Account Lockout policies
Personal Information Exchange (PFX) format, Certificates
PFX (Personal Information Exchange) format, Certificates
Pictures folder, Share using windows powershell
Pictures library, Share using windows powershell
PID (Process ID), Monitor system resources
Ping tool, Configure network locations, Action Center troubleshooting tools
PIV (Personal Identity Verification) standard, Account Lockout policies
PKCS #12 format, Certificates
PKCS #7 format, Certificates
PKI (Public Key Infrastructure), Encrypt files and folders using EFS
Pnputil.exe tool, Install and uninstall, Use Pnputil.exe to manage the Driver Store
Point-to-Point Protocol (PPP), Objective 5.1: Configure remote connections, Authentication protocols
Point-to-Point Tunneling Protocol (PPTP), Objective 5.1: Configure remote connections, Authentication protocols
POP3 (Post Office Protocol 3), Configure Windows Firewall
Port Access Control Lists (ACLs), Create and manage checkpoints
port numbers, firewall filtering, Configure Windows Firewall
port rules, Configure Windows Firewall with Advanced Security
Post Office Protocol 3 (POP3), Configure Windows Firewall
Power Management feature, Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates
power policies, Configure power policies, Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates
Powercfg.exe tool, Configure power policies
PPP (Point-to-Point Protocol), Objective 5.1: Configure remote connections, Authentication protocols
PPTP (Point-to-Point Tunneling Protocol), Objective 5.1: Configure remote connections, Authentication protocols
predefined rules, Configure Windows Firewall with Advanced Security
primary partitions, Objective 6.2: Manage local storage
print devices, Share and configure a printer manually
Print permission, Add a printer and configure sharing
print servers, Share and configure a printer manually
printer control language (PCL), Share and configure a printer manually
printer pool, Share and configure a printer manually
printer priority, Share and configure a printer manually
printing and printers
3-D printing support, Choose the ideal Windows 8.1 edition
common terms, Share and configure a printer manually
configuring shared printers, Configure file libraries
location-aware, Manage preferred wireless networks
privacy, configuring IE11 settings, Configure Compatibility View and explore Group Policy settings
private IP addresses, Objective 3.1: Configure IP settings
private keys, Encrypt files and folders using EFS
Private profile, Configure network locations, Configure Windows Firewall with Advanced Security
private virtual switches, Create and configure virtual switches
private VLANs, Create and manage checkpoints
Process ID (PID), Monitor system resources
processors, minimum requirements, Choose the ideal Windows 8.1 edition
product IDs, Configure a virtual machine
profiles, user. (see user profiles)
Program Compatibility Troubleshooter, Perform readiness tests, Objective 2.2: Install and configure desktop apps and Windows Store apps
program rules, Configure Windows Firewall with Advanced Security
Properties dialog box
device drivers, Install and manage drivers with Device Manager, Install and uninstall
devices, Install and manage drivers with Device Manager, Install and uninstall, Use Devices and Printers
disk drives, Use Diskpart
disk volumes, Use Disk Management
distribution, Manage file system fragmentation
Driver tab, Install and manage drivers with Device Manager, Install and uninstall
enabling object auditing, Configure object access auditing
event subscriptions, Configure event subscriptions
events, Configure object access auditing
folders, Explore USMT, Public folder sharing, Encrypt files and folders using EFS
network connection, Configure name resolution
printers, Share and configure a printer manually
resources, Install and manage drivers with Device Manager, Objective review
Resources tab, Install and manage drivers with Device Manager
system, Configure and use Remote Assistance and Remote Desktop, Configure System Restore and create a restore point
user profiles, Understand the local user profile
VPN connections, VPN protocols, Configure VPN connections and authentication
wireless networks, Configure network adapters
Protected Extensible Authentication Protocol (PEAP), Objective 5.1: Configure remote connections
protocols, firewall filtering, Configure Windows Firewall
.ps1 file extension, Configure application restrictions using AppLocker
.ps2 file extension, Objective 2.3: Control access to local hardware and applications
Public folders, Configure HomeGroup settings, Share using windows powershell
Public Key Infrastructure (PKI), Encrypt files and folders using EFS
public keys, Encrypt files and folders using EFS
Public profile, Configure Windows Firewall with Advanced Security
publisher rules, Configure application restrictions using AppLocker

R

radio-frequency identification (RFID), Share and configure a printer manually
RAID technology, Terms you need to know, Manage Storage Spaces
RDP (Remote Desktop Protocol), Authentication protocols
Read & Execute permission, Permission terminology and rules
Read permission, Public folder sharing, Any folder sharing, Objective review, Permission terminology and rules
readiness tests, Choose the ideal Windows 8.1 edition
rebooting computers, Configure Assigned Access, Objective review
Recimg.exe tool, Perform a refresh or recycle
Recommended updates, Manage update history
Recovery Drive Wizard, Configure a recovery drive
recovery drives, Perform a driver rollback
recovery keys, Configure BitLocker, Configure BitLocker To Go
recovery. (see file recovery; system recovery)
Recycle Bin, Recover files from SkyDrive
recycling computers, Configure System Restore and create a restore point
refreshing computers, Configure System Restore and create a restore point
Registry permissions, Objective 4.2: Configure file and folder access
remote access and mobility
configuring mobility options, Objective review, Objective 5.1: Review
configuring remote connections, Configure remote access and mobility, Answers
configuring security for mobile devices, Objective 5.3: Configure security for mobile devices, Objective 5.2: Review
Remote Assistance
configuring and using, Explore Remote Desktop options
described, Configure and use Remote Assistance and Remote Desktop
enabling or disabling remote features, Configure and use Remote Assistance and Remote Desktop
remote authentication, Objective 5.1: Configure remote connections
Remote Desktop
configuring settings, Authentication protocols
described, Configure and use Remote Assistance and Remote Desktop
options supported, Enable or disable remote features
Remote Desktop Client, Choose the ideal Windows 8.1 edition
Remote Desktop Connection dialog box
Advanced tab, Explore Remote Desktop options
described, Enable or disable remote features
Display tab, Explore Remote Desktop options
Experience tab, Explore Remote Desktop options
General tab, Explore Remote Desktop options
Local Resources tab, Explore Remote Desktop options
opening, Configure Remote Desktop settings
Programs tab, Explore Remote Desktop options
Remote Desktop Host, Choose the ideal Windows 8.1 edition
Remote Desktop Protocol (RDP), Authentication protocols
remote management
configuring and using Remote Assistance and Remote Desktop, Configure and use Remote Assistance and Remote Desktop
configuring settings and exploring tools, Make modifications remotely using an MMC
making modifications using MMCs, Configure and use Remote Assistance
objective summary and review, Objective summary, Objective 3.3: Review, Chapter summary
Remote Business Data Removal, Choose the ideal Windows 8.1 edition
removable devices, managing installation and access to, Configure application restrictions using Software Restriction Policies
Remove-AppxPackage cmdlet, Update Windows Store apps
Remove-PhysicalDisk cmdlet, Manage Storage Spaces
Remove-SmbShare cmdlet, Share using an MMC
Repair-VirtualDisk cmdlet, Manage Storage Spaces
Reset Account Counter After policy, Account Lockout policies
resmon.exe (Resource Monitor), Startup tab
Resource Monitor (resmon.exe), Startup tab
resources
configuring authentication and authorization, Objective 4.3: Configure authentication and authorization
configuring file and folder access, Objective review
configuring shared, Configure access to resources
monitoring, Monitor system resources
objective summary and review, Answers
ownership of, Icacls.exe
viewing by connection, Install and manage drivers with Device Manager
viewing by type, Install and manage drivers with Device Manager
restore points, Configure System Restore and create a restore point
restoring files. (see file recovery; system recovery)
reversible encryption, Password policies
RFID (radio-frequency identification), Share and configure a printer manually
roaming credentials, Credentials
roaming user profiles, Understand the local user profile
rolling back
device drivers, Install and uninstall, Perform a driver rollback
updates, Manage update history
rule collections, Objective 2.3: Control access to local hardware and applications
Rule Wizard, Configure Windows Firewall with Advanced Security, Configure connection security rules (IPsec)
Run dialog box, Encrypt files and folders using EFS

S

SANs (storage area networks), Manage Storage Spaces
SAS (Serial Attached SCSI), Manage Storage Spaces
SATA (Serial ATA), Manage Storage Spaces
Saved Games folder, Understand the local user profile
ScanState command, Explore the User State Migration Tool, Explore USMT
scardsvr (Smart Card Service), Smart cards and virtual smart cards
SCCM (System Center Configuration Manager), Specify Intranet Microsoft Update Service Location
scheduled installations, Turn On Software Notifications
screen resolution, multiple apps and, Choose the ideal Windows 8.1 edition
scripts, rule collections, Objective 2.3: Control access to local hardware and applications
search providers, managing in IE11, Manage add-ons, toolbars, extensions, search providers, and more
Searches folder, Understand the local user profile
Second Level Address Translation (SLAT), Perform readiness tests
secpol.msc (Local Security Settings), Disable access using group policies, Configure authentication in workgroups and domains
Secure Boot, Choose the ideal Windows 8.1 edition, Use biometrics
Secure Desktop, Credentials, Configure User Account Control behavior
Secure Socket Tunneling Protocol (SSTP), VPN protocols
Secure Sockets Layer (SSL), VPN protocols
security
configuring BitLocker, Objective 5.3: Configure security for mobile devices
configuring for mobile devices, Objective 5.3: Configure security for mobile devices, Objective 5.2: Review
configuring IE11 settings, Configure Compatibility View and explore Group Policy settings
configuring Network Discovery, Objective review
configuring Windows Firewall, Configure Windows Firewall
configuring Windows Firewall With Advanced Security, Allow an app through the Windows Firewall
connection security rules, Configure Windows Firewall with Advanced Security, Configure connection security rules (IPsec)
creating authenticated exceptions, Configure connection security rules (IPsec)
elevated privileges, Configure User Account Control behavior
object access auditing, Encrypt files and folders using EFS
objective summary and review, Create authenticated exceptions, Objective 3.2: Review
Security log, Configure and analyze event logs
Security Policy, Set up and configure a Microsoft account, Use biometrics
security principal, Permission terminology and rules
Security updates, Manage update history
Select A Destination dialog box, Configure folder location
Select Users Or Groups dialog box, Configure user rights
Serial ATA (SATA), Manage Storage Spaces
Serial Attached SCSI (SAS), Manage Storage Spaces
Server Message Block (SMB), Share using an MMC
Server-To-Server rule type, Configure connection security rules (IPsec)
Service Pack updates, Manage update history
Service Set Identifier (SSID), Connect to a network, Objective review, Performance tab
Set-Disk cmdlet, Use Diskpart
Set-Partition cmdlet, Use Diskpart
Set-PhysicalDisk cmdlet, Manage Storage Spaces
Set-SmbShare cmdlet, Share using an MMC
Settings charm
connecting to networks from, Objective review
disabling automatic app updates, Objective 6.1: Configure and manage updates
opening, Explore the Application Compatibility Toolkit, Connect to a network, Objective 6.1: Configure and manage updates
SkyDrive app and, Set up and configure SkyDrive
Setup log, Configure and analyze event logs
Setup.exe, Perform a clean installation
Share permissions
characteristics of, Public folder sharing
described, Public folder sharing, Objective review
limitations, Any folder sharing
NTFS permissions and, Any folder sharing, Objective review, Permission terminology and rules
shared broadband connections, Enable VPN Reconnect
shared folders
Any folder sharing, Public folder sharing
described, Configure access to resources
Public folder sharing, Configure HomeGroup settings
sharing from command line, Any folder sharing
Shared Folders snap-in, Any folder sharing
shared personal hotspots, Enable VPN Reconnect
shared printers
adding and configuring, Configure file libraries
homegroups and, Configure file libraries
sharing and configuring manually, Share and configure a printer manually
shared resources
configuring file libraries, Share using windows powershell
configuring homegroup settings, Objective 4.1: Configure shared resources
configuring shared folder permissions, Configure HomeGroup settings
configuring shared printers, Configure file libraries
described, Configure access to resources
objective summary and review, Set up and configure SkyDrive, Answers
setting up and configuring SkyDrive, Share and configure a printer manually
shortcut keys
connecting to networks, Objective review
opening features, Disable access using group policies
opening Run dialog box, Encrypt files and folders using EFS
opening Settings charm, Explore the Application Compatibility Toolkit, Connect to a network, Objective review, Objective 6.1: Configure and manage updates
rebooting computers, Configure Assigned Access, Objective review
switching between keyboards, Switch between keyboards
Shrink dialog box, Use Disk Management
shrinking partitions, Use Disk Management
Shut Down Windows dialog box, Configure Windows Update policies
side-by-side migration, Objective 1.3: Migrate and configure user data
sideloading technique, Choose the ideal Windows 8.1 edition, Disable access using group policies, Update Windows Store apps
Sigverif.exe (File Signature Verification tool), Use Device Stage, Disable access using group policies
SIM (System Image Manager), Explore the custom Windows 8.1 installation, Explore Windows PE
Simple Mail Transfer Protocol (SMTP), Configure Windows Firewall
simple storage spaces, Manage Storage Spaces
simple volumes, Terms you need to know, Use Disk Management
SkyDrive
accessing, Objective 4.3: Configure authentication and authorization
additional information, Recover files from SkyDrive
described, Set up and configure SkyDrive
name change for, Objective 4.1: Configure shared resources, Sync Center and configuring Sync Options
recovering files from, Objective review
setting up and configuring, Share and configure a printer manually
shared resources and, Configure access to resources
syncing settings, Explore and configure a Microsoft Account profile
types of data saved, Set up and configure SkyDrive
SLAT (Second Level Address Translation), Perform readiness tests
Slmgr command, Update Windows Store apps
Smart Card Service (scardsvr), Smart cards and virtual smart cards
smart cards, Account Lockout policies, VPN protocols
Smart Screen control, Choose the ideal Windows 8.1 edition, Use biometrics
SMB (Server Message Block), Share using an MMC
SMTP (Simple Mail Transfer Protocol), Configure Windows Firewall
snapshots, Install integration services
Software Restriction Policies, Objective 2.3: Control access to local hardware and applications, Configure application restrictions using Software Restriction Policies
source computer initiated subscriptions, Configure event subscriptions
source computers, Configure event subscriptions
spanned volumes, Terms you need to know
Special Permissions permission, Share and configure a printer manually
Specify Intranet Microsoft Update Service Location policy, Windows Server Update Services
SQL Server, Explore the Application Compatibility Toolkit
SQL Server Express, Explore the Application Compatibility Toolkit
SSID (Service Set Identifier), Connect to a network, Objective review, Performance tab
SSL (Secure Sockets Layer), VPN protocols
SSTP (Secure Socket Tunneling Protocol), VPN protocols
Standard accounts, Configure User Account Control behavior
Standard User Analyzer (SUA), Explore the Application Compatibility Toolkit
startup keys, Configure BitLocker, Configure BitLocker To Go
storage area networks (SANs), Manage Storage Spaces
storage management. , Objective 4.3: Configure authentication and authorization
(see also SkyDrive)
credentials at command line, Credentials
managing disk volumes, Objective 6.2: Manage local storage
managing file system fragmentation, Manage file system fragmentation
objective summary and review, Manage Storage Spaces, Objective 6.1: Review
startup keys and, Configure BitLocker To Go
Storage Spaces, Choose the ideal Windows 8.1 edition, Manage Storage Spaces
Storage Spaces, Choose the ideal Windows 8.1 edition, Manage Storage Spaces
Store Passwords Using Reversible Encryption policy, Password policies
striped volumes, Terms you need to know
SUA (Standard User Analyzer), Explore the Application Compatibility Toolkit
subnet masks, Objective 3.1: Configure IP settings, Explore the Local Area Network Connections Properties dialog box
subscriptions, event, Configure event subscriptions
Sync Center, Configure sync options
sync options
configuring in PC Settings, Sync Center and configuring Sync Options
configuring with Sync Center, Configure sync options
configuring with Work Folders, Work Folders
described, Configure sync options
syncing folders, Objective 5.2: Configure mobility options
.sys file extension, Use Pnputil.exe to manage the Driver Store
Sysprep command, Explore the custom Windows 8.1 installation
System Center Configuration Manager (SCCM), Specify Intranet Microsoft Update Service Location
System Configuration dialog box, Startup tab, Configure System Restore and create a restore point
System Configuration tool (Msconfig.exe), Disable access using group policies, App History tab, Use Windows RE
system image backup, Configure System Restore and create a restore point, Configure File History
System Image Manager (SIM), Explore the custom Windows 8.1 installation, Explore Windows PE
System Information tool (msinfo32.exe), Perform readiness tests
System log, Configure and analyze event logs
system performance, monitoring. (see performance monitoring)
system recovery
configuring recovery drives, Perform a driver rollback
creating restore points, Configure System Restore and create a restore point
described, Configure system and data options
objective summary and review, Perform a refresh or recycle, Answers
performing driver rollback, Perform a driver rollback
performing refresh or recycle, Configure System Restore and create a restore point
System Restore, Configure System Restore and create a restore point
System Restore, Configure System Restore and create a restore point

T

Task Manager (taskmgr tool)
App History tab, App History tab
described, Disable access using group policies, Configure Task Manager
Details tab, Startup tab
opening, Configure Task Manager
Performance tab, Performance tab
Processes tab, Configure Task Manager
Services tab, Startup tab
Startup tab, App History tab
Users tab, Startup tab
taskmgr tool (Task Manager)
App History tab, App History tab
described, Disable access using group policies, Configure Task Manager
Details tab, Startup tab
opening, Configure Task Manager
Performance tab, Performance tab
Processes tab, Configure Task Manager
Services tab, Startup tab
Startup tab, App History tab
Users tab, Startup tab
TCP/IP
connection security rules, Configure Windows Firewall with Advanced Security
event log subscriptions, Configure event subscriptions
installing network support for, Explore the Local Area Network Connections Properties dialog box
Ipconfig tool and, Command-line tools
monitoring performance statistics, Performance Monitor
Netstat tool and, Command-line tools
Ping tool and, Action Center troubleshooting tools
port rules, Configure Windows Firewall with Advanced Security
shared printers and, Add a printer and configure sharing
VPN connections and, Configure VPN connections and authentication
Windows PE and, Explore Windows PE
Telnet protocol, Configure Windows Firewall
Temporal Key Integrity Protocol (TKIP), Create authenticated exceptions
test machines, setting up, Perform readiness tests, Use Pnputil.exe to manage the Driver Store
thick images, Use the Windows Easy Transfer Wizard on stand-alone workstations
thin images, Use the Windows Easy Transfer Wizard on stand-alone workstations
thin provisioning, Manage Storage Spaces
TKIP (Temporal Key Integrity Protocol), Create authenticated exceptions
tokens, Configure User Account Control behavior
toolbars, managing in IE11, Manage add-ons, toolbars, extensions, search providers, and more
touch features, minimum requirements, Choose the ideal Windows 8.1 edition
TPM (Trusted Platform Model)
BitLocker and, Use biometrics, Configure BitLocker
startup key storage, Configure BitLocker To Go
virtual smart cards, Smart cards and virtual smart cards
Windows To Go and, Install as Windows To Go and to VHD, Configure Windows To Go
trace sessions, Performance Monitor
Tracert tool, Command-line tools
tracking protection, managing in IE11, Manage add-ons, toolbars, extensions, search providers, and more
Triple DES (3DES), Objective 5.1: Configure remote connections, Authentication protocols
troubleshooting
Action Center tools, Action Center troubleshooting tools
hardware, Install and manage drivers with Device Manager
Homegroup Troubleshooter, Connect to a network
Network And Sharing Center tools, Configure name resolution
network performance, Optimize networking performance
resolving network connectivity issues, Configure name resolution
unsigned drivers, Use Device Stage
with recovery drives, Perform a driver rollback
Trusted Boot, Choose the ideal Windows 8.1 edition
Trusted Platform Model (TPM)
BitLocker and, Use biometrics, Configure BitLocker
startup key storage, Configure BitLocker To Go
virtual smart cards, Smart cards and virtual smart cards
Windows To Go and, Install as Windows To Go and to VHD, Configure Windows To Go
Trusted Publisher certificate store, No Auto-Restart With Logged On Users For Scheduled Automatic Updates Installations
Tunnel rule type, Configure connection security rules (IPsec)

U

UAC (User Account Control)
biometric devices and, Use biometrics
configuring behavior, Configure User Account Control behavior
testing issues with SUA, Explore the Application Compatibility Toolkit
UDP (User Datagram Protocol), Configure Windows Firewall, Configure Windows Firewall with Advanced Security
UEFI (Unified Extensible Firmware Interface), Use biometrics, Configure BitLocker
unicast addresses, Explore the Local Area Network Connections Properties dialog box
Unified Extensible Firmware Interface (UEFI), Use biometrics, Configure BitLocker
uninstalling device drivers, Install and manage drivers with Device Manager
unsigned drivers, Use Device Stage, Use Pnputil.exe to manage the Driver Store
Update Driver Software dialog box, Install and uninstall
upgrades and updates
automating, Use the Windows Easy Transfer Wizard on stand-alone workstations
configuring and managing updates, Monitor and maintain Windows clients
configuring update settings, Configure update settings
device drivers, Use Pnputil.exe to manage the Driver Store
from Windows 7, Choose an installation option (clean or upgrade), Perform a clean installation
from Windows 8, Choose an installation option (clean or upgrade), Upgrade from Windows 8
from Windows Vista, Choose an installation option (clean or upgrade), Upgrade from Windows 8
from Windows XP, Choose an installation option (clean or upgrade), Upgrade from Windows 8
hiding, Roll back updates
in-place, Choose the ideal Windows 8.1 edition, Perform readiness tests
managing update history, Windows Server Update Services
objective summary and review, Allow Signed Updates From An Intranet Microsoft Update Service Location, Answers
optimizing network performance, Optimize networking performance
performing manually, Objective 1.2: Install Windows 8.1
recovery drives and, Configure a recovery drive
rolling back updates, Manage update history
supported paths, Choose an installation option (clean or upgrade)
testing apps for compatibility with, Explore the Application Compatibility Toolkit
updating default apps, Objective 6.1: Configure and manage updates
updating Windows Store apps, Objective 6.1: Configure and manage updates
Windows Update, Install and manage drivers with Device Manager, Use biometrics, Monitor and maintain Windows clients, Roll back updates
User Account Control (UAC)
biometric devices and, Use biometrics
configuring behavior, Configure User Account Control behavior
testing issues with SUA, Explore the Application Compatibility Toolkit
user data
configuring, Explore USMT, Objective 1.2: Review
migrating, Objective review, Objective 1.2: Review
objective summary and review, Understand the mandatory user profile, Objective 1.2: Review
User Datagram Protocol (UDP), Configure Windows Firewall, Configure Windows Firewall with Advanced Security
user profiles
advanced sharing and, Configure network locations
described, Configure folder location
local, Explore and configure a Microsoft Account profile
mandatory, Understand the mandatory user profile
Microsoft account, Configure folder location
roaming, Understand the local user profile
user rights
configuring, Use biometrics
described, Use biometrics
permissions and, Configure user rights
User State Migration Tool (USMT), Perform manual installations and upgrades, Use the Windows Easy Transfer Wizard on stand-alone workstations, Objective 1.3: Migrate and configure user data
Users group
configuring NTFS permissions for, Permission terminology and rules
configuring user rights, Use biometrics
installing device drivers, Create a driver update policy
USMT (User State Migration Tool), Perform manual installations and upgrades, Use the Windows Easy Transfer Wizard on stand-alone workstations, Objective 1.3: Migrate and configure user data
UsmtUtils tool, Explore USMT

V

VAMT (Volume Activation Management Tool), Explore Windows PE
.vbs file extension, Objective 2.3: Control access to local hardware and applications
VDI (Virtual Desktop Infrastructure), Choose the ideal Windows 8.1 edition, Choose the ideal Windows 8.1 edition
Verbose events, Configure and analyze event logs
VHD Boot, Choose the ideal Windows 8.1 edition
VHD format, Create and configure virtual switches
VHDs (virtual hard disks)
creating and configuring, Create and configure virtual switches
differencing disks, Create and manage checkpoints
installing to, Switch between keyboards, Install as Windows To Go
VHDX format, Create and configure virtual switches
Videos folder, Share using windows powershell
Videos library, Share using windows powershell
Virtual Desktop Infrastructure (VDI), Choose the ideal Windows 8.1 edition, Choose the ideal Windows 8.1 edition
virtual hard disks (VHDs)
creating and configuring, Create and configure virtual switches
differencing disks, Create and manage checkpoints
installing to, Switch between keyboards
virtual local area networks (VLANs), Create and manage checkpoints
virtual machines (VMs)
configuring, Create a virtual machine
creating, Create and configure a virtual machine
described, Objective review
device drivers and, Create and configure virtual switches
importing, Move a virtual machine
Integration Services package, Install integration services
making changes to, Create a virtual machine
moving, Create and configure virtual disks
product IDs, Configure a virtual machine
trunk mode to, Create and manage checkpoints
VHDs and, Install as Windows To Go
virtual private networks (VPNs)
automatic app updates, Choose the ideal Windows 8.1 edition
configuring connections and authentication, Configure Remote Desktop settings
described, Configure Remote Desktop settings
protocols supported, Objective 5.1: Configure remote connections
setting up, Connect to a network
virtual smart cards, Account Lockout policies
Virtual Switch Manager, Create and configure virtual switches
virtual switches, Create and manage checkpoints
VLANs (virtual local area networks), Create and manage checkpoints
VMs (virtual machines)
configuring, Create a virtual machine
creating, Create and configure a virtual machine
described, Objective review
device drivers and, Create and configure virtual switches
importing, Move a virtual machine
Integration Services package, Install integration services
making changes to, Create a virtual machine
moving, Create and configure virtual disks
product IDs, Configure a virtual machine
trunk mode to, Create and manage checkpoints
VHDs and, Install as Windows To Go
Volume Activation Management Tool (VAMT), Explore Windows PE
volume licensing, Choose an installation option (clean or upgrade), Use the Windows Easy Transfer Wizard on stand-alone workstations
volumes, disk. (see disk volumes)
VPN Reconnect, VPN protocols, Configure VPN connections and authentication
VPNs (virtual private networks)
automatic app updates, Choose the ideal Windows 8.1 edition
configuring connections and authentication, Configure Remote Desktop settings
described, Configure Remote Desktop settings
protocols supported, Objective 5.1: Configure remote connections
setting up, Connect to a network

W

Warning events, Configure and analyze event logs
WDS (Windows Deployment Services), Use the Windows Easy Transfer Wizard on stand-alone workstations, Explore Windows PE
Web Authentication Broker, Credentials
Wecutil command, Configure event subscriptions
WET (Windows Easy Transfer), Perform manual installations and upgrades, Upgrade from Windows 8, Objective 1.3: Migrate and configure user data
.wfw file extension, Configure Windows Firewall with Advanced Security
Wi-Fi Direct, Configure Wi-Fi Direct
Wi-Fi network connections
connection process, Choose the ideal Windows 8.1 edition, Connect to a wireless network
optimizing network performance, Optimize networking performance
Wi-Fi Protected Access (WPA), Create authenticated exceptions
Windows 7
choosing installation options, Perform readiness tests
File Recovery feature, Recover files from SkyDrive
Software Restriction Policies, Configure application restrictions using Software Restriction Policies
upgrading from, Choose an installation option (clean or upgrade), Perform a clean installation
VPN protocols supported, Objective 5.1: Configure remote connections
Windows 8
recovery drives, Configure a recovery drive
saving credentials, Credentials
Software Restriction Policies, Configure application restrictions using Software Restriction Policies
upgrading from, Choose an installation option (clean or upgrade), Upgrade from Windows 8
VPN protocols supported, Objective 5.1: Configure remote connections
Windows 8.1
comparing edition features, Choose the ideal Windows 8.1 edition
described, Objective 1.1: Evaluate hardware readiness and compatibility
installing, Objective 1.2: Install Windows 8.1, Objective 1.1: Review
recovery drives, Configure a recovery drive
Start screen, Upgrade from Windows 7
unsigned drivers and, Use Device Stage
updating default apps, Objective 6.1: Configure and manage updates
upgrade paths for, Choose an installation option (clean or upgrade), Upgrade from Windows 8
VPN protocols supported, Objective 5.1: Configure remote connections
Windows 8.1 Enterprise, Choose the ideal Windows 8.1 edition, Choose an installation option (clean or upgrade)
Windows 8.1 Professional
comparing edition features, Choose the ideal Windows 8.1 edition
described, Objective 1.1: Evaluate hardware readiness and compatibility
supported upgrade paths, Choose an installation option (clean or upgrade), Upgrade from Windows 8
Windows 8.1 Upgrade Assistant, Perform readiness tests
Windows Assessment and Deployment Toolkit (ADK)
described, Use the Windows Easy Transfer Wizard on stand-alone workstations, Explore the custom Windows 8.1 installation
USMT support, Explore the User State Migration Tool
Volume Activation Management Tool, Explore Windows PE
Windows PE support, Explore the User State Migration Tool
Windows Assessment Services, Explore Windows PE
Windows Assessment Toolkit, Explore Windows PE
Windows Backup And Restore feature, Recover files from SkyDrive
Windows Biometric Framework, Smart cards and virtual smart cards
Windows clients
configuring and managing updates, Monitor and maintain Windows clients, Answers
managing local storage, Objective review, Objective 6.1: Review
monitoring system performance, Objective review, Objective 6.3: Thought experiment
objective summary and review, Chapter summary
Windows Defender, Manage update history
Windows Deployment Services (WDS), Use the Windows Easy Transfer Wizard on stand-alone workstations, Explore Windows PE
Windows Easy Transfer (WET), Perform manual installations and upgrades, Upgrade from Windows 8, Objective 1.3: Migrate and configure user data
Windows Embedded feature, Configure Assigned Access
Windows Event Collector service, Configure event subscriptions
Windows Features dialog box, Create and configure a virtual machine
Windows Firewall
allowing apps through, Allow an app through the Windows Firewall
configuring event subscriptions, Configure event subscriptions
described, Configure Windows Firewall
filtering, Configure Windows Firewall, Configure Windows Firewall with Advanced Security
monitoring, Configure Windows Firewall, Configure Windows Firewall with Advanced Security
Windows Firewall With Advanced Security
configuring, Allow an app through the Windows Firewall
configuring connection security rules, Configure connection security rules (IPsec)
configuring event subscriptions, Configure event subscriptions
Windows Firewall With Advanced Security dialog box, Configure Windows Firewall with Advanced Security
Windows Installer
installing and repairing applications, Objective 2.2: Install and configure desktop apps and Windows Store apps
rule collections, Objective 2.3: Control access to local hardware and applications
Windows PE and, Explore Windows PE
Windows Live ID. (see Microsoft account)
Windows Malicious Software Removal Tool, Manage update history
Windows Management Instrumentation (WMI), Configure BitLocker
Windows Media Player, Choose the ideal Windows 8.1 edition
Windows Network Diagnostics Wizard, Optimize networking performance
Windows PE (Windows Preinstallation Environment), Explore the User State Migration Tool
Windows Performance Toolkit (WPT), Explore Windows PE
Windows Power Management feature, Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates
Windows PowerShell. , Configure Windows Firewall with Advanced Security
(see also specific cmdlets)
creating and managing shares, Share using an MMC
creating workspaces, Create a workspace with the Create a Windows To Go Workspace Wizard
enabling Hyper-V, Objective 2.5: Configure Hyper-V
making modifications remotely, Execute commands from a command prompt
managing disk volumes, Use Diskpart
managing Storage Spaces, Manage Storage Spaces
managing System Restore, Configure System Restore and create a restore point
sideloading and, Update Windows Store apps
Windows Public Key Infrastructure (PKI), Encrypt files and folders using EFS
Windows Recovery Environment (Windows RE)
additional information, Use Windows RE
Advanced Startup and, Configure a recovery drive
Windows To Go and, Install as Windows To Go and to VHD, Configure Windows To Go
Windows Remote Assistance dialog box, Explore Remote Desktop options
Windows Remote Management (WinRM)
accessing Group Policy settings, Make modifications remotely using Windows PowerShell
configuring event subscriptions, Configure event subscriptions
enabling remote management, Make modifications remotely using an MMC
executing commands from command prompt, Make modifications remotely using an MMC
making modifications remotely with Windows PowerShell, Execute commands from a command prompt
Windows Remote Shell (WinRS.exe), Make modifications remotely using an MMC
Windows RT, Objective 1.1: Evaluate hardware readiness and compatibility, Choose the ideal Windows 8.1 edition
Windows Server 2003, Objective 5.1: Configure remote connections
Windows Server 2008, Objective 5.1: Configure remote connections
Windows Server 2012, VPN protocols
Windows Server Update Services (WSUS), Configure update settings
Windows SmartScreen, Choose the ideal Windows 8.1 edition, Use biometrics
Windows Store
automatic app updates, Choose the ideal Windows 8.1 edition
Credential Locker and, Credentials
device lockdown technology, Manage installation of and access to removable devices
installing and configuring apps, Objective 2.2: Install and configure desktop apps and Windows Store apps
managing access to, Explore the Application Compatibility Toolkit
minimum requirements, Choose the ideal Windows 8.1 edition
updating apps, Objective 6.1: Configure and manage updates
upgrade options from, Upgrade from Windows 8
Windows System Image Manager (SIM), Explore the custom Windows 8.1 installation, Explore Windows PE
Windows To Go, Switch between keyboards, Configure Wi-Fi Direct
Windows To Go Creator, Choose the ideal Windows 8.1 edition
Windows To Go Startup Options dialog box, Configure Windows To Go
Windows Update
biometric hardware support, Use biometrics
configuring policies, Roll back updates
configuring update settings, Configure update settings
described, Monitor and maintain Windows clients
installing device drivers, Install and manage drivers with Device Manager
managing update history, Windows Server Update Services
optimizing network performance, Configure event subscriptions
rolling back updates, Manage update history
Windows Upgrade Assistant, Perform readiness tests
Windows Vault, Credentials
Windows Vista
Software Restriction Policies, Configure application restrictions using Software Restriction Policies
upgrading from, Choose an installation option (clean or upgrade), Upgrade from Windows 8
VPN protocols supported, Objective 5.1: Configure remote connections
Windows Easy Transfer Wizard, Use Windows Easy Transfer
Windows XP
Software Restriction Policies, Configure application restrictions using Software Restriction Policies
upgrading from, Choose an installation option (clean or upgrade), Upgrade from Windows 8
VPN protocols supported, Objective 5.1: Configure remote connections
Windows Easy Transfer Wizard, Use Windows Easy Transfer
WinRM (Windows Remote Management)
accessing Group Policy settings, Make modifications remotely using Windows PowerShell
configuring event subscriptions, Configure event subscriptions
enabling remote management, Make modifications remotely using an MMC
executing commands from command prompt, Make modifications remotely using an MMC
making modifications remotely with Windows PowerShell, Execute commands from a command prompt
Winrm command, Configure event subscriptions
WinRS.exe (Windows Remote Shell), Make modifications remotely using an MMC
wireless devices
adding wireless printers, Add a printer and configure sharing
configuring, Configure devices
Hyper-V and, Create and configure virtual switches
resolving connectivity issues, Configure name resolution
wireless networks
connecting to, Objective review
managing preferred, Connect to a wireless network
Wireless Profile Manager, Manage preferred wireless networks
WMI (Windows Management Instrumentation), Configure BitLocker
Work Folders
additional information, Work Folders
automatic app updates, Choose the ideal Windows 8.1 edition
described, Configure sync options, Work Folders
requirements for, Work Folders
workgroups
configuring authentication in, Configure authentication in workgroups and domains
user names and passwords, Credentials
workplaces
connecting to, Connect to a network
Workplace Join feature, Choose the ideal Windows 8.1 edition
workspaces
creating with Windows PowerShell, Create a workspace with the Create a Windows To Go Workspace Wizard
creating with Windows To Go, Create a workspace with the Create a Windows To Go Workspace Wizard
WPA (Wi-Fi Protected Access), Create authenticated exceptions
WPT (Windows Performance Toolkit), Explore Windows PE
Write permission, Permission terminology and rules
WSUS (Windows Server Update Services), Configure update settings

X

X.509 standard, Certificates
XML files, Explore USMT

Z

Zero-Touch, High-Volume Deployment strategy, Use the Windows Easy Transfer Wizard on stand-alone workstations
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset