A note on the digital index A link in an index entry is displayed as the section title in which that entry appears. Because some sections have multiple index markers, it is not unusual for an entry to have several links to the same section. Clicking on any link will take you directly to the place in the text in which the marker appears.
Symbols $ (dollar sign), Any folder sharing 3-D printing support, Choose the ideal Windows 8.1 edition 32-bit operating systems device drivers and, Install and manage drivers with Device Manager in-place upgrades and, Choose the ideal Windows 8.1 edition Windows PE and, Explore the User State Migration Tool 3DES (Triple DES), Objective 5.1: Configure remote connections , Authentication protocols 64-bit operating systems clean installations and, Choose the ideal Windows 8.1 edition device drivers and, Install and manage drivers with Device Manager unsigned drivers and, Use Device Stage Windows PE and, Explore the User State Migration Tool A accelerators, managing in IE11, Manage add-ons, toolbars, extensions, search providers, and more access control configuring authentication and authorization, Objective 4.3: Configure authentication and authorization configuring file and folder access, Objective review configuring shared resources, Configure access to resources for apps, Objective 2.2: Install and configure desktop apps and Windows Store apps for hardware, Objective 2.3: Control access to local hardware and applications , Objective 2.2: Review for removable devices, Configure application restrictions using Software Restriction Policies for Windows Store, Explore the Application Compatibility Toolkit objective summary and review, Objective 2.2: Review , Objective 4.1: Review access control entries (ACEs), Permission terminology and rules access control lists (ACLs), Create and manage checkpoints Account Lockout Duration policy, Password policies Account Lockout Threshold policy, Account Lockout policies ACEs (access control entries), Permission terminology and rules ACLs (access control lists), Create and manage checkpoints ACT (Application Compatibility Toolkit), Perform readiness tests , Explore Windows PE , MSIExec ACT LOG Processing Service, Explore the Application Compatibility Toolkit Action Center installing device drivers, Install and manage drivers with Device Manager optimizing network performance, Configure event subscriptions troubleshooting tools, Action Center troubleshooting tools Active Directory Domain Services domain, Connect to a network , Configure access to resources Active Directory permissions, Objective 4.2: Configure file and folder access Add Counters dialog box, Performance Monitor Add-AppxPackage cmdlet, Update Windows Store apps address resolution, Objective 3.1: Configure IP settings , Configure network locations ADK (Assessment and Deployment Toolkit) described, Use the Windows Easy Transfer Wizard on stand-alone workstations , Explore the custom Windows 8.1 installation USMT support, Explore the User State Migration Tool Volume Activation Management Tool, Explore Windows PE Windows PE support, Explore the User State Migration Tool Administrators group backing up from command line, Configure File History configuring user rights, Use biometrics editing permissions for, Basic and advanced permissions installing device drivers, Create a driver update policy shared printers, Share and configure a printer manually tokens and, Configure User Account Control behavior Advanced Attributes dialog box, Encrypt files and folders using EFS Advanced Encryption System (AES), Create authenticated exceptions Advanced Options dialog box, Configure indexing options advanced permissions, Permission terminology and rules Advanced Properties dialog box, Enable VPN Reconnect Advanced Security Settings For dialog box, Basic and advanced permissions , Icacls.exe , Configure object access auditing advanced sharing, Configure network locations , Public folder sharing , Objective 5.2: Configure mobility options Advanced Sharing dialog box, Public folder sharing , Objective 5.2: Configure mobility options Advanced Startup additional information, Perform a refresh or recycle described, Perform a refresh or recycle installing unsigned drivers, Use Device Stage rebooting using devices, Configure Windows To Go Windows RE and, Configure a recovery drive AES (Advanced Encryption System), Create authenticated exceptions alerts for audited events, Configure object access auditing All Network profile, Configure network locations Allow permission, Public folder sharing , Share and configure a printer manually , Permission terminology and rules Always Offline mode, Objective 5.2: Configure mobility options Any folder sharing, Public folder sharing APIPA (Automatic Private IP Addressing), Objective 3.1: Configure IP settings AppData folder, Explore and configure a Microsoft Account profile Application Compatibility Manager, Explore the Application Compatibility Toolkit Application Compatibility Toolkit (ACT), Perform readiness tests , Explore Windows PE , MSIExec Application log, Configure and analyze event logs applications (apps) allowing through Windows Firewall, Allow an app through the Windows Firewall associating file types with, Objective 2.2: Install and configure desktop apps and Windows Store apps automatic updates, Choose the ideal Windows 8.1 edition , Objective 6.1: Configure and manage updates configuring, Objective 2.2: Install and configure desktop apps and Windows Store apps configuring restrictions using AppLocker, Objective 2.3: Control access to local hardware and applications configuring restrictions using Software Restriction Policies, Configure application restrictions using Software Restriction Policies installing and repairing, Objective 2.2: Install and configure desktop apps and Windows Store apps managing access to Windows Store, Explore the Application Compatibility Toolkit objective summary and review, Disable access using group policies , Objective 2.1: Review saving credentials, Credentials screen resolution and, Choose the ideal Windows 8.1 edition sideloading technique, Choose the ideal Windows 8.1 edition , Disable access using group policies , Update Windows Store apps updating Windows Store, Objective 6.1: Configure and manage updates AppLocker applying rules, Objective 2.3: Control access to local hardware and applications comparing Windows 8.1 editions, Choose the ideal Windows 8.1 edition configuring app restrictions, Objective 2.3: Control access to local hardware and applications controlling updates, Update Windows Store apps disabling access to Windows Store, Explore the Application Compatibility Toolkit .appx file extension, Disable access using group policies , Objective 2.3: Control access to local hardware and applications ARP/ND Poisoning (spoofing) protection, Create and manage checkpoints Assessment and Deployment Toolkit (ADK) described, Use the Windows Easy Transfer Wizard on stand-alone workstations , Explore the custom Windows 8.1 installation USMT support, Explore the User State Migration Tool Volume Activation Management Tool, Explore Windows PE Windows PE support, Explore the User State Migration Tool Assigned Access feature, Choose the ideal Windows 8.1 edition , Manage installation of and access to removable devices Attrib tool, Command-line tools Audit Object Access Properties dialog box, Configure object access auditing Auditing Entry For dialog box, Configure object access auditing auditing, object access, Encrypt files and folders using EFS Auditpool tool, Command-line tools authenticated exceptions, Configure connection security rules (IPsec) authentication and authorization biometrics and, Use biometrics configuring for VPNs, Configure Remote Desktop settings configuring in workgroups and domains, Configure authentication in workgroups and domains configuring User Account Control behavior, Configure User Account Control behavior configuring user rights, Use biometrics configuring virtual smart cards and biometrics, Account Lockout policies connection security rules and, Configure connection security rules (IPsec) described, Objective 4.3: Configure authentication and authorization managing credentials and certificates, Configure user rights Multifactor Authentication for BYOD support, Choose the ideal Windows 8.1 edition objective summary and review, Configure User Account Control behavior , Objective 4.2: Review protocols supporting, VPN protocols remote authentication, Objective 5.1: Configure remote connections setting up and configuring Microsoft account, Objective 4.3: Configure authentication and authorization smart cards and, Account Lockout policies Authentication Exemption rule type, Configure connection security rules (IPsec) authorization. (see authentication and authorization) Automatic Private IP Addressing (APIPA), Objective 3.1: Configure IP settings Automatic Updates policies, Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates automating installations, Use the Windows Easy Transfer Wizard on stand-alone workstations AutoPlay settings, changing, Objective 2.2: Install and configure desktop apps and Windows Store apps B backing up certificates, Certificates credentials, Credentials data, Objective 1.3: Migrate and configure user data File History feature, Configure System Restore and create a restore point , Recover files from SkyDrive from command line, Configure File History system image, Configure System Restore and create a restore point , Configure File History Backup Operator account, Configure File History Base-64 format, Certificates basic permissions, Permission terminology and rules .bat file extension, Objective 2.3: Control access to local hardware and applications BCDboot command, Install to VHD , Command-line tools biometrics, Choose the ideal Windows 8.1 edition , Smart cards and virtual smart cards BitLocker additional information, Choose the ideal Windows 8.1 edition comparing Windows 8.1 editions, Choose the ideal Windows 8.1 edition configuring, Objective 5.3: Configure security for mobile devices described, Encrypt files and folders using EFS Group Policy settings, Configure BitLocker from Control Panel TPM and, Use biometrics USMT and, Explore USMT BitLocker To Go, Choose the ideal Windows 8.1 edition , Configure BitLocker from Control Panel BranchCache, Choose the ideal Windows 8.1 edition , Create authenticated exceptions , Enable VPN Reconnect broadband tethering, Choose the ideal Windows 8.1 edition , Enable VPN Reconnect broadcast addresses, Explore the Local Area Network Connections Properties dialog box C .cat file extension, Use Pnputil.exe to manage the Driver Store Certificate Export Wizard, Encrypt files and folders using EFS , Certificates Certificate Manager (certmgr.msc), Encrypt files and folders using EFS , Credentials certificate rules, Configure application restrictions using Software Restriction Policies certificates backing up, Certificates certificate rules, Configure application restrictions using Software Restriction Policies described, Configure user rights , Credentials exporting, Encrypt files and folders using EFS , Certificates managing, Configure user rights , Credentials personal encryption, Encrypt files and folders using EFS certmgr.msc (Certificate Manager), Encrypt files and folders using EFS , Credentials Challenge-Handshake Authentication Protocol (CHAP), VPN protocols Change permission, Public folder sharing , Any folder sharing , Objective review CHAP (Challenge-Handshake Authentication Protocol), VPN protocols Check Disk tool, Monitor and maintain Windows clients , Use Diskpart checkpoints, creating and managing, Install integration services child disks, Create and manage checkpoints Chkdsk command, Use Diskpart Cipher tool, Command-line tools , Encrypt files and folders using EFS clean installations 64-bit operating systems and, Choose the ideal Windows 8.1 edition choosing, Perform readiness tests described, Objective 1.2: Install Windows 8.1 performing, Perform manual installations and upgrades Client Hyper-V comparing Windows 8.1 editions, Choose the ideal Windows 8.1 edition creating and configuring virtual disks, Create and configure virtual switches creating and configuring virtual machines, Objective 2.5: Configure Hyper-V creating and configuring virtual switches, Create and manage checkpoints creating and managing checkpoints, Install integration services described, Objective review evaluating compatibility, Perform readiness tests installing, Objective 2.5: Configure Hyper-V minimum requirements, Perform readiness tests moving virtual machines, Create and configure virtual disks objective summary and review, Move a virtual machine , Objective 2.4: Review Cmdkey tool, Credentials .cmd file extension, Objective 2.3: Control access to local hardware and applications collector computers, Configure event subscriptions collector initiated subscriptions, Configure event subscriptions command line. , Manage add-ons, toolbars, extensions, search providers, and more (see also specific tools) backing up from, Configure File History executing commands from, Make modifications remotely using an MMC managing encryption from, Encrypt files and folders using EFS sharing from, Any folder sharing storing credentials at, Credentials compatibility Application Compatibility Toolkit, Perform readiness tests , Explore Windows PE , MSIExec evaluating for hardware, Perform readiness tests Program Compatibility Troubleshooter, Perform readiness tests , Objective 2.2: Install and configure desktop apps and Windows Store apps Compatibility View (IE11), Objective 2.4: Configure Internet Explorer 11 and Internet Explorer for the desktop Compatibility View Settings dialog box, Configure Compatibility View and explore Group Policy settings compmgmt.msc (Computer Management Console) accessing Device Manager, Objective 2.1: Configure devices and device drivers making modifications remotely, Configure and use Remote Assistance shortcuts opening, Disable access using group policies System Tools node, Objective 2.1: Configure devices and device drivers viewing groups, Use biometrics Computer Management Console (compmgmt.msc) accessing Device Manager, Objective 2.1: Configure devices and device drivers accessing Disk Management, Terms you need to know accessing Event Viewer, Configure and analyze event logs making modifications remotely, Configure and use Remote Assistance shortcuts opening, Disable access using group policies System Tools node, Objective 2.1: Configure devices and device drivers viewing groups, Use biometrics .com file extension, Objective 2.3: Control access to local hardware and applications Config.xml file, Explore USMT Configure Automatic Updates policy, Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates Connect To A Workplace dialog box, Configure Remote Desktop settings connection security rules, Configure Windows Firewall with Advanced Security , Configure connection security rules (IPsec) connectivity, network. (see network connectivity) Contacts folder, Explore and configure a Microsoft Account profile Control Panel biometric devices, Use biometrics changing level of UAC, Configure User Account Control behavior configuring BitLocker, Configure BitLocker configuring BitLocker To Go, Configure BitLocker using Manage-BDE configuring update settings, Configure update settings creating Microsoft account, Set up and configure a Microsoft account Default Programs window, Objective 2.2: Install and configure desktop apps and Windows Store apps Devices And Printers window, Configure devices , Configure location-aware printing , Configure file libraries File History window, Configure System Restore and create a restore point , Recover files from SkyDrive installing Client Hyper-V, Objective 2.5: Configure Hyper-V installing Windows features, Use the Windows Easy Transfer Wizard on stand-alone workstations Program Compatibility Troubleshooter, Perform readiness tests switching power plans, Configure power policies Copype.cmd, Explore the custom Windows 8.1 installation counters, performance, Performance Monitor .crd file extension, Credentials Create A Shared Folder Wizard, Share using an MMC Create A Windows To Go Workspace Wizard, Create a workspace with the Create a Windows To Go Workspace Wizard Create Custom View dialog box, Configure and analyze event logs Credential Locker, Credentials Credential Manager, Credentials credential roaming, Credentials credentials configuring BitLocker, Configure BitLocker described, Configure user rights managing, Configure user rights personal hotspots and, Configure broadband tethering saving, Credentials storing at command line, Credentials UAC prompt and, Configure User Account Control behavior Critical events, Configure and analyze event logs Critical updates, Manage update history Cryptographic Message Syntax Standard, Certificates Cumulative Security Updates, Manage update history custom installations, Perform manual installations and upgrades , Use the Windows Easy Transfer Wizard on stand-alone workstations , Explore the custom Windows 8.1 installation Custom rule type, Configure connection security rules (IPsec) custom rules, Configure Windows Firewall with Advanced Security Custom.xml file, Explore USMT D Data Collector Sets, Performance Monitor Data Encryption Standard (DES), Objective 5.1: Configure remote connections , Authentication protocols Data Recovery Agents (DRAs), Configure BitLocker To Go DCHP scope, Explore the Local Area Network Connections Properties dialog box default gateways, Explore the Local Area Network Connections Properties dialog box Default Programs window (Control Panel), Objective 2.2: Install and configure desktop apps and Windows Store apps Deny permission, Public folder sharing , Any folder sharing , Permission terminology and rules , Basic and advanced permissions Deployment Imaging Servicing and Management (DISM), Install to VHD , Explore Windows PE , Command-line tools DER (Distinguished Encoding Rules) format, Certificates DES (Data Encryption Standard), Objective 5.1: Configure remote connections , Authentication protocols desktop apps. , Allow an app through the Windows Firewall (see also applications (apps)) accessing SkyDrive, Set up and configure SkyDrive ACT support, MSIExec configuring IE11 for, Objective 2.4: Configure Internet Explorer 11 and Internet Explorer for the desktop Desktop folder, Explore and configure a Microsoft Account profile , Share using windows powershell Desktop library, Share using windows powershell device lockdown technology, Manage installation of and access to removable devices Device Manager accessing, Objective 2.1: Configure devices and device drivers Action menu, Install and manage drivers with Device Manager biometric hardware support, Use biometrics changing views, Install and manage drivers with Device Manager described, Objective 2.1: Configure devices and device drivers determining hardware conflicts, Install and manage drivers with Device Manager disabling and rolling back drivers, Install and uninstall expanding nodes, Objective 2.1: Configure devices and device drivers File menu, Install and manage drivers with Device Manager Help menu, Install and manage drivers with Device Manager installing and uninstalling drivers, Install and manage drivers with Device Manager installing legacy hardware, Install and uninstall menus supported, Install and manage drivers with Device Manager performing driver rollback, Perform a driver rollback View menu, Install and manage drivers with Device Manager Device Stage, Use Devices and Printers devices and device drivers automatic app updates, Choose the ideal Windows 8.1 edition configuring devices, Configure devices configuring recovery drives, Perform a driver rollback creating driver update policy, Use Pnputil.exe to manage the Driver Store device lockdown technology, Manage installation of and access to removable devices driver rollback, Install and uninstall , Perform a driver rollback installing and managing drivers with Device Manager, Objective 2.1: Configure devices and device drivers managing Driver Store with Pnputil.exe, Use Pnputil.exe to manage the Driver Store managing installation and access to removable devices, Configure application restrictions using Software Restriction Policies objective summary and review, Create a driver update policy , Answers virtual machines and, Create and configure virtual switches Devices And Printers window (Control Panel) adding printers, Configure file libraries configuring devices, Configure devices configuring location-aware printing, Configure location-aware printing DHCP (Dynamic Host Configuration Protocol), Objective 3.1: Configure IP settings , Explore the Local Area Network Connections Properties dialog box , Configure name resolution DHCP Guard Protection, Create and manage checkpoints differencing disks, Create and manage checkpoints digital signatures, Use Device Stage DirectAccess, Choose the ideal Windows 8.1 edition , Create authenticated exceptions , Enable VPN Reconnect Disable Inheritance button, Basic and advanced permissions , Basic and advanced permissions Disable-ComputerRestore cmdlet, Configure System Restore and create a restore point Disk Cleanup tool, Monitor and maintain Windows clients , Use Diskpart Disk Defragmenter tool, Monitor and maintain Windows clients , Manage file system fragmentation Disk Management (diskmgmt.msc) creating multiboot systems, Perform manual installations and upgrades described, Monitor and maintain Windows clients , Terms you need to know installing to VHDs, Install as Windows To Go shortcuts opening, Disable access using group policies disk quotas, Icacls.exe disk space. (see hard disk space) disk volumes. , Perform manual installations and upgrades (see also Disk Management (diskmgmt.msc)) Check Disk tool, Monitor and maintain Windows clients , Use Diskpart common terminology, Objective 6.2: Manage local storage creating, Use Disk Management Disk Cleanup tool, Monitor and maintain Windows clients , Use Diskpart DiskPart command, Command-line tools , Use Disk Management types supported, Terms you need to know viewing options for, Use Disk Management diskmgmt.msc (Disk Management) creating multiboot systems, Perform manual installations and upgrades described, Monitor and maintain Windows clients , Terms you need to know installing to VHDs, Install as Windows To Go shortcuts opening, Disable access using group policies DiskPart command, Command-line tools , Use Disk Management DISM (Deployment Imaging Servicing and Management), Install to VHD , Explore Windows PE , Command-line tools Distinguished Encoding Rules (DER) format, Certificates DLL (dynamic link library), Use Pnputil.exe to manage the Driver Store , Configure application restrictions using AppLocker DNS (Domain Name System) described, Explore the Local Area Network Connections Properties dialog box name/address resolution and, Objective 3.1: Configure IP settings , Configure network locations performance monitoring, Performance tab port number filtering, Configure Windows Firewall Documents folder, Share using windows powershell Documents library, Share using windows powershell dollar sign ($), Any folder sharing Domain Name System (DNS) described, Explore the Local Area Network Connections Properties dialog box name/address resolution and, Objective 3.1: Configure IP settings , Configure network locations performance monitoring, Performance tab port number filtering, Configure Windows Firewall Domain profile, Configure Windows Firewall with Advanced Security domains configuring authentication in, Configure authentication in workgroups and domains credentials and, Credentials Domain Join feature, Choose the ideal Windows 8.1 edition evaluating readiness in, Perform readiness tests Microsoft account in, Set up and configure a Microsoft account Download Manager (IE11), Configure Download Manager Downloads folder, Understand the local user profile , Share using windows powershell Downloads library, Share using windows powershell DRAs (Data Recovery Agents), Configure BitLocker To Go Driver Store, Use Pnputil.exe to manage the Driver Store Dynamic Host Configuration Protocol (DHCP), Objective 3.1: Configure IP settings , Explore the Local Area Network Connections Properties dialog box , Configure name resolution dynamic link library (DLL), Use Pnputil.exe to manage the Driver Store , Configure application restrictions using AppLocker E EAP (Extensible Authentication Protocol), Objective 5.1: Configure remote connections EAP-MSCHAPv3, VPN protocols EAP-TLS (Extensible Authentication Protocol-Transport Layer Security), VPN protocols Echo Request messages (ICMP), Action Center troubleshooting tools EFI (Extensible Firmware Interface) boot partitioning, Objective 6.2: Manage local storage EFS (Encrypting File System), Encrypt files and folders using EFS , Objective 5.3: Configure security for mobile devices elevated privileges, Configure User Account Control behavior Enable-ComputerRestore cmdlet, Configure System Restore and create a restore point Enable-WindowsOptionalFeature cmdlet, Objective 2.5: Configure Hyper-V Encrypting File System (EFS), Encrypt files and folders using EFS , Objective 5.3: Configure security for mobile devices encryption AES support, Create authenticated exceptions automatic app updates, Choose the ideal Windows 8.1 edition DES support, Objective 5.1: Configure remote connections , Authentication protocols EFS support, Encrypt files and folders using EFS , Objective 5.3: Configure security for mobile devices FAT32 file system and, Objective review , Encrypt files and folders using EFS managing from command line, Encrypt files and folders using EFS personal encryption certificates, Encrypt files and folders using EFS reversible, Password policies Store Passwords Using Reversible Encryption policy, Password policies Enforce Password History policy, Password policies Error events, Configure and analyze event logs Ethernet network connections, Connect to a wireless network , Configure event subscriptions evaluating hardware readiness and compatibility choosing ideal Windows 8.1 edition, Objective 1.1: Evaluate hardware readiness and compatibility choosing installation options, Perform readiness tests cost considerations, Perform readiness tests objective summary and review, Choose an installation option (clean or upgrade) , Answers performing readiness tests, Choose the ideal Windows 8.1 edition event logs, Configure and analyze event logs event subscriptions, Configure event subscriptions event trace data, Performance Monitor Event Trace Sessions, Performance Monitor Event Viewer (eventvwr.msc) configuring and analyzing event logs, Configure and analyze event logs configuring event subscriptions, Configure event subscriptions creating custom views in, Configure and analyze event logs object access auditing and, Configure object access auditing , Configure object access auditing shortcuts opening, Disable access using group policies events, audited, Configure object access auditing eventvwr.msc (Event Viewer) configuring and analyzing event logs, Configure and analyze event logs configuring event subscriptions, Configure event subscriptions creating custom views in, Configure and analyze event logs object access auditing and, Configure object access auditing , Configure object access auditing shortcuts opening, Disable access using group policies Everyone group, Any folder sharing , Share and configure a printer manually Exchange ActiveSync, Choose the ideal Windows 8.1 edition .exe file extension, Objective 2.3: Control access to local hardware and applications exFAT file system, Configure BitLocker using Manage-BDE , Terms you need to know explicit permissions, Permission terminology and rules , Basic and advanced permissions exporting certificates, Encrypt files and folders using EFS , Certificates extended partitions, Objective 6.2: Manage local storage Extensible Authentication Protocol (EAP), Objective 5.1: Configure remote connections Extensible Authentication Protocol-Transport Layer Security (EAP-TLS), VPN protocols Extensible Firmware Interface (EFI) boot partitioning, Objective 6.2: Manage local storage extensions, managing in IE11, Manage add-ons, toolbars, extensions, search providers, and more external virtual switches, Create and manage checkpoints F Family Safety feature, Choose the ideal Windows 8.1 edition FAT file system configuring BitLocker To Go, Configure BitLocker using Manage-BDE converting partitions, Use Diskpart disk quotas and, Objective review , Icacls.exe disk volumes and, Terms you need to know encrypting files and folders and, Objective review , Encrypt files and folders using EFS Fsutil tool and, Use Disk Management NTFS permission inheritance and, Basic and advanced permissions object access auditing and, Objective review securing network resources, Any folder sharing FAT32 file system configuring BitLocker To Go, Configure BitLocker using Manage-BDE disk quotas and, Objective review disk volumes and, Terms you need to know encrypting files and folders and, Objective review , Encrypt files and folders using EFS Fsutil tool and, Use Disk Management NTFS permission inheritance and, Basic and advanced permissions object access auditing and, Objective review securing network resources, Any folder sharing Favorites folder, Understand the local user profile Fdisk command, Command-line tools features (Windows), installing, Use the Windows Easy Transfer Wizard on stand-alone workstations FhManagew.exe tool, Configure File History file and folder management. , Permission terminology and rules (see also permissions) associating file types with apps, Objective 2.2: Install and configure desktop apps and Windows Store apps configuring disk quotas, Icacls.exe configuring file libraries, Share using windows powershell configuring file recovery, Objective review configuring mobility options, Objective review configuring object access auditing, Encrypt files and folders using EFS configuring shared folder permissions, Configure HomeGroup settings encryption using EFS, Encrypt files and folders using EFS , Objective 5.3: Configure security for mobile devices executable file rule collections, Objective 2.3: Control access to local hardware and applications folder redirection, Explore USMT managing file system fragmentation, Manage file system fragmentation managing file types with AppLocker, Configure application restrictions using AppLocker objective summary and review, Configure object access auditing , Objective 4.1: Review offline file policies, Objective 5.2: Configure mobility options syncing files, Configure offline file policies syncing folders, Objective 5.2: Configure mobility options File Explorer configuring disk quotas, Configure disk quotas Share tab, Configure HomeGroup settings showing libraries in, Share using windows powershell syncing folders, Objective 5.2: Configure mobility options file hash rules, Configure application restrictions using AppLocker File History feature, Configure System Restore and create a restore point , Recover files from SkyDrive file recovery described, Objective review File History and, Configure System Restore and create a restore point , Recover files from SkyDrive objective summary and review, Objective summary , Objective 7.1: Review restoring previous versions of files and folders, Restore previous versions of files and folders SkyDrive support, Objective review File Signature Verification tool (Sigverif.exe), Use Device Stage , Disable access using group policies file systems. , Use Diskpart (see also specific file systems) converting partitions between, Use Diskpart managing fragmentation, Manage file system fragmentation File Transfer Protocol (FTP), Configure Windows Firewall file types associating with programs, Objective 2.2: Install and configure desktop apps and Windows Store apps managing with AppLocker, Configure application restrictions using AppLocker filtering, Windows Firewall, Configure Windows Firewall , Configure Windows Firewall with Advanced Security firewalls. (see Windows Firewall; Windows Firewall With Advanced Security) folder redirection, Explore USMT folders. (see file and folder management) Format-Volume cmdlet, Use Diskpart Forwarded Events log, Configure and analyze event logs FQDNs (fully qualified domain names), Specify Intranet Microsoft Update Service Location fragmentation, file system, Manage file system fragmentation Fsutil tool, Command-line tools , Configure disk quotas , Use Disk Management FTP (File Transfer Protocol), Configure Windows Firewall Full Control permission, Public folder sharing , Any folder sharing , Objective review , Permission terminology and rules fully qualified domain names (FQDNs), Specify Intranet Microsoft Update Service Location G Get-AppxPackage cmdlet, Update Windows Store apps Get-ComputerRestorePoint cmdlet, Configure System Restore and create a restore point Get-SmbShare cmdlet, Share using an MMC gpedit.msc (Group Policy Editor) accessing removable device policies, Configure application restrictions using Software Restriction Policies AppLocker rules, Objective 2.3: Control access to local hardware and applications biometrics settings, Use biometrics disabling access to Windows Store, Disable access using Group Policy Editor Software Restriction Policies, Configure application restrictions using Software Restriction Policies GPMC (Group Policy Management Console) disabling Windows Store access, Disable access using Group Policy Editor enabling Always Offline mode, Configure offline file policies managing smart cards, Account Lockout policies GPT (GUID Partition Table), Use biometrics , Objective 6.2: Manage local storage Grant-SmbShareAccess cmdlet, Share using an MMC graphics adapters, minimum requirements, Choose the ideal Windows 8.1 edition , Perform readiness tests Group Policy app update settings, Objective 6.1: Configure and manage updates biometric hardware, Use biometrics BitLocker settings, Configure BitLocker from Control Panel BitLocker To Go settings, Configure BitLocker from Control Panel comparing Windows 8.1 editions, Choose the ideal Windows 8.1 edition described, Upgrade from Windows 8 driver update policy, Create a driver update policy event forwarding setting, Configure event subscriptions File History settings, Configure File History forced reboots, Configure application restrictions using AppLocker InPrivate Browsing settings, Configure security and privacy settings Internet Explorer 11 settings, Configure Compatibility View and explore Group Policy settings Microsoft account and, Set up and configure a Microsoft account Offline Files, Configure offline file policies password creation, Configure authentication in workgroups and domains power policies, Create power policies , Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates remote management and, Make modifications remotely using an MMC sideloading technique, Disable access using group policies Windows Store access, Explore the Application Compatibility Toolkit Windows To Go settings, Configure Windows To Go Windows Update settings, Roll back updates WinRM settings, Make modifications remotely using Windows PowerShell WSUS server, Windows Server Update Services Group Policy Editor (gpedit.msc) accessing removable device policies, Configure application restrictions using Software Restriction Policies AppLocker rules, Objective 2.3: Control access to local hardware and applications biometrics settings, Use biometrics disabling access to Windows Store, Disable access using Group Policy Editor Software Restriction Policies, Configure application restrictions using Software Restriction Policies Group Policy Management Console (GPMC) disabling Windows Store access, Disable access using Group Policy Editor enabling Always Offline mode, Configure offline file policies managing smart cards, Account Lockout policies Guest Or Public profile, Configure network locations Guests group, Use biometrics GUID Partition Table (GPT), Use biometrics , Objective 6.2: Manage local storage H hard disk space configuring disk quotas, Icacls.exe managing disk volumes, Objective 6.2: Manage local storage minimum requirements, Choose the ideal Windows 8.1 edition , Perform readiness tests hardware. , Choose the ideal Windows 8.1 edition (see also devices and device drivers) configuring Hyper-V, Objective review , Objective 2.4: Review configuring Internet Explorer for desktop, Objective 2.4: Configure Internet Explorer 11 and Internet Explorer for the desktop , Objective 2.3 Review controlling access to, Objective 2.3: Control access to local hardware and applications , Objective 2.2: Review evaluating compatibility, Perform readiness tests evaluating readiness, Objective 1.1: Evaluate hardware readiness and compatibility , Answers hard disk space, Choose the ideal Windows 8.1 edition , Perform readiness tests , Icacls.exe , Objective 6.2: Manage local storage installing and configuring apps, Objective 2.2: Install and configure desktop apps and Windows Store apps , Objective 2.1: Review installing legacy, Install and uninstall minimum requirements, Choose the ideal Windows 8.1 edition Homegroup Troubleshooter, Connect to a network homegroups configuring settings, Objective 4.1: Configure shared resources Homegroup Troubleshooter, Connect to a network shared printers and, Configure file libraries user names and passwords, Credentials HomeUsers group, Permission terminology and rules , Use biometrics hosted networks, Configure Wi-Fi Direct HTTP (Hypertext Transfer Protocol), Configure Windows Firewall , Configure event subscriptions HTTP Secure (HTTPS), Configure Windows Firewall , Configure event subscriptions HTTPS (HTTP Secure), Configure Windows Firewall , Configure event subscriptions Hyper-V Administrators group, Use biometrics Hyper-V Manager creating and configuring virtual switches, Create and configure virtual switches creating and managing checkpoints, Install integration services creating virtual disks, Create and configure virtual disks creating virtual machines, Create and configure a virtual machine moving virtual machines, Create and configure virtual disks Hyper-V. , Choose the ideal Windows 8.1 edition (see also Client Hyper-V) creating and configuring virtual disks, Create and configure virtual switches creating and configuring virtual machines, Objective 2.5: Configure Hyper-V creating and configuring virtual switches, Create and manage checkpoints creating and managing checkpoints, Install integration services described, Objective review Integration Services package, Install integration services moving virtual machines, Create and configure virtual disks objective summary and review, Move a virtual machine , Objective 2.4: Review Hypertext Transfer Protocol (HTTP), Configure Windows Firewall , Configure event subscriptions hypervisors, Explore Windows PE , Objective review I Icacls tool, Command-line tools , Icacls.exe ICM (Invoke-Command cmdlet), Make modifications remotely using Windows PowerShell ICMP (Internet Control Message Protocol), Action Center troubleshooting tools IKE (Internet Key Exchange), Objective 5.1: Configure remote connections IMAP (Internet Message Access Protocol), Configure Windows Firewall Import Virtual Machine Wizard, Move a virtual machine import-module.appx, Disable access using group policies Important updates, Manage update history importing virtual machines, Move a virtual machine in-place upgrades, Choose the ideal Windows 8.1 edition , Perform readiness tests inbound rules, Configure Windows Firewall with Advanced Security , Configure connection security rules (IPsec) Indexing Options dialog box, Monitor system resources Information events, Configure and analyze event logs .inf file extension, Use Pnputil.exe to manage the Driver Store inherited permissions, Permission terminology and rules , Basic and advanced permissions InPrivate Browsing, Configure security and privacy settings installing device drivers, Install and manage drivers with Device Manager installing Windows 8.1 custom installations, Perform manual installations and upgrades , Use the Windows Easy Transfer Wizard on stand-alone workstations , Explore the custom Windows 8.1 installation described, Objective 1.2: Install Windows 8.1 installation options, Perform readiness tests installing additional Windows features, Use the Windows Easy Transfer Wizard on stand-alone workstations installing as Windows To Go, Switch between keyboards installing to VHD, Install as Windows To Go migrating from previous versions of Windows, Upgrade from Windows 8 objective summary and review, Explore the custom Windows 8.1 installation , Objective 1.1: Review performing clean installations, Perform manual installations and upgrades performing manual installations and upgrades, Objective 1.2: Install Windows 8.1 upgrading from Windows 7, Choose an installation option (clean or upgrade) , Perform a clean installation upgrading from Windows 8, Choose an installation option (clean or upgrade) , Upgrade from Windows 8 upgrading from Windows Vista, Choose an installation option (clean or upgrade) , Upgrade from Windows 8 upgrading from Windows XP, Choose an installation option (clean or upgrade) , Upgrade from Windows 8 InstantGo feature, Choose the ideal Windows 8.1 edition Integration Services package, Install integration services internal virtual switches, Create and configure virtual switches Internet Control Message Protocol (ICMP), Action Center troubleshooting tools Internet Explorer 11 automatic app updates, Choose the ideal Windows 8.1 edition Compatibility Test Tool, Explore the Application Compatibility Toolkit configuring Compatibility View, Objective 2.4: Configure Internet Explorer 11 and Internet Explorer for the desktop configuring Download Manager, Configure Download Manager configuring security and privacy settings, Configure Compatibility View and explore Group Policy settings Group Policy settings, Configure Compatibility View and explore Group Policy settings Manage Add-On dialog box, Manage add-ons, toolbars, extensions, search providers, and more objective summary and review, Objective 2.3 Review Internet Key Exchange (IKE), Objective 5.1: Configure remote connections Internet Message Access Protocol (IMAP), Configure Windows Firewall Internet Options dialog box, Configure Compatibility View and explore Group Policy settings , Manage add-ons, toolbars, extensions, search providers, and more Internet service providers (ISPs), Objective 3.1: Configure IP settings Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX), Explore Windows PE Invoke-Command cmdlet (ICM), Make modifications remotely using Windows PowerShell IP addresses configuring devices, Configure devices configuring name resolution, Configure network locations configuring network locations, Connect to a network configuring settings, Configure network connectivity connecting to networks, Connect to a network Local Area Network Connection Properties dialog box, Explore the Local Area Network Connections Properties dialog box objective summary and review, Command-line tools , Answers Port Access Control Lists and, Create and manage checkpoints resolving connectivity issues, Configure name resolution viewing, Configure name resolution Windows Firewall filtering, Configure Windows Firewall Ipconfig tool, Command-line tools IPsec (IP Security extension) benefits of, Configure connection security rules (IPsec) configuring connection security rules, Configure connection security rules (IPsec) L2TP support, Objective 5.1: Configure remote connections Windows Firewall With Advanced Security and, Configure Windows Firewall with Advanced Security , Configure Windows Firewall with Advanced Security IPv4 addresses, Explore the Local Area Network Connections Properties dialog box IPv6 addresses, Explore the Local Area Network Connections Properties dialog box , Objective 4.1: Configure shared resources IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange), Explore Windows PE Isolation rule type, Configure connection security rules (IPsec) ISPs (Internet service providers), Objective 3.1: Configure IP settings L L2TP (Layer 2 Tunneling Protocol), Objective 5.1: Configure remote connections , Authentication protocols languages adding, Install additional features adding keyboard layout for, Switch between keyboards changing display language, Download and install language packs downloading and installing language packs, Download and install language packs switching between keyboards, Switch between keyboards Layer 2 Tunneling Protocol (L2TP), Objective 5.1: Configure remote connections , Authentication protocols legacy hardware, installing, Install and uninstall licensing, volume, Choose an installation option (clean or upgrade) , Use the Windows Easy Transfer Wizard on stand-alone workstations Links folder, Understand the local user profile List Folder Contents permission, Permission terminology and rules Lite-Touch, High-Volume Deployment strategy, Use the Windows Easy Transfer Wizard on stand-alone workstations LoadState command, Explore the User State Migration Tool , Explore USMT Local Area Network Connections Properties dialog box, Explore the Local Area Network Connections Properties dialog box Local Group Policy Editor accessing, Disable access using group policies configuring biometrics, Use biometrics configuring BitLocker, Configure BitLocker configuring IE11 settings, Configure security and privacy settings configuring Windows Update settings, Roll back updates controlling driver installation, Create a driver update policy creating power policies, Create power policies disabling Windows Store access, Explore the Application Compatibility Toolkit object access auditing, Configure object access auditing Windows To Go settings, Configure Windows To Go Local Security Policy Account Lockout policies, Password policies creating password policies, Configure authentication in workgroups and domains defining UAC configuration, Configure User Account Control behavior local security settings, Use biometrics viewing user rights, Use biometrics Local Security Settings (secpol.msc), Disable access using group policies , Configure authentication in workgroups and domains LOCAL SERVICE group, Use biometrics local storage described, Objective review managing disk volumes, Objective 6.2: Manage local storage managing file system fragmentation, Manage file system fragmentation objective summary and review, Manage Storage Spaces , Objective 6.1: Review Storage Spaces, Choose the ideal Windows 8.1 edition , Manage Storage Spaces local user profiles, Explore and configure a Microsoft Account profile location-aware printing, Manage preferred wireless networks logs, event, Configure and analyze event logs M MAC addresses, Configure devices , Create and manage checkpoints Malicious Software Removal Tool, Manage update history Manage Add-On dialog box, Manage add-ons, toolbars, extensions, search providers, and more Manage Documents permission, Add a printer and configure sharing Manage This Printer permission, Add a printer and configure sharing Manage-BDE, Configure BitLocker from Control Panel mandatory user profiles, Understand the mandatory user profile manual installations and upgrades, Objective 1.2: Install Windows 8.1 Master Boot Record (MBR), Objective 6.2: Manage local storage Maximum Password Age policy, Password policies MBR (Master Boot Record), Objective 6.2: Manage local storage MDT (Microsoft Deployment Toolkit), Use the Windows Easy Transfer Wizard on stand-alone workstations , Explore USMT Media Center, Install additional Windows features Media Player, Choose the ideal Windows 8.1 edition memory management minimum requirements, Choose the ideal Windows 8.1 edition , Perform readiness tests optimizing network performance, Configure event subscriptions metered connections, Install and uninstall Microsoft account accessing SkyDrive data, Share and configure a printer manually credentials and, Credentials described, Configure folder location minimum requirements, Choose the ideal Windows 8.1 edition setting up and configuring, Objective 4.3: Configure authentication and authorization syncing, Configure folder location Microsoft Application Virtualization software (MS App-V), Perform readiness tests Microsoft Challenge Handshake Authentication Protocol (MS-CHAP), Objective 5.1: Configure remote connections Microsoft Deployment Toolkit (MDT), Use the Windows Easy Transfer Wizard on stand-alone workstations , Explore USMT Microsoft Management Consoles (MMCs) Certificate Manager, Encrypt files and folders using EFS , Credentials Local Security Policy, Configure authentication in workgroups and domains making modifications remotely, Configure and use Remote Assistance Shared Folders, Share using an MMC Microsoft SQL Server, Explore the Application Compatibility Toolkit Microsoft SQL Server Express, Explore the Application Compatibility Toolkit MigApp.xml file, Explore USMT MigDocs.xml file, Explore USMT migrating from previous versions of Windows, Upgrade from Windows 8 user data, Objective review , Understand the mandatory user profile , Objective 1.2: Review MigUser.xml file, Explore USMT migwiz. (see WET (Windows Easy Transfer)) Minimum Password Age policy, Password policies Minimum Password Length policy, Password policies MiraCast Wireless Display standard, Choose the ideal Windows 8.1 edition mirror storage spaces, Manage Storage Spaces mirrored volumes, Terms you need to know MMCs (Microsoft Management Consoles) Certificate Manager, Encrypt files and folders using EFS , Credentials Local Security Policy, Configure authentication in workgroups and domains making modifications remotely, Configure and use Remote Assistance Shared Folders snap-in, Share using an MMC mobile devices configuring BitLocker, Objective 5.3: Configure security for mobile devices configuring security for, Objective 5.3: Configure security for mobile devices , Objective 5.2: Review mobile broadband network connections, Choose the ideal Windows 8.1 edition , Connect to a wireless network , Enable VPN Reconnect personal hotspots, Choose the ideal Windows 8.1 edition , Enable VPN Reconnect mobility options configuring Offline Files policies, Objective 5.2: Configure mobility options configuring power policies, Configure power policies configuring sync options, Configure sync options configuring Wi-Fi Direct, Configure Wi-Fi Direct configuring Windows To Go, Configure Wi-Fi Direct described, Objective review Modify permission, Permission terminology and rules monitoring resources, Monitor system resources system performance, Objective review , Objective 6.3: Thought experiment Windows Firewall, Configure Windows Firewall , Configure Windows Firewall with Advanced Security Move Folder dialog box, Configure folder location MS App-V (Microsoft Application Virtualization software), Perform readiness tests MS-CHAP (Microsoft Challenge Handshake Authentication Protocol), Objective 5.1: Configure remote connections Msconfig tool (System Configuration tool), Disable access using group policies , App History tab , Use Windows RE .msi file extension, Objective 2.3: Control access to local hardware and applications MSIExec command. (see Windows Installer) msinfo32.exe (System Information tool), Perform readiness tests .msp file extension, Objective 2.3: Control access to local hardware and applications .mst file extension, Objective 2.3: Control access to local hardware and applications mstsc.exe. (see Remote Desktop Connection dialog box) multicast addresses, Explore the Local Area Network Connections Properties dialog box Music folder, Share using windows powershell Music library, Share using windows powershell My Documents folder, Understand the local user profile My Music folder, Understand the local user profile My Pictures folder, Understand the local user profile My Videos folder, Understand the local user profile N name resolution, Objective 3.1: Configure IP settings , Configure network locations NAP (Network Access Protection), Enable VPN Reconnect NAT (Network Address Translation), Objective 3.1: Configure IP settings native-boot VHDs, Install as Windows To Go Near Field Communication (NFC), Share and configure a printer manually net share command, Any folder sharing Netsh tool configuring IP addresses, Explore the Local Area Network Connections Properties dialog box described, Command-line tools forgetting networks, Manage preferred wireless networks pairing compatible devices, Configure Wi-Fi Direct Netstat tool, Command-line tools Network Access Protection (NAP), Enable VPN Reconnect network adapters, configuring, Configure location-aware printing Network Address Translation (NAT), Objective 3.1: Configure IP settings Network And Sharing Center accessing network adapters, Configure location-aware printing advanced sharing, Configure network locations configuring Network Discovery, Configure Network Discovery creating and joining homegroups, Objective 4.1: Configure shared resources creating VPNs, Configure Remote Desktop settings Public folder sharing, Configure HomeGroup settings troubleshooting tools, Configure name resolution viewing connection status, Configure name resolution Network And Sharing Wizard, Connect to a network network connectivity configuring and maintaining network security, Objective review configuring IP settings, Configure network connectivity , Answers configuring location-aware printing, Manage preferred wireless networks configuring network adapters, Configure location-aware printing configuring remote connections, Configure remote access and mobility , Answers configuring remote management, Objective review , Objective 3.3: Review connecting to wireless networks, Objective review connectivity options, Connect to a network forgetting connections, Manage preferred wireless networks managing preferred wireless networks, Connect to a wireless network objective summary and review, Answers optimizing network performance, Configure event subscriptions resolving issues, Configure name resolution troubleshooting, Optimize networking performance viewing status, Configure name resolution Network Discovery, Objective review network interface cards (NICs), Create and manage checkpoints , Configure location-aware printing Network List service, Configure location-aware printing Network Location Awareness service, Configure location-aware printing network locations, configuring, Connect to a network network traffic monitoring, Create and manage checkpoints network zone rules, Configure application restrictions using Software Restriction Policies New Inbound Rule Wizard, Configure Windows Firewall with Advanced Security New Simple Volume Wizard, Use Disk Management New Technology File System (NTFS) configuring BitLocker To Go, Configure BitLocker using Manage-BDE configuring disk quotas, Icacls.exe configuring object access auditing, Encrypt files and folders using EFS configuring permissions, Public folder sharing , Objective 4.2: Configure file and folder access converting partitions, Use Diskpart disk volumes and, Terms you need to know encryption using EFS, Encrypt files and folders using EFS Fsutil tool and, Use Disk Management objective summary and review, Configure object access auditing , Objective 4.1: Review New Virtual Machine Wizard, Create a virtual machine New-Partition cmdlet, Use Diskpart New-SmbShare cmdlet, Share using an MMC NFC (Near Field Communication), Share and configure a printer manually NICs (network interface cards), Create and manage checkpoints , Configure location-aware printing notifications, update, Specify Intranet Microsoft Update Service Location Nslookup tool, Command-line tools NTFS (New Technology File System) configuring BitLocker To Go, Configure BitLocker using Manage-BDE configuring disk quotas, Icacls.exe configuring object access auditing, Encrypt files and folders using EFS configuring permissions, Public folder sharing , Objective 4.2: Configure file and folder access converting partitions, Use Diskpart disk volumes and, Terms you need to know encryption using EFS, Encrypt files and folders using EFS Fsutil tool and, Use Disk Management objective summary and review, Configure object access auditing , Objective 4.1: Review NTFS permissions basic and advanced permissions, Permission terminology and rules configuring, Objective 4.2: Configure file and folder access described, Public folder sharing , Objective review moving and copying, Basic and advanced permissions Share permissions and, Any folder sharing , Objective review , Permission terminology and rules O object access auditing, Encrypt files and folders using EFS .ocx file extension, Configure application restrictions using AppLocker Offline Files dialog box, Configure sync options Offline Files policies, Objective 5.2: Configure mobility options Offline mode, Objective 5.2: Configure mobility options Offline Settings dialog box, Objective 5.2: Configure mobility options Offline.xml file, Explore USMT OneDrive. (see SkyDrive) Optional updates, Manage update history Oscdimg.exe tool, Explore the custom Windows 8.1 installation , Explore Windows PE outbound rules, Configure Windows Firewall with Advanced Security , Configure connection security rules (IPsec) P packaged apps, rule collections, Objective 2.3: Control access to local hardware and applications PAP (Password Authentication Protocol), VPN protocols parent disks, Create and manage checkpoints parity storage spaces, Manage Storage Spaces partitions common terminology, Objective 6.2: Manage local storage converting between file systems, Use Diskpart EFI, Objective 6.2: Manage local storage multiboot systems and, Perform manual installations and upgrades shrinking, Use Disk Management viewing options for, Use Disk Management Password Authentication Protocol (PAP), VPN protocols Password Must Meet Complexity Requirements policy, Password policies password protected sharing, Share and configure a printer manually passwords Account Lockout policies, Password policies creating password policies, Configure authentication in workgroups and domains managing, Credentials password protected sharing, Share and configure a printer manually protecting authentication and, Configure authentication in workgroups and domains startup key storage and, Configure BitLocker To Go path rules, Configure application restrictions using AppLocker PC Settings configuring sync options in, Sync Center and configuring Sync Options switching from local to Microsoft account, Set up and configure a Microsoft account viewing update settings, Configure update settings PCL (printer control language), Share and configure a printer manually PEAP (Protected Extensible Authentication Protocol), Objective 5.1: Configure remote connections perfmon.msc (Performance Monitor), Disable access using group policies , Performance Monitor performance counters, Performance Monitor Performance Monitor (perfmon.msc), Disable access using group policies , Performance Monitor performance monitoring described, Objective review event logs, Configure indexing options event subscriptions, Configure event subscriptions indexing options, Monitor system resources networking performance, Configure event subscriptions objective summary and review, Performance Monitor , Objective 6.3: Thought experiment system resources, Monitor system resources Task Manager, Disable access using group policies , Configure Task Manager Permissions Entry For dialog box, Basic and advanced permissions Permissions For dialog box, Objective 4.2: Configure file and folder access permissions. , Permission terminology and rules (see also NTFS permissions; Share permissions) ACT LOG Processing Service, Explore the Application Compatibility Toolkit assigning, Share and configure a printer manually configuring for homegroups, Objective 4.1: Configure shared resources configuring for shared folders, Configure HomeGroup settings inheritance, Permission terminology and rules , Basic and advanced permissions terminology and rules, Objective 4.2: Configure file and folder access user rights and, Configure user rights personal encryption certificates, Encrypt files and folders using EFS personal hotspots, Enable VPN Reconnect Personal Identity Verification (PIV) standard, Account Lockout policies Personal Information Exchange (PFX) format, Certificates PFX (Personal Information Exchange) format, Certificates Pictures folder, Share using windows powershell Pictures library, Share using windows powershell PID (Process ID), Monitor system resources Ping tool, Configure network locations , Action Center troubleshooting tools PIV (Personal Identity Verification) standard, Account Lockout policies PKCS #12 format, Certificates PKCS #7 format, Certificates PKI (Public Key Infrastructure), Encrypt files and folders using EFS Pnputil.exe tool, Install and uninstall , Use Pnputil.exe to manage the Driver Store Point-to-Point Protocol (PPP), Objective 5.1: Configure remote connections , Authentication protocols Point-to-Point Tunneling Protocol (PPTP), Objective 5.1: Configure remote connections , Authentication protocols POP3 (Post Office Protocol 3), Configure Windows Firewall Port Access Control Lists (ACLs), Create and manage checkpoints port numbers, firewall filtering, Configure Windows Firewall port rules, Configure Windows Firewall with Advanced Security Post Office Protocol 3 (POP3), Configure Windows Firewall Power Management feature, Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates power policies, Configure power policies , Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates Powercfg.exe tool, Configure power policies PPP (Point-to-Point Protocol), Objective 5.1: Configure remote connections , Authentication protocols PPTP (Point-to-Point Tunneling Protocol), Objective 5.1: Configure remote connections , Authentication protocols predefined rules, Configure Windows Firewall with Advanced Security primary partitions, Objective 6.2: Manage local storage print devices, Share and configure a printer manually Print permission, Add a printer and configure sharing print servers, Share and configure a printer manually printer control language (PCL), Share and configure a printer manually printer pool, Share and configure a printer manually printer priority, Share and configure a printer manually printing and printers 3-D printing support, Choose the ideal Windows 8.1 edition common terms, Share and configure a printer manually configuring shared printers, Configure file libraries location-aware, Manage preferred wireless networks privacy, configuring IE11 settings, Configure Compatibility View and explore Group Policy settings private IP addresses, Objective 3.1: Configure IP settings private keys, Encrypt files and folders using EFS Private profile, Configure network locations , Configure Windows Firewall with Advanced Security private virtual switches, Create and configure virtual switches private VLANs, Create and manage checkpoints Process ID (PID), Monitor system resources processors, minimum requirements, Choose the ideal Windows 8.1 edition product IDs, Configure a virtual machine profiles, user. (see user profiles) Program Compatibility Troubleshooter, Perform readiness tests , Objective 2.2: Install and configure desktop apps and Windows Store apps program rules, Configure Windows Firewall with Advanced Security Properties dialog box device drivers, Install and manage drivers with Device Manager , Install and uninstall devices, Install and manage drivers with Device Manager , Install and uninstall , Use Devices and Printers disk drives, Use Diskpart disk volumes, Use Disk Management distribution, Manage file system fragmentation Driver tab, Install and manage drivers with Device Manager , Install and uninstall enabling object auditing, Configure object access auditing event subscriptions, Configure event subscriptions events, Configure object access auditing folders, Explore USMT , Public folder sharing , Encrypt files and folders using EFS network connection, Configure name resolution printers, Share and configure a printer manually resources, Install and manage drivers with Device Manager , Objective review Resources tab, Install and manage drivers with Device Manager system, Configure and use Remote Assistance and Remote Desktop , Configure System Restore and create a restore point user profiles, Understand the local user profile VPN connections, VPN protocols , Configure VPN connections and authentication wireless networks, Configure network adapters Protected Extensible Authentication Protocol (PEAP), Objective 5.1: Configure remote connections protocols, firewall filtering, Configure Windows Firewall .ps1 file extension, Configure application restrictions using AppLocker .ps2 file extension, Objective 2.3: Control access to local hardware and applications Public folders, Configure HomeGroup settings , Share using windows powershell Public Key Infrastructure (PKI), Encrypt files and folders using EFS public keys, Encrypt files and folders using EFS Public profile, Configure Windows Firewall with Advanced Security publisher rules, Configure application restrictions using AppLocker R radio-frequency identification (RFID), Share and configure a printer manually RAID technology, Terms you need to know , Manage Storage Spaces RDP (Remote Desktop Protocol), Authentication protocols Read & Execute permission, Permission terminology and rules Read permission, Public folder sharing , Any folder sharing , Objective review , Permission terminology and rules readiness tests, Choose the ideal Windows 8.1 edition rebooting computers, Configure Assigned Access , Objective review Recimg.exe tool, Perform a refresh or recycle Recommended updates, Manage update history Recovery Drive Wizard, Configure a recovery drive recovery drives, Perform a driver rollback recovery keys, Configure BitLocker , Configure BitLocker To Go recovery. (see file recovery; system recovery) Recycle Bin, Recover files from SkyDrive recycling computers, Configure System Restore and create a restore point refreshing computers, Configure System Restore and create a restore point Registry permissions, Objective 4.2: Configure file and folder access remote access and mobility configuring mobility options, Objective review , Objective 5.1: Review configuring remote connections, Configure remote access and mobility , Answers configuring security for mobile devices, Objective 5.3: Configure security for mobile devices , Objective 5.2: Review Remote Assistance configuring and using, Explore Remote Desktop options described, Configure and use Remote Assistance and Remote Desktop enabling or disabling remote features, Configure and use Remote Assistance and Remote Desktop remote authentication, Objective 5.1: Configure remote connections Remote Desktop configuring settings, Authentication protocols described, Configure and use Remote Assistance and Remote Desktop options supported, Enable or disable remote features Remote Desktop Client, Choose the ideal Windows 8.1 edition Remote Desktop Connection dialog box Advanced tab, Explore Remote Desktop options described, Enable or disable remote features Display tab, Explore Remote Desktop options Experience tab, Explore Remote Desktop options General tab, Explore Remote Desktop options Local Resources tab, Explore Remote Desktop options opening, Configure Remote Desktop settings Programs tab, Explore Remote Desktop options Remote Desktop Host, Choose the ideal Windows 8.1 edition Remote Desktop Protocol (RDP), Authentication protocols remote management configuring and using Remote Assistance and Remote Desktop, Configure and use Remote Assistance and Remote Desktop configuring settings and exploring tools, Make modifications remotely using an MMC making modifications using MMCs, Configure and use Remote Assistance objective summary and review, Objective summary , Objective 3.3: Review , Chapter summary Remote Business Data Removal, Choose the ideal Windows 8.1 edition removable devices, managing installation and access to, Configure application restrictions using Software Restriction Policies Remove-AppxPackage cmdlet, Update Windows Store apps Remove-PhysicalDisk cmdlet, Manage Storage Spaces Remove-SmbShare cmdlet, Share using an MMC Repair-VirtualDisk cmdlet, Manage Storage Spaces Reset Account Counter After policy, Account Lockout policies resmon.exe (Resource Monitor), Startup tab Resource Monitor (resmon.exe), Startup tab resources configuring authentication and authorization, Objective 4.3: Configure authentication and authorization configuring file and folder access, Objective review configuring shared, Configure access to resources monitoring, Monitor system resources objective summary and review, Answers ownership of, Icacls.exe viewing by connection, Install and manage drivers with Device Manager viewing by type, Install and manage drivers with Device Manager restore points, Configure System Restore and create a restore point restoring files. (see file recovery; system recovery) reversible encryption, Password policies RFID (radio-frequency identification), Share and configure a printer manually roaming credentials, Credentials roaming user profiles, Understand the local user profile rolling back device drivers, Install and uninstall , Perform a driver rollback updates, Manage update history rule collections, Objective 2.3: Control access to local hardware and applications Rule Wizard, Configure Windows Firewall with Advanced Security , Configure connection security rules (IPsec) Run dialog box, Encrypt files and folders using EFS S SANs (storage area networks), Manage Storage Spaces SAS (Serial Attached SCSI), Manage Storage Spaces SATA (Serial ATA), Manage Storage Spaces Saved Games folder, Understand the local user profile ScanState command, Explore the User State Migration Tool , Explore USMT scardsvr (Smart Card Service), Smart cards and virtual smart cards SCCM (System Center Configuration Manager), Specify Intranet Microsoft Update Service Location scheduled installations, Turn On Software Notifications screen resolution, multiple apps and, Choose the ideal Windows 8.1 edition scripts, rule collections, Objective 2.3: Control access to local hardware and applications search providers, managing in IE11, Manage add-ons, toolbars, extensions, search providers, and more Searches folder, Understand the local user profile Second Level Address Translation (SLAT), Perform readiness tests secpol.msc (Local Security Settings), Disable access using group policies , Configure authentication in workgroups and domains Secure Boot, Choose the ideal Windows 8.1 edition , Use biometrics Secure Desktop, Credentials , Configure User Account Control behavior Secure Socket Tunneling Protocol (SSTP), VPN protocols Secure Sockets Layer (SSL), VPN protocols security configuring BitLocker, Objective 5.3: Configure security for mobile devices configuring for mobile devices, Objective 5.3: Configure security for mobile devices , Objective 5.2: Review configuring IE11 settings, Configure Compatibility View and explore Group Policy settings configuring Network Discovery, Objective review configuring Windows Firewall, Configure Windows Firewall configuring Windows Firewall With Advanced Security, Allow an app through the Windows Firewall connection security rules, Configure Windows Firewall with Advanced Security , Configure connection security rules (IPsec) creating authenticated exceptions, Configure connection security rules (IPsec) elevated privileges, Configure User Account Control behavior object access auditing, Encrypt files and folders using EFS objective summary and review, Create authenticated exceptions , Objective 3.2: Review Security log, Configure and analyze event logs Security Policy, Set up and configure a Microsoft account , Use biometrics security principal, Permission terminology and rules Security updates, Manage update history Select A Destination dialog box, Configure folder location Select Users Or Groups dialog box, Configure user rights Serial ATA (SATA), Manage Storage Spaces Serial Attached SCSI (SAS), Manage Storage Spaces Server Message Block (SMB), Share using an MMC Server-To-Server rule type, Configure connection security rules (IPsec) Service Pack updates, Manage update history Service Set Identifier (SSID), Connect to a network , Objective review , Performance tab Set-Disk cmdlet, Use Diskpart Set-Partition cmdlet, Use Diskpart Set-PhysicalDisk cmdlet, Manage Storage Spaces Set-SmbShare cmdlet, Share using an MMC Settings charm connecting to networks from, Objective review disabling automatic app updates, Objective 6.1: Configure and manage updates opening, Explore the Application Compatibility Toolkit , Connect to a network , Objective 6.1: Configure and manage updates SkyDrive app and, Set up and configure SkyDrive Setup log, Configure and analyze event logs Setup.exe, Perform a clean installation Share permissions characteristics of, Public folder sharing described, Public folder sharing , Objective review limitations, Any folder sharing NTFS permissions and, Any folder sharing , Objective review , Permission terminology and rules shared broadband connections, Enable VPN Reconnect shared folders Any folder sharing, Public folder sharing described, Configure access to resources Public folder sharing, Configure HomeGroup settings sharing from command line, Any folder sharing Shared Folders snap-in, Any folder sharing shared personal hotspots, Enable VPN Reconnect shared printers adding and configuring, Configure file libraries homegroups and, Configure file libraries sharing and configuring manually, Share and configure a printer manually shared resources configuring file libraries, Share using windows powershell configuring homegroup settings, Objective 4.1: Configure shared resources configuring shared folder permissions, Configure HomeGroup settings configuring shared printers, Configure file libraries described, Configure access to resources objective summary and review, Set up and configure SkyDrive , Answers setting up and configuring SkyDrive, Share and configure a printer manually shortcut keys connecting to networks, Objective review opening features, Disable access using group policies opening Run dialog box, Encrypt files and folders using EFS opening Settings charm, Explore the Application Compatibility Toolkit , Connect to a network , Objective review , Objective 6.1: Configure and manage updates rebooting computers, Configure Assigned Access , Objective review switching between keyboards, Switch between keyboards Shrink dialog box, Use Disk Management shrinking partitions, Use Disk Management Shut Down Windows dialog box, Configure Windows Update policies side-by-side migration, Objective 1.3: Migrate and configure user data sideloading technique, Choose the ideal Windows 8.1 edition , Disable access using group policies , Update Windows Store apps Sigverif.exe (File Signature Verification tool), Use Device Stage , Disable access using group policies SIM (System Image Manager), Explore the custom Windows 8.1 installation , Explore Windows PE Simple Mail Transfer Protocol (SMTP), Configure Windows Firewall simple storage spaces, Manage Storage Spaces simple volumes, Terms you need to know , Use Disk Management SkyDrive accessing, Objective 4.3: Configure authentication and authorization additional information, Recover files from SkyDrive described, Set up and configure SkyDrive name change for, Objective 4.1: Configure shared resources , Sync Center and configuring Sync Options recovering files from, Objective review setting up and configuring, Share and configure a printer manually shared resources and, Configure access to resources syncing settings, Explore and configure a Microsoft Account profile types of data saved, Set up and configure SkyDrive SLAT (Second Level Address Translation), Perform readiness tests Slmgr command, Update Windows Store apps Smart Card Service (scardsvr), Smart cards and virtual smart cards smart cards, Account Lockout policies , VPN protocols Smart Screen control, Choose the ideal Windows 8.1 edition , Use biometrics SMB (Server Message Block), Share using an MMC SMTP (Simple Mail Transfer Protocol), Configure Windows Firewall snapshots, Install integration services Software Restriction Policies, Objective 2.3: Control access to local hardware and applications , Configure application restrictions using Software Restriction Policies source computer initiated subscriptions, Configure event subscriptions source computers, Configure event subscriptions spanned volumes, Terms you need to know Special Permissions permission, Share and configure a printer manually Specify Intranet Microsoft Update Service Location policy, Windows Server Update Services SQL Server, Explore the Application Compatibility Toolkit SQL Server Express, Explore the Application Compatibility Toolkit SSID (Service Set Identifier), Connect to a network , Objective review , Performance tab SSL (Secure Sockets Layer), VPN protocols SSTP (Secure Socket Tunneling Protocol), VPN protocols Standard accounts, Configure User Account Control behavior Standard User Analyzer (SUA), Explore the Application Compatibility Toolkit startup keys, Configure BitLocker , Configure BitLocker To Go storage area networks (SANs), Manage Storage Spaces storage management. , Objective 4.3: Configure authentication and authorization (see also SkyDrive) credentials at command line, Credentials managing disk volumes, Objective 6.2: Manage local storage managing file system fragmentation, Manage file system fragmentation objective summary and review, Manage Storage Spaces , Objective 6.1: Review startup keys and, Configure BitLocker To Go Storage Spaces, Choose the ideal Windows 8.1 edition , Manage Storage Spaces Storage Spaces, Choose the ideal Windows 8.1 edition , Manage Storage Spaces Store Passwords Using Reversible Encryption policy, Password policies striped volumes, Terms you need to know SUA (Standard User Analyzer), Explore the Application Compatibility Toolkit subnet masks, Objective 3.1: Configure IP settings , Explore the Local Area Network Connections Properties dialog box subscriptions, event, Configure event subscriptions Sync Center, Configure sync options sync options configuring in PC Settings, Sync Center and configuring Sync Options configuring with Sync Center, Configure sync options configuring with Work Folders, Work Folders described, Configure sync options syncing folders, Objective 5.2: Configure mobility options .sys file extension, Use Pnputil.exe to manage the Driver Store Sysprep command, Explore the custom Windows 8.1 installation System Center Configuration Manager (SCCM), Specify Intranet Microsoft Update Service Location System Configuration dialog box, Startup tab , Configure System Restore and create a restore point System Configuration tool (Msconfig.exe), Disable access using group policies , App History tab , Use Windows RE system image backup, Configure System Restore and create a restore point , Configure File History System Image Manager (SIM), Explore the custom Windows 8.1 installation , Explore Windows PE System Information tool (msinfo32.exe), Perform readiness tests System log, Configure and analyze event logs system performance, monitoring. (see performance monitoring) system recovery configuring recovery drives, Perform a driver rollback creating restore points, Configure System Restore and create a restore point described, Configure system and data options objective summary and review, Perform a refresh or recycle , Answers performing driver rollback, Perform a driver rollback performing refresh or recycle, Configure System Restore and create a restore point System Restore, Configure System Restore and create a restore point System Restore, Configure System Restore and create a restore point T Task Manager (taskmgr tool) App History tab, App History tab described, Disable access using group policies , Configure Task Manager Details tab, Startup tab opening, Configure Task Manager Performance tab, Performance tab Processes tab, Configure Task Manager Services tab, Startup tab Startup tab, App History tab Users tab, Startup tab taskmgr tool (Task Manager) App History tab, App History tab described, Disable access using group policies , Configure Task Manager Details tab, Startup tab opening, Configure Task Manager Performance tab, Performance tab Processes tab, Configure Task Manager Services tab, Startup tab Startup tab, App History tab Users tab, Startup tab TCP/IP connection security rules, Configure Windows Firewall with Advanced Security event log subscriptions, Configure event subscriptions installing network support for, Explore the Local Area Network Connections Properties dialog box Ipconfig tool and, Command-line tools monitoring performance statistics, Performance Monitor Netstat tool and, Command-line tools Ping tool and, Action Center troubleshooting tools port rules, Configure Windows Firewall with Advanced Security shared printers and, Add a printer and configure sharing VPN connections and, Configure VPN connections and authentication Windows PE and, Explore Windows PE Telnet protocol, Configure Windows Firewall Temporal Key Integrity Protocol (TKIP), Create authenticated exceptions test machines, setting up, Perform readiness tests , Use Pnputil.exe to manage the Driver Store thick images, Use the Windows Easy Transfer Wizard on stand-alone workstations thin images, Use the Windows Easy Transfer Wizard on stand-alone workstations thin provisioning, Manage Storage Spaces TKIP (Temporal Key Integrity Protocol), Create authenticated exceptions tokens, Configure User Account Control behavior toolbars, managing in IE11, Manage add-ons, toolbars, extensions, search providers, and more touch features, minimum requirements, Choose the ideal Windows 8.1 edition TPM (Trusted Platform Model) BitLocker and, Use biometrics , Configure BitLocker startup key storage, Configure BitLocker To Go virtual smart cards, Smart cards and virtual smart cards Windows To Go and, Install as Windows To Go and to VHD , Configure Windows To Go trace sessions, Performance Monitor Tracert tool, Command-line tools tracking protection, managing in IE11, Manage add-ons, toolbars, extensions, search providers, and more Triple DES (3DES), Objective 5.1: Configure remote connections , Authentication protocols troubleshooting Action Center tools, Action Center troubleshooting tools hardware, Install and manage drivers with Device Manager Homegroup Troubleshooter, Connect to a network Network And Sharing Center tools, Configure name resolution network performance, Optimize networking performance resolving network connectivity issues, Configure name resolution unsigned drivers, Use Device Stage with recovery drives, Perform a driver rollback Trusted Boot, Choose the ideal Windows 8.1 edition Trusted Platform Model (TPM) BitLocker and, Use biometrics , Configure BitLocker startup key storage, Configure BitLocker To Go virtual smart cards, Smart cards and virtual smart cards Windows To Go and, Install as Windows To Go and to VHD , Configure Windows To Go Trusted Publisher certificate store, No Auto-Restart With Logged On Users For Scheduled Automatic Updates Installations Tunnel rule type, Configure connection security rules (IPsec) U UAC (User Account Control) biometric devices and, Use biometrics configuring behavior, Configure User Account Control behavior testing issues with SUA, Explore the Application Compatibility Toolkit UDP (User Datagram Protocol), Configure Windows Firewall , Configure Windows Firewall with Advanced Security UEFI (Unified Extensible Firmware Interface), Use biometrics , Configure BitLocker unicast addresses, Explore the Local Area Network Connections Properties dialog box Unified Extensible Firmware Interface (UEFI), Use biometrics , Configure BitLocker uninstalling device drivers, Install and manage drivers with Device Manager unsigned drivers, Use Device Stage , Use Pnputil.exe to manage the Driver Store Update Driver Software dialog box, Install and uninstall upgrades and updates automating, Use the Windows Easy Transfer Wizard on stand-alone workstations configuring and managing updates, Monitor and maintain Windows clients configuring update settings, Configure update settings device drivers, Use Pnputil.exe to manage the Driver Store from Windows 7, Choose an installation option (clean or upgrade) , Perform a clean installation from Windows 8, Choose an installation option (clean or upgrade) , Upgrade from Windows 8 from Windows Vista, Choose an installation option (clean or upgrade) , Upgrade from Windows 8 from Windows XP, Choose an installation option (clean or upgrade) , Upgrade from Windows 8 hiding, Roll back updates in-place, Choose the ideal Windows 8.1 edition , Perform readiness tests managing update history, Windows Server Update Services objective summary and review, Allow Signed Updates From An Intranet Microsoft Update Service Location , Answers optimizing network performance, Optimize networking performance performing manually, Objective 1.2: Install Windows 8.1 recovery drives and, Configure a recovery drive rolling back updates, Manage update history supported paths, Choose an installation option (clean or upgrade) testing apps for compatibility with, Explore the Application Compatibility Toolkit updating default apps, Objective 6.1: Configure and manage updates updating Windows Store apps, Objective 6.1: Configure and manage updates Windows Update, Install and manage drivers with Device Manager , Use biometrics , Monitor and maintain Windows clients , Roll back updates User Account Control (UAC) biometric devices and, Use biometrics configuring behavior, Configure User Account Control behavior testing issues with SUA, Explore the Application Compatibility Toolkit user data configuring, Explore USMT , Objective 1.2: Review migrating, Objective review , Objective 1.2: Review objective summary and review, Understand the mandatory user profile , Objective 1.2: Review User Datagram Protocol (UDP), Configure Windows Firewall , Configure Windows Firewall with Advanced Security user profiles advanced sharing and, Configure network locations described, Configure folder location local, Explore and configure a Microsoft Account profile mandatory, Understand the mandatory user profile Microsoft account, Configure folder location roaming, Understand the local user profile user rights configuring, Use biometrics described, Use biometrics permissions and, Configure user rights User State Migration Tool (USMT), Perform manual installations and upgrades , Use the Windows Easy Transfer Wizard on stand-alone workstations , Objective 1.3: Migrate and configure user data Users group configuring NTFS permissions for, Permission terminology and rules configuring user rights, Use biometrics installing device drivers, Create a driver update policy USMT (User State Migration Tool), Perform manual installations and upgrades , Use the Windows Easy Transfer Wizard on stand-alone workstations , Objective 1.3: Migrate and configure user data UsmtUtils tool, Explore USMT V VAMT (Volume Activation Management Tool), Explore Windows PE .vbs file extension, Objective 2.3: Control access to local hardware and applications VDI (Virtual Desktop Infrastructure), Choose the ideal Windows 8.1 edition , Choose the ideal Windows 8.1 edition Verbose events, Configure and analyze event logs VHD Boot, Choose the ideal Windows 8.1 edition VHD format, Create and configure virtual switches VHDs (virtual hard disks) creating and configuring, Create and configure virtual switches differencing disks, Create and manage checkpoints installing to, Switch between keyboards , Install as Windows To Go VHDX format, Create and configure virtual switches Videos folder, Share using windows powershell Videos library, Share using windows powershell Virtual Desktop Infrastructure (VDI), Choose the ideal Windows 8.1 edition , Choose the ideal Windows 8.1 edition virtual hard disks (VHDs) creating and configuring, Create and configure virtual switches differencing disks, Create and manage checkpoints installing to, Switch between keyboards virtual local area networks (VLANs), Create and manage checkpoints virtual machines (VMs) configuring, Create a virtual machine creating, Create and configure a virtual machine described, Objective review device drivers and, Create and configure virtual switches importing, Move a virtual machine Integration Services package, Install integration services making changes to, Create a virtual machine moving, Create and configure virtual disks product IDs, Configure a virtual machine trunk mode to, Create and manage checkpoints VHDs and, Install as Windows To Go virtual private networks (VPNs) automatic app updates, Choose the ideal Windows 8.1 edition configuring connections and authentication, Configure Remote Desktop settings described, Configure Remote Desktop settings protocols supported, Objective 5.1: Configure remote connections setting up, Connect to a network virtual smart cards, Account Lockout policies Virtual Switch Manager, Create and configure virtual switches virtual switches, Create and manage checkpoints VLANs (virtual local area networks), Create and manage checkpoints VMs (virtual machines) configuring, Create a virtual machine creating, Create and configure a virtual machine described, Objective review device drivers and, Create and configure virtual switches importing, Move a virtual machine Integration Services package, Install integration services making changes to, Create a virtual machine moving, Create and configure virtual disks product IDs, Configure a virtual machine trunk mode to, Create and manage checkpoints VHDs and, Install as Windows To Go Volume Activation Management Tool (VAMT), Explore Windows PE volume licensing, Choose an installation option (clean or upgrade) , Use the Windows Easy Transfer Wizard on stand-alone workstations volumes, disk. (see disk volumes) VPN Reconnect, VPN protocols , Configure VPN connections and authentication VPNs (virtual private networks) automatic app updates, Choose the ideal Windows 8.1 edition configuring connections and authentication, Configure Remote Desktop settings described, Configure Remote Desktop settings protocols supported, Objective 5.1: Configure remote connections setting up, Connect to a network W Warning events, Configure and analyze event logs WDS (Windows Deployment Services), Use the Windows Easy Transfer Wizard on stand-alone workstations , Explore Windows PE Web Authentication Broker, Credentials Wecutil command, Configure event subscriptions WET (Windows Easy Transfer), Perform manual installations and upgrades , Upgrade from Windows 8 , Objective 1.3: Migrate and configure user data .wfw file extension, Configure Windows Firewall with Advanced Security Wi-Fi Direct, Configure Wi-Fi Direct Wi-Fi network connections connection process, Choose the ideal Windows 8.1 edition , Connect to a wireless network optimizing network performance, Optimize networking performance Wi-Fi Protected Access (WPA), Create authenticated exceptions Windows 7 choosing installation options, Perform readiness tests File Recovery feature, Recover files from SkyDrive Software Restriction Policies, Configure application restrictions using Software Restriction Policies upgrading from, Choose an installation option (clean or upgrade) , Perform a clean installation VPN protocols supported, Objective 5.1: Configure remote connections Windows 8 recovery drives, Configure a recovery drive saving credentials, Credentials Software Restriction Policies, Configure application restrictions using Software Restriction Policies upgrading from, Choose an installation option (clean or upgrade) , Upgrade from Windows 8 VPN protocols supported, Objective 5.1: Configure remote connections Windows 8.1 comparing edition features, Choose the ideal Windows 8.1 edition described, Objective 1.1: Evaluate hardware readiness and compatibility installing, Objective 1.2: Install Windows 8.1 , Objective 1.1: Review recovery drives, Configure a recovery drive Start screen, Upgrade from Windows 7 unsigned drivers and, Use Device Stage updating default apps, Objective 6.1: Configure and manage updates upgrade paths for, Choose an installation option (clean or upgrade) , Upgrade from Windows 8 VPN protocols supported, Objective 5.1: Configure remote connections Windows 8.1 Enterprise, Choose the ideal Windows 8.1 edition , Choose an installation option (clean or upgrade) Windows 8.1 Professional comparing edition features, Choose the ideal Windows 8.1 edition described, Objective 1.1: Evaluate hardware readiness and compatibility supported upgrade paths, Choose an installation option (clean or upgrade) , Upgrade from Windows 8 Windows 8.1 Upgrade Assistant, Perform readiness tests Windows Assessment and Deployment Toolkit (ADK) described, Use the Windows Easy Transfer Wizard on stand-alone workstations , Explore the custom Windows 8.1 installation USMT support, Explore the User State Migration Tool Volume Activation Management Tool, Explore Windows PE Windows PE support, Explore the User State Migration Tool Windows Assessment Services, Explore Windows PE Windows Assessment Toolkit, Explore Windows PE Windows Backup And Restore feature, Recover files from SkyDrive Windows Biometric Framework, Smart cards and virtual smart cards Windows clients configuring and managing updates, Monitor and maintain Windows clients , Answers managing local storage, Objective review , Objective 6.1: Review monitoring system performance, Objective review , Objective 6.3: Thought experiment objective summary and review, Chapter summary Windows Defender, Manage update history Windows Deployment Services (WDS), Use the Windows Easy Transfer Wizard on stand-alone workstations , Explore Windows PE Windows Easy Transfer (WET), Perform manual installations and upgrades , Upgrade from Windows 8 , Objective 1.3: Migrate and configure user data Windows Embedded feature, Configure Assigned Access Windows Event Collector service, Configure event subscriptions Windows Features dialog box, Create and configure a virtual machine Windows Firewall allowing apps through, Allow an app through the Windows Firewall configuring event subscriptions, Configure event subscriptions described, Configure Windows Firewall filtering, Configure Windows Firewall , Configure Windows Firewall with Advanced Security monitoring, Configure Windows Firewall , Configure Windows Firewall with Advanced Security Windows Firewall With Advanced Security configuring, Allow an app through the Windows Firewall configuring connection security rules, Configure connection security rules (IPsec) configuring event subscriptions, Configure event subscriptions Windows Firewall With Advanced Security dialog box, Configure Windows Firewall with Advanced Security Windows Installer installing and repairing applications, Objective 2.2: Install and configure desktop apps and Windows Store apps rule collections, Objective 2.3: Control access to local hardware and applications Windows PE and, Explore Windows PE Windows Live ID. (see Microsoft account) Windows Malicious Software Removal Tool, Manage update history Windows Management Instrumentation (WMI), Configure BitLocker Windows Media Player, Choose the ideal Windows 8.1 edition Windows Network Diagnostics Wizard, Optimize networking performance Windows PE (Windows Preinstallation Environment), Explore the User State Migration Tool Windows Performance Toolkit (WPT), Explore Windows PE Windows Power Management feature, Enabling Windows Update Power Management To Automatically Wake Up The System To Install Scheduled Updates Windows PowerShell. , Configure Windows Firewall with Advanced Security (see also specific cmdlets) creating and managing shares, Share using an MMC creating workspaces, Create a workspace with the Create a Windows To Go Workspace Wizard enabling Hyper-V, Objective 2.5: Configure Hyper-V making modifications remotely, Execute commands from a command prompt managing disk volumes, Use Diskpart managing Storage Spaces, Manage Storage Spaces managing System Restore, Configure System Restore and create a restore point sideloading and, Update Windows Store apps Windows Public Key Infrastructure (PKI), Encrypt files and folders using EFS Windows Recovery Environment (Windows RE) additional information, Use Windows RE Advanced Startup and, Configure a recovery drive Windows To Go and, Install as Windows To Go and to VHD , Configure Windows To Go Windows Remote Assistance dialog box, Explore Remote Desktop options Windows Remote Management (WinRM) accessing Group Policy settings, Make modifications remotely using Windows PowerShell configuring event subscriptions, Configure event subscriptions enabling remote management, Make modifications remotely using an MMC executing commands from command prompt, Make modifications remotely using an MMC making modifications remotely with Windows PowerShell, Execute commands from a command prompt Windows Remote Shell (WinRS.exe), Make modifications remotely using an MMC Windows RT, Objective 1.1: Evaluate hardware readiness and compatibility , Choose the ideal Windows 8.1 edition Windows Server 2003, Objective 5.1: Configure remote connections Windows Server 2008, Objective 5.1: Configure remote connections Windows Server 2012, VPN protocols Windows Server Update Services (WSUS), Configure update settings Windows SmartScreen, Choose the ideal Windows 8.1 edition , Use biometrics Windows Store automatic app updates, Choose the ideal Windows 8.1 edition Credential Locker and, Credentials device lockdown technology, Manage installation of and access to removable devices installing and configuring apps, Objective 2.2: Install and configure desktop apps and Windows Store apps managing access to, Explore the Application Compatibility Toolkit minimum requirements, Choose the ideal Windows 8.1 edition updating apps, Objective 6.1: Configure and manage updates upgrade options from, Upgrade from Windows 8 Windows System Image Manager (SIM), Explore the custom Windows 8.1 installation , Explore Windows PE Windows To Go, Switch between keyboards , Configure Wi-Fi Direct Windows To Go Creator, Choose the ideal Windows 8.1 edition Windows To Go Startup Options dialog box, Configure Windows To Go Windows Update biometric hardware support, Use biometrics configuring policies, Roll back updates configuring update settings, Configure update settings described, Monitor and maintain Windows clients installing device drivers, Install and manage drivers with Device Manager managing update history, Windows Server Update Services optimizing network performance, Configure event subscriptions rolling back updates, Manage update history Windows Upgrade Assistant, Perform readiness tests Windows Vault, Credentials Windows Vista Software Restriction Policies, Configure application restrictions using Software Restriction Policies upgrading from, Choose an installation option (clean or upgrade) , Upgrade from Windows 8 VPN protocols supported, Objective 5.1: Configure remote connections Windows Easy Transfer Wizard, Use Windows Easy Transfer Windows XP Software Restriction Policies, Configure application restrictions using Software Restriction Policies upgrading from, Choose an installation option (clean or upgrade) , Upgrade from Windows 8 VPN protocols supported, Objective 5.1: Configure remote connections Windows Easy Transfer Wizard, Use Windows Easy Transfer WinRM (Windows Remote Management) accessing Group Policy settings, Make modifications remotely using Windows PowerShell configuring event subscriptions, Configure event subscriptions enabling remote management, Make modifications remotely using an MMC executing commands from command prompt, Make modifications remotely using an MMC making modifications remotely with Windows PowerShell, Execute commands from a command prompt Winrm command, Configure event subscriptions WinRS.exe (Windows Remote Shell), Make modifications remotely using an MMC wireless devices adding wireless printers, Add a printer and configure sharing configuring, Configure devices Hyper-V and, Create and configure virtual switches resolving connectivity issues, Configure name resolution wireless networks connecting to, Objective review managing preferred, Connect to a wireless network Wireless Profile Manager, Manage preferred wireless networks WMI (Windows Management Instrumentation), Configure BitLocker Work Folders additional information, Work Folders automatic app updates, Choose the ideal Windows 8.1 edition described, Configure sync options , Work Folders requirements for, Work Folders workgroups configuring authentication in, Configure authentication in workgroups and domains user names and passwords, Credentials workplaces connecting to, Connect to a network Workplace Join feature, Choose the ideal Windows 8.1 edition workspaces creating with Windows PowerShell, Create a workspace with the Create a Windows To Go Workspace Wizard creating with Windows To Go, Create a workspace with the Create a Windows To Go Workspace Wizard WPA (Wi-Fi Protected Access), Create authenticated exceptions WPT (Windows Performance Toolkit), Explore Windows PE Write permission, Permission terminology and rules WSUS (Windows Server Update Services), Configure update settings
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.