Mobility and Device Fundamentals
Mobility and Device Fundamentals
This book was set in Garamond by SPi Global and printed and bound by Strategic Content Imaging.
Copyright © 2016 by John Wiley & Sons, Inc. All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108
of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization
through payment of the appropriate per‐copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers,
MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions
Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030‐5774, (201)748‐6011, fax (201)748‐6008,
website http://www.wiley.com/go/permissions.
Microsoft, ActiveX, Excel, InfoPath, Microsoft Press, MSDN, OneNote, Outlook, PivotChart, PivotTable, PowerPoint,
SharePoint, SQL Server, Visio, Visual Basic, Visual C#, Visual Studio, Windows, Windows 8.1, Windows Mobile, Windows
Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/
or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners.
The example companies, organizations, products, domain names, e‐mail addresses, logos, people, places, and events
depicted herein are fictitious. No association with any real company, organization, product, domain name, e‐mail address,
logo, person, place, or event is intended or should be inferred.
The book expresses the author’s views and opinions. The information contained in this book is provided without any express,
statutory, or implied warranties. Neither the authors, John Wiley & Sons, Inc., Microsoft Corporation, nor their resellers or
distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by this book.
All photos in this book were printed with permission of the copyright owner. For all other third party photo provisions
in the text, the copyright holders are indicated near the photo. The remaining photos were created by the authors of this
textbook and printed with their permission.
ISBN 978-1-119-23955-0
www.wiley.com/college/microsoft
Welcome to the Microsoft Official Academic Course (MOAC) program for Mobility and
Devices Fundamentals. MOAC represents the collaboration between Microsoft Learning and
John Wiley & Sons, Inc. Microsoft and Wiley teamed up to produce a series of textbooks that
deliver compelling and innovative teaching solutions to instructors and superior learning
experiences for students. Infused and informed by in‐depth knowledge from the creators of
Microsoft products, and crafted by a publisher known worldwide for the pedagogical quality
of its products, these textbooks maximize skills transfer in minimum time. Students are
challenged to reach their potential by using their new technical skills as highly productive
members of the workforce.
Because this knowledgebase comes directly from Microsoft, creator of the Microsoft
Technology Associate (MTA) exams (www.microsoft.com/learning/certification), you are sure
to receive the topical coverage that is most relevant to students’ personal and professional
success. Microsoft’s direct participation not only assures you that MOAC textbook content is
accurate and current; it also means that students will receive the best instruction possible to
enable their success on certification exams and in the workplace.
www.wiley.com/college/microsoft
| iii
■ Pedagogical Features
The MOAC textbook for Mobility and Devices Fundamentals is designed to cover all the
learning objectives for MTA Exam 98‐368, which are referred to as its “objective domains.”
The Microsoft Technology Associate (MTA) exam objectives are highlighted throughout the
textbook. Many pedagogical features have been developed specifically for Microsoft Official
Academic Course programs.
Presenting the extensive procedural information and technical concepts woven throughout the
textbook raises challenges for the student and instructor alike. The Illustrated Book Tour that
follows provides a guide to the rich features contributing to the Microsoft Official Academic
Course program’s pedagogical plan. Following is a list of key features in each lesson designed to
prepare students for success as they continue in their IT education, on the certification exams,
and in the workplace:
• Each lesson begins with an Exam Objective Matrix. More than a standard list of learning
objectives, the Exam Objective Matrix correlates each software skill covered in the lesson
to the specific exam objective domain.
• Concise and frequent Step‐by‐Step instructions teach students new features and provide
an opportunity for hands‐on practice. Numbered steps give detailed, step‐by‐step instruc-
tions to help students learn software skills.
• Illustrations: Screen images provide visual feedback as students work through the
exercises. The images reinforce key concepts, provide visual clues about the steps, and
allow students to check their progress.
• Key Terms: Important technical vocabulary is listed with definitions at the beginning of
the lesson. When these terms are used later in the lesson, they appear in bold italic type
and are defined. The Glossary contains all of the key terms and their definitions.
• Engaging point‐of‐use Reader Aids, located throughout the lessons, tell students why this
topic is relevant (The Bottom Line), and provide students with helpful hints (Take Note).
Reader Aids also provide additional relevant or background information that adds value to
the lesson.
• Certification Ready features throughout the text signal students where a specific certifica-
tion objective is covered. They provide students with a chance to check their understand-
ing of that particular MTA objective and, if necessary, review the section of the lesson
where it is covered. MOAC offers complete preparation for MTA certification.
• End‐of‐Lesson Questions: The Knowledge Assessment section provides a variety of
multiple‐choice, true‐false, matching, and fill‐in‐the‐blank questions.
• End‐of‐Lesson Exercises are projects that test students’ ability to apply what they’ve
learned in the lesson.
www.wiley.com/college/microsoft
This book uses particular fonts, symbols, and heading conventions to highlight important
information or to call your attention to special steps. For more information about the features
in each lesson, refer to the Illustrated Book Tour section.
CONVENTION MEANING
This feature provides a brief summary of the material to be
THE BOTTOM LINE covered in the section that follows.
Alt + Tab A plus sign (+) between two key names means that you
must press both keys at the same time. Keys that you are
instructed to press in an exercise will appear in the font
shown here.
Example Key terms appear in bold italic.
www.wiley.com/college/microsoft
| v
The Microsoft Official Academic Course programs are accompanied by a rich array of resources
that incorporate the extensive textbook visuals to form a pedagogically cohesive package. These
resources provide all the materials instructors need to deploy and deliver their courses.
Resources available online for download include:
• DreamSpark Premium is designed to provide the easiest and most inexpensive developer
tools, products, and technologies available to faculty and students in labs, classrooms, and
on student PCs. A free 3‐year membership is available to qualified MOAC adopters.
Note: Microsoft Visual Studio, Windows Server, and Windows Operating Systems can be
downloaded from DreamSpark Premium for use by students in this course.
• The Instructor Guide contains Solutions to all the textbook exercises and Syllabi for
various term lengths. The Instructor Guide also includes chapter summaries and lecture
notes. The Instructor’s Guide is available from the Book Companion site (http://www.
wiley.com/college/microsoft).
• The Test Bank contains hundreds of questions in multiple‐choice, true‐false, short
answer, and essay formats, and is available to download from the Instructor’s Book
Companion site (www.wiley.com/college/microsoft). A complete answer key is provided.
• A complete set of PowerPoint presentations and images is available on the Instructor’s
Book Companion site (http://www.wiley.com/college/microsoft) to enhance classroom
presentations. Approximately 50 PowerPoint slides are provided for each lesson. Tailored
to the text’s topical coverage and Skills Matrix, these presentations are designed to convey
key concepts addressed in the text. All images from the text are on the Instructor’s Book
Companion site (http://www.wiley.com/college/microsoft). You can incorporate them into
your PowerPoint presentations, or create your own overhead transparencies and handouts.
By using these visuals in class discussions, you can help focus students’ attention on key
elements of technologies covered and help them understand how to use it effectively in
the workplace.
• When it comes to improving the classroom experience, there is no better source of
ideas and inspiration than your fellow colleagues. The Wiley Faculty Network con-
nects teachers with technology, facilitates the exchange of best practices, and helps to
enhance instructional efficiency and effectiveness. Faculty Network activities include
technology training and tutorials, virtual seminars, peer‐to‐peer exchanges of experi-
ences and ideas, personal consulting, and sharing of resources. For details visit
www.WhereFacultyConnect.com.
www.wiley.com/college/microsoft
vi |
www.wiley.com/college/microsoft
■ Additional Resources
Book Companion Website (www.wiley.com/college/microsoft)
The students’ book companion site for the MOAC series includes any resources, exercise files,
and Web links that will be used in conjunction with this course.
Wiley E‐Text
Wiley MOAC E‐Texts are innovative, electronic versions of printed textbooks. Students buy
the e‐text version for up to 40% off the U.S. price of the printed text, and get the added value
of permanence and portability. Wiley E‐Texts provide students with numerous additional
benefits that are not available with other e‐text solutions.
Wiley E‐Texts are NOT subscriptions; students download the Wiley E‐Text to their computer
desktops. Students own the content they buy to keep for as long as they want. Once a Wiley
E‐Text is downloaded to the computer desktop, students have instant access to all of the
content without being online. Students can also print out the sections they prefer to read in
hard copy. Students also have access to fully integrated resources within their Wiley E‐Text.
From highlighting their e‐text to taking and sharing notes, students can easily personalize their
Wiley E‐Text as they are reading or following along in class.
Technology plays a role in virtually every business around the world. Possessing the fundamen-
tal knowledge of how technology works and understanding its impact on today’s academic and
workplace environment is increasingly important—particularly for students interested in
exploring professions involving technology. That’s why Microsoft created the Microsoft
Technology Associate (MTA) certification—a new entry‐level credential that validates funda-
mental technology knowledge among students seeking to build a career in technology.
The Microsoft Technology Associate (MTA) certification is the ideal and preferred path to
Microsoft’s world‐renowned technology certification programs. MTA is positioned to become
the premier credential for individuals seeking to explore and pursue a career in technology, or
augment related pursuits such as business or any other field where technology is pervasive.
The MTA certification program is designed specifically for secondary and post‐secondary
students interested in exploring academic and career options in a technology field. It offers
www.wiley.com/college/microsoft
viii |
students a certification in basic IT and development. As the new recommended entry point for
Microsoft technology certifications, MTA is designed especially for students new to IT and
software development. It is available exclusively in educational settings and easily integrates
into the curricula of existing computer classes.
MTA provides a new standard for measuring and validating fundamental technology knowl-
edge right in the classroom while keeping your budget and teaching resources intact. MTA
helps institutions stand out as innovative providers of high‐demand industry credentials and is
easily deployed with a simple, convenient, and affordable suite of entry‐level technology
certification exams. MTA enables students to explore career paths in technology without
requiring a big investment of time and resources, while providing a career foundation and the
confidence to succeed in advanced studies and future vocational endeavors.
In addition to giving students an entry‐level Microsoft certification, MTA is designed to be a
stepping stone to other, more advanced Microsoft technology certifications.
To learn more about becoming a Microsoft Technology Associate and exam availability, visit
www.microsoft.com/learning/mta.
www.wiley.com/college/microsoft
www.wiley.com/college/microsoft
x |
Index 187
www.wiley.com/college/microsoft
| xi
www.wiley.com/college/microsoft
xii |
Understanding Windows Server Active Directory 147 Installing Windows Installer and Executable Programs 167
Introducing Domains, Trees, and Forests 147 Sideloading WINDOWS APPLICATIONS by Using Microsoft
Introducing Sites and Domain Controllers 148 Intune 168
Introducing Organizational Units 150 Deeplinking WINDOWS APPLICATIONS by Using Microsoft
Intune 170
Looking at Objects 151
Configuring Application Deployment Policies 171
Understanding User Accounts 152
Managing Outlook Apps 171
Understanding Computer Accounts 154
Understanding Device-Centric to People-Centric IT 172
Understanding Groups 154
Understanding Desktop Virtualization 173
Understanding Azure Active Directory 155
Understanding Dynamic Access Control (DAC)
Understanding Microsoft Accounts 156
Policies 175
Understanding Federation Services 156
Configuring User and Device Claim Types 176
Understanding Business Data Access 158 Configuring File Classification 177
Configuring the Company Portal 159 Implementing a Central Access Policy 178
Customizing the Company Portal 160 Understanding Windows Rights Management (RMS) 180
Using Work Folders 161 Summary Skill Matrix 180
Creating a Work Folder 161 Knowledge Assessment 181
Connecting to a Work Folder 163
Case Projects 184
Understanding Azure RemoteApp 165
Understanding Bring Your Own Device (BYOD) 166
Appendix 185
Deploying and Managing Applications by Using Microsoft
Intune 166 Index 187
www.wiley.com/college/microsoft
O B J E C T I V E D O M A I N M AT R I X
KEY TERMS
Action Center Computer Configuration node encryption
Active Directory accounts decryption Group Policy
Administrative Tools device driver Group Policy objects (GPOs)
BitLocker Drive Encryption Device Manager Internet Protocol Security
(BDE) Devices and Printers folder (IPsec)
Cortana domain‐based accounts Jump List
Control Panel Encrypting File System (EFS) live previews
You work as an IT technician for the Contoso Corporation, which has hundreds of
computers with a good mix between desktop computers and laptop computers. In addi-
tion, several users use smartphones and tablets to access their emails and documents. As
an administrator, you need to ensure that your computers are fully functional and secure.
You also need to make the machines similar to each other so that the helpdesk can support
those machines.
Windows 10 is a robust and flexible system that is made to work on and support a wide
range of hardware. For example, Windows 10 can work on a tablet, a laptop, or a desktop
THE BOTTOM LINE computer. Windows 10 also supports mobile devices so that you can take your computer or
device with you while accessing your files and programs.
The desktop (as shown in Figure 1-1) is the main screen area that you see when you
first start the computer and log on to Windows. Like the top of an actual desktop, it
is where you perform your work by opening and running one or more applications. It
also includes the Recycle Bin, which is used to recover files that have been previously
deleted.
At the bottom of the desktop, you will find the Taskbar, which shows you the programs that
are running and allows you to navigate between those programs. On the taskbar, you will see
the Start button, which is located at the bottom‐left corner.
When you click the Start button, the Windows 10 Start menu opens, as shown in Figure 1-2);
the Windows 10 Start menu is a blend of the Windows 7 Start menu and the Windows 8
Start screen.
The left side of the Windows 10 Start menu displays the programs, which are used most often,
and also provides access to File Explorer, Settings, Power, and All apps. When you click All
Apps, all of the installed programs are shown in alphabetical order (see Figure 1-3). When you
right‐click an installed application, you can select Pin to Start or Pin to taskbar.
On the right side of the Windows 10 Start menu, tiles are displayed. Tiles are larger than the
icons found on the Windows desktop and, unlike the static icons, they can contain dynamic
content provided by the software they represent. For example, the tile for a Web browser can
contain a thumbnail of the currently open Web site, while the Messaging tile can display part
of your latest incoming email. Tiles in Windows 10 that contain this type of dynamic content
are called live tiles.
Figure 1-1
The Windows 10 Desktop
Figure 1-2
The Windows 10 Start menu
The tiles on the Start menu are configurable in a number of ways. Users can move the tiles
around, change their size, change their groupings, and control whether they display live
content. It is also possible to remove seldom‐used tiles and add new tiles for applications, files,
and shortcuts on the computer.
Figure 1-3
Accessing all Windows 10
programs
Clicking the Settings option displays the Settings application, which is based on the Modern
UI interface to access common settings, as shown in Figure 1-4. These settings are organized
according to the following icons:
• System: Allows you to configure the display, notifications and actions, Apps and features,
multitasking, table mode, power and sleep options, and default apps.
• Devices: Provides quick access to hardware devices, such as printers.
• Network & Internet: Keeps track of Wi‐Fi connections and allows you to configure
VPN, dial‐up connections, Ethernet connections, and proxy settings.
• Personalization: Provides settings for the background, colors, lock screen, themes, and
the Start menu.
• Accounts: Allows you to change the profile picture and add accounts.
• Time & language: Allows you to configure date and time, Region and language, and
Speech.
• Ease of Access: Provides settings for Narrator, Magnifier, high contrast, closed captions,
the keyboard, and the mouse.
• Privacy: Allows you to configure the camera, the microphone, speech, account informa-
tion, contacts, calendar, messaging, and application radio controls for Wi‐Fi/Bluetooth
connections.
• Update & security: Allows you to configure Windows Update, activate Windows,
perform backups and recoveries, and configure Windows Defender.
Cortana is Microsoft’s new personal assistant that will help you find things on your PC,
manage your calendar, find files, chat with users, and search the Internet. To see the search
results, just type the desired text in the Search the web and Windows box option. For example,
Figure 1-5 shows the results for a search for “keyboard settings.”
Figure 1-4
Accessing the Settings option
Figure 1-5
Using Cortana
Windows 10 can be navigated by using a pointing device (such as a mouse) or by using a touch screen. Operating a
touch screen requires familiarity with certain finger gestures, such as the following:
Tap: Press a fingertip to the screen and release it. The function is identical to that of a mouse click.
Double‐tap: Press a fingertip to the screen twice in quick succession on the same spot. The function is identical to that of a
double mouse click.
Press and hold: Tap a location on the screen and press down for approximately two seconds. The function is the same
as that of mousing over a designated spot and hovering.
Slide: Press a point on the screen and draw your finger across it without pausing. The function is the same as clicking
and dragging a mouse.
Swipe: Draw a finger across the screen in the indicated direction.
A user account is used to identify a user or other identity on a system, which can be used
in authentication, authorization, and auditing. In Windows, user accounts provide different
levels of control over an organization’s computers and resources.
CERTIFICATION READY
When working with Windows 10, there are three types of accounts:
Configure device options • Microsoft accounts enable you to synchronize your desktop across multiple Windows 10
1.1 devices.
• Local user accounts are created on individual computers that are members of a work-
group to provide access to resources on that computer.
• Domain‐based accounts, also called Active Directory accounts, are stored as objects on a
domain controller and are used by the operating system to identify and authenticate the
user and to grant her authorization to access specific domain resources.
When you set up a computer running Windows 10 for the first time, you have the option of
creating a Microsoft account using an email address that you provide. The email address you
use can come from any provider. After the account is set up, Microsoft will use it along with
your password to help manage your settings across all your PCs running Windows 10. After
organizing your system the way you want it (your preferred desktop background, user tiles,
favorite websites in your browser, explorer settings, and so on), the information will be
associated with your Microsoft account and will be stored in the cloud. Every time you log
into a Windows 10 device using the account, your settings are synched from the cloud, and
any changes you make are updated and available to you on the next device.
Using a Microsoft account provides a consistent experience when working with Windows
Store apps. Purchased apps will be available from each device, feeds you add will be synched
across all devices, and state information will be maintained, so you can start a game or read a
book and pick it up later on another device.
Microsoft accounts can be synced with a domain account, but the capability to do so depends
upon Group Policy settings. Using Group Policy—covered later in this lesson—you can
determine whether you want to allow the syncing of the two accounts and what information
can be synced.
You can create a Microsoft account during the initial installation of the operating system or after
the system is running. The following steps outline the process you can use to create the account.
4. Click Accounts.
5. Click the Family & other users option.
6. Click Add someone else to this PC.
7. On the How will this person sign in? page, to use an existing Microsoft Account, in the
Email or phone text box (see Figure 1-6), type the email address you want to use. Click
Next and then click Finish. If you want sign up for a new Microsoft account, click The
person I want to add doesn’t have an email address.
Figure 1-6
Adding a user
8. On the Let’s create your account page (as shown in Figure 1-7), in the First name text
box and Last name text box, type your first name and last name. In the someone@
example.com text box, type the desired email address.
Figure 1-7
Creating a new account
When using a logon with a Microsoft or work account in Windows 10, you can sync your PC
settings—even between multiple Windows 10 machines—as long as they are connected with
the same Microsoft account. Therefore, if you change the wallpaper or add a favorite shortcut
in Internet Explorer, those changes will be replicated to the other machines.
The Sync feature (located under OneDrive settings, as shown in Figure 1-8) can sync many of
your settings between PCs, including the following:
• Personalization settings, such as Start screen colors, background, and lock screen image
• Themes, such as the desktop background and sounds
• Ease of Access settings, such as Speech Recognition, Magnifier, On‐screen Keyboard, and
Narrator
Figure 1-8
Managing Sync settings in
Windows 10
• Language preferences, such as keyboard settings, other input methods, and display
language
• Web browser settings, such as history, pinned sites, and favorites for both versions of the
browser
• Taskbar settings, such as pinned items and which side of the monitor the Taskbar is
attached to
• Folder and Search settings for File Explorer
• Mouse settings
• Your accounts picture (user tile)
• Per‐app notification state
• Settings for Windows Store apps, including third‐party apps
• HomeGroup password
As with previous versions of Windows, the main graphical utility to configure the Windows
environment and hardware devices is the Control Panel. It can be accessed by right‐clicking
the Start button and choosing Control Panel. See Figure 1-9. Of the eight categories that
are listed, each category includes a top‐level link, and under this link are several of the
most frequently performed tasks for the category.
Clicking a category link provides a list of utilities in that category. Each utility listed within a
category includes a link to open the utility, and under this link are several of the most fre-
quently performed tasks for the utility.
As with current and previous versions of Windows, you can change from the default category
view to classic view (large icon view or small icon view). Icon view is an alternative view that
provides the look and functionality of Control Panel in Windows 2000 and earlier versions of
Windows where all options are displayed as applets or icons.
The Microsoft Management Console (MMC) is one of the primary administrative tools used
to manage Windows and many of the network services provided by Windows. It provides a
standard method to create, save, and open the various administrative tools provided by
Windows. When you open Administrative Tools, most of these programs are MMC.
Figure 1-9
Opening Control Panel
Administrative Tools is a folder in the Control Panel that contains tools for system adminis-
trators and advanced users. To access the Administrative Tools, open the Control Panel, open
Administrative Tools by clicking Start, Control Panel, System and Security while in category
view or double‐click the Administrative Tools applet while in icon view. There is also a quick
link on Windows that can be accessed by clicking the Start button.
Some common administrative tools in this folder include:
• Component Services: Configures and administers Component Object Model (COM)
components. Component Services is designed for use by developers and administrators.
• Computer Management: Manages local or remote computers by using a single, consoli-
dated desktop tool. Using Computer Management, you can perform many tasks, such as
monitoring system events, configuring hard disks, and managing system performance.
• ODBC Data Sources: Uses Open Database Connectivity (ODBC) to move data from
one type of database (a data source) to another.
• Event Viewer: Views information about significant events, such as programs starting or
stopping or security errors that are recorded in event logs.
• iSCSI Initiator: Configures advanced connections between storage devices on a network.
• Local Security Policy: Views and edits Group Policy security settings.
• Performance Monitor: Views Advanced system information about the processor, mem-
ory, hard disk, and network performance.
• Print Management: Manages printers and print servers on a network and perform other
administrative tasks.
• Services: Manages the different services that run in the background on your computer.
• System Configuration: Identifies problems that might be preventing Windows from
running correctly.
• System Information: Shows details about your computer’s hardware configuration,
computer components, and software, including drivers.
• Task Scheduler: Schedules programs or other tasks to run automatically.
• Windows Memory Diagnostics: Checks your computer’s memory to see whether it is
functioning properly.
• Windows PowerShell: A task‐based command‐line shell and scripting language designed
especially for system administration.
When you use these tools, you might assume that they are used only to manage the local
computer. However, many of them can be used to manage remote computers as well. For
example, you can use the Computer Management console to connect to and manage other
computers, assuming you have administrative rights to the computer.
Some of the most important configuration settings for a user are the system settings
within the Control Panel. These include gathering generation information about your
system, changing the computer name, adding the computer to a domain, accessing the
device manager, configuring remote settings, configuring startup and recovery options, and
configuring overall performance settings.
Figure 1-10
Displaying System settings
Figure 1-11
Displaying System Properties
One of your easiest but most essential tasks is making sure that the computer has the
correct date and time, which is essential for logging purposes and for security. If a secure
packet is sent with the wrong date or time, the packet may be automatically denied because
the date and time is used to determine if the packet is legit.
To access the date and time settings, perform one of the following steps:
• Click Clock, Language, and Region in the Control Panel while in Category view and click
Set the time and date.
• Double‐click Date and Time while in Icon view.
• If the date and time show in the Notification area, double‐click the date and time.
To set the clock:
1. Click the Date and Time tab and then click Change date and Time.
2. Double‐click the hour, minutes, or seconds, and then click the arrows to increase or
decrease the value.
3. When you are finished changing the time settings, click OK.
To change the time zone, click Change time zone and click your current time zone in the
drop‐down list. Then click OK.
If you are part of a domain, the computer should be synchronized with the domain control-
lers. If you have a computer that is not part of a domain, you can synchronize with an Internet
time server by clicking the Internet Time tab and selecting the checkbox next to Synchronize
with an Internet time server. Then select a time server and click OK.
Managing Devices
As most people know, a PC is a collection of hardware devices, all of which are connected
together and installed in a single case. Disk drives, keyboards, mice, modems, and printers are
all types of devices. To communicate with the operating system running on the computer, each
device also requires a software element called a device driver. The device driver provides the
operating system with information about a specific device.
For example, when you use a word processing application to save a file to a hard disk, the
application issues a generic WriteFile function call to the operating system. The application
knows nothing specific about the disk drive hardware; it just issues an instruction to store a
particular file there. When the operating system processes the function call, it accesses the
device driver for the hard disk drive, which provides detailed information about how to
communicate with the drive. If the user selects a different target location for the file, the
operating system accesses the device driver for that location, whether it’s a hard drive, a floppy
drive, or USB flash drive.
In most cases the information the device driver provides is integrated into the Windows
interface. For example, the Properties sheet for a printer includes generic system information
(see Figure 1-12), such as which port the printer is connected to and who is permitted to use
it. Other tabs, and particularly the Device Settings tab, as shown in Figure 1-13, are based on
hardware‐specific information provided by the device driver.
Figure 1-12
The General Settings tab of a
printer’s Properties sheet
Figure 1-13
The Device Settings tab of a
printer’s Properties sheet
In addition to providing information about a device, drivers also permit the operating system
to modify the hardware configuration settings of the device. For example, when you configure
a printer to print a document in landscape mode instead of portrait mode, the printer device
driver generates the appropriate commend and sends it to the hardware.
The process of installing a hardware device consists primarily of identifying the device and
installing a device driver for it. This process can occur during the operating system installation
or at a later time, but the steps are fundamentally the same.
A major part of the Windows 10 installation process consists of identifying the devices in the
computer and installing the appropriate drivers for them. The Windows 10 installation
package includes hundreds of drivers for many different devices, which is why many installa-
tions finish without any user intervention. Sometimes, however, you might have to supply
device drivers yourself.
Figure 1-14
Devices and Printers
Most PCs use USB connections for peripheral devices, and Plug and Play is an integral part of
the USB standard. When you connect a printer, a camera, a scanner, or another type of device
to a computer running Windows 10 using a USB port, the system usually detects it, adds it to
the Devices and Printers folder and installs the appropriate device driver for it.
You can also manually install a device by selecting Add a device, which displays the Choose a
device or a printer to add to this PC page.
Figure 1-15
The Windows 10 Device
Manager
• Select the device and choose Disable from the Action menu.
• Right‐click the device and choose Disable from the context menu.
• Open the device’s Properties sheet and click the Disable button on the Driver tab.
Disabling a device does not affect the hardware in any way or uninstall the device driver; it
simply renders the device inoperative until you enable it again. Obviously, you cannot disable
devices that are necessary for the system to function, such as the processor, and some devices
that are in use require you to restart the system before they can be disabled.
Disabling a device releases the hardware resources it was using back to the operating system.
If you restart the computer with the device disabled, Windows might reassign those hard-
TAKE NOTE
* ware resources to other devices. If you re‐enable the device, the computer might allocate
different hardware resources to it than it had originally.
When you update a driver using Device Manager, you can point to a location on your com-
puter where you have already saved the new driver, or you can run a search of your computer
and the Internet. To update a device driver, use the following procedure.
Figure 1-16
The How Do You Want To
Search For Driver Software?
page
4. Click Browse My Computer For Driver Software to specify a location for the driver
or to select from a list of installed drivers. Click Search Automatically For Updated
Driver Software to initiate a search for a driver.
5. Click Next when you locate the driver you want to install. The Windows Has
Successfully Update Your Driver Software page appears.
6. Click Close.
7. Close the Device Manager window.
When you update a device driver in Windows 10, the operating system does not
discard the old driver completely. It is not uncommon for new drivers to cause more
problems than they solve, and many users find that they would prefer to go back to
the old version. Windows 10 makes this possible with the Roll Back feature, which
you initiate by clicking the Roll Back Driver button on the Driver tab of the device’s
Properties sheet. This procedure uninstalls the current driver and reinstalls the
previous version, returning the device to its state before you performed the most recent
driver update.
Installing a new hardware device or a new device driver is a risky undertaking. There is
always the possibility of a problem that, depending on the devices involved, could be
trivial or catastrophic. For a peripheral device, such as a printer, a hardware misconfigura-
tion or faulty driver would probably just cause the new device to malfunction. However, if
the device involved is a graphics adapter, a bad driver could prevent the system from
functioning.
Figure 1-17
The Action Center
Windows to re‐allocate hardware resources to the device, which could resolve the problem
if it was caused by a hardware resource conflict.
• If the device or driver malfunction prevents the system from running properly, as
in the case of a bad graphics driver that prevents an image from appearing on
the screen, you can start the computer in Safe Mode by pressing the F8 key as
the system starts. Safe Mode loads the operating system with a minimal set of
generic device drivers, bypassing the troublesome ones, so you can uninstall or
troubleshoot them.
Device Manager also displays all of the devices installed on your computer. When a device is
experiencing problems, Device Manager uses symbols to provide information about the
particular error condition.
When there is an issue with a device, you will see one of the following symbols (each symbol
represents a specific type of problem):
• Blue question mark inside white circle: Driver installed; may not provide full
functionality.
• Red “X”: device is installed in computer and is consuming resources; protected mode
driver not loaded; device installed improperly.
• Black exclamation point on yellow field: Device in problem state; the device might be
functioning; problem code will be displayed with device.
• Blue “I” on white field: Use automatic settings not selected for device; resource was
manually selected; does not indicate a problem or disabled state.
• Problem code: Code explaining the problem with the device.
• White circle with down arrow: Device was disabled by an administrator or user.
• Yellow warning symbol with exclamation point: There is a problem with the
device.
Windows 10 uses built‐in hardware diagnostics to detect hardware problems on your
computer. When problems are identified, a message appears that lets you know
about the problem. If you select the message, you will be taken to the Action
Center, which provides a central location to view any problems with your hardware
or software.
When there is a problem, you will see two types of messages in the notification area (the
bottom‐right corner of your desktop):
• Red items (white flag, red circle with white x): These are important messages
that indicate a significant problem that needs to be addressed. For example,
your firewall is turned off, or spyware or antivirus applications need to be
updated.
• Yellow items: These are messages that suggest tasks that can make your computer
run better. For example, updating an application or configuring Windows Update
to automatically download and install updates rather than checking with you
beforehand.
How you troubleshoot a device depends upon the type of problem you encounter.
For example, when you notice a device with the black exclamation point in a yellow
triangle, you can double‐click the device to investigate the problem further. Figure 1-18
shows that the device cannot start and the specified request is not a valid operation for the
target device.
Another item of interest when troubleshooting device problems is to look for an Other
Devices folder. This folder contains devices detected by Windows but lacks a driver for
the device.
Figure 1-18
Troubleshooting a device
Windows desktop settings is a broad term that refers to many different settings you can
configure to personalize Windows, such as the Windows theme, the desktop background,
THE BOTTOM LINE
mouse clicks and pointer speeds, gadgets, shortcuts, and more. All settings are customiz-
able—choosing the right mix will make your Windows experience more enjoyable and
more productive.
The Windows desktop is a flexible, configurable part of the Windows environment. You can grab
CERTIFICATION READY
Configure desktop settings
the Taskbar and move it to either side of the screen, to the top, or back to its default location at the
1.2
bottom (the Taskbar must be unlocked to move it—right‐click the Taskbar and, if Lock the taskbar
is checked, select the box to deselect it). You can also choose which items appear in the notification
area on the right side of the Taskbar by configuring the Taskbar Properties dialog box. To access this
dialog box, right‐click the Taskbar and choose Properties, as shown in Figure 1-19.
Figure 1-19
Opening the Taskbar and Start
Menu Properties dialog box
Windows 10 has the ability to pin program shortcuts directly to the Taskbar; when you
pin a program, the icon for that program displays on the Taskbar even when the program
isn’t running. This provides you with quick access to your frequently used programs.
Shortcuts for Task View, Microsoft Edge, File Explorer, and Store appear there by default.
You can unpin programs from the Taskbar as well. You’ll learn about shortcuts later in
the lesson.
When you open a program in Windows 10, an icon for that program displays on the
Taskbar. To activate a program, just click its icon on the Taskbar. If you have several
programs open at once, Windows allows you to hover the mouse pointer over an icon
in the Taskbar to see a thumbnail preview of the window. This thumbnail preview is
called a Jump List. You can also press and hold the Alt key and then press the Tab key
repeatedly to switch between windows and see live previews of the window for each
open program.
Many Windows 10 desktop settings are available when you right‐click a blank area of the
desktop and choose Personalize. The Personalization window is shown in Figure 1-20. The
main part of the window displays various themes you can use. Just click the theme of your
choice and see the changes take effect immediately.
You can also change the background of any theme. Just click Background. In the Background
window, open the Picture location drop‐down list, and then select a picture, a solid color, or a
slideshow.
When you click the Themes > Advanced sound settings, the Sound dialog box opens (see
Figure 1-21). From here, you can choose different sounds to accompany Windows events,
such as when you connect a device or when you close Windows. The computer’s sound
volume must be set at an appropriate level to actually hear the sound.
When you click the Lock screen option, you can click the Screen saver settings option to open
the Screen Saver Settings dialog box (as shown in Figure 1-22). Then open the Screen saver
drop‐down list, select a screen saver, and click OK.
Figure 1-20
The Windows 10
Personalization window
Figure 1-21
The Sound dialog box
Figure 1-22
Configuring the screen saver
Windows 10 uses the Modern UI/Metro style that utilizes the Start menu. The Start menu
contains a list of applications and Desktop programs via pinned tiles. The pinned tiles have
different sizes and colors. In addition, you can pin folders to the new Start screen.
To pin an item to the Start screen, find a program or file by using the All apps option, by
using Cortana, or by using File Explorer. Then right‐click the program, application or folder
and choose Pin to Start in App bar or popup menu. Some tiles allow for additional actions.
For example, when you pin This PC to the Start menu, you can quickly open Computer
Management or System Properties or you can connect/disconnect network drives.
A user profile is a series of folders, associated with a specific user account that contain
personal documents, user‐specific registry settings, Internet favorites, and other personal-
ized information—everything that provides a user’s familiar working environment. On a
Windows 10 computer, user profiles are stored in the Users folder, within subfolders
named for the user accounts.
On computers running Windows 10, user profiles automatically create and maintain the
desktop settings for each user’s work environment on the local computer in a folder beneath
C:\Users. The system creates a new user profile for each user logging on at the computer for
the first time.
Each user folder contains a separate user profile for that person. A typical user profile consists
of the following folders, some of which are hidden, plus a hidden registry file:
• AppData
• Contacts
• Desktop
• Downloads
• Favorites
• Links
• My Documents
• My Music
• My Pictures
• My Videos
• Saved Games
• Searches
When a user logs on at the workstation using a local or domain account, the system
loads that individual’s profile and uses it throughout the session until the user logs
off. During the session, the My Documents folder in the user’s profile becomes
the operative My Documents folder for the system, as do all the other folders in
the profile.
There are three main types of user profiles, as follows:
• Local user profile: A profile that Windows automatically creates when each user logs on
at the computer for the first time. The local user profile is stored on the computer’s local
hard disk.
• Roaming user profile: A copy of a local user profile that is stored on a shared server drive,
making it accessible from anywhere on the network.
• Mandatory user profile: A roaming profile that users cannot change. Administrators use
mandatory user profiles to enforce particular desktop settings for individuals or for a
group of users. A fourth variation, called a super‐mandatory profile, requires the user to
access the server‐based profile or the logon fails.
Figure 1-23
The Profile tab of a user’s
Properties sheet
Then, the next time the user logs on, Windows 10 accesses the roaming user profile in the
following manner:
1. During the user’s first logon, the computer copies the entire contents of the roaming
profile to the appropriate subfolder in the Users folder on the local drive. Having the
roaming user profile contents stored on the local drive enables the user access to the
profile during later logons, even if the server containing the roaming profile is
unavailable.
2. The computer applies the roaming user profile settings to the computer, making it the
active profile.
3. As the user works, the system saves any changes he or she makes to the user profile to the
copy on the local drive.
4. When the user logs off, the computer replicates any changes made to the local copy of the
user profile back to the server where the roaming profile is stored.
5. The next time the user logs on at the same computer, the system compares the contents
of the locally stored profile with the roaming profile stored on the server. The computer
copies only the roaming profile components that have changed to the copy on the local
drive, which makes the logon process shorter and more efficient.
You should create roaming user profiles on a file server that you back up frequently, so that
you always have copies of your users’ most recent profiles. To improve logon performance for a
busy network, place the users’ roaming profiles folder on a member server instead of a domain
controller.
To create a mandatory user profile, rename the Ntuser.dat file in the folder containing the
roaming profile to Ntuser.man. The Ntuser.dat file consists of the Windows 10 system registry
settings that apply to the individual user account and contains the user environment settings,
such as those controlling the appearance of the desktop. Renaming this file with a .man
extension makes it read‐only, preventing the client computers from saving changes to the
profile when a user logs off.
Windows 10 has several display settings, but you’re most likely to modify the resolution,
color depth, and font size most often. You can modify each setting to suit a particular
application.
When you right‐click the desktop and choose Display Settings, the Display page opens.
This is where you can change the orientation and the size of the text and apps, as shown in
Figure 1-24.
To open the screen resolution window (as shown in Figure 1-25), click the Advanced display
settings option. This is where you choose which monitor to use (if your computer is connected
to two or more monitors) and whether to display content in a landscape orientation or a
portrait orientation. You can also configure settings to connect a projector to your computer.
Three other important display settings you might want to adjust for specific purposes are
resolution, color depth, and font size.
Resolution refers to the number of pixels that create the “image,” that is, everything you see on
the screen. Resolution has a horizontal value and a vertical value, such as 1200 x 768 or 1600 x
900. The Windows desktop expands itself to fit whatever resolution you select, so you always
have a full background. Similarly, the Taskbar stretches across the bottom of the screen,
regardless of the resolution you choose.
You might need to change a computer’s screen resolution for a variety of reasons, such as when
you’re accommodating a visually impaired user or when you’re using an external projector.
Figure 1-24
Opening the Display Settings
page
Figure 1-25
The Advanced Display Settings
page
Your computer’s monitor has a minimum and a maximum resolution it can display, so
Windows 7 gives you a range of resolutions to choose from.
Screen fonts are usually measured in dots per inch (dpi). You can enhance the appearance
of your desktop by adjusting font size dpi to improve the readability of pixelated or
illegible fonts.
Configuring Shortcuts
Shortcuts are icons you can click to start a program or go to a location without requiring
any extra steps. Shortcuts save time because you don’t have to use several keystrokes or
click several menus or commands.
An icon is a small, visual symbol of a computer resource, such as a program, folder, file, or
drive. To access an actual computer resource, click or double‐click its icon. Some icons are
located on the desktop, others are in the Start menu, and still others might appear in the list of
files and folders in Windows Explorer.
A shortcut (see Figure 1-26) is an icon or link that gives you quick access to an original
resource. The links you see in Control Panel are also considered shortcuts. Because a shortcut
only points to a resource, deleting a shortcut does not delete the actual item. You can usually
distinguish a shortcut icon from the original item it refers to because the shortcut has a small
arrow in the shortcut icon’s lower‐left corner.
Figure 1-26
Shortcut icons
If you regularly access a particular folder, for example, you can create a shortcut to that folder
on the desktop. Whenever you want to open that folder, double‐click the icon instead of
launching Windows Explorer and navigating to the folder to open it.
Group Policy is one of the most powerful features of Active Directory that controls the
working environment for user accounts and computer accounts. Group Policy provides
centralized management and configuration of operating systems, applications, and user
settings in an Active Directory environment. For example, you can use Group Policy to
specify how often a user must change his password, set the desktop background image and
screensaver on a person’s computer, or configure spell‐checking so that it is required before
a user can send an email.
There are literally thousands of settings that can be used to restrict certain actions, make a
system more secure, or standardize a working environment. A setting can control a computer
registry, NTFS security, an audit and security policy, software installation, folder redirection,
offline folders, or log on and log off scripts. Group Policy is one of the most powerful features
of Active Directory that controls the working environment for user accounts and computer
accounts. Group Policy (see Figure 1-27) provides the centralized management and configura-
tion of operating systems, applications, and user settings in an Active Directory environment.
As each server version is released, Microsoft usually adds additional parameters.
Group Policy objects (GPOs) are collections of user and computer settings, including the
following:
• System settings: Application settings, desktop appearance, and behavior of system services.
• Security settings: Local computer, domain, and network security settings.
• Software installation settings: Management of software installation, updates, and removal.
• Scripts settings: Scripts for when a computer starts or shuts down and for when a user
logs on and off.
• Folder redirection settings: Storage for users’ folders on the network. For example, the
Redirect to the local user profile location option will move the location of the folder to the
local user profile under the Users folder.
Figure 1-27
Group Policy Editor
Figure 1-28
The Group Policy Management
Console
If you configure a Group Policy setting at the site, domain, or OU level and that setting
contradicts a setting configured at the local policy level; the local policy setting will be overrid-
den. Generally speaking, if you have a policy setting that conflicts with a previous executed
setting, the more recent executed setting remains in effect (see Figure 1-28).
Most times, you only need to access the security settings that you found in the local policy.
This can be done by opening the Local Security Policy from Administrative Tools.
As discussed, group policies are organized according to computer settings (contained in the
Computer Configuration node) and user settings (contained in the User Configuration node).
The Computer Configuration node contains settings that are applied to the computer
regardless of who logs on to the computer. By default, computer settings are applied when the
computer is started. The User Configuration node contains settings that are applied when
the user logs on. Group policy settings are refreshed every 90 minutes with a random delay of
30 minutes (giving a random range between 90 minutes and 120 minutes). On domain
controllers, group policies get refreshed every five minutes.
Starting with Windows Server 2008, the Computer Configuration and User Configuration
nodes are divided into Policies and Preferences nodes. Policies include the traditional settings
that were available with earlier versions of Windows, but also have many new settings that
were not available previously. Preferences allow you to configure additional Windows settings
that were not available previously and they allow more control on how the settings are applied
to the clients.
Computer Configuration\Policies can be organized according to the following nodes:
• Software Settings: Contains only one node, Software installation, which allows you to
install and maintain software within your organization.
• Windows Settings: Allows you to configure Windows settings, including Name
Resolution Policy, Scripts (Startup/Shutdown), Security Settings, and Policy‐Based QoS
nodes.
• Administrative Templates: Contains registry‐based Group Policy settings that are used to
configure the computer environment, such as the Control Panel, Printers, System, and
Windows components.
Software Configuration\Policies can be divided into the following nodes:
• Software Settings: Contains only one node, Software installation, which allows you to
install and maintain software within your organization.
• Windows Settings: Allows you to configure Windows settings, including Scripts (Logon/
Logoff ), Security Settings, Folder Redirection, and Policy‐Based QoS nodes.
• Administrative Templates: Contains registry‐based Group Policy settings that are used to
configure the user environment, such as the Control Panel, Printers, System, and
Windows components.
need to change the policy to Disabled (or create a second policy) and is applied to the
computer and/or user. After the policy is applied, the policy can be removed. The policy can
also be manually removed using the registry editor (HKEY_CURRENT_USER\Software\
Microsoft\Windows\CurrentVersion\Policies and HKEY_LOCAL_MACHINE\Software\
Microsoft\Windows\CurrentVersion\Policies).
Some Administrative Templates will be used to configure a setting such as specifying a desktop
image or specifying a screen saver. Although these settings are configured with group policies,
some of these settings can be changed while the computer is running. However, when the
group policy is reapplied, the setting will revert back to the setting defined with the GPO.
Other settings will used to lock down a computer so that users cannot modify a setting or hide
the setting from the user.
Encryption is the process of converting data into a format that cannot be read by another
user. Once a user has encrypted a file, that file remains encrypted when the file is stored on
THE BOTTOM LINE disk. Decryption is the process of converting data from encrypted format back to its origi-
nal format. You can use encryption to help protect files on a computer.
CERTIFICATION READY
Today, newer versions of Windows offer two file encrypting technologies: Encrypting File
Configure drive encryption System (EFS) and BitLocker Drive Encryption. EFS protects individual files or folders;
1.3 BitLocker protects entire volumes.
Encrypting File System (EFS) can encrypt files on an NTFS volume and those files
cannot be used unless the user has access to the keys required to decrypt the information.
By default, when you encrypt a file with EFS, the file or folder turns green to show that
the file is encrypted.
After a file has been encrypted, you do not have to manually decrypt an encrypted file before
you can use it. Instead, you work with the file or folder just like any other file that is not
encrypted. When you open a file that is encrypted with EFS, the file is automatically
decrypted as needed. When you save the file, it is automatically decrypted. However, if
another user tries to access the same file, he cannot open it because he does not have the
proper key to open the file.
EFS uses an encryption key to encrypt the data, which is stored in a digital certificate. The first
time a user encrypts a file or folder, an encryption certificate and key are created and bound to
the user account. The user who creates the file is the only person who can read it. As the user
works, EFS encrypts the files using a key generated from the user’s public key. Data encrypted
with this key can be decrypted only by the user’s personal encryption certificate, which is
generated using a private key.
CONFIGURING EFS
To encrypt or decrypt a folder or file, enable or disable the encryption attribute just as you set
any other attribute, such as read‐only, compressed, or hidden. If you encrypt a folder, all files
and subfolders created in the encrypted folder are automatically encrypted. Microsoft recom-
mends that you encrypt at the folder level. You can also encrypt or decrypt a file or folder
using the Cipher command.
Figure 1-29
The Advanced Attributes dialog
box
Configuring BitLocker
Unlike EFS, BitLocker allows you to encrypt the entire volume. Therefore, if a drive or
laptop is stolen, the data is still encrypted even if the thief installs it in another system for
which he is an administrator.
BitLocker Drive Encryption (BDE) is the feature in Windows since Windows Vista and
Windows Server 2008 that can use a computer’s Trusted Platform Module (TPM), which is a
microchip that is built into a computer. It is used to store cryptographic information, such as
encryption keys. Information stored on the TPM can be more secure from external software
attacks and physical theft. BitLocker Drive Encryption can use a TPM to validate the integrity
of a computer’s boot manager and boot files at startup, and to guarantee that a computer’s
hard disk has not been tampered with while the operating system was offline. BitLocker Drive
Encryption also stores measurements of core operating system files in the TPM.
BitLocker is not commonly used on servers, but may become more common in the future
as BitLocker has been improved to work on failover cluster volumes and Storage Area Net-
works (SANs). Instead, most organizations use physical security for servers (such as locked
server room and/or server rack that can be accessed only by a handful of people) to prevent
TAKE NOTE
* the computer and drives from being stolen.
Instead, BitLocker is more commonly used with mobile computers and, to a lesser extent,
desktop computers. However, it takes a domain infrastructure with Windows servers to get
the most benefits from BitLocker and the management of systems running BitLocker.
BitLocker supports NTFS, FAT16, FAT32 and ExFAT on USB, Firewire, SATA, SAS, ATA,
IDE, and SCSI drives. It does not support CD File System, iSCSI, Fiber Channel, eSATA, and
Bluetooth. BitLocker also does not support dynamic volumes; it supports only basic volumes.
BitLocker has five operational modes for OS drives, which define the steps involved in the
system boot process. These modes, in descending order from most secure to least secure, are as
follows:
• TPM + startup PIN + startup key: The system stores the BitLocker volume encryption
key on the TPM chip, but an administrator must supply a personal identification number
(PIN) and insert a USB flash drive containing a startup key before the system can unlock
the BitLocker volume and complete the system boot sequence.
• TPM + startup key: The system stores the BitLocker volume encryption key on the TPM
chip, but an administrator must insert a USB flash drive containing a startup key before
the system can unlock the BitLocker volume and complete the system boot sequence.
• TPM + startup PIN: The system stores the BitLocker volume encryption key on the
TPM chip, but an administrator must supply a PIN before the system can unlock the
BitLocker volume and complete the system boot sequence.
• Startup key only: The BitLocker configuration process stores a startup key on a USB
flash drive, which the administrator must insert each time the system boots. This mode
does not require the server to have a TPM chip, but it must have a system BIOS that
supports access to the USB flash drive before the operating system loads.
• TPM only: The system stores the BitLocker volume encryption key on the TPM chip,
and accesses it automatically when the chip has determined that the boot environment is
unmodified. This unlocks the protected volume and the computer continues to boot. No
administrative interaction is required during the system boot sequence.
When you use BitLocker on fixed and removable data drives that are not the OS volume, you
can use one of the following:
• Password
• Smart card
• Automatic Unlock
When you enable BitLocker using the BitLocker Drive Encryption control panel, you can
select the TPM + startup key, TPM + startup PIN, or TPM only option. To use the TPM +
startup PIN + startup key option, you must first configure the Require additional authentica-
tion at startup Group Policy setting, found in the Computer Configuration\Policies\
Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating
System Drives container.
Figure 1-30
The BitLocker Drive Encryption
window
3. In the left pane, click TPM Administration. If you are prompted for an administrator
password or confirmation, type the password or provide confirmation.
The TPM Management on Local Computer snap‐in tells you whether your computer has the
TPM security hardware. If your computer doesn’t have it, you’ll need a removable USB
memory device to turn on BitLocker and store the BitLocker startup key that you need
whenever you start your computer.
If your computer does not have TPM and you need to encrypt the C drive with BitLocker, you will
have to set the Allow BitLocker without a compatible TPM option to Require additional authenti-
cation at startup using a GPO. This setting is located at Computer Configuration\Administrative
Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives. Double‐
click the Require additional authentication at startup setting, select Enabled, and select the Allow
BitLocker without a compatible TPM option. Click OK to save the new setting.
TURN ON BITLOCKER
GET READY. To turn on BitLocker for the C drive on a computer running Windows 10,
perform the following steps.
1. Click Start and then click the Control Panel.
2. Click System and Security and then click BitLocker Drive Encryption. The BitLocker
Drive Encryption window opens.
3. Click Turn on BitLocker for the volume that you want to encrypt. A BitLocker Drive
Encryption (X:) window opens.
✚ MORE INFORMATION
If your computer has a TPM chip, Windows provides a TPM Management console that you can use to change the
chip’s password and modify its properties.
4. On the Choose how you want to unlock this drive page, select Enter a password. Type
a password in the Enter your password text box and the Reenter your password text
box. Click Next.
5. On the How do you want to back up your recovery key? page, click Save to a file.
6. In the Save BitLocker recovery key as dialog box, click Save.
7. After the file is saved, make sure the key is stored in a safe place. Then click Next.
8. On the Are you ready to encrypt this drive page, the Run BitLocker system check option
is already selected. Click Continue.
9. When a message indicates the computer must be restarted, click Restart now.
When the encryption process is complete, you can open the BitLocker Drive Encryption
Control Panel to ensure that the volume is encrypted or to turn off BitLocker, such as when
you want to perform a BIOS upgrade or other system maintenance.
The BitLocker Control Panel applet enables you to recover the encryption key and recovery
password at will. Figure 1-31 shows the following options available after you use BitLocker to
encrypt a drive:
• Back up your recovery key
• Change password
• Remove password
• Add smart card
• Turn on auto‐unlock
• Turn off BitLocker
You should consider carefully how to store this information, because it allows access to the
encrypted data. It is also possible to escrow this information into Active Directory.
Figure 1-31
The BitLocker applet options for
a BitLocker‐encrypted volume
Standard users can change the password or PIN if they know the current PIN or password.
By default, a user has five attempts to type the current PIN or password. When this hap-
pens, the administrator has to reset the volume PIN or password or the system needs to be
rebooted. To make sure that password or PIN is not too easy to guess, you can define how
complex the password is by using a group policy. To define the complexity, enable and
configure the Configure use of passwords for fixed data drives settings found in Computer
Configuration\Policies\Administrative Templates\Windows Components\BitLocker Drive
Encryption\.
■ Configuring Updates
Intruders and some viruses, worms, rootkits, spyware, and adware gain access to a system by
exploiting security holes in Windows, Internet Explorer, Microsoft Office, or other software
THE BOTTOM LINE applications. Therefore, the first step you should take to protect yourself against malware
is to keep your system up to date with the latest service packs, security patches, and other
critical fixes.
Microsoft routinely releases security updates on the second Tuesday of each month, commonly
known as Patch Tuesday. However, in the future, Microsoft might release patches as soon as
they become available.
Because computers are often used as production systems, you should test any updates
to make sure they do not cause problems for you. Although Microsoft performs intensive
testing, occasionally problems do occur, either as a bug or as a compatibility issue
with third‐party software. Therefore, always be sure you have a good backup of your
system and data files before you install patches so that you have a back‐out plan
if necessary.
When you first install Windows 10, you can choose how you want Windows Update to
function. On a Windows 10 computer, you can open Settings and click Update & security to
open the Windows Update page (see Figure 1-32).
Figure 1-32
The Windows Update page
By clicking Advanced options, you can configure for Automatic updates, give updates for
other Microsoft products when Windows is updated, defer upgrades, and view your update
history (as shown in Figure 1-33).
If your computer is part of an enterprise infrastructure, the enterprise organization might
automatically configure the update settings via a local Group Policy or a domain‐based Group
Policy for your user and/or computer account. Group Policy settings related to Windows
Update can be found in the following locations:
• Computer Configuration > Policies\Administrative Templates > Windows Components >
Windows Update > Configure Automatic Updates
• User Configuration > Policies > Administrative Templates > Windows Components >
Windows Update > Configure Automatic Updates
For corporations, you can also use Windows Server Update Service (WSUS) or System
Center Configuration Manager to keep your systems updated. Smaller organizations might use
WSUS or cloud‐based services such as Microsoft Intune to keep systems up‐to‐date. The
advantage of using one of these systems is that it allows you to test the patch, schedule the
Figure 1-33
The Windows Update Advanced
Options page
updates, and prioritize client updates. Once you determine a patch is safe, you can enable it
for deployment.
If you click the Choose how updates are delivered option, the Updates from more than one
place page displays (see Figure 1-34). Unless you are part of a corporation that is using WSUS
or Configuration Manager, you must use your Internet connection to retrieve updates from
Microsoft. Starting with Windows 10, you can enable the Updates from more than one place
option, which also allows you to get updates from other computers on the same network as
your local computer and from computers on the Internet.
Figure 1-34
The Updates from more than
one place page
As applications became more sophisticated, they were provided more access so that they
could do more on a system. Unfortunately, it was not long before these apps became targets
of intruders and malware. To fix problems with applications and to keep a system or device
secure, you need to keep applications current with the latest updates.
For Microsoft applications, you can find Microsoft updates using Windows Update, WSUS,
Configuration Manager, or Microsoft Intune. To enable updates for Microsoft applications,
you can click Change settings and then select the Give me updates for other Microsoft
products when I update Windows option.
Some non‐Microsoft products also release regular updates. Some of these applications (such as
Adobe products, and Java) have mechanisms that will automatically check for updates and
notify you that updates are available or they will automatically install those updates.
For all intents and purposes, mobile devices (including smart phones and tablets) are
computers that can run a wide range of applications. Since these devices usually contain
personal and corporate information, these devices are also targets of intruders and malware.
Therefore, you need to keep the operating system and the applications up‐to‐date so that
security patches can be applied as they are released.
Applications on smart phones and tablets are usually updated through stores such as Microsoft
Store, Google Play, and iTunes. Fortunately, these stores offer mechanisms to notify you when
updates are available and to automatically install these updates as they become available. For
example, for Windows 10 store the live tile for the Store app change to indicate the number of
app updates that were available, launch the Store app, click the updates link, select all the
updates, click Install. By default, Windows 10 has been automated, whereas these updates are
automatically downloaded and installed as soon as they are available with no user interaction.
S U M M A RY S K I L L M AT R I X
• Group Policy is one of the most powerful features of Active Directory that controls the
working environment for user accounts and computer accounts. Group Policy provides
centralized management and configuration of operating systems, applications, and user
settings in an Active Directory environment.
• Encryption is the process of converting data into a format that cannot be read by another
user. Once a user has encrypted a file, it automatically remains encrypted when the file is
stored on disk. Decryption is the process of converting data from encrypted format back to
its original format. To help protect files on a computer, you can use encryption.
• Today, newer versions of Windows offer two file encrypting technologies: Encrypting File
System (EFS) and BitLocker Drive Encryption. EFS protects individual files or folders;
BitLocker protects entire volumes.
• Intruders and some viruses, worms, rootkits, spyware, and adware gain access to a system
by exploiting security holes in Windows, Internet Explorer, Microsoft Office, or other
software applications. Therefore, the first step you should take to protect yourself against
malware is to keep your system up to date with the latest service packs, security patches,
and other critical fixes.
■ Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in the blanks provided.
1. ____________ enable you to synchronize your desktop across multiple Windows 10 devices.
2. A ____________ is a series of folders, associated with a specific user account that
contains personal documents and settings.
3. The ____________ is a microchip that is built into a computer.
4. To protect computers against intruders and malware, you must ____________.
5. A Windows application that has dynamic content can be viewed at any time from
____________.
6. The primary configuration tool for Windows is the ____________.
7. Computer Management, Event Viewer, and GPO Editor are based on the ____________.
8. For a device to operate in Windows, you must install a ____________.
9. ____________ is the process of converting data into a format that cannot be read by
another user.
10. The ____________ shows important notifications related to the security and
maintenance of your computer.
Multiple Choice
Circle the letter that corresponds to the best answer.
1. Which of the following are types of user accounts used in Windows 10? (Choose all
that apply)
a. Domain‐based accounts
b. Local user accounts
c. Microsoft accounts
d. Computer centric accounts
2. In Windows 10, how can you minimize network traffic when downloading
Windows updates?
a. You can enable file caching.
b. You can enable the WriteFile function.
c. You can enable the Updates from more than one place option.
d. You can enable Internet Sharing.
3. Which of the following is the best place to manage printers and print drivers?
a. Device Manager
b. Devices and Printers folder
c. Print Manager
d. Print Configuration Tool
4. In Device Manager, which of the following indicates that a device is not functioning properly?
a. A red “X
b. A blue question mark inside white circle
c. A black exclamation point on yellow field
d. A white circle with down arrow
e. A yellow warning symbol with exclamation point
5. Which type of profile allows a user within a corporation to use the same user profile no
matter what computer that user accesses?
a. Local user profile
b. Persistent user profile
c. Roaming user profile
d. Mandatory user profile
6. Which of the following allows you to encrypt an entire volume on a mobile computer?
a. EFS
b. DFS
c. SSL
d. BitLocker
7. You have updated the device driver for a network adapter, but now the adapter is not
being recognized. What should you do?
a. Check to see if there is a newer driver
b. Roll back the driver
c. Reinstall Windows
d. Run Windows update
8. You want to configure several computers to use the same desktop background and screensaver
settings. What is the best way to ensure that all systems are compliant with these settings?
a. Use Group Policy
b. Manually configure the systems
c. Modify the registry
d. Generate roaming profiles
9. What is the easiest way to ensure all of your computers include the newest Windows
updates while still ensuring that those updates do not cause any problems for the users?
a. Use Task Scheduler
b. Use WSUS
c. Use Windows updates
d. Use GPOs
10. You install an application and now the system does not boot properly. What should you do?
a. Roll back the application
b. Reinstall the application
c. Run Windows Update
d. Boot the system into safe mode
True / False
Circle T if the statement is true or F if the statement is false.
T F 1. To see the version of Windows, the name of the computer, and the amount of
memory, you can open System Properties.
T F 2. To keep a computer secure, you need only to install all new Windows updates.
T F 3. You have applications on your Windows phone that you downloaded from the
Microsoft Store. The best way to keep these applications up‐to‐date is to visit the
Windows Update website.
T F 4. The most effective way to protect a document is to use NTFS permissions.
T F 5. For a large organization, you should use Microsoft accounts to manage rights and
permissions.
■ Case Projects
Scenario 1‐1: Syncing Settings
You own a small business, and to make it easier for you to work whenever needed, you have a
desktop computer at home, a desktop computer at your office location, and a laptop—and all
machines are running Windows 10. Describe how to ensure that all of the settings are the
same for all machines.
KEY TERMS
access control entry (ACE) Active Directory Certificate asymmetric key
Access Control List (ACL) Services (AD CS) Azure Storage
advanced sharing Billing Administrator
44
As an administrator at the Contoso Corporation, you are responsible for many of the
resources and services that the users of the corporation use. You need to ensure that those
users can access necessary resources and services so that they can perform the duties of their
jobs. You also need to ensure that unauthorized users do not have access to those resources
and services.
Using public cloud services such as OneDrive and Office 365 enable you to take advantage
of hosted solutions. This means users have the ability to access their information from any-
THE BOTTOM LINE where at any time across multiple devices. By using cloud-based services, users can collaborate
via calendars, email, and through document sharing. From an administrative perspective,
it means you gain access to services and programs without the additional overhead of main-
tenance and software upgrades.
CERTIFICATION READY
Public cloud services provide a way to access information from anywhere at any time. There
Describe cloud storage are many definitions for the cloud. Microsoft defines a public cloud as a web-based service
services that is hosted outside of your organization. This means the information technology infrastruc-
2.1 ture (hardware, servers, software, and so on) is located somewhere other than your office and is
managed by a third party (such as hosted). If you use mobile banking—accessing web-based
email or storing your photos online in one of the many services provided—you are interacting
with “the cloud.”
Understanding OneDrive
OneDrive, formerly named SkyDrive, is a file-hosting service that allows you to store
and create files and folders and share them with other users and groups.
OneDrive is a free, secure file-hosting service that enables your users to store, synch, and share
files across devices using the cloud. Using OneDrive, you can create folders, create or upload
files, and share your documents with others. You can also use it to synchronize files and folders
that you select across multiple devices. If you forget to include a file within your synch folder,
you can use OneDrive to connect to your remote computer, locate the file, and then upload it
to your OneDrive space. This process is called fetching.
Microsoft offers two forms of OneDrive:
• OneDrive is free online personal storage that you get with a Microsoft account or
Outlook.com. Currently, it offers 15 GB of free space. You can purchase additional
storage space as you need it.
• OneDrive for Business is online storage intended for business purposes and it’s built
on online SharePoint. It is managed by your organization and it lets you share and
collaborate work documents with coworkers. OneDrive for Business is included with
Office 365.
Figure 2-1
The OneDrive Dashboard
Figure 2-2
The OneDrive for Business
Dashboard
After clicking the link, they are taken to the Groups page, in which they can communicate
with other members via email and also view any files that have been shared to the group.
• Recycle bin: By default, OneDrive storages your deleted files in a Recycle bin for at least
3 days and a maximum of 30 days. If the Recycle bin gets large enough to exceed 10% of
your storage, the duration will be reduced.
Figure 2-3
Saving a Word Web document
8. To specify a file name, click Document1 at the top of the window and then replace
that name by typing Project Scope.
9. Click the OneDrive link (located at the upper-left corner, next to Word Online) to
return to the main screen.
OneDrive for Business has a Share option (accessed by right0clicking the document and
clicking Share) that allows you to share the file with other users, to email everyone about the
file, and to get a link. You can also click the Advanced option to see who access to the docu-
ment and to manage the site permissions, folder, or document permissions.
Understanding OneNote
OneNote, included with Office 2016 and Office 365, is an application that allows
multiple users access to a shared set of notes all at the same time. Everyone’s changes are
automatically synchronized to the notebook, so the notebook is current.
OneNote saves an offline copy on each user’s computer so she can edit the notes even when she’s
not connected to the network. When she connects, OneNote automatically merges her changes
with the Notebook along with everyone else’s changes. When a user adds new sections, pages,
and links in OneNote, the program displays the name of the user (author) who added them.
There are four views to choose from in OneNote:
• Editing View:Allows the notebook to be edited.
• Reading View:Removes extra information like author names and dates of changes.
• Show Authors:Displays the authors of sections, pages, and notebooks.
• Page Versions:Shows various versions of a page.
Understanding Outlook
Outlook can work with Exchange Server or any other mail server to send and retrieve emails,
access shared mailboxes, and access calendars. While Outlook can be executed as a local
application, Outlook can be accessed using your web browser to connect to Outlook Web App
(OWA), also known as Outlook Web Access, as shown in Figure 2-4.
Figure 2-4
Using Office 365 Outlook
Today, an Outlook.com inbox comes with 15 GB of free online storage on OneDrive. If you are using
Office 365 options, user mailboxes can store up to 50 GB (primary mailbox and personal archive).
Taking advantage of cloud computing services such as Microsoft Office 365 can reduce the
workload on your IT staff. It can also improve the collaboration between your team members.
Microsoft Office 365 is a Microsoft subscription–based software service that enables users to
access their documents and collaborate with others from anywhere using their computers, the
web, or their smart devices. Microsoft Office takes the traditional Office suite and moves it to
the cloud. The service includes Office, Exchange, SharePoint, Skype for Business, and Office
Web Apps. By using Office 365, you can offload many of the administrative tasks normally
handled by your IT department. These tasks include managing software updates, patches, and
service packs as well as purchasing additional server hardware to support company growth.
Administration is handled through a Web portal/dashboard in which you can create/manage
user accounts and oversee the health of all services. Microsoft also provides tools to migrate
from your existing on-premise Exchange Server to Office 365.
The service can be used in combination with the desktop version of Microsoft Office and also
works if you don’t have Office installed on your computers.
Office 365 is available in a number of different plans designed to meet different segments of
the market. Each plan uses a per-user/month charge and provides access to either the entire
service or subsets of Office 365.
✚ MORE INFORMATION
To compare plans, go to Microsoft’s website and search for “Office 365 Plans.”
• Hardware: Because Office 365 runs in the cloud, you don’t have to purchase and main-
tain expensive server hardware. You can migrate Exchange Server over to Office 365 while
at the same time increasing the mailbox storage for users.
• Collaboration on projects: Using SharePoint as a document repository and collaboration
workspace, you can connect and work with a geographically dispersed workforce. By using
team sites, you can share a portfolio of company projects, enable employees to access
project information, share documents, and collaborate on project documents.
Figure 2-5
The Office 365 Admin Center
• Password Administrator: Manages requests for services, resets passwords, and monitors
the overall health of the services. Users in this role can reset passwords only for users and
other Password Administrators.
• Service Administrator: Manages service requests and monitors overall health of services.
• User Management Administrator: Manages user accounts and user groups, resets
passwords, and manages service requests. User Management Administrators can also
monitor the overall health of services. They cannot reset passwords for Billing, Global, or
Service Administrators and they cannot delete a Global Administrator or create other
administrators.
✚ MORE INFORMATION
To learn more about Office 365, visit Microsoft’s website and search for “Office 365.”
✚ MORE INFORMATION
To learn more about what is included and pricing for Office 365, visit Microsoft’s website and search for “Office
365 plans.”
There are several options available for deploying Office 2016. The option you choose depends
on the infrastructure you already have in place and the level of IT support available in your
organization. The options you can choose are:
• Deploying directly from the Office 365 portal: This option is designed for organiza-
tions that do not have IT resources; it has a self-service approach. When this option is
used, you can download and install only the 32-bit version of Office 2016.
• Deploying from a network share: This option requires basic IT administration skills and
works well in situations where you have a slow network connection. When this option is
used, you have the option to deploy both 32-bit and 64-bit versions of Office 2016.
• Deploying using Group Policy or System Center Configuration Manager: These two
methods are designed to leverage Active Directory and should be used when deploying to
large groups of users.
Following is a brief overview of the steps involved to deploy Office 2016 directly from
the Office 365 portal. In the exercise that follows, you will learn the following steps in
more detail:
1. The administrator signs up for Office 365, sets a new domain name, creates user
accounts, and assigns licenses to each user.
2. The administrator sends users their temporary passwords by email.
3. Users sign into the Office 365 portal and set up new passwords.
4. Users download and configure their desktops with Office 2016 (32-bit version).
Azure Storage is cloud storage designed for large-scale applications including providing
a storage foundation for Azure virtual machines. The cost for Azure Storage is based
on the amount of data stored and the number of requests made. To allow Azure Storage
to adapt to its usage, Azure Storage users auto-partitioning that automatically load
balances the data based on traffic. Therefore, as the demands on your application grow,
Azure Storage will automatically allocate the appropriate resources to meet those
demands.
Since Azure Storage is on the cloud, it can be accessed from anywhere in the world, and from
any type of application via HTTP/HTTPS. It can also be accessed on a server, desktop
computer, or a mobile device such as a tablet or laptop. Azure Storage can also store a subset of
data on a mobile device that is synchronized with the full set of data stored in the cloud.
Lastly, Azure Storage can be accessed from Windows and Linux machines and a variety of
programming languages (including .NET, Java, and C++).
To access the Azure Storage, you must have an Azure storage account. The storage account will
provide the unique namespace for:
• A standard storage account includes Blob, Table, Queue, and File storage.
• A premium storage account currently supports Azure Virtual Machine disks only. Azure
Premium Storage is available by request via the Azure Preview page.
To create a storage account, you must have an Azure subscription. You can then create up to
100 uniquely named storage accounts with a single subscription.
A standard storage account gives you access to Blob storage, Table storage, Queue storage, and
File storage:
• Blob storage: Stores file data known as blobs. A blob can be any type of text or binary
data, such as a document, media file, or application installer.
• Table storage: Stores structured datasets, which is a NoSQL key-attribute data store that
allows for rapid development and fast access to large quantities of data.
• Queue storage: Provides reliable messaging for workflow processing and for communica-
tion between components of cloud services.
• File storage: Offers shared storage for legacy applications using the standard SMB 2.1
protocol.
Each standard storage account can contain up to 500 TB of combined blob, queue, table, and
file data.
Azure Storage is deployed in 15 regions around the world and supports for replicating data
between regions. To ensure high availability, you have the following options:
• Locally redundant storage (LRS) maintains three copies of your data within a single
facility in a single region. LRS protects your data from normal hardware failures, but not
from the failure of a single facility.
• For maximum durability, you need to use zone-redundant storage (ZRS), which repli-
cates data three times across two to three facilities. ZRS ensures that your data is durable
within a single region.
CERTIFICATION READY
The Storage Spaces feature in Windows 10 allows you to combine several physical drives,
Describe local storage which the operating system will see as one large drive. The drives can be of any capacity and
2.2 can consist of a variety of different drive interfaces—Small Computer System Interface (SCSI),
Universal Serial Bus (USB), and Serial ATA (SATA).
When the drives are combined, Windows places them into a storage pool. These storage pools
can then be segmented into multiple storage spaces, which are then formatted with a file
system and can be used just like any other regular disk on your computer. New disks (internal/
external) can be added to the storage pool as space requirements increase over time.
Although data can be stored on the drives, you cannot use storage spaces to host the Windows
operating system files.
Storage spaces offer two key benefits:
• By spreading data across multiple disks you achieve data resiliency (fault tolerance), which
can protect your data against hard disk failure.
• Volume sizes can be larger than the actual physical size of your drives in the storage pool
(capacity). This is accomplished through a process called thin provisioning.
Creating a storage pool allows you to combine multiple smaller drives that you might not
otherwise be able to use by themselves into a larger single logical volume.
To create a storage pool on a Windows 10 client, you access the Manage Storage Spaces tool
found in the Control Panel. The Wizard prompts you to select the disks that you want to use
and then add them to the storage pool. For example, if you have two physical disks with
capacities of 200 GB and 300 GB, it creates a pool that has a total capacity of 500 GB
(see Figure 2-6).
200 GB 300 GB
300 GB
After selecting the drives to include in your storage pool, you will be prompted to create
the storage space. This involves entering a name, selecting a drive letter, identifying the
type of resiliency you want to configure, and setting the maximum size you want to assign
to the storage space.
When creating storage spaces, there are four resiliency types to select from. Only three of them
provide real fault-tolerance.
• Simple (no resiliency): Writes one copy of your data but doesn’t protect against drive
failures; requires at least one drive.
• Two-way mirror Writes two copies of your data to protect against a single drive failure;
requires at least two drives.
• Three-way mirror Writes three copies of your data to protect against two simultaneous
drive failures; requires at least five drives.
• Parity Writes data with parity information to protect against single drive failures; requires
at least three drives.
You also need to decide how much of the total storage pool capacity you want to use for your
new storage space. In Figure 2-6, you saw the total pool capacity is 500 GB. By using a process
called thin provisioning (see Figure 2-7), you can create a storage space that is larger than the
available capacity of the storage pool. After setting the size, the Wizard will create the storage
space based on the parameters you provided.
Thin provisioning reserves the space for future use. For example, in Figure 2-7, you can see
there are two physical drives being added to the storage pool to create a total capacity of
500 GB. Even though you have a total capacity of only 500 GB, you can configure the storage
space that uses this pool to be 1 TB or greater capacity. When the storage pool approaches
capacity, you will receive a warning and need to add more disks to the pool. This approach
works well in situations in which you expect your data storage needs will grow, but you don’t
want to purchase additional disks immediately.
After the storage space is created, it will appear as a drive in File Explorer. The drive
can be protected using BitLocker and NTFS permissions, just like any other drive in
Windows 10.
200 GB 300 GB 1 TB
300 GB
After completing the setup of your storage space, you can continue to monitor and manage it
from the Manage Storage Space tool. You can perform the following tasks:
• View your storage pool(s)
• View the storage spaces in the pools
• View the physical drives included in the pool(s)
• Identify how much pool capacity is currently being used
• Add more drives to the pool
• Rename the pool
Figure 2-8
Creating a storage space
A file system is a method of storing and organizing computer files and the data they contain
to make it easy to find and access this information. A file system also maintains the physi-
THE BOTTOM LINE cal location of the files so that you can find and access the files in the future. Windows 10
supports FAT16, FAT32, NTFS and Resilient File System (ReFS) file systems on hard drives.
CERTIFICATION READY
The primary file system used by Windows 10 is NTFS. NTFS supports larger disks than
Describe file systems FAT32 or FAT (up to 256 terabytes [TB]) and NTFS-formatted files and folders provide
2.3 better security. It’s also more reliable, with built-in features for recovering from disk errors
automatically. Microsoft recommends NTFS for its security features: You can use encryption
and permissions to restrict file access to specific users.
FAT32 and FAT (which is seldom used today) are file systems that were popular in earlier
versions of Windows (such as Windows 95, Windows 98, Windows Millennium Edition,
Windows NT, and Windows 2000). FAT is an abbreviation for File Allocation Table. The
limitations of FAT32 make it less desirable than NTFS:
• A FAT32 partition is limited to a maximum size of 32 gigabytes (GB).
• The maximum size of a file that can be stored on a FAT32 volume is 4 GB.
So why use FAT32? Many universal serial bus (USB) flash drives come formatted as FAT32 to
be compatible with a large variety of operating systems. If you plan to configure your computer
for multi-booting, where you choose at startup which operating system you want to load, you
might need to format a partition with FAT32 if you need to support an older operating system
Table 2-1
Comparing FAT, FAT32, and FILE SYSTEM MAXIMUM PARTITION SIZE MAXIMUM FILE SIZE
NTFS
FAT 2 GB 2 GB
FAT32 32 GB 4 GB
NTFS 256 TB Limited by size of volume on which it resides
Converting to NTFS is a one-way process. After you convert a drive to NTFS, you can-
TAKE NOTE
* not convert it back to FAT or FAT32. You can reformat an NTFS drive to FAT32, but you
would need to back up all of your data first and then copy it back.
You can also convert to FAT32 from a different type of file system, although you need to keep
the FAT32 size limitations in mind. If the partition you want to format is larger than 32 GB,
the conversion process won’t be successful.
Before converting a disk from one file system to another, back up your data, if possible. If you
have a relatively small number of files on a disk, and no system files or programs installed, it’s
better to back up the data to a different storage medium and then format the disk.
A new file system that was introduced with Windows Server 2012 is the Resilient File System
(ReFS). It is designed to increase data availability, despite errors that would normally cause
data loss or downtime while providing increased scalability and performance.
The features of ReFS include:
• Integrity: Stores data so that it is protected from many of the common errors that can
cause data loss. If corruption occurs, ReFS can detect and, when configured with Storage
Spaces, automatically correct the corruption.
• Availability: If corruption cannot be repaired, the online salvage process is localized to the
area of corruption, requiring no volume downtime.
• Scalability: Designed for the data set sizes of today and the data set sizes of tomorrow; it’s
optimized for high scalability.
• App Compatibility: To maximize compatibility, ReFS supports a subset of NTFS features
plus Win32 APIs that are widely adopted.
• Proactive Error Identification: Includes a data integrity scanner that periodically scans
the volume, attempts to identify latent corruption, and then proactively triggers a repair
of that corrupt data.
While Disk Management does not allow you to create a volume with ReFS, you can create a
volume with REFS when you create a storage space.
The main disk management tool in Windows 10 is the MMC snap-in called Disk
Management, which is also part of the Computer and Management consoles. In addition, you
can use a diskpart.exe and the Format command to partition and format a drive, as well as
Windows Explorer to format a drive.
Disk Management is a system utility for managing hard disks and the volumes or partitions
they contain. With Disk Management, you can initialize disks, create volumes, and format
volumes with the FAT16, FAT32, or NTFS file systems. See Figure 2-9.
Figure 2-9
The Disk Management snap-in
Whenever you add a new disk (either a local hard drive or a virtual drive, such as from a SAN)
to a Windows 10 system, you need to open Disk Management and initialize the disk.
If the disk that you want to initialize does not appear, you may need to right-click Disk
Management and choose Refresh or Rescan Disks. If the disk still does not appear, you need to
make sure that it is connected properly and running.
5. Assign a drive letter or mount the volume to an empty NTFS folder and click the Next
button.
6. Specify the file system (such as NTFS or FAT32), allocation unit size, and volume
label. You can also perform a quick format and enable file and folder compression if
desired. Click Next. See Figure 2-10.
7. When the wizard is complete, click Finish.
Figure 2-10
Formatting the volume
For basic disks, you must first create an extended partition before you can create a new logical
drive, if no extended partition exists already.
If you choose to delete a partition, all data on the deleted partition or logical drive will be lost
unless you previously backed it up. In addition, you cannot delete the system partition, boot
partition, or any partition that contains an active paging file. Windows 10 requires that you
delete all logical drives and any other partitions that have not been assigned a drive letter
within an extended partition before you delete the extended partition itself.
CERTIFICATION READY
A permission is defined as the type of access that is granted to an object, such as NTFS files
Describe file and print and folders. When files and folders are created on an NTFS volume, a security descriptor
sharing known as an Access Control List (ACL) is created. This descriptor includes information that
2.4 controls which users and groups can access the file or folder, as well as what type of access is
granted to particular users and groups. Each assignment of permissions to a user or group is
represented as an access control entry (ACE).
TAKE NOTE
*
NTFS permissions are
managed using File Setting NTFS Permissions
Explorer (explorer.exe).
NTFS permissions allow you to control which users and groups can gain access to files and
folders on an NTFS volume. The advantage of NTFS permissions is that they affect local users
as well as network users.
Usually, when assigning NTFS permissions, you would assign the following standard permissions:
• Full control: This provides permission to read, write, modify, and execute files in a folder;
change attributes and permissions; and take ownership of a folder or the files within it.
• Modify: This provides permission to read, write, modify, and execute files in a folder, as
well as change attributes of the folder or the files within it.
• Read & execute: This provides permission to display a folder’s contents; display the data,
attributes, owner, and permissions for files within the folder; and run files within the folder.
• List folder contents: This provides permission to display a folder’s contents; display the data,
attributes, owner, and permissions for files within the folder; and run files within the folder.
• Read: This provides permission to display a file’s data, attributes, owner, and permissions.
• Write: This provides permission to write to a file, append to the file, and read or change
the file’s attributes.
While List Folder Contents and Read & Execute appear to have the same special
TAKE NOTE
* permissions, these permissions are inherited differently. List folder Contents is inherited by
folders but not files while Read & Execute is inherited by both files and folders.
To manage NTFS permissions, right-click a drive, folder, or file, choose Properties, and then
click the Security tab. You should see the group and users who have been given NTFS permis-
sions and their respective standard NTFS permissions. To change the permissions, click the
Edit button to open the Permissions dialog box, as shown in Figure 2-11. You can then click
the Add button to add additional users or groups or click the Remove button to remove a user
or group.
Each of the standard permissions consists of a logical group of special permissions. The
available special permissions are as follows:
• Traverse folder/Execute file: This permission allows or denies moving through folders to
reach other files or folders, even if the user has no permissions for the traversed folders. By
default, the Everyone group is granted the Bypass traverse checking user right. (This
applies to folders only.) Execute file allows or denies running program files. (This applies
to files only.) Setting the Traverse folder permission on a folder does not automatically set
the Execute file permission on all files within that folder.
• List folder/Read data: This permission allows or denies viewing filenames and subfolder
names within a folder. List folder affects the contents of that folder only and does not
affect whether the folder you are setting the permission on will be listed. (This applies to
folders only.) Read data allows or denies viewing data in files. (This applies to files only.)
• Read attributes: This permission allows or denies viewing the attributes of a file or folder,
such as read-only and hidden.
• Read extended attributes: This permission allows or denies viewing the extended
attributes of a file or folder. Extended attributes are defined by programs and may
vary by program.
Figure 2-11
NTFS permissions
• Create files/Write data: The Create files permission allows or denies creating files
within a folder. (This applies to folders only.) The Write data permission allows or
denies making changes to a file and overwriting existing content. (This applies to files
only.)
• Create folders/Append data: The Create folders permission allows or denies creating
folders within a folder. (This applies to folders only.) The Append data permission allows
or denies making changes to the end of a file but not changing, deleting, or overwriting
existing data. (This applies to files only.)
• Write attributes: This permission allows or denies changing the attributes of a file
or folder, such as read-only or hidden. The Write attributes permission does not
imply creating or deleting files or folders; it only includes the permission to make
changes to the attributes of a file or folder. To allow (or deny) create or delete operations,
see Create files/Write data, Create folders/Append data, Delete subfolders and files, and
Delete.
• Write extended attributes: This permission allows or denies changing the extended
attributes of a file or folder. Extended attributes are defined by programs and may vary by
program. The Write extended attributes permission does not imply creating or deleting
files or folders; it only includes the permission to make changes to the attributes of a file
or folder. To allow (or deny) create or delete operations, see Create folders/Append data,
Delete subfolders and files, and Delete.
• Delete subfolders and files: This permission allows or denies deleting subfolders and
files, even if the Delete permission has not been granted on the subfolder or file.
• Delete: This permission allows or denies deleting the file or folder. If you do not have
Delete permission on a file or folder, you can still delete it if you have been granted Delete
subfolders and files permission on the parent folder.
• Read permissions: This permission allows or denies reading the permissions of a file or
folder, such as full control, read, and write.
• Change permissions: This permission allows or denies changing the permissions of a file
or folder, such as full control, read, and write.
• Take ownership: This permission allows or denies taking ownership of a file or folder.
The owner of a file or folder can always change permissions on it, regardless of any
existing permissions on the file or folder.
• Synchronize: This permission allows or denies different threads to wait on the handle for
a file or folder and synchronize with another thread that may signal it. This permission
applies only to multithreaded, multiprocess programs.
Table 2-2 shows the special permissions assigned to each standard NTFS permission. If for
some reason you need more granular control, you can assign special permissions. To assign
special permissions, right-click a drive, folder, or file, choose Properties, and then click the
Security tab. Then click the Advanced button to open the Advanced Security Settings, click
the Change Permissions button, and click the Add, Edit, or Remove button.
Groups or users that are granted full control permission on a folder can delete any files in that
folder regardless of the permissions protecting the file. In addition, the List folder contents
permission is inherited by folders but not files, and it should only appear when you view folder
permissions. In Windows 10, the Everyone group does not include the Anonymous Logon
group by default, so permissions applied to the Everyone group do not affect the Anonymous
Logon group.
To simplify administration, you can grant permissions using groups. By assigning NTFS
permissions to a group, you are granting permissions to one or more users simultaneously,
reducing the number of entries in each access list, as well as the amount of effort required to
grant multiple users access to certain files or folders.
Table 2-2
NTFS permissions LIST
FOLDER
CONTENTS
SPECIAL FULL READ & (FOLDERS
PERMISSIONS CONTROL MODIFY EXECUTE ONLY) READ WRITE
Traverse x x x x
folder/
Execute file
List folder/ x x x x x
Read data
Read x x x x x
attributes
Read x x x x x
extended
attributes
Create files/ x x X
Write data
Create x x x
folders/
Append data
Write x x x
attributes
Write x x x
extended
attributes
Delete x
subfolders
and files
Delete x x
Read x x x x x x
permissions
Change x
permissions
Take x
ownership
Synchronize x x x x x x
The folder/file structure on an NTFS drive can be complicated, with many folders and
nested folders. In addition, because you can assign permissions to groups and at different
levels on an NTFS volume, figuring out the effective permissions of a particular folder or
file for a particular user can be tricky.
Table 2-3
Inherited permissions OBJECT NTFS PERMISSIONS
Data Allow full control (explicit)
Folder1 Allow full control (inherited)
Folder2 Allow full control (inherited)
File1 Allow full control (inherited)
Table 2-4
Explicit permissions overwrite OBJECT NTFS PERMISSIONS
inherited permissions
Data Allow full control (explicit)
Folder1 Allow read (explicit)
Folder2 Allow read (inherited)
File1 Allow read (inherited)
For example, let’s say you have a folder called Data. Within the Data folder, you have Folder1,
and within Folder1, you have Folder2. If you grant Allow full control to a user account, the
Allow full control permission will flow to the subfolders and files within the Data folder.
In comparison, if you grant Allow full control on the Data folder to a user account and you
grant Allow read permission to Folder1, the Allow read permission will overwrite the inherited
permissions and will then flow to Folder2 and File1.
If a user has access to a file, he or she will still be able to gain access to the file even if he or she
does not have access to the folder containing the file. Of course, because the user doesn’t have
access to the folder, the user cannot navigate or browse through the folder to get to the file.
Therefore, the user will have to use the universal naming convention (UNC) or local path to
open the file.
When you view permissions, they will be one of the following:
• Checked: Here, permissions are explicitly assigned.
• Cleared (unchecked): Here, no permissions are assigned.
• Shaded: Here, permissions are granted through inheritance from a parent folder.
Besides granting the Allow permissions, you can also grant the Deny permission. The Deny
permission always overrides other permissions that have been granted, including when a user
or group has been given Full control. For example, if a group has been granted Read and Write
permission yet one person within the group has been denied the Write permission, that user’s
effective permissions would be the Read permission.
When you combine applying Deny versus Allowed with explicit versus inherited permissions,
the hierarchy of precedence of permission is as follows:
1. Explicit Deny
2. Explicit Allow
3. Inherited Deny
4. Inherited Allow
Because users can be members of several groups, it is possible for them to have several sets of
explicit permissions for a particular folder or file. When this occurs, the permissions are com-
bined to form the effective permissions, which are the actual permissions when logging in and
accessing a file or folder. These consist of explicit permissions plus any inherited permissions.
When you calculate effective permissions, you must first calculate the explicit and inherited
permissions for an individual or group and then combine them. When combining user and
group permissions for NTFS security, the effective permission is the cumulative permission.
The only exception is that Deny permissions always apply.
For example, say you have a folder called Data. Within the Data folder, you have Folder1, and
within Folder1, you have Folder2. If User 1 is a member of Group 1 and Group 2 and you
assign the Allow write permission to the Data folder to User 1, the Allow read permission to
Folder1 to Group 1, and the Allow modify permission to Folder2 to Group 2, then User 1’s
effective permissions would be as shown in Table 2-5.
Table 2-5
Calculating effective USER 1 NTFS GROUP 1 GROUP 2 EFFECTIVE
permissions OBJECT PERMISSIONS PERMISSIONS PERMISSIONS PERMISSIONS
Data Allow write Allow write
(explicit)
Folder1 Allow write Allow read Allow read and
(inherited) (explicit) write
Folder2 Allow write Allow read Allow modify* Allow modify*
(inherited) (inherited) (explicit)
File1 Allow write Allow read Allow modify* Allow modify*
(inherited) (inherited) (inherited)
As another example, let’s say you have a folder called Data. Within the Data folder, you have
Folder1, and within Folder1, you have Folder2. If User 1 is a member of Group 1 and Group
2 and you assign the Allow write permission to the Data folder to User 1, the Allow read
permission to Folder1 to Group 1, and the Deny modify permission to Folder2 to Group 2,
User 1’s effective permissions would be as shown in Table 2-6.
Most users are not going to log onto a server directly to access their data files. Instead, a drive or
folder will be shared (known as a shared folder), and they will access the data files over a network.
To help protect against unauthorized drive or folder access, you should use share permis-
sions along with NTFS permissions (assuming the shared folder is on an NTFS volume). When
a user needs to access a network share, she will use the UNC, which is \\servername\sharename.
Table 2-6
Effective permissions affected USER 1 NTFS GROUP 1 GROUP 2 EFFECTIVE
by Deny permissions OBJECT PERMISSIONS PERMISSIONS PERMISSIONS PERMISSIONS
Data Allow write Allow write
(explicit)
Folder1 Allow write Allow read Allow read and
(inherited) (explicit) write
Folder2 Allow write Allow read Deny modify Deny modify
(inherited) (inherited) (explicit)
File1 Allow write Allow read Deny modify Deny modify
(inherited) (inherited) (inherited)
Traditional Windows file sharing allows you to restrict access to shared specific files and
folders, and choose which users have access. Basic sharing allows you to share a file or folder
with a specific user and restrict the user to Read or Read/Write actions.
The easiest way to share a folder in Windows 10 is to create a basic share by right-clicking a
folder and choosing Share with. If you want to share a folder on a workgroup or domain, you
then click Specific People. When the File Sharing dialog box opens, as shown in Figure 2-12,
you type the name of the user, click Add, and then specify the permission level (Read or
Read/Write).
Figure 2-12
Sharing a folder
Advanced sharing offers the greatest amount of control by allowing you to do the following:
• Share files, folders, or an entire drive
• Choose users or groups with which to share files and folders
• Limit the number of users who may use a file or folder at the same time, mainly for
security purposes
• Set permissions on shared files and folders, such as allowing users Read, Change, or Full
Control
For more control on the share permissions, you can right-click the folder, choose Properties,
and then click the Sharing tab.
SHARE A FOLDER
GET READY. To share a drive or folder in Windows 10, perform the following steps.
1. In Windows 10, right-click the drive or folder, choose Properties, click the Sharing
tab, and then click the Advanced Sharing button.
2. When the Advanced Sharing dialog box opens, select the Share this folder option
3. Type the name of the shared folder.
4. If necessary, specify the maximum number of users who can access the shared folder
at the same time.
5. Click the Permissions button.
6. When the Permissions dialog box opens, by default, Everyone is given the Allow read
shared permission. You can then remove Everyone, expand the Read shared permission,
or add additional users.
7. After users and groups have been added with the proper permissions, (as shown in
Figure 2-13), click OK to close the Permissions dialog box.
Figure 2-13
Adding users and groups and
configuring permissions
When a user logs onto the server and accesses files and folders without using the UNC, only
the NTFS permissions apply, not the share permissions. When a person accesses a shared
folder using the UNC, you must combine the NTFS and share permissions to see what a user
can do. To figure overall access, first calculate the effective NTFS permissions. Then determine
the effective shared permissions. Finally, apply the more-restrictive permissions between the
NTFS and shared permissions.
Figure 2-14
Libraries expanded to show
Public folders
these folders. When Public folder sharing is turned off, only users with a user account and
password on your computer have access. In addition, Windows offers a password-protected
sharing feature that you can use to limit Public folder access to users with a user account and
password on your computer.
Figure 2-15
Configuring sharing options
4. Click Save changes at the bottom of the Advanced sharing settings window. If you’re
prompted for an administrator password or confirmation, type the password or provide
confirmation.
Remember, by turning on password-protected sharing in Control Panel, you can limit Public
folder access to users with a user account and password on your computer.
Using HomeGroup
When you are running Windows 10 within a domain, Windows servers and clients have
several tools and mechanisms to share files and printers. Today, many households have
multiple computers. A HomeGroup is a group of computers on a home network that can
share files and printers. To protect your HomeGroup, you can use a password. Similar to
share permissions, other users cannot change the files that you share unless you give them
permission to do so. When compared to any folder sharing, HomeGroups are relatively
limited, because you can share only the contents of the libraries in the user’s profile.
HomeGroup is available with Windows 7, Windows 8 (including Windows 8.1 and Windows
RT 8.0/8.1) and Windows 10. You can join a HomeGroup on a PC running Windows RT 8.1,
but you can’t create a HomeGroup or share content with the HomeGroup. In Windows 7
Starter and Windows 7 Home Basic, you can join a HomeGroup, but you can’t create one. If
the system does not detect a HomeGroup, the Network and Sharing Center control panel
contains a link providing access to the Create a HomeGroup Wizard.
CREATE A HOMEGROUP
GET READY. Log in to Windows 10 using an account with Administrator privileges. Make sure
that the system is configured to use the Private network location. To create a HomeGroup,
perform the following steps.
1. Open Control Panel and then click Network and Internet > Network and Sharing
Center. The Network and Sharing Center control panel appears.
2. Click the HomeGroup link. The HomeGroup control panel appears (see Figure 2-16).
Figure 2-16
Opening the HomeGroup
control panel
3. Click the Create a homegroup button. The Create a HomeGroup Wizard appears.
4. Click Next. The Share with other homegroup members page appears.
5. Select the libraries that you want to share and then click Next.
6. The wizard creates the HomeGroup and assigns it a password. The Use this password to
add other computers to your homegroup page appears.
7. Click Finish. The wizard closes and the HomeGroup control panel changes to reflect its
current status.
When a Windows 10 computer using the Private network location does detect a HomeGroup
on the network, the Network and Sharing Center control panel appears with an Available to
Join link.
JOIN A HOMEGROUP
GET READY. Log in to Windows 10 using an account with Administrator privileges. Make sure
that the system is configured to use the Private network location. To join a HomeGroup,
perform the following steps.
1. Open Control Panel and click Network and Internet > Network and Sharing Center.
The Network and Sharing Center Control Panel appears.
2. Click the HomeGroup link. The HomeGroup control panel appears.
3. Click Join Now. The Join a HomeGroup Wizard appears.
4. Click Next. The Share with other homegroup members page appears.
5. Select the libraries that you want to share and then click Next. The Type the home-
group password page appears.
6. In the Type the password text box, type the password supplied by the Create a
HomeGroup Wizard and then click Next.
7. The You have joined the homegroup page appears.
8. Click Finish. The wizard closes and the HomeGroup control panel changes to reflect its
current status.
To modify the default HomeGroup sharing configuration, you can select one of your shared
libraries in File Explorer and then, on the Toolbar, click Share. Using the controls that appear
in the ribbon, you can change other HomeGroup users’ access to the library from Read to
Read/Write. You can also limit access to specific HomeGroup users or prevent anyone on the
network from accessing that library.
Mapping Drives
Drive mapping allows you to create a shortcut to a shared folder across a network. Instead of
finding and connecting to the shared drive each time you log on, you can create a mapped
drive that is available at all times. Just double-click the mapped drive to access the shared folder.
When you share a folder in Windows, you are usually using SMB, also known as Common
Internet File System (CIFS). SMB has been around for years to provide shared access to files
and printers. While SMB is usually associated with computers running Windows, it has
become the de facto standard, which is access by most other operating systems including
Linux, UNIX and Macintosh systems. To access a shared folder, you use the universal naming
convention (UNC) based on the \\servername\sharename format. The UNC identifies the
name of the server and the shared folder on the server.
Once you share a folder or drive on your computer with other users, an easy way for them to
get to the shared item is by mapping a drive. A mapped drive is a shortcut to a shared folder
or drive on another computer across a network. Windows Explorer makes this process easy and
straightforward.
By default in Windows 10, network drive letters start from the back of the alphabet (Z: is the
first default drive letter that displays) and work down, so as not to interfere with local drives
(which start with A: and work up). When mapping a drive, you can select any drive letter
that’s not already in use.
A mapped network drive is displayed in Windows Explorer under Computer in the navigation pane.
The mapped drive displays in the Windows Explorer navigation pane. Click it to access the
shared folder.
MAP A DRIVE
GET READY. To assign a drive letter to a shared folder on the network in Windows 10, perform
the following steps.
1. Open File Explorer.
2. Click the Home menu, click Easy access (as shown in Figure 2-17), and then click Map
as drive.
Figure 2-17
Opening the Easy access
options
3. The Map Network Drive Wizard starts. In the drop-down menu, select a drive letter of
your choice (see Figure 2-18).
Figure 2-18
Selecting a drive letter
4. Click Browse and then navigate to the shared folder you want to map to. Alternately,
type the UNC path of the folder.
5. Select the shared folder and then click OK.
6. By default, the Reconnect at sign-in check box is selected. This means the drive
mapping will persist until you manually disconnect it (using the Disconnect
network drive entry in the Tools menu in Windows Explorer). When you’re done,
click Finish.
Sharing Printers
One basic network services is network printing, in which multiple users can share the
same printer. This is a cost-effective solution when you have multiple employees in
different locations.
As an administrator, you can install two types of printers: local and network. Today, most local
printers are connected using USB ports, although some legacy printers may use parallel or
serial ports. Network printers can be shared local printers or printers that connect directly to a
network with built-in network cards or expandable jet-direct cards.
When you install a physical printer, which Microsoft refers to as a print device, you must first
connect the printer and turn it on. Next, you need to create a logical printer (Microsoft refers
to this as the printer), which will provide a software interface between the print device and the
applications. When you create the printer, you also load a print driver that acts as a translator
for Windows and the programs running on Windows so that they do not have to worry about
the specifics of the printer’s hardware and printer language.
When you print a document in Windows, the printer uses the logical printer and printer driver to
format the document into a form that is understood by the printer, including rendering it into a
printer language such as HP’s Printer Control Language or Adobe’s Postscript to create an enhanced
metafile (EMF). The print job is then sent to the local spooler, which provides background printing,
allowing you to print and queue additional documents while your first document is being printed.
If a print job is being sent to the local print device, it will temporarily save it to the local hard
drive’s spool file. When the printer is available, it will then send the print job to the local print
device. If Windows determines that the job is for a network print device, Windows sends the
job to the print server’s spooler. The print server’s spooler will save it to the print server’s hard
drive spool file. Then, when the network print device becomes available, the job will print on
the network print device.
INSTALLING PRINTERS
If you have the correct permissions to add a local printer or a remote shared printer, you can
use the Add Printer Wizard to install the printer. After the printer is installed, it will appear in
the Devices and Printers folder as well as in the Device Manager.
Figure 2-19
Selecting the type of printer
Figure 2-20
Adding a local printer
7. If Plug and Play does not detect and install the correct printer automatically, you will
be asked to specify the printer driver (printer manufacturer and printer model). If the
printer is not listed, you will have to use the Have Disk option.
8. In the Type a Printer Name dialog box, type the name of the printer. If you want this
to be the default printer for the system, select the Set as the default printer option.
Click the Next button.
9. In the Printer Sharing dialog box, type the share name. You can also type the Location
or Comments. Although Windows 10 supports long printer names and share names
(including spaces and special characters), it is best to keep names short, simple, and
descriptive. The entire qualified name, including the server name (for example,
\\Server1\HP4100N-1), should be 32 characters or fewer.
10. When the printer is successfully added, you can print the standard Windows test page
by clicking the Print a test page button. Click Finish.
Windows Servers can provide a driver to the clients if the driver is loaded on the server. For
TAKE NOTE
* example, because Windows Server 2008 R2 is only available in 64-bit versions, it will have a
The TCP/IP printer 64-bit print driver so that the server can print to the printer. However, most computers used
port uses host port within organizations today will most likely be 32-bit clients that need to use 32-bit print
9100 to communicate. drivers. Therefore, you would load both 64-bit and 32-bit print drivers on the server so that it
can hand out either driver as needed.
Figure 2-21
Selecting a print driver
Figure 2-22
The General tab
• Ports tab: Allows you to specify which port (physical or TCP/IP) the printer will use, as
well as to create new TCP/IP ports.
• Advanced tab: Allows you to configure the driver to use with the printer, the priority of
the printer, when the printer is available, and how print jobs are spooled.
• Security tab: Allows you to specify the permissions for the printer.
• Device Settings tab: Allows you to configure the trays, font substitution, and other
hardware settings.
Figure 2-23
Managing printer permissions
• Manage documents: Provides the ability to cancel, pause, resume, or restart a print job.
• Special permissions: Permissions typically used only by system administrators, such as a
permission to change the printer owner.
By default, the Print permission is assigned to the Everyone group. If you need to restrict who can
print to the printer, you will need to remove the Everyone group and add another group or user
and assign the Allow print permission to the user or group. Of course, it is still recommended that
you use groups instead of users. As with file permissions, you can also deny print permissions.
Figure 2-24
Viewing the print queue
The print queue shows information about a document, such as print status, owner, and
number of pages to be printed. To pause a document, open the print queue, right-click on the
document you want to pause and choose Pause. If you want to stop printing the document,
right-click on the document that you want to stop printing and choose Cancel. You can cancel
the printing of more than one document by holding down the Ctrl key and clicking on each
document that you want to cancel.
By default, all users can pause, resume, restart, and cancel their own documents. To manage
documents that are printed by other users, however, you must have the Allow manage docu-
ments permissions.
When the print device is available, the spooler retrieves the next print job and sends it to the
print device. By default, the spool folder is located at C:\Windows\\System32\Spool\
PRINTERS. If you have a server that handles a large number of print jobs or several large
print jobs, make sure the drive where the spool folder is has sufficient disk space.
On occasion, the print spooler may freeze or become unresponsive. You can restart the print
spooler by following these steps:
1. Open the Services console located in Administrative Tools.
2. Right-click Print Spooler and choose Restart.
You can also stop and start the service.
In Lesson 1, you learned about encryption as well as Encrypting File System and BitLocker.
Encryption was defined as the process of converting data into a format that connect be read
THE BOTTOM LINE by another user while decryption is the process of converting data from encrypted format
back to its original format.
CERTIFICATION READY
Encryption algorithms can be classified according to three types:
Describe data encryption • Symmetric
2.5
• Asymmetric
• Hash function
Symmetric encryption uses a single key to encrypt and decrypt data. Therefore, it is also referred
to as secret-key, single-key, shared-key, and private-key encryption. To use symmetric key
algorithms, you need to initially send or provide the secret key to both the sender and the receiver.
Asymmetric key , also known as public-key cryptography, uses two mathematically related
keys. One key is used to encrypt the data and the second key is used to decrypt the data.
Unlike symmetric key algorithms, it does not require a secure initial exchange of one or more
secret keys to both sender and receiver. Instead, you can make the public key known to anyone
and the private key is used only by the person or organization that wants to secure data.
Use the other key to encrypt or decrypt the data. The public key can be sent to someone or it
can be published within a digital certificate via a CA. Secure Socket Layer (SSL)/Transport
Layer Security (TLS) and Pretty Good Privacy (PGP) use asymmetric keys. Those topics are
covered later in this lesson.
For example, say you want a partner to send you data. Therefore, you send the partner the
public key. The partner then encrypts the data with the key and sends you the encrypted
message. You then use the private key to decrypt the message. If the public key falls into
someone else’s hands, that person still cannot decrypt the message.
The last type of encryption is the hash function. Different from the symmetric and asymmet-
ric algorithms, a hash function is meant as one-way encryption. That means that after the data
has been encrypted, it cannot be decrypted. One example of its use is to use the hash function
to encrypt a password that is stored on disk. Anytime a password is entered and it needs to be
verified that it is the correct password, the same hash calculation is performed on the entered
password and compared to the hash value of the password stored on disk. If the two match,
the user must have typed in the password. This avoids storing the passwords in a readable
format that a hacker might try to access.
No matter what encryption algorithm you choose, they all use keys to encrypt data. The key must
be long enough so that an attacker cannot try all possible combinations to figure out what the key
is. Therefore, a key length of 80 bits is generally considered the minimum for strong security with
symmetric encryption algorithms. 128-bit keys are commonly used and considered strong.
Digital certificates are very common in today’s computer world. They are used in
encryption as the component that stores the public key, they are used to identify a person
(authentication) or organization, and they are used to ensure that something has not been
modified.
A digital certificate is similar to an electronic identification card used to certify the online
identify of individuals, organizations, and computers. It contains a person’s or an organization’s
name, a serial number, an expiration date, a copy of the certificate holder’s public key (used for
encrypting messages and creating digital signatures), and the digital signature of the Certificate
Authority (CA)—described later in this lesson—that assigned the certificate so that recipients
can verify that the certificate is real.
Figure 2-25
Viewing the SSL website
identification in Internet
Explorer 11
Virtual Private Networks (VPNs)—covered later in this lesson—allow remote users to connect
to a private network by using tunneling protocol, such as Point-to-Point Tunneling Protocol
(PPTP) and Layer 2 Tunneling Protocol (L2TP). Digital certificates are also used with IP
Security (IPsec), which are often to connect two computers together or to have a remote
computer connect to a corporate office over the Internet. The IP Security extensions enable
you to encrypt and digitally sign communications, to prevent intruders from compromising
them as they are transmitted over a network.
DIGITAL SIGNATURE
A digital signature is a mathematical scheme that is used to demonstrate the authenticity of a
digital message or document. It is also used to ensure that the message or document has not
been modified. The sender uses the receiver’s public key to create a hash of the message, which
stored in the message digest. The message is then sent to the receiver. The receiver will then
use his or her private key to decrypt the hash value, perform the same hash function on the
message and compare the two hash values. If the message has not been changed, the hash
values will match.
To prove that a message comes from a particular person, you can perform the hashing function
with your private key and attach the hash value to the document to be sent. When the docu-
ment is sent and received by the receiving party, the same hash function is completed. You
then use the sender’s public key to decrypt the hash value included in the document. If the two
hash values match, the user who sent the document must have known the sender’s private key,
proving who sent the document. It will also prove that the document has not been changed.
Managing Certificates
The most common digital certificate is the X.509 version 3. The X.509 version 3 standard
specifies the format for the public key certificate, certificate revocation lists, attribute
certificates, and a certificate path validation algorithm.
Some of the X.509 digital certificate (see Figure 2-26) includes the following fields:
• Version: The version of the certificate format, such as version 3.
• Serial number: The unique serial number that is assigned by the issuing CA. Based on the
serial number, the CA maintains an audit history for each certificate so that certificates
can be traced, including when the certificate has been revoked.
• Signature algorithm and Signature hash algorithm: The public key cryptography and
message digest algorithms that are used by the issuing CA to digitally sign the certificate.
• Issuer: The name of the issuing CA.
• Validity from and Valid to: The certificate’s start and expiration dates.
• Subject: The person, entity, or owner identified in the certificate.
• Public key: The public key and a list of the public key cryptography algorithms.
• Key usage: The purpose of the public key, such as encipherment, signature, certificate
signing, and so on).
• Thumbprint: The digest or mathematical calculation of the certificate information that
can be used to determine if the digital certificate was altered.
There are only so many root CA certificates that are assigned to commercial third-party
organizations. Therefore, when you acquire a digital certificate from a third-party organization,
you might need to use a certificate chain to obtain the root CA certificate so that it can be
Figure 2-26
Viewing a X.509 digital
certificate
trusted. In addition, you might need to install an intermediate digital certificate that links the
assigned digital certificate to a trusted root CA certificate. The certificate chain, also known as
the certification path, is a list of certificates used to authenticate an entity. It begins with the
certificate of the entity and ends with the root CA certificate.
The third tab of a certificate is the certification path, as shown in Figure 2-27. The path starts
with the Subject certificate and proceeds through a number of intermediate certificates up to a
trusted root certificate, typically issued by a trusted CA.
Figure 2-27
Viewing a certification path
On a local computer running Windows, the certificates are stored in a certificate store. Using
the Certificates MMC snap-in, you can display the certificate store for a user, a computer, or a
service according to the purpose for which the certificates were issued or by using their logical
storage categories. Certificates are then organized into the following folders:
• Personal: These are certificates associated with public keys to which you have access. These are
the certificates that have been issued to the user, the computer, or service that you are viewing.
• Trusted Root Certificate Authorities: Implicitly trusted CAs, including all of the
certificates in the third-party root CAs, store plus root certificates from your organization
and Microsoft.
• Enterprise Trust: This is a container for certificate trust lists, including self-signed root
certificates from other organizations.
• Intermediate Certificate Authorities: These are certificates issued to subordinate CAs.
• Trusted People: These are certificates issued to users or end entities that are explicitly
trusted. Most often these are self-signed certificates or certificates explicitly trusted in an
application such as Microsoft Outlook.
• Other People: These are certificates issued to users or end entities that are implicitly
trusted. These certificates must be part of a trusted certification hierarchy. Most often
these are cached certificates for services such as Encrypting File System, where certificates
are used for creating authorization for decrypting an encrypted file.
• Trusted Publishers: These are certificates from CAs that are trusted by Software
Restriction policies.
• Third-Party Root Certificate Authorities: Trusted root certificates from CAs other than
Microsoft and your organization.
• Certificate Enrollment Requests: These are pending or rejected certificate requests.
• Active Directory User Object: These are certificates associated with your user object and
published in Active Directory.
Windows can also publish certificates to Active Directory. Publishing a certificate in Active Directory
enables all users or computers with adequate permissions to retrieve the certificate as needed.
Digital certificates can be imported and exported via electronic files. Four common formats
are as follows:
• Personal Information Exchange (PKCS #12): The Personal Information Exchange
format (PFX, also called PKCS #12) supports secure storage of certificates, private keys,
and all certificates in a certification path. The PKCS #12 format is the only file format
that can be used to export a certificate and its private key. It usually has a .pfx or .p12
filename extension.
• Cryptographic Message Syntax Standard (PKCS #7): The PKCS #7 format supports
storage of certificates and all certificates in a certification path. It usually has a .p7b or
.p7c filename extension.
• DER-encoded binary X.509: The Distinguished Encoding Rules (DER) format supports
storage of a single certificate. This format does not support storage of the private key or
certification path. It usually has a .cer, .crt, or .der filename extension.
• Base64-encoded X.509: The Base64 format supports storage of a single certificate. This
format does not support storage of the private key or certification path.
Figure 2-28
Viewing a certificate store
Active Directory Certificate Services (AD CS) is a server role that allows you to issue
and manage digital certificates as part of a public key infrastructure. Public key infra-
structure (PKI) is a system consisting of hardware, software, policies, and procedures that
create, manage, distribute, use, store, and revoke digital certificates. PKI consists of
certificate authorities and registration authorities that verify and authenticate the validity
of each entity that is involved in an electronic transaction through the use of public key
cryptography. Within the PKI, the certificate authority (CA), also known as certification
authority, binds a public key with respective user identities and issues digital certificates
containing the public key.
When you move or copy files from one location to another, you need to understand
what happens to the files’ NTFS permissions.
Using BitLocker To Go
BitLocker To Go enables users to encrypt removable USB devices, such as flash drives
and external hard disks. While BitLocker has always supported the encryption of remov-
able drives, BitLocker To Go enables you to use the encrypted device on other computers
without having to perform an involved recovery process. Because the system is not using
the removable drive as a boot device, a TPM chip is not required.
As mentioned earlier in the lesson, BitLocker is used to encrypt an entire disk or volume. It is
used to protect sensitive data stored on fixed disks in situations that they are lost, stolen, or
moved to another computer. BitLocker was described in Lesson 2; BitLocker To Go is an
extension of BitLocker that is used to encrypt removal USB devices.
To use BitLocker To Go, insert the removable drive and open the BitLocker Drive Encryption
Control Panel. The device appears in the interface with a Turn on BitLocker link just like that
of the computer’s hard disk drive.
Today, it is very common for an organization to use a remote access server (RAS), which
enables users to connect remotely to a network using various protocols and connection
types. By connecting to the RAS over the Internet, users can remotely connect to their
organization’s network and access data files, applications, and email just as if they were
sitting in their offices.
A Virtual Private Network (VPN) is a private network that uses a public network (for
example, the Internet) to connect remote sites and users. The VPN makes it appear to com-
puters, on each end of the connection, as if they are actually connected to the same network.
This point-to-point connection is emulated by encapsulating the packet in an IP Header. The
information in the header is used to route the information between the two VPN endpoints.
Tunneling protocols, authentication protocols and encryption levels applied to the VPN
connections determine the level of VPN security you have available. In order for a VPN to
work both the client and server will need to utilize the same protocols. Overall, VPNs can
provide the following capabilities:
• Data encryption (confidentiality)
• Authentication
• Data Integrity (ensure the packets are not modified while in transit)
• Non-Repudiation (guarantee the packets came from the source at a specific time)
The VPN uses the concept of tunneling (see Figure 2-29) to establish and maintain a logical
network connection.
There are four types of VPN Tunneling protocols you will encounter:
• Point to Point Tunneling Protocol (PPTP)
• Layer 2 Tunneling Protocol over IPsec (L2TP/IPsec)
• Secure Socket Tunneling Protocol (SSTP)
• VPN Reconnect (or IKEv2)
The four types of tunneling protocols used with a VPN/RAS server running on Windows 10:
• Point-to-Point Tunneling Protocol (PPTP): A VPN protocol based on the legacy
Point-to-Point protocol used with modems. Unfortunately, PPTP is easy to set up but is
considered to use weak encryption technology.
• Layer 2 Tunneling Protocol (L2TP): Used with IPSec to provide security. L2TP is the
industry standard when setting up secure tunnels.
• Secure Socket Tunneling Protocol (SSTP): Introduced with Windows Server 2008 and
Windows Vista allows users to use HTTPS protocol over TCP port 443 to pass traffic
through firewalls and web proxies that might block PPTP and L2TP/IPSec.
• Internet Key Exchange Version 2 (IKEv2): Also known as VPN Reconnect, this is a
feature introduced with Routing and Remote Access Services (RRAS) in Windows
Servers. It is designed to provide users with consistent VPN connectivity and automati-
cally reestablish a VPN when users temporarily lose their Internet connection.
Figure 2-29
A VPN tunnel
Figure 2-30
Creating a VPN connection
Authentication and Tunneling protocols will be negotiated and configured during the
first successful connection attempt using the user name and password.
6. To see the VPN connections, you can click the Network Status icon on the Taskbar.
7. Click the VPN connection you created and then click Connect.
8. Type your credentials and then click OK.
You can also view and edit your connection by opening the Network and Sharing Center, and
clicking Change adapter settings. Then right-click VPN connection and choose Properties.
The following provides a brief explanation for each tab:
• General: Provides host name and IP address of VPN server.
• Options: Enables and disables your credentials, sets idle time before hanging up, and
configures PPP settings.
• Security: Configures Data encryption settings, authentication, and tunneling protocols,
as shown in Figure 2-31.
• Networking: Configures transports (IPv6, IPv4, File and Printer Sharing, and Client for
Microsoft Networks).
• Sharing: Enables settings that allow others to connect through this computer’s network
connection.
Figure 2-31
Configuring the type of VPN
connection and data encryption
used
S U M M A RY S K I L L M AT R I X
• Taking advantage of cloud computing services such as Microsoft Office 365 can reduce the
workload on your IT staff. It can also improve the collaboration between your team members.
• Azure Storage is cloud storage designed for large-scale applications including providing a
storage foundation for Azure virtual machines. The cost for Azure Storage is based on the
amount of data stored and the number of requests made.
• Storage Spaces is a feature in Windows 10/Windows Server 2016 that allows you to combine
multiple disks into a single logical volume that can be mirrored to protect against one or
more drive failures. When the drives are combined, Windows places them into a storage pool.
• A file system is a method of storing and organizing computer files and the data they
contain to make it easy to find and access this information. A file system also maintains the
physical location of the files so that you can find and access the files in the future. Windows
10 supports FAT16, FAT32, NTFS and Resilient File System (ReFS) file systems on hard drives.
• A permission is defined as the type of access that is granted to an object, such as NTFS
files and folders. When files and folders are created on an NTFS volume, a security
descriptor known as an Access Control List (ACL) is created.
• The folder/file structure on an NTFS drive can be complicated, with many folders and
nested folders. In addition, because you can assign permissions to groups and at different
levels on an NTFS volume, figuring out the effective permissions of a particular folder or
file for a particular user can be tricky.
• Most users are not going to log onto a server directly to access their data files. Instead, a drive
or folder will be shared (known as a shared folder), and they will access the data files over a
network. To help protect against unauthorized drive or folder access, you should use share
permissions along with NTFS permissions (assuming the shared folder is on an NTFS volume).
• One basic network services is network printing, in which multiple users can share the same
printer. This is a cost-effective solution when you have multiple employees in different locations.
• Encryption was defined as the process of converting data into a format that connect be
read by another user while decryption is the process of converting data from encrypted
format back to its original format.
■ Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in the blanks provided.
1. A pocket-sized card with embedded integrated circuits that is used for authentication is
known as a(n) .
2. A(n) defines the type of access over an object or the properties of an
object such as an NTFS file or printer.
3. permissions flow from a parent object to a child object.
4. is a Microsoft file-hosting service that allows you to store and create
files and folders and share them with other users and groups.
5. is a Microsoft cloud storage designed for large-scale applications
including providing a storage foundation for Azure virtual machines.
6. allow you to combine multiple smaller drives into a single larger logical
volume
7. When using storage spaces, you will need a minimum of drives to
create a three-way mirror.
8. Most Windows 10 users use the file system because it supports larger
disks than FAT32 or FAT.
9. The newest file system used in Windows that is designed to increase data availability, even
when there are errors, is .
10. The permission needed for a user to manage his print jobs.
Multiple Choice
Circle the letter that corresponds to the best answer.
1. Which NTFS permission is needed to change attributes and permissions?
a. Full Control
b. Modify
c. Read and Execute
d. Write
2. Which type of permission is granted directly to a file or folder?
a. Explicit
b. Inherited
c. Effective
d. Share
3. If you copy a file or folder to a new volume, which permissions will that file or folder
have?
a. The same permissions that it had before.
b. The same permissions as the target folder.
c. The same permissions as the source folder.
d. No permissions at all.
4. Which of the following uses an ACL?
a. NTFS folder
b. Active Directory user
c. Registry key
d. Login rights
5. Which type of key has one key for encryption and a different key for decryption?
a. Symmetric
b. Asymmetric
c. Hash function
d. PKI
6. Which infrastructure is used to assign and validate digital certificates?
a. Asymmetric algorithm
b. Active Directory
c. PKI
d. VPN
7. Which of the following is not a share permission?
a. Full Control
b. Write
c. Change
d. Read
8. Which of the following is a subscription-based software service that enables users to use
Office Apps via the Web?
a. Microsoft Office 365
b. Skynet
c. AppLocker
d. GPOs
9. The person who signs up for the business and enterprise Office 365 subscription is
assigned which of the following roles by default?
a. Global Administrator
b. User Management Administrator
c. Billing Administrator
d. Service Administrator
10. Which method provides the easiest way to quickly share files and folders with other users
on the network just by copy the files and folders?
a. Advanced Sharing
b. Quick share
c. Public folders
d. HomeGroup
True / False
Circle T if the statement is true or F if the statement is false.
T F 1. If full control is assigned to a parent object for a user, the full control permission
will overwrite explicit permissions at a child object.
T F 2. When calculating the NTFS and share permissions, you would apply the more
restrictive permissions between the NTFS and shared permission.
T F 3. When mapping a drive, you specify the UNC.
T F 4. Full Control NTFS permissions override the Deny permission.
T F 5. When using thin provisioning, you install some of the disks when you begin and
then install additional drives when you start running out of disks.
■ Case Projects
Scenario 2-1: Configuring Collaboration
You are an administrator for the Contoso Corporation, which has approximately 300 users
and consists of a corporate office with several sites. In addition, several mobile users who work
from home and those need to easily collaborate on projects no matter where they are working.
The primary documents are Microsoft Office documents. Describe how you can accommo-
date this situation for the Contoso Corporation.
O B J E C T I V E D O M A I N M AT R I X
KEY TERMS
accounting Azure Rights Management authorization
Active Directory Domain (Azure RMS) backdoor
Services (AD DS) advanced permissions basic permissions
Active Directory permissions adware biometrics
Active Directory Rights auditing brute force attacks
Management Services authentication buffer overflow
(AD RMS)
95
You work as an administrator for the Contoso Corporation and you need to control
who can access what on your network. In addition, you need to protect the confidential
information of the company. Therefore, you decide to use a multi-layered approach when
planning out the corporate security, including establishing firewalls to defining rights and
permissions to installing antivirus software packages.
CERTIFICATION READY
Networks can be categorized as follows:
Describe the differences • LANs, MANs, or WANs
between the Internet, an
intranet, and an extranet
• Public networks or private networks
3.1 • Internet, intranets, or extranets
Data networks come in two major categories, with a third category sometimes being used
to describe a network ranging in size between the first category and the second category.
The two main categories are called Wide Area Networks and Local Area Networks. These
networks are generally referred to as WANs and LANs respectively.
A Wide Area Network (WAN) is a very large network that can stretch across large
geographical areas. The biggest WAN in existence is the Internet, but networks that
connect several cities, states, nations, counties, and so on also qualify as WANs. Many
companies use WANs in offices or buildings in widely dispersed areas to keep all the
facilities and employees connected to each other. A WAN of this nature is sometimes
called an enterprise network.
Whereas a WAN can spread across very large geographic areas, Local Area Networks (LANs),
as their name implies, are limited to a local area. LANs are usually limited to just one building,
or at most, several buildings that are near one another. Sometimes LANs are limited to only
certain rooms in a given building. The technologies used by LANs and WANs, while similar,
are slightly different from each other.
Networks that are larger than LANs, but are slightly too small to be considered WANs,
are sometimes called Metropolitan Area Networks (MANs). MANs are networks that
are generally no more than about 50 kilometers across. MANs are used to link together
areas—from the size of a college campus to the size of cities—into a single data network
that can be either privately owned by a company or publicly owned by a municipality.
Some cities have set up MANs as public utilities so that local businesses and individuals
can link computers and LANs together to share various network services provided by the
city to individuals and companies that are linked to the MAN. MANs and WANs gener-
ally use the same technologies, although newer WAN technologies generally find their
way into MANs before they spread out to the larger WANs. It is cheaper and easier to
upgrade MANs than it is WANs, so MANs are upgraded more often.
A public network is a network that is not owned by any one person, company, or organi-
zation and anyone can connect to it. The best-known example of a public network is the
Internet. A private network is owned by a person, company, or organization and access is
restricted. Examples of a private network include a corporate network or a school network.
A private network consists of network links to which the person, company, or organization
has exclusive access. In other words, the person, company, or organization has dedicated links.
Of course, since the links are dedicated, they are much more expensive than public networks.
Since public networks are shared by multiple users, companies, and organizations, public
networks are less expensive than private networks.
Networks can also be organized according to Internet, intranet, or extranet. You can
think of the Internet as the external network and the intranet as the internal network.
The extranet is a computer network that allows controlled access from outside of an
organization’s intranet.
as they are on the Internet. Again, the only difference is an intranet is a privatized version of
the Internet, and any company can have one.
An internet (also known as an internetwork) is connecting a computer network with other
networks to form a larger network by using gateways to provide a common method of routing
information packets between the networks. The best-known example of an internet is the
Internet, which is associated with the World Wide Web.
The Internet is the largest public WAN in the world. It is a public domain available to everyone
in the United States, and it is available to most other countries as well. The Internet is a worldwide
system of connected computer networks. Computers that connect to the Internet use the TCP/IP
protocol suite. It is estimated that there currently are over 3 billion Internet users, although it is
difficult to estimate this due to Network Address Translation (NAT)—discussed later in this
section—and other similar services. The origins of the Internet can be traced back to ARPANET,
which was developed by the United States government for security purposes; however, ARPANET
was a disjointed group of networks using outmoded or non-uniform protocols. By using TCP/IP
to join different types of networks together, the true Internet was created.
The Internet is not controlled by any one governing body—except for two technical aspects.
First, the IP classification system is defined by the IANA (Internet Assigned Numbers
Authority). Second, DNS is defined by the Internet Engineering Task Force (IETF).
Otherwise, the Internet is “controlled” by various ISPs and network providers depending on
the location. These companies define how the Internet is accessed.
Companies use the Internet for many reasons, including:
• To transmit messages, such as email
• To gather information, often through the use of web pages
• To share information, often through the use of a web server
• For e-commerce
• To collaborate with other companies, organizations, and users
Individuals use the Internet for these reasons as well as for social networking, shopping, file
sharing, gaming, and other multimedia use.
Though the World Wide Web is a big part of the Internet, it is not the entire Internet.
However, users quite often use the terms interchangeably. Technically, the Internet is the entire
data communications system that connects the world, including hardware and software.
Meanwhile, the World Wide Web (WWW) is an enormous system of interlinked hypertext
documents that can be accessed with a web browser. The World Wide Web Consortium
defines standards for how these documents are created and interlinked. Currently, the World
Wide Web is in a stage known as Web 2.0 (with Web 3.0 just now getting underway).
Web 2.0 is an interactive type of web experience compared to the previous version 1.0. Web 2.0
allows users to interact with each other and act as contributors to Web sites as well. Currently,
when most people access the Internet, they do so through a web browser, but there are many
other tools that can also be used to access the Internet, including instant messaging programs,
FTP clients, third-party media programs, and more.
Intranets and extranets are used by organizations to share data with select individuals. Whereas
an intranet is used by an organization to share data with its employees, an extranet is used to
share data with sister companies or other partnered organizations.
An extranet is similar to an intranet except that it is extended to users outside a company and
possibly to entire organizations that are separate from or lateral to the company. For instance,
if a company often needs to do business with a specific organization, it might choose to set up
an extranet in order to facilitate information sharing. User authentication is still necessary, and
an extranet is not open to the general public.
Figure 3-1 illustrates both an intranet and extranet. Users can connect to intranets and
extranets by simply logging in to a website or by using a virtual private network (VPN).
Network Address Translation (NAT) is a technique used to modify the network address
X REF
information of a host while traffic is traversing a router or firewall. This technique hides the
VPNs are discussed in network information of a private network while still permitting traffic to be transferred across
Lesson 2 and later in a public network like the Internet.
this section.
Figure 3-1
Intranet and extranet
Public Users
Public
Extranet Server Web Server Intranet Server
LAN
NAT was originally created as a workaround for IP addressing issues. In the early days of the
Internet, when the TCP/IP protocol and related addressing was being developed, the 32-bit
addressing scheme (known as IPv4) was considered more than adequate for any potential
network growth. Technically, there were 4,294,967,296 unique addresses available using a
32-bit address, and even discounting the reserved ranges, there were still more than 3 billion
possible addresses. At the time, that was enough to provide an address for every person on the
planet, including children. Unfortunately, the designers of this addressing scheme dramatically
underestimated the explosive growth of the Internet, as well as the widespread adoption of
TCP/IP in business and home networks—both of which threatened to exhaust the pool of
IPv4 IP addresses. Without unique addresses, the Internet would be unable to successfully
route TCP/IP traffic. NAT was the resulting solution for maintaining Internet functionality
given the limited number of IP addresses available.
Today, one practical use for NAT is that it allows you to use one set of IP addresses on an internal
LAN and a second set of IP addresses for an Internet connection. There is a device (usually a
router or firewall) located between the two networks that provides NAT services, managing the
translation of internal addresses to external addresses. This allows companies to use large num-
bers of unregistered internal addresses while only needing a fraction of that number of addresses
on the Internet, thus conserving the addresses. This permits the reuse of addresses within private
networks while ensuring that the addresses used on the Internet remain unique.
VPN (Virtual Private Network) is a technology that uses encrypted tunnels to create secure
connections across public networks like the Internet. There are a variety of uses for this
technology, but three of the most common are shown in Figure 3-2. VPNs are commonly
used by remote users for secure access to the internal network; VPNs create secure network-to-
network connections for branch offices or business partner connections. A fourth use of VPNs
is to create secure host-to-host connections for additional security and isolation in an internal
network. VPNs utilize encryption and authentication to provide confidentiality, integrity, and
privacy protection for data.
Figure 3-2
Uses for VPN technology
Business Partner
INTERNET
Remote User
Headquarters
Branch Office
Understanding Firewalls
Firewalls are used to protect a network from malicious attack and unwanted intrusion.
It is the most commonly used security device in an organization’s perimeter.
Firewalls are primarily used to protect one network from another. They are often the first line
of defense in network security. There are several types of firewalls; some run as software on
server computers, some run as a standalone dedicated appliances, and some work as just one
function of many on a single device. They are commonly implemented between the LAN and
the Internet, as shown in Figure 3-3.
Example of a firewall
LAN
Firewall
Generally, there will be one firewall, with the network and all devices and computers residing
“behind” it. When a device is “behind” the firewall, it is also considered to be “after” the
firewall, and if the device is “in front of ” the firewall, it is also known as being “before” the
firewall. In Figure 3-3, the devices on the LAN, the switch, and the router are behind the
firewall. The devices that are on the cloud or Internet are in front of the firewall.
In Figure 3-3, the firewall has a local address of 10.254.254.249, which connects it to the
LAN. It also has an Internet address of 87.69.11.124, which allows connectivity for the entire
LAN to the Internet. It also hides the LAN IP addresses. By default, the IP address
87.69.11.124 should be completely shielded. This means that all inbound ports are effectively
closed and will not allow incoming traffic, unless a LAN computer initiates a session with
another system on the Internet.
Perimeter networks are small networks that usually consist of only a few servers that are
accessible from the Internet in some way. Generally, the term perimeter network is synony-
mous with demilitarized zone (or DMZ ). You should be able to identify a DMZ and its
purpose in an organization, as well as know how to implement a basic DMZ.
A perimeter network is a small network that is set up separately from a company’s private local
area network and the Internet. It is called a perimeter network because it is usually on the edge of
the LAN, but DMZ has become a much more popular term. The DMZ allows users outside of
the company LAN to access specific services located on the DMZ. However, when set up prop-
erly, those users are blocked from gaining access to the company LAN. Users on the LAN will
quite often connect to the DMZ as well, but without having to worry about outside attackers
gaining access to their private LAN. The DMZ might house a switch with servers connected to it
that offer web, email, and other services. Two common configurations of a DMZ include:
• Back-to-back configuration. This configuration has a DMZ situated in between two
firewall devices (see Figure 3-4). An attacker would have to get through two firewalls in
order to gain access to the LAN.
• 3-Leg perimeter configuration. In this configuration, the DMZ is usually attached to a
separate connection of the company firewall. So the firewall would have three
connections: one to the company LAN, one to the DMZ, and one to the Internet (as
shown in Figure 3-5). Once again, this could be done with a firewall appliance. In this
configuration, an attacker needs only to break through one firewall to gain access to the
LAN. While this is a disadvantage, technologies such as network intrusion detection/
prevention systems can help alleviate most security issues. Also, by having only one
firewall, there is less to manage as an administrator.
Figure 3-4
A back-to-back DMZ Internet
configuration
E-mail
Web
LAN
LAN
Figure 3-5
A 3-leg perimeter DMZ Internet
configuration
Firewall
Web
LAN DMZ
In Lesson 1, the cloud was described a way to access information from anywhere at any
time. Cloud computing is usually associated with the Internet since most of these services
are accessed over the Internet. The cloud allows you to access existing technologies
without having a deep knowledge about or expertise of the technologies. Since the cloud
often consists of shared resources or technology, the cloud can cut costs and allow users to
focus on their core business instead of being impeded by IT obstacles.
The main technology that makes cloud computing possible is virtualization. Virtualization
allows a physical computer to run one or multiple virtual devices. Each virtual device can be
used to perform specific computing tasks. Each virtual device can be configured to operate as
an isolated device or a device that interacts with other virtual devices.
The virtual devices can be quickly created and its resources provisioned, providing a scalable
infrastructure. While physical devices often have memory and processing that is not used,
virtual devices can be grouped or pooled together to utilize resources (such as processor and
memory) more efficiently. As a result, you don’t have as many wasted resources, which means
you are running fewer physical servers. Since you are using resources more efficiently, and you
can install virtual devices quickly results in reduced cost.
CERTIFICATION READY
Nonrepudiation prevents one party from denying the actions it has carried out. If you have
Describe user established proper authentication, authorization, and accounting, appropriate mechanisms of
authentication nonrepudiation should be in place and no user should be able to deny the actions he has
3.2 carried out while in your organization’s system.
Before users can access a computer or a network resource, they will most likely log in to prove
they are who they say they are and to see whether they have the required rights and permis-
sions to access the network resources.
Logging in is the process through which you are recognized by a computer system or network
so that you can begin a session. A user can authenticate via one or more of the following
methods:
• By using what he or she knows: For example, by supplying a password or a personal
identification number (PIN)
• By using what he or she owns or possesses: For example, by providing a passport, smart
card, or an ID card.
• By proving what he or she is: For instance, by supplying biometric factors based on
fingerprints, retinal scans, voice input, etc.
When two or more authentication methods are used to authenticate someone, a Multi-Factor
Authentication (MFA) system is said to be in place. Of course, a system that uses two authen-
tication methods (such as smart cards and passwords) can be referred to as a two-factor
authentication system.
For both individual computers and entire networks, the most common method of
authentication is the password. A password is a secret series of characters that enables a
user to access a particular file, computer, or program.
USING PASSWORDS
When seeking access to a file, computer, or network, hackers will first attempt to crack
passwords by trying obvious possibilities, including the names and birthdays of a user’s spouse
or children, key words used by the user, or the user’s hobbies. If these efforts don’t work, most
hackers will next attempt brute force attacks, which consist of trying as many possible
combinations of characters as time and money permit. A subset of the brute force attack is the
dictionary attack, which attempts all words in one or more dictionaries. Lists of common
passwords are also typically tested.
To make a password more secure, you need to choose a word that nobody can guess.
Therefore, whatever you choose should be long enough and should be considered a strong or
complex password.
Because today’s computers are much more powerful than the computers of years past (which are
often used to crack passwords), some experts recommend passwords that are at least 14 characters
long. However, remembering long passwords can be cumbersome for some people, and these
individuals might write their passwords on a piece of paper near their desks. In these situations,
you should start looking for other forms of authentication, such as a smart cards or biometrics.
Users should also change their passwords regularly; that way, if a user’s password is revealed to
someone else, it won’t be long until that password is no longer valid. In addition, changing
passwords routinely also shortens the amount of time that an individual has to guess your
password, because he or she will have to start the entire cracking process all over again once
your password is changed.
Microsoft includes password policy settings within group policies so that you can easily enforce
standards such as minimum number of characters, minimum level of password complexity,
how often users must change their passwords, how often users can reuse passwords, and so on.
Although passwords are the easiest security method to implement and the most popular
authentication method, use of passwords also has significant disadvantages, including the
likelihood of passwords being stolen, spoofed, and/or forgotten. For example, a hacker might
call a company’s IT department for support and pretend to be a legitimate user, eventually
convincing the department to reset that user’s password to whatever he or she requests.
Given such scenarios, it’s essential that you establish a secure process to reset all user passwords.
For example, you could establish a self-service process in which a user’s identity is verified by
asking questions and comparing the answers to responses that have been stored previously,
such as the person’s birthday, the name of her favorite movie, the name of her pet, and so on.
However, these can be relatively easily guessed by an attacker, determined though low-effort
research, or discovered through social engineering.
Accordingly, when resetting passwords, you must have a method to positively identify the user
who is asking for the password change. Also, you should not send new passwords via email
because if a user’s existing password is compromised, the hacker will likely be able to access the
user’s email account and obtain the new password as well. To avoid these problems, you could
meet face-to-face with the person who is requesting a password change and ask for identifica-
tion. Unfortunately, with large networks and networks that include multiple sites, this might
not be plausible. You could also call back and leave the password on the person’s voicemail,
indicating he needs to provide a PIN to access it, or you could send the password to the user’s
manager or administrative assistant. In either case, you should have the user reset the password
immediately after he or she logs on.
A second category of authentication is based on what you own or possess. The most
common examples of this type of authentication involve use of digital certificates, smart
cards, and security tokens.
To use biometric devices (see Figure 3-6), you must have a biometric reader or scanning
device, software that converts the scanned information into digital form and compares match
points, and a database that stores the biometric data for comparison.
Figure 3-6
Finger scanner
To launch the biometric system, you will need to set up a station where an administrator
enrolls each user; this includes scanning the biometric feature you want to use for authentica-
tion. When selecting a biometric method, you should consider its performance, difficulty,
reliability, acceptance, and cost. You also need to look at the following characteristics:
• False reject rate (false negative): This is the percentage of authorized users who are
incorrectly denied access.
• False accept rate (false positive): This is the percentage of unauthorized users who are
incorrectly granted access.
Although rights and permissions are powerful tools, they do have their limitations. For
example, anyone who can access and read a file protected with NTFS can copy the file to a
USB drive or other storage device, email the file, or print the file, allowing a user to easily steal
or copy confidential information.
Windows RMS is an information protection technology is used to minimize unauthorized
transmission of data or data leakage, specifically with Microsoft products and operating
systems, including Exchange, SharePoint, and the Office suite.
To control who can access a file or email, Windows RMS encrypts the file or email. To read the
file, the user will need the encryption key to decrypt the file, which is stored in the Windows
RMS server. As a user opens or accesses the file, he or she will automatically retrieve the key
from the Windows RMS server and open the file. Since Microsoft products are Windows RMS
aware, they also help limit what you can do with a document as specified with the rights
assigned using rights management.
If someone copies the file to a USB storage device and takes it offsite or emails it to someone
else, whoever opens the file needs to access the Windows RMS to retrieve the keys. If the
person cannot access the rights management server (for whatever reason) or is not authorized
to access the file, he will not get the key and will not be able to open and read its content.
Azure RMS provides the Rights Management capabilities for Office 365 and it can be used
with generic protection (*.pfile) files and Protected PDF (.ppdf ) files. As a result, it can protect
all Office documents and it can protect other documents, such as PDF, TXT, XML, JPG,
JPEG, TIFF, GIF, BMP, and more.
It supports Windows, Mac OS, iOS, Android, and Windows Phone. In addition, it supports
on-premises services when you deploy the RMS connector on Microsoft Exchange Server,
Microsoft SharePoint Server, and Windows Server running File Classification Infrastructure.
File Classification Infrastructure is used to classify and apply policies to Office documents in
a folder.
One advantage that Azure RMS has over Active Directory RMS is that since it is a cloud
service, you do not need to configure trusts with other organizations before you can share
protected content with those organizations. Windows Management can be activated from the
Office 365 admin center or from the Azure Management Portal. Organizations using Office
365 or an Azure AD (AAD) directory can collaborate with each other. Users who do not have
Office 365 or are using Azure AD directory can sign up for the free RMS for individual
subscription.
When accessing secure documents, the decryption of a document occurs transparently. In
addition, when using applications that are aware of Windows RMS, it is quite easy to secure a
document (see Figure 3-7) or email. For example, when cloud storage is configured to use
Window RMS, any document that gets dropped in the cloud storage is automatically pro-
tected. If an application or browser does not support Windows RMS, the user will not be able
to open RMS-protected content.
■ Understanding Permissions
Permissions specify what a user or group can do with an object, such as NTFS files and
folders or an Active Directory object. As a user accesses an object, she must be authenti-
THE BOTTOM LINE cated in order to prove her identity. Then permissions are used to control authorization to
the objects.
Figure 3-7
Using Microsoft Word with
Windows RMS to restrict
access to a document
CERTIFICATION READY
Permissions are privileges granted to specific system entities—such as users, groups, or
Describe permissions computers—enabling them to perform a task or access a resource. For example, you can grant
3.3 a specific user permission to read a file while also denying that same user the permissions
needed to modify or delete the file.
Windows 10 has several sets of permissions and those permissions operate independently of
each other. As an administrator, you should be familiar with the operation of the following
four permission systems:
• Share permissions: Control access to folders over a network. To access a file over a
network, a user must have appropriate share permissions (and appropriate NTFS permis-
sions, if the shared folder is on an NTFS volume).
• NTFS permissions: Control access to the files and folders stored on disk volumes
formatted with the NTFS file system. To access a file, whether on the local system or over
a network, a user must have the appropriate NTFS permissions.
• Registry permissions: Control access to specific parts of the Windows registry. An
application that modifies registry settings or a user attempting to manually modify the
registry must have the appropriate registry permissions.
• Active Directory permissions: Control access to specific parts of an Active Directory
Domain Services hierarchy. Although file servers typically do not function as AD DS
domain controllers, server administrators might utilize these permissions when servicing
computers that are members of a domain.
✚ MORE INFORMATION
Active Directory Domain Services (AD DS) is the Microsoft directory services that is used to locate and
manage resources such as computers, users, and printers. AD DS is usually associated with Windows computers.
AD DS is also responsible for the user logon process, authentication, authorization, and directory searches.
All of these permission systems operate independently of each other and sometimes combine
to provide increased protection to a specific resource. For example, an administrator might
grant Ralph the NTFS permissions needed to access a spreadsheet stored on a file server
volume. When Ralph sits down at the file server console and logs on as himself, he will be able
to access that spreadsheet. However, when Ralph is working at his own computer, he will not
be able to access the spreadsheet until the administrator creates a share containing the file and
also grants Ralph the proper share permissions.
While all of these permissions systems are operating all the time, server administrators do
not necessarily have to work with them all on a regular basis. In fact, many administrators
TAKE NOTE
* never have to manually alter a Registry or Active Directory permission. However, many
server administrators do work with NTFS and share permissions on a daily basis.
For network users to be able to access a shared folder on an NTFS drive, you must grant them
both share permissions and NTFS permissions. As you learned earlier in this lesson, you can
grant these permissions as part of the share creation process, but you can also modify the
permissions at any time afterwards.
As discussed in Lesson 2, NTFS permissions allow you to restrict the actions other users
can take on files that are stored on an NTFS volume. Permissions can be granted or
revoked by the owner of a resource, system administrators, and users with administrative
accounts.
Typically when you assign permissions, you will assign them based on basic NTFS permis-
sions. However, when you need more granular control, you can assign permissions based on
advanced permissions.
Figure 3-8
Viewing permissions for a file
or folder
6. Select and deselect the boxes in the Permissions section to Allow or Deny access (see
Figure 3-9).
Figure 3-9
Changing permissions
Figure 3-10
The Advanced Security Settings
dialog box
back to the previous owner. This prevents the Administrator account from accessing other
users’ files undetected.
The other purpose for file and folder ownership is to calculate disk quotas. When you set
quotas specifying the maximum amount of disk space particular users can consume, Windows
calculates a user’s current disk consumption by adding the sizes of all the files and folders that
the user owns.
To change the ownership of a file or folder, you must open the Effective Access tab of the
Advanced Security Settings dialog box and click the Change link by the Owner setting.
As you learned in Lesson 2, when you calculate effective permissions, you must first calculate
the explicit and inherited permissions for an individual or group and then combine them.
When combining user and group permissions for NTFS security, the effective permission is
the cumulative permission. The only exception is that Deny permissions always apply. To view
the effective rights for a user or group, you can open the Advanced Security Settings dialog box
by using the Effective permissions tab.
Figure 3-11
Viewing NTFS effective
permissions
In Windows 10 shared folders have their own permission system that is completely inde-
pendent from the other Windows permission systems.
For network users to access shares on a file server, you must grant them the appropriate share
permissions. By default, the Everyone special identity receives the Allow Full Control share
permission to any new shares you create.
To modify the share permissions for an existing share using Windows Explorer, open the
Properties sheet for the shared folder, click the Sharing tab, and then click Advanced Sharing
and Permissions to open the Share Permissions tab. To specify the share permissions, click the
Permissions button to open the Permissions dialog box, as shown in Figure 3-12.
Figure 3-12
Configuring share permissions
■ Understanding Malware
Users utilize client computers to connect to servers and network applications. Because
THE BOTTOM LINE
these client computers are connected to an organization’s network, they must be protected
from malware.
CERTIFICATION READY
Malicious software, sometimes called malware, is software that is designed to infiltrate or
Describe malware affect a computer system without the owner’s informed consent. The term “malware” is usually
3.4 associated with viruses, worms, Trojan horses, spyware, rootkits, and dishonest adware. As a
network administrator or computer technician, you need to know how to identify malware,
how to remove it, and how to protect a computer from it.
Understanding Malware
By understanding the types of malware, you will gain a better understanding of how
malware might cause problems with your computer and how a computer might receive
malware.
Because it is now quite common for computers to be connected to the Internet, there are more
opportunities than ever before for your organization’s computers to be infected by malware.
Indeed, over the past few years, a staggering amount of malware has been produced. As a
security professional, you are responsible for protecting your organization’s computers against
infection. Furthermore, when a computer on your network does get infected by malware, you
must make sure this infection does not spread to other computers.
Many early forms of malware were written as experiments or pranks. In most instances, they
were intended to be harmless or merely annoying. However, as time passed, malware increas-
ingly became a tool for vandalism or for compromising private information. Today, malware
can even be used to launch denial of service (DoS) attacks against other systems, networks, or
websites, causing those systems to have performance problems or become inaccessible. For
example, a DoS attack might send thousands of packets in a short period of time that over-
whelm the network equipment or server.
As previously mentioned, malware can be organized into several categories:
• Viruses
• Worms
• Trojan horses
• Spyware and dishonest adware
• Rootkits
• Backdoors
A computer virus is a program that can copy itself and infect a computer without the user’s
consent or knowledge. Early viruses were usually some form of executable code that was
hidden in the boot sector of a disk or as an executable file (for example, a filename with an .exe
or .com extension). Later, as macro languages began to be used in software applications (such
as word processors and spreadsheet programs), virus creators seized upon this technology,
embedding malicious macros in documents of various types. Unfortunately, because macro
code is automatically executed when a document is opened, these documents can infect other
files and cause a wide range of problems on affected computer systems. Today, websites also
pose a virus threat because they can be written in various programming and scripting lan-
guages and might include executable programs. Therefore, whenever you access the Internet,
your system is under constant threat of infection.
A worm is a self-replicating program that copies itself to other computers on a network
without any user intervention. Unlike a virus, a worm does not corrupt or modify files on the
target computer. Instead, it consumes bandwidth and processor and memory resources,
slowing the system down or causing it to be unusable. Worms usually spread via security holes
in operating systems or TCP/IP software implementations.
Trojan horses derive their name from the Trojan horse story in Greek mythology. In short, a
Trojan horse is an executable program that appears as a desirable or useful program. Because it
appears to be desirable or useful, users are tricked into loading and executing the program on
their systems. After the program is loaded, it might cause a user’s computer to become unus-
able or it might bypass the user’s system security, allowing his private information (including
passwords, credit card numbers, or his Social Security number) to be accessible by an outside
party. In some cases, a Trojan horse might even execute adware.
Spyware is a type of malware that is installed on a computer to collect a user’s personal
information or details about her browsing habits, often without the user’s knowledge. Spyware
can also install additional software, redirect your web browser to other sites, or change your
home page. One example of spyware is the keylogger, which records every key a user presses.
When a keylogger is installed on your system, whenever you type credit card numbers, Social
Security numbers, or passwords, that information is recorded and eventually sent to or read by
someone without your knowledge. (It should be noted that not all keyloggers are bad, how-
ever, as some corporations use them to monitor their corporate users.)
Adware is any software package that automatically plays, displays, or downloads advertise-
ments to a computer after the software is installed or while the application is being used.
Although adware might not necessarily be bad, it is often used with ill intent.
Identifying Malware
The first step in removing malware is detecting that you have it. Sometimes it is easy to see
that you are infected with malware. Other times, you might never know that you have it.
running on your healthy system for comparison purposes. Finally, to detect malware, you
should use an up-to-date antivirus program and an up-to-date antispyware package, which
together can scan your entire system and look for malware in real time as you open files and
access websites.
With the many tools attackers can now use to deliver malware, it is easy to see the importance
of protecting your computer from all types of malware threats. Of course, when protecting
yourself, a little common sense can go a long way. For example, you should not open docu-
ments or executable files from unknown or untrusted sources and you should be cautious
before providing any personal information, including username and passwords.
Protecting your system from viruses and other malware is not a simple solution. To
prevent the exploitations of security holes, you need to keep your system up to-date with
Windows updates and other application software updates. In addition, you should use a
reputable antivirus software.
Some viruses, worms, rootkits, spyware, and adware gain access to a system by exploiting
security holes in Windows, Internet Explorer, Microsoft Office, or some other software
package. Therefore, the first step you should take to protect yourself against malware is to
keep your system up to date with the latest service packs, security patches, and other
critical fixes.
The second step in protecting your computer from malware is to use an up-to-date antivirus
software package. In addition, if your antivirus software does not include an antispyware
component, you should install an antispyware software package. Then, you should be sure to
perform a full system scan with your antivirus software at least once a week.
Windows Defender (as shown in Figure 3-13) is included with Windows 10 and is
intended to prevent, remove, and quarantine viruses, spyware, and other malicious software.
This program helps protect your computer against pop-ups, slow performance, and security
threats caused by malware. Windows Defender runs in the background and notifies you
when you need to take specific action. However, you can use it to scan for malware when
your computer isn’t working properly, when you’ve clicked a suspicious link online, or in an
email message. Of course, as with any antivirus package, you must keep Windows Defender
up to date.
Figure 3-13
Using Windows Defender
To avoid malware, it’s also important to use common sense. Therefore, you should always
follow these steps:
1. Don’t install unknown software or software from an nonreputable source.
2. Don’t open strange email attachments.
3. Don’t click on hyperlinks from unknown people when you don’t know what the links are
supposed to do. This applies not just to hyperlinks sent via email but to hyperlinks sent
using instant messaging services.
4. If your email client supports auto launch, turn it off. Otherwise, you might automatically
activate a computer virus just by opening an email.
5. Don’t visit questionable websites, especially porn sites or sites that allow you to download
pirated software, music, or video.
6. If your web browser alerts you that a particular site is known for hosting malware, heed
this warning.
7. When surfing the Internet, if you encounter browser pop-ups that tell you that you
need to download the newest driver or check your system for viruses, proceed with
caution.
8. Don’t forget to perform regular backups. That way, if you get a virus and lose any data,
you can restore your system from your backup.
S U M M A RY S K I L L M AT R I X
■ Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in the blanks provided.
1. A network zone that allows remote access for employees of your company is known as
a(n) _______________.
2. The _______________ is an enormous system of interlinked hypertext documents.
3. The type of attack that uses an extensive list of potential passwords is known as a(n)
_______________.
4. A(n) _______________ is a numeric password shared between a user and a system that
can be used to authenticate the user to the system.
5. A device that can provide you with a second password to log in to a system is a(n)
_______________.
6. _______________ permissions flow from a parent object to a child object.
7. A(n) _______________ defines the type of access over an object or the properties of an
object, such as an NTFS file or printer.
8. _______________ is software that is designed to infiltrate or infect a computer, usually
with ill intent.
9. A(n) _______________ is a self-replicating program that copies itself to other computers
while consuming network resources.
10. Microsoft’s antispyware program is called _______________.
Multiple Choice
Circle the letter that corresponds to the best answer.
1. Your manager asks you to set up an area that is not on the LAN but not quite on the
Internet. This area will house servers that will serve requests to users connecting to your
intranet. Which type of zone does your manager want you to set up?
a. DMZ
b. extranet
c. FTP
d. VPN
2. You have been tasked with setting up an authentication server on a DMZ that will allow
only users from a partner company. Which kind of network are you configuring?
a. Internet
b. Intranet
c. Extranet
d. World Wide Web
3. Which of the following are common types of password attacks? (Choose all that apply)
a. Dictionary
b. Worm
c. Rootkit
d. Spyware
e. Brute force
13. Besides installing an antivirus software package, you should always _______________ to
protect your computer against malware.
a. keep your machine up to date with the latest security patches
b. reboot your computer on a regular basis
c. allow only one user to use your computer
d. spoof your IP address
14. Which technique is used to modify the network address information of a host while
traffic is traversing a router or firewall?
a. brute force
b. multifactor authentication
c. Network Address Translation
d. Nonrepudiation
15. Which of the following is the largest public WAN in the world?
a. DMZ
b. intranet
c. extranet
d. Internet
■ Case Projects
Scenario 3-1: Dealing with Viruses
You are an administrator with the Contoso Corporation and you have recently received reports
that user computers are infected with viruses and other forms of malware. You are concerned
that personal or confidential information could have been compromised. Describe how to
protect computers from malware in the future.
O B J E C T I V E D O M A I N M AT R I X
KEY TERMS
Azure Active Directory Desktop as a Service (DaaS) Infrastructure as a Service
(Azure AD/AAD) direct membership (IaaS)
cloud services disaster recovery (DR) Microsoft Azure
Communication as a Service hosted private cloud Microsoft Azure Fabric
(CaaS) Controller (FC)
hybrid cloud
communications services Microsoft Azure Site Recovery
hypervisor
criteria membership Microsoft Intune
120
You are an administrator for the Contoso Corporation. Your network infrastructure has
grown steadily over the last few years and is close to reaching certain limits, so you are con-
sidering the cloud as a solution to expanding the corporation’s network infrastructure.
The cloud is a network of servers and each server performs a different function (such as
web services, databases, or authentication). Some servers run applications and others deliver
services. By using the cloud, you don’t have to have the individual application or services
running on the user’s computers. In addition, the cloud allows you to share resources and
THE BOTTOM LINE
technology so that they can be accessed by multiple users. From the standpoint of users, the
cloud is simply a black box that the user accesses. However, users are not concerned with
what happens inside the black box. With regard to cloud services, an organization signs
up for cloud services and the cloud service is provided without concerns about how those
services are provided.
CERTIFICATION READY
Public cloud services provide a way to access information from anywhere at any time.
Describe the types of cloud Microsoft defines a public cloud as a web-based service that is hosted outside of your organiza-
services tion. This means the information technology infrastructure (hardware, servers, software, and
4.1 so on) is located somewhere other than your office and is managed by a third party (such as
hosted). If you use mobile banking—accessing web-based email or storing your photos online
in one of the many services provided—you are interacting with “the cloud.”
Using public cloud services such as OneDrive and Office 365 enable you to take advantage of
hosted solutions. This means users have the ability to access their information from anywhere
at any time across multiple devices. By using cloud-based services, your users can collaborate
via calendars, email, and through document sharing. From an administrative perspective, it
means you gain access to services and programs without the additional overhead of mainte-
nance and software upgrades.
A private cloud offers the same features and benefits of the public cloud, but is contained
within the corporate network and is controlled by the corporate IT department. The
private cloud offers higher security and privacy and allows for more control of its resources
and data.
A hosted private cloud is provided by a third-party company but is accessible only by users
within a specific organization. In other words, the resources are leased or owned by the
organization but are managed and located away from the organization. However, the hosted
private cloud tends to be cheaper than the private cloud because some of the cost for the
building, power, and personnel is consolidated amount several companies.
A hybrid cloud is a cloud-computing environment in which the organization will manage
some of the resources in-house and a third-party organization will provide the cloud
resources externally. In other words, a hybrid cloud utilizes both a public cloud and a
private cloud.
When looking at the cloud, you should know the following terms:
• Communication as a Service (CaaS): Allows the deployment of communications
services through cloud computing without the need to purchase their own equip-
ment. It can include Voice over IP (VoIP), VPN services, and business telephone
service that you would find on a private branch exchange (PBX) such as phone menus
and voice mails.
• Desktop as a Service (DaaS): Provides a desktop or work environment to run applica-
tions, access emails, or back up data.
• Infrastructure as a Service (IaaS): Provides the infrastructure that the cloud runs on,
such as servers, switches, routers, storage area networks, firewalls, and other equipment.
• Monitoring as a Service (MaaS): Allows you to monitor software applications so that the
correct personnel are notified when it is down or not fully performing as needed.
• Network as a Service (NaaS): Offers network services such as network infrastructure/IaaS
and communication services/CaaS.
• Platform as a Service (PaaS): Allows you to buy, develop, test, deploy, and manage
software applications so that the applications can be accessed by users.
• Software as a Service (SaaS): Allows the development and provisioning of software for
users, including providing servers on which the software runs on. Typically, the SaaS runs
on demand through the remote desktop services or through a web browser. Often, the
cloud provider owns the software licenses and charges a fee to the subscribers.
The cloud can provide the following services:
• Productivity services: Allow users to work and collaborate. An example of productivity
services is Office 365, which allows users to create and share documents.
• Storage services: Provides a storage platform for data. By storing data on the cloud, the
data can be accessed by any user or device. An example of storage services is Azure
Storage.
• Communications services: Provides communication between users. Examples of commu-
nications services include Exchange Online and Skype for Business Online. Exchange
Online provides email, calendar, and contact sharing; Skype for Business Online provides
instance messaging, PC-to-PC audio and video calls, and screen sharing.
• Search services: Provides search functionality into custom applications. In addition, it
can provide a search engine and storage of data that can be accessed on an Application
Programming Interface (API). An example of search services is Azure Search.
CERTIFICATION READY
Microsoft Intune can be operated in cloud-only mode or in a new unified configuration
Describe Microsoft option that integrates the cloud-based environment with System Center 2012 Configuration
Intune Manager Service Pack 1 or higher or System Center 2012 R2/2016 Configuration
4.2 Manager. Microsoft Intune utilizes a subscription model in which you are charged on a
per-user basis.
When you use Microsoft Azure, you are leasing cloud resources provided by Microsoft.
The Microsoft Azure resources can be self-contained in the cloud (such as when you want
to have websites with databases) or you can extend your organization’s data center to the
cloud by using IaaS. By using IaaS, you can run applications in the cloud while maintain-
ing full control over the virtual machines themselves.
Microsoft Intune deploys a client agent on each device that you want to manage. The
Microsoft Intune agent communicates back to the Microsoft Intune administration console,
allowing you to inventory software and hardware assets in your organization.
Microsoft Intune can be deployed with the following configurations:
• Microsoft Intune Stand-Alone Cloud Configuration: With this configuration, you have
to administer your computers and devices (Windows 10, Windows 8/8.1, Windows RT,
Windows Phone 8, and Apple iOS) through the Administrator console. Although this
configuration allows you to create and manage policies, inventory your devices, and
upload and publish software, it does not support the discovery of mobile devices.
• Microsoft Intune Cloud + On-Premise Configuration: This configuration integrates
Microsoft Intune with your existing Active Directory and Exchange environment. With
this configuration, you can discover mobile devices using Exchange ActiveSync, synchro-
nize your user accounts with your Active Directory, and manage your mobile devices
through Microsoft Intune.
• Microsoft Intune + Configuration Manager: This configuration allows you to manage
your computers and mobile devices from the Configuration Manager console.
When done, the Admin Console should open as shown in Figure 4-1. The left side of the
screen includes vertical tabs including the dashboard, groups, alerts, software, policy, reports
and Admin.
Figure 4-1
Viewing the Microsoft Intune
Admin Console
You can install the Microsoft Intune client on computers running Windows XP
Professional (SP3), Windows Vista (Enterprise, Ultimate, or Business Edition), Windows 7
(Enterprise, Ultimate, or Professional), Windows 8/8.1 (Professional and Enterprise), and
Windows 10. You can deploy the Microsoft Intune client on both physical computers and
virtual machines.
Before installing the Microsoft Intune client, you need to consider how you want to handle
malware. If you have existing software that protects against these types of threats, Microsoft
Intune Endpoint Protection detects the software and does not install the Endpoint component.
The following options are available for deploying the client:
• Administrator Deployment: Using this option, you basically download the client
software and manually install it on the target computers. You can automate the process by
using Group Policy if you need to install it on a large number of computers.
• User-Initiated Enrollment for Computers: Using this option, users can self-enroll their
computers through the Microsoft Intune company portal.
• Install the client software as part of an image: Using this option, you can deploy the
Microsoft Intune client as part of a system image deployment. The computer is automati-
cally enrolled when the image is installed.
Figure 4-2
Viewing the Admin console
Figure 4-3
Downloading Microsoft Intune
client software
Figure 4-4
Viewing the computer as it
appears in the Microsoft Intune
Administration console
✚ MORE INFORMATION
After the installation has completed, the protection and update agents continue to perform additional setup and
configuration steps. This includes downloading the required malware definitions and any other agent updates. The
computer should appear in the Microsoft Intune Administration console in a few minutes, but it can take up to
30 minutes to complete the inventory and status updates process.
In the previous exercise, you performed an Administrative deployment, and the Windows 10
computer was enrolled as part of the installation. If you wanted to allow your users to self-
enroll their computers, they would need to be an administrator on the local computer, connect
to the Microsoft Intune portal using an Internet Explorer browser, and use a Microsoft Online
ID. To learn more about how self-enroll works, visit Microsoft.com and search for Microsoft
Intune User-Initiated Enrollment for Computers. When performing this process, perform the
following general steps:
1. Click All My Devices.
2. Click Enroll your computer.
3. Click Download Software.
4. Click Run.
5. Click Next to. To start the Microsoft Intune Setup Wizard, click Next.
6. When the installation is completed, click Finish.
Microsoft Intune supports two types of administrator roles: Microsoft Intune Tenant
Administrator and Microsoft Intune Service Administrator. Although both can gain access to
the Microsoft Intune Administration console, they do differ in the tasks they can execute.
To make the process of deploying Microsoft Intune policies, software packages, and
software updates more efficient, consider using Microsoft Intune Groups. Microsoft Intune
Groups, which are used to quickly organize and manage your computers and users, are
created and managed in the Groups workspace. These groups apply only to Microsoft
Intune and are completely separate from Active Directory groups, although you can use AD
security groups as part of a query to select members when creating a group. After your
groups are set up, you can deploy Microsoft Intune policies, software packages, and
software updates to them.
You can create groups that include users and you can create groups that include devices. What
you cannot do is include users and devices in the same group. Most administrators create
groups that are organized in one or more of the following ways:
• Geographical organization: Portland, Seattle, Los Angeles
• Departmental organization: Executives, Human Resources, Marketing
• Physical organization: Desktops, Laptops
In the Groups workspace, you see the default groups created for devices and for users when
Microsoft Intune is initially setup. For example, you will find the Windows 10 computer
you installed the Microsoft Intune Client software on earlier, under the All Computers
group.
After a closer look, you should see there is a hierarchy for the groups. For example, the All
Direct Managed Devices and the All Exchange ActiveSync Managed Devices are child groups
under the parent All Mobile Devices. You can deploy software updates, policies, and software
applications to multiple groups or to a parent group while excluding one or more child groups.
You can also add and exclude specific group members.
✚ MORE INFORMATION
To protect your production environment, consider creating a test computer group that can be used to roll out
and trial new updates. Once in place, you can select the members from within the Microsoft Intune console. This
should be reflective of the different operating systems you want to test on. Even though computers are added to
the new group, they still retain their membership in any other groups. This allows you to still assign updates to
them without impacting other computers in those groups.
When setting up a group in Microsoft Intune, you have the option to manually or dynami-
cally add users or devices to a group. You can also take a mixed approach and use both
methods when creating a group.
• Direct membership: The process of manually adding users or devices from within the
Microsoft Intune console. You manually include and exclude specific members from the
group.
• Criteria membership: This involves defining certain types of criteria that Microsoft
Intune runs a query against to find users or devices. When it finds users or computers that
match the criteria, it dynamically adds them as members to the group. The group auto-
matically updates with members as changes occur.
• Mixed: A group that consists of members added manually and dynamically.
When adding devices to a group using membership criteria, you have the following options to
include or exclude members from the parent group (see Figure 4-5):
• Computers from organizational units you specify
• Computers from domains you specify
Figure 4-5
Defining membership criteria
When defining direct membership, you have the option to include or exclude specific mem-
bers form groups you specify.
Group membership is recursive. This means that if you use a dynamic membership query and
set the criteria that a user is a member of an AD DS security group named marketing to be
included in the group, you can pick up additional indirect users in the query. For example, if
Mary is a member of the Marketing Interns security group and the Marketing Interns security
group is a member of the Marketing security group, then she is included in your query and
added to the Marketing group.
To help control the security settings on mobile devices, computer updates, Endpoint
Protection, firewall settings, and the end-user experience, Microsoft Intune has policies.
These policies apply to domain-joined computers in any domain and to non-domain
joined computers.
Since Group Policy can be used to set many of the same settings, when you deploy Microsoft
Intune client software and establish Microsoft Intune policies, you need to ensure that the
clients do not receive GPOs with similar and/or conflicting settings.
Figure 4-6
Adding a Microsoft Intune
policy
5. Select the policy template you wish to set up and click Create and Deploy a Policy
with the Recommended Settings. To view the settings before you create the policy,
click View the recommended settings for this policy template that will be used as
the default for this policy.
6. After you configure the settings that you want to apply in your default policy, type a
name and an optional description for the policy and then click Save Policy.
7. When prompted to specify whether you want to deploy the policy now, click Yes.
8. In the Select the groups to which you want to deploy this policy dialog box, select the
All Devices group or All Users group (depending on the policy you have selected) and
click OK.
9. Repeat these steps as needed for your other default policy settings.
With Microsoft Intune, you can manage mobile devices directly or through Exchange
ActiveSync. Exchange devices can be managed using on-premises servers and hosted
Microsoft Office 365 Exchange services in the cloud. If Configuration Manager is deployed
in your environment, you can use the Microsoft Intune service to manage mobile devices
while performing all management tasks in the System Center Configuration Manager
console.
Microsoft Intune can manage Windows Phone 10 devices, Windows Phone 8/8.1 devices, iOS
devices, and Android devices. To enroll Windows devices, you must deploy the Windows
Phone 10/8.1/8 company portal app to the devices. The company portal app, which can be
downloaded from Microsoft’s Download Center, must be code-signed with a certificate that is
trusted by Windows Phone 10/8.1/8 devices.
To enroll iOS devices, you need to obtain an Apple Push notification service certificate that
enables Microsoft Intune to securely communicate with the Apple Push Notification service.
To obtain an Apple Push Notification, you must download the Certificate Signing Request
from Microsoft Intune and then request an Apple Push Notification service certificate from
the Apple website.
To enroll Android devices, you must download the Android company portal app from Google
Play. This application will let you enroll Android devices for direct management.
To enroll devices, you will need to perform the following steps:
1. Set the Mobile Device Management Authority for Microsoft Intune.
2. Set up direct management for mobile devices.
3. Provision users for device enrollment.
4. Enroll devices.
Figure 4-7
Opening the Mobile Device
Management page
4. In the main pane on the right of the page, click Set Mobile Device Management
Authority.
5. The Set MDM Authority dialog box appears. You cannot change this selection at a later
time. Therefore, if you will use the Microsoft Intune console to manage mobile devices
in the future, check the box and click Yes if you want to use Microsoft Intune to man-
age mobile devices.
Figure 4-8
Setting up Windows Phone
Mobile Device Management
4. Under Step 1: Enrollment Server Address, type the name of the verified domain and
then click Test Auto-Detection.
5. Scroll down to Step 5: Upload and Deploy the Company Portal and click Upload Signed
App File. To open the Microsoft Intune Software Publisher Wizard. Click Next.
6. On the Software setup page for the Specify the location of the software setup files
option, click the Browse button to browse to the signed Windows Phone 8 company
portal app that you generated when you completed the prerequisites.
7. Under the Code-signing certification option, click the Browse button to browse to the
code-signing certificate (.pfx) file. In the Certificate password text box, type a pass-
word for the certificate. Click Next.
8. On the Software description page, complete the fields (Publisher, Name, and
Description). These fields will be seen by the users on their devices. You will also
specify an URL for software information and specify a category. Click Next.
9. On the Summary page, click Upload.
10. When the software is uploaded, click Close. The company portal can now be automati-
cally deployed to all users who enroll.
Before users are able to enroll their devices, users must be members of a Microsoft Intune user
group. When you provision users, you define device owners as managed users in Microsoft Intune.
To enroll Windows 10/8.1/8 devices, log in to the Intune portal and click Add Device. During
this process, users will provide their credentials. After a certificate is installed on the device, the
user must select Install company app or Hub, so that the device can be managed by Intune.
Figure 4-9
Wiping a device
Figure 4-10
Configuring the user location
CERTIFICATION READY
Microsoft Azure includes the following features:
Describe Microsoft • Websites with support for ASP.NET, PHP, Node.js, or Python that can be deployed using
Azure FTP, Git, Mercurial, or Team Foundation Server
4.3
• Virtual machines that run both Windows Server and Linux virtual machines
• Cloud services including Microsoft’s platform as a service (PaaS) environment that are
used to create scalable applications and services
• Data management using SQL Database (formerly known as SQL Azure Database) that
can integrate with Active Directory, Microsoft System Center, and Hadoop
• Media services that use PaaS to provide encoding, content protection, streaming, and/or
analytics
When you use Microsoft Azure, you lease cloud resources provided by Microsoft. The
Microsoft Azure resources can be self-contained in the cloud (such as when you want to have
websites with databases), or you can extend your organization’s data center to the cloud by
using IaaS. By using IaaS, you can run applications in the cloud while maintaining full control
over the virtual machines themselves.
As a virtual environment, you can create multiple virtual machines by deploying the Windows
Server 2012 R2/2016 operating system on the Hyper-V host or cloud service that it runs
under. You can also upload a Windows Server 2012 R2/2016 image template VHD file or a
Windows Server 2012 R2/2016 preconfigured image VHD file. You can then use the cloud
tools to manage the hosted virtual machines.
Microsoft provides several tools to deploy and manage servers running Windows Server 2012
R2/2016 on public and private clouds:
• System Center 2012 R2/2016 Virtual Machine Manager (VMM)
• Microsoft Azure virtual machine (VM) tools such as Azure Management Portal
• System Center 2012 R2/2016 App Controller
• Remote Desktop Connection
Virtual Machine Manager (VMM) provides a single administrative tool for deploying virtual
servers and managing a virtualization infrastructure, including hosts, virtual machines, storage,
networks, and libraries. You can also use VMM to update virtual servers.
The Microsoft Azure web portal includes multiple tools for creating and managing virtual
machines that are hosted on the Microsoft Azure cloud platform. With these tools, you can
create VMs, attach disks, upload a Windows Server VHD file, load balance virtual machines,
and manage availability of virtual machines.
The App Controller application allows administrators to deploy and manage services across the
Microsoft private cloud services and the Microsoft public cloud services, such as Microsoft
Azure. App Controller has a web-based interface that enables administrators to manage
services rather than servers.
Virtualization has become quite popular during the last few years. By using virtual
machine technology, you can run multiple operating systems concurrently on a single
machine, which allows separation of services while keeping cost to a minimum. It can also
be used to create Windows test systems in a safe, self-contained environment. Microsoft
Hyper-V is a hypervisor-based virtualization system for x64 computers starting with
Windows Server 2008. The hypervisor is installed between the hardware and the operat-
ing system and is the main component that manages the virtual computers.
Server virtualization in Windows Server 2012 R2/2016 is based on a module called a hypervi-
sor. Sometimes called a System Center 2012 R2/2016 Virtual Machine Manager (VMM),
the hypervisor is responsible for abstracting the computer’s physical hardware and creating
multiple virtualized hardware environments, called virtual machines (VMs). Each VM has its
own (virtual) hardware configuration and can run a separate copy of an operating system.
Therefore, with sufficient physical hardware and the correct licensing, a single computer
running Windows Server 2012 R2/2016 with the Hyper-V role installed can support multiple
VMs, which you can manage as though they were standalone computers.
To run several virtual machines on a single computer, you need to have sufficient processing
power and memory to handle the load. However, since most servers often sit idle, virtualiza-
tion utilizes the server’s hardware more efficiently.
To keep each virtual server secure and reliable, each server is placed in its own partition. A
partition is a logical unit of storage in which operating systems execute. Each virtual machine
accesses the hypervisor, which handles interrupts to the processor and redirects them to the
respective partition.
By using Hyper-V Manager, you can create new virtual machines and define the hardware
resources that the system should allocate to them. In the settings for a particular virtual
machine, depending on the physical hardware available in the computer and the limitations of
the guest operating system, you can specify the number of processors and the amount of
memory a virtual machine should use, install virtual network adapters, and create virtual disks
using various technologies, including storage area networks (SANs).
By default, Hyper-V stores the files that make up virtual machines in the folders you
specified on the Default Stores page during installation. Each virtual machine uses the
following files:
• A virtual machine configuration (.vmc) file in XML format that contains the virtual
machine configuration information, including all settings for the virtual machine
• One or more virtual hard disk (.vhd or .vhdx) files to store the guest operating system,
applications, and data for the virtual machine
A virtual machine may also use a saved-state (.vsv) file, if the machine has been placed into a
saved state.
Microsoft Azure has a wide range of services that you can tap into. The popular services
include Cloud Services, SQL database, Storage, Virtual Machines, and Websites.
By providing the following services, Azure be customized to fulfill the needs of virtually any
organization:
• Azure Active Directory (Azure AD): Provides identity management and access control
capabilities for your cloud applications. It can be synchronized with the on-premises domain
controllers. You can also enable single sign-on to simplify user access to cloud applications.
• API Management: Allows you to publish APIs to developers, partners and employees securely.
• Application Insights: Can be used to detect issues, solve problems, and continuously
improve your web applications by providing real time, information including availability,
performance and usage.
• Automation: Allows you to automate the creation, deployment, monitoring, and mainte-
nance of resources in your Azure environment using a highly scalable and reliable work-
flow execution engine.
• Azure Active Directory (Azure AD or AAD): Provides identity management and access
control capabilities for your cloud applications. It can be synchronized with the on-
premises domain controllers. You can also enable Single Sign-On (SSO) to simplify user
access to cloud applications and support conditional access.
• Azure Rights Management: Used to protect confidential or sensitive information by
using encryption, identity, and authorization policies.
• Backup: Allows you to back up to and restore from the cloud using familiar tools in
Windows Server 2012/Windows Server 2012 R2 or System Center 2012 R2 Data
Protection Manager.
• Batch: Allows you to run large-scale parallel and High Performance Computing (HPC)
workloads in Azure.
• BizTalk Services: Provides Business-to-Business (B2B) and Enterprise Application
Integration (EAI) capabilities for delivering cloud and hybrid integration solutions.
• CDN: Short for Content Delivery Network, allows you to deliver high-bandwidth
content to end-users around the world with low latency and high availability via a robust
network of global data centers.
• Cloud Services: Allows you to move or extend your corporate infrastructure to the cloud.
• Data Factory: Produces trusted information from raw data in cloud or on-premises
sources. It can create, orchestrate and schedule high-available, fault tolerant work flows of
data movement and transformation activities. It can also monitor all your data pipelines
and service health.
• DocumentDB: A fully-managed NoSQL document database service that offers query and
transactions over schema-free data, predictable and reliable performance, and rapid
development.
• Event Hubs: Enables elastic scale telemetry and event ingestion with durable buffering
and sub-second end to end latency for millions of devices and events.
• ExpressRoute: Enables you to create private connections between Azure datacenters and
infrastructure at your premises or in a colocation environment.
• HDInsight: A Hadoop-based service that brings an Apache Hadoop solution to the
cloud. It is typically used to manage Big Data on a cloud-based data platform that
manages data of any type and any size.
• Key Vault: Offers an easy, cost-effective way to safeguard keys and other secrets in the
cloud using Hardware Security Modules (HSMs).
• Machine Learning: Allows you to easily design, test, operationalize and manage predic-
tive analytics solutions in the cloud.
• Managed Cache: Used to create a cache that will increase access to applications and data.
• Media Services: Offer cloud-based media solutions from many existing technologies
including ingest, encoding, format conversion, content protection and both on-demand
and live streaming capabilities.
• Mobile Services: Provides a scalable cloud backend for building Windows Store, Windows
Phone, Apple iOS, Android, and HTML/JavaScript applications. It can be used to store data
in the cloud, authenticate users, and send push notifications to your application within minutes.
• Multi-Factor Authentication: By having more than one method of authentication, you
can helps prevent unauthorized access to on-premises and cloud applications.
• Notification Hubs: Allows a scalable, cross-platform push notification infrastructure that
can be used for broadcast push notifications to millions of users at once or tailor notifica-
tions to individual users.
• Operational Insights: Enables you to collect, correlate and visualize all your machine
data such as event logs, network logs, performance data from on premise and cloud assets.
• Redis Cache: A popular open source cache for your Azure applications.
• RemoteApp: RemoteApp helps employees stay productive anywhere, on a variety of
devices — Windows, Mac OS X, iOS, or Android.
• Scheduler: Allows you to invoke actions that call HTTP/S endpoints or post messages to
a storage queue on any schedule.
• Azure Search: A fully-managed service for adding sophisticated search capabilities to web
and mobile applications.
• Service Bus: A messaging infrastructure that sits between applications.
• Site Recovery: Provides a simple, cost effective disaster recover that can replicate and if
needed recover resources in the private cloud.
• SQL Database: A relational database service that enables you to rapidly create, extend,
and scale relational applications into the cloud.
• Storage: Offers non-relational data storage including Blob, Table, Queue and Drive storage.
• StorSimple: Offers a unique hybrid cloud storage solution which provides primary
storage, archive and disaster recovery.
• Stream Analytics: An event processing engine that helps uncover insights from devices,
sensors, cloud infrastructure, and existing data properties in real-time.
• Traffic Manager: Allows you to load balance incoming traffic across multiple hosted
Azure services whether they’re running in the same datacenter or across different datacent-
ers around the world.
• Virtual Machines: Enable you to deploy a Windows Server or Linux image in the cloud.
• Virtual Network: Enables you to create Virtual Private Networks (VPNs) within Azure
and securely link these with on-premises network.
• Visual Studio Online: A cloud-based Application Lifecycle Management (ALM) solution
that provides a hosted code repos and issue tracking to load testing and automated builds.
Visual Studio Online is licensed separately from Azure Services.
• Websites: Enables you to deploy web applications on a scalable and reliable cloud
infrastructure.
Microsoft Azure has a wide range of tools that provide high availability, redundancy and
fault tolerance, to keep your cloud components running 24/7 and provide wide range of
tools to recover from a disaster.
When deploying any application or service, you need to look at availability, the amount of time
the applications and service can be accessed and that are working properly. The effective availabil-
ity of your cloud service is also affected by the various SLA of the other dependent services.
For example, Azure provides the following Service Level Agreements (SLAs):
• Compute: 99.95 percent, which allows 21.6 minutes of downtime per month.
• SQL Database: 99.90 percent, which allows for 43.2 minutes of downtime per month.
• Storage: 99.90 percent, which allows for 43.2 minutes of downtime per month
If any of these go down, an application will go down. When you combine all of the SLAs
(99.95%×99.90%×99.90%), you are left with 99.65%, which gives you 108 minutes down-
time per month. To provide high availability, Microsoft Azure provides the Azure Business
Continuity Technical Guidance, which can be found by searching the Microsoft website.
The Microsoft Azure Fabric Controller (FC) is responsible for provisioning and monitoring
the condition of the Azure compute instances. When it checks the status of the hardware and
software of the host and guest machine instances, and it detects a failure, it will automatically
relocate the VM instances.
To provide redundancy to your application, it is recommended that you group two or more
virtual machines in an Availability Set. By using an availability set, two VMs that provide the
same service will be hosted on two different physical host so that if one physical host goes
down, the other VM is not affected. As a result, Availability Sets provide redundancy including
when you are performing maintenance, or when one of the hosts go down.
A disaster recovery (DR) site is a backup site that is used to relocate services when the primary
data center faces a disaster (such as a fire, a flood, an earthquake, or a terrorist attack). The DR
site is usually located away from the primary data center to ensure that the same disaster does
not take both data centers down. The data center can by hosted by the organization, or
contacted via a third-party company that specializes in disaster recovery services.
Microsoft Azure Site Recovery is a software component used to orchestrate protection for
virtual machines that are located on on-premises Hyper-V host servers located in the VMM
cloud. With Microsoft Azure Site Recovery, you can configure:
• On-premises to on-premises protection: Replicates on-premise virtual machines to
another on-premise site.
• On-premises to Azure protection: Replicates on-premise virtual machines to Azure by
configuring and enabling protection settings in Azure Site Recovery vaults. Virtual
machine data replicates from an on-premises Hyper-V server to Azure storage.
Microsoft Azure Site Recovery can be used to replicate a large number of virtual machines
between the primary site and a disaster recovery site. By using the Microsoft Azure cloud and
the Recovery Manager service, you can access all of the components necessary to orchestrate
the failover of virtual machines in one data center to another, even when one of the data center
sites is unresponsive.
Recovery Manager has the following requirements:
• System Center 2012 R2/2016 VMM or VMM 2012 SP1 with cumulative update 3
• Windows Server 2012 with latest updates or Windows Server 2012 R2/2016
To configure Azure Site Recovery, perform the following steps:
1. Create an Azure Site Recovery vault, including specifying a vault key.
2. Install the Site Recovery agent on the VMM servers that you want to register in the vault.
3. Specify protection settings for the cloud, including source and target settings, recovery
points and snapshots, and initial replication settings.
4. Create mappings between VM networks on source and destination VMM servers.
5. Create mappings between storage classifications on source and target VMM servers.
6. Enable protection for virtual machines.
7. Create and customize recovery plans that specify how virtual machines should be grouped
and failed over.
S U M M A RY S K I L L M AT R I X
■ Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in the blanks provided.
1. The ____________ is a web-based service that is hosted outside of your organization and
allows users to access services and documents over the Internet.
2. ____________ allows you to buy, develop, test, deploy, and manage software applications
so that the application can be accessed by the user.
3. ____________ provides the infrastructure that the cloud runs on such as servers,
switches, routers, and other equipment.
4. ____________ provide communications between users over the cloud.
5. ____________ is a cloud-based management solution that allows you to manage your
computers when the users are not inside your corporate network.
6. ____________ are used to quickly organize and manage your computers and users for
Microsoft Intune.
7. ____________ is a cloud-computing platform used for building, deploying, and manag-
ing applications and services through a global network of Microsoft-managed datacenters.
8. ____________ is a software component that is used to orchestrate protection for virtual
machines that are located on on-premises Hyper-V host servers located in the VMM cloud.
9. The ____________ provides a blackbox approach when users access services on the
Internet.
10. Microsoft Intune ____________ are used to apply settings that apply to domain-joined
computers in any domain.
Multiple Choice
Circle the letter that corresponds to the best answer.
1. Which of the following represent security and management tasks that can be handled
with Microsoft Intune? (Choose all that apply)
a. Track hardware and software inventory
b. Provide remote assistance
c. Protect computers from malware.
d. Manage the deployment of software updates.
2. On which operating system can you install the Microsoft Intune? (Choose all that apply)
a. Windows XP Professional (SP3)
b. Windows Vista Business Edition
c. Windows 10 Professional (physical computer)
d. Windows 8/8.1 Consumer (virtual client)
3. Which administrator role in Microsoft Intune can create and delete all other types of
accounts?
a. Microsoft Intune Service administrator role
b. Microsoft Intune User Management Administrator role
c. Microsoft Intune Tenant Administrator
d. Microsoft Intune SuperAdmin Role
4. Which type of group is created manually in the Microsoft Intune Administration console?
a. dynamic query-based group
b. direct-based group
c. security group
d. dynamic group
5. You have a phone that is being managed by Microsoft Intune and the phone is stolen.
What should you do?
a. Change the password
b. Wipe the phone
c. Ping the phone
d. Run an inventory report for the phone
6. Which configuration allows you to see devices that are managed by Microsoft Intune to
appear in Configuration Manager?
a. Microsoft Intune Stand-Alone Cloud Configuration
b. Microsoft Intune Cloud + On-Premise Configuration
c. Microsoft Intune + Configuration Manager
d. Microsoft Intune with System Center Plug-in
7. Which type of membership should you be used to add devices automatically to groups in
Microsoft Intune?
a. Direct
b. Criteria
c. Dynamic
d. Auto
8. Which of the following can be used to deploy and manage servers running Windows
Server 2012 R2 on the Microsoft Azure? (Choose all that apply)
a. Microsoft Azure virtual machine (VM) tools
b. Virtual Machine Monitor (VMM)
c. Virtual Machine Manager (VMM)
d. App Controller
9. When using Microsoft Azure, which of the following is a popular open source cache for
your Azure applications?
a. Service Bus
b. Managed Cache
c. Redis Cache
d. Stream Analytics
10. Which cloud service is provided by Microsoft Office 365?
a. Productivity services
b. Storage services
c. Communication services
d. Search services
True / False
Circle T if the statement is true or F if the statement is false.
T F 1. The public cloud offers a more secure environment than the corporate network.
T F 2. Active Directory Group Policy allows more granular control than Microsoft Intune
policies.
T F 3. When deploying software using Microsoft Intune, it is best to deploy to groups.
T F 4. When a phone is stolen, it is best to wipe the phone.
T F 5. OneDrive is considered a productivity service.
■ Case Projects
Scenario 4-1: Creating a Disaster Recovery Site
You are administrator for the Contoso Corporation and you manage a network that has
around 30 servers. You need to create a disaster recovery (DR) site that can provide the same
services while keeping cost to a minimum. Describe your proposed solution.
O B J E C T I V E D O M A I N M AT R I X
KEY TERMS
account organizations attribute store Azure RemoteApp
Active Directory Domain Azure Active Directory (AD) Bring Your Own Device (BYOD)
Services Azure AD Join policies
Active Directory Federation Azure Active Directory Sync built-in groups
Services (AD FS) (DirSync) tool Central Access Policy
145
You are an administrator of the Contoso Corporation. With the popularity of mobile
devices used within the corporate environment, you need to determine how mobile devices
can access corporate resources while maintaining security. For example, sales employees
need to access price lists and presentations that will be used on sales visits. Project team
members will have to access shared documents so that they can collaborate.
Identity services provides credentials that can be registered with an Access Control Service
THE BOTTOM LINE
(ACS), such as Microsoft Azure, that allow users to authenticate directly with an ACS and
receive a token for accessing the ACS. The ACS may contain many service identities.
In Lesson 4, you learned that Microsoft Azure is an ACS. Some of the identity services
X REF discussed in this section include Windows Server Active Directory, Azure Active Directory,
Microsoft Account, and federation services.
Active Directory Domain Services is a technology created by Microsoft that provides a variety
of network services, including the following:
• LDAP
• Kerberos-based and Single Sign-On (SSO) authentication
• DNS-based naming and other network information
• A central location for network administration and delegation of authority
The Lightweight Directory Access Protocol (LDAP) is an application protocol for querying
and modifying data using directory services running over TCP/IP. Within the directory, the
sets of objects are organized in a logical hierarchical manner so that you can easily find and
manage them. The structure can reflect geographical or organizational boundaries, although
it tends to use DNS names for structuring the topmost levels of the hierarchy. Deeper inside
the directory, there might be entries representing users, organizational units, printers, docu-
ments, groups of users, or anything else that represents a given tree entry (or multiple entries).
LDAP uses TCP port 389.
Kerberos is a computer network authentication protocol that allows hosts to prove their
identity over a nonsecure network in a secure manner. It can also provide mutual authen-
tication so that both the user and server verify each other’s identity. For security reasons,
Kerberos protocol messages are protected against eavesdropping and replay attacks.
Single Sign-On (SSO) allows you to log on once and access multiple related but independent
software systems without having to log in again. As you log on with Windows using Active
Directory, you are assigned a token that can then be used to sign on to other systems automatically.
Finally, Active Directory allows you to organize all of your network resources, including users,
groups, printers, computers, and other objects, so that you can assign passwords, permissions,
and rights to the users on your network. You can also assign who can manage a group of objects.
(known as the parent domain) can have a child domain. Likewise, a child domain can have its
own child domain. Because the child domain is combined with the parent domain name to
form its own unique DNS name, the domains with a tree have a contiguous namespace.
The domains within a tree have the same contiguous name space. For example, you could have one
domain assigned to an organization’s developers and another domain assigned to its salespeople:
Developers.microsoft.com
Sales.microsoft.com
The Developers and Sales domains would both be child domains of the microsoft.com domain.
A forest is a collections of domains trees that share a common schema. A forest can contain
one or more domain trees or domains, all of which share a common logical structure, global
catalog, directory schema, and directory configuration, as well as automatic two-way transitive
trust relationships. A forest can consist of a single domain tree or even a single domain. The
first domain in the forest is called the forest root domain. If you have multiple domain trees,
each domain tree would consist of a unique namespace.
A forest differs from a tree because it uses disjointed namespaces between the trees. For
example, in a forest, microsoft.com might be the root for one tree. Should Microsoft purchase
a company called Contoso (contoso.com), contoso.com then becomes the root of another tree.
Each tree could be combined into a forest, yet each tree’s identity could be kept separate.
To allow users in one domain to access resources in another domain, Active Directory uses
trust relationships, whereby one domain trusts another domain so that users from one
domain can access resources from another domain. As previously discussed, domains with a
tree and forest are automatically created as two-way transitive trusts. A transitive trust is based
on the following concept:
If domain A trusts domain B, and domain B trusts domain C, then domain A trusts
domain C.
However, if you have a partnership with another company and you need users from one
domain within one organization to access resources in another domain, you can configure an
explicit nontransitive trust to be either one way or two way.
A domain controller is a Windows server that stores a replica of the account and security
information for the domain and defines the domain boundaries. To make a computer running
Windows Server 2008 a domain controller, you must install the Active Directory Domain
Services and execute the dcpromo (short for dc promotion) command.
After you have promoted a computer to a domain controller, you can use several MMC
snap-in consoles to manage Active Directory:
• Active Directory Users and Computers: Used to manage users, groups, computers, and
organizational units. Figure 5-1 shows the Active Directory Users and Computers console.
• Active Directory Domains and Trusts: Used to administer domain trusts, domain and
forest functional levels, and user principal name (UPN) suffixes.
• Active Directory Sites and Services: Used to administer replication of directory data
among all sites in an Active Directory Domain Services (AD DS) forest.
• Active Directory Administrative Center: Used to administer and publish information in
the directory, including managing users, groups, computers, domains, domain controllers,
and organizational units.
• Group Policy Management Console (GPMC): Provides a single administrative tool for
managing Group Policy across the enterprise.
Figure 5-1
Active Directory Users and
Computers console
Although these tools are installed on domain controllers, they can also be installed on client
PCs so that you can manage Active Directory without logging on to a domain controller.
A server that is not running as a domain controller is known as a member server. To create a
domain controller, you install the Active Directory Domain Services on a Windows server and
then promote the server to a domain controller.
The replication path, or site topology, within a site is automatically managed by a service
called the Knowledge Consistency Checker (KCC). Typically, replication within sites happens
more quickly than replication between sites. The Active Directory Sites and Services MMC
snap-in allows you to control intersite replication. You can use it to create site-link bridge
objects and to configure replication patterns.
Within Active Directory, you need to define each subnet. Once you have done this,
Active Directory can figure out the best way to replicate information locally and
between sites.
To minimize traffic across a WAN link, bridgehead servers perform directory replication
between two sites, whereas only two designated domain controllers talk to each other. If you
have domain controllers from multiple domains, you will have a bridgehead server for each
domain.
LOOKING AT OBJECTS
An object is a distinct, named set of attributes or characteristics that represent a network
resource. Common objects used within Active Directory are computers, users, groups, and
printers. Attributes have values that define the specific object. For example, a user could have the
first name John, the last name Smith, and the login name as jsmith, all of which identify the user.
When working with objects, administrators use the names of the objects, such as usernames.
However, Active Directory objects are assigned a 128-bit unique number called a globally
unique identifier (GUID), sometimes referred to as a security identifier (SID), to uniquely
identify an object. Therefore, if a user changes her name, you can change her username yet she
will still be able to access all objects and have all of the rights she had previously, because these
are assigned to the GUID.
GUIDs also provide some security. In particular, if a user is deleted, you cannot create a new
user account with the same username and expect to have access to all of the objects and rights
the previous user had access to. Thus, if a user leaves your organization but you plan to replace
that user, you can disable the account, hire the new person, rename the user account, change
the password, and re-enable the account so that the new user can access all resources and have
all of the rights that the previous user had.
The schema of Active Directory defines the format of each object and the attributes or fields
within each object. The default schema contains definitions of commonly used objects, such as
user accounts, computers, printers, and groups. For example, the schema defines that a user
account has the user’s first name, last name, and telephone number.
To allow Active Directory to be flexible so that it can support other applications, you can
extend the schema to include additional attributes. For example, you could add badge
number or employee identification number to the user object. Indeed, when you install
some applications, such as Microsoft Exchange, they will extend the schema, usually by
adding additional attributes or fields so that the schema can support the application.
groups the person is a member of, and so on. You can also specify whether a password expires,
whether the password can be changed, and whether the account is disabled. Lastly, on the Profile
tab, you can define the user’s home directory, logon script, and profile path.
Figure 5-2
User Account in Active
Directory
Associated with a user account is the user profile, which is a collection of folders and data that store
the user’s current desktop environment and application settings. A user profile also records all
network connections that are established so that when a user logs on to a computer, the computer
remembers the mapped drives to shared folders. Thus, when a user logs on to a particular computer,
she will see the same desktop environment she previously had on the computer.
For Windows Vista, Windows Server 2008 and higher, user profiles are stored in the C:\Users
folder. In each user’s folder, some of the available folders include Desktop, Documents, Start Menu,
and Favorites. See Figure 5-3. When jsmith directly accesses his or her Desktop or Documents,
jsmith is really accessing C:\Users\jsmith\desktop or C:\Users\jsmith\my documents.
Figure 5-3
A user’s profile folder
UNDERSTANDING GROUPS
A group is a collection or list of user accounts or computer accounts. Different from a
container, a group does not store user or computer information; rather, it just lists it. The
advantage of using groups is that they simplify administration, especially when assigning
rights and permissions.
A group is used to group users and computers together so that when you assign rights and
permissions, you assign them to the entire group rather than to each user individually. Users
and computers can be members of multiple groups, and in some instances, a group can be
assigned to another group.
In Windows Active Directory, there are there are two types of groups:
• A security group is used to assign rights and permissions and gain access to network
resources. It can also be used as a distribution group.
• A distribution group is used only for nonsecurity functions, such as distributing email,
and it cannot be used to assign rights and permissions. See Figure 5-4.
Figure 5-4
A distribution group
Any group, whether a security group or a distribution group, is characterized by a scope that
identifies the extent to which the group is applied in the domain tree or forest. The three
group scopes are as follows:
• Domain local group: A domain local group contains global groups and universal groups,
even though it can also contain user accounts and other domain local groups. It is usually
in the domain with the resource to which you want to assign permissions or rights.
• Global group: A global group can contain user accounts and other global groups. Global
groups are designed to be “global” for the domain. After you place user accounts into
global groups, the global groups are typically placed into domain local groups or local
groups.
• Universal group: A universal group scope is designed to contain global groups from
multiple domains. Universal groups can contain global groups, other universal groups,
and user accounts. Because global catalogs replicate universal group membership, you
should limit the membership to global groups. This way, if you change a member within
a global group, the global catalog will not have to replicate the change.
Azure Active Directory (AAD) is a cloud-based IaaS that you can use for identity man-
agement and access control. Azure AD has been the identity provider for Office 365 since
before Azure AD was made available to the public.
To integrate with an on-premises Active Directory environment, you can use one of the
following:
• Azure Active Directory Sync (DirSync) tool runs on an on-premises domain-joined
computer to provide directory synchronization to Microsoft Azure AD. Used primarily to
synchronize user objects and user attributes, DirSync is a requirement for SSO.
• Active Directory Federation Services (AD FS) is deployed onsite and provides SSO for
applications and services that reside onsite or in Microsoft Azure. AD FS enables all
authentications to take place in the on-premises Active Directory and offers Multi-Factor
Authentication (MFA).
• On-premises AD DS is the authentication provider and the source of directory data. AD
DS is a requirement for DirSync, AD FS, and SSO.
If you have configured synchronization between Active Directory and Azure, you can manage
X REF
your user accounts with the standard Active Directory tools such as Active Directory Users and
For more information Computers. If you are not using directory synchronization, you can manage your accounts in
about authentication, Azure using the Microsoft Azure AD management portal or the Azure Directory Module for
including MFA, see Windows PowerShell.
Lesson 3.
Microsoft accounts can be synched with a domain account, but the capability to do
so depends upon Group Policy settings. Using Group Policy, you can determine
whether you want to allow the synching of the two accounts and what information can
be synched.
You create a Microsoft account during the initial installation of the operating system or after
the system is running.
The Active Directory Federation Services (AD FS) role allows administrators to config-
ure SSO for web-based applications across a single organization or multiple organizations
without requiring users to remember multiple usernames and passwords, although it is not
required. This enables you to configure Internet-facing business-to-business (B2B) applica-
tions between organizations. For example, a user from contoso.com can use contoso.com
credentials to access a web-based application hosted by adatum.com.
Traditionally, if users from one organization or domain need to access a website provided by
another organization or domain, you can do it one of two ways:
• Depending on the web application, you can create web or domain accounts for users and
have them log on with a second account. Unfortunately, this does not provide an SSO
solution.
• You can create a virtual private network (VPN) between the two organizations and
establish a trust relationship between the two Active Directory domains. Although this
provides an SSO solution, it is difficult to set up and maintain.
AD FS–enabled applications are claims-based, which allows a much more scalable authentica-
tion model for Internet-facing applications. Therefore, AD FS is an identity access solution
that allows any browser-based clients to access a website with a single logon to one or more
protected Internet-facing applications, even when the user accounts and applications are on
different networks and exists within different organizations via a federated trust relationship.
An AD FS configuration consists of two types of organizations:
• Resource organizations own the resources or data that are accessible from the AD FS–
enabled application, similar to a trusting domain in a traditional Windows trust
relationship.
• Account organizations contain the user accounts that access the resources controlled by
resource organizations.
Because federation can be used within a single organization, the single organization serves as
the resource organization and the account organization.
Of course, to establish an identity federation partnership, both partners agree to create a
federated trust relationship. A federated trust relationship defines how each partner defines
what resources are accessible to the other organization and how access to the resources is
enabled. User identities and their associated credentials are stored, owned, and managed by the
organization where the user is located.
Claims-based access control uses a trusted identity provider to provide authentication. The
trusted identity provider issues a token to each user, which is then presented to the application
or service as proof of identity. In other words, with claims-based authentication, users can
authenticate to the Active Directory located within their organization and be granted a claim
based on that authentication. The claim is then presented to an application that is running in
a different organization.
The organization that accepts the claim and has the application the user is trying to access will
require key information in the claim—for example, an email address or User Principal Name
(UPN) to identify the user, and group membership to specify the access allowed within the
application by the user.
To keep the claims secure, all communications occur over HTTPS. Of course, both organiza-
tions need to agree on the format for exchanging claims. To simplify this process, a set of
specifications identified as web services have been identified, which can be used when imple-
menting AD FS.
Web services are based on Extensible Markup Language (XML), Simple Object Access
Protocol (SOAP), Web Services Description Language (WSDL), and Universal Discovery
Description and Integration (UDDI). It also uses Security Assertion Markup Language
(SAML), which is an XML-based standard for exchanging claims between an identity provider
and a service or application provider. The communication between federation servers is based
around an XML document that stores the X.509 certificate for token signing and stores the
SAML 1.1 or 2.0 token.
AD FS uses the following components:
• Federation server: The server that issues, manages, and validates requests involving
identity claims. A federation server is needed in each participating forest.
• Web Application Proxy: An optional component that is usually deployed on a perimeter
network that can receive externally and forward the packets to the internal federation
server.
• Claims: A statement made by a trusted entity about an object, such as a user, that
includes key information identifying the object.
• Claim rules: Rules that determine what makes up a valid claim and how claims are
processed by the federation servers.
• Attribute store: A database, such as Active Directory Domain Services (AD DS), that is
used to look up claim values.
• Claims provider: The server that issues claims and authenticates users.
• Relying parties: The application or web service that accepts claims from the claims
provider. The relying party server must have the Microsoft Windows Identity Foundation
installed or use the AD FS 1.0 claims-aware agent.
• Claims provider trust: Configuration data that specifies which client can request claims
from a claims provider and subsequently submits them to a relying party.
• Relying party trust: Configuration data used to provide claims about a user or client to a
relying party.
In the simplest scenario, an organization can deploy a federation server to be used with its own
web applications. If the web application is running on Windows and is part of the same
domain as the users who are accessing the web application, you can bypass the federation
server and grant access directly to the Active Directory users. However, in more complicated
scenarios, an organization might require AD FS:
• The application is not running on Windows or does not support AD DS authentication.
• The Windows server is not part of the domain and requires SAML or web services for
authentication or authorization.
• A larger organization consists of multiple domains or multiple forests and has multiple
identities.
• Users from outside the organization need access to internal servers and are not part of the
domain.
When a single organization uses AD FS, you need only one federation server (not including
what might be needed for high availability). If the network with the federation server is
completely isolated, you need a second server to act as a federation proxy server. For AD FS to
provide SSO for a single organization, the following would happen:
1. The client computer accesses a web-based application on a web server by sending an
HTTPS request.
2. When the web server receives the request and identifies that the client computer does not
have a claim, the web server redirects the client computer to the federation server proxy, if
a proxy is being used. If not, it will forward the request to the federation server.
3. If the AD FS is using a proxy, the client computer sends an HTTPS request to the
federation server proxy. Depending on the configuration and setup, the federation server
proxy might use the current Windows logon (Integrated Windows authentication) or
prompt for a logon.
4. If the AD FS is using the proxy, the federation server proxy passes the request and the
credentials to the federation server.
5. The federation server uses AD DS to authenticate the user.
6. If authentication is successful, the federation server collects AD DS information about
the user and generates the user’s claims.
7. The claim is put into a security token, which is passed back to the client computer.
8. The client presents the token to the web server and uses the claims to access to the application.
When you have a large number of users using mobile devices as their primary comput-
THE BOTTOM LINE
ing device, you have to determine the best way for those users to access data they need to
perform their jobs.
CERTIFICATION READY
Many companies must set up a VPN client that will allow users to connect to the corporate
Describe business data access network as long as they have a connection to the Internet. They can then access internal
5.2 resources just as if they are working at their desks. However, other solutions can be provided,
including using the Company Portal, Work Folders, or Azure RemoteApp.
The Microsoft Intune Company Portal provides self-service connection point for users
to request help and select apps to install. It gives users the access they need to perform self-
service tasks, such as adding or removing their computers from Microsoft Intune, selecting
applications to install (made available to them by the Administrator), and contacting the
technical support administrator.
When a user connects to the Company Portal, he has the option to install a Company
X REF
Portal app on his computer from the Windows Store. This will create a tile on the user’s
For more information Start screen.
about Microsoft Intune,
When the user clicks on the tile, he needs to log in using his assigned Microsoft Intune user
refer to Lesson 4.
name and password. After he is authenticated, the Company Portal page appears (see Figure 5-5).
Figure 5-5
Viewing a sample Company
Portal from the user’s
perspective
When the user clicks the Apps tile, he is prompted to visit the Windows Store to install
the Company Portal app. After completing the installation, a new Company Portal tile
is placed on the Windows 10 Start menu. The user can then access the portal through
this app.
Clicking on the New Apps icon enables users to view the most recently published apps
made available to them via Microsoft Intune. Selecting an app presents the user with
a prompt to confirm the computer and he wants to install the app on and then perform
the installation process. After it is installed, the app appears as a tile on the Company
Portal page.
✚ MORE INFORMATION
Applications can be installed on a remote computer as well as a local computer. To monitor progress, you can see
the application install status on the Apps page of your Company Portal.
You can modify the look and feel of the Company Portal through the Microsoft Intune
Administrator console.
When customizing the portal (see Figure 5-6), information that can be customized includes:
• Company name: Appears as the title of your company portal.
• IT department contact name: Appears on the Contact IT tile.
• IT department phone number: Appears on the Contact IT tile.
• IT department email address: Appears on the Contact IT tile.
• Additional Information (such as hours of operation): Appears on the Contact
IT tile.
• Support website URL: Specifies the website and website name that users can contact for
support (name and URL). This can include your IT department phone number, email
address, and any additional information you want to provide. Only the name, not the
URL, is displayed on the Contact ID page
• Theme color: Customize the theme color and choose a background for the Company
Portal app.
Figure 5-6
Customizing the Company
Portal
Work Folders allow users to store and access work files on a sync share from multiple
devices, including personal computers and devices (including bring-your-own devices).
Work Folders are for only individual data and do not support sharing files between users.
However, while these files can be accessed from anywhere, the organization maintains con-
trol over corporate files by storing the files on centrally managed file servers. To maximize
accessibility, you can provide file share-based access to the files stored in a Work Folder,
use Work Folders with Folder Redirection and Offline Files. In addition, since the files are
stored centrally, you can back up the data on a regular basis.
Work Folders use the https protocol to transport data between devices and the Work Folders
server. When you configure Work Folders for a user, you configure sync access to a specific sync
share. The folder for the user is created in this sync share. When you assign a group with sync
access, each user in the group is given a folder on that server. Since Work Folders client synchro-
nizes only with a single server, you should not assign a user sync access on multiple servers.
When Work Folders is configured on a device, you have the option to wipe the Work Folders
data from the device, which will remove the Work Folders data only. When the user leaves
your organization, it is simple to remove the Work Folders data from all of their devices.
When you create the Sync Share, you have the following available policies:
• Encrypt Work Folders: The data on the devices is encrypted, but the data on the file server is
not encrypted, which will mitigates the risk of data being accessed if a device is lost or stolen.
• Automatically lock screen, and require a password: When selected, devices using Work
Folders lock the screen after 15 minutes and require a password of at least six characters to
unlock. Additionally, if there are 10 unsuccessful sign in attempts, the device is locked out.
Figure 5-7
Opening the Work Folders page
2. Click the To create a sync share for Work Folders, start the New Sync Share Wizard
link. Alternatively, you can click Tasks > New Sync Share.
3. On the Before you begin page, click Next.
4. On the Select the server and path page, you can select a folder that is already shared
or you can specify a local path (such as C:\Folder1). Click Next.
5. On the Specify the structure for user folders page, select either User alias (default)
or User alias@domain. The user alias is compatible with other technologies, such as
folder redirection or home folders. The alias@domain option allows you to use folder
names for users across domains. Click Next.
6. On the Enter the sync share name page, in the Name and Description text boxes, type
a sync share name and description. Click Next.
7. On the Grant sync access to groups page, click Add. In the Select User or Group dialog
box, in the Enter the object name to select text box, type a username or group name
and then click OK. Back on the Grant sync access to groups page, click Next.
8. On the Specify device policies page, you can select the following options:
• Encrypt Work Folders
• Automatically lock screen, and require a password
9. On the Confirm selections page, click Create.
10. When the sync share is created, click Close.
Figure 5-8
Managing your Work Folder
Work Folders uses the https protocol to transport data between devices and the Work
Folders server. By using a reverse proxy server, Work Folders can be securely used over the
Internet. In addition, you can use Web Application Proxy to enhance the security of Web
Folders by integrating Web Folders authentication with AD FS, which will allow you to
implement multi-factor authentication and restrict connectivity to Work Folders to
authorized devices.
If you integrate Microsoft Azure Multi-Factor Authentication with AD FS, you can implement
the following methods for additional authentication:
• Phone calls: You receive a call on your phone to confirm your authentication and you
press the # (pound) symbol to confirm after receiving the call.
• Text messages: You receive a text message with a passcode. You respond to the text
message and include the passcode.
• Mobile App: An authentication prompt appears in the mobile app that you must
acknowledge.
When Work Folders is configured on a device, you can wipe the Work Folders data from the
device, which will remove the Work Folders data only. When the user leaves your organization,
it is simple to remove the Work Folders data from all of the user’s devices.
Since Work Folders data is stored on a file server, you can perform all of the typical file
management functions using File Server Resource Manager and Rights Management Services,
including quotas, file screening, classification, and Rights Management.
When you modify a file, the file is replicated very quickly. However, while it is unlikely that a
user will change a file on two separate devices before replication occurs, it can happen if one of
the devices is offline for an extended period. In addition, if synchronization does not occur,
you should check the following:
• Work Folders does not synchronize individual files larger than 10 GB.
• Ensure that there is at least 5 GB of free space on the volume with the Work Folders.
• Ensure that Quotas is not restricting access to a Work Folder.
Azure RemoteApp allows you to connect to Azure cloud services using Remote Desktop
Services (RDS) from your corporation on-premises. With Azure RemoteApp, users can
securely access applications from different devices.
Remote Desktop Services (called Terminal Services in previous releases of Windows) is a term
that describes several features of the Windows server role that enables users to remotely
connect to virtual desktops, session-based desktops, and RemoteApp programs over the
Remote Desktop Protocol (RDP). RDP is a protocol used on the computer to render display
output, which is then sent in the form of packets to the RDP client. On the client, RDP is
used to send mouse and keyboard inputs to the server.
The Windows server running the RDS role includes the following services:
• RD Virtualization Host: Integrates with Hyper-V to enable users to connect to a VM on
a server hosting Hyper-V.
• RD Session Host: Enables a server to host RemoteApp programs or session-based
desktops.
• RD Connection Broker: Used for session load balancing; enables users to reconnect to a
virtual desktop and RemoteApp programs, and provides access to virtual desktops in a
virtual desktop collection.
• RD Web Access: Enables users to access RemoteApps and desktop connection via the Start
menu or through a web browser.
• RD Licensing: Manages licenses needed to connect to the RD Session Host.
• RD Gateway: Enables users to connect to virtual desktops, RemoteApp programs, and
session-based desktops from any device connected to the Internet.
RemoteApp programs stored on a RD Session Host server and virtual desktops hosted on an
RD Virtualization Host can be remotely accessed from a client desktop. RemoteApp programs,
which look and feel like local applications even though they are accessed remotely, can be
accessed via a web console, or can be launched from the users’ Start menu or when they open a
file associated with the application.
To install any of these services, you will use Server Manager Add Roles and Features.
When you get to the Select installation type page, you can choose between Role-based or
feature-based installation or Remote Desktop Services (RDS) installation. The Role-based
or feature-based installation installs all parts of roles or features on a single server; the
RDS installation simplifies the deployment of an RDS infrastructure and allows you to
distribute the RDS role across different servers.
When using Azure RemoteApp, you don’t have to install the various Remote Desktop server
roles or concern yourself with the maintenance or reliability. In addition, users from Windows,
iOS, Mac OS X, and Android devices can use RemoteApp applications.
There are two kinds of RemoteApp collections:
Cloud collection: Hosted in and stores all data for programs in the Azure cloud. Users can
access apps by using their Microsoft account or corporate credentials that are synchronized.
They can also use accounts that are federated with Azure Active Directory.
Hybrid collection: Hosted in and stores data in the Azure cloud but also lets users
access data and resources stored on the organization’s local network. Users can access
apps by using their corporate credentials synchronized or federated with Azure Active
Directory.
Many organizations have policies in place that are designed to standardize the apps being used
on company-supplied computers and do not want their users installing any applications they
find, even if they are certified to work with Windows 10. Bring Your Own Device (BYOD)
policies may also be in place that require you to control access to the Store. A BYOD policy
THE BOTTOM LINE
defines the standards, restrictions and procedures for end users who have authorized access to
company data from their personal devices (tablets, laptops, or smartphones). The policy also
includes hardware and any related software that is not approved, owned, or supplied by the
company. In either case, as the administrator, you will need to make sure your strategy for
accessing the Windows Store aligns with your company’s policies.
In addition to determining your strategy for controlling access to Windows Apps and
CERTIFICATION READY
Describe Bring Your Own
the Windows Store, you will also need to consider the deployment of Line of Business (LOB)
Device (BYOD) apps. LOB apps include apps that are critical to running the business of the company
5.3 as well as apps that are unique to the main business of the company. If you want to use
the new Windows Apps format for your LOB apps, you can deploy them via the Windows
Store or by a process called sideloading or deeplinking, which is explained later in
this section.
If you choose to deploy your LOB apps via the Windows Store, they must go through a
certification process with Microsoft to ensure they are compatible with Windows 10 and meet
criteria for apps being deployed from the Store. The apps will also be available to the public,
which may not be what you want. To bypass the Store requirements and make the apps
available to your internal users only, consider sideloading or deeplinking them as part of your
overall design strategy.
Mobile devices such as smartphones and tablets are computers that can run a wide range
of applications. Some organizations will require certain applications to be installed on
these devices so that users of the devices can do their jobs.
that installs the application silently (without user interaction). Any additional files and
folders that are required by the setup program must be available from the location that
you specify for the app setup files. If your application requires user interaction during
setup, you will not be able to use Microsoft Intune to install the application.
• App Package for Android (*.apk file): Used to install applications on an Android device.
The App Package for Android is not available as a software installer type until you set the
Mobile Device Management Authority to Microsoft Intune.
• App Package for iOS (*.ipa file): Used to install iOS applications. The .ipa package must
be signed by Apple and the expiration date indicated in the provisioning profile must be
valid. Microsoft Intune can distribute enterprise certificate iOS applications if your
enterprise is registered for the iOS Developer Enterprise Program.
• Windows Phone App Package (*.xap, .appx, .appxbundle): Used to distribute a
Windows Phone 8 or 8.1 app package. The Windows Phone App Package is not
available as a software installer type until you set the Mobile Device Management
Authority to Microsoft Intune. You must also obtain an enterprise mobile code-signing
certificate.
• Windows App Package (.appx, .appxbundle): Used to distribute a Windows appx
package for Windows RT and enrolled Windows 8.1 or Windows 10 devices and is not
available until you set the Mobile Device Management Authority to Microsoft Intune.
You must obtain a code-signing certificate and sideloading product activation keys.
• Windows Installer through MDM (*.msi): Allows you to create and deploy Windows
Installer-based apps to enrolled devices that run Windows 10.
Figure 5-9
Reviewing the Microsoft Intune
Software workspace
3. Deploy the package. Within the Managed Software workspace, click the package to
deploy and select the group to deploy the software package to. The package is now ready
for your users.
4. Client download/installations. If the client meets all the configuration requirements you
set in Step 2, it downloads the package to a temporary folder and begins the silent
installation. (The client is configured via a policy to check for new downloads every 8
hours.)
5. Monitor the deployment status. To view the progress of installations across your managed
computers, you can use the administrative console.
For many applications, the manufacturer includes options to automatically check for updates
directly from the client computer. If you want Microsoft Intune to manage this process, you
have to disable the manufacturer’s feature on each of the managed computers.
After the application is uploaded into Microsoft Intune, you can deploy the application
to Microsoft Intune groups, which can contain users or devices that Microsoft Intune
manages.
Figure 5-10
Managing software with
Microsoft Intune
3. In the Add Software Wizard, on the Before you begin page, click Next.
4. For the Select how this software is made available to devices option, select External
link. In the Specify the URL text box, type the URL of the application and then click
Next.
5. On the Software description page, in the Publisher, Name and Description text boxes,
type the publisher, user-friendly name, and description of the application.
6. On the Summary page, click Upload.
7. When the software is uploaded, click Close.
When looking at managing the devices of an organization, you can configure policies
based on devices or based on users. For example, when installing software with Group
Policy, you can install software based on a computer or based on a user.
In the past, users would typically use one computer and they would be the only user using that
computer. Therefore, the IT department was focused on managing users when it came to
configuring the systems and installing applications.
However, with advances in technology, users can now have a desktop computer and a mobile
device (such as a laptop, tablet, or smart phone), all of which will access applications, emails,
and other resources. Some of these devices might be owned by the corporation and others
might be owned by users. Therefore, the configuring of these device and the installing of
applications focus on people-centric IT.
You can join Windows 10 devices by using one of the following methods:
• Workplace Join allows users to join their devices to the organization network without
joining the device to the Active Directory domain. You can then manage their access
based on a wide range of attributes. You can use Workplace Join to join Windows 7,
Windows 8/8.1, and Windows 10 devices.
• Azure AD (AAD) Join allows you to join Windows 10 devices in Azure AD and users can
then sign into Windows using their Azure Active Directory accounts and passwords while
having Single Sign-On (SSO) access to Office 365 and to on-premises services that use
Active Directory authentication. The device can be automatically enrolled into a Mobile
Device Management service (such as Microsoft Intune) at the same time. When you log
on to the Microsoft Azure portal, you must enable device registration for Azure AD by
selecting Configure for AAD and, for the Enable workplace join option, selecting Yes.
When you join a device using Workplace Join, Device Registration Service (DRS) registers a
non-Domain Joined device in Active Directory and installs a certificate on the device. By
joining the device, Workplace Join provides a secure SSO mechanism while controlling which
resources can be accessed by the device.
When the user joins the devices using Workplace Join technology, the device becomes a known
device. To use Workplace Join, you must have Windows Server 2012 R2/2016 with the AD FS
role service installed. In addition, the client must be using the Windows 10 or 8.1 client
operating system or iOS-based devices (such as an iPad).
The certificate will be used to represent device identity when accessing organization resources.
When accessing resources on the organization, the SSO allows the user to be prompted for her
domain credentials only once during the lifetime of the SSO session. However, an administra-
tor can specify resources that enforce a password prompt or reauthentication.
To support Workplace Join, you’ll need to install and configure AD FS and the new Device
Registration Service. To configure the Device Registration Service, execute the following
Windows PowerShell commands:
Initialize-ADDeviceRegistration
Enable-AdfsDeviceRegistration
JOIN A DEVICE
GET READY. To join a device, perform the following steps.
1. Log in to the client device with a Microsoft account.
2. On the Start screen, open the Charms bar, click the Settings charm, and then click
Change PC Settings.
3. On the PC Settings page, click Network > Workplace.
4. In the Enter your UserID to get workplace access or turn on device management dialog
box, type the user name (such as [email protected]) and then click Join.
5. When prompted for credentials, type the username and the associated password and
then click OK. You should now see the message This device has joined your workplace
network.
RD Virtualization Host is ideal in scenarios where users need the flexibility of a full desktop
rather than individual applications. There are two types of virtual desktop collections
available:
• Personal: In a personal desktop collection scenario, each user is assigned to his own
virtual machine.
• Pooled: In a pooled desktop collection scenario, users share virtual machines that are
available with a pool of VMs.
Virtual machine-based desktop deployment is comprised of RD Virtualization Host, RD
Connection Broker, and RD Web Access. The RD Gateway and RD Licensing role
services can be deployed after initial configuration to provide remote users access to
resources within your corporate network and RDS License management for remote users
and devices.
RD Virtualization Host integrates with Hyper-V to provide pooled or personal virtual
desktop collections. If Hyper-V isn’t already installed, it will be installed during the role
services deployment. Since the RD Virtualization Host role service requires Hyper-V, it
must be installed on a physical server and cannot be virtualized. You will need to ensure that
hardware virtualization support is enabled in the BIOS or the deployment will fail. The
Virtual Machine-based deployment allows users to connect to virtual desktop collections
that include published RemoteApp programs and virtual desktops. RD Virtualization Host
is ideal in scenarios where users need the flexibility of a full desktop rather than individual
applications.
When you begin the virtualization host deployment, identify where each server role will be
placed and based off of your requirements determine the proper deployment scenario to
follow:
• Quick Start: If you have a small-scale or low-intensive deployment, the Quick Start
deployment will set up all roles services and publish a collection to a single server.
• Standard: If you need to deploy roles across multiple servers or have a specialized deploy-
ment, choose the Standard deployment type.
RD Virtualization Host deployment can be started from the Add Roles And Features Wizard
with Server Manager. The deployment types are the same as an RD Session Host deployment
(the types are Quick Start or Standard deployments). For the deployment scenarios, you will
need to choose to perform a virtual machine-based deployment. Select the servers to host each
role service for your deployment: RD Connection Broker, RD Web Access, and RD
Virtualization Host.
Once the RD Virtualization Host has been provisioned, you must create the virtual machine to
be used as the master image before a collection has been created. This master image will be used
to create all other virtual machines in the VDI deployment. The master virtual machine must
run either Windows 7 Service Pack 1 or Windows 10/8.1/8 to be supported in a Hyper-V
virtual environment. To begin creating the image, you can use Hyper-V manager to run the
new virtual machine wizard to create the virtual machine you will use for the master image.
You can use the new virtual machine wizard to begin creating the virtual machine within Hyper-V
and install the operating system. Once the operating system has been installed, customize the
virtual machine based off of your organizational requirements. The customization should include
installing required updates, applications, and any needed desktop configurations. If the virtual
machine will be used in a pool where RemoteFX-enabled virtual desktops are needed, add the
RemoteFX 3d video adapter to the VM using the Hyper-V manager. Once all configuration and
customization of the virtual machine has been completed, you will run the sysprep.exe utility with
the Generalize option and shut down the VM. The generalize option will remove system specific
data, which includes event logs, unique SIDs, and other information unique to the system.
Before you can create a RD Virtualization Host collection you must have created and used the
sysprep tool on a virtual machine that will act as the master image for all virtual machine
deployments within a VDI collection. To begin creating a new collection, you will run the
Create Virtual Desktop Collection Wizard, which will include:
• Specifying which template to use
• Configuring virtual desktop settings
• Configuring the unattended settings, including specifying the Active Directory organiza-
tion unit that the virtual desktop will reside
• Configuring the users and groups that can access the collection
• Specifying the number of virtual machines to create in the collection
• Configuring the prefix or suffix characters that should be added to the name of each
virtual desktop.
• Configuring the assigned memory, CPU and number of virtual machines to create on
specific RD Virtualization Hosts.
• Configuring the location of where to store the VMs, which can be local storage, remote
storage on an SMB share, or storage on a Cluster Shared Volume (CSV).
• If user profile disks are enabled, specifying storage location and maximum allowed size.
The default size of user profile disks is 2GB. (User profile disks aren’t available for
personal VMs.)
Dynamic Access Control (DAC), originally called claims-based access control, is used for
access management. It provides an automatic mechanism to secure and control access to
resources.
Claims-based access control uses a trusted identity provider to provide authentication. The
trusted identity provider issues a token to the user, which the user then presents to the
application or service as proof of identity. Identity is based on a set of information. Each piece
of information is referred to as a claim (such as who the user or computer claims to be) and is
stored as a token, which is a digital key. The token is a form of digital identification for the
user or computer that is accessing a network resource. The token has a digital signature of the
identity provider to verify the authenticity of the information stored within the token. As a
user or computer needs access to a resource, the user or computer presents the token to get
access to the resource.
In Windows Server 2012 R2/2016, the identity provider is the Security Token Service (STS)
and the claims are the Active Directory attributes assigned to a user or device (such as a
computer). The claims, the user’s SID, and group membership are stored inside the Kerberos
ticket. The ticket is then used to access protected resources. Of course, claims authorization
relies on the Kerberos Key Distribution Center (KDC).
In Windows Server 2012 R2/2016, DAC allows you to perform the following:
• Identify data by using automatic and manual classification or tagging files in an
organization.
• Control access to files by applying automatic policies that are controlled by Central Access
Policies.
• Audit access by using a Central Audit Policy to ensure compliance and to be used in
forensic analysis.
• Use Windows Rights Management Service (RMS) to encrypt sensitive documents.
• Offer Access-Denied Assistance, which provides a method for users to request access from
the owner of data when he or she is denied access.
To use claims-based authorization, you need the following:
• Windows Server 2012/2012 R2/2016 must be installed on the file server that hosts the
resources that DAC protects.
• At least one Windows Server 2012 or higher domain controller must be accessible by the
requesting client.
• If you use claims across a forest, you must have a Windows Server 2012 or higher domain
controller in each domain.
• If you use device claims, clients must run Windows 10.
When you enable DAC, you have the option to support claims, compound authentica-
tion, and armor Kerberos. Compound authentication is an extension to Flexible
Authentication Secure Tunneling (FAST), which allows Kerberos to create service
tickets to devices. Kerberos armoring fully encrypts Kerberos messages and signs
Kerberos errors. Although Kerberos armoring enhances security, it also increases
processing time.
Figure 5-11
Managing DAC using Active
Directory Administrative Center
To create a claim type, you specify a specific attribute from Active Directory. Of course, for
DAC to be effective, Active Directory must contain accurate information. By default, the
claim name is the name of the selected attribute name. However, you can modify this to give
a more meaningful name. Lastly, you have the option to provide suggested values for the
claim.
After you create the claim types, you must configure the resource property objects (such as a
folder or a file) using the Active Directory Administrative Center. You can create your own
resource property or you can use preconfigured properties, such as Project, Department, or
Folder Usage. If you choose to use a preconfigured property, they are disabled by default.
Therefore, you have to enable the preconfigure property.
Figure 5-12
Configuring a condition for an
ACL
Files stored in shared folders are data files that need to be accessed by multiple users. However,
when you apply shared and NTFS permissions, the permissions apply to all files in a specific
folder. Unless you constantly monitor the folder and modify the permissions for the folder or
the individual files in the folder, the shared and NTFS permissions might not always be a good
fit to keep the files secure.
A Central Access Policy is a policy that contains Central Access Rules that grant permissions
to objects for a defined group of resources. By default, the rules apply to all resources, but you
can limit the resources to which the rule will apply. Once the rule is defined, you can choose
to apply it live or you can choose to use a “staging” mode.
Before you implement a Central Access Policy, you should do the following:
1. Identify the resources that you want to protect.
2. Define the authorization policies.
3. Translate the authorization policies into expressions.
4. Determine which claim types, resource properties, and device claims must be created to
deploy the policies.
If you have one file server or one folder, you don’t necessarily need to implement a Central
Access Policy. Instead, you can implement conditional access on the folder’s Access Control
List (ACL). If you have resources across multiple servers or multiple folders, you will most
likely benefit from a Central Access Policy.
In the following exercise, you will create a Central Access Rule that grants permissions to files
in a folder that is classified as Confidentiality – High.
5. Because you do not have a Central Access Rule defined, click Add a new central
access rule.
6. In the Create Central Access Rule dialog box, in the Name text box, type a name to
identify the rule.
7. Under Target Resources, click Edit. The Central Access Rule dialog box opens.
8. For the condition, specify the following:
Resource > Confidentiality > Equals > Value > High
Click OK to close the Central Access Rule dialog box.
9. Click OK to close the Create Central Access Rule dialog box.
10. Back in the Central Access Rule dialog box, the rule should be shown in the right
pane. Click OK to close the Add Central Access dialog box.
11. Click OK to close the Create Central Access Policy dialog box.
12. Click Cancel to close the Confidentiality dialog box.
13. Close the Active Directory Administrative Center.
You can also take this a step further and specify that access is granted only if the user is part
of the Human Resources department:
Resource > Department > Equals > Value > Human Resources
Windows RMS and Azure Rights Management are used to provide an extra level of
security to email and Microsoft Office documents by using encryption to limit who can
access a document or email and what can be done with a document or email. RMS also
offers plug-in capability for other file formats, but the plug-ins are not widely used. For
example, you determine whether a document or web page can be printed, copied, edited,
forwarded, or deleted. RMS helps protect confidential information and controls who can
access the data.
As mentioned in Lesson 3, as cloud service, Office 365 or Azure Directory allows users to
easily access and share documents within the organization or with users in other organizations
without requiring a Virtual Private network (VPN) connection. Organizations that do not use
Office 365 or Azure Directory can use the free version of RMS for individual subscriptions.
Since the information that you are encrypting with RMS can be confidential, Windows RMS
provides a great tool for protecting it and should be covered in your BYOD policy.
S U M M A RY S K I L L M AT R I X
X REF
• Azure Active Directory (AD) is a cloud-based IaaS that you can use for identity manage-
ment and access control. Microsoft Azure AD has been the identity provider for Office 365
since before Microsoft Azure AD was made available to the public.
• The Active Directory Federation Services (AD FS) role allows administrators to configure
SSO for web-based applications across a single organization or multiple organizations
without requiring users to remember multiple usernames and passwords, although it is not
required. This enables you to configure Internet-facing business-to-business (B2B) applica-
tions between organizations.
• The Microsoft Intune Company Portal provides self-service connection point for users to
request help and select apps to install. It gives users the access the need to perform
self-service tasks, such as adding or removing their computers from Microsoft Intune,
selecting applications to install (made available to them by the Administrator), and
contacting the technical support administrator.
• Work Folders allow users to store and access work files on a sync share from
multiple devices, including personal computers and devices (including bring-your-
own devices).
• Azure RemoteApp allows you to connect to Azure cloud services using Remote Desktop
Services (RDS) from your corporation on-premises. With Azure RemoteApp, users can
securely access applications from different devices.
• Bring Your Own Device (BYOD) policies may also be in place that require you to control
access to the Store. A BYOD policy defines the standards, restrictions and procedures for
end users who have authorized access to company data from their personal devices
(tablets, laptops, or smartphones).
• Sideloading is a process for installing Windows Store applications without using the
Windows Store. If you have access to the app installation files, you can sideload with
Microsoft Intune.
• With deeplinking, you can identify an application in the Windows store that you want to
deploy to Windows 10 and a link will be provided to the user that will take him directly to
the app in the Windows store. By deeplinking, the user will not have to search for the
specific app and potentially load the wrong app.
• Workplace Join allows users to join their devices to the organization network without
joining the device to the Active Directory domain. You can then manage their access based
on a wide range of attributes.
• Azure AD (AAD) Join allows you to join Windows 10 devices in Azure AD and users can
sign into Windows using their Azure Active Directory accounts and passwords while having
Single Sign-On (SSO) access to Office 365 and to on-premises services that use Active
Directory authentication.
• A Virtualization Host Infrastructure, also referred to as Virtual Desktop Infrastructure (VDI),
consists of virtual desktops running on Remote Desktop Services and Hyper-V to provide
users with access to virtual desktop collections made up of personal or pooled virtual
desktops and RemoteApp programs.
■ Knowledge Assessment
Fill in the Blank
3. To use SSO for a web-based application that is hosted by partner company and your
company Active Directory, you should use .
4. When you use Active Directory Federation Services (AD FS), the organization that
contains the user accounts that access the resources is known as the .
5. The easiest way for a user with a smartphone running Windows 10 to access your
Microsoft Intune Company Portal is to install the from the Windows
Store.
6. allow a user to use his personal computer from home to access com-
pany documents from a sync share.
7. is the process for installing Windows Store applications through
Microsoft Intune instead of the Windows Store.
8. Although sideloading can be used to install the application using Microsoft Intune, you
can provide a link to install the application by using .
9. When creating a Central Access Policy for Dynamic Access Control, you have to
define that grant permissions to objects for a defined group of resources.
10. When using Windows RMS, a includes user domains that can access
Windows RMS.
Multiple Choice
Circle the letter that corresponds to the best answer.
1. Which of the following allows an SSO when deploying an application for another
organization on your network?
a. Active Directory Domain Services (AD DS)
b. Windows Rights Management Services (RMS)
c. Active Directory Lightweight Directory Services (AD LDS)
d. Active Directory Federation Services (AD FS)
2. Which of the following is a statement made by a trusted entity for a user that includes key
information to identity the user?
a. store
b. delegated party
c. proxy
d. claims
3. Which of the following is the application that accepts claims from a claim provider?
a. claims provider
b. relying party
c. attribute store
d. federation server proxy
4. Which of the following is the server that issues claims and authenticates users?
a. claims provider
b. relying party
c. attribute store
d. federation server proxy
5. In AD FS, which claim provider is used by default?
a. Active Directory
b. AD LDS
c. SQL database
d. Oracle database
6. Which task cannot be performed when using the Microsoft Intune Company Portal?
a. Adding a computer to Microsoft Intune
b. Removing a computer from Microsoft Intune
c. Contacting Technical Support
d. Installing Windows applications made available to other users by the Microsoft Intune
Administrator
7. Which of the following allows you to store and access work files from a sync share, which
can then be accessed from multiple devices (including bring-your-own devices)?
a. Offline folders
b. Folder redirection
c. Work Folders
d. Central Placement
8. Which of the following are methods to connect to a Work Folder? (Choose three answers)
a. Group Policy
b. URL entry
c. Auto Discovery
d. ActiveSync Policy
9. You have several files and more will be added in the future. You want to define the NTFS
permissions for files that contain the word "legal" for users who are part of the Legal
department. What should you do?
a. Enable and configure EFS
b. Enable and configure DAC
c. Enable and configure BitLocker
d. Enable and configure DRA
10. Which of the following is the primary naming service used in Windows?
a. AD
b. WINS
c. DNS
d. DHCP
11. Which group scope is meant to be used to assign permissions to a local resource?
a. Distribution group
b. Domain local
c. global
d. Captured
12. Which of the following authorizes a user to perform certain actions on a computer?
a. Permission
b. UNC
c. Right
d. Task
13. Which of the following can be used to assess an application that is hosted on another
computer, but the application looks like it is running locally?
a. Hyper-V
b. Remote Access
c. Remote Desktop
d. RemoteApp
14. Which of the following allows you to connect to the Azure cloud using Remote Desktop
Services from your corporation on-premises?
a. Azure RemoteApp
b. Remote Desktop Connections
c. RD Web Access
d. RD Gateway
15. Which of the following should be developed before you allow users to use their own
smartphones to access company email?
a. A DRS policy
b. A Share policy
c. A LOB policy
d. A BYOD policy
■ Case Projects
Scenario 5-1: Deploying Software to Windows Mobile Phones
You need to deploy a mobile device for a timesheet application. Describe the best way to
install the software to the mobile phones.
185
Permissions, 62, 105–112. See also NTFS permissions Secure Socket Tunneling Protocol (SSTP), 89
NTFS, 108–111 Security group, 154
operation, 107–108 Security identifier (SID), 152
share permissions, 112 Security token, 104
Personal identification number (PIN), 104 Security Token Service (STS), 175
Personal Information Exchange, 86 Serial ATA (SATA), 56
Pin program, 21 Service Administrator, 54
Platform as a Service (PaaS), 122 Shared folder, 67
Point-to-Point Tunneling Protocol (PPTP), 89 Share permissions, 107, 112
Pretty Good Privacy (PGP), 82–83 Sharing drives and folders, 67–71
Printers (Print device), 75 advanced sharing, 68
adding additional printer drivers, 77 basic sharing, 68
adding network printer, 75 using Public folders, 70–71
installing, 75–76 libraries, 70–71
options, 77 sharing options, 71
print jobs, 75 share permissions, 69
managing, 79–80 Shortcuts, 27
setting permissions, 78–79 Sideloading applications, 168–170
Print jobs, 75, 79–80 Simple (no resiliency), 57
Private cloud, 121 Single Sign-On (SSO), 147
Private key, 80 Site, 148
Private network, 97 Small Computer System Interface (SCSI), 56
Productivity services, 122 Smart card, 83, 104
Public cloud, 46, 121 SMB, 73
Public cloud services, 46 Software as a Service (SaaS), 122
Public folders, 70–71 Software code signing, 84
Public key, 80 Spyware, 113
Public key cryptography, 80 Standalone CA, 87
Public key infrastructure (PKI), 87 Storage Area Networks (SANs), 34
Public network, 97 Storage pools, 56–59
Storage services, 122
R Storage Spaces, 56–59
RD Connection Broker, 165 Subordinate CA, 87
RD Gateway, 165 Symmetric encryption, 80
RD Licensing, 165 Sync feature, 8–9
RD Session Host, 165 System Center Configuration Manager, 38
RD Virtualization Host, 165, 173–174 System Center 2012 R2 App Controller, 137
RD Web Access, 165 System Center 2012 R2 Virtual Machine Manager (VMM),
Recovery manager, 141 137, 138
Recycle Bin, 2 System update, 40
Registry permissions, 107
Relying parties, 158 T
Relying party trust, 158 Temporal Key Integrity Protocol (TKIP), 83
Remote access server (RAS), 88 Thin provisioning, 57
RemoteApp collections, 165 Three-way mirror, 57
RemoteApp programs, 165 Token, 175
Remote Desktop Protocol (RDP), 165 Touch screen, 5–6
Remote Desktop Services, 165 Transport Layer Security (TLS), 33, 82
Resilient File System (ReFS), 60 Trojan horses, 113
Resolution, 25 Trusted identity provider, 175
Resource organizations, 157 Trusted Platform Module (TPM), 33–36
Roaming user profile, 23–24 Trust relationships, 148
Root CA, 87 Two-way mirror, 57
Rootkit, 114
U
S Universal group, 154–155
Search services, 122 Universal naming convention (UNC), 73
Secure multipurpose Internet Mail Extension Universal Serial Bus (USB), 56
(S/MIME), 82 USB token, 104
Secure Socket Layer (SSL), 33, 81 User account, 6, 152–153