Windows 10

Course name:

   20398B - Planning for and Managing Devices in the Enterprise:

   Enterprise   Mobility Suite (EMS) and On-Premises Tools

Type:

   Course

Delivery method:

   Instructor-led (classroom)

Length:

   5 days

Overview

About This Course

−   This section provides a brief description of your course, including audience, suggested prerequisites, and course objectives.

Course Description

−   This course teaches IT professionals how to use the Enterprise Mobility Suite to manage devices, users, and data, and how to use other technologies, such as Group Policy.

−   Students will learn how to design and implement cloud-based and on-premises solutions for managing Windows, Apple iOS, and Android devices and providing secure and efficient access to data and applications.

Audience

−   The primary audience for this course is IT professionals and consultants who plan, deploy, and manage devices and applications in medium to large organizations. A significant portion of this audience works in on-premises Active Directory Domain Services (AD DS) environments, with devices (both domain-joined and not) for which they need to provide mobile device management and secure data access. Devices in such environments typically run Windows 10, Windows 10 Mobile, Apple iOS, and Android. These professionals plan to extend on-premises AD DS to the cloud and they need to learn how to plan and implement Enterprise Mobility Suite.

Student Prerequisites

In addition to their professional experience, students who attend this training should already have the following technical knowledge:

• −   TCP/IP networking fundamentals.

• −   Understanding of Domain Name System (DNS).

• −   Working knowledge of AD DS principles.

• −   Understanding of the public key infrastructure (PKI) fundamentals.

• −   Understanding of cloud-based service concepts.

• −   Windows Server 2012 R2 fundamentals, including Remote Desktop Services.

• −   Experience with Windows 10.

• −   Familiarity with Windows PowerShell.

• −   Basic knowledge of mobile platforms.

After completing this course, students will be able to:

• −   Use devices in the enterprise environment.

• −   Implement and administer Microsoft Azure Active Directory (Azure AD).

• −   Connect AD DS with Azure AD.

• −   Manage devices in Microsoft Office 365.

• −   Plan and implement Intune.

• −   Use Intune to manage devices.

• −   Use Intune to manage applications and Resource Access.

• −   Plan and implement Microsoft Azure Rights Management (Azure RMS).

• −   Plan and implement app support.

• −   Plan and implement Remote Access.

• −   Plan and implement Dynamic Access Control and auditing.

• −   Plan and protect data.

• −   Recover data and operating systems.

Course details

Module 1: Using devices in the enterprise environment

Module Overview

Lesson 1: Overview of devices in an enterprise

Lesson 2: Device management features

Lesson 3: Overview of the EMS

Lab: Planning for device management

Module 2: Implementing and administering Azure AD

Module Overview

Lesson 1: Overview of AD DS

Lesson 2: Overview of Azure AD

Lesson 3: Creating and managing Azure AD

Lesson 4: Managing authentication in Azure AD

Lab: Working with Azure AD and providing access to claims-aware

applications

Module 3: Connecting AD DS with Azure AD

Module Overview

Lesson 1: Preparing AD DS for directory synchronization

Lesson 2: Implementing Azure AD Connect

Lab: Synchronizing on-premises AD DS with Azure AD

Lesson 3: Planning and implementing federation

Module 4: Managing devices in Office 365

Module Overview

Lesson 1: Overview of Office 365

Lab A: Managing devices in Office 365 (Part 1)

Lesson 2: MDM for Office 365

Lab B: Managing devices in Office 365 (Part 2)

Module 5: Planning and implementing Microsoft Intune

Module Overview

Lesson 1: Planning for Intune

Lesson 2: Deploying Intune clients

Lesson 3: Basic Intune administration

Lab: Planning and implementing Intune

Module 6: Managing devices by using Intune

Module Overview

Lesson 1: Working with Microsoft Intune policies

Lesson 2: Mobile device management

Lab A: Using Microsoft Intune policies to manage devices

Lesson 3: Managing updates and Windows Defender

Lab B: Managing updates and Windows Defender

Module 7: Using Microsoft Intune to manage applications and resource access

Module Overview

Lesson 1: Application lifecycle management

Lesson 2: Application deployment process

Lab A: Using Intune to deploy and monitor applications

Lesson 3: Managing access to company resources

Lab B: Using Intune to manage resource access

Module 8: Planning and implementing Azure RMS

Module Overview

Lesson 1: Overview of Azure RMS

Lesson 2: Implementing Azure RMS

Lab: Using Azure RMS to protect documents and data

Module 9: Planning and implementing app support

Module Overview

Lab A: Pre-lab configuration

Lesson 1: Planning and implementing application compatibility options

Lesson 2: Publishing and using RemoteApp programs

Lesson 3: Publishing and using Azure RemoteApp

Lab B: Publishing and using RemoteApp and Azure RemoteApp

Module 10: Planning and implementing remote access

Module Overview

Lesson 1: Overview of remote access solutions

Lesson 2: Implementing a remote access infrastructure

Lesson 3: Planning and implementing Work Folders

Lab A: Configuring and using VPN and Work Folders

Lesson 4: Implementing cloud data access

Lesson 5: Planning and implementing mobility options

Lab B: Using Offline Files and OneDrive

Module 11: Planning and implementing Dynamic Access Control and auditing

Module Overview

Lesson 1: Planning and implementing Dynamic Access Control

Lesson 2: Planning and deploying advanced audit policies

Lab: Implementing secure data access

Module 12: Planning and protecting data

Module Overview

Lesson 1: Planning and implementing encryption

Lesson 2: Planning and implementing BitLocker

Lesson 3: Protecting data on devices

Lab: Protecting data by using encryption and BitLocker

Module 13: Recovering data and operating systems

Module Overview

Lesson 1: Planning and implementing file recovery

Lesson 2: Planning and implementing device recovery

Lab: Implementing file recovery and device recovery

Lesson 3: Planning and implementing updates

Community

Looking for training resources, events and advice from peers? Join the Microsoft Training and Certification Community.

Preparing for an exam now? Find your Microsoft Certification Study Group.

Course name:

   Course 20697-1C - Implementing and Managing Windows 10

Type:

   Course

Delivery method:

   Instructor-led (classroom)

Length:

   5 days

Overview

About this course

This course provides students with the knowledge and skills required to install and configure Windows 10 desktops and devices in a corporate Windows Server domain environment. The skills that this course details include learning how to install and customize Windows 10 operating systems and apps, and configure local and remote network connectivity and storage. Students also will learn how to configure security for data, devices, and networks, and maintain, update, and recover Windows 10.

Audience profile

This course is for information technology (IT) professionals who administer and support Windows 10 desktops, devices, users, and associated network and security resources. The networks with which these professionals typically work are configured as Windows Server domain-based environments with managed access to the Internet and cloud services. Students who seek certification in the 70-697 Windows 10 Configuring exam also will benefit from this course. Additionally, this course builds skills for Enterprise Desktop/Device Support Technicians who provide Tier 2 support to users who are running Windows 10 desktops and devices within a Windows domain environment in medium-sized and larger organizations.

After completing this course, students will be able to:

−   Describe the important new features of Windows 10.

−   Install Windows 10.

−   Configure a device that is running Windows 10.

−   Configure network connectivity for a Windows 10 device.

−   Manage storage in Windows 10.

−   Manage folders and printers.

−   Manage apps.

−   Manage data security.

−   Manage device security.

−   Implement Windows 10 features to improve network security.

−   Restore files, roll back drivers, and recover Windows 10 devices.

−   Monitor and update Windows 10 devices.

Course details

Module 1: Overview of Windows 10. This module describes the Windows 10 operating system. It describes the new features in Windows 10, and the important changes since Windows 8.1. It describes the use, navigation, and customization of the enhanced Windows 10 user interface. Additionally, this module this module describes the Windows 10 features that make it beneficial for organizations of different sizes.

Lessons

−   Introducing Windows 10

−   Navigating the Windows 10 User Interface

Lab : Navigating and Customizing the User Interface

−   Navigating the Windows 10 User Interface

−   Configuring Start

−   Configuring the Desktop

After completing this module, students will be able to:

             −  Describe important new features of Windows 10.

            −   Navigate and customize the Windows 10 interface.

Module 2: Installing Windows 10. This module introduces the different editions of Windows 10, and the differences between them. It describes the requirements and available options for installing Windows 10 on a device, and provides instructions for installing, or upgrading to, Windows 10. Additionally, this module provides points that you should consider when deciding between an upgrade or migration to Windows 10, and the supported upgrade paths from older versions of the Windows operating system.

Lessons

−   Installing Windows 10

−   Upgrading to Windows 10

Lab : Installing Windows 10

−   Upgrading Windows 7 to Windows 10

−   Migrating User Settings

After completing this module, students will be able to:

             −   Choose how to install Windows 10.

             −   Describe the process of upgrading to Windows 10.

Module 3: Configuring Your Device. This module explains how to configure Windows 10 by using tools such as the Settings app, Control Panel, Windows PowerShell, Remote Server Administration Tools (RSAT), and Group Policy Objects (GPOs). It describes the different types of user accounts, and the benefits of using a Microsoft account. It also covers the common configuration options in Windows 10. Additionally, this module describes Microsoft OneDrive and its integration with Windows 10.

Lessons

−   Overview of Tools You Can Use to Configure Windows 10

−   Common Configuration Options

−   Managing User Accounts

−   Using OneDrive

Lab : Configuring Windows 10

−   Using the Settings App

−   Using Control Panel

−   Using Windows PowerShell

−   Using GPOs

Lab : Synchronizing Settings with OneDrive

−   Connecting a Microsoft Account

−   Synchronizing Settings between Devices

After completing this module, students will be able to:

             −   Describe the different tools that they can use to configure Windows 10.

             −   Explain common configuration options.

             −   Manage user accounts.

             −   Use OneDrive with Windows 10.

Module 4: Configuring Network Connectivity. This module explains the use of tools to configure network settings, including the Network and Sharing Center and Windows PowerShell. It describes the differences between Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) settings, and the benefits of IPv6. Additionally, it describes how to implement name resolution and provides an overview of the Domain Name System (DNS) service. Lastly, this module describes how you can configure wireless connectivity in Windows 10, and explains remote access methods that are available in Windows 10, such as virtual private networks (VPNs), DirectAccess, and Remote Desktop.

Lessons

−   Configuring IP Network Connectivity

−   Implementing Name Resolution

−   Implementing Wireless Network Connectivity

−   Overview of Remote Access

Lab : Configuring Network Connectivity

−   Verifying and Testing IPv4 Settings

−   Configuring Automatic IPv4 Settings

−   Configuring and Testing Name Resolution

After completing this module, students will be able to:

             −   Describe how to configure IP network connectivity.

             −   Implement name resolution.

             −   Implement wireless network connectivity.

             −   Describe options for remote access in Windows 10.

Module 5: Managing Storage. This module provides an overview of storage options, including hard disks, server-based storage, and virtual hard disks. It describes network storage options, including network-attached storage (NAS) and storage area networks (SANs), and cloud-based storage options, such as OneDrive and Microsoft Azure Storage. Additionally, this module describes the management and maintenance of disks, partitions, and volumes, and the configuration and use of the Storage Spaces feature.

Lessons

−   Overview of Storage Options

−   Managing Disks, Partitions, and Volumes

−   Maintaining Disks and Volumes

−   Managing Storage Spaces

Lab : Managing Storage

−   Adding a Disk

−   Creating a Simple Volume

−   Compressing a Folder

−   Enabling Disk Quotas

−   Creating a Storage Space

After completing this module, students will be able to:

             −   Explain the different storage options in Windows 10.

             −   Manage disks, partitions, and volumes.

             −   Maintain disks, partitions, and volumes.

             −   Manage storage spaces.

Module 6: Managing Files and Printers. This module provides an overview of the file systems that Windows 10 supports. It explains how to configure file permissions, the effect of file permissions, how explicit and inherited permissions work, and how to include user and device claims in access permissions. This module also explains how to share folders, the tools that you can use to share folders, and the effective permissions when a user tries to access data in a shared folder that is protected by file permissions. Additionally, this module explains how to create and use Work Folders. The last lesson in this module describes how to add and share a printer, and how to manage client and server-side printing.

Lessons

−   Overview of File Systems

−   Configuring and Managing File Access

−   Configuring and Managing Shared Folders

−   Work Folders

−   Managing Printers

Lab : Configuring and Managing Permissions and Shares

−   Creating, Managing, and Sharing a Folder

−   Using Conditions to Control Access and Effective Permissions

Lab : Configuring and Using Work Folders

−   Configuring Work Folders

Lab : Installing and Managing a Printer

−   Managing and Using a Printer

After completing this module, students will be able to:

             −   Describe and create file systems that Windows 10 supports.

             −   Configure file permissions.

             −   Explain how permission inheritance works.

             −   Implement conditions to limit access to files and folders.

             −   Create and manage shares.

             −   Create and use Work Folders.

             −   Configure and manage printers.

Module 7: Managing Apps in Windows 10. This module describes how to install and configure desktop apps and Windows Store apps in Windows 10. It explains how to install apps manually and automatically, and how to use Microsoft System Center Configuration Manager and Microsoft Intune to deploy apps. Additionally, it describes the Windows Store and the way in which you can manage access to it. Lastly, this module describes the Internet Explorer 11 and Microsoft Edge browsers, and explains how to configure and manage both browsers.

Lessons

−   Overview of Providing Apps to Users

−   The Windows Store

−   Web Browsers

Lab : Installing and Updating Apps from the Windows Store

−   Sideloading an App

−   Signing In with a Microsoft Account

−   Installing and Updating Windows Store Apps

Lab : Configuring Windows 10 Web Browsers

−   Configuring and Using Microsoft Edge

−   Configuring and Using Internet Explorer

After completing this module, students will be able to:

             −   Describe the Windows 10 options for app deployment.

             −   Install and manage Windows Store apps.

             −   Configure Windows 10 web browsers.

Module 8: Managing Data Security. This module explains how the technologies available with Windows 10 work together to protect against data-related security threats. It provides an overview of these threats, and discusses possible mitigations and best practices for dealing with them. It describes defense-in-depth and Encrypting File System (EFS), and how you can use those methods to counter security threats. Additionally, this module describes how to configure, administer, and monitor BitLocker drive encryption.

Lessons

−   Overview of Data-Related Security Threats

−   Securing Data with EFS

−   Implementing and Managing BitLocker

Lab : Managing Data Security

−   Using EFS

−   Using BitLocker

After completing this module, students will be able to:

             −   Understand data-related security threats.

             −   Secure data with Encrypting File System (EFS).

             −   Implement and manage BitLocker Drive Encryption.

Module 9: Managing Device Security. This module explains how to mitigate security threats with the use of Security Compliance Manager, Enhanced Mitigation Experience Toolkit, and security settings in GPOs. It also describes User Account Control (UAC), and how to configure it. This module also explains the use of AppLocker to configure application usage and restrictions.

Lessons

−   Using Security Settings to Mitigate Threats

−   Configuring UAC

−   Configuring Application Restrictions

Lab : Managing Device Security

−   Creating Security Policies

−   Testing Security Policies

−   Configuring UAC Prompts

−   Configuring and Testing AppLocker

After completing this module, students will be able to:

             −   Use security settings to mitigate threats.

             −   Configure UAC.

             −   Configure application restrictions

Module 10: Managing Network Security. This module describes common network-related security threats, and describes options to mitigate them. It describes tools such as Windows Firewall, IPsec connection security rules, and Windows Defender, and how students can configure these tools to manage network security.

Lessons

−   Overview of Network-Related Security Threats

−   Windows Firewall

−   Connection Security Rules

−   Windows Defender

Lab : Managing Network Security

−   Creating and Testing Inbound Rules

−   Creating and Testing Outbound Rules

−   Creating and Testing Connection Security Rules

−   Configuring Windows Defender

After completing this module, students will be able to:

             −   Describe network-related security threats.

             −   Manage Windows Firewall.

             −   Configure connection security rules.

             −   Manage Windows Defender.

Module 11: Troubleshooting and Recovery.  This module describes device drivers, and how to use the Device Manager to view, configure, update, and roll back device drivers. It explains file-recovery methods in Windows 10, such as Backup and Restore, File History, and Previous Versions. This module also explains features such as System Restore, Startup Recovery, and System Image Recovery, and describes how to use restore points to roll back device configuration.

Lessons

−   Managing Devices and Drivers

−   Recovering Files

−   Recovering Devices

Lab : Troubleshooting and Recovery

−   Managing Device Drivers

−   Using File History to Recover Files

−   Using Previous Versions to Recover Files

−   Recovering a Device with a Restore Point

−   Using the Advanced Start-up Options to Recover a Device

After completing this module, students will be able to:

             −   Describe and manage device drivers.

             −   Configure file recovery and revert to previous versions of files.

             −   Describe and use device recovery features in Windows 10

Module 12: Maintaining Windows 10. This module describes Windows Update, and Windows Update for Business, and how to configure settings for updates. It describes how to use Windows Server Update Services (WSUS), Configuration Manager, or Intune to distribute updates within organizations. This module also explains how to use the Action Center, Event Viewer, and Performance Monitor in Windows 10.

Lessons

−   Updating Windows

−   Monitoring Windows 10

−   Optimizing Performance

−   Configuring Updates for a Single Device

−   Configuring Updates with GPOs

−   Monitoring Events

−   Monitoring Reliability and Performance

After completing this module, students will be able to:

             −   Explain how to keep Windows 10 up to date.

             −   Monitor Windows 10.

             −   Optimize performance of Windows 10.

Prerequisites

Before attending this course, students must have:

−   Knowledge of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and DNS.

−   Knowledge of Active Directory Domain Services (AD DS) principles, and fundamentals of AD DS management.

−   Understanding of certificate-based security.

−   Understanding of Windows Server 2008 or Windows Server 2012 fundamentals.

−   Understanding of Windows client operating system essentials, such as a working knowledge of Windows Vista, Windows 7, or Windows 8.

Community

Looking for training resources, events and advice from peers? Join the Microsoft Training and Certification Community.

Preparing for an exam now? Find your Microsoft Certification Study Group.

Course name:

   Course 20697-2B - Deploying and Managing Windows 10 Using  

   Enterprise   Services

Type:

   Course

Delivery method:

   Instructor-led (classroom)

Length:

   5 days

Overview

About this course

This course provides administrators with the knowledge and skills necessary to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment.

Students learn how to plan and implement Windows 10 deployments in large organizations. Students also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access using technologies related to Group Policy, Remote Access, and Workplace Join.

To support a variety of device and data management solutions, Microsoft Azure Active Directory, Microsoft Intune, and Microsoft Azure Rights Management are introduced. These services are part of the Enterprise Mobility Suite, which provides identity and access management, and cloud-based device, application, and update management. In addition, Enterprise Mobility Suite offers more secure data access to information stored both in the cloud and on location within corporate networks.

Audience profile

This course is intended for IT professionals who are interested in specializing in Windows 10 desktop and application deployments, and in managing cloud-based application and data service environments for medium-to-large enterprise organizations. These professionals typically work with networks that are configured as Windows Server domain-based environments with managed access to the Internet and cloud services. This course also is intended to provide skills for individuals who seek to pass the 70-697 Configuring Windows Devices exam.

After completing this course, students will be able to:

−   Describe the challenges and solutions for desktop and device management in an enterprise environment.

−   Deploy Windows 10 Enterprise desktops.

−   Manage user profiles and user state virtualization.

−   Manage desktop and application settings by using Group Policy.

−   Manage Windows 10 sign-in and identity.

−   Manage data access for Windows-based devices.

−   Manage remote access solutions.

−   Manage Windows 10 devices by using enterprise mobility solutions.

−   Manage desktop and mobile clients by using Intune.

−   Manage updates and Endpoint Protection by using Intune.

−   Manage application and resource access by using Intune.

−   Configure and manage client Hyper-V.

Course details

Module 1: Managing Desktops and Devices in an Enterprise Environment. This module explains the most current trends and information related to desktop and device management in the enterprise. It also provides an overview of on-premises management compared to cloud-based IT management and services.

Lessons

−   Managing Windows 10 in the Enterprise

−   Managing a Mobile Workforce

−   Supporting Devices in the Enterprise

−   Extending IT Management and Services to the Cloud

Lab : Planning for Windows 10 and Device Management in the Enterprise

−   Reading the scenario

After completing this module, students will be able to:

             −   Discuss managing Windows 10 in an enterprise environment.

             −   Explain the complexities of managing a mobile workforce.

             −   List the challenges of supporting devices in the enterprise.

             −   Explain how to extend IT Management and services to the cloud.

Module 2: Deploying Windows 10 Enterprise Desktops. This module explains the various deployment scenarios for Windows 10 and the considerations to keep in mind while performing these deployments. This module also explains how to deploy Windows 10 by using the Windows Assessment and Deployment Kit (WADK) and the Microsoft Deployment Toolkit (MDT). This module also explains how to maintain Windows 10 by using DISM and Windows Imaging and Configuration Designer (ICD). Additionally, it explains the different types of volume activation technologies and tools to manage activation.

Lessons

−   Overview of Windows 10 Enterprise Deployment

−   Customizing Enterprise Desktop Deployments

−   Deploying Windows 10 by Using MDT

−   Maintaining a Windows 10 Installation

−   Volume License Activation for Windows 10

Lab : Building a Reference Image by Using Windows Assessment and Deployment Kit (ADK) Tools

−   Configuring Custom Windows PE Boot Media

−   Creating a Custom Answer File by Using Windows SIM

−   Installing a Reference Computer by Using an Answer File

−   Preparing a Reference Computer by Using Sysprep

−   Capturing a Reference Computer

Lab : Using MDT to Deploy Windows 10 Desktops

−   Creating and Configuring an MDT Deployment Share

−   Creating a Task Sequence

−   Deploying a Windows 10 Image by Using MDT

Lab : Maintaining a Windows 10 Installation by Using Windows ICD

−   Creating and Configuring a Windows ICD Provisioning Package

After completing this module, students will be able to:

             −   Describe the Windows 10 enterprise deployment process.

             −   Customize enterprise desktop deployments.

             −   Deploy Windows 10 by using MDT.

             −   Maintain a Windows 10 installation.

             −   Manage volume license activation for Windows 10.

Module 3: Managing User Profiles and User State Virtualization. This module explains how to manage user profiles and user state using tools such as the User State Migration Tool (USMT) and User Experience Virtualization (UE-V).

Lessons

−   Managing User Profiles and User State

−   Implementing User State Virtualization by Using Group Policy

−   Configuring UE-V

−   Managing User State Migration

Lab : Configuring User Profiles and User State Virtualization

−   Configuring Roaming User Profiles and Folder Redirection

−   Implementing and Configuring UE-V

Lab : Migrating User State by Using USMT

−   Creating and Customizing USMT XML Files

−   Capturing and Restoring User State on a Target Computer

After completing this module, students will be able to:

             −   Manage user profiles and user state.

             −   Implement user state virtualization by using Group Policy.

             −   Configure UE-V.

             −   Manage user state migration.

Module 4: Managing Desktop and Application Settings by Using Group Policy. This module explains how to manage Group Policy inheritance, administrative templates, and common enterprise desktop settings. This module also explains how to apply Group Policy Preferences using targeting and filtering.

Lessons

−   Managing Group Policy Objects

−   Configuring Enterprise Desktops by Using Group Policy

−   Overview of Group Policy Preferences

Lab : Configuring Group Policy Objects and Settings

−   Managing Windows 10 by Using Group Policy

Lab : Using Group Policy Preferences to Manage Desktop Settings

−   Configuring Group Policy Preferences to Apply Drive and Printer Mapping

After completing this module, students will be able to:

             −   Describe Group Policy processing and management.

             −   Configure common settings to users and desktops by using Group Policy.

             −   Manage settings using Group Policy preferences.

Module 5: Managing Windows 10 Sign-In and Identity. This module explains the concept of identity and explains the methods to enhance identity security. This module also explains cloud identities and the use of Azure Active Directory in enterprise organizations.

Lessons

−   Overview of Enterprise Identity

−   Planning for Cloud Identity Integration

Lab : Integrating a Microsoft Account with a Domain Account

−   Signing up for a Microsoft Account

−   Connecting a Microsoft Account to a Domain Account

Lab : Joining Windows 10 to Azure Active Directory

−   Signing up for Office 365 and Azure Trial Subscriptions

−   Joining Windows 10 to Azure Active Directory

After completing this module, students will be able to:

             −   Describe the concept of enterprise identity.

             −   Plan for cloud identity integration.

Module 6: Managing Data Access for Windows-based Devices. This module explains how to provide secure access to company data. Solutions discussed include Device Registration (previous known as Workplace Join) and Work Folders. This module also explains how to configure and share data stored in Microsoft OneDrive.

Lessons

−   Overview of Data Access Solutions

−   Implementing Device Registration

−   Implementing Work Folders

−   Managing Online Data Using Cloud-Based Storage Solutions

Lab : Configuring Data Access for Non-Domain Joined Devices

−   Configuring Work Folders

Lab : Managing Data Access by Using OneDrive

−   Configuring OneDrive

After completing this module, students will be able to:

             −   Describe the data access solutions.

             −   Implement Device Registration.

             −   Implement Work Folders.

             −   Manage online data by using cloud-based storage solutions.

Module 7: Managing Remote Access Solutions. This module explains how to configure a virtual private network (VPN) and DirectAccess in Windows 10. This module also explains how to configure RemoteApp.

Lessons

−   Overview of Remote Access Solutions

−   Supporting DirectAccess with Windows 10

−   Configuring VPN Access to Remote Networks

−   Supporting RemoteApp

Lab : Implementing DirectAccess

−   Configuring the DirectAccess Server

−   Configuring DirectAccess Clients

−   Validating Remote Connectivity

Lab : Configuring RemoteApp

−   Creating an RD Sessiion Host Deployment

−   Installing and Publishing a Remote Application

−   Validating RemoteApp Functionality

After completing this module, students will be able to:

             −   Describe remote access solutions.

             −   Implement DirectAccess with Windows 10.

             −   Configure access to remote networks.

             −   Support RemoteApp for Windows 10.

Module 8: Managing Windows 10 Devices by Using Enterprise Mobility Solutions. This module provides an overview of the Enterprise Mobility + Security, Microsoft Azure Active Directory-Premium (Azure AD Premium), Azure Rights Management (Azure RMS), and Microsoft Intune.

Lessons

−   Overview of the EMS

−   Overview of Azure Active Directory Premium

−   Overview of Azure RMS

−   Overview of Intune

Lab : Implementing an Intune Subscription

−   Signing Up for an Intune Trial Subscription

−   Adding Intune Users

After completing this module, students will be able to:

             −   Describe EMS.

             −   Manage directory services by using Azure AD Premium.

             −   Protect devices by using Azure RMS.

             −   Explore the options in Intune.

Module 9: Managing Desktop and Mobile Clients by Using Microsoft Intune. This module explains how to install the Microsoft Intune client software and configure and assign Intune policies. It also explains how to create Mobile Device Management (MDM) policies and enroll mobile devices to Intune. Additionally, this module explains how to use Intune to create and manage Windows Information Protection (WIP) policies.

Lessons

−   Deploying the Intune Client Software

−   Overview of Intune Policies

−   MDM by Using Intune

−   Overview of WIP

Lab : Installing the Intune Client Software and Configuring a Policy

−   Installing the Intune Client Software

−   Configuring Intune Policy Settings

Lab : Managing Mobile Devices Using Intune

−   Configuring and Enrolling Mobile Devices into Intune

−   Configuring a WIP Policy in Intune

After completing this module, students will be able to:

             −   Deploy the Intune client software.

             −   Describe Intune policies.

             −   Manage mobile devices by using Intune.

             −   Create and manage WIP policies.

Module 10: Managing Updates and Endpoint Protection by Using Microsoft Intune. This module explains how to configure updates and Endpoint Protection settings and reports using Microsoft Intune.

Lessons

−   Managing Updates by Using Intune

−   Managing Endpoint Protection

Lab : Managing Updates and Endpoint Protection by Using Microsoft Intune

−   Configuring Updates in Intune

−   Configuring Endpoint Protection in Intune

After completing this module, students will be able to:

             −   Manage updates by using Intune.

             −   Manage Endpoint Protection.

Module 11: Application and Resource Access by Using Microsoft Intune. This module explains how to use the Microsoft Intune Software Publisher to deploy applications to managed clients. This module also explains the use of certificate profiles, Wi-Fi profiles, and VPN profiles to control access to company resources.

Lessons

−   Application Management by Using Intune

−   The Application Deployment Process

−   Managing Access to Organizational Resources

Lab : Deploying Applications by Using Microsoft Intune

−   Publishing Applications for Deployment in Intune

−   Deploying and Monitoring Application Deployment

Lab : Managing Resource Access by Using Intune

−   Configuring Certificate Deployment in Intune

−   Configuring Conditional Access Policies

After completing this module, students will be able to:

             −   Describe the requirements for application management by using Intune.

             −   Describe the application deployment process by using Intune.

             −   Describe how to manage access to organizational resources by using Intune.

Module 12: Configuring and Managing Client Hyper-V. This module explains how to create virtual switches, virtual hard disks, and virtual machines by using Client Hyper-V.

Lessons

−   Installing and Configuring Client Hyper-V

−   Configuring Virtual Switches

−   Creating and Managing Virtual Hard Disks

−   Creating and Managing Virtual Machines

Lab : Installing Client Hyper-V

−   Creating a Virtual Switch, a Virtual Hard Disk, and a Virtual Machine

After completing this module, students will be able to:

             −   Install and configure Client Hyper-V.

             −   Configure virtual switches.

             −   Create and manage virtual hard disks.

             −   Create and manage virtual machines.

Prerequisites

Students should have at least two years of experience in the IT field and should already have the following technical knowledge:

−   Networking fundamentals, including Transmission Control Protocol /Internet Protocol (TCP/IP), User Datagram Protocol (UDP), and Domain Name System (DNS)

−   Microsoft Active Directory Domain Services (AD DS) principles

−   Windows Server 2012 R2 fundamentals

−   The Windows client operating system essentials; for example, working knowledge of Windows 8.1 and/or Windows 7

−   Microsoft Windows Client essentials; for example, working knowledge of Windows 7 and/or Windows 8.1

Community

Looking for training resources, events and advice from peers? Join the Microsoft Training and Certification Community.

Preparing for an exam now? Find your Microsoft Certification Study Group.

Course name:

   Course 20695C - Deploying Windows Desktops and Enterprise Applications

Type:

   Course

Delivery method:

   Instructor-led (classroom)

Length:

   5 days

Overview

About this course

This five-day course describes how to assess operating system and application deployment options, determine the most appropriate deployment strategy, and then implement a deployment solution for Windows devices and apps that meets your environment’s needs. Solutions that this course details include operating system deployment scenarios ranging from high-touch solutions to zero-touch solutions. It also discusses the technologies that you use to implement these solutions, including the MDT and Configuration Manager.

Audience profile

This five-day course is for IT professionals who deploy, manage, and maintain PCs, devices, and apps across medium, large, and enterprise organizations. Typically, this course’s audience has a desktop-support background, and have worked as Enterprise Desktop Administrators. A significant portion of this audience uses or intends to use Configuration Manager to manage and deploy PCs, devices, and enterprise applications. The Enterprise Desktop Administrator also might use several tools, including the Windows ADK and the MDT to support assessment, operating system, and application deployment tasks. Additionally, this course is for individuals who are interested in taking the MCSE exam 70-695: Deploying Windows Desktops and Enterprise Applications.

After completing this course, students will be able to:

−   Assess the network environment to support operating system and application deployment tasks.

−   Identify the most appropriate operating system deployment strategy based upon organizational requirements.

−   Assess application compatibility issues and identify mitigation solutions to ensure that applications function successfully after an operating system deployment.

−   Describe and configure strategies to migrate user state during operating system deployments.

−   Determine the most appropriate image management strategy to support operating system and application deployments.

−   Describe and use the tools provided in the Windows ADK to prepare for and support automated deployment strategies.

−   Identify solutions to support PXE-initiated and multicast solutions when performing operating system deployment tasks.

−   Configure an operating system deployment strategy by using the MDT.

−   Configure an operating system deployment strategy using Configuration Manager.

−   Integrate the MDT with Configuration Manager to support operating system deployment procedures.

−   Implement volume license activation and configuration settings for client computers.

−   Customize and deploy Microsoft Office 2016 to an enterprise network environment, and describe how to use the Windows ICD.

Course details

Module 1: Assessing the network environment for supporting operating system and application deployment. This module examines how you can create a deployment strategy by using life-cycle information, deployment tools and technologies, and licensing and activation information. It also explains how to plan and effectively perform preparation tasks for deploying Windows 10 client operating systems.

Lessons

−   Overview of the enterprise desktop life cycle

−   Assessing readiness for a desktop deployment by using Configuration Manager

−   Assessing deployment readiness by using MAP

Lab : Assessing the network environment for supporting operating system and application deployment

−   Collecting hardware and application inventory by using Configuration Manager

−   Using MAP to determine infrastructure readiness

After completing this module, students will be able to:

−   Describe the enterprise desktop life cycle.

−   Assess an environment’s readiness for a desktop deployment by using Configuration Manager.

−   Assess an environment’s deployment readiness by using MAP.

Module 2: Determining operating system deployment strategies. This module describes the tools and strategies that are available to help you perform a successful operating system deployment. It also explains how to identify the most appropriate operating system deployment strategy for your environment, based upon organizational requirements.

Lessons

−   Understanding tools and strategies you can use for operating system deployment

−   Using the High Touch with Retail Media deployment strategy

−   Using the High Touch with a Standard Image deployment strategy

−   Using a lite touch deployment strategy

−   Using a zero touch deployment strategy

−   Alternative deployment strategies for Windows desktops

Lab : Determining operating system deployment strategies

−   Identifying operating system deployment strategies for a small network

−   Identifying operating system deployment strategies for a medium-sized network

−   Identifying operating system deployment strategies for an enterprise network

−   Installing the Windows ADK

After completing this module, students will be able to:

−   Describe the tools and strategies that are available for an effective operating system deployment

−   Deploy operating systems by using the High Touch with Retail Media strategy.

−   Deploy operating systems by using the High Touch with a Standard Image strategy.

−   Deploy operating systems by using the lite touch strategy.

−   Deploy operating systems by using the zero touch strategy.

−   Describe alternative deployment strategies for Windows desktops.

Module 3: Assessing application compatibility. This module describes the process for addressing common application compatibility issues that you might experience during a new operating system deployment. The module also explains how to use the ACT to help inventory, analyze, and mitigate application compatibility issues.

Lessons

−   Diagnosing application compatibility issues

−   Mitigating application compatibility issues

−   Using ACT to address application compatibility issues

Lab : Assessing application compatibility

−   Analyzing applications for potential compatibility issues

−   Mitigating application compatibility issues

After completing this module, students will be able to:

−   Describe how to diagnose application compatibility issues.

−   Explain the solutions available for mitigating application compatibility issues.

−   Resolve application compatibility issues with the ACT.

Module 4: Planning and implementing user state migration. This module introduces user state migration, and the tools and methods that are useful in the planning and implementation of a user state migration in the Windows software environment.

Lessons

−   Overview of user state migration

−   Overview of USMT 10.0

−   Planning user state migration

−   Migrating user state by using USMT

Lab : Planning and implementing user state migration

−   Planning for user state migration

−   Creating and customizing USMT XML files

−   Capturing and restoring a user state by using the USMT

After completing this module, students will be able to:

−   Describe user state migration.

−   Identify the features of USMT 5.0.

−   Plan user state migration.

−   Migrate user state by using the USMT.

Module 5: Determining an image management strategy. This module provides the information that you need to manage images to support operating system and application deployments. Specifically, the module describes the image formats and strategies for managing images.

Lessons

−   Overview of the Windows image file format

−   Overview of image management

Lab : Determining an image management strategy

−   Assessing business requirements to support an image management strategy

After completing this module, students will be able to:

−   Describe the purpose and benefits of the Windows image file format.

−   Determine image management.

Module 6: Preparing for deployments by using the Windows ADK.  This module describes how Windows Setup installs the Windows operating system. It explains how to use the tools in the Windows ADK to prepare for and support automated deployment strategies. It also explains how to use the Windows Preinstallation Environment (Windows PE) to prepare boot images.

Lessons

−   Overview of the Windows setup and installation process

−   Preparing boot images by using Windows PE

−   Using Windows SIM and Sysprep to automate and prepare an image installation

−   Capturing and servicing a reference image using DISM

−   Using the Windows ICD

Lab : Preparing the imaging and Windows PE environment

−   Configuring a custom Windows PE environment

Lab : Building a reference image by using Windows SIM and Sysprep

−   Building custom answer files by using Windows SIM

−   Installing a reference computer by using a custom answer file

−   Customizing your image in audit mode, and preserving the profile changes by using Sysprep

Lab : Capturing and servicing a reference image

−   Capturing a reference system image

Lab : Using the Windows ICD

−   Create a provisioning package

−   Create a Windows 10 deployment package

After completing this module, students will be able to:

−   Describe the Windows installation process.

−   Describe how to use and customize Windows PE.

−   Use Windows System Image Manager (SIM) and Sysprep to automate and prepare images.

−   Capture and service a reference image.

Module 7: Supporting PXE-initiated and multicast operating system deployments. This module introduces the architecture of network boot, Pre-Boot EXecution Environment (PXE)-initiated operating system deployments, multicasting operating system delivery, and the Windows Deployment Services (Windows DS) functionality in Windows Server 2012 R2.

Lessons

−   Overview of PXE-initiated and multicast operating system deployments

−   Installing and configuring the Windows DS environment

Lab : Configuring Windows DS to support PXE and multicast operating system deployments

−   Planning the Windows DS environment

−   Installing and configuring the Windows DS server role

After completing this module, students will be able to:

−   Identify solutions to support PXE-initiated and multicast solutions when performing operating system deployment tasks.

−   Install and configure the Windows DS environment.

Module 8: Implementing operating system deployment by using the MDT. This module describes the components of the MDT, and how you can configure an operating system deployment strategy by using the MDT.

Lessons

−   Planning for the MDT environment

−   Implementing MDT 2013 Update 2

−   Integrating Windows DS with MDT

Lab : Operating system deployment using the MDT

−   Planning for the MDT environment

−   Installing MDT 2013 Update 2, and addressing MDT prerequisites

−   Creating and configuring the deployment share

−   Deploying and capturing a reference operating system image

After completing this module, students will be able to:

−   Describe the MDT components and process for a lite-touch deployment strategy.

−   Install and configure the MDT environment.

−   Describe how you configure Windows DS to integrate with MDT 2013 Update 2.

Module 9: Managing operating system deployment. This module provides an overview of operating system deployments, and explains how to use Configuration Manager to configure an operating system deployment strategy.

Lessons

−   Overview of operating system deployment

−   Preparing a site for operating system deployment

−   Deploying an operating system

Lab : Preparing the site for operating system deployment

−   Managing the site system roles used to support operating system deployment

−   Managing packages to support operating system deployment

Lab : Deploying operating system images for bare-metal installations

−   Preparing the operating system image

−   Creating a task sequence to deploy an image

−   Deploying an image

After completing this module, students will be able to:

−   Describe the terminology, components, and scenarios used to deploy operating systems by using Configuration Manager.

−   Describe how to prepare a site for operating system deployment.

−   Describe the process used to deploy an operating system image.

Module 10: Integrating MDT and Configuration Manager for operating system deployment. This module explains how to integrate the MDT with Configuration Manager to support operating system deployment procedures. It also describes the benefits of integrating the MDT with Configuration Manager.

Lessons

−   Integrating deployment tools with Configuration Manager

−   Integrating MDT with Configuration Manager

Lab : Integrating MDT and Configuration Manager for operating system deployment

−   Integrating MDT and Configuration Manager

−   Creating an MDT boot image

−   Creating and deploying an MDT task sequence by using Configuration Manager

Lab : Configuring UDI

−   Creating a UDI task sequence

−   Deploying Windows 10 by using a UDI task sequence

After completing this module, students will be able to:

−   Integrate deployment tools with Configuration Manager.

−   Integrate MDT with Configuration Manager.

Module 11: Activating clients and managing additional configuration settings. This module describes volume license activation solutions. It also explains how to implement volume license activation and configuration settings for client computers.

Lessons

−   Solutions for volume license activation

−   Determining additional client configuration settings

Lab : Configuring additional settings for computer clients

−   Planning for Windows 10 customization

−   Creating a common Windows Start menu and custom power plan

−   Creating a client preferences GPO

After completing this module, students will be able to:

−   Explain the solutions for volume license activation.

−   Configure additional settings for client computers.

Module 12: Deploying Office 2016. This module explains how to customize and deploy Microsoft Office 2016 to deploy Office 2016 by using Office 365, and manage Office 2016 settings.

Lessons

−   Methods for deploying Microsoft Office 2016 editions

−   Customizing Office deployments

−   Deploy Office 2016 by using Office 365

−   Managing Office settings

−   Introducing Windows Store for Business

−   Distributing apps by using Windows Store for Business

Lab : Deploying Microsoft Office 2016 by using the Office Customization Tool

−   Using the Microsoft Office Customization Tool (OCT) to customize a Microsoft Office 2016 deploymen

−   Deploying a customized version of Office 2016

After completing this module, students will be able to:

−   Identify the editions of, and deployment methods for, Office 2016.

−   Customize an Office 2016 deployment.

−   Deploy Office 2016 by using Office 365.

−   Manage Office 2016 settings after deployment.

−   Provide an overview of the Windows Store for Business.

−   Describe the methods you can use to deploy apps by using the Windows Store for Business.

Prerequisites

Before attending this course, students must have:

System administrator–level working knowledge of:

−   Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.

−   Microsoft Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.

−   Installation, configuration, and troubleshooting for Windows-based personal computers. 

−   Basic concepts of Public Key Infrastructure (PKI) security.

−   Basic understanding of scripting and Windows PowerShell syntax.

−   Basic understanding of Windows Server roles and services.

Desired:

−   Basic understanding of the management tasks that you can perform by using Configuration Manager.

Community

Looking for training resources, events and advice from peers? Join the Microsoft Training and Certification Community.

Preparing for an exam now? Find your Microsoft Certification Study Group.

Course name:

   Course 10982B: Supporting and Troubleshooting Windows 10

Type:

   Course

Delivery method:

   Instructor-led (classroom)

Length:

   5 days

Overview

About this course

This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them.

 Audience profile

The primary audience for this course is the Enterprise Desktop Support Technician (EDST), who provides Tier 2 support to users running Windows 10 personal computers (PCs) and devices in medium to large enterprise organizations, within a Windows domain environment. EDSTs focus on a broad range of technical issues for Windows operating systems (OSs), devices, cloud services, applications, networking, and hardware support. In the overarching scenario, if an Enterprise offers the service, the EDST is asked to support it.

The key responsibilities include resolving technical issues pertaining to Windows 10 installation and migration, activation, performance, profiles, settings; and device synchronization. Some other key responsibilities include local and remote network access; access to applications, access to data and printers; authentication, Endpoint security and policy; OS and data recovery.

The secondary audience for this course are IT professionals who administer and support Windows 10 desktops, devices, users, and associated network and security resources. Students who seek certification in the 70-697, Windows 10 Configuring exam will also benefit from this course.

 

After completing this course, students will be able to:

−   Describe the processes involved in planning and using a troubleshooting methodology for Windows 10.

−   Troubleshoot startup issues and operating system services on a Windows 10 PC.

−   Resolve issues that pertain to hardware devices and device drivers.

−   Troubleshoot Windows 10 devices remotely.

−   Troubleshoot issues that pertain to network connectivity.

−   Troubleshoot client configuration failures and issues with application of Group Policy Objects.

−   Troubleshoot issues related to user settings.

−   Troubleshoot remote connectivity issues.

−   Resolve issues related to accessing resources from devices that are domain-joined.

−   Troubleshoot issues that pertain to application installation and operation.

−   Maintain a device running Windows 10. 

−   Recover a device running Windows 10

Course details

Module 1: Implementing a Troubleshooting Methodology. This module explains how to describe the processes involved in establishing and using a troubleshooting methodology. Module also covers various Windows 10 fundamentals, high level architecture and often used troubleshooting tools.

Lessons

−   Overview of Windows 10

−   Introduction to the EDST Job Role

−   Overview of the Troubleshooting Steps

−   Troubleshooting Tools

Lab : Implementing a Troubleshooting Methodology

−   Implementing a Troubleshooting Methodology

Lab : Using Troubleshooting Tools

−   Using Troubleshooting Tools

After completing this module, students will be able to:

−   Describe Windows 10.

−   Understand the EDST job role.

−   Describe troubleshooting steps.

−   Describe troubleshooting tools.

Module 2: Troubleshooting Startup Issues. This module describes how to identify and troubleshoot issues that affect the Windows 10 operating system’s ability to start, and how to identify problematic services that run on the operating system. It also describes how to use the Windows 10 advanced troubleshooting tools, collectively known as the Windows Recovery Environment (Windows RE).

Lessons

−   Overview of the Windows 10 Startup Recovery Environment

−   Troubleshooting Startup Settings

−   Troubleshooting Operating System Services Issues

−   Recovering BitLocker-Protected Drives

Lab : Troubleshooting Startup Issues

−   Resolving a Startup Issue (1)

−   Resolving a Startup Issue (2)

Lab : Recovering BitLocker-Encrypted Drives

−   Recovering a BitLocker-Encrypted Drive

−   Creating a New BitLocker Password

After completing this module, students will be able to:

−   Describe the Windows 10 startup architecture.

−   Optimize and troubleshoot startup settings.

−   Troubleshoot Windows 10 operating system services.

−   Recover drives encrypted with Windows BitLocker Drive Encryption.

Module 3: Troubleshooting Hardware and Device Drivers. This module explains how to support users that utilize a multitude of devices that run Windows 10. It will also describe how an operating system uses device drivers, and how you can troubleshoot hardware devices and device drivers. The module also covers how to monitor the reliability of a Windows 10 device and troubleshoot any issue that might occur.

Lessons

−   Troubleshooting Device Driver Failures

−   Overview of Hardware Troubleshooting

−   Troubleshooting Physical Failures

−   Monitoring Reliability

−   Configuring the Registry

Lab : Troubleshooting Device Driver Issues

−   Troubleshooting a Missing Device Driver

−   Resolving Hardware Problems

−   Resolving Device Driver Problem

−   Configuring Group Policy Settings to Control Device Installation

Lab : Troubleshooting Hardware Issues

−   Diagnosing Memory and Troubleshooting Failed Disk Redundancy

−   Accessing a Volume from a Failed Computer

After completing this module, students will be able to:

−   Troubleshoot hardware device drivers.

−   Describe the process of troubleshooting hardware.

−   Troubleshoot physical hardware failures.

−   Monitor the reliability of Windows 10 devices.

−   Configure the Windows 10 registry.

Module 4: Troubleshooting Remote Computers. This module explores three ways in which you can remotely connect to and manage remote computers: Remote Desktop, Windows Remote Assistance, and Windows PowerShell remoting.

Lessons

−   Using Remote Desktop

−   Using Remote Assistance

−   Remoting with Windows PowerShell

Lab : Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance

−   Using Remote Desktop

−   Using Remote Assistance

Lab : Troubleshooting Remote Computer by Using Windows PowerShell

−   Using Windows PowerShell Remoting

After completing this module, students will be able to:

−   Use Remote Desktop to manage remote computers.

−   Use Windows Remote Assistance to manage remote computers.

−   Use Windows PowerShell remoting to manage remote computers.

Module 5: Resolving Issues with Network Connectivity Issues. This module explains the tools that you can use to set up and troubleshoot both wired and wireless network connections more efficiently. This module also explains how to support your organization’s network infrastructure, and how to use these tools to configure and troubleshoot network connections.

Lessons

−   Determining Network Settings

−   Troubleshooting Network Connectivity

−   Troubleshooting Name Resolution

Lab : Resolving Network Connectivity Issues

−   Resolving a Network Problem (1)

−   Resolving a Network Problem (2)

−   Troubleshooting a Wireless Network

After completing this module, students will be able to:

−   Determine network settings in Windows 10.

−   Troubleshoot issues with network connectivity.

−   Troubleshoot issues with name resolution.

Module 6: Troubleshooting Group Policy. This module provides an overview of the Group Policy application and describes how to resolve issues in client configuration GPO application.

Lessons

−   Overview of Group Policy Application

−   Resolving Client-Configuration Failures and GPO Application Issues

Lab : Troubleshooting Issues with Group Policy Application

−   Resolving Group Policy Application (1)

−   Resolving Group Policy Application (2)

−   Resolving Group Policy Application (3)

Lab : Resolving Issues with Group Policy

−   Resolving Group Policy Application (1)

After completing this module, students will be able to:

−   Understand Group Policy application.

−   Troubleshoot Group Policy application.

−   Resolve client configuration failures and GPO application.

Module 7: Troubleshooting User Settings. In this module, you will examine issues that can occur when users sign in, and you will also learn about how to troubleshoot the application of user settings.

Lessons

−   Troubleshooting Sign In Issues

−   Troubleshooting the Application of User Settings

Lab : Troubleshooting Sign in Problems

−   Resolving Sign-In Issue 1

−   Resolving Sign-In Issue 2

Lab : Troubleshooting the Application of User Settings

−   Resolving Folder Redirection Issue

After completing this module, students will be able to:

−   Troubleshoot user sign-in issues.

−   Troubleshoot the correct application of user settings.

Module 8: Troubleshooting Remote Connectivity. This module explains these technologies, describes common problems with their implementation and usage, and provides several possible mitigations for those problems.

Lessons

−   Troubleshooting VPN Connectivity Issues

−   Troubleshooting DirectAccess

Lab : Troubleshooting VPN Connectivity

−   Troubleshoot VPN Connectivity Issue 1

−   Troubleshoot VPN Connectivity Issue 2

Lab : Configuring and Troubleshooting DirectAccess

−   Prepare the DirectAccess Implementation

−   Configuring and Verifying Client-Side Settings for DirectAccess

−   Troubleshooting DirectAccess

After completing this module, students will be able to:

−   Troubleshoot virtual private network (VPN) connectivity issues.

−   Configure and troubleshoot DirectAccess.  

Module 9: Troubleshooting Resource Access Within a Domain. This module explains how to resolve problems of resource access from computers that are domain members. It explains how to troubleshoot file permission issues, encrypting file system (EFS) and printer access issues.

Lessons

−   Troubleshooting File Permissions Issues

−   Recovering Files Encrypted by EFS

−   Troubleshooting Printer Access Issues

Lab : Troubleshooting File Access Issues

−   Resolving a File Access Issue (1)

−   Resolving a File Access Issue (2)

−   Resolving a File-Access Issue (3)

Lab : Troubleshooting Access to Encrypted Files

−   Encrypting and Recovering Access to Encrypted Files

Lab : Troubleshooting Printer Issues

−   Resolving a Printer Access Issue (1)

−   Resolving a Printer Access Issue (2)

After completing this module, students will be able to:

−   Troubleshoot issues with file permissions.

−   Troubleshoot issues with file access.

−   Recover files encrypted by Encrypting File System (EFS).

−   Troubleshoot access to encrypted files.

−   Troubleshoot issues with accessing printers.

Module 10: Troubleshooting Resource Access for Clients That Are Not Domain Members. This module explains how to enable students to resolve problems of resource access from computers that are not domain-joined.

Lessons

−   Configuring and Troubleshooting Device Registration

−   Configuring and Troubleshooting Work Folders

−   Configuring and Troubleshooting OneDrive Access

Lab : Troubleshooting Resource Access for Clients That Are Not Domain Members

−   Troubleshooting Device Registration

−   Troubleshooting Work Folders 1

−   Troubleshooting Work Folders 2

−   Troubleshooting OneDrive for Business

After completing this module, students will be able to:

−   Configure the Device Registration feature.

−   Configure and troubleshoot the Work Folders feature.

−   Configure and troubleshoot access to Microsoft OneDrive.

Module 11: Troubleshooting Applications. This module examines the issues, including application compatibility issues that affect a user’s ability to install and run these two types of applications. This module also covers how users can resolve web browser related issues, specifically issues associated with both Internet Explorer and Microsoft Edge.

Lessons

−   Troubleshooting Desktop App Installation Issues

−   Troubleshooting Desktop Apps

−   Managing Windows Store Apps

−   Troubleshooting Access to Company Web Applications

Lab : Troubleshooting Desktop Apps

−   Troubleshooting AppLocker Policy Application

−   Troubleshooting Application Compatibility Issues

Lab : Troubleshooting Access to Company Web Applications

−   Troubleshooting Internet Explorer Issues

−   Troubleshooting Microsoft Edge Issues

After completing this module, students will be able to:

−   Troubleshoot desktop app installation issues.

−   Troubleshoot desktop apps.

−   Manage Universal Windows apps.

−   Troubleshoot web browsers.

Module 12: Maintaining Windows 10. This module discusses how to provide for the ongoing maintenance of Windows 10 operating systems.

Lessons

−   Managing and Troubleshooting Windows Activation

−   Monitoring and Troubleshooting Computer Performance

−   Applying Applications and Windows Updates

Lab : Monitoring and Troubleshooting Performance

−   Resolve a Performance-Related Issue

−   Resolve a CPU-Related Performance Issue

−   Resolve a Disk-Related Performance Issue

After completing this module, students will be able to:

−   Manage and troubleshoot volume activation in Windows operating systems.

−   Monitor and troubleshoot Windows 10 performance.

−   Update applications and Windows 10.

Module 13: Recovering Data and Operating System. This module explains how to use file recovery and troubleshoot deleted files. It also covers how to recover a Windows 10 computer.

Lessons

−   File Recovery in Windows 10

−   Recovering an Operating System

Lab : Recovering Data

−   Resolving Issues with Previous Versions

Lab : Provisioning Computer to Comply with Company Standards

−   Provision Computer to Comply with Company Standards

After completing this module, students will be able to:

−   Recover files in Windows 10 by configuring and using file-recovery features.

−   Recover a computer that is running Windows 10.

Additional Reading

To help you prepare for this class, review the following resource:

−   Microsoft Windows SDK.

Prerequisites

Before attending this course, students must have:

−   Networking fundamentals, including Transmission Control Protocol /Internet Protocol (TCP/IP), User Datagram Protocol (UDP), and Domain Name System (DNS).

−   Microsoft Active Directory Domain Services (AD DS) principles.

−   Understanding of the Public Key Infrastructure (PKI) components.

−   Windows Server 2012 R2 fundamentals.

−   Microsoft Windows Client essentials; for example, experience with Windows 10 or knowledge from the courses 20697-1 and 20697-2.

Community

Looking for training resources, events and advice from peers? Join the Microsoft Training and Certification Community.

Preparing for an exam now? Find your Microsoft Certification Study Group.