106.02 Presentation File
Download
Report
Transcript 106.02 Presentation File
Outline the installation and configuration process,
including updates.
Objective 106.02 Course Weight 8%
© ExplorNet’s Centers for Quality Teaching and Learning
1
Installation Preparation
Before installing an operating system (OS) the BIOS
or UEFI of the target computer must be setup.
For small numbers of machines, booting to a flash
drive or optical drive is usually done.
For large numbers of machines, the systems are
usually set to boot to the network card for a network
installation.
© ExplorNet’s Centers for Quality Teaching and Learning
2
Installation Preparation
© ExplorNet’s Centers for Quality Teaching and Learning
3
Installation Types
High Touch Installation (HTI)
Lite Touch Installation (LTI)
Zero Touch Installation (ZTI)
© ExplorNet’s Centers for Quality Teaching and Learning
4
High Touch Installation (HTI)
Includes retail media or standard image (ISO file).
Must manually configure each installation.
ImageX, Rufus, UUI, and YUMI can be used to create
bootable media.
ImageX is a command-line tool that enables original
equipment manufacturers (OEMs) and corporations
to capture, to modify, and to apply file-based disk
images for rapid deployment.
© ExplorNet’s Centers for Quality Teaching and Learning
5
Making the Install Easier
The Windows Automated Installation Toolkit (AIK) is
a collection of tools and documentation designed to
help IT Professionals deploy Windows.
The Windows AIK is ideal for highly customized
environments.
© ExplorNet’s Centers for Quality Teaching and Learning
6
Lite Touch Installation (LTI)
Requires some human intervention in the early
phase but automated after a specific point.
Works well for 150+ deployment.
Tools needed:
Windows AIK
Windows Deployment Services
Microsoft Development Toolkit
© ExplorNet’s Centers for Quality Teaching and Learning
7
Zero Touch Installation (ZTI)
Fully automated “touchless” method of installing
Windows.
Uses System Center Configuration Manager 2012 to
discover servers, desktops, tablets, and mobile
devices connected to a network through Active
Directory and installs client software on each node.
Geared for 500+ computers.
© ExplorNet’s Centers for Quality Teaching and Learning
8
Product Keys
During installation Microsoft requests that you
validate your OS with a product key.
Product keys are unique, alphanumeric codes.
This digital key ensures you have a legal installation
of the software.
© ExplorNet’s Centers for Quality Teaching and Learning
9
Product Keys
Windows product keys are checked by Microsoft for
legitimacy and to determine if it is already being
used on a different computer.
It is usually located:
On the installation disc holder inside the
Windows package.
On a sticker on the back or bottom of your
computer if the operating system came preinstalled on the computer.
© ExplorNet’s Centers for Quality Teaching and Learning
10
Activating Windows 7
Activation is the process of verifying that your copy
of Windows is genuine and that it is not in use on
other computers.
Registration is different from activation. You must
activate an installation of Windows 7 but registration
is optional. During registration, you give your contact
information to Microsoft to sign up for technical
support and other benefits.
© ExplorNet’s Centers for Quality Teaching and Learning
11
Using Control Panel
The Control Panel is a utility that allows you to:
Configure operating system features
Set up hardware
Install and uninstall software
Create and modify users
Perform system maintenance
All of these things must be done once the OS is
installed.
© ExplorNet’s Centers for Quality Teaching and Learning
12
Using Control Panel
Most operating system features will be configured
properly by default.
Hardware often requires a number of driver
installations that should be checked in device
manager.
Useful software will need to be installed:
Antivirus
Web browser
PDF readers, etc.
© ExplorNet’s Centers for Quality Teaching and Learning
13
Using Control Panel
A user account will be created during the installation,
however, you may wish to add and modify users.
Most system maintenance is auto configured (disk
defragmenter) but other components (back up) must
be manually configured.
© ExplorNet’s Centers for Quality Teaching and Learning
14
Desktop Settings
The Windows desktop is a flexible, configurable part
of the Windows environment.
Taskbar – bottom is default but can be moved to
either side or the top.
Notification area- customizable.
Pin shortcuts to the task bar.
Jump List – menu above the icon that contains a list
of recently used files.
© ExplorNet’s Centers for Quality Teaching and Learning
15
Display Settings
Settings to configure:
Primary display (if your computer is connected to
two or more monitors)
Display content in a landscape or portrait
orientation
Resolution
Color depth
Font size
© ExplorNet’s Centers for Quality Teaching and Learning
16
Updating the System
Once your OS is installed it is important to keep it upto-date.
Keeping an OS updated allows it to maintain proper
security.
Microsoft provides regularly scheduled updates for
this purpose using the Windows Update Feature.
© ExplorNet’s Centers for Quality Teaching and Learning
17
Updating the System
© ExplorNet’s Centers for Quality Teaching and Learning
18
Updating the System
Microsoft releases critical updates on the second
Tuesday of the month. This is called “Patch Tuesday”.
Updates can occur more often if a serious
vulnerability occurs.
© ExplorNet’s Centers for Quality Teaching and Learning
19
Types of Windows Updates
Important Updates – security and critical updates,
hotfixes, service packs, and reliability improvements.
Recommended Updates – new or improved features
to keep things running smoothly.
Optional Updates – optional device drivers or new or
trial software.
© ExplorNet’s Centers for Quality Teaching and Learning
20
Windows Updates Notes
Hotfixes are software solutions to bugs in the
software.
Service Packs are large collections of updates that
help the user simplify the update process.
Many updates such as critical updates like the ones
above require a restart of the OS.
© ExplorNet’s Centers for Quality Teaching and Learning
21
Action Center
Action Center – provides a single interface in which
you can view the status of security and maintenance
features and it alerts you to problems you need to
correct and usually provides a way to fix it.
In essence, Windows will tell the user when it needs
updates to other software as well.
© ExplorNet’s Centers for Quality Teaching and Learning
22
Action Center
Tracks seven security features:
1. Network firewall - This feature monitors your
computer’s firewall which should be turned on if no
other firewalls are present.
2. Windows Update - This feature indicates whether
Windows Update is enabled.
3. Virus protection - Most virus protection software
can be monitored with this feature. If no software is
present or if it’s out of date, you’ll be notified here.
© ExplorNet’s Centers for Quality Teaching and Learning
23
Action Center
4. Spyware Protection – Action Center monitors
Windows Defender and other third-party
antispyware solutions.
5. Internet Security Settings – Checks on Internet
Explorer 9’s security settings.
6. User Account Control – Checks to see if User
Account Control (UAC) is enabled and you can click
the Change Settings link to configure it.
© ExplorNet’s Centers for Quality Teaching and Learning
24
Action Center
7. Network Access Protection (NAP):
Applies mainly to enterprise environments.
The network can detect whether the computer
meets baseline security standards for the
organization.
If not, the computer is not allowed access to the
full network.
To gain access it must be updated or
reconfigured.
© ExplorNet’s Centers for Quality Teaching and Learning
25
Action Center
© ExplorNet’s Centers for Quality Teaching and Learning
26
Microsoft Security Essentials
Microsoft Security Essentials (MSE) is a program that
helps protect your computer from viruses and other
malware.
The program is updated regularly by the Microsoft
Update service to ensure the signatures, the antimalware engine, and the application itself are kept
up to date.
MSE is replaced by Defender in Windows 8 and
newer.
© ExplorNet’s Centers for Quality Teaching and Learning
27
Microsoft Security Essentials
© ExplorNet’s Centers for Quality Teaching and Learning
28
Windows Defender
Defender is a free antispyware program provided by
Microsoft.
Spyware is a type of program that installs on your
computer without your permission, monitors your
computing activities, and reports the activity back to
the spyware writer or a third party.
Defender is only an anti-spyware program in
Windows 7.
In Windows 8 and beyond is a full-featured antimalware program.
© ExplorNet’s Centers for Quality Teaching and Learning
29
Windows Defender
© ExplorNet’s Centers for Quality Teaching and Learning
30
Malicious Software Removal Tool
Comes as a Windows Update.
Scans your computer for dangerous malware and
attempts to remove it immediately.
Can download the Malicious Software Removal Tool
from the Microsoft Safety & Security Center or the
Microsoft Download Center.
© ExplorNet’s Centers for Quality Teaching and Learning
31
System Center Endpoint Protection
A combination of antivirus, anti-malware, and
management software for desktops, laptops, and
other client endpoints in a business environment.
If you have more than 10 client computers to protect
in your organization, Microsoft recommends that
you use System Center Endpoint Protection rather
than Microsoft Security Essentials or Defender.
© ExplorNet’s Centers for Quality Teaching and Learning
32
System Center Endpoint Protection
© ExplorNet’s Centers for Quality Teaching and Learning
33