106.02 Presentation File

Download Report

Transcript 106.02 Presentation File

Outline the installation and configuration process,
including updates.
Objective 106.02 Course Weight 8%
© ExplorNet’s Centers for Quality Teaching and Learning
1
Installation Preparation
Before installing an operating system (OS) the BIOS
or UEFI of the target computer must be setup.
For small numbers of machines, booting to a flash
drive or optical drive is usually done.
For large numbers of machines, the systems are
usually set to boot to the network card for a network
installation.
© ExplorNet’s Centers for Quality Teaching and Learning
2
Installation Preparation
© ExplorNet’s Centers for Quality Teaching and Learning
3
Installation Types
High Touch Installation (HTI)
Lite Touch Installation (LTI)
Zero Touch Installation (ZTI)
© ExplorNet’s Centers for Quality Teaching and Learning
4
High Touch Installation (HTI)
Includes retail media or standard image (ISO file).
Must manually configure each installation.
ImageX, Rufus, UUI, and YUMI can be used to create
bootable media.
ImageX is a command-line tool that enables original
equipment manufacturers (OEMs) and corporations
to capture, to modify, and to apply file-based disk
images for rapid deployment.
© ExplorNet’s Centers for Quality Teaching and Learning
5
Making the Install Easier
The Windows Automated Installation Toolkit (AIK) is
a collection of tools and documentation designed to
help IT Professionals deploy Windows.
The Windows AIK is ideal for highly customized
environments.
© ExplorNet’s Centers for Quality Teaching and Learning
6
Lite Touch Installation (LTI)
Requires some human intervention in the early
phase but automated after a specific point.
Works well for 150+ deployment.
Tools needed:
 Windows AIK
 Windows Deployment Services
 Microsoft Development Toolkit
© ExplorNet’s Centers for Quality Teaching and Learning
7
Zero Touch Installation (ZTI)
Fully automated “touchless” method of installing
Windows.
Uses System Center Configuration Manager 2012 to
discover servers, desktops, tablets, and mobile
devices connected to a network through Active
Directory and installs client software on each node.
Geared for 500+ computers.
© ExplorNet’s Centers for Quality Teaching and Learning
8
Product Keys
During installation Microsoft requests that you
validate your OS with a product key.
Product keys are unique, alphanumeric codes.
This digital key ensures you have a legal installation
of the software.
© ExplorNet’s Centers for Quality Teaching and Learning
9
Product Keys
Windows product keys are checked by Microsoft for
legitimacy and to determine if it is already being
used on a different computer.
It is usually located:
 On the installation disc holder inside the
Windows package.
 On a sticker on the back or bottom of your
computer if the operating system came preinstalled on the computer.
© ExplorNet’s Centers for Quality Teaching and Learning
10
Activating Windows 7
Activation is the process of verifying that your copy
of Windows is genuine and that it is not in use on
other computers.
Registration is different from activation. You must
activate an installation of Windows 7 but registration
is optional. During registration, you give your contact
information to Microsoft to sign up for technical
support and other benefits.
© ExplorNet’s Centers for Quality Teaching and Learning
11
Using Control Panel
The Control Panel is a utility that allows you to:
 Configure operating system features
 Set up hardware
 Install and uninstall software
 Create and modify users
 Perform system maintenance
All of these things must be done once the OS is
installed.
© ExplorNet’s Centers for Quality Teaching and Learning
12
Using Control Panel
Most operating system features will be configured
properly by default.
Hardware often requires a number of driver
installations that should be checked in device
manager.
Useful software will need to be installed:
 Antivirus
 Web browser
 PDF readers, etc.
© ExplorNet’s Centers for Quality Teaching and Learning
13
Using Control Panel
A user account will be created during the installation,
however, you may wish to add and modify users.
Most system maintenance is auto configured (disk
defragmenter) but other components (back up) must
be manually configured.
© ExplorNet’s Centers for Quality Teaching and Learning
14
Desktop Settings
The Windows desktop is a flexible, configurable part
of the Windows environment.
Taskbar – bottom is default but can be moved to
either side or the top.
Notification area- customizable.
Pin shortcuts to the task bar.
Jump List – menu above the icon that contains a list
of recently used files.
© ExplorNet’s Centers for Quality Teaching and Learning
15
Display Settings
Settings to configure:
 Primary display (if your computer is connected to
two or more monitors)
 Display content in a landscape or portrait
orientation
 Resolution
 Color depth
 Font size
© ExplorNet’s Centers for Quality Teaching and Learning
16
Updating the System
Once your OS is installed it is important to keep it upto-date.
Keeping an OS updated allows it to maintain proper
security.
Microsoft provides regularly scheduled updates for
this purpose using the Windows Update Feature.
© ExplorNet’s Centers for Quality Teaching and Learning
17
Updating the System
© ExplorNet’s Centers for Quality Teaching and Learning
18
Updating the System
Microsoft releases critical updates on the second
Tuesday of the month. This is called “Patch Tuesday”.
Updates can occur more often if a serious
vulnerability occurs.
© ExplorNet’s Centers for Quality Teaching and Learning
19
Types of Windows Updates
Important Updates – security and critical updates,
hotfixes, service packs, and reliability improvements.
Recommended Updates – new or improved features
to keep things running smoothly.
Optional Updates – optional device drivers or new or
trial software.
© ExplorNet’s Centers for Quality Teaching and Learning
20
Windows Updates Notes
Hotfixes are software solutions to bugs in the
software.
Service Packs are large collections of updates that
help the user simplify the update process.
Many updates such as critical updates like the ones
above require a restart of the OS.
© ExplorNet’s Centers for Quality Teaching and Learning
21
Action Center
Action Center – provides a single interface in which
you can view the status of security and maintenance
features and it alerts you to problems you need to
correct and usually provides a way to fix it.
In essence, Windows will tell the user when it needs
updates to other software as well.
© ExplorNet’s Centers for Quality Teaching and Learning
22
Action Center
Tracks seven security features:
1. Network firewall - This feature monitors your
computer’s firewall which should be turned on if no
other firewalls are present.
2. Windows Update - This feature indicates whether
Windows Update is enabled.
3. Virus protection - Most virus protection software
can be monitored with this feature. If no software is
present or if it’s out of date, you’ll be notified here.
© ExplorNet’s Centers for Quality Teaching and Learning
23
Action Center
4. Spyware Protection – Action Center monitors
Windows Defender and other third-party
antispyware solutions.
5. Internet Security Settings – Checks on Internet
Explorer 9’s security settings.
6. User Account Control – Checks to see if User
Account Control (UAC) is enabled and you can click
the Change Settings link to configure it.
© ExplorNet’s Centers for Quality Teaching and Learning
24
Action Center
7. Network Access Protection (NAP):
 Applies mainly to enterprise environments.
 The network can detect whether the computer
meets baseline security standards for the
organization.
 If not, the computer is not allowed access to the
full network.
 To gain access it must be updated or
reconfigured.
© ExplorNet’s Centers for Quality Teaching and Learning
25
Action Center
© ExplorNet’s Centers for Quality Teaching and Learning
26
Microsoft Security Essentials
Microsoft Security Essentials (MSE) is a program that
helps protect your computer from viruses and other
malware.
The program is updated regularly by the Microsoft
Update service to ensure the signatures, the antimalware engine, and the application itself are kept
up to date.
MSE is replaced by Defender in Windows 8 and
newer.
© ExplorNet’s Centers for Quality Teaching and Learning
27
Microsoft Security Essentials
© ExplorNet’s Centers for Quality Teaching and Learning
28
Windows Defender
Defender is a free antispyware program provided by
Microsoft.
Spyware is a type of program that installs on your
computer without your permission, monitors your
computing activities, and reports the activity back to
the spyware writer or a third party.
Defender is only an anti-spyware program in
Windows 7.
In Windows 8 and beyond is a full-featured antimalware program.
© ExplorNet’s Centers for Quality Teaching and Learning
29
Windows Defender
© ExplorNet’s Centers for Quality Teaching and Learning
30
Malicious Software Removal Tool
Comes as a Windows Update.
Scans your computer for dangerous malware and
attempts to remove it immediately.
Can download the Malicious Software Removal Tool
from the Microsoft Safety & Security Center or the
Microsoft Download Center.
© ExplorNet’s Centers for Quality Teaching and Learning
31
System Center Endpoint Protection
A combination of antivirus, anti-malware, and
management software for desktops, laptops, and
other client endpoints in a business environment.
If you have more than 10 client computers to protect
in your organization, Microsoft recommends that
you use System Center Endpoint Protection rather
than Microsoft Security Essentials or Defender.
© ExplorNet’s Centers for Quality Teaching and Learning
32
System Center Endpoint Protection
© ExplorNet’s Centers for Quality Teaching and Learning
33