Windows 8.1 Administration Pocket Consultant: Storage, Security, & Networking

Book description

Portable and precise, this pocket-sized guide delivers ready answers for managing storage, security, and networking features in Windows 8.1.

Table of contents

  1. Acknowledgments
  2. Introduction
    1. Who is this book for?
    2. How is this book organized?
    3. Conventions used in this book
    4. Other resources
    5. Errata and book support
    6. We want to hear from you
    7. Stay in touch
  3. 1. Managing Firmware, Boot Configuration, and Startup
    1. Navigating and understanding firmware options
      1. Firmware interface types and boot data
      2. Boot services, run-time services, and beyond
      3. UEFI
    2. Navigating startup and power states
      1. Working with firmware interfaces
      2. Examining firmware interfaces
      3. Power states and power management
    3. Diagnosing and resolving startup problems
      1. Troubleshooting startup phase 1
      2. Troubleshooting startup phase 2
      3. Troubleshooting startup phase 3
      4. Troubleshooting startup phase 4
      5. Troubleshooting startup phase 5
    4. Managing startup and boot configuration
      1. Setting startup and recovery options
      2. Managing system boot configuration
      3. Using the BCD Editor
    5. Managing the BCD store
      1. Viewing BCD entries
      2. Creating and identifying the BCD store
      3. Importing and exporting the BCD store
      4. Creating and deleting BCD entries
      5. Setting BCD entry values
      6. Changing Data Execution Prevention and Physical Address Extension options
      7. Changing the operating system display order
      8. Changing the default operating system entry
      9. Changing the default timeout
      10. Changing the boot sequence temporarily
  4. 2. Using TPM and BitLocker Drive Encryption
    1. Creating trusted platforms
      1. TPM: the essentials
      2. TPM: management and policies
      3. Enabling TPM
      4. Initializing and preparing a TPM for first use
      5. Turning an initialized TPM on or off
      6. Clearing the TPM
      7. Changing the TPM owner password
    2. BitLocker Drive Encryption: the essentials
      1. Understanding BitLocker Drive Encryption
      2. Hardware encryption, secure boot, and network unlock
      3. Deploying BitLocker Drive Encryption
    3. Managing BitLocker Drive Encryption
      1. Preparing for BitLocker Drive Encryption
      2. Enabling BitLocker on nonsystem volumes
      3. Enabling BitLocker on USB flash drives
      4. Enabling BitLocker on system volumes
      5. Managing and troubleshooting BitLocker
        1. Recovering data protected by BitLocker Drive Encryption
        2. Disabling or turning off BitLocker Drive Encryption
  5. 3. Managing Disk Drives and File Systems
    1. Disk management essentials
      1. Using the This PC console
      2. Using Disk Management
      3. Using FSUtil and DiskPart
    2. Improving disk performance
      1. Understanding and using Windows ReadyBoost
      2. Enabling and configuring Windows ReadyBoost
      3. Understanding and using Windows ReadyDrive
      4. Understanding and using Windows SuperFetch
    3. Working with basic and dynamic disks
    4. Preparing basic and dynamic disks
      1. Understanding drive designations
      2. Installing and initializing new physical disks
      3. Changing a disk’s partition table style
      4. Marking a partition as active
      5. Converting a basic disk to a dynamic disk or vice versa
    5. Working with disks, partitions, and volumes
    6. Partitioning disks and preparing them for use
      1. Creating partitions, logical drives, and simple volumes
      2. Creating spanned and striped volumes
      3. Shrinking or extending volumes
      4. Formatting partitions and volumes
      5. Assigning, changing, or removing drive letters and paths
      6. Assigning, changing, or deleting a volume label
      7. Deleting partitions, volumes, and logical drives
      8. Converting a volume to NTFS
      9. Recovering a failed simple, spanned, or striped volume
      10. Regenerating a striped set with parity
    7. Using disk mirroring
      1. Creating mirrored volumes
      2. Breaking a mirrored set
      3. Removing a mirrored set
    8. Moving a dynamic disk to a new system
    9. Using storage spaces
      1. Getting started with storage spaces
      2. Creating redundant data sets
    10. Working with storage pools
      1. Creating a storage pool and allocating storage
      2. Adding drives to a storage space
      3. Changing the storage configuration
      4. Deleting a storage space
      5. Deleting a storage pool
      6. Troubleshooting storage spaces
  6. 4. Configuring and Maintaining Storage
    1. Working with removable storage devices
    2. Working with data discs
      1. Disc burning: the essentials
      2. Mounting ISO images
      3. Burning ISO images to disc
      4. Burning mastered discs
      5. Burning discs with live file systems
      6. Changing the default burning options
    3. Managing disk compression and file encryption
      1. Compressing drives and data
        1. Compressing drives
        2. Compressing directories and files
        3. Expanding compressed drives
        4. Expanding compressed directories and files
      2. Encrypting drives and data
        1. Understanding encryption and EFS
        2. Encrypting directories and files
        3. Working with encrypted files and folders
        4. Configuring recovery policy
        5. Sharing decrypted files
        6. Decrypting files and directories
    4. Troubleshooting common disk problems
      1. Repairing disk errors and inconsistencies
      2. Checking for disk errors
        1. Running Check Disk from the command line
        2. Running Check Disk interactively
      3. Defragmenting disks
      4. Resynchronizing and repairing a mirrored set
      5. Repairing a mirrored system volume to enable boot
  7. 5. Configuring User and Computer Policies
    1. Group Policy essentials
      1. Accessing and using local group policies
      2. Accessing and using site, domain, and OU policies
    2. Configuring policies
      1. Viewing policies and templates
      2. Enabling, disabling, and configuring policies
      3. Adding or removing templates
    3. Working with file and data management policies
      1. Configuring disk quota policies
      2. Configuring System Restore policies
      3. Configuring Offline File policies
      4. Configuring policy for Work Folders
    4. Working with access and connectivity policies
      1. Configuring network policies
      2. Configuring Remote Assistance policies
    5. Working with computer and user script policies
      1. Controlling script behavior through policy
      2. Assigning computer startup and shutdown scripts
      3. Assigning user logon and logoff scripts
    6. Working with logon and startup policies
      1. Setting policy-based startup programs
      2. Disabling run lists through policy
  8. 6. Optimizing File Security
    1. File security and sharing options
    2. Controlling access to files and folders with NTFS permissions
      1. Understanding and using basic permissions
        1. Working with and setting basic permissions
        2. Special identities and best practices for assigning permissions
      2. Assigning special permissions
      3. Assigning claims-based permissions
      4. File ownership and permission assignment
    3. Applying permissions through inheritance
      1. Inheritance essentials
      2. Viewing inherited permissions
      3. Stopping inheritance
      4. Restoring inherited permissions
      5. Determining the effective permissions and troubleshooting
  9. 7. Managing File Sharing and Auditing
    1. Sharing files and folders over the network
      1. Controlling access to network shares
      2. Creating a shared resource
        1. Sharing a resource and setting share permissions in File Explorer
        2. Changing or stopping sharing
        3. Sharing a folder and setting share permissions in Computer Management
      3. Creating and managing shared folders in Group Policy
      4. Using and accessing shared resources
      5. Using and accessing shared folders for administration
      6. Troubleshooting file sharing
    2. Using and configuring public folder sharing
      1. Using public folder sharing
      2. Configuring public folder sharing
    3. Implementing synced sharing
      1. Understanding work folders
      2. Creating sync shares and enabling SMB access
      3. Accessing Work Folders on clients
    4. Auditing file and folder access
      1. Enabling auditing for files and folders
      2. Configuring and tracking auditing
  10. 8. Maintaining Data Access and Availability
    1. Configuring File Explorer options
      1. Customizing File Explorer
      2. Configuring advanced File Explorer options
        1. Setting Group Policy for File Explorer and folder views
        2. Managing drive access in File Explorer
    2. Managing offline files
      1. Understanding offline files
      2. Making files or folders available offline
        1. Step 1: Share folders
        2. Step 2: Make folders available for offline use
        3. Step 3: Specify the offline files and folders to use
      3. Managing offline file synchronization
        1. Scheduling syncing
        2. Syncing on an event or action
        3. Resolving synchronization conflicts and errors
      4. Configuring disk usage limits for offline files
      5. Managing encryption for offline files
      6. Making offline files unavailable
    3. Configuring disk quotas
      1. Using disk quotas
      2. Enabling disk quotas on NTFS volumes
      3. Viewing disk quota entries
      4. Creating disk quota entries
      5. Updating and customizing disk quota entries
      6. Deleting disk quota entries
      7. Exporting and importing disk quota settings
      8. Disabling disk quotas
    4. Using branch caching
  11. 9. Configuring and Troubleshooting TCP/IP Networking
    1. Navigating Windows 8.1 networking features
      1. Understanding network discovery and network categories
      2. Working with Network Explorer
      3. Working with Network And Sharing Center
    2. Installing networking components
      1. Working with TCP/IP and the Dual TCP/IP stack
      2. Installing network adapters
      3. Installing networking services and TCP/IP
    3. Configuring network connections
      1. Configuring static IP addresses
        1. Using the Ping command to check an address
        2. Configuring a static IPv4 or IPv6 address
      2. Configuring dynamic IP addresses and alternate IP addressing
      3. Configuring multiple gateways
      4. Configuring DNS resolution
        1. Basic DNS settings
        2. Advanced DNS settings
      5. Configuring WINS resolution
    4. Managing network connections
      1. Enabling and disabling network connections
      2. Checking the status, speed, and activity for network connections
      3. Viewing network configuration information
      4. Renaming network connections
    5. Troubleshooting and testing network settings
      1. Diagnosing and resolving network connection problems
      2. Diagnosing and resolving Internet connection problems
      3. Performing basic network tests
      4. Resolving IP addressing problems
      5. Releasing and renewing DHCP settings
      6. Registering and flushing DNS
  12. 10. Managing Mobile Networking and Remote Access
    1. Configuring networking for mobile devices
      1. Working with mobility settings
      2. Configuring dynamic IP addresses
      3. Configuring alternate private IP addresses
      4. Connecting to networked projectors
    2. Understanding mobile networking and remote access
    3. Creating connections for remote access
      1. Creating a dial-up connection
        1. Working with dialing rules and locations
          1. Viewing and Setting the Default Dialing Location
          2. Creating Dialing Locations
          3. Deleting Dialing Locations
        2. Creating a dial-up Internet connection to an ISP
        3. Creating a dial-up connection to a workplace
      2. Creating a broadband connection to the Internet
      3. Creating a VPN connection
      4. Joining a device to a workplace
    4. Configuring connection properties
      1. Configuring automatic or manual connections
      2. Configuring proxy settings for mobile connections
      3. Configuring connection logon information
      4. Configuring automatic disconnection
      5. Setting a connection to use dialing rules
      6. Configuring primary and alternate phone numbers
      7. Configuring identity validation
      8. Configuring networking protocols and components
      9. Enabling and disabling Windows Firewall for network connections
    5. Establishing connections
      1. Establishing a dial-up connection
      2. Establishing a broadband connection
      3. Establishing a VPN connection
      4. Connecting to a workplace
    6. Wireless networking
      1. Wireless network devices and technologies
      2. Wireless security
      3. Installing and configuring a wireless adapter
      4. Working with wireless networks and wireless connections
      5. Connecting to wireless networks
      6. Managing and troubleshooting wireless networking
  13. Index
  14. About the Author
  15. Copyright

Product information

  • Title: Windows 8.1 Administration Pocket Consultant: Storage, Security, & Networking
  • Author(s): William R. Stanek
  • Release date: February 2014
  • Publisher(s): Microsoft Press
  • ISBN: 9780735682610