Professional Documents
Culture Documents
IT Chapter 11
IT Chapter 11
IT Chapter 11
The first version of Microsoft Windows was released in 1985. Since then, over 25 versions,
subversions, and varieties have been released. Each version can also have editions, such as
Home, Pro, Ultimate, or Enterprise, and come in either 32-bit or 64-bit versions.
Centralized management is provided through joining an Active Directory domain where the user
accounts and security policies are configured on a Domain Controller.
There are some features of Windows that are aimed at personal use, such as Windows Media
Center (allows the computer to be used as a home entertainment appliance for playing DVDs).
Windows 7 has a default theme called Aero (translucent window borders, many animations).
Gadgets are small applications, such as games, sticky notes, a calendar, or a clock.
Windows introduced a new desktop that used tiles on the Start screen. Another new GUI
element is a vertical bar of five icons known as charms. They provide quick access to common
functions.
The Taskbar provides easy access to many important and commonly used features of Windows.
• Jump lists - display a list of tasks that are unique to the application
• Pinned applications - add an application to the taskbar for easy access
• Thumbnail previews - view a thumbnail image of a running program
The Windows Task Manager provides information about all of the applications, processes, and
services that are running on the computer. It can also be used to terminate processes that are
causing system issues or that have stopped responding to user input.
The 7 tabs of Task Manager:
• Processes - a list of processes (set of instructions started by the user, OS, or program)
currently running on the PC
• Performance - dynamic system performance graphs
• App history - historical resource utilization, only available for apps from Microsoft Store
• Startup - the processes that automatically started during Windows startup
• Users - the users who are currently connected to the PC and the system recourses they are
using
• Details - tweak the level of CPU priority for a given process, specify CPU affinity
• Services - all available services and their status, identified by their Process ID (PID)
1. The Applications and Processes tabs (from W7) have been combined in Windows 10.
2. The Networking (from W7) tab is now included with the Performance tab in Windows 10.
3. The Users tab has been enhanced in Windows 10 to not only show the users that are
connected but also the resources that they are using
Windows File Explorer
File Explorer is a file management application in Window 8 and Windows 10 (aka Windows
Explorer in <W7, minus the Ribbon). It is used to navigate the file system and manage the
folders, subfolders, and applications on storage media.
In Windows versions 10 and 8.1, the This PC feature allows you to access the various Devices
and drives installed in the computer.
Depending on the file permission, only users with enough permission can access the file. To
override this behavior and gain access to those files, you must open or execute them as the
system administrator. To do so, right-click the file and choose Run as Administrator.
A library is a virtual folder that presents content from different locations within the same view.
Windows Libraries allow you to easily organize content from various storage devices on your
local computer and network, including removable media, without actually moving the files. When
Windows 10 is installed, each user has 6 default libraries.
In Windows, files are organized in a directory structure. A directory structure is designed to store
system files, user files, and program files. The root level of the Windows directory structure, the
partition, is usually labeled drive C.
Windows creates a series of folders for each user account that is configured on the computer.
These folders appear to be the same in File Explorer for each user, however, they are actually
unique to each user account. In this way, users cannot access each other's files, applications, or
data.
You can open the Control Panel from Command Prompt (CLI) by typing control.
Administrator accounts are generated when Windows is installed. They can change all system
settings and access all files and folders on the computer.
Standard user accounts can manage most configuration settings that don't affect other users.
They can only access their own files and folders.
UAC monitors programs on the computer and warns users when an action might present a
threat to the computer.
Credential Manager helps you to manage passwords that are used for websites and Windows
applications. Web credentials are not saved for sites accessed by browsers other than Internet
Explorer and Edge.
Sync Center allows files to be edited from multiple Windows devices. Using it requires activation
of the Offline Files feature (sets up a local file location that will store the files to be
synchronized).
Microsoft OneDrive offers a similar service. OneDrive is a cloud storage service that is available
to Microsoft Windows users.
Mobile devices use Wireless Wide Area Network (WWAN) or cellular Internet access
technology. WWAN adapters can be internal or external connected by USB. Connection to the
WWAN is automatic once the adapter and adapter software are installed.
Network and Sharing Center shows how your computer connects to a network. It also allows the
configuration of file and device sharing through the use of network profiles.
In Windows networking, a HomeGroup is a group of computers that are on the same network.
They simplify sharing files on simple networks. Devices that are attached to computers in the
HomeGroup can also be shared. In newer versions of Windows 10, HomeGroup functionality is
not available.
Display Settings and Control Panel
• Display - A specific monitor can be configured if there is more than one monitor
• Screen resolution - specifies the number of pixels horizontally and vertically.
• Orientation - (flipped) Landscape, (flipped) Portrait
• Refresh rate - how often the image in the screen is redrawn (60Hz)
• Display colors - adjust bit depth (number of colors that can be displayed)
• Multiple displays - 2+ monitors
The Power Options Control Panel item allows you to change the power consumption of certain
devices or the entire computer.
Power plans are a collection of hardware and system settings that manage the power usage of
the computer. Windows has preset power plans that were created when it was installed.
If users do not want to completely shut down a computer, the following options may be available:
• Do nothing - computer runs at full power
• Sleep - everything saved in RAM
• Hibernate - everything saved on a temp file in hard drive
• Turn off the display - full power, just display off
• Shut down - bye bye
System properties:
• Computer name - pretty self explanatory, workgroup
• Hardware - device manager, device installation settings
• Advanced - performance, user profiles, startup, recovery
• System Protection - System Restore, amount of disk space
• Remote - Remote Assistance and Remote Desktop
To enhance the performance of the OS, you can change the virtual memory configuration
settings. When Windows determines that system RAM is insufficient, it will create a paging file
on the hard drive that contains some of the data from RAM. When the data is required back in
RAM, it is read from the paging file.
Windows ReadyBoost enables Windows to treat an external flash device, such as a USB drive,
as hard drive cache. ReadyBoost will not be available if Windows determines that no
performance improvement will be gained.
Device Manager displays a list of all the devices installed in the computer, allowing you to
diagnose and resolve device problems. Device Manager organizes devices by type.
Devices displayed in the Devices and Printers Control Panel item are typically external devices
you can connect to your computer through a port such as USB, or a network connection. Those
devices include:
• Portable devices that you occasionally connect to your computer
• Devices you plug into a USB port on your computer
• Printers connected to your computer or available on the network
• Wireless devices connected to your computer
• Compatible network devices connected to your computer
Use the Sound Control Panel item to configure audio devices or change the sound scheme of
the computer.
The Windows clock will automatically synchronize with a time authority on the internet. This
ensures that the time value is accurate.
Windows allows you to change the format of numbers, currencies, dates, and times by using the
Region Control Panel item.
Users can install language packs that include fonts and other resources required by different
languages.
Use the Program and Features Control Panel items to uninstall a program from your computer if
you no longer use it or if you want to free up space on your hard disk. It is important that
applications be uninstalled either through the Programs and Features Control Panel item or
from an uninstallation menu choice that is associated with the application in the Start menu. You
can also choose to manually install software from the network, activate/deactivate Windows
features.
If an application is uninstalled incorrectly, you might be leaving files on the hard drive and
unnecessary settings in the registry, which wastes hard drive space and system resources.
Microsoft recommends that you always use the Programs and Features Control Panel utility
when removing, changing, or repairing applications.
The Default Programs Control Panel item provides the means to configure the way that
Windows handles files and the applications that are used to work with them, choose how
AutoPlay works.
• Troubleshooting - has a number of built-in scripts that are used to identify and solve common
problems with many Windows components
• BitLocker Drive Encryption - a service provided with Windows that will encrypt an entire
volume of disk data so that it can't be read by unauthorized parties.
• File Explorer and Folder Options - permits changing a variety of settings regarding the way
files are displayed in Windows Explorer or File Explorer
Functions of file explorer tabs in W10:
General:
• Browse folders - how a folder is displayed when it is opened
• Click items as follows - the number of clicks required to open an item
• Privacy - which files and folders are shown in Quick Access + allows File History to be cleared
View:
• Folder views - view settings for a folder being viewed to all folders of the same type
• Advanced settings - customizes viewing experience including the ability to view hidden files
and file extensions
Search:
• What to search (W7) - search settings based on indexed and non-indexed locations to make
files and folders easier to find
• How to search - whether an indexed search is used
• When searching non-indexed locations - whether system directories, compressed files and file
contents are included when searching non-indexed locations
Administrative Tools
The Administrative Tools Control Panel item is a collection of tools that are used to monitor and
configure Windows operation. It is unusual in that it is a collection of shortcuts that open in File
Explorer.
One of the Administrative Tools items is the Computer Management console. It allows you to
manage many aspects of your computer and remote computers in one tool. It provides access to
3 groups of utilities. The focus will be on the System Tools group.
Event Viewer allows viewing the history of application, security, and Windows system events.
These events are stored in log files.
Performance Monitor allows customized performance graphs and reports to be created from a
wide range of hardware and software components. Data Collector Sets are collections of
metrics, called performance counters. Windows has a number of default Data Collector Sets and
you can create your own. Data collection can be scheduled to occur at different times and for
different durations and stop criterion for a monitoring session can also be set.
A service is a type of application that runs in the background to achieve a specific goal, or to
wait for service requests. The Services console (SERVICES.MSC) allows you to manage all the
services on your computer and remote computers.
Data Sources is a tool used by administrators to add, remove, or manage data sources using
Open Database Connectivity (ODBC). ODBC is a technology that programs use to access a
wide range of databases or data sources.
The Print Management utility provides a detailed view of all of the printers that are available to a
computer. It enables efficient configuration and monitoring of directly attached and network
printers, including print queues for all printers to which it has access. It also allows the
deployment of a printer configuration to multiple computers on a network through the use of
group policies.
The Windows Memory Diagnostics tool schedules a memory test that will be executed when the
computer starts. After the tests are complete, Windows will restart. The results of the test can be
viewed by finding the memory diagnostic test result in the Windows Log folder in Event Viewer.
System Utilities
Administrators can use the System Information tool to collect and display information about
local and remote computers. Support personnel can use this information to diagnose and
troubleshoot a computer. It can also display the configuration of other machines on the network.
System Configuration (MSCONFIG) is a tool used to identify problems that keep Windows from
starting correctly. To help with isolating the issue, services and startup programs can be turned
off and turned back on one at a time.
System Configuration Tabs:
• General - 3 startup selections (Normal, Diagnostic - basic services and drivers only, Selective -
same as Diagnostic but customizable)
• Boot - choose Windows OS version to boot, or choose Safe boot
• Services - list of services that are started with the OS
• Startup - (W7) list of apps that run automatically when Windows starts, (W7+ reference to
Task Manager)
• Tools - list of diagnostic tools to aid troubleshooting
The Windows Registry is a database that contains settings for Windows and for applications that
use the Registry. The settings are low-level (meaning a lot). Values in the Registry are created
when new software is installed or new devices are added. Every setting in Windows, from the
background of the desktop to the licensing of applications, is stored in the Registry.
The Registry consists of a hierarchical arrangement of keys and sub-keys that are represented
as a tree. Levels of the sub-key tree can be deeply nested with a maximum of 512 levels
permitted.
The Registry exists as multiple database files, called hives, that are associated with each of the
top level registry keys. Each key has values. The values consist of the name of the value, its data
type, and the setting or data that is associated with the value. These keys are recognized by their
distinctive names, which begin with HKEY_
The Registry Editor allows an administrator to view or make changes to the Windows Registry. It
can only be opened from a search or command prompt command regedit.
Microsoft Management Console (MMC) is an application that allows the creation of custom
management consoles for collections of utilities and tools from Microsoft or other sources. The
Computer Management console that was previously discussed is a pre-made MMC. Utilities and
tools, known as snap-ins, can be added to the console.
DxDiag stands for DirectX Diagnostic Tool. It displays details for all DirectX components and
drivers that are installed in a computer. It is run from a search or from the command line.
Disk Management
Disk operations:
• Mount disk - take a disk image and open it like a drive
• Initialize disk - format a disk before using it with Windows
• Extend Partition - add space to a volume from another volume on the disk
• Split partition - create a new partition from an existing one
• Shrink partition - create unallocated space from an existing partition
The Disk Management utility is part of the Computer Management console. You can use the
Disk Management utility to complete the following tasks:
• Extend partitions
• Shrink partitions
• View drive status
The drives in the computer can display one of the following conditions:
• Foreign - A dynamic disk that has been moved to a computer from another
computer
• Healthy - functioning properly
• Initializing - basic disk that is being converted into a dynamic disk
• Missing - dynamic disk that is corrupted, turned off, or disconnected
• Not initialized - disk that does not contain a valid signature
• Online - basic or dynamic disk that is accessible and shows no problems
• Online (Errors) - I/O errors detected on a dynamic disk
• Offline - dynamic disk that is corrupted or unavailable
• Unreadable - basic or dynamic disk that has experienced hardware failure,
corruption, or I/O errors
• Assign or change drive letters
• Add drives
• Add arrays
• Designate the active partition
In Windows disk management, you can create mirrored, spanned, or RAID 5 arrays from
multiple dynamic disks. Storage Spaces is the disk array technology that is recommended by
Windows. It creates pools of physical hard drives from which virtual disks (storage spaces) can
be created.
As files increase in size, some data is written to the next available cluster on the disk. In time,
data becomes fragmented and spread over nonadjacent clusters on the hard drive. As a result, it
takes longer to locate and retrieve each section of the data. A disk defragmenter gathers the
noncontiguous data into one place, making the OS run faster. It is not recommended to perform
disk defragmentation on SSDs, however, it’s OK on SSHDs.
The Optimize Drives utility allows analysis of the drive prior to optimization. The analysis will
display the degree of fragmentation of the drive.
The Disk Error-Checking tool checks the integrity of files and folders by scanning the hard disk
surface for physical errors.
Before purchasing or attempting to install an application, you should verify that the system
requirements are met. The may include:
• Processor speed
• RAM
• OS and version
Most applications use an automatic installation process when the application disc is inserted in
the optical drive. Most Windows software installations are attended, meaning the user must be
present to interact with the installer software to provide input about the options to use when
installing the software.
Installer software usually has an EXE or Microsoft Silent Installer (MSI) file extension. The user
must have the appropriate permissions in order to install the software. They must also not be
blocked by group policies that prevent software installation.
The Microsoft Store allows a user to search for and install apps on Windows devices (not
available on W7).
Allowing users to install software on computers that are owned by a business organization can
be a security risk.
PowerShell is a more powerful command line utility. It offers many advanced features, such as
scripting and automation. It even comes with its own scripting development environment, called
PowerShell ISE, to help with the task of writing scripts.
PowerShell uses "cmdlets", or small applications, that represent the commands that are
available. PowerShell also allows naming of cmdlets with aliases, so the same cmdlet can be run
at the command line with any name that adheres to naming conventions that you choose to
assign to it.
The original command line still exists in Windows 10, and can be opened by typing cmd into the
search field on the Taskbar.
• whoami - display the name of the computer that the prompt is open on and the user account
• help or help|more - get info on commands
• command /? - get help on a specific command
• cls - clear the screen
• up-arrow keys - move through previously entered commands
• F7 key or doskey/history - display command history
• Ctrl + C keys - exit a running command/script
• exit - close the command window
Special characters, called wildcards, can be substituted for characters or groups of characters in
filenames. Wildcards can be used when you only know part of a filename that you are trying to
find or when you want to perform a file operation on a group of files that share elements of a
filename or extension.
The 2 wildcards that can be used with Windows Command Prompt are:
• * - matches groups of characters, including entire filenames and file extensions (e.g. my*.txt =
start with my and have the .txt extension)
• ? - same as *, but stands for any single character
Common Syntax Conventions:
The Windows run line utility can be opened by pressing the Win+R keys and entering cmd to
open the command line window. Some other utilities and tools you can open this way:
• EXPLORER - File Explorer/Windows Explorer
• MMC - Microsoft Management Console (specify name and add .msc for a custom console)
• MSINFO32 - System Information
• MSTSC - Remote Desktop Utility
• NOTEPAD - Notepad
A domain is a group of computers and electronic devices with a common set of rules and
procedures administered as a unit. A specialized server called a domain controller manages all
security-related aspects of users and network resources, centralizing security and
administration. For example, within a domain, Lightweight Directory Access Protocol (LDAP) is
a protocol used to allow computers to access data directories that are distributed throughout the
network.
Domain and workgroup are methods for organizing and managing computers on a network.
All computers on a network must be part of either a domain or a workgroup. When Windows is
first installed on a computer, it is automatically assigned to a workgroup.
All Windows computers that belong to the same workgroup can also belong to a HomeGroup.
There can only be one HomeGroup per workgroup on a network. Computers can only be a
member of one HomeGroup at a time. HomeGroups are secured with a simple password.
When a computer joins a HomeGroup, all user accounts on the computer, except the Guest
account, become members of the HomeGroup. Users control access to their resources.
Network file sharing and mapping network drives is a secure and convenient way to provide
easy access to network resources.
Drive mapping is done by assigning a letter (A-Z) to the resource on a remote drive and allows
you to use the remote drive as a local drive.
Network file sharing permissions:
• Read - view and navigate folders, subfolders and files and run program files
• Change - read + adding/changing/deleting stuff
• Full control - change + change NTFS partitions and take ownership of files & folders
Administrative shares, also called hidden shares, are identified with a dollar sign ($) at the end of
the share name. By default, Windows creates several hidden administrative shares. These
include the root folder of any local drives (C$), the system folder (ADMIN$), and the print driver
folder (PRINT$). Administrative shares are hidden from users and only accessible by members
of the local administrators’ group.
Advanced Sharing Settings, located in the Network and Sharing Center, manages the sharing
options for three different network profiles; Private, Guest or Public, and All Networks.
To enable sharing resources between computers connected to the same workgroup, Network
Discovery and File and printer sharing must be turned on.
Microsoft’s file sharing mechanism is called Nearby Sharing (partly replaces HomeGroup). It
provides the ability to share content with a nearby device using both Wi-Fi and Bluetooth.
A printer can be directly attached to a computer. In that case, the printer is considered local, and
the PC it’s attached to is acting as the print server. Once the printer is shared, users with the
right permissions can connect to the network shared printer.
A printer can also come with integrated Wi-Fi/Bluetooth and connect directly to the network.
Once it is connected to the network, it can be mapped. Mapping a printer enables the user to
print over the network without the need for a direct connection to the printer.
Configure a Wired Network Connection
Windows 10 network settings are managed through the Network & Internet section in the
Settings App. Network card properties are configured in the Advanced tab of the adapter
properties window. The Windows Internet Protocol Version 4 (TCP/IPv4) Properties window
includes an Alternate Configuration tab which allows an administrator to configure an
alternative IP address for the PC to use if it is unable to contact a DHCP server.
The default settings for both IPv4 and IPv6 is to obtain the IP settings from a DHCP server in
the case of IPv4 and from a Stateless Automatic Address Configuration (SLAAC) in the case of
IPv6.
The first time a computer with Windows 10 connects to a network, a network profile must be
selected. Depending on the profile selected, file and printer sharing, or network discovery can be
turned off or on, and different firewall settings can be applied.
The easiest way to test for an internet connection is to open a web browser and see if the
internet is available. To troubleshoot a connection, you can use the Windows GUI or CLI.
VPN uses dedicated secure connections, routed through the internet, from the corporate private
network to the remote user. When connected to the corporate private network, users become
part of that network and have access to all services and resources as if they were physically
connected to it.
Remote-access users must install a VPN client on their computers to form a secure connection
with the corporate private network. The VPN software encrypts data before sending it over the
internet to the VPN gateway at the corporate private network.
Telnet is a command-line terminal emulation protocol and program. The Telnet daemon listens
for connections on TCP port 23. Telnet is sometimes used for troubleshooting services and for
connecting to routers and switches for entering configurations.
SSH is a secure alternative to Telnet and other file copy programs such as FTP.
Preventive maintenance should take place when it causes the least amount of disruption to the
users.
Use the Windows Malicious Software Removal Tool to check a computer for malicious software.
If an infection is found, the tool removes it. This should be a standard item in your preventive
maintenance program. To ensure that these programs run each time the computer is booted,
add the program to the Startup folder of the Start Menu.
Windows update is a website located at update.microsoft.com. The site hosts software and
hardware updates for Windows 7,8 and 10. There is also a program called Microsoft Update
which keeps Microsoft Office apps patched.
A control installed in Windows allows the OS to browse the update site and select updates to
download using Background Intelligent Transfer Service (BITS) protocol.
Microsoft releases updates on the second Tuesday of each month, unofficially known as Patch
Tuesday.
Other types of updates are firmware and driver updates, firmware updates being less common
than driver updates.
Restore points contain information about the operating system, installed programs, and registry
settings. If a computer crashes or if an update causes a problem, the computer can be rolled
back to a previous configuration using a restore point. System restore does not back up personal
data files, nor does it recover personal files that have been corrupted or deleted.
Restore points should always be made before doing either of the following actions:
• OS update
• Hardware installation/upgrade
• Application installation
• Driver installation
You can use the Microsoft Backup utility to perform backups as required. Only the files that have
changed since the last backup need to be backed up.
Windows 8 and Windows 10 ship with File History which can be used to back up the files in the
Documents, Music, Pictures, Videos, and Desktop folders. Over time, File History builds a history
of your files, allowing you to go back and recover specific versions of a file.