Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by William R. Stanek
Windows 8.1 Administration Pocket Consultant: Storage, Security, & Networking
Acknowledgments
Introduction
Who is this book for?
How is this book organized?
Conventions used in this book
Other resources
Errata and book support
We want to hear from you
Stay in touch
1. Managing Firmware, Boot Configuration, and Startup
Navigating and understanding firmware options
Firmware interface types and boot data
Boot services, run-time services, and beyond
UEFI
Navigating startup and power states
Working with firmware interfaces
Examining firmware interfaces
Power states and power management
Diagnosing and resolving startup problems
Troubleshooting startup phase 1
Troubleshooting startup phase 2
Troubleshooting startup phase 3
Troubleshooting startup phase 4
Troubleshooting startup phase 5
Managing startup and boot configuration
Setting startup and recovery options
Managing system boot configuration
Using the BCD Editor
Managing the BCD store
Viewing BCD entries
Creating and identifying the BCD store
Importing and exporting the BCD store
Creating and deleting BCD entries
Setting BCD entry values
Changing Data Execution Prevention and Physical Address Extension options
Changing the operating system display order
Changing the default operating system entry
Changing the default timeout
Changing the boot sequence temporarily
2. Using TPM and BitLocker Drive Encryption
Creating trusted platforms
TPM: the essentials
TPM: management and policies
Enabling TPM
Initializing and preparing a TPM for first use
Turning an initialized TPM on or off
Clearing the TPM
Changing the TPM owner password
BitLocker Drive Encryption: the essentials
Understanding BitLocker Drive Encryption
Hardware encryption, secure boot, and network unlock
Deploying BitLocker Drive Encryption
Managing BitLocker Drive Encryption
Preparing for BitLocker Drive Encryption
Enabling BitLocker on nonsystem volumes
Enabling BitLocker on USB flash drives
Enabling BitLocker on system volumes
Managing and troubleshooting BitLocker
Recovering data protected by BitLocker Drive Encryption
Disabling or turning off BitLocker Drive Encryption
3. Managing Disk Drives and File Systems
Disk management essentials
Using the This PC console
Using Disk Management
Using FSUtil and DiskPart
Improving disk performance
Understanding and using Windows ReadyBoost
Enabling and configuring Windows ReadyBoost
Understanding and using Windows ReadyDrive
Understanding and using Windows SuperFetch
Working with basic and dynamic disks
Preparing basic and dynamic disks
Understanding drive designations
Installing and initializing new physical disks
Changing a disk’s partition table style
Marking a partition as active
Converting a basic disk to a dynamic disk or vice versa
Working with disks, partitions, and volumes
Partitioning disks and preparing them for use
Creating partitions, logical drives, and simple volumes
Creating spanned and striped volumes
Shrinking or extending volumes
Formatting partitions and volumes
Assigning, changing, or removing drive letters and paths
Assigning, changing, or deleting a volume label
Deleting partitions, volumes, and logical drives
Converting a volume to NTFS
Recovering a failed simple, spanned, or striped volume
Regenerating a striped set with parity
Using disk mirroring
Creating mirrored volumes
Breaking a mirrored set
Removing a mirrored set
Moving a dynamic disk to a new system
Using storage spaces
Getting started with storage spaces
Creating redundant data sets
Working with storage pools
Creating a storage pool and allocating storage
Adding drives to a storage space
Changing the storage configuration
Deleting a storage space
Deleting a storage pool
Troubleshooting storage spaces
4. Configuring and Maintaining Storage
Working with removable storage devices
Working with data discs
Disc burning: the essentials
Mounting ISO images
Burning ISO images to disc
Burning mastered discs
Burning discs with live file systems
Changing the default burning options
Managing disk compression and file encryption
Compressing drives and data
Compressing drives
Compressing directories and files
Expanding compressed drives
Expanding compressed directories and files
Encrypting drives and data
Understanding encryption and EFS
Encrypting directories and files
Working with encrypted files and folders
Configuring recovery policy
Sharing decrypted files
Decrypting files and directories
Troubleshooting common disk problems
Repairing disk errors and inconsistencies
Checking for disk errors
Running Check Disk from the command line
Running Check Disk interactively
Defragmenting disks
Resynchronizing and repairing a mirrored set
Repairing a mirrored system volume to enable boot
5. Configuring User and Computer Policies
Group Policy essentials
Accessing and using local group policies
Accessing and using site, domain, and OU policies
Configuring policies
Viewing policies and templates
Enabling, disabling, and configuring policies
Adding or removing templates
Working with file and data management policies
Configuring disk quota policies
Configuring System Restore policies
Configuring Offline File policies
Configuring policy for Work Folders
Working with access and connectivity policies
Configuring network policies
Configuring Remote Assistance policies
Working with computer and user script policies
Controlling script behavior through policy
Assigning computer startup and shutdown scripts
Assigning user logon and logoff scripts
Working with logon and startup policies
Setting policy-based startup programs
Disabling run lists through policy
6. Optimizing File Security
File security and sharing options
Controlling access to files and folders with NTFS permissions
Understanding and using basic permissions
Working with and setting basic permissions
Special identities and best practices for assigning permissions
Assigning special permissions
Assigning claims-based permissions
File ownership and permission assignment
Applying permissions through inheritance
Inheritance essentials
Viewing inherited permissions
Stopping inheritance
Restoring inherited permissions
Determining the effective permissions and troubleshooting
7. Managing File Sharing and Auditing
Sharing files and folders over the network
Controlling access to network shares
Creating a shared resource
Sharing a resource and setting share permissions in File Explorer
Changing or stopping sharing
Sharing a folder and setting share permissions in Computer Management
Creating and managing shared folders in Group Policy
Using and accessing shared resources
Using and accessing shared folders for administration
Troubleshooting file sharing
Using and configuring public folder sharing
Using public folder sharing
Configuring public folder sharing
Implementing synced sharing
Understanding work folders
Creating sync shares and enabling SMB access
Accessing Work Folders on clients
Auditing file and folder access
Enabling auditing for files and folders
Configuring and tracking auditing
8. Maintaining Data Access and Availability
Configuring File Explorer options
Customizing File Explorer
Configuring advanced File Explorer options
Setting Group Policy for File Explorer and folder views
Managing drive access in File Explorer
Managing offline files
Understanding offline files
Making files or folders available offline
Step 1: Share folders
Step 2: Make folders available for offline use
Step 3: Specify the offline files and folders to use
Managing offline file synchronization
Scheduling syncing
Syncing on an event or action
Resolving synchronization conflicts and errors
Configuring disk usage limits for offline files
Managing encryption for offline files
Making offline files unavailable
Configuring disk quotas
Using disk quotas
Enabling disk quotas on NTFS volumes
Viewing disk quota entries
Creating disk quota entries
Updating and customizing disk quota entries
Deleting disk quota entries
Exporting and importing disk quota settings
Disabling disk quotas
Using branch caching
9. Configuring and Troubleshooting TCP/IP Networking
Navigating Windows 8.1 networking features
Understanding network discovery and network categories
Working with Network Explorer
Working with Network And Sharing Center
Installing networking components
Working with TCP/IP and the Dual TCP/IP stack
Installing network adapters
Installing networking services and TCP/IP
Configuring network connections
Configuring static IP addresses
Using the Ping command to check an address
Configuring a static IPv4 or IPv6 address
Configuring dynamic IP addresses and alternate IP addressing
Configuring multiple gateways
Configuring DNS resolution
Basic DNS settings
Advanced DNS settings
Configuring WINS resolution
Managing network connections
Enabling and disabling network connections
Checking the status, speed, and activity for network connections
Viewing network configuration information
Renaming network connections
Troubleshooting and testing network settings
Diagnosing and resolving network connection problems
Diagnosing and resolving Internet connection problems
Performing basic network tests
Resolving IP addressing problems
Releasing and renewing DHCP settings
Registering and flushing DNS
10. Managing Mobile Networking and Remote Access
Configuring networking for mobile devices
Working with mobility settings
Configuring dynamic IP addresses
Configuring alternate private IP addresses
Connecting to networked projectors
Understanding mobile networking and remote access
Creating connections for remote access
Creating a dial-up connection
Working with dialing rules and locations
Viewing and Setting the Default Dialing Location
Creating Dialing Locations
Deleting Dialing Locations
Creating a dial-up Internet connection to an ISP
Creating a dial-up connection to a workplace
Creating a broadband connection to the Internet
Creating a VPN connection
Joining a device to a workplace
Configuring connection properties
Configuring automatic or manual connections
Configuring proxy settings for mobile connections
Configuring connection logon information
Configuring automatic disconnection
Setting a connection to use dialing rules
Configuring primary and alternate phone numbers
Configuring identity validation
Configuring networking protocols and components
Enabling and disabling Windows Firewall for network connections
Establishing connections
Establishing a dial-up connection
Establishing a broadband connection
Establishing a VPN connection
Connecting to a workplace
Wireless networking
Wireless network devices and technologies
Wireless security
Installing and configuring a wireless adapter
Working with wireless networks and wireless connections
Connecting to wireless networks
Managing and troubleshooting wireless networking
Index
About the Author
Copyright
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Windows® 8.1 Administration Pocket Consultant: Storage, Security, & Networking
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset