The Knowledge Academy Logo
The Knowledge Academy Logo
+61 1-800-150644 - Available 24/7

Send us your message.

X

Configuring Windows 8.1 (M20687)

Key points about this course


Duration: 5 Days*

Accredited: Yes

Dates & Prices Enquire
  • Microsoft accredited training provided by the Largest Training Company Globally
  • Informative training courses from our experienced Microsoft Trainers
  • Our Microsoft training courses are fully accredited by Microsoft

Available delivery methods for this course

Classroom Icon

Classroom

Onsite Icon

In-house

Virtual Icon

Live Virtual

Course Information

Configuring Windows 8.1 (M20687) Overview

The Configuring Windows 8.1 course provides those with hands-on experience on using Windows 8.1. It also provides guidance on installing, upgrading, and licensing for Windows 8.

Over a period of five days, delegates will learn how to install and customise Windows 8.1 operating systems and apps, integrate and control access to domains and cloud services, and migrate and synchronise settings across multiple devices. Additionally, you will learn how to implement mobile security and customise configurations using Windows management tools including Group Policy and Windows PowerShell cmdlets. Delegates will also learn how to configure user settings and profiles, local and remote network connectivity, Client Hyper-V, virtual apps, and Internet Explorer 11. Finally, delegates will learn techniques for optimising security and providing controlled access from Windows 8.1 PCs and devices to specified resources through Workplace Join services and Work Folders. 

 

 

Configuring Windows 8.1 (M20687) Outline

 

Module 1: Windows 8.1 in an Enterprise Environment

Windows client operating systems are essential to the functionality of almost every enterprise environment. Most users perform the bulk of their computing tasks in the Windows client interface, including editing documents, sending email, interacting with applications, and numerous other tasks. Managing these clients, then, is an important task for enterprise information technology (IT) administrators. You must manage Windows clients to ensure that operating systems and any applications are operating properly. Providing adequate security measures, deploying new clients when required, maintaining an inventory, and monitoring Windows clients in your environment are all essential tasks for IT administrators. This module introduces you to Windows 8.1 and provides an overview of how you can manage Windows 8.1 computers in your environment to meet common enterprise IT challenges.

Lessons

  • Managing Windows 8.1 in an Enterprise Environment

  • Overview of Windows 8.1

After completing this module, students will be able to:

  • Explain the different options for managing Windows 8.1 in an enterprise environment.

  • Describe Windows 8.1 and its UI.

 

Module 2: Installing and Deploying Windows 8.1

The Windows 8.1 operating system builds on the core functionality of Windows 8 and Windows 7 to provide a stable client experience across many device form factors and processor architectures. In this module, you will learn about the features that are available in different Windows 8.1 editions. This module introduces planning considerations and hardware requirements for a Windows 8.1 installation. You also will learn about the importance of device driver compatibility and application compatibility during installation. This module describes how you can perform a clean installation of Windows 8.1. It also describes how you can upgrade or migrate to Windows 8.1 and the upgrade paths that are supported. You will learn about the tools and technologies that you can use to customize an installation. You also will learn about Windows 8.1 activation and the different activation options.

Lessons

  • Preparing to Install and Deploy Windows 8.1

  • Installing Windows 8.1

  • Customizing and Preparing a Windows 8.1 Image for Deployment

  • Volume Activation for Windows 8.1

Lab : Installing Windows 8.1

Lab : Customizing and Capturing a Windows 8.1 Image

Lab : Deploying a Windows 8.1 Image

After completing this module, students will be able to:

  • Prepare to install and deploy Windows 8.1.

  • Install Windows 8.1.

  • Customize and prepare a Windows 8.1 image for deployment.

  • Describe volume activation for Windows 8.1.

 

Module 3: Tools Used for Configuring and Managing Windows 8.1

The Windows 8.1 operating system provides several methods to configure operating system components while signed in locally or connected remotely. This module describes the primary management tools in Windows 8.1 and the scenarios for using them.

Lessons

  • Tools Used to Perform Local and Remote Management of Windows 8.1

  • Using Windows PowerShell to Configure and Manage Windows 8.1

  • Using Group Policy to Manage Windows 8.1

Lab : Using Management Tools to Configure Windows 8.1 Settings

After completing this module, you will be able to:

  • Identify the tools used to perform local and remote management of Windows 8.1.

  • Use Windows PowerShell to configure and manage Windows 8.1.

  • Use Group Policy to manage Windows 8.1.

 

Module 4: Managing Profiles and User State in Windows 8.1User profiles store user settings and data. For users working on a single computer, profiles can be stored locally. However, for users who roam between multiple computers, the user profile, or at least some parts of it, should be available on the network. This module describes the different user profile types. It also describes Microsoft User Experience Virtualization (UE-V), which you can use to synchronize settings between computers without using roaming user profiles. The operating system itself provides user profiles, whereas UE-V is a separate product that is part of the Microsoft Desktop Optimization Pack. In this module, you will learn about UE-V features and how to deploy and configure it on your network. You also will learn how to migrate user state and settings to computers that run Windows 8.1 operating systems.

Lessons

  • Managing User Profiles

  • Configuring User State Virtualization

  • Migrating User State and Settings

Lab : Configuring Profiles and User State Virtualization

Lab : Migrating User State by Using USMT

After completing this module, you will be able to:

  • Manage user profiles.

  • Configure User State Virtualization.

  • Migrate user state and settings.

 

Module 5: Managing Disks and Device Drivers

Although most computers that run Windows 8.1 have a single physical disk that is configured as a single volume, this is not always the case. For example, there might be times when you want to have multiple operating systems on a single computer, or you might want to have virtual memory on a different volume. Therefore, it is important that you understand how to create and manage simple, spanned, and striped volumes. You also might be interested in implementing the Storage Spaces feature. In addition to traditional storage, you can use Windows 8.1 to create and access virtual hard disks from within the operating system installed on a physical computer. To help maintain and optimize file system performance, you must be familiar with file system fragmentation and the tools that you can use to defragment a volume. Additionally, a good understanding of disk quotas is helpful if you are managing available disk space on installed volumes.

 

Lessons

  • Managing Disks, Partitions, and Volumes

  • Maintaining Disks, Partitions, and Volumes

  • Working with Virtual Hard Disks

  • Installing and Configuring Device Drivers

Lab : Managing DisksLab : Configuring Device Drivers

After completing this module, you will be able to:

  • Manage disks, partitions, and volumes.

  • Maintain disks, partitions, and volumes.

  • Explain how to use virtual hard disks.

  • Install and configure device drivers.

 

Module 6: Configuring Network Connectivity

Network connectivity is essential in today’s business environment. An increasing number of computer users want to connect their computers to a network. These users might be part of a business network infrastructure, a home office, or they might need to share files and access the Internet. The Windows 8.1 operating system provides enhanced networking functionality compared with earlier Windows client operating systems, and it provides support for newer technologies. By default, Windows 8.1 implements both TCP/Internet Protocol version 4 (IPv4) and TCP/Internet Protocol version 6 (IPv6). Understanding IPv4, IPv6, and the operating system’s access capabilities will help you configure and troubleshoot Windows 8.1 networking features.

Lessons

  • Configuring IPv4 Network Connectivity

  • Configuring IPv6 Network Connectivity

  • Implementing Automatic IP Address Allocation

  • Implementing Name Resolution

  • Implementing Wireless Network Connectivity

Lab : Configuring a Network ConnectionLab : Resolving Network Connectivity Issues

After completing this module, you will be able to:

  • Describe how to configure IPv4 network connectivity.

  • Describe how to configure IPv6 network connectivity.

  • Implement automatic IP address allocation.

  • Implement name resolution.

  • Implement wireless network connectivity.

 

Module 7: Configuring File Access and Printers on Windows 8.1 Clients

This module provides the information and tools that you need to manage access to shared folders and printers on a computer that is running the Windows 8.1 operating system. Specifically, the module describes how to share and protect folders, configure folder compression, and how to install, configure, and manage printers. Additionally, this module introduces Microsoft OneDrive (formerly known as SkyDrive) functionality. To maintain network or local file and printer systems, it is essential to understand how to safeguard these systems and make them operate as efficiently and effectively as possible. This includes setting up File permissions (previously known as NTFS permissions), compressing and managing shared folders and files, and configuring printers.

Lessons

  • Managing File Access

  • Managing Shared Folders

  • Configuring File Compression

  • Configuring File Access

  • Managing Printers

Lab : Configuring File Access

Lab : Configuring Printers

After completing this module, you will be able to:

  • Implement file access management in Windows 8.1.

  • Configure and manage shared folders.

  • Configure file compression in Windows 8.1.

  • Describe the purpose and functionality of OneDrive.

  • Configure and manage printers.

 

Module 8: Implementing Network Security

When computers are connected to a network, they are exposed to potential security threats. You need to formulate a strategy to protect your computers. User policies, antivirus software, encrypted network traffic, and other protective measures work together to help shield your Windows 8.1 computers from security threats. It also is important to identify possible threats and to optimize appropriate Windows-based network security features, such as Windows Firewall and Windows Defender.

Lessons

  • Overview of Threats to Network Security

  • Configuring Windows Firewall

  • Securing Network Traffic by Using IPsec

  • Guarding Windows 8.1 Against Malware

Lab : Configuring Inbound and Outbound Firewall Rules

Lab : Configuring IPsec Rules

Lab : Configuring Malware Protection

After completing this module, you will be able to:

  • Describe the threats to network security.

  • Configure Windows Firewall.

  • Secure network traffic by using Internet Protocol security (IPsec).

  • Guard Windows 8.1 against malware.

 

Module 9: Configuring Resource Access for Domain-Joined Devices and Devices That Are Not Domain Members

Before you can start working on a computer that is running the Windows 8.1 operating system, you must sign in. Signing in to a computer is a mandatory step, and based on your computer membership, you can sign in with a local account, a domain account, or a Microsoft account. In an Active Directory Domain Services (AD DS) environment, you typically would use a domain account exclusively because it has many benefits. However, in today’s world, users are not restricted to using company-owned computers only. They commonly use their own devices for accessing company data. Windows 8.1 and Windows Server 2012 R2 have several new features such as Workplace Join, Work Folders, and Remote Business Data Removal that are useful in such Bring Your Own Device (BYOD) scenarios. In this module, you will learn about the benefits of domain accounts and Windows 8.1 features that are useful when administrators need to control resource access for devices that are not domain members. You also will learn how to configure and use Workplace Join and Work Folders.

 

Lessons

  • Configuring Domain Access for Windows 8.1 Devices

  • Configuring Resource Access for Devices That Are Not Domain Members

  • Configuring Workplace Join

  • Configuring Work Folders

Lab : Configuring Resource Access for Devices That Are Not Domain Members

After completing this module, you will be able to:

  • Configure domain access for Windows 8.1 devices.

  • Configure resource access for devices that are not domain members.

  • Configure the Workplace Join feature in Windows 8.1.

  • Configure the Work Folders feature in Windows 8.1.

 

Module 10: Securing Windows 8.1 Devices

Users are becoming increasingly computer literate, and they expect more from the technology that they use at work. They expect to be able to work from home, from branch offices, and on the road without a decrease in their productivity or a loss of access to the programs and applications that they need most. As the needs of users have changed, the demands on information technology (IT) support professionals have increased. Today, support professionals need to provide more capabilities and to support greater flexibility while continuing to minimize security risks. In this module, you will explore features of the Windows 8.1 operating system that you can use to maintain a secure computer environment for your users, such as Encrypting File System (EFS), BitLocker Drive Encryption, and User Account Control (UAC).Lessons

  • Authentication and Authorization in Windows 8.1

  • Applying Security Settings by Using Group Policy

  • Securing Data with EFS and BitLocker

  • Configuring and Testing UAC

Lab : Implementing Local GPOs

Lab : Securing Data by Using BitLocker

Lab : Configuring and Testing UAC

After completing this module, you will be able to:

  • Implement authentication and authorization features in Windows 8.1.

  • Use Group Policy Objects (GPOs) to apply security settings.

  • Describe how to secure data with EFS and BitLocker.

  • Describe how to configure UAC.

 

Module 11: Configuring Applications for Windows 8.1

Computer users require applications for every task they perform, such as editing documents, querying databases, and generating reports. As part of administering the Windows 8.1 operating system, you need a strategy for deploying and managing the applications that users in your organization will run on their new Windows 8.1 computers and devices. Based on the specific needs of your organization, you can choose from a variety of methods to deploy and manage applications—from manual deployment methods to fully automated management technologies. You also need a strategy to handle the application compatibility issues that might arise when you try to run applications that were designed for older versions of Windows operating systems.

 

Lessons

  • Application Deployment Options in Windows 8.1

  • Managing Windows Store Apps

  • Configuring Internet Explorer Settings

  • Configuring Application Restrictions

Lab : Configuring Internet Explorer Security

Lab : Configuring AppLocker

After completing this module, you will be able to:

  • Describe application deployment options in Windows 8.1.

  • Install and manage Windows Store apps.

  • Configure and secure Internet Explorer.

  • Configure application restrictions.

 

Module 12: Optimizing and Maintaining Windows 8.1 Computers

Users have high expectations of technology. Therefore, performance is a key issue in today’s business environment, and it is important to consistently optimize and manage your systems’ performance. The Windows 8.1 operating system includes several monitoring and configuration tools that you can use to obtain information about computer performance, to maintain reliability, and to configure operating system and app updates.

Lessons

  • Optimizing Performance in Windows 8.1

  • Managing the Reliability of Windows 8.1

  • Managing Software Updates in Windows 8.1

Lab : Optimizing Windows 8.1 Performance

Lab : Maintaining Windows Updates

After completing this module, you will be able to:

  • Optimize performance in Windows 8.1.

  • Manage the reliability of Windows 8.1.

  • Manage software updates in Windows 8.1.

 

Module 13: Configuring Mobile Computing and Remote Access

Mobile computers are available in many types and configurations. This module includes descriptions of various available mobile devices and describes how you can synchronize them with a computer that is running the Windows 8.1 operating system. Additionally, this module describes various power options that you can configure in Windows 8.1.

Windows 8.1 helps end users become more productive, regardless of their location or that of the data they need. For users who want to use virtual private networks (VPNs) to connect to enterprise resources, new features in Windows 8.1 and Windows Server 2012 R2 create a seamless experience. You can use DirectAccess, VPN, and Remote Desktop functionality to enable users to access their work environments from anywhere they are connected.

Lessons

  • Configuring Mobile Computers and Device Settings

  • Overview of DirectAccess

  • Configuring VPN Access

  • Configuring Remote Desktop and Remote Assistance

Lab : Configuring a Power Plan

Lab : Implementing DirectAccess by Using the Getting Started Wizard

Lab : Implementing Remote Desktop

After completing this module, you will be able to:

  • Configure mobile computers and device settings.

  • Configure DirectAccess.

  • Configure VPN access.

  • Configure Remote Desktop and Remote Assistance.

 

Module 14: Recovering Windows 8.1

It is important to protect data on your computer from accidental loss or corruption. To recover from a problem, typically it is easier to restore system settings than to reinstall an operating system and apps. The Windows 8.1 operating system provides a number of features that you can use to protect important data files, in addition to tools that you can use to recover a computer that will not start or that starts with errors. You can use features such as File History, System Protection, and synchronization with Microsoft OneDrive (formerly known as SkyDrive) to protect your data. To support your users, it is important that you understand how to use these features and tools.

 

Lessons

  • Backing Up and Restoring Files in Windows 8.1

  • Recovery Options in Windows 8.1

Lab : Recovering Windows 8.1

After completing this module, you will be able to:

  • Back up and restore files in Windows 8.1.

  • Explain the use of recovery options in Windows 8.1.

 

Module 15: Configuring Client Hyper-V

Hyper-V is the primary platform for infrastructure virtualization. Hyper V enables multiple operating systems to run in individual virtual machines that share the same physical platform. Virtual machines can be isolated or connected to a network. This module will introduce you to Client Hyper V in Windows 8.1 and explain the fundamentals of working with virtual machines in a Client Hyper V environment.

 

Lessons

  • Overview of Client Hyper-V

  • Creating Virtual Machines

  • Managing Virtual Hard Disks

  • Managing Checkpoints

Lab : Configuring Client Hyper-V

After completing this module, you will be able to:

  • Describe the functionality and benefits of using Client Hyper V.

  • Create virtual machines.

  • Manage virtual hard disks.

  • Manage checkpoints.

 

Who should attend?

This course is designed for experienced IT professionals with the responsibility of administering and supporting Windows 8.1 PCs, devices, users, and associated network and security resources. This course is also intended to provide foundation configuration skills for Enterprise Desktop/Device Support Technicians (EDSTs) who provide Tier 2 Support to users running Windows desktops and devices in Windows domain environments in medium and large enterprise organisations.

 

Pre-requisites

In addition to their professional experience, students who attend this training should already have the following technical knowledge:

  • Networking fundamentals, including Transmission Control Protocol /Internet Protocol (TCP/IP), User Datagram Protocol (UDP), and Domain Name System (DNS)

  • Microsoft Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management

  • Understanding of the Public Key Infrastructure (PKI) components and working knowledge of the fundamentals of Active Directory Certificate Services (AD CS)

  • Microsoft Windows Server 2008 or Windows Server 2008 R2 fundamentals

  • Microsoft Windows Client fundamentals; for example, working knowledge of Windows XP, Windows Vista, and/or Windows 7

  • Fundamentals of management and experience using the Microsoft Office 2010 system or the Microsoft Office 2007 system

  • Windows Automated Installation Kit (WAIK) components including Windows PE, Windows SIM, VAMT, ImageX, USMT, and DISM concepts and fundamentals

Yes, we are fully accredited by Microsoft as a Microsoft Silver Partner for this Windows Operating System Fundamentals training course.
Our trainers have years of experience and are experts in their fields.
The Knowledge Academy have a range of training locations across the UK and the world, making it easy to find a training venue near you.

Configuring Windows 8.1 (M20687) Exam

The exam for this course (70-687) has been withdrawn by Microsoft.

Dates & Prices

Select your preferred delivery method

Choose a Region

Choose a Location

Choose a Month

Office Icon Attend your course from the office or home
Trainers Icon Interactive support from experienced trainers
Simple Icon Simple to setup and easy to use on any device
Sydney
Mon 27th May 2019
Places available
$5995
Brisbane
Mon 3rd Jun 2019
Places available
$5995
VirtualLive Virtual
Mon 17th Jun 2019
Places available
$5995
Adelaide
Mon 17th Jun 2019
Places available
$5995
Melbourne
Mon 24th Jun 2019
Places available
$5995
Canberra
Mon 1st Jul 2019
Places available
$5995
VirtualLive Virtual
Mon 15th Jul 2019
Places available
$5995
Perth
Mon 22nd Jul 2019
Places available
$5995
Sydney
Mon 29th Jul 2019
Places available
$5995
Brisbane
Mon 5th Aug 2019
Places available
$5995
Adelaide
Mon 12th Aug 2019
Places available
$5995
VirtualLive Virtual
Mon 19th Aug 2019
Places available
$5995
Melbourne
Mon 19th Aug 2019
Places available
$5995
Canberra
Mon 2nd Sep 2019
Places available
$5995
VirtualLive Virtual
Mon 16th Sep 2019
Places available
$5995
Perth
Mon 23rd Sep 2019
Places available
$5995
Sydney
Mon 30th Sep 2019
Places available
$5995
Adelaide
Mon 14th Oct 2019
Places available
$5995
VirtualLive Virtual
Mon 21st Oct 2019
Places available
$5995
Melbourne
Mon 21st Oct 2019
Places available
$5995
Brisbane
Mon 28th Oct 2019
Places available
$5995
Canberra
Mon 4th Nov 2019
Places available
$5995
VirtualLive Virtual
Mon 11th Nov 2019
Places available
$5995
Perth
Mon 11th Nov 2019
Places available
$5995
Sydney
Mon 25th Nov 2019
Places available
$5995
Brisbane
Mon 2nd Dec 2019
Places available
$5995
VirtualLive Virtual
Mon 9th Dec 2019
Places available
$5995
Adelaide
Mon 9th Dec 2019
Places available
$5995
Melbourne
Mon 16th Dec 2019
Places available
$5995

Complete the steps below to receive a quote or more information

How will you be funding your training?

Self funding

Company funding

Not sure

Key points about this course


Duration: 5 Days*

Accredited: Yes


Why choose TKA logo


Gold Tag

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

Trusted Icon

Trusted & Approved

The Knowledge Academy are a Microsoft Silver Partner and therefore fully accredited.

Delivery Icon

Various delivery methods

Flexible delivery methods are available depending on your learning style.

Resource Icon

Resources

Resources are included for a comprehensive learning experience.

Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

Google Logo
Samsung Logo
Shell Logo

"...the trainer for this course was excellent. I would definitely recommend (and already have) this course to others."

Diane Gray, Shell

bannerimg

One day only deals!