Windows 8

1. Windows 8 2. Module 1 - Installing and Deploying Windows 8. 3. Windows 8 editions. 4. Advantage of 64 bit Processor. 5. Minimum hardware requirement for Windows 8 6. Option for installing Windows 8 7. Installation of Windows 8 8. Upgrading and Migrating to Windows 8 9. What is Upgrading 10. What is Migration 11. Migrating User Data and Settings 12. Migrating using USMT ( User State Migration Tool ) 13. MBR - Master Boot Record 14. GUID - GPT Disk. 15. Disk Management tools. 16. Simple Volume 17. Spanned and Striped Volumes 18. Maintaining Disks, Partitions, and Volumes 19. Disk Quota 20. Device Driver in Windows 8 21. System Restore 22. LAST KNOWN GOOD CONFIGURATION 23. Configure and Trouble shoot Network Connections 24. What is an IPv4 Address 25. Default Gateway 26. Public and Private IPv4 Address 27. IPv6 Network Connectivity 28. IPv4 Address can be assigned by following types 29. Implementing Name Resolution 30. Trouble Shooting Network Connectivity 31. Implementing Wireless Security 32. Wireless network Technologies 33. What is Wireless Broadband? 34. IEEE 802.11 35. Wireless Network Configuration 36. Security Types 37. Implementing Network Security. 38. Configuring Windows Firewall 39. Ports and Application 40. Important Application, Protocol and Port Number 41. Configure Inbound and Outbound Rules 42. Securing Network traffic 43. Configuring Windows Defender 44. Managing File Access 45. NTFS Standard permission for FOLDER 46. Preventing Permission Inheritance 47. Different ways to Share Folder 48. RULE for setting NTFS + SHARE PERMISSION 49. Managing Printers 50. SkyDrive 51. Securing Windows 8 Desktop 52. User Account Types and Rights 53. Windows Authentication Methods 54. Important Security Features in Windows 8 55. Managing EFS Certificates 56. BitLocker 57. Configuring BitLocker To Go 58. UAC - User Account Control 59. Configuring Application. 60. Application Compatibility Issue 61. Resolve Common Application Compatibility Issues 62. Office 365 63. Windows Store 64. LOB (Line Of Business) and Sideloading 65. Configuring Internet Explorer Settings 66. AppLocker 67. Optimizing and Maintaining Windows 8 Client Computers 68. Performance Monitor 69. Commonly used Performance Counters 70. Resource Monitor 71. Managing Reliability of Windows 8 72. Managing Windows 8 Updates 73. Configuring Mobile Computing and Remote Access 74. Tools for Configuring Mobile Computers and Device Setting 75. Configure VPN Access 76. Data encryption 77. VPN Tunneling Protocols 78. Configure Remote Desktop and Remote Assistance 79. Remote Assistance 80. DirectAccess 81. Hyper-V 82. VHD 83. Managing Snapshot 84. Troubleshooting and Recovery Options for Windows 8 85. Enable and configure Windows 7 File Recovery 86. Advance Troubleshoot now option 87. Windows 8 System Restore 88. Using Windows PowerShell
Pr.Pg Next Pg

Configuring Windows Defender tutorials

  • Windows Defender guards your PC against viruses, spyware, and other malicious or potentially unwanted software in real time. 

  • Windows Defender uses definitions to determine if software is unwanted and accordingly it alters you to potential risk.

  • These definition files are updated automatically, you can update definition files manually.


Windows Defender

  • Open Setting Charm from Desktop and click Control Panel.

  • In View by select Large Icons.

  • Locate and click on Windows Defender.

  • Home panel will help us to scan computer and it gives three scan options.

Number 1) Quick - this option check the area that are usually infected by malicious software, viruses, spyware and unwanted software.

Number 2) Full Scan - this option scan all the files and programs on hard disk.

Number 3) Custom Scan - This option help user to scan selected Drive and Folders.

  • When you run Windows Defender Scan, it display progress and when it comes across any malicious or harmful file, it moves the file to Quarantine area.

  • Update Tab will help to update Windows Defender definition files manually. When you click Update button, it searches for latest update and install it on computer.

  • From the History Tab of Windows defender, you can view Quarantined items (that is items that were prevented from running but not deleted from computer), Allowed Items as well as all Deleted items.

  • Setting Tab - this tab gives following options.

  • Turn On or Off - Real time protection. When it is Turned on it will alter you whenever malicious or unwanted program attempts to install on your computer.

  • Exclude files and location option helps you to specify files that are excluded during scan option. This option can speed up scan option but it may leave your computer less protected.

  • Exclude processes - you can specify processes that are excluded during scan option. This option can speed up scan option but it may leave your computer less protected.

  • Advance - this option give five additional option to scan, they are

  • Scan Archive File - Enabling this option will scan .zip, .rar and .cab file

  • San removable drive - Enabling this option will scan USB Pen drive during full scan option.

  • Create a System Restore point - this this option before deleting or quarantining files.

  • Allow all users to view the full history result - this option will allow all users to see all deleted files items from all users on the history tab. If you donít enable it, user will see only files related to their files only.

  • Remove Quarantined files after time duration from 1 day to 3 month. This option will specify time period for removing quarantined files.

  • Windows Defender uses green, yellow, and red color codes to show your PCís security status.


Configuring File access and Printer for Windows 8 Clients.

  • In this module we will learn about

  • Managing File Access.

  • Managing Shared Folder.

  • Configuring File Compression.

  • Managing Printers.

  • And SkyDrive Overview.

Authentication and Authorization



Who are you? Authentication is the process used to confirm the user, when he or she tries to login to access a computer system.

  • Most common authentication method used is Username and Password.

  • Other method includes digital certificates, Smart Card, Biometrics or Picture.

  • Authentication usually precedes Authorization.



What you can do?. Authorization allows a system to determine what a Authenticated user can access.

  • It also includes Folders and files System, Hours of Access, Quota of Hard disk and so on.

  • NTFS and Shared permission decides what user can access.


Note : -

  • Anonymous User can have Authorization without Authentication.

  • They can be granted limited permission without authentication.

Pr.Pg border                                              Next Pg