Windows 8

1. Windows 8 2. Module 1 - Installing and Deploying Windows 8. 3. Windows 8 editions. 4. Advantage of 64 bit Processor. 5. Minimum hardware requirement for Windows 8 6. Option for installing Windows 8 7. Installation of Windows 8 8. Upgrading and Migrating to Windows 8 9. What is Upgrading 10. What is Migration 11. Migrating User Data and Settings 12. Migrating using USMT ( User State Migration Tool ) 13. MBR - Master Boot Record 14. GUID - GPT Disk. 15. Disk Management tools. 16. Simple Volume 17. Spanned and Striped Volumes 18. Maintaining Disks, Partitions, and Volumes 19. Disk Quota 20. Device Driver in Windows 8 21. System Restore 22. LAST KNOWN GOOD CONFIGURATION 23. Configure and Trouble shoot Network Connections 24. What is an IPv4 Address 25. Default Gateway 26. Public and Private IPv4 Address 27. IPv6 Network Connectivity 28. IPv4 Address can be assigned by following types 29. Implementing Name Resolution 30. Trouble Shooting Network Connectivity 31. Implementing Wireless Security 32. Wireless network Technologies 33. What is Wireless Broadband? 34. IEEE 802.11 35. Wireless Network Configuration 36. Security Types 37. Implementing Network Security. 38. Configuring Windows Firewall 39. Ports and Application 40. Important Application, Protocol and Port Number 41. Configure Inbound and Outbound Rules 42. Securing Network traffic 43. Configuring Windows Defender 44. Managing File Access 45. NTFS Standard permission for FOLDER 46. Preventing Permission Inheritance 47. Different ways to Share Folder 48. RULE for setting NTFS + SHARE PERMISSION 49. Managing Printers 50. SkyDrive 51. Securing Windows 8 Desktop 52. User Account Types and Rights 53. Windows Authentication Methods 54. Important Security Features in Windows 8 55. Managing EFS Certificates 56. BitLocker 57. Configuring BitLocker To Go 58. UAC - User Account Control 59. Configuring Application. 60. Application Compatibility Issue 61. Resolve Common Application Compatibility Issues 62. Office 365 63. Windows Store 64. LOB (Line Of Business) and Sideloading 65. Configuring Internet Explorer Settings 66. AppLocker 67. Optimizing and Maintaining Windows 8 Client Computers 68. Performance Monitor 69. Commonly used Performance Counters 70. Resource Monitor 71. Managing Reliability of Windows 8 72. Managing Windows 8 Updates 73. Configuring Mobile Computing and Remote Access 74. Tools for Configuring Mobile Computers and Device Setting 75. Configure VPN Access 76. Data encryption 77. VPN Tunneling Protocols 78. Configure Remote Desktop and Remote Assistance 79. Remote Assistance 80. DirectAccess 81. Hyper-V 82. VHD 83. Managing Snapshot 84. Troubleshooting and Recovery Options for Windows 8 85. Enable and configure Windows 7 File Recovery 86. Advance Troubleshoot now option 87. Windows 8 System Restore 88. Using Windows PowerShell
Pr.Pg Next Pg

Performance Monitor tutorials

  • Performance Monitor is used to examine how the programs that you run can affect your computer's performance, both in real time, and by collecting log data for later analysis.

  • To start the Performance Monitor, click Advanced Tools in the Performance Information and Tools page.

  • There are three tools under Performance Monitor:

             1)        Monitoring Tools

             2)        Data Collector Sets

             3)        Reports

 

Monitoring Tool

  • Expand it and it content Performance Monitor. This tool provides a visual display of built-in Windows Performance Counter..

 

Performance Monitor

  • You can use Performance Monitor to examine how programs you run affect your computer’s performance, both in real time and by collecting data for later analysis.

  • You can add performance counter to the performance monitor by clicking Ě ADD button.

  • You can even view performance monitor in Line Graph, Histogram Bar or Report.

 

Data Collector Set

  • The Data Collector Set is a custom set of performance counters, event traces, and system-configuration data.

  • You can save combination of data collectors as a data collector set, and then run and view the results.

  • A data collector set organizes multiple data-collection points into a single, portable component.

  • You can configure a Data Collector Set to generate alerts when it reaches thresholds.

  • You also even configure it to run at a scheduled time, for a specific time, or until it reaches a predefined size.

  • Performance Monitor also includes default data collector set templates to help system administrators begin the process of collecting performance data specific to a server role or monitoring scenario.

 

Reports

  • Use the Reports option to view and generate reports from a set of counters that are created by you using Data Collector Sets.

 

Exercise Analyze System Performance by using Data Collector Sets and Performance Monitor.

  • Right click on Computer, Select Properties and select Performance Information and Tools, Click on Advanced tools, and then click Open Performance Monitor

  • Or Click on Start screen and type perfmon.msc and press Enter key.

  • In the Performance Monitor window, click the Performance Monitor node. Notice that only % Processor Time is displayed by default.

  • Click the Ě Add symbol in the toolbar to add an additional counter.

  • In the Select Counters from computer - select <local Computer> and Available counters area, select and expand PhysicalDisk, and then click % Idle Time.

  • In the Instances of selected object box, click 0 C:, click Add, and then click OK.

  • Right-click % Idle Time, and then click Properties.

  • In the Color box, click Blue color, and then click OK.

  • In the left pane, select and expand Data Collector Sets, and then click User Defined.

  • Right-click User Defined, point to New, and then click Data Collector Set.

  • In the Name box, type CPU, Disk and Memory Activity, and then click Next.

  • In the Template Data Collector Set box, click Basic, and then click Next. We recommend that you use a template.

  • Click Next to accept the default storage location for the data.

  • Click Open properties for this data collector set, and then click Finish. On the General tab, you can configure general information about the data collector set and the credentials that the data collector set uses when it is running.

  • Click the Directory tab. This tab lets you define information on how the collected data is stored.

  • Click the Security tab. This tab lets you configure which users can change this data collector set.

  • Click the Schedule tab. This tab lets you define when the data collector set is active and collecting data.

  • Click the Stop Condition tab. This tab lets you define when data collection is stopped, based on time or data that is collected.

  • Click the Task tab. This tab lets you run a scheduled task when the data collector set stops. You can use this to process the collected data.

  • Click Cancel. Notice that there are three kinds of logs in the right pane:

Performance Counter collects data that you can view in the Performance Monitor.

Kernel Trace collects detailed information about system events and activities.

Configuration records changes to registry keys.

  • In the right pane, double-click Performance Counter. Notice that all Processor counters are collected, by default.

  • Click Add.

  • In the Available counters area, click PhysicalDisk, click Add, and then click OK. All the counters for the PhysicalDisk object are now added.

  • Similarly In the Available counters area, click Memory, click Add, and then click OK. All the counters for the Memory object are now added.

  • Click OK.

  • In the left pane, right-click CPU, Disk and Memory Activity, and then click Start.

  • Wait for one minute and then click Stop. This will create report. To view report, Right-click on CPU, Disk and Memory Activity and then select Latest Report. This report will display information in summary, Application counters, CPU. Disk, Configuration and Report Statistics.

  • Click on Application Counters and then click on Processor, Physical Disk or Memory from open window. All summery will be displayed for Counter we set earlier.


Pr.Pg border                                              Next Pg