2. ObjectivesObjectives
Objective Domain Matrix
Technology Skill Objective Domain Description Objective Domain
Number
Understanding Local versus Network
Applications
Understanding Local versus Network
Applications
3.1.1
Removing or Uninstalling an Application Removing or Uninstalling Applications 3.1.3
Understanding Group Policy and Application
Installation
Understanding Group Policy 3.1.2
Understanding Service Startup Types Understanding Service Startup Types 3.4.1
Understanding Service Accounts Understanding Service Accounts 3.4.2
Understanding Service Dependencies Understanding Service Dependencies 3.4.3
Understanding MSCONFIG Understanding MSCONFIG 1.3.5
Understanding FAT, FAT32, and NTFS Understanding FAT, FAT32, and NTFS 4.1.1
Adding Multiple Local Locations to a Library Adding Multiple Local Locations to a Library 4.4.2
Adding Networked Locations Adding Networked Locations 4.4.3
Understanding Encrypting File System (EFS) Understanding Encrypting File System (EFS) 4.3.2
Understanding Security (Encryption) Understanding Security (Encryption) 5.2.2
Understanding Compression Understanding Compression 4.3.3
Understanding BitLocker Understanding BitLocker 4.3.1
3. Installing and Managing ApplicationsInstalling and Managing Applications
• An application is a program that:
– Runs “on top” of the operating system or
from a server
– Helps a user perform a specific task, such as
word processing, appointment scheduling, or
accounting
4. Installing and Managing ApplicationsInstalling and Managing Applications
• Applications installed at the local level or the
network level
– Local installation = software files running
directly from a computer
– Network installation = software files are
made available from an application server on
a network
6. Applications Installed over a NetworkApplications Installed over a Network
• Group Policy
• Active Directory
• Group Policy objects (GPOs)
7. Assigning/Publishing ApplicationsAssigning/Publishing Applications
• Windows 2008 R2 Active Directory Domain
Services (AD DS) uses Group Policy to push
applications to users or computers.
• Using Group Policy, you can assign or
publish an application to all users or
computers in a designated site, domain,
organizational unit (OU), or to a local,
individual user or computer.
8. Assigning ApplicationsAssigning Applications
• If Group Policy assigns software on each
computer, the software is installed the next
time the computer starts and any users with
the correct permissions who log on to the
computer may run the software.
• If Group Policy assigns software to users, the
next time an authorized user clicks the
Microsoft Office shortcut or menu item (for
example), the software installs on the user’s
computer and Office opens.
9. Publishing ApplicationsPublishing Applications
• Group Policy can publish an application to
users.
– The next time a user logs on, he can choose
to install the software from a dialog box that
appears.
10. ServicesServices
• Run in the background on a Windows
system to help the operating system run
other programs
• Services console is the central management
point of services in Windows Vista and
Windows 7
18. MSCONFIGMSCONFIG
• Also known as the System Configuration
Utility
• Lets you:
– Enable or disable startup services
– Set boot options such as booting into Safe
Mode
– Access tools like Action Center and Event
Viewer
– More
28. File SystemsFile Systems
• FAT, FAT32, and NTFS
• NTFS-formatted disks best for Windows 7
• Can convert from one file system to another
• Some conversions destroy existing data
31. Windows 7 LibrariesWindows 7 Libraries
• A virtual folder that can display content from
different locations (folders, for example) on
your computer or an external drive
• Looks like an ordinary folder but simply
points to files and folders that are located
elsewhere
38. EncryptionEncryption
• Encrypted data is “scrambled” but still
readable and usable by the user who
encrypted the file
• That user and other authorized users can
open and change the file as necessary
• Unauthorized users who try to open the file
or copy it receive “Access Denied” message
39. EncryptionEncryption
• Only the original owner and the computer’s
designated recovery agent can access
encrypted files
• Encryption uses:
– Encryption keys
– Certificates
40. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Encrypting File System (EFS)
– Encrypts information on hard disks, external
flash disks, CDs, DVDs, backup tapes, and
other types of physical media
• Users can enforce encryption on data files,
folders, and entire drives
41. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Advanced Attributes dialog box enables
users to encrypt files and folders
42. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Encrypted (EFS) files and folders are
displayed in green in Windows Explorer
45. CompressionCompression
• The process of decreasing the size of files or
folders without affecting the files’ content
• Decreases large files that would otherwise
use a lot of storage space
• Compressing files replaces repeated data
with pointers to the data; pointers take up
much less space than the repeated data, so
the size of the file is reduced
46. Compressing Files and Folders in Windows 7Compressing Files and Folders in Windows 7
• Advanced Attributes dialog box enables
users to compress files and folders
47. BitLocker Drive EncryptionBitLocker Drive Encryption
• Encrypts an entire fixed disk to prevent
access by unauthorized users
• BitLocker To Go protects removable drives,
such as external flash drives
• BitLocker is available in Windows Ultimate
and Enterprise editions only
49. SummarySummary
• You install applications, or programs, at the local
level or the network level.
• Use Control Panel to uninstall a local application.
• Group Policy lets you control who can install
software, and on which computers, and helps you
push software updates and security configurations
across the network.
• Services run in the background on a Windows
system to help the operating system run other
programs.
50. SummarySummary
• Use MSCONFIG (System Configuration utility) to
troubleshoot and diagnose startup problems.
• The three primary types of file systems for Windows
are FAT, FAT32, and NTFS.
• A library is a virtual folder that points to resources.
• Encrypting files and folders protects them from
unwanted access. Microsoft uses the Encrypting
File System (EFS) and BitLocker.
• Compression reduces the size of files and folders
without affecting their content.
Editor's Notes
The network method, along with Group Policy, gives an administrator more efficient control over who can use the software and who can remove it.
Explain that in a Windows network in a domain environment, administrators can use Group Policy to ease the burden of administering and managing many users and client computers. Group Policy lets you control who may install software, and on which computers, and helps you push software updates and security configurations across the network. Group policies also exist in Windows 7 and other Windows operating systems. They are referred to as Local Group Policies and affect only the users who log on to a particular computer. This section focuses on Group Policy at the network domain level.
Service startup types: Automatic (Delayed Start): The service starts approximately two minutes after the system has completed starting the operating system. Automatic: The service starts as the operating system starts. Manual: The service must be started manually, by a user, a dependent service, or a program. Disabled: The service is disabled and will not start.
After changing options on the Startup tab, the Selective startup option is enabled on the General tab.
The Disk Management MMC snap-in displays disks and partitions, and the file system in use.
Libraries are accessed in Windows Explorer, just like files and folders. Windows 7 includes several default libraries: Documents, Music, Pictures, and Videos.
When you add new files to a BitLocker-encrypted disk, the files are encrypted automatically. If you copy the files to another drive, BitLocker automatically decrypts the files, which means they’re no longer protected. Some computers have a Trusted Platform Module (TPM) chip on the motherboard. If the chip is present, BitLocker uses the TPM chip to protect the BitLocker keys.