Domain 01 1102
Home: This edition is designed for personal use and supports basic features suitable for everyday tasks. It does not include advanced networking capabilities, making it unsuited for workgroup environments. Ideal for casual users, it focuses on a simplified user interface and essential applications.
Pro : Aimed at small businesses and professionals, this edition includes features that support network management and enhanced security. It allows domain access and provides functionalities like Remote Desktop, making it suitable for workgroup environments. Users benefit from additional tools such as BitLocker for drive encryption and group policy management.
Pro for Workstations: This edition extends the Pro functionality with support for high-performance workloads and advanced hardware configurations. It caters to power users, offering features such as ReFS (Resilient File System) for improved data integrity and faster file access. Designed for intensive tasks, it supports higher RAM capacities and multiple CPUs.
Enterprise: Tailored for larger organizations, this edition includes additional security and networking features on top of the Pro edition capabilities. It provides advanced deployment and management tools, along with robust data protection features like Windows Defender Advanced Threat Protection (ATP). Enterprise users can access extensive support and customization options, suitable for complex workgroup environments.
WorkGroup Access Directory Featured
Home doesn't include advanced network capabilities, unsuitable for work envoirnments, for casual users,simple interface.
Domain Access Directory Featured
Pro is for small businesses & profess, supports network mgmt & work group environments includes BitLocker
PRO WRKSTN: Extends the pro Func, Fet: ReFS, Improved Data integrity & Faster File Access,Intensive task,+Ram/CPU
ENTPRS: Larger Organizations, additional Security/NetworkFunc,WindowsDef(ATP) Access extensive support & customization options, complex workgroup envoirments
Home: This edition is designed for personal use and supports basic features suitable for everyday tasks. It does not include advanced networking capabilities, making it unsuited for workgroup environments. Ideal for casual users, it focuses on a simplified user interface and essential applications.
Pro : Aimed at small businesses and professionals, this edition includes features that support network management and enhanced security. It allows domain access and provides functionalities like Remote Desktop, making it suitable for workgroup environments. Users benefit from additional tools such as BitLocker for drive encryption and group policy management.
Pro for Workstations: This edition extends the Pro functionality with support for high-performance workloads and advanced hardware configurations. It caters to power users, offering features such as ReFS (Resilient File System) for improved data integrity and faster file access. Designed for intensive tasks, it supports higher RAM capacities and multiple CPUs.
Enterprise: Tailored for larger organizations, this edition includes additional security and networking features on top of the Pro edition capabilities. It provides advanced deployment and management tools, along with robust data protection features like Windows Defender Advanced Threat Protection (ATP). Enterprise users can access extensive support and customization options, suitable for complex workgroup environments.
WorkGroup Access Directory Featured
Home doesn't include advanced network capabilities, unsuitable for work envoirnments, for casual users,simple interface.
Domain Access Directory Featured
Pro is for small businesses & profess, supports network mgmt & work group environments includes BitLocker
PRO WRKSTN: Extends the pro Func, Fet: ReFS, Improved Data integrity & Faster File Access,Intensive task,+Ram/CPU
ENTPRS: Larger Organizations, additional Security/NetworkFunc,WindowsDef(ATP) Access extensive support & customization options, complex workgroup envoirments
Feature differences
-Domain access vs. workgroup: Pro, Pro for Workstations, and Enterprise editions enable domain access, allowing centralized management of devices in a corporate environment. The Home edition operates in a workgroup setup, limiting network-based resource allocations and management functionalities. Domain access provides IT administrators with control over user permissions and offers enhanced security measures.
Domain Access: allows centralized mgmt of devices in a corporate envoirment. Permission & Security Measures incl.
Work Group Access: Limits network based resource allocations & Mgmt Funct.
- Desktop styles/user interface: While all editions feature a similar core user interface, Pro and Enterprise editions may offer customization options that improve productivity for enterprise users. Home edition focuses on a more simplified and user-friendly interface that appeals to everyday users. Feature differences in UI may include advanced settings and tools for managing connected devices in workgroup environments.
: Pro& Enterprise has Cutomz, opt’s that improve productivity for enterprise user, Ui for managing multiple devices.
- Availability of Remote Desktop Protocol (RDP): The Pro, Pro for Workstations, and Enterprise editions include the Remote Desktop feature, allowing users to connect to their computers from remote locations. This capability is not available in the Home edition, making it less suitable for those needing remote access for work. RDP is essential for professionals requiring mobility and flexibility in accessing their workspace securely.
RDP: All Access Domain Editions incd:RDP Connect to their computers remotely, essential for secure mobility.
- Random-access memory (RAM) support limitations: Each edition has different limits on the amount of RAM it can support; Home is limited, while Pro, Pro for Workstations, and Enterprise editions support significantly larger capacities. Pro for Workstations can handle massive amounts of RAM, which is essential for demanding applications and multitasking. This enables higher performance in scenarios like data analysis, graphic design, and programming.
RAM Limits: Home is Limited/Accs Domain Editions support larger capabilities, handle massive amounts of RAM
- BitLocker: BitLocker drive encryption is available in Pro, Pro for Workstations, and Enterprise editions, providing enhanced security for sensitive data. The Home edition lacks this feature, which limits its ability to protect data in case of theft or unauthorized access. BitLocker's integration allows organizations to comply with data protection regulations by safeguarding their information.
BitLocker incld: in all Domain Access Groups provides drive encryption, not included in home/workgroup.
- gpedit.msc: Group Policy Editor (gpedit.msc) is available only in the Pro, Pro for Workstations, and Enterprise editions, allowing advanced system configuration and user management. This tool is vital for IT administrators in a workgroup setting to enforce policies and control settings across multiple machines. The absence of gpedit.msc in the Home edition means it lacks many advanced administration capabilities.
Group Policy Editor (gpedit.msc): ACCS DOM Ent: advanced config in a workgroup setting to enforce policies & control over multiple machines.
Upgrade paths
- in-place upgrade: Windows 10 allows for in-place upgrades, where users can upgrade to a more advanced edition without needing a clean installation. This upgrade retains personal files, applications, and settings, making the transition smoother for users. The availability of such paths simplifies the process for users wanting to enhance their system capabilities without extensive setup efforts.
In-place upgrades: upgrade editions w/out needing a clean installation, retains file, apps, settings, simple process w/out extensive setup efforts.
Exam support for 1.1
Know all the feature differences of the editions(which are included and not included)
Pro, Pro for workstations, Enterprises use Active Directory: Giving you permission to access computer, & networks
Active Directories have domains, needing domain access,
Know the upgrade path
Home edition uses workgroup access
Know 32 versus 64 bit
1.2 Operating Systems
Navigation Commands:
cd: Change directory to navigate between folders
-IE: change from C Drive to a Local USB Drive
dir: Display a list of files and directories in the current directory.
dir /A: Lists all files including hidden files in the current directory.
dir /B: Displays a bare list of files and directories without any additional information.
dir /O:N: Sorts files by name
md: Create a new directory (folder).
rmdir: Remove an empty directory( folder).
Drive navigation inputs: Switch between different drives (e.g., C:, D:, X:).
Command-line Tools:
ipconfig: Display network configuration information about your network configuration and refresh DHCP and DNS Settings. By default, the ipconfig command displays your IP Address, Subnet Mask, and default gateway.
ping: Test network connectivity to a specific host.
hostname: Display the current computer's hostname.
netstat: Display network statistics and connections. To see statistics for all protocols, type netstat -s and press Enter. To limit the display to just IP statistics, type netstat -ps IP and press Enter.
nslookup: Query Domain Name System (DNS) servers.
chkdsk: Check a disk for errors and repair them.
net user: Manage user accounts on a network.
net use: Manage network connections.
format: Format a disk drive.
xcopy: Copy files and directories, including subdirectories.
copy: Copy files and directories.
robocopy: Robust file copy utility with advanced features.
gpupdate: Update Group Policy settings.
gpresult: Display Group Policy information.
shutdown: Shut down the computer.
sfc: System File Checker, verifies and repairs system files.
[command name] /?: Display help information for a specific command.
diskpart: Manage disk partitions and volumes.
pathping: Diagnose network connectivity issues along a route.
winver: Display Windows version and build number.
Practice in the command line
*Command line all switches ie: ip config
Exam support for 1.2
1.3 Operating Systems
Task Manager:
Services: View and manage system services
Startup: Manage applications and services that start automatically.
Performance: Monitor system performance metrics like CPU, memory, and disk usage.
Processes: View and manage running processes.
Users: View and manage user accounts on the system.
Microsoft Management Console (MMC) Snap-ins:
Event Viewer: View and manage system and application logs.
Disk Management: Manage disk partitions and volumes.
Task Scheduler: Schedule tasks to run automatically.
Device Manager: View and manage hardware devices.
Certificate Manager: Manage digital certificates.
Local Users and Groups: Manage local user and group accounts.
Performance Monitor: Monitor system performance in detail.
Group Policy Editor: Configure Group Policy settings.
Additional Tools:
System Information: View detailed system hardware and software information.
Resource Monitor: Monitor system resource usage in real-time.
System Configuration: Configure system startup settings.
Disk Cleanup: Remove unnecessary files to free up disk space.
Disk Defragmenter: Optimize disk performance by reorganizing file fragments.
Registry Editor: Edit the system registry, but use caution as incorrect modifications can cause system instability. Database for configurations.
1.4 Operating Systems
Internet Options:
Configure Internet Explorer settings, including security zones, privacy settings, and browsing history. Manage cookies, ActiveX controls, and Java applets. Customize the appearance and behavior of Internet Explorer.
Devices and Printers:
View and manage connected devices like printers, scanners, and other hardware. Add or remove devices, troubleshoot device issues, and configure device settings. Set default printers and manage print queues.
Programs and Features:
View and manage installed programs and software updates. Uninstall programs, modify program settings, and view installed updates. Access Windows Features to enable or disable optional components.
Network and Sharing Center:
View and manage network connections, both wired and wireless. Configure network settings, share files and printers, and troubleshoot network problems. Set up homegroups and public or private network profiles.
System:
View and manage basic system information, such as system type, processor speed, and installed memory. Access advanced system settings, including device drivers, hardware profiles, and system protection. Configure system performance settings, such as virtual memory and processor scheduling.
Windows Defender Firewall:
Configure Windows Firewall settings to protect your computer from unauthorized network access. Create firewall rules to allow specific programs or services through the firewall. View and manage active threats and security alerts.
UAC User Account Control: Security alert when downloading or changing something on the operating system. A detailed windows security feature designed to protect the operating system from unauthorized changes.
Mail:
Configure email accounts, including POP3, IMAP, and Exchange accounts. Manage email messages, send and receive emails, and set up email notifications. Configure email client settings, such as fonts, colors, and message formatting.
Sound:
Configure audio devices, adjust volume levels, and test sound output. Set default audio devices, configure playback and recording devices, and troubleshoot sound problems. Customize sound schemes and notification sounds.
User Accounts:
Manage user accounts on your computer, including creating, modifying, and deleting user accounts. Set user account passwords, assign user rights, and manage family safety settings. Configure user account control settings to protect your computer from unauthorized changes.
Device Manager: View and manage hardware devices connected to your computer. Update device drivers, troubleshoot device issues, and disable or uninstall devices. Configure device settings and power management options.
Indexing Options: Configure Windows Search to improve search performance. Customize indexed locations, exclude specific files or folders, and rebuild the index. Optimize search results and troubleshoot indexing issues.
Administrative Tools:
Access advanced system administration tools, including Computer Management, Services, and Performance Monitor. Manage system services, view system performance metrics, and configure system policies.
File Explorer Options:
Show hidden files: Display hidden files and folders. Can make hidden file extensions visible. Hide file extensions for known file types.
General options: Configure folder behavior, such as opening folders in a new window or tab. Within the general tab as well look for a setting related to “browse folders” or “open each folder in” which will allow you to select whether folders open in the same window, a new window or a tab. Depending on the operating system, the exact wording & location of this setting might vary slightly.
View options: In view options you can customize the appearance of folders and files. This “view option” can modify the icon size & details pane. As well as modifying the preview pane icon size.
Power Options:
Hibernate: “Hibernate in windows 10 power options means to save the current state of your computer, including all open applications and files, to your hard disk and then completely turn off the computer. Save system state to disk and turn off the computer. “Hibernate” essentially puts the hard disk drive into a “suspended” state where you can quickly resume work when you turn it back on.
Power plans: Windows 10 power plan is a set of system and hardware settings that manages how your computer uses power. You can choose between power plans to balance performance and power consumption. These choice options are predefined plans that are enabled for customizable to your admins liking.
Sleep/suspend: In Windows 10 “sleep/suspend” refers to a feature that temporarily pauses all system activity to conserve power, essentially putting the computer into a low-power state while still keeping open applications Temporarily suspend system activity to save power. This was previously known as the “sleep” feature.
Standby: The standby feature is similar to sleep, but with faster resume times. In the standby feature option the computer isn't “shutting down.” In Windows 10, standby is essentially the same as “sleep” mode, meaning the computer does enter a low power-state while preserving your current work session in memory, allowing for quick resume when wake it up; the key difference is that “standby” might sometimes refer to a specific power setting with potentially even faster resume times depending on your hardware configuration, though the functionality is largely the same as sleep mode.
Universal Serial Bus (USB) selective suspend: “USB selective suspend” refers to a feature in an operating system like window that allow the computer to automatically put a connected USB device into a low-power state when it's not actively being used. Automatically suspend USB devices to save power.
Ease of Access:
This setting is a set of customizable features on a computer system designed to help with disablilites by adjusting settings like “Keyboard functionality.” mouse behavior, display visuals (text size, color, contrast), and adding assistive tools like screen readers(narrator) and magnifiers, allowing users to interact with the device easier.Configure accessibility features to assist users with disabilities. Customize keyboard, mouse, and display settings, as well as narrator and magnifier options. Adjust text size, color, and contrast, and enable on-screen keyboard and speech recognition.
1.5 Operating Systems
Time and Language:
Set the correct time and date for your computer’s system. Choose your preferred language and region settings. Adjust date, time, and number formats to your liking. Select "Date & Time" from the left panel. You can choose to let Windows 10 set your time and time zone automatically, or you can set them manually by clicking the "Change" button under the "Change date and time" section
Update and Security:
Keep your Windows operating system up-to-date with the latest security patches and features. Manage Windows Defender settings to protect your system from malware and viruses. Configure Windows Update settings to automatically download and install updates.
Personalization:
Customize the appearance of your desktop, including background, colors, and themes. Adjust display settings, such as screen resolution, brightness, and night light. Personalize your lock screen and start menu.
Apps:
Manage installed apps, including uninstalling, updating, and resetting apps. View app permissions and storage usage. Configure default apps for specific file types and protocols.
Privacy:
Control how your data is collected and used by Microsoft and other apps. Manage location permissions and diagnostic data. Review and adjust privacy settings for different categories of data.
Gaming:
Optimize your gaming experience with Xbox Game Bar, Game Mode, and other gaming features. Connect your Xbox console to your PC for seamless gaming. Customize gaming settings, such as controller settings and game DVR.
System:
View detailed system information, including hardware specifications and device drivers. Manage storage settings, such as disk cleanup and storage sense. Configure power options and battery settings.
Accounts:
Manage user accounts on your device, including creating, modifying, and deleting accounts. Set up family safety features to protect children. Configure sign-in options, such as PIN, password, and biometric authentication.
Devices:
Add and manage Bluetooth devices, printers, and other hardware. Configure device settings, such as power management and driver updates. Troubleshoot device connectivity and performance issues
Network and Internet:
Configure network settings such as Wi-Fi, Ethernet, and VPN. Manage network connections and troubleshoot network problems. Set up Wi-Fi hotspots and manage network sharing.
1.6 Operating Systems
Workgroup vs. Domain Setup:
A workgroup is a simple peer-to-peer network where computers can share resources directly.
A domain is a centralized network managed by a domain controller, offering centralized security, user management, and resource sharing.
Shared resources in a domain can include printers, file servers, and mapped drives, which are network drives that appear as local drives on a client computer.
Local OS Firewall Settings:
Application restrictions and exceptions allow you to control which applications can access the network.
Firewall configuration involves setting rules to allow or block incoming and outgoing network traffic.
By default, Windows Firewall is enabled to protect your system from unauthorized network access.
Client Network Configuration:
IP addressing assigns unique IP addresses to each device on the network.
Domain Name Setting specify DNS servers that resolve domain names to IP addresses.
Subnet mask defines the network portion and host portion of an IP address.
Static, dynamic know the difference.
Establish Network Connections:
A VPN creates a secure encrypted connection over a public network.
Wireless networks use Wi-Fi technology to connect devices wirelessly.
Wired networks use physical cables to connect devices.
WWANs use cellular networks to provide internet access to mobile devices.
Proxy Settings:
Proxy servers can be used to filter web traffic, improve network performance, or bypass network restrictions.
Public networks are open networks, such as public Wi-Fi hotspots, where security risks are higher.
Private networks are secure networks, such as home or office networks, where devices can communicate directly.
File Explorer Navigation:
Network paths allow you to access shared resources on other computers or network drives.Metered connections are limited data connections, often associated with mobile data plans.Limitations on metered connections may include reduced performance, limited background activity, and restrictions on automatic updates.Wireless requires SSI security keys.
Subnet mask IP, default gateway and router should all have the same subnet mask.
1.7 Operating Systems
System Requirements for Applications
32-bit applications are designed to run on 32-bit operating systems, while 64-bit applications can run on both 32-bit and 64-bit operating systems.
Dedicated graphics cards offer better performance for graphics-intensive tasks, while integrated graphics cards are suitable for basic computing needs.
VRAM requirements vary depending on the application's graphics needs, with more demanding applications requiring higher VRAM capacities.
64 can be required, 32 is newer.
Application Requirements
RAM requirements determine the amount of memory needed for the application to run smoothly, with more demanding applications requiring more RAM. CPU requirements specify the processing power needed for the application to perform tasks efficiently, with more complex applications requiring higher CPU speeds and cores. External hardware tokens, such as security keys, may be required for authentication and authorization purposes, especially for sensitive applications. Storage requirements specify the amount of disk space needed for the application's installation and data storage.
OS Requirements for Applications
Application compatibility with specific operating systems is crucial, as applications may not function correctly or at all on incompatible operating systems. 32-bit applications may not run optimally or at all on 64-bit operating systems due to architectural differences.
Distribution Methods
Physical media, such as CDs or DVDs, can be used to distribute applications, but they are becoming less common with the rise of digital distribution. Downloadable applications can be downloaded from the internet and installed directly, offering flexibility and convenience.
ISO images can be mounted as virtual drives, allowing users to install applications from the image without burning it to a physical disc.
Other Considerations for New Applications
New applications can impact device performance by consuming system resources, such as CPU, RAM, and storage. Network bandwidth and latency can affect the installation and update process of applications, especially for large applications or slow internet connections.
New applications may require changes to existing workflows and operational procedures, which can impact user productivity and efficiency.
The impact of new applications on business operations can be significant, affecting factors such as security, compliance, and overall business performance.
1.8 Operating Systems
Windows: A popular OS for personal and professional use, known for its user-friendly interface and wide software compatibility. ntfs
Linux: A versatile open-source OS available in various distributions, offering customization and security.
macOS: Apple's proprietary OS, known for its sleek design, smooth performance, and seamless integration with Apple hardware.
Chrome OS: A lightweight OS designed for web-based applications, ideal for simple computing tasks. Easily installs Linux for term based applications.
Cell Phone/Tablet OSs:
iPadOS: Apple's OS for iPads, optimized for touch-based interaction and productivity.
iOS: Apple's mobile OS for iPhones and iPods, known for its user-friendly interface and app ecosystem.
Android: A versatile mobile OS developed by Google, offering customization and a wide range of devices.based on linux
Various Filesystem Types:
NTFS:
A robust file system used by Windows, supporting features like file compression, encryption, and access control lists (ACLs).
FAT32: An older file system, limited in file size max 4GB and partition size, commonly used for older devices and storage media.
ext3/ext4: Linux file systems, known for their performance, reliability, and support for journaling.
APFS: Apple's modern file system, designed for performance, efficiency, and data integrity.
exFAT:
A file system designed for high-capacity storage devices, supporting large file sizes and cross-platform compatibility.
Vendor Life-Cycle Limitations:
End-of-life (EOL): When a product or software version reaches its end-of-life, it no longer receives security updates or technical support.
End-of-service (EOS):
Seven years for windows support
Update limitations: Some OS versions may have limited update support, potentially leaving them vulnerable to security threats.
Compatibility Concerns Between OSs:
Different OSs have varying levels of compatibility with hardware and software.
File formats and software applications may not be compatible across different OS’s.
Network protocols and security settings can impact interoperability between different OS environments.
1.9 Operating Systems
Boot Methods:
USB drives, optical media, and network boot methods are commonly used to boot a system and initiate the installation process.
Solid-state drives (SSDs) and flash drives offer faster boot times and improved performance compared to traditional hard drives.
Internet-based installations allow for remote installations and software updates.
While external and internal drives provide storage options for the operating system and data.
Has different options
Types of Installations:
An upgrade installation updates an existing operating system to a newer version, preserving user data and settings.
A recovery partition allows you to restore your system to a previous state in case of issues.
A clean install involves formatting a drive and installing a fresh copy of the operating system, providing a clean slate.
Know clean install
Drive Format:
GPT and MBR are two common partitioning schemes for hard drives.
GPT supports larger disk sizes and more partitions than MBR.
Formatting a drive erases all data on it, so it's crucial to back up important data before proceeding.
Upgrade Considerations:
Backing up files and user preferences ensures data safety during the upgrade process.
Application and driver compatibility should be considered to avoid issues after the upgrade.
Hardware compatibility with the new OS version is essential for optimal performance.
Feature updates introduce new features and security patches, but they may also introduce compatibility issues.
Third-party Drivers:
Third-party drivers may be required for specific hardware devices, such as graphics cards, sound cards, and network adapters.
Installing incompatible or outdated drivers can lead to system instability and hardware malfunctions.
Partitioning:
Partitioning divides a hard drive into multiple sections, each with its own file system and storage capacity.
GPT offers more flexibility and supports larger disk sizes compared to MBR.
1.10 Operating Systems
identify common features and tools of the macOS/desktop OS.
Spotlight: terminal, files are dmg. Business admin is for IT ADMIN’s
Installation and Uninstallation of Applications : macOS uses .dmg, .pkg, and .app file types for application distribution. The App Store provides a centralized platform for discovering and installing applications. Uninstallation of applications can typically be done by dragging the app to the Trash or using the App Store.
Apple ID and Corporate Restrictions: An Apple ID is required for many macOS features, including the App Store, iCloud, and iMessage. Corporate restrictions may limit user access to certain features and applications. Best practices for macOS include regular backups, using antivirus software, and keeping the system up-to-date with the latest updates and patches.
System Preferences: System Preferences allows users to customize settings for displays, network connections, printers, scanners, privacy, accessibility, and Time Machine backups. Time Machine is Apple's built-in backup solution, allowing users to restore files and system settings to a previous point in time.
Features: Multiple desktops, Mission Control, and Spaces allow for efficient multitasking and organization of windows. Keychain securely stores passwords, credit card information, and other sensitive data. Spotlight is a powerful search tool that can quickly find files, applications, and information on your Mac. iCloud provides seamless integration between Apple devices, allowing for syncing of files, photos, and other data. Gestures provide efficient ways to interact with the macOS interface, such as scrolling, zooming, and switching between apps. : Finder is the file management application on macOS, allowing users to organize and access files and folders. Remote Disc allows you to access files on remote servers. The Dock provides quick access to frequently used applications and documents.
Disk Utility: Disk Utility allows users to manage disk partitions, format drives, and repair disk issues.
FileVault : FileVault encrypts the entire startup disk, protecting sensitive data from unauthorized access.
Terminal : Terminal provides access to the command-line interface, allowing advanced users to perform system administration tasks.
Force Quit : Force Quit is a utility that can be used to quit unresponsive applications.
1.11 Operating Systems
Common Features and Tools of the Linux Client/Desktop OS
Common Commands:
ls lists files and directories in a specified directory.
pwd prints the current working directory.
mv moves or renames files and directories.
cp copies files and directories.
rm removes files and directories.
chmod changes file permissions.
chown changes file ownership.
su/sudo switches user to root or allows running commands with root privileges.
apt-get and yum are package managers used to install, update, and remove software packages.
ip is used to configure and display network interfaces.
df displays disk usage information.
grep searches for patterns within text files.
ps displays information about running processes.
man provides access to online manual pages for commands and tools.
top displays real-time information about system processes and resource usage.
find searches for files and directories based on specified criteria.
dig is a DNS lookup tool.
cat displays the contents of a file.
nano is a simple text editor.