Untitled - OnlineExpert

Untitled - OnlineExpert
MTA Mobility and Device
Fundamentals (98-368)
First Edition
LearnKey provides self-paced training courses and online learning solutions to education, government, business, and individuals
worldwide. With dynamic video-based courseware and effective learning management systems, LearnKey provides expert
instruction for popular computer software, technical certifications, and application development. LearnKey delivers content on
the Web, by enterprise network, and on interactive CD-ROM. For a complete list of courses visit:
http://www.learnkey.com/
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means now known or to be
invented, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system without
written permission from the author or publisher, except for the brief inclusion of quotations in a review.
© 2014 LearnKey www.learnkey.com
Workbook ID
Table of Contents
Introduction
Using this Workbook �������������������������������������������������������������������������� 6
Best Practices Using LearnKey’s Online Training _____________________________________________________7
MTA Mobility and Device Fundamentals (98-368) Description _________________________________________9
Skills Assessment ���������������������������������������������������������������������������� 10
MTA Mobility and Device Fundamentals (98-368) Time Tables ________________________________________14
Session 1
Fill-in-the-Blanks ��������������������������������������������������������������������������� 16
Obtaining a Microsoft Account ���������������������������������������������������������������� 18
Configuring the Control Panel ����������������������������������������������������������������� 19
Joining a Device to a Network ������������������������������������������������������������������ 20
Configuring the Start Menu ������������������������������������������������������������������� 22
Configuring Profiles �������������������������������������������������������������������������� 23
Configuring Desktop Settings ������������������������������������������������������������������ 24
Configuring Shortcuts ������������������������������������������������������������������������ 26
Configuring Group Configurations and Capabilities __________________________________________________27
Configuring BitLocker ����������������������������������������������������������������������� 28
Preparing for File Encryption ������������������������������������������������������������������ 29
Describing Windows Update ������������������������������������������������������������������ 30
Describing App Updates ���������������������������������������������������������������������� 31
Describing Device System Updates �������������������������������������������������������������� 32
Session 2
Fill-in-the-Blanks ���������������������������������������������������������������������������
Describing OneDrive �������������������������������������������������������������������������
Describing Azure Storage ���������������������������������������������������������������������
Describing OneNote �������������������������������������������������������������������������
Describing Outlook ��������������������������������������������������������������������������
Describing Office 365 ������������������������������������������������������������������������
Describing Storage Spaces and Storage Pools ������������������������������������������������������
Describing File Systems ����������������������������������������������������������������������
Describing NTFS and Share Permissions ���������������������������������������������������������
Setting Up a HomeGroup ���������������������������������������������������������������������
Describing Print Drivers ����������������������������������������������������������������������
Describing Effective Permissions ����������������������������������������������������������������
Creating Public Shares ������������������������������������������������������������������������
Creating Basic and Advanced Shares ������������������������������������������������������������
34
36
38
39
40
41
43
45
46
47
48
50
51
53
Mapping a Drive ���������������������������������������������������������������������������������55
Using Encrypting File System (EFS) �����������������������������������������������������������������56
Describing BitLocker To Go ������������������������������������������������������������������������58
Describing Virtual Private Networks ������������������������������������������������������������������59
Describing Encryption Keys ������������������������������������������������������������������������61
Describing Certificate Services and Secure Socket Layer (SSL) _____________________________________________62
Session 3
Fill-in-the-Blanks ��������������������������������������������������������������������������������64
Private and Public Networks ������������������������������������������������������������������������66
Describing Uses of Firewalls ������������������������������������������������������������������������67
Describing Uses of Clouds ��������������������������������������������������������������������������69
Describing Authentication �������������������������������������������������������������������������70
Describing Windows Rights Management Services _______________________________________________________71
Describing Password Procedures ���������������������������������������������������������������������72
Setting Up Permissions on Folders and Files �����������������������������������������������������������74
Permission Changes on File Location Changes ���������������������������������������������������������76
Describing Basic and Advanced Permissions �����������������������������������������������������������78
Describing Taking Ownership and Delegating ����������������������������������������������������������80
Describe Resultant Permissions ����������������������������������������������������������������������82
Describing Malware �������������������������������������������������������������������������������83
Describing Antivirus and Antimalware Strategies ________________________________________________________84
Session 4
Fill-in-the-Blanks ��������������������������������������������������������������������������������87
Describing Productivity Services ���������������������������������������������������������������������89
Describing Storage Services �������������������������������������������������������������������������90
Describing Communications Services �����������������������������������������������������������������91
Describing Search Services �������������������������������������������������������������������������92
Taking a Tour of Microsoft Intune �������������������������������������������������������������������93
Wiping a Device ���������������������������������������������������������������������������������94
Setting up Geolocation on a Windows Device ����������������������������������������������������������95
Describing Virtual Machines ������������������������������������������������������������������������97
Describing Azure Services ��������������������������������������������������������������������������99
Describing Disaster Recovery ����������������������������������������������������������������������100
High Availability, Redundancy, and Fault Tolerance _____________________________________________________102
Session 5
Fill-in-the-Blanks �������������������������������������������������������������������������������105
Describing Active Directory Services ����������������������������������������������������������������107
Setting Up a Company Portal ����������������������������������������������������������������������109
Setting Up Work Folders ��������������������������������������������������������������������������111
Describe Azure RemoteApp �����������������������������������������������������������������������113
Describing IT Centricity and Desktop Virtualization ____________________________________________________114
Describing Dynamic Access Control Policies ����������������������������������������������������������115
Describe Windows Rights Management �������������������������������������������������������������117
Appendix
MTA Mobility and Device Fundamentals (98-368) Session 1 Course Map ___________________________________119
MTA Mobility and Device Fundamentals (98-368) Session 2 Course Map ___________________________________120
MTA Mobility and Device Fundamentals (98-368) Session 3 Course Map ___________________________________121
MTA Mobility and Device Fundamentals (98-368) Session 4 Course Map ___________________________________122
MTA Mobility and Device Fundamentals (98-368) Session 5 Course Map ___________________________________123
MTA Mobility and Device Fundamentals (98-368) Session 1 Outline ______________________________________124
MTA Mobility and Device Fundamentals (98-368) Session 2 Outline ______________________________________ 125
MTA Mobility and Device Fundamentals (98-368) Session 3 Outline ______________________________________ 126
MTA Mobility and Device Fundamentals (98-368) Session 4 Outline ______________________________________ 127
MTA Mobility and Device Fundamentals (98-368) Session 5 Outline ______________________________________ 128
8 Week Sample Lesson Plan �����������������������������������������������������������������������129
6 Week Sample Lesson Plan �����������������������������������������������������������������������130
7 Week Sample Lesson Plan �����������������������������������������������������������������������131
Using this Workbook
The exercises in this manual serve as a companion to LearnKey’s training and are organized by session to match the presented
concepts. Within each session, exercises are arranged from easiest to most challenging. In the Introduction section of each
session, you will find outlines of the training and sample lesson plans which will give you an overview of the training content
and help you to structure your lessons. The following sections are included for each session of training:
Skills Assessment: The skills assessment will help you and your students to gauge their understanding of course topics prior
to beginning any coursework. Each skill listed is tied directly to an exam objective. Understanding where your students feel
less confident will aid you in planning and getting the most from the training.
Objective Mapping and Shoot File Links: The objective mapping provides a quick reference as to where in the training
a specific certification exam objective is covered. The Files column lists the name of the Course Support files (Excel
spreadsheets, Photoshop files, etc.) that are used and demonstrated during the training. The files will typically have a starting
file containing all data necessary to begin the demonstrated skill, as well as a completed file which shows the final result.
Keyboard Shortcuts and Tips: The keyboard shortcuts and tips provide a reference of product-specific keyboard shortcuts
and helpful hints to make working more efficient.
Short Answer and Matching: The short answer questions facilitate a recall of the basic training concepts to further aid in
retention of the course topics and information in preparation for the training’s Pre-Assessments, Post Tests, and MasterExam.
The matching exercise provides additional learning reinforcement of terms and concepts found throughout the training in the
course’s glossary.
Projects: The projects in this manual are organized by session to match the concepts presented in the LearnKey training.
Each project is assigned a difficulty level of either beginner, intermediate, or advanced. Some projects will be noted as
“beginner-intermediate” or other range. Within each session, projects are arranged from easiest to most challenging. Each
project includes a description of the task as well as steps required for successful completion. Note that the steps may
not indicate each required action but will provide the expectation of what is required, leaving the action to the student.
References to the concepts demonstrated in the LearnKey training that are required for successful completion of the project
are also included. Each project will also indicate the files and software used to complete the tasks. Some projects may only
include a file named “ProjectTitle_End.” Projects only including an end file typically begin with a new file which is indicated
in the first step. The “ProjectTitle_End” file is included to illustrate a possible correct result. Other projects may include a file
named “ProjectTitle_Start” or other files. Projects with a “ProjectTitle_Start” file begin with that file instead of a new file.
“Start” files typically contain data required for the project pre-inserted to focus the project on concepts versus data entry.
6 | Introduction
MTA Mobility and Device Fundamentals (98-368)
Best Practices Using LearnKey’s Online Training
LearnKey offers video-based training solutions which are flexible enough to accommodate the private student, as well as
educational facilities and organizations.
Our course content is presented by top experts in their respective fields and provides clear and comprehensive information.
The full line of LearnKey products have been extensively reviewed to meet superior standards of quality. The content in our
courses has also been endorsed by organizations, such as Certiport, CompTIA®, Cisco, and Microsoft. However, it is the
testimonials given by countless satisfied customers that truly set us apart as leaders in the information training world.
LearnKey experts are highly qualified professionals who offer years of job and project experience in their subjects. Each
expert has been certified in the highest level available for their field of expertise. This provides the student with the knowledge
necessary to also obtain top-level certifications in the field of their choice.
Our accomplished instructors have a rich understanding of the content they present. Effective teaching encompasses not only
presenting the basic principles of a subject, but understanding and appreciating organization, real-world application, and links
to other related disciplines. Each instructor represents the collective wisdom of their field and within our industry.
Our Instructional Technology
Each course is independently created, based on standard objectives provided by the manufacturer for which the course was
developed.
We ensure that the subject matter is up-to-date and relevant. We examine the needs of each student and create training
that is both interesting and effective. LearnKey training provides auditory, visual, and kinesthetic learning materials to fit
diverse learning styles. The following are three levels of implementation:
Standard Training Model
The standard training model allows students to proceed through basic training, building upon primary knowledge and
concepts to more advanced application and implementation. In this method, students will use the following toolset:
Pre-assessment: The pre-assessment is used to determine the student’s prior knowledge of the subject matter. It
will also identify a student’s strengths and weaknesses, allowing the student to focus on the specific subject matter
he/she needs to improve most. Students should not necessarily expect a passing score on the pre-assessment as it is
a test of prior knowledge.
Video training session: Each course of training is divided into sessions that are approximately two hours in
length. Each session is divided into topics and subtopics.
Post test: The post test is used to determine the student’s knowledge gained from interacting with the training. In
taking the post test, students should not consult the training or any other materials. A passing score is 80 percent
or higher. If the individual does not pass the post test the first time it is taken, LearnKey would recommend the
incorporation of external resources, such as the workbook and additional customized instructional material.
7 | Introduction
MTA Mobility and Device Fundamentals (98-368)
Intermediate Training Model
The intermediate training model offers students additional training materials and activities which allows for better
retention, review, and interaction. This model includes not only the standard model material, but also includes the
following toolset:
Study guides: Study guides are a list of questions missed which can help students recognize areas of weakness
and necessary focus. They can be accessed from either the pre-assessment or post test.
Labs: Labs are interactive activities that simulate situations presented in the training. Step-by-step instructions
and live demonstrations are provided.
Workbooks: Workbooks have a variety of activities, such as glossary puzzles, short answer questions, practice
exams, research topics, and group and individual projects, which allow the student to study and apply concepts
presented in the training.
Master Training Model
The master training model offers the student an additional opportunity to prepare for certification by further examining his/
her knowledge. This model includes the materials used in the standard and intermediate models, as well as the MasterExam.
MasterExam: The MasterExam draws from a large pool of questions to provide a unique testing experience each
time it is taken. LearnKey recommends a student take and pass the exam, with a score of 80 percent or higher,
four times in order to prepare for certification testing. Study guides can also be accessed for the MasterExam.
8 | Introduction
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Description
MTA Mobility and Device Fundamentals (98-368) is designed to prepare students to learn to accomplish the technical
tasks required to pass exam 98-368. Students will gain an understanding of device configurations, security, cloud services,
data access, and management. This exam is one step forward in earning a Microsoft Certified Solutions Associate (MCSA)
certification.
Benefits: • Course covers objectives for MTA exam 98-368
• Interactive labs and hundreds of pre/post test questions
• View your online courseware anytime, anywhere
9 | Introduction
MTA Mobility and Device Fundamentals (98-368)
Skills Assessment
Instructions: Rate your skills on the following tasks from 1-5 (1 being needs improvement, 5 being excellent).
Skills
1
2
3
4
5
Configure device options
Describe Microsoft account
Configure Control Panel
Configure system options
Configure desktop settings
Configure the Start menu
Configure profiles
Configure display settings
Configure shortcuts
Configure group configurations and capabilities
Configure drive encryption
Configure BitLocker
Prepare for file encryption
Configure updates
Describe Windows Update
Describe app updates
Describe device system updates
Understand Data Access and Management
Describe cloud storage services
Describe OneDrive
Describe Microsoft Azure storage
Describe Outlook
Describe Office 365
Describe local storage
Describe storage spaces and storage pools
Describe file systems
10 | Introduction
MTA Mobility and Device Fundamentals (98-368)
Instructions: Rate your skills on the following tasks from 1-5 (1 being needs improvement, 5 being excellent).
Skills
1
2
3
4
5
Describe FAT
Describe FAT32
Describe NTFS
Describe Resilient File System Overview (ReFS)
Describe file and print sharing
Describe NTFS and share permissions
Describe HomeGroup
Describe print drivers
Describe effective permissions
Create public, basic, and advanced shares
Map drives
Describe data encryption
Describe Encrypting File Systems (EFS)
Describe how EFS folders impact moving and copying files
Describe BitLocker To Go
Describe virtual private network (VPN)
Describe public key
Describe private key
Describe Certificate Services
Describe SSL
Understand device security
Describe the differences between the Internet, intranet, and extranet
Describe uses of private networks
Describe uses of public networks
Describe uses of firewalls
Describe uses of clouds
11 | Introduction
MTA Mobility and Device Fundamentals (98-368)
Instructions: Rate your skills on the following tasks from 1-5 (1 being needs improvement, 5 being excellent).
Skills
1
2
3
4
5
Describe user authentication
Describe smart cards
Describe Windows Rights Management Services
Describe biometrics
Describe password procedures
Describe permissions
Configure File and Share permissions
Describe the behavior when moving or copying files
Describe basic and advanced permissions
Describe taking ownership
Describe delegating
Describe resultant permissions
Describe malware
Describe computer viruses
Describe Trojan horses
Describe spyware
Describe adware
Describe antivirus and antimalware strategies
Describe the types of cloud services
Describe productivity services
Describe storage services
Describe communication services
Describe search services
Describe Microsoft Intune and its capabilities
Describe selective wipe
Describe location settings
12 | Introduction
MTA Mobility and Device Fundamentals (98-368)
Instructions: Rate your skills on the following tasks from 1-5 (1 being needs improvement, 5 being excellent).
Skills
1
2
3
4
5
Describe Microsoft Azure
Describe virtual machines
Describe Azure services
Describe disaster recovery
Describe high availability
Describe redundancy
Describe fault tolerance
Understand enterprise mobility
Describe identity services
Describe Windows Server Active Directory and Azure Active Directory
Describe Microsoft account
Describe Federation Services
Describe business data access
Describe company portal
Describe work folders
Describe Azure RemoteApp
Describe bring your own device
Describe device-centric to people-centric IT
Describe desktop virtualization
Describe Dynamic Access Control policies
Describe Windows Rights Management
13 | Introduction
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Time Tables
Session 1
Actual Time
Session 1
Training Time
Welcome
00:06:20
Welcome
00:09:30
Desktop Settings
00:26:35
Desktop Settings
00:39:52
Configure Device Options
Configure Drive Encryption
Configure Updates
Total Time
Session 2
00:18:15
00:13:44
00:06:53
01:12:04
Actual Time
Configure Device Options
Configure Drive Encryption
Configure Updates
Total Time
Session 2
00:27:22
00:20:36
00:10:20
01:48:06
Training Time
Describe Cloud Storage Services
00:29:35
Describe Cloud Storage Services
00:44:22
File Systems
00:07:01
File Systems
00:10:31
Local Storage
File and Print Sharing
Describe Data Encryption
Total Time
Session 3
00:08:08
00:45:58
00:27:23
01:58:05
Actual Time
Local Storage
File and Print Sharing
Describe Data Encryption
Total Time
Session 3
00:12:12
01:08:57
00:41:04
02:57:08
Training Time
Internet, Intranet, and Extranet
00:11:57
Internet, Intranet, and Extranet
00:17:56
Permissions
00:17:47
Permissions
00:26:40
Authentication
Describe Malware
00:30:07
00:17:04
Total Time
Session 4
Describe the Types of Cloud
Services
Microsoft Intune
Describe Microsoft Azure
Total Time
Session 5
01:16:55
Actual Time
00:18:14
00:15:38
00:20:45
00:54:37
Actual Time
Authentication
Describe Malware
00:45:11
00:25:36
Total Time
Session 4
01:55:22
Training Time
Describe the Types of Cloud
Services
00:27:21
Describe Microsoft Azure
00:31:07
Microsoft Intune
Total Time
Session 5
00:23:27
01:21:56
Training Time
Describe Identity Services
00:13:06
Describe Identity Services
00:19:39
Describe Bring Your Own Device
00:14:09
Describe Bring Your Own Device
00:21:14
Describe Business Data Access
Course Recap
Total Time
14 | Introduction
00:13:35
00:01:14
00:42:04
Describe Business Data Access
Course Recap
Total Time
00:20:22
00:01:51
01:03:06
MTA Mobility and Device Fundamentals (98-368)
Fill-in-the-Blanks
Instructions: While watching Session 1, fill in the missing words according to the information presented by the instructor.
[References are found in the brackets.]
Configure Device Options
1. Users can log into a Microsoft device using a local,
Accounts]
, or Microsoft account. [Describe Microsoft
2. Microsoft accounts used to be known as . [Describe Microsoft Accounts]
3. You can add a Microsoft account to your device by using the Charms bar in the Accounts section found under . [Add Account to a Device]
4. Using a Surface Pro 3, you can open the Control Panel using the . [Configure Control Panel]
5. Items in the Control Panel can be viewed with large or small icons or by Panel]
6. On a Windows device, you can join a domain, workgroup, or
Options]
7. A domain network is a centralized network where users and System Options]
Desktop Settings
8. There is a difference between settings found in the
Windows 8.1 machine. [Configure Desktop Settings]
network. [Configure System
are stored separately. [Configure
and the
9. Synchronization settings can be found in the Devices]
10. On a Windows 8.1 machine, the
Menu]
. [Configure Control
section of a Windows 8.1 device. [Synchronize
shortcut is found in a hidden folder. [Configure the Start
11. You can add an account to a Windows 8.1 device in the Accounts section under
for an Existing Account]
12. In the Control Panel, you can add a local account under group. [Check
. [Add a Local Account]
13. While on the Windows 8.1 desktop, you can change the screen resolution by clicking Screen Resolution. [Configure Display Settings]
14. If you swipe from the
Edges]
of a
the desktop and
on a Surface Pro 3, you can quickly move from app to app. [Corners and
15. Keyboard shortcuts can be made for an application by right-clicking the app and clicking
[Configure Shortcuts]
16. Apps can be pinned to Start or the 17. You can quickly add an app to the Capabilities]
Configure Drive Encryption
18. BitLocker is used to encrypt entire Windows 8.1
16| Session 1
.
on a Windows 8.1 machine. [Add Account to a Device]
by tapping and holding the app. [Group Configurations and
. [Configure BitLocker]
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
19. You can find BitLocker in the . [Configure BitLocker]
20. A C drive cannot be encrypted using BitLocker using a 21. BitLocker is typically used to encrypt an 22. You need to BitLocker]
hard drive. [Configure BitLocker]
a device before BitLocker will begin to be enforced on that device. [Configure
23. The Encryption]
is used to encrypt individual files on a Windows 8.1 computer. [Prepare for File
24. File encryption settings are found in the file’s Properties dialog box under the
File Encryption]
Configure Updates
25. You can access Windows Update from the Windows Update]
27. App updates are located in the 17 | Session 1
tab. [Prepare for
. [Describe
. [Describe Windows Update]
store. [Describe App Updates]
updates are also called hardware updates. [Describe Device System Updates]
29. When Windows releases System Updates]
30. System Updates]
or the 26. In Windows Update, you can choose to install updates 28. . [Configure BitLocker]
updates, they do not reach all devices simultaneously. [Describe Device
firmware updates can be downloaded through the Microsoft Download Center. [Describe Device
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Obtaining a Microsoft Account
Description:
In order to best utilize features on any Windows device (such as a Surface, Windows Phone, or Xbox), you will need to have a
Microsoft account. This account, which used to be known as a Windows Live ID, just needs to be a legitimate email address.
A Microsoft account will enable you to:
• Utilize OneDrive, a cloud-based storage option, to store your files and then access those files from any Windows, iOS, or
Android device.
• Synchronize some or all of your files and settings across Windows devices, laptops, and desktops.
• Access your games and other media through Xbox Live.
• Download apps from the (Windows) Store.
In this exercise, you will obtain a Microsoft account. If you already have a Microsoft account, you do not need to do this project. If you
have an account you use to sign into OneDrive, Xbox, or the (Windows) Store, you have a Microsoft account.
Steps for Completion:
1. Open a web browser (like Internet Explorer) and navigate to www.microsoft.com.
2. Click the Sign in link near the top-right corner of the page.
3. On the sign-in page, click Sign up Now. You will see the following, with information to fill out after this information:
4. Fill out the information and then click the Create Account button at the bottom of the screen. At this point, you will have a
Microsoft account.
Points to Remember:
•
•
A Microsoft account is necessary to take full advantage of features in Windows 8, 8.1, and for Windows devices.
A Microsoft account can also be used to synchronize data through Microsoft apps onto non-Microsoft devices, such as an iPhone,
iPad, or any Android device.
Reference:
LearnKey’s MTA: Mobility and Device Fundamentals (98-368) Training, Session 1:
Configure Device Options: Describe Microsoft Accounts
LearnKey’s MTA: Mobility and Device Fundamentals (98-368) Training, Session 5:
Describe Identity Services: Describe Microsoft Accounts
Project File: N/A
Difficulty: Beginner
Required Materials: A device or computer with an Internet Connection
Objectives:
1.0 Understand Device Configurations
1.1 Configure Device Options
1.1.a Describe Microsoft Accounts
5.0 Understand Enterprise Mobility
5.1 Describe Identity Services
5.1.a Describe Microsoft Accounts
18| Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Configuring the Control Panel
Description:
In this exercise, you will review some of the different ways in which you can access the Control Panel. You will also look through
the different Control Panel views, and, you will search for an item in the Control Panel. NOTE: Here is a reminder for this and any
other exercise involving using Windows 8.1: If you are using a device such as a Surface Pro 3, substitute a click instruction for a tap
instruction and substitute a right-click instruction for a tap and hold instruction.
Steps for Completion:
1. There are several ways to open the Control Panel. Choose one of the following:
a. On a Windows 8.1 device (or computer), click the File Explorer icon
on the Windows Taskbar. In the address bar,
near the top of the screen, click the arrow to the left of This PC. From the list of available options, click Control Panel.
in the lower-left corner of the screen. Click the down arrow at the bottom of the screen to
b. Click the Start button
display the Apps screen. Scroll to the right of the Apps screen until you see the Windows System group. Click the Control
Panel icon.
c. With your desktop showing, hover your mouse over the top-right corner of the screen. The Charms bar will appear. Click
the Settings button. Click Control Panel.
2. To look at some different Control Panel views, click the drop-down arrow next to Category and click Large Icons. The Control
Panel should now look like the screen below:
3. To see the applets as small icons, click the drop-down arrow next to Large Icons and choose Small Icons. The Control Panel will
now display groups as small icons.
4. To search for a Control Panel item. Click in the Search Control Panel text box
5. Click the x in the Search Control Panel field to restore the Control Panel to its home page.
6. Close the Control Panel.
and type: hibernate.
Points to Remember:
•
•
•
There are several ways to access the Control Panel. Practice the different methods available.
The Control Panel has three views: Category, Small Icons, and Large Icons.
The easiest way to look for a specific Control Panel item is to search for it.
Reference:
LearnKey’s MTA: Mobility and Device Fundamentals (98-368) Training, Session 1:
Configure Device Options: Configure Control Panel
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1
Objectives:
1.0 Understand Device Configurations
1.1 Configure Device Options
19 | Session 1
1.1.b Configure Control Panel
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Joining a Device to a Network
Description:
When a device is first configured, it actually belongs to a network called a workgroup. A workgroup is a peer-to-peer network in which
devices can communicate and share information with each other. Most home-based users of Windows devices will never even realize
they are on a workgroup.
A more organized type of peer-to-peer network is a HomeGroup. A single device on the network will start the HomeGroup. The
initiating device, by default, will share pictures, music, video, and printers, but not documents. A device joining a HomeGroup does not
share any of its folders by default.
A device running Windows 8.1 Pro or Windows 8.1 Enterprise can join a domain. A domain, typically found in a business network,
is a client/server network. In a client/server network, one or more central servers control the user names, passwords, file sharing,
permissions, and other network management aspects, such as policies and settings.
In the next exercise, you will join a device to a domain. Note that in order for a device to join a domain, network discovery must be
turned on.
Steps for Completion:
1. On your device, click the Start button. The Start screen will appear.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
Right-click the PC icon
and click Properties.
In the Computer name, domain, and workgroup settings area, click Change settings.
Click the Change button. The Computer Name/Domain Changes dialog box will appear.
Select the Domain option.
In the Domain text box, type the name of the domain you are joining.
Click the OK button.
Enter a user name and password of an account that has
administrative permissions on the network.
Click the OK button. If the user name and password is correctly
entered, you will see a message similar to the image on the right:
Click the OK button twice.
Click the Close button.
Restart your device.
Upon restart, you will be able to log on to your domain, using your
user name and password for the domain.
20| Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Points to Remember:
•
•
•
Windows 8.1 (Basic) and Windows RT devices cannot join domains.
Know that by default, a device initiating a HomeGroup does not share out documents.
Know that by default, a device joining an existing HomeGroup does not share out its own folders.
Reference:
LearnKey’s MTA: Mobility and Device Fundamentals (98-368) Training, Session 1:
Configure Device Options: Configure System Options
Project File: N/A
Difficulty: Intermediate
Required Materials: A device with Windows 8.1 Pro or Enterprise, a domain the device can join, and credentials which will allow
the device to join the domain
Objectives:
1.0 Understand Device Configurations
1.1 Configure Device Options
1.1.c Configure System Options
21 | Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Configuring the Start Menu
Description:
One of the major adjustments from moving to Windows 7 to Windows 8 was the disappearance of the Start button from the desktop.
In Windows 8.1, the Start button is back on the desktop but does not display the Start menu. Rather, it displays the Start screen. In
addition, the first screen that shows after logging on to Windows 7 is the desktop. In Windows 8, the first screen is the Start screen.
Many users would rather see the desktop displayed upon logging into a machine and not the Start screen. This project will take you
through making that change. This project will also walk you through adding the Start menu to the Windows taskbar so you can get to
the Start menu at any time.
Steps for Completion:
1. Log on to a Windows 8.1 device and navigate to the Desktop.
2. To change Windows 8.1 to show the desktop instead of the Start screen when logging on to a device, right-click the taskbar at the
bottom of the screen and click Properties. The Taskbar and Navigation properties will appear.
3. Click the Navigation tab.
4. In the Start screen area, select the When I sign in or close all apps on a screen, go to the desktop instead of Start check box.
5. Click the OK button.
6. Log off from the device.
7. Log on to the device. You should now see your desktop instead of the Start screen.
8. To start the process of displaying a link from the Start menu, open File Explorer.
9. In File Explorer, click the View tab on the ribbon.
10. In the Show/hide group, select the Hidden items check box.
11. Close File Explorer.
12. Right-click the taskbar, click Toolbars, and then click New toolbar.
13. Navigate to the C: drive.
14. Double-click the ProgramData folder.
15. Double-click Microsoft.
16. Double-click Windows.
17. Click the Start Menu folder.
18. Click the Select Folder button.
19. Click the arrows on the right side of the Start Menu text and a start menu will appear, starting with a Programs folder.
20. Hover your mouse on the Programs folder.
21. Click anywhere on the desktop to hide the Start menu.
22. To remove the Start menu from the taskbar, right-click the taskbar, click Toolbars, and then click the check mark next to Start
menu. This will remove the Start menu from the taskbar.
Points to Remember:
•
•
In Windows 8, you can control what a user sees when logging on to a device (Start screen or desktop).
Toolbars can be added to a taskbar. For adding the Start Menu folder, hidden folders need to be set to display.
Reference:
LearnKey’s MTA: Mobility and Device Fundamentals (98-368) Training, Session 1:
Desktop Settings: Configure the Start Menu
Project File: N/A
Difficulty: Intermediate
Required Materials: Windows 8.1
Objectives:
1.0 Understand Device Configurations
22| Session 1
1.2 Configure Desktop Settings
1.2.a Configure the Start Menu
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Configuring Profiles
Description:
There are two types of accounts that can be added to a device running Windows 8.1: a Microsoft account and a local account. In this
project, you will add both types of accounts to a device.
Steps for Completion:
1. On a device running Windows 8.1, hover
your mouse to the top-right corner of the
screen. The Charms bar will appear.
2. Click the Settings button.
3. Click Change PC Settings.
4. Click Accounts. You will see your
account information on the screen.
5. On the left side of the screen, click Other
accounts.
6. Click
. You will see a
screen similar to the screen on the right:
7. Click in the Email address text box and type an email address that belongs to a registered Microsoft account.
8. Click the Next button.
9. Click the Finish button. You should be returned to the Manage other accounts screen.
10. To add a local account to the device, click Add an account.
11. At the bottom of the How will this person sign in screen, click the Sign in without a Microsoft account (not recommended) link .
12. Click the Local account button.
13. Fill out all four fields on the screen.
14. Click the Next button.
15. Click the Finish button. Your Manage other accounts screen should
have a Microsoft account and a local account as seen on the right:
16. Close the PC Settings screen.
Points to Remember:
•
The starting point for adding both Microsoft and local accounts is in
PC Settings.
Reference:
LearnKey’s MTA: Mobility and Device Fundamentals (98-368) Training, Session 1:
Desktop Settings: Configure Profiles
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1 with administrative privileges so that accounts can be created and a Microsoft account
Objectives:
1.0 Understanding Device Configurations
1.2 Configure Desktop Settings
1.2.b Configure Profiles
23 | Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Configuring Desktop Settings
Description:
Windows 8, along with its new Start screen, also provides new ways to change display settings. In addition, those with tablets or
touchscreens can take advantage of swiping features from the corners and edges of a tablet or laptop screen. In this project, you will
look at the Windows 8-based methods of changing the screen resolution, changing display settings, and controlling what happens
when one swipes in from (or hovers the mouse over) a corner or edge of the screen.
Steps for Completion:
1. The first task is to change the screen resolution. On a Windows 8.1 device, access the Charms bar on the right side of the screen.
2. Click Settings.
3. Click Change PC Settings. You will see a screen similar to this:
4. Click PC and devices.
5. In the PC and devices menu on the left side, click Display. You will see
something similar to the image on the right:
6. Click in the bar below the Resolution setting and drag the slider to a
different resolution.
7. Click Apply. A screen will appear asking if you want to keep the changes or
revert the screen resolution to the previous setting.
8. Click either the Keep Changes button or the Revert button. The screen
resolution will either save the new setting (if you click Keep Changes) or
return to the previous setting (if you click Revert).
9. In the PC Settings section on the left side of the screen, click Lock screen.
Note that you may have to scroll down the screen to see all of the available
lock screen settings.
10. Here, you can choose apps for which you want to show notifications on a
locked screen, choose an app to show alarms, and choose whether to use the
camera on the device when the device is locked.
11. Click on one of the smaller pictures to change the lock screen background.
12. If you have a camera setting at the bottom of the screen, click the Off
switch to change the setting to On and turn on camera use when the lock
screen is swiped down.
13. Hover your mouse over the lower-left corner of the screen. When the Start
button appears, click it. If you see the desktop, click the Start button again to show the Start screen.
14. On the Start screen, click your account name in the top-right corner of the screen and then click Lock. Your new lock screen will
appear.
15. Click the screen. The logon screen will appear.
16. Enter your password and press Enter to unlock your device.
17. To control how the mouse interacts with the corners and edges of the screen, hover your mouse over the top-left corner of the
screen. A small picture of the PC Settings will appear. Click the picture. The PC Settings screen will appear.
24| Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
18. In the PC and devices menu, click Corners
and edges.
19. By default, the left side of the screen can
be used, through hovering the mouse over
it (or through swiping on the tablet), to
switch between apps.
20. Also, by default, the Charms bar will show
when the mouse moves to the upper-right
corner of the screen.
21. By default, Windows Store apps do not
show on the taskbar. Click the Off switch
to turn the feature on (or, if it is on, to turn
it off ). Turning this on will show the icon
for PC Settings and any other open Store
apps on the taskbar, and turning it off
will hide open Store apps (including PC
Settings) from the taskbar.
22. Click the left arrow next to the words PC
and devices to return to the PC Settings
screen.
23. Hover your mouse over the lower-left
corner of the screen to display the Start
button.
24. Click the Start button.
Points to Remember:
•
•
Most settings to change are found through accessing the Charms bar, clicking Settings, and then clicking PC Settings.
Hovering the mouse over corners and edges controls different settings (switching apps, showing the Start button, and showing the
Charms bar).
Reference:
LearnKey’s MTA: Mobility and Device Fundamentals (98-368) Training, Session 1:
Desktop Settings: Configure Display Settings
Project File: N/A
Difficulty: Beginner
Required Materials: A device with Windows 8.1
Objectives:
1.0 Understand Device Configurations
1.2 Configure Desktop Settings
1.2.c Configure Display Settings
25 | Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Configuring Shortcuts
Description:
There are three basic types of shortcuts for Apps in Windows 8.1: a keyboard shortcut, pinning an App to the Start screen (if it is not
already there), and pinning an App to the taskbar.
In the next project, you will take the Calculator app and create all three shortcuts to the app.
Steps for Completion:
1. On a Windows 8.1 device, click the Start button.
2. Move to the Apps screen.
3. Scroll the Apps screen to the right. Under the Windows Accessories group, right-click the Calculator and click Open File
Location. The Windows Accessories folder will appear.
4. Right-click the Calculator shortcut and click Properties. You
will see the screen on the right:
5. Click in the Shortcut key field and press Ctrl+Alt+C to set the
keyboard shortcut.
6. Click the OK button. If you get a message stating you need
administrative permissions to set the shortcut, click the
Continue button.
7. Press Ctrl+Alt+C on the keyboard. The calculator will open.
8. Close the calculator.
9. Click the Start button.
10. Find the Calculator app using the same method as earlier in this
project.
11. Right-click the Calculator app and click Pin to Start. You will
be taken to the Start screen and the Calculator tile will appear
on the right side of the Start screen.
12. Click the Desktop tile on the Start screen. You will see the
calculator icon in the taskbar.
13. Right-click the Calculator tile and click Pin to Taskbar.
Points to Remember:
•
•
You can set a keyboard shortcut for an app so long as you see the folder in which the shortcut resides.
Apps can be pinned to the Start screen and to the taskbar.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 1:
Configure Desktop Settings: Configure Shortcuts
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1
Objectives:
1.0 Understand Device Configurations
1.2 Configure Desktop Settings
1.2.d Configure Shortcuts
26| Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Configuring Group Configurations and Capabilities
Description:
One aspect of the Start screen that often gets looked over is the ability to size and group tiles to one’s liking. In this project, you will
move a tile into a new group and then name that group. Remember the presence of a vertical bar while dragging a tile indicates a new
group will be created and include the tile once you let go of the mouse (or your finger if you are tapping and dragging the tile). You will
also resize a tile in this project.
Steps for Completion:
1. If you have not added the Calculator app to your Start screen, do so now. The steps for this are in
the Configuring Shortcuts project in this workbook.
2. Click the Calculator app and drag it far enough away from the other apps that a vertical bar
appears, as shown in the screen shot on the right:
3. When you see the vertical bar, let go of the mouse. The Calculator app will be in its own group.
4. Next, you will name the new group. Right-click the Start screen and click Name groups.
5. Click in the Name group box and type: My Apps.
6. Press the Enter key.
7. Right-click the Start screen and then click Stop naming groups.
8. Next, you will add another app to the group. Click any app on the Start screen and drag it to the new group, placing the app just
to the right of the Calculator app.
9. Now, you will decrease the size of the Calculator app. Right-click the Calculator app, click Resize, and then click Small.
Points to Remember:
•
•
•
When dragging an app with the intention of creating a new group with the app, make sure you see a vertical bar on the screen
before letting go of the mouse.
Apps can easily be resized and/or dragged into groups.
Right-click the Start screen and click Stop naming groups when done naming groups.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 1:
Desktop Settings: Group Configurations and Capabilities
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1 with the Calculator app pinned to the Start screen
Objectives:
1.0 Understand Device Configurations
1.2 Configure Desktop Settings
1.2.e Configure Group Configurations and Capabilities
27 | Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Configuring BitLocker
Description:
BitLocker is a tool used to encrypt a hard drive. The result of encrypting the hard drive is that it places a lock on the hard drive to
where one needs either a password, smart card, or a key contained in a text file, to unlock the drive. Of utmost importance is this:
Do not lose what is needed to unlock the drive, especially the key (in case the password is forgotten or the smart card is misplaced).
Otherwise, the drive will be completely inaccessible. Store multiple copies of the key in safe places (a hard drive, a thumb drive,
perhaps a network drive) so a copy of the key is always accessible. For this project, you will want to use a drive which does not have
an operating system installed as many drives with an operating system cannot be encrypted with BitLocker unless a policy is on the
drive allowing BitLocker without a Trusted Platform Module (TPM) on the drive. This allows encryption to take place without any
hardware help. If the device is company-issued, most users will not have the necessary rights to make the policy change. Finally, for
Windows 8.1 (or 8), BitLocker is only available on Professional or Enterprise editions.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
Open your Control Panel. Make sure the Control Panel is in Category view.
Click System and Security.
Click BitLocker Drive Encryption.
Click the D: drive (or whatever drive you have that is not the C: drive).
Click Turn on BitLocker.
Select the Use a password to unlock the drive check box.
Click in the Enter your password text box and type a password.
Click in the Reenter your password text box and retype your password.
Click the Next button.
Click the Save to a file option.
Save the key file to a location of your choosing.
Click the Next button.
Click the Encrypt entire drive (slower but best for PCs and drives already in use) option.
Click the Next button.
Click Start encrypting. The encryption could take several minutes. When encryption is complete, click the Close button.
Now, we will test the encryption. Reboot your device.
Once you log on to your device, open File Explorer. Look for a lock icon on the drive you encrypted using BitLocker.
Double-click the drive.
Type your password in the text box.
Click Unlock. Your drive will be unlocked.
To turn off BitLocker, right-click the drive, click Manage BitLocker, click Turn off BitLocker twice and wait for the drive to
decrypt.
Points to Remember:
•
•
For Windows 8 or 8.1, BitLocker can only be used on drives on devices running Professional or Enterprise editions.
BitLocker is best-suited for drives that do not need to be encrypted with TPM. This includes most non-operating system drives.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 1:
Configure Drive Encryption: Configure BitLocker
Project File: N/A
Difficulty: Intermediate
Required Materials: Windows 8.1 Professional or Enterprise and a non-operating system hard drive.
Objectives:
1.0 Understand Device Configurations
1.3 Configure Drive Encryption
1.3.a Configure BitLocker
28| Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Preparing for File Encryption
Description:
Whereas BitLocker sets up encryption for an entire hard drive, sometimes you will just want to encrypt some files and/or folders. This
is especially true if a device is shared among multiple users. Encrypting files on a device makes those files inaccessible to any other
account on a device.
In the next project, you will encrypt a folder and then attempt to open files in that folder with a different account.
Steps for Completion:
1. On a device, open File Explorer.
2. On the C: drive, create a folder and name it Confidential.
3. Inside the folder, create a text file (or Word file if you wish) and name it
Employee Review. Make sure the file has some text in it.
4. Navigate back to the C: drive.
5. Right-click the Confidential folder and then click Properties. The folder
properties will appear.
6. On the General tab, click the Advanced button.
7. Select the Encrypt contents to secure data check box.
8. Click the OK button twice. You will see the dialog box on the right side
of the screen.
9. To apply encryption to anything inside of this folder, click the Apply
changes to this folder, subfolders and files option and then click the OK
button. The Confidential folder will now turn green.
10. Log on to the device as a different user.
11. Open File Explorer.
12. Navigate to the C: drive and then the Confidential folder.
13. Open the Confidential folder.
14. Open the Employee Review file. You will see the menu to the right of the screen.
15. Click the OK button.
16. Log back on to the device as the account you used to set up the encryption.
17. Open File Explorer.
18. Navigate to the C:\Confidential folder.
19. Open the Employee Review file. The file should open with no messages.
20. Close all open windows.
Points to Remember:
•
•
The purpose of file/folder encryption is to prevent other users on the same device from seeing the content of those files/folders.
The encryption settings are found in the Advanced section of the General tab on the properties of the folder being encrypted.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 1:
Configure Drive Encryption: Prepare for File Encryption
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1
Objectives:
1.0 Understand Device Configurations
29 | Session 1
1.3 Configure Drive Encryption
1.3.b Prepare for File Encryption
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Windows Update
Description:
For describing Windows Update, you need to know what options are available for downloading and installing updates. In this project,
you will configure how to receive updates on a device running Windows 8.1. Note that the default setting for Windows Update is to
have updates automatically installed.
Steps for Completion:
1.
2.
3.
4.
On your device, access the Charms bar.
Click Settings.
Click Change PC Settings.
On the left side of the PC Settings window, click Update and recovery. You will see a screen similar to the one below:
5. Click the Choose how updates get installed link. You will see the screen
on the right:
6. Click the drop-down arrow on the Important updates field. You will see
a screen similar to the one on the right.
7. Click Download updates but let me choose whether to install them.
8. Click the Apply button.
9. Close the PC Settings screen.
Points to Remember:
•
•
The four choices for Windows Update settings are to install updates
automatically, download updates and then choose which ones to install,
check for updates and then choose which to download and install, and
never check for updates.
The default Windows Update setting is to install updates automatically.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 1:
Configure Updates: Describe Windows Update
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1
Objectives:
1.0 Understand Device Configurations
1.4 Configure Updates
1.4.a Describe Windows Update
30| Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing App Updates
Description:
In addition to being able to describe Windows updates for the 98-368 exam, you will also want to know about available settings for
App updates, specifically as it pertains to the Store, also known as the Windows Store.
In this project, you will explore available options in App updates in the Store, on a Windows 8.1 device.
Steps for Completion:
1. Access the Start screen.
2. Move down to the Apps screen (click the down arrow at the bottom
of the Start screen or swipe down to the Apps screen if you are using a
touchscreen).
3. Scroll, if needed, until you see the store app, shown here:
4. Click the Store app.
5. Hover your mouse over the top-right corner of the screen. When the
Charms bar appears, click Settings.
6. Click App updates. You will see the screen to the right:
7. If the Automatically update my apps setting is set to No, click on it to
set it to Yes.
8. Close the Store.
Points to Remember:
•
App updates are found under Settings but only while the Store app is open.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 1:
Configure Updates: Describe App Updates
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1
Objectives:
1.0 Understand Device Configurations
1.4 Configure Updates
1.4.b Describe App Updates
31 | Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Device System Updates
Description:
In addition to Windows updates and app updates, Windows devices such as a Surface Pro 3 or other tablet also need occasional
firmware updates. Firmware is code which is embedded into a device’s hardware. Thus, a firmware update is a hardware update.
For Surface Pro 3 tablets, updates are distributed in groups from Microsoft, through Windows Update. Not everyone will receive the
updates at the same time. Updates can be obtained directly from Microsoft’s website should someone want to get an update before the
update goes through Windows Update.
Most of the time, one will not even know a firmware update has taken place without checking the update history. Thus, in the next
project you will look to see if your device has undergone any recent firmware updates.
Steps for Completion:
1.
2.
3.
4.
On a Windows 8.1 device that is not a laptop or desktop, access the Settings area from the Charms bar.
Click Change PC Settings.
Click Update and recovery.
Click the View your update history. You will see a screen that resembles the screen below:
5. Scroll down to see if there are any firmware updates that have taken place recently. If you are doing this on a laptop or desktop,
any firmware updates usually come from the manufacturer and not through Windows Update.
6. Close the PC Settings screen.
Points to Remember:
•
•
Firmware update history is viewed in Windows Update for Surface Pro 3 devices.
For devices other than a Surface Pro 3, updates are typically distributed through the device manufacturer and not through
Windows Update.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 1:
Configure Updates: Describe Device System Updates
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1 on a Surface Pro 3 for the full exercise or Windows 8.1 on a device for a partial exercise
Objectives:
1.0 Understand Device Configurations
1.4 Configure Updates
1.4.c Describe Device System Updates
32| Session 1
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Fill-in-the-Blanks
Instructions: While watching Session 2, fill in the missing words according to the information presented by the instructor.
[References are found in the brackets.]
Describe Cloud Storage Services
1. OneDrive for Business is an online drive stored on a company’s
OneDrive for Business]
site on Office 365. [Describe
. [Describe Microsoft Azure Storage]
2. Storage in the cloud has no limitations of
, or on SharePoint. [Describe OneNote]
3. Notebooks can be stored locally, on a
servers or in the cloud. [Describe Outlook]
4. Outlook email is stored on
mechanism by which users can download Office to a device. [Describe Office 365]
5. Office 365 is a
Local Storage
6. A storage pool can host a storage space used for
. [Describe Storage Spaces, Storage Pools]
File Systems
7. FAT is only available up to
and 2 GB file size limit. [Describe FAT]
settings. [Describe FAT32]
8. FAT32 has Full Control, Change, and Read and are available in the
. [Describe NTFS]
9. NTFS is the most common format for
by repairing files without interruption. [Describe Resilient File System]
10. ReFS is more efficient at
File and Print Sharing
11. File sharing is usually done from a
File and Print Sharing]
and uses groups as much as possible when sharing. [Describe
. [Describe File and Print Sharing]
12. Printer sharing can be done from a server or from a
13. NTFS permission full control is complete read/write permissions and the authority to
NTFS and Share Permissions]
14. The purpose of HomeGroup is to set up a
videos, documents, and printers. [Describe HomeGroup]
15. When joining a group nothing is shared by
HomeGroup]
16.
34 | Session 2
. [Describe
network that makes is easier to share pictures, music,
from the device joining the HomeGroup. [Describe
drivers enable printers but features are limited. [Describe Print Drivers]
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
17. Effective permissions are
. [Describe Effective Permissions]
18. Advanced share is the ability to set up, read, change, and full control
and Advanced Shares]
19. Map drives allows a user to access a network drive as if it were a
20.
for a folder. [Public, Basic,
drive. [Map Drives]
permission denies permissions to users unless they need it. [Recap Permissions]
Describe Data Encryption
21. EFS is a mechanism by which files and folders are
System]
on a single system. [Describe Encrypting File
22. A VPN is a private tunnel between a client and a network using
Network]
23. Asymmetric key is a public key used to encrypt the data and is
[Describe Public Key]
24. Certificate Services is a mechanism that
25. SSL provides a secure connection between
35 | Session 2
means. [Describe Virtual Private
to the entity encrypting the data.
public key certificates. [Describe Private Key]
and websites. [Describe SSL]
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing OneDrive
Description:
OneDrive is a Microsoft-hosted online storage drive. OneDrive gives a user the ability to work with a set of files across multiple
devices. For example, one could build a Word document on a laptop and store it in a OneDrive folder. Then, the file will synchronize
with the user’s OneDrive online storage drive. From there, the same file can be accessed on a Surface Pro 3, an iPad, an Android tablet,
or even a smartphone. This is made possible through OneDrive using a person’s account to synchronize files to all of those account’s
devices.
There are two versions of OneDrive:
OneDrive: The version that a user with a Microsoft account uses. This is typically used in home and small business environments.
OneDrive for Business: The online storage that is built into SharePoint for Office 365.
Both versions have an app in Windows which can be used to access files and folders stored via OneDrive. For those who have both
OneDrive and OneDrive for Business on a device, it is important to pay attention to where files are being stored (personal files for
OneDrive and business files for OneDrive for Business). OneDrive folders can be shared with anyone with an email address. This
makes it easy to share OneDrive files but one needs to be careful to make sure files are being shared to someone who really needs
permissions to those files.
In this project, you will explore both OneDrive and OneDrive for Business. For the OneDrive for Business portion of this project, you
will need a Microsoft Office 365 Pro Plus account, which can either be obtained through your organization or through a trial version
obtained at Microsoft.com.
Steps for Completion:
1. Log on to a Windows device with a Microsoft account.
2. If necessary, navigate to the Start screen.
3. Click the OnDrive app to launch OneDrive. You will see a
screen similar to the screen on the right:
4. Click the Documents tile. If there are any documents in your
OneDrive folder, they will show on the screen.
5. Right-click the screen. This taskbar will appear at the bottom of
the screen.
6. Click the Add files button.
7. Navigate to a location to where you have a file (such as
Documents).
8. Click the file.
9. Click the Copy to OneDrive button.
10. On a different device, log on using the same Microsoft account
you used on the original device.
11. Navigate to OneDrive. You will see the file you copied up to OneDrive.
12. Close all open windows.
13. The next area to explore is OneDrive for Business. For this exercise, you will need an Office 365 Pro Plus account. Open Internet
Explorer and navigate to http://portal.office.com.
14. After logging on, click the Tile icon near the top-left corner of the screen.
15. Click the OneDrive tile. If you see a message box asking whether to allow the connection, click the Allow button.
16. Note there is a folder named Shared with Everyone. Anything put into that folder is shared with anyone who knows the address
to the folder.
17. To upload a document to the OneDrive for Business folder and then share it, click the Upload link on the screen.
18. Navigate to a file you want to upload to OneDrive for Business and select the file.
19. Click Open. The file will upload to OneDrive.
36 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
20. To share the file, click the ellipsis (…) to the right of the file you just uploaded and click Share. You will see the following:
21. Click in the Enter names or email addresses text box and type an email address. If Office 365 recognizes the email address, a name
will appear.
22. If you want to require the recipient to sign in to Office 365 before accessing the file, make sure the Require sign-in check box is
selected. If not, clear the check box. You will want to clear the check box if you are sharing this file with someone who does not
have an Office 365 account in your organization.
23. Click the Show Options link. You will see a Send an email invitation check box. If you want to send an email letting the recipient
know you are sharing this file, leave the check box selected. Otherwise, clear the check box.
24. Click Share. Your file should look like this:
Points to Remember:
•
•
Know that OneDrive is used to allow a user with a Microsoft account to synchronize files on multiple devices.
Know that OneDrive for Business is used in an Office 365 business environment to allow organization members to synchronize
files on multiple devices.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
Describe Cloud Storage Services: Describe OneDrive; Describe OneDrive for Business
Project File: N/A
Difficulty: Intermediate
Required Materials: Two devices running Windows 8.1 and a Microsoft account for exploring OneDrive and an Office 365 Pro
Plus account for exploring OneDrive for Business
Objectives:
2.0 Understand Data Access and Management
2.1 Describe Cloud Storage Services
2.1.a Describe OneDrive
37 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Azure Storage
Description:
Buying and installing physical hard drives in a server can be an arduous task, especially for organizations that do not have a dedicated
IT professional to manage and monitor the physical hard drives. One option, then, for online storage (known as cloud storage) is to
get storage on Azure, Microsoft’s Infrastructure as a Service (IaaS) cloud platform. Azure storage has built-in replication, thus making
Azure a strong storage platform. Whenever data is written to a drive in Azure, the data is replicated to two other drives. This is similar
to a Redundant Array of Inexpensive Disks (RAID) storage setup on a set of physical hard drives. Here are the replication choices
when creating a storage account on Azure:
Locally Redundant: Data is replicated in the local georpahic area.
Geo-Redundant: Data is replicated to secondary region hundreds of miles away.
Read-Access Geo-Redundant: Similar to geo-redundant but the replica is read only
Zone Redundant: For block blobs (large blocks of data) and is replicated across two or three facilities.
Azure storage accounts can hold up to 500 TB of data, thus making them very versatile for online storage. Once an account is created,
databases and virtual machines can be added to it.
In this project, you will explore Azure storage accounts. For this exercise, you will need an Azure account. You can get a trial at http://
azure.microsoft.com.
Steps for Completion:
Open Internet Explorer.
1. Navigate to http://azure.microsoft.com.
2. Click the Portal link. You will be taken to the logon screen.
3. Log on to the Azure portal. You will see the items that have been
created in the Azure account.
4. Click the Storage area on the left side of the screen.
5. To add a storage account, click the
button at the bottomleft corner of the screen.
6. Click the Quick Create link. You will see a screen similar to the one
on the right:
7. Click in the URL box and type a unique name for the URL. If it is
unique, you will see a green check box on the right side of the text box. If not, keep trying until you get a unique name.
8. Choose a location from the Location/Affinity Group list.
9. Choose a replication type from the Replication list.
10. Click Create Storage Account. Your storage account will be added to the storage list.
Points to Remember:
•
•
The purpose of Azure is to have an available IaaS with one aspect of it being storage accounts.
The different types of replication are locally redundant, geo-redundant, read-access geo-redundant, and zone redundant.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
Describe Cloud Storage Services: Describe Microsoft Azure Storage
Project File: N/A
Difficulty: Advanced
Required Materials: An Azure account
Objectives:
2.0 Understand Data Access and Management
2.1 Describe Cloud Storage Services
2.1.b Describe Microsoft Azure Storage
38 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing OneNote
Description:
OneNote is a Microsoft Office program that is an electronic notebook. In OneNote, one can store notes, to-do lists, content from
webpages, and links to documents. OneNote differs from other Office programs in that OneNote offers real-time collaboration. For
example, a OneNote file can be published and then shared through OneDrive or SharePoint and then, multiple people can be editing
the file at once. This is a great tool to use for meetings, plans, and other work aspects which require collaboration. OneNote files also
automatically save when they are edited. This allows for changes to be made without one having to worry about saving changes. If a
user is logged on to a device using a Microsoft Account, OneNote files will, by default, want to save to the person’s OneDrive folder.
OneNote content is saved on pages which are inside of sections. Pages and sections can be easily added to a notebook, as you will see
in this project.
In addition to a Microsoft Office version, OneNote also has a Windows app version that comes automatically with Windows 8.1 on
a device. In this project, we will explore the Windows app version of OneNote. Note that as with other Windows apps, you need a
Microsoft account in order to fully use the app.
Steps for Completion:
1. On a device with Windows 8.1, log on with a Microsoft account if you are not already logged on and click the Start button to
access the Start screen.
2. Click or swipe down to the Apps screen.
icon to launch OneNote for Windows. Make sure you are launching this app and not the OneNote for
3. Click the
Office 2013 app. If you have any recent notebooks, you will see your most recent notebook on the screen.
4. Click the
icon to display the OneNote menu on the left side of the screen.
5. At the bottom of the OneNote menu, click
to add a new notebook. A blank name box will appear, indicating that the
notebook will be saved to a OneDrive folder.
6. Type: Mobile Notes
7. Press the Enter key. Your screen will resemble this:
8.
9.
10.
11.
12.
To add a section to this notebook, click the + sign next to Section. A new section will appear, ready to be named.
To name the section, over the highlighted text type: Windows Phones.
To add a new page to the new section, click the + sign next to Page. A new page will appear, ready to be named.
On the page, click in the empty title bar and type: New Devices to name the page accordingly.
If you want to add a note to this page, click anywhere on the page and type a note. When you are done, close OneNote. Your
changes will automatically be saved.
Points to Remember
•
•
•
There are two versions of OneNote: OneNote for Windows and OneNote for Microsoft Office.
If you are logged on to a device with a Microsoft account, OneNote files will save to the account’s OneDrive account by default.
Changes to OneNote files save automatically.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
Describe Cloud Storage Services: Describe OneNote
Project File: N/A
Difficulty: Intermediate
Required Materials: A Windows 8.1 device and a Microsoft account.
Objectives:
2.0 Understand Data Access and Management
39 | Session 2
2.1 Describe Cloud Storage Services
2.1.c Describe OneNote
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Outlook
Description:
Outlook is the a personal information management program. While most think of Outlook as a basic email program, Outlook has a
built-in calendar, contacts list, tasks list, and notes list.
While Outlook is part of Microsoft Office, anyone with an Office 365 account can access email, calendar, and tasks via the Outlook
app at outlook.office365.com. Those with an outlook.com account can access email and a calendar via outlook.com. In this project, you
will explore the features available in Outlook for Office 365. For this project, you will need an Office 365 Pro Plus account.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Launch Internet Explorer.
Navigate to outlook.office365.com.
Log on to the site with your user name and password. Your inbox will appear.
Click the Apps icon near the top-left corner of the screen.
Click the Calendar app. You will see your account calendar.
From here, you could click the New link to add a new calendar item. For now, click the Apps icon.
From the list of apps, click Tasks. The tasks screen will appear.
Click the New link.
Click in the Subject field and type: Reset my password.
Click the drop-down arrow on the Due field and set the due date for a week from the current date.
Click the Save button to save the task.
Close Internet Explorer.
Points to Remember (for the test and beyond):
•
•
•
•
Outlook is not just an email program. Outlook also can also manage one’s calendar, tasks, and notes.
Outlook online can be accessed at outlook.com for those with an Outlook email account.
Office 365 Pro Plus users can access their email through outlook.office365.com.
Using Outlook online, one can access email, calendar, and task features.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
Describe Cloud Storage Services: Describe Outlook
Project File: N/A
Difficulty: Intermediate
Required Materials: An Office 365 Pro Plus account. If that is not available, part of this exercise can be done with an Office 365
account or an Outlook.com email account
Objectives:
2.0 Understand Data Access and Management
2.1 Describe Cloud Storage Services
2.1.d Describe Outlook
40 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Office 365
Description:
Office 365, contrary to popular belief, is not exclusively an online version of Microsoft Office. While there are online apps for a few of
the Office programs, Office 365 is subscription-based Microsoft Office. This allows individuals and businesses to subscribe to Office
through paying a monthly fee rather than buying entire licenses. Office 365 also allows a subscriber to stay current with feature and
version updates to Microsoft Office. In this project, you will explore the online Office features. To use the online versions of any Office
app with an Office 365 Pro Plus account, you first need to make sure your OneDrive for Business storage drive is set up. Note that
with the online versions of Office, changes made are automatically saved.
Steps for Completion:
1.
2.
3.
4.
5.
Launch Internet Explorer.
Navigate to http://portal.office.com.
Log on with your Office 365 Pro Plus account.
To make sure your OneDrive for Business account is set up, click the Apps button.
From the list of apps displayed, click OneDrive. If you get a notice asking to allow contacts, click the Allow button. You should see
your list of documents stored in your OneDrive for Business account, as shown here:
6. Now that we can see the OneDrive for Business documents, we can use the available online versions of the Office apps. Click the
Apps button.
7. From the list of apps, click Word Online. The online version of Microsoft Word will open and you will be presented with a list of
templates from which to choose.
8. Click the General notes template.
9. To rename this document, click the Document1 text in the title bar and type: Class Notes.
10. Press the Enter key. The file will be renamed.
11. In the document, select the words [List Title].
12. Type: Class Notes for Today.
13. Select the rest of the text and replace the text with the following text: Make sure everyone’s OneDrive is set up.
14. To make sure this document is in the OneDrive for Business folder, click the Apps button.
15. Click OneDrive. Notice that the Class Notes document is in the Documents folder. As indicated earlier in this project, changes in
Word Online are saved automatically.
16. Close Internet Explorer.
Points to Remember:
•
Office 365 is a subscription-based version of Microsoft Office. Users with a subscription can obtain the desktop version of
Microsoft Office and use the online version of some of the Office apps.
41 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
•
To use the online version of any Office apps, a OneDrive for Business storage account is needed.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2
Describe Cloud Storage Services: Describe Office 365
Project File: N/A
Difficulty: Intermediate
Required Materials: An Office 365 Pro Plus account and a OneDrive for Business storage account
Objectives:
2.0 Understand Data Access and Management
2.1 Describe Cloud Storage Services
2.1.e Describe Office 365
42 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Storage Spaces and Storage Pools
Description:
One of the challenges of those administering a network is to ensure enough storage space is available not just for current data storage
demands but also for future data storage demands. An administrator can isolate a set of disks, both physical and virtual, and use those
disks to create a storage pool. In this, several disks pool together to become a single storage unit. Within a storage pool, one or more
storage spaces can be created. With storage spaces, hard disk space can be provisioned for a specific purpose, such as data storage for a
single application. Storage spaces can also be simple, in that the whole space is used for storage, or, a mirror, in which half the space is
used for storage and the other half is used as a mirror, that is, an exact copy of the data. This helps in situations where data needs to be
automatically backed up to another disk in case one disk crashes.
One unique feature of storage spaces is thin provisioning. In thin provisioning, disk space can be allocated even if the physical disk
space is not yet available. For example, a server could have 1 TB of physical hard drive space. An administrator may want to provision
2 TB of space for backup storage. Using thin provisioning, the 2 TB can be set up as a storage space. Eventually, of course, another
physical hard drive will be needed. But to those using the space, it looks like a 2 TB hard drive regardless of what the actual physical
hard drive capability is at the time.
In this project, you will set up a storage pool using two virtual hard drives on a device. The real-life purpose of this is to set aside a
specific storage space for storing files of your choosing. These could be pictures, personal documents, or business documents.
Steps for Completion:
1. The first step in creating a storage pool is to create two virtual hard drives for the pool. On a Windows 8.1 device, click the Start
button to access the Start screen.
2. Click or swipe down to the Apps area.
3. Scroll to the Windows System group.
4. Right-click the
icon and then click Manage. The Computer Management screen will appear, as seen here:
5. In the Storage group on the left side of the screen, click Disk Management. You will see a screen similar to this:
6. To start creating a storage pool and the two hard drives that will go into the storage pool, click the Action menu and then click
Create VHD.
7. Click the Browse button.
8. Name the file Storage1 and click the Save button.
9. To set the disk size to 10 GB, click in the Virtual hard disk size text box and type: 10.
10. For the size, click the MB drop-down arrow and change the setting to GB.
11. Click the OK button. It will take a few moments to create the virtual disk.
12. To create the second virtual disk for the storage pool, click the Action menu and then click Create VHD.
13. On the Create and Attach Virtual Hard Disk screen, click the Browse button.
43 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
14. Name the disk Storage2 and then click the Save button.
15. To set the disk size to 10 GB, just like we did for the previous drive,
click in the Virtual hard disk size text box and type: 10.
16. For the size, click the MB drop-down arrow and change the setting to
GB.
17. Click the OK button. When the second virtual disk is complete, you
will see something similar to that on the right:
18. For the disks to be available for use in a storage pool, the disks need to
be initialized but not allocated a drive letter. Right-click either of the disk labels (Disk 1 or Disk 2) and click Initialize Disk.
19. Click the OK button. Both disks will now be online instead of not initialized. They will
still be unallocated.
20. The creation of the storage pool is done in the Control Panel, so open the Control
Panel.
21. Make sure the Control Panel is set to view by Category. Then, click System and
Security.
22. In the list of items for System and Security, click Storage Spaces.
23. Click Create a new pool and storage space. If you get a User Account Control message,
click the Yes button. You will see something similar to the image on the right:
24. Click the Create Pool button.
25. For this project, we will utilize
the entire storage pool as a
single drive. Click the dropdown arrow on the Resiliency
type field and click the Simple
(no resiliency) setting.
26. Click Create Storage Space.
When the task is complete,
your storage spaces window
will look like the screen on the
right:
27. Note that you can add disks to
the storage pool at any time.
To see the new drive, click the
View files link.
28. Close all of your open windows.
Points to Remember:
•
•
•
A storage pool consists of at least two physical or virtual hard drives.
A storage space can either consist of the hard disk space of an entire pool, or, in the case of mirroring, half the storage space is used
to store data and the other half is used to serve as a mirrored copy of the data.
In the case of thin provisioning, a storage space is allocated more space than currently present, with the idea that disks will be
added to a storage pool at a later date.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
Local Storage: Describe Storage Spaces, Storage Pools
Project File: N/A
Difficulty: Advanced
Required Materials: Windows 8.1
Objectives:
2.0 Understand Data Access and Management
2.2 Describe Local Storage
44 | Session 2
2.2.a Describe Storage Spaces and Storage Pools
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing File Systems
Description:
With hard drives come file systems. Though most of the file systems now for hard drives are in the NTFS format, you will still want to
be familiar with the FAT, FAT32, and ReFS formats for the exam.
Format
When It Is Used
Characteristics
File Allocation
Tables (FAT)
Almost never because it is outdated.
FAT32
On older systems and on thumb drives.
New Technology
File System (NTFS)
Most Windows Devices.
2 GB file size limit.
Only available up to Windows XP.
Total volume size is 4 GB or less.
Cannot join a domain.
4 GB file size limit.
32 GB volume size limit in Windows XP.
2 TB theoretical volume size limit.
No Security tab in folder properties.
Available permissions are Full Control, Change, and Read.
File size is only limited by volume size.
Security tab is available in folder properties.
More granular permissions than FAT32.
Resilient File System On some Windows Server 2012 installations. Microsoft proprietary.
(ReFS)
Does not support file-level compression and encryption.
Efficient at self-healing.
File names can exceed 255 characters.
In this project, you will identify the type of file system in place given a situation and identify the file system in place on your device.
Steps for Completion:
1. For each situation, identify the file system in place:
a. A folder that has a file name with 300 characters in it:
b. A thumb drive that can hold a 3.5 GB file but not a 4.5 GB file:
c. A Windows device on which folders can have permissions set via a Security tab:
2. On a Windows device, open File Explorer.
3. Right-click the C: drive and click Properties. (Note the file system. It will most likely be NTFS.)
4. Click the Cancel button to close the window.
Points to Remember:
•
•
•
•
FAT is an old file system and is hardly ever used now.
FAT32 is prevalent on thumb drives and only has three permission levels (Full Control, Change, and Read).
NTFS is the most common file system on Windows devices.
ReFS is the newest file system, introduced in Windows Server 2012.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
File Systems: Describe FAT; Describe FAT32; Describe NTFS; Describe Resilient File System
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1
Objectives:
2.0 Understand Data Access and Management
2.3 Describe File Systems
2.3.a Describe FAT
45 | Session 2
2.3.b Describe FAT32
2.3.c Describe NTFS
2.3.d Describe Resilient File System Overview (ReFS)
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing NTFS and Share Permissions
Description:
There are a total of six permission levels on folders (five on files) for NTFS file systems in Windows. Later in this course, we will go
through a project that sets up permissions on folders. For now, though, here are the aspects one needs to know about these permission
levels:
Permission Level
Permission
Full Control
Complete read and write permissions and the authority to delegate permissions
Read and Execute
Can run executable files (programs and scripts)
Modify
List Folder Contents
Read
Can add, edit, and delete files and folders
Can view the files and folders inside of a folder. This permission is not available for individual files
as there is nothing to list in a file.
Can view files and file properties
Write
Can write files to a folder
When a permission level is granted, any other necessary permission levels are automatically granted. For example, when Modify is
assigned, Read and Execute, List Folder Contents, Read, and Write are also granted as they are necessary in order for one to have the
Modify permission.
In this project, you will identify the permission level someone needs given a situation.
Steps for Completion:
1. For each situation, identify the permission level a user will need:
a. A user needs to be able to run a patch to a program:
b. A user needs to be able to delete old files:
c. A user needs to be able to save new files to a folder:
Points to Remember:
•
•
•
Folders have six available permission levels in NTFS file systems.
Files have five available permission levels in NTFS file systems in that they have the same available permission levels as folders
except for the List Folder Contents permission level.
Some permission levels, when granted, automatically grant other permission levels.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
File and Print Sharing: Describe NTFS and Share Permissions
Project File: N/A
Difficulty: Intermediate
Required Materials: None
Objectives:
2.0 Understand Data Access and Management
2.4 Describe File and Print Sharing
2.4.a Describe NTFS and Share Permissions
46 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Setting Up a HomeGroup
Description:
A homegroup is a peer-to-peer network which allows for devices to share files (documents, music files, pictures, and videos),
printers and multimedia devices within a network. To set up a homegroup, one device needs to start the homegroup. In doing so, the
homegroup will obtain a password. For any other device wanting to join the homegroup, one just needs to enter the password one time.
Homegroups can be created on Windows 8.1 and Windows 8.1 Professional but not Windows RT. In this project, you will initiate a
homegroup with one device and then join the homegroup with another device.
Steps for Completion:
1.
2.
3.
4.
5.
On a Windows device, access the Charms bar.
Click Settings.
Click Change PC Settings.
In the menu on the left side of the screen, click Network.
Click HomeGroup.
14.
15.
16.
17.
18.
19.
20.
21.
Click in the Enter the homegroup password and type the password you wrote down earlier in this project.
Click the Join button. Your device will be joined to the homegroup but nothing will be shared by default.
Close the PC Settings window.
Open File Explorer. You should see a HomeGroup area on the left side of the screen, as seen here:
Click on the name of the homegroup.
Now, any music, picture, or video file on the first device that joined the homegroup will be accessible here.
Close all of your open windows.
Log off of both devices.
6. Click the Create button. If necessary, click the Music, Pictures, and Videos switches from Off to On.
Your screen should look similar to the one on the right:
7. Scroll down and write down the password as you will need it for the next part of the project.
8. Log on to a different Windows 8.1 device connected to the same network as the device that initiated
the homegroup.
9. Access the Charms bar.
10. Click Settings.
11. Click Change PC Settings.
12. Click Network.
13. Click HomeGroup. If the device is currently joined to a homegroup, click the Leave button.
Points to Remember:
•
•
•
To build a homegroup, a device needs to start a homegroup and take note of the homegroup password.
Once a homegroup is started, any device on the network can use the homegroup password to join the homegroup.
A device with Windows RT cannot start a homegroup.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
File and Print Sharing: Describe HomeGroup
Project File: N/A
Difficulty: Intermediate
Required Materials: Two devices with Windows 8.1, connected to the same network
Objectives:
2.0 Understand Data Access and Management
2.4 Describe File and Print Sharing
47 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Print Drivers
Description:
For hardware that needs to work with a device, a driver is a file that provides directions for that piece of hardware. In the case of
printers, a printer driver provides a device with printer information and printer characteristics such as printer trays, toner-saving
features, and printer settings with the most notable being duplex settings for printers that have built-in duplexing capabilities. There
are two main types of printer drivers for most printers. They are:
Universal: A driver which supports multiple printers from the same manufacturer. For example, a manufacturer could release one
driver for multiple laser printers.
Specific: A driver which supports a single, specific printer.
While a universal printer driver can support multiple printers, the shortcoming of the driver is that it only supports features common
to the printers for which the driver is configured. For example, a universal print driver could support five laser printers from the same
manufacturer. Three of those printers may have built-in duplexing features. But, because the duplexing feature is not available on all
five printers, it will not show as a feature should the universal printer driver be installed. Now, you will look at two situations and
identify which type of printer driver is being used.
Steps for Completion:
1. Look at the two properties pages for printer drivers for the same printer. Identify which one is universal and which one is specific:
a.
b.
Points to Remember
•
•
•
Printer drivers are files that have information such as fonts, paper trays, and built-in printer features.
Universal printer drivers work on multiple printers, but only support features available to every printer they support.
Specific printer drivers support all of the features for the single printer they support.
48 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training Session 2:
File and Print Sharing: Describe Printer Drivers
Project File: N/A
Difficulty: Beginner
Required Materials: None
Objectives:
2.0 Understand Data Access and Management
2.4 Describe File and Print Sharing
2.4.c Describe Printer Drivers
49 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Effective Permissions
Description:
When assigning permissions on folders and files, an administrator has to pay attention to more than just a folder or files on which
permissions are being granted. For starters, files and folders inherit permissions from the levels above them in a Windows file and
folder structure. For example, take the path C:\Sales\Sales Figures on a Windows server. An administrator may want to give Read
permissions to a group called Sales Admins on the Sales Figures folder. But, what if that same group already has Write permissions on
the Sales folder? Look at the following illustration:
In reality, Sales Admins can already read the Sales Figures folder. The reason: Sales Figures is a subfolder of Sales. Thus, it inherits
permissions from the Sales folder, which in this case is the Write permission. With this, a simple formula for effective permissions
is: Effective Permissions = explicit (or given) permissions + inherited permissions. For this example, the effective permissions for the
Sales Admins group for the Sales Figures folder = Read (the given) + Write (inherited from Sales) which, in turn, = Write. Effective
permissions are always cumulative, meaning that the highest of the permission levels take precedence. For our example, Write
permissions are higher than Read permissions, so the Sales Admins have Write permissions on the Sales Figures folder even if they are
only granted Read permissions on the Sales Figures folder.
Administrators, as a result of effective permissions, need to be very careful about what permissions are granted to a drive as all folders
under the drive will inherit permissions from that drive. For example, an administrator would not want to grant Modify permissions
to a Users group on a C: drive because then the Users group will have Modify permissions on every folder in that drive. In this project,
you will identify the permissions a group has on a folder given a set of assigned permissions.
Steps for Completion:
1. A group called Marketing has Read and Execute permissions on a P: drive. The same group has been given Read permissions
on a folder called P:\Marketing Policies and Write permissions on a folder called P:\Marketing Policies\Policy Drafts. For each
situation below, indicate whether the statement is true or false.
a. The Marketing group can add files to the Marketing Policies folder
b. The Marketing group can run an update file located in the Marketing Policies folder
c. The Marketing group can read, but not edit a policy document in the Policy Drafts folder
Points to Remember:
•
•
•
Files and folders inherit permissions from the folders and drives in which they reside.
As a result of permission inheritance, administrators need to be very careful about the permissions they assign on a drive level.
Effective permissions = assigned permissions + inherited permissions with the higher permission level taking precedence.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
File and Print Sharing: Describe Effective Permissions
Project File: N/A
Difficulty: Beginner
Required Materials: N/A
Objectives:
2.0 Understand Data and Access Management
50 | Session 2
2.4 Describe File and Print Sharing
2.4.d Describe Effective Permissions
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Creating Public Shares
Description:
One way to share files from a device is to create a HomeGroup, as we saw earlier in this course. While a HomeGroup makes it easy
to share documents, music videos, pictures, and videos, sometimes one will want to be more specific in which folders to share and the
users and groups to which those folders are shared. For example, a user may have a specific documents folder on a device to share with
a group of coworkers. There are three basic types of shares one can initiate on a device if one has administrative permissions to do so.
They are:
Public: Sharing of the public folder, located in the C:\Users folder.
Basic: Sharing of a folder with the granting of read and/or read/write permissions.
Advanced: Sharing of a folder with the granting of read, change, or full control permissions.
In this project, you will create a public share on a device and then access the share from another device. The next project will cover
creating basic and advanced shares.
Steps for Completion:
1. On a Windows 8.1 device, open File Explorer.
2. In File Explorer, navigate to C:\Users.
3. Right-click the Public folder and click Share with and then click Advanced sharing settings. The following window will appear:
4. Before going further, make sure network discovery is set to on. If necessary, click the Turn on network discovery option.
5. Click the expansion arrow for the All Networks section to expand the section.
6. If necessary, click the Turn on sharing so anyone with network access can read and write files in the Public folders option. Your
Public folder sharing section should look like the image below:
7. Close the Advanced sharing settings window.
8. Before testing this with another device, we need to make sure we know the
computer name on this device. In File Explorer, right-click This PC and click
Properties. The system properties will appear.
9. Look for the computer name, as seen in the example on the right. Note the
computer name as you will need it in the next part of this project.
10. To test the public share, log in to a different Windows 8.1 device that is on
the same network as the device you have been working with in this project.
11. Open File Explorer.
51 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
12. Click in the address bar and type \\<computername> where <computername> is the computer name you noted earlier in this
project.
13. Double-click the Users folder.
14. Double-click the Public folder. You should see several public folders.
15. Close all open windows. Leave both devices logged on if you plan on doing the next project.
Points to Remember:
•
•
A public share allows for a device to have its public folders shared so that other devices on the network can access those folders.
Before setting up a public share, make sure Network Discovery is on so that other devices on the network can discover the device
on which the share will be created.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
File and Print Sharing: Create Public, Basic, and Advanced Shares
Project File: N/A
Difficulty: Intermediate
Required Materials: Two devices with Windows 8.1
Objectives:
2.0 Understand Data Access and Management
2.4 Describe File and Print Sharing
2.4.e Create Public, Basic, and Advanced Shares
52 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Creating Basic and Advanced Shares
Description:
While the public folders on a device are often shared with other devices, the more common type of share is a share involving a specific
folder. As was mentioned in the previous project, a user may want to share a folder with specific documents in it with some co-workers.
Should a user want to give permissions to either read data in a folder or write files to a folder, a basic share should be created. If the
permissions on the folder involve having complete control over the folder, including the ability to control permissions on the folder, an
advanced share should be created. In this project, you will create both a basic share and an advanced share. You will then test the share
from another device.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
On a device running Windows 8.1, open File Explorer.
Navigate to the Documents folder.
In the Documents folder, create a folder and name it Basic Test.
In the Documents folder, create another folder and name it Advanced Test.
Next, you will add a file to each folder. Open the Basic Test folder.
In the empty folder, right-click the window and click New and then Text Document.
Name the document Basic Test File.
Navigate to the Advanced Test folder.
In the empty folder, right-click the window and click New and then Text Document.
Name the document Advanced Test File.
To set up the basic share, start with navigating to the Documents folder.
Right-click the Basic Test folder, click Share with, and then click Specific people.
Click the drop-down arrow on the empty field above the name field and click Everyone.
Click the Add button.
Note that everyone now has a permission level of Read. Click the drop-down arrow on the permission level and notice that the
choices are Read and Read/Write. For now, leave the permission level at Read.
Click the Share button. Your File Sharing window will show your Basic Test folder is now being shared, and the full folder path
will display.
Click the Done button.
If necessary, navigate to the Documents folder.
To set up an advanced share, right-click the Advanced Test folder and choose Properties.
On the Properties page, click the Sharing tab.
Click the Advanced Sharing button.
On the Advanced Sharing screen, select the Share this folder check box.
Click the Permissions button.
Note that for this project, we will use the Everyone group even though one typically will use a custom group in real life. With the
Everyone group selected, select the Allow check box in the Change row to allow anyone who can connect to this device to change
files in this folder.
Click the OK button twice.
Click the Close button.
Before testing this with another device, we need to make sure we know the computer name on this device. In File Explorer, rightclick This PC and click Properties. The system properties will appear.
Look for the computer name. Note the computer name as you will need it in the next part of this project.
To test the shares, log in to a different Windows 8.1 device that is on the same network as the device you have been working with
in this project.
Open File Explorer.
Click in the address bar and type \\<computername> where <computername> is the computer name you noted earlier in this
project.
Notice that the Basic Test folder is not showing. When a basic share is created, there is no special location for the share. So, we
have to navigate to the folder itself. Double-click the Users folder.
53 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
33.
34.
35.
36.
37.
38.
39.
40.
Double-click the folder with the user name you used to create the share.
Double-click the Documents folder. You should see the Basic Test folder.
Click the back arrow three times to return to the initial share screen.
Notice that the Advanced Test folder is showing. When an advanced share is created, it displays on the initial share screen
regardless of the actual location of the share. Double-click the Advanced Test folder.
Double-click the Advanced Test file to open it.
Enter some text in the file.
Save the file.
Leave both devices logged on if you plan on doing the next project.
Points to Remember:
•
•
•
•
A basic share allows for setting of read and/or read/write permissions.
An advanced share allows for setting of read, change, or full control permissions.
A basic share does not show right away when one accesses a device containing a share. The user has to navigate to the actual
directory.
An advanced share has a shortcut that shows right away when one accesses a device containing a share.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
File and Print Sharing: Public, Basic, and Advanced Shares
Project File: N/A
Difficulty: Intermediate
Required Materials: Two devices with Windows 8.1
Objectives:
2.0 Understand Data Access and Management
2.4 Describe File and Print Sharing
2.4.e Create Public, Basic, and Advanced Shares
54 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Mapping a Drive
Description:
In the previous project, several shares were set up on a device. The problem with these shares is that one has to know the name of the
device, the name of the share, and at times the exact location of the shared folder. And, the user connecting to the share needs this
information each time the connection is made, unless a map to that folder is created. In mapping to a share (technically called mapping
a network drive), the user connecting to the share only needs to know the share information once. Then, when the share is created, the
location becomes a drive letter to the user. In this project, you will map a share created in the previous project to a drive letter. Thus, if
you have not done the previous project, do that project and then come back to this project.
Steps for Completion:
1. On the device used in the previous project to access a
share (not create the share), open File Explorer.
2. Navigate to \\<computername> where
<computername> is the computer used to create the
shares in the previous project. You should see a folder
called Advanced Test.
3. Right-click the Advanced Test folder and click Map
Network drive. You will a see screen similar to the one
on the right:
4. Note that the Reconnect at sign-in check box is
selected. Leave this box checked so that the connection
to this share is made each time you log on to this
device.
5. Click the Finish button. The Advanced Test share will
open in a new window.
6. Close the Advanced Test window.
7. In the File Explorer window, click This PC. The Devices and drives area should look like the image below (the drive letter may
vary):
Points to Remember:
•
•
To map to a share (also known as mapping to a network drive), navigate to the folder location, right-click the folder and then map
the drive.
Make sure the Reconnect at sign on check box is selected so that the map is created each time the user logs on to the device.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
File and Print Sharing: Map Drives
Project File: N/A
Difficulty: Intermediate
Required Materials: The two Windows 8.1 devices used in the previous project
Objectives:
2.0 Understand Data Access and Management
55 | Session 2
2.4 Describe File and Print Sharing
2.4.f Map Drives
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Using Encrypting File System (EFS)
Description:
Encrypting File System (EFS) is a system by which files and folders are encrypted on a single system. With EFS, once files are
encrypted on a device, the only person who can open the files is the person who set the encryption. While this works well for a single
device, there are some limitations with EFS as files move to other systems. The files stay encrypted but the encryption will change
depending upon the account used on the share. For example, if a user with a local account on a device moves files from that device to
a network server, and has to log on with a domain account to move those files, the encryption will now be tied to the domain account,
not the local account on the device.
Furthermore, the encryption on the file is lost while the file is in transit. In addition, if the file is moved from a drive encrypted using
BitLocker to a drive that is not using BitLocker, the encryption is lost.
In this project, you will set up encryption on some device files and then test the encryption feature as a different user on the same
device.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
On a Windows 8.1 device, navigate to the C: drive in File Explorer.
Create a new folder inside of the C: drive and name it Encryption Test.
Open the Encryption Test folder.
Right-click inside of the folder window, click New, and then click Text
Document.
Name the text document Encrypted File.
Open the text document.
In the text document, type: I should be the only one to read this.
Save and close the text file.
Navigate back to the C: drive in File Explorer.
To encrypt the Encryption Test folder, right-click the folder and click
Properties.
From the General tab, click the Advanced button. You will see the dialog
box on the right:
Select the Encrypt contents to secure data check box.
Click the OK button.
Click the OK button to close the folder properties. You will see the Confirm Attribute Changes screen.
To apply encryption to the folder and everything in it, make sure the Apply changes to this folder, subfolders and files option is
selected and then click the OK button. The folder will now be green, indicating it is encrypted.
Sign out of the device.
Log on to the device as a different user.
Open File Explorer. If necessary, navigate to the C: drive.
Open the Encryption Test folder.
Open the text file named Encrypted File.
Click the OK button.
Close Notepad.
Points to Remember:
•
•
•
•
The main purpose of EFS is to enable a user to protect a folder and its subfolders and files from being read by other users on the
same device.
When an encrypted file or folder is moved to a different device, the encryption changes to that which belongs to the account
logged on to the destination device.
Files lose their encryption as they are being moved from one drive to another.
Files encrypted using BitLocker lose their encryption completely when they are moved to a drive that is not using BitLocker.
56 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
Describe Data Encryption: Describe Encrypting File System; Impact on Moving and Copying Files
Project File: N/A
Difficulty: Intermediate
Required Materials: A Windows 8.1 device and two user accounts
Objectives:
2.0 Understand Data Access and Management
2.5 Describe Data Encryption
2.5.a Describe Encrypting File System (EFS)
2.5.b Describe how EFS-Encrypted Folders Impact Moving and Copying Files
57 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing BitLocker To Go
Description:
Earlier in the course, BitLocker was introduced as the Microsoft-based tool for encrypting a hard disk. BitLocker can be set up on
devices running Windows 8 or 8.1 Professional or Enterprise. BitLocker To Go works just like BitLocker but on removable data
drives. This includes thumb drives and external hard drives. Similar to BitLocker, a password or smart card will be needed to unlock
the drive and you will have an opportunity to save the BitLocker recovery key.
As is the case with BitLocker, you will want to take care to not lose the password or smart card used to encrypt the drive. And, as is the
case with BitLocker, you will want to especially not lose the recovery key as it is needed to decrypt the drive in the case of a forgotten
password or lost smart card. In this project, you will set up BitLocker To Go on an external hard drive.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
Plug an external drive (it can be a thumb drive) into a Windows 8.1 device.
On the Windows device, open the Control Panel. Make sure the Control Panel view is set to by category.
In the Control Panel window, click System and Security.
Click BitLocker Drive Encryption.
In the BitLocker Drive Encryption, look for the Removable data drives – BitLocker To Go section.
Click Turn on BitLocker. The BitLocker Drive Encryption screen will appear.
Select the Use a password to unlock the drive check box.
Click in the Enter your password text box and type a password of your choosing.
Click in the Reenter your password text box and retype the password you entered in the previous step.
Click the Next button.
On the How do you want to back up your recovery key screen, click Save to a file.
Click the Save button to save the recovery file for this encryption. When you are prompted to save the recovery key to the PC,
click the Yes button.
Click the Next button.
On the screen asking how much of the drive to encrypt, leave the option to encrypt used disk space only selected and click the
Next button.
Click the Start Encrypting button. The encrypting could take several minutes or even longer depending upon the amount of data
to encrypt.
When the encryption is done, close all open windows.
Points to Remember:
•
•
BitLocker To Go is the version of BitLocker that encrypts external hard drives.
BitLocker To Go can run on Windows 8 or 8.1 Professional or Enterprise editions.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
Describe Data Encryption: Describe BitLocker To Go
Project File: N/A
Difficulty: Intermediate
Required Materials: Windows 8.1 on a device and an external hard drive or thumb drive
Objectives:
2.0 Understand Data Access and Management
2.5 Describe Data Encryption
2.5.c Describe BitLocker To Go
58 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Virtual Private Networks
Description:
A virtual private network (VPN) is a network which allows for a private network connection to take place using a public network,
namely the Internet. Here is an example: A company employee wants to be able to connect to a corporate network from a home
or local coffee shop. In this connection, the data transferring back and forth between the employee and the company needs to be
encrypted, along with the logon information the employee uses to connect to the corporate network. To do this, the company will first
set up a VPN. The VPN can be hardware-based using a VPN concentrator, software-based using an application or, in some cases, a
built-in Windows Server feature. The VPN could be set up with a combination of hardware and software. The employee then will need
set up (or have set up) a VPN connection. The employee can then use this connection to securely connect to the corporate network
from anywhere from which the employee has Internet access.
This connection is an example of a host-to-site VPN connection. The employee is the host, and the corporation is the site. A VPN
connection can also be set up between two corporations. This is known as a site-to-site VPN connection. An example of this is
a situation in which two companies collaborating on a project need to securely share data. In this project, you will set up a VPN
connection on a device. If you actually have a VPN connection you can use, you can test the connection.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
On a Windows 8.1 device, access the Charms bar on the right side of the screen.
Click Settings.
Click Change PC Settings.
In the PC Settings pane on the left side of the screen, click Network. One of the
sections is the VPN section, as seen on the right of the screen.
Click the plus sign next to the Add a VPN connection text. You will see an Add a
VPN connection screen.
Click the drop-down arrow on the VPN provider field and choose your VPN provider.
Click in the Connection name field and type a name for your connection.
Click in the Server name or address field and type either the name of the VPN server
to which you are connecting or its IP address.
Most VPN connections use a user name and password. If your VPN connection uses
a different authentication method such as a smart card or one-time password, click
the drop-down arrow on the Type of sign-in info field and click the appropriate
authentication method.
If you know the user name and password you are using for this connection, click in
the User name (optional) field and type the username you will use for this connection.
Then, click in the Password (optional) field and type the password you will use for this
connection. On the right side of the page is a completed example of an Add a VPN
connection screen.
Click the Save button to save this connection.
Close the PC Settings screen.
If you do not want to test the connection, this project is complete. To test this connection, perform the following steps:
a. Access the Charms bar.
b. Click Settings.
c. Click your existing network connection at the bottom of the screen. A menu of connections will appear.
d. Click the VPN connection you just created.
e. If necessary, enter any logon information.
f. Click Connect. After a few moments, you should be connected to your VPN.
Points to Remember:
•
•
•
A VPN is used to establish a private network connection using the means of a public network.
VPNs need to have encryption for both the login information and the data being transferred over the VPN connection.
The two most common VPNs are host-to-site and site-to-site.
59 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
Describe Data Encryption: Describe Virtual Private Network
Project File: N/A
Difficulty: Intermediate
Required Materials: Windows 8.1 and an available VPN connection
Objectives:
2.0 Understand Data Access and Management
2.5 Describe Data Encryption
2.5.d Describe Virtual Private Network
60 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Encryption Keys
Description:
With massive amounts of data transmitted between entities, such as company to company or a person looking for and purchasing
goods and services online, encrypting the data is of the highest importance. Encrypted data is much tougher for a hacker to obtain and
use than for data that is sent in plain text. When data is encrypted by the sender of a data transmission, it then needs to be decrypted
by the receiver of that transmission. For example, a person purchasing goods online will most likely enter a credit card number at the
time of purchase. That credit card number, along with any other personal information, is encrypted as soon as the purchaser clicks the
submit button. Then, the data is decrypted once it reaches the destination, more than likely a company database server. Encryption
happens in two ways:
Symmetric: Two entities that send data back and forth use the same encryption key to encrypt and decrypt data. This is most
common for data transmissions between two companies over a VPN. This is very uncommon for any data transmissions involving
transactions on a public website.
Asymmetric: In this encryption set up, the encryption starts with the data recipient sending a public key to the sender. The public
key is used to encrypt the data sent. The recipient then uses a private key to decrypt the data. This is the most common encryption
type for data involving transactions on a public website. Here is how it works: A person browses to a website with an https address.
Once there, the website sends the person a public key. When the person submits data (as in purchasing something), the public key
encrypts the data and the data is sent to the company. The company then uses its private key to decrypt the data.
To further illustrate this, imagine a bank with 100 safe deposit boxes. Each has a unique lock. Each customer with a box has a key
that can open that box but no other boxes. This is an example of a public key. The bank manager, however, has a key that can open any
safe deposit box. This is an example of a private key. In this project, you will identify the encryption keys being used based on a given
situation.
Steps for Completion:
1. For each situation, identify whether symmetric or asymmetric encryption is being used:
a. A company sends data to a neighboring company as the two companies are working together on a project:
b. A customer signs up for a subscription to an online newsletter through an https-addressed site:
2. Complete the sentence:
a. A customer who signs up for a subscription to an online newsletter will encrypt the data using a
key while the company hosting the newsletter will decrypt the data with a
key.
Points to Remember:
•
•
•
Symmetric encryption is usually used for encryption taking place between two entities and a public website is not involved.
Asymmetric encryption is usually used for encryption that takes place in a public website-based data transmission.
In asymmetric encryption, data is encrypted using a public key and decrypted using a private key.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
Describe Data Encryption: Describe Public Key; Describe Private Key
Project File: N/A
Difficulty: Intermediate
Required Materials: N/A
Objectives:
2.0 Understand Data Access and Management
2.5 Describe Data Encryption
61 | Session 2
2.5.e Describe Public Key
2.5.f Describe Private Key
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Certificate Services and Secure Socket
Layer (SSL)
Description:
In the previous project (Describing Public and Private Keys), we explored public keys and their role in an asymmetric encryption
process. Public keys need to be verified as being trustworthy means of encryption. Public keys are used most in conjunction with
Secure Sockets Layer (SSL). SSL provides a secure connection between Internet browsers and websites. SSL works in conjunction
with https-based websites. These keys, to be considered legitimate, need to be verified by a third party. There are quite a few companies
that specialize in verifying and, in many cases, insuring (sometimes with a substantial dollar amount) that the public encryption key is
safe and legitimate. To verify a public key on a website, one can look for a lock in the address bar, click on it, and see who has verified
the public key in use.
For symmetric encryption, keys are usually generated through a Certificate Service. A popular example of this is Active Directory
Certificate Services (ADCS). In ADCS, keys are generated and then sent to entities needing them. The keys are usually good for five
years but can be revoked at any time should anyone suspect that the key has been compromised. In this project, you will verify a public
key on an https-based website.
Steps for Completion:
1.
2.
3.
4.
Open Internet Explorer.
Navigate to www.google.com. Notice that the site is actually an https-based site, not an http-based site.
Click in the search box and type a phrase to search for (the words Navy Beans are used in this example).
Notice the lock in the address bar, as seen here:
5. Click the lock.
6. To see the valid dates of the certificate, click View certificates.
7. Close all open windows.
Points to Remember:
•
•
•
SSL is used to secure connections between Internet browsers and websites.
Public keys need to be verified by a third party in order to prove they are legitimate.
A Certificate Service is used to create encryption keys. In the case of a symmetric encryption, the key is shared with both parties
sharing data.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 2:
Describe Data Encryption: Describe AD Certificate Services; Describe SSL
Project File: N/A
Difficulty: Intermediate
Required Materials: Internet Explorer
Objectives:
2.0 Understand Data Access and Management
2.5 Describe Data Encryption
2.5.g Describe Certificate Services
2.5.h Describe SSL
62 | Session 2
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Fill-in-the-Blanks
Instructions: While watching Session 3, fill in the missing words according to the information presented by the instructor.
[References are found in the brackets.]
Internet, Intranet, and Extranet
1. The Internet is the world’s largest connection of
. [Differences]
is an example of an intranet. [Differences]
2.
network. [Describe Uses of Private Networks]
3. A private network is a typical
. [Describe Uses of
4. A public network is a network where devices can see each other over the
Public Network]
and
5. The two basic types of firewalls are
Firewalls]
. [Describe Uses of
on users and groups. [Describe Uses of Firewalls]
6. Firewalls are not a substitute for controlling
7.
is an example of cloud computing. [Describe Uses of Clouds]
Authentication
8. Fingerprints,
User Authentication]
, and voice readers are examples of biometric authentication methods. [Describe
are make up the three factors of authentication. [Describe
9. What you know, what you have, and
Multifactor Authentication]
authentication method. [Describe Smart Cards]
10. Smart cards are part of the
11. Windows Rights Management Services gives you the ability to control permissions on documents and
. [Windows Rights Management Services]
characters long. [Describe
12. A strong password policy makes sure user passwords are at least
Password Procedures]
. [Describe
13. In order to help prevent password attacks, avoid using words in a password found in a
Password Procedures]
Editor. [Describe Password Procedures]
14. You can edit password procedures in the
Permissions
15. Permissions are defined as the level at which you can access a
Permissions]
64 | Session 3
on a network. [Describe
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
16. You can control users and groups on a network using
. [Configure File and Share Permissions]
. [Assign Permissions]
17. The best way to assign permissions on a network is to use a
underneath the drive inherit those permissions.
18. When permissions are placed on a drive, the
[Move and Copy Files]
but not if
19. If a file is assigned individual permissions, those permissions are retained if the file is
it is
. [Move and Copy Files]
. [Describe Basic And Advanced
20. Advanced permissions give you the ability to enable or disable
Permissions]
21. Every
on a network has an owner. [Describe Taking Ownership]
to a user or group other than yourself. [Describe Delegating]
22. Delegating is the act of assigning
permissions. [Describe Resultant Permissions]
23. Resultant permissions is a synonym for
groups and created
24. Resultant permissions are a cumulative result of permissions assigned to
groups. [Describe Resultant Permissions]
Describe Malware
25. Malware is any
or program designed to cause harm to a system. [Describe Computer Viruses]
in order to propagate. [Describe Computer Viruses]
26. A virus needs to attach itself to a
program. [Describe Trojan Horses]
27. The key phrase for a Trojan horse is that it is an
28. Spyware is software that secretly obtains information about computer
29. Internet
. [Describe Spyware]
nowadays successfully block pop-up ads. [Describe Adware]
to warn you about websites that have been reported as suspicious or
30. Internet Explorer uses
malicious. [Antivirus and Antimalware Strategies]
65 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Private and Public Networks
Description:
When managing any aspect of a network, it is important to understand the type of network being managed. From the standpoint of
managing devices, the biggest question is: Will these devices be accessible from the Internet? Most of the time, the answer is no. But,
certain servers, like web servers, may be accessible from the Internet. In those cases, extra protection is needed to make sure those
devices are protected from bad data and malicious users. Networks typically fall into one of two classifications. They are:
Private: In a private network, devices cannot be seen from the Internet. A typical corporate network falls into this category. While
devices can see each other, the general public does not see these devices.
Public: In a public network, devices can see each other on the Internet. This also makes devices more vulnerable to attacks from
malicious sources.
The Internet is the world’s largest public network. Any device you manage which faces the Internet (like a web server hosting a
website) needs to have a firewall in front of it to control the traffic allowed into the web server. Firewalls are covered in the next project
in this workbook. Not all websites are connected directly to the Internet. A website which is only accessible to members of a private
network is known as an intranet. An intranet can contain company information, documents used for company purposes, and company
tasks lists and calendars. SharePoint, a Microsoft web-based collaboration tool, is a prime example of an intranet site. An intranet
which allows people and groups outside of the company to access it with proper authentication is known as an extranet. Though this is
not a term used often in most environments, it technically is different than a pure intranet. In the next project, you will identify a type
of network given a situation. You will also explore a SharePoint site if you have access to one.
Steps for Completion:
1. For each network, identify the type of network (Internet, Intranet, or Extranet):
a. A database application that company users use and share with selected vendors:
b. A company website on which customers can sign up to receive monthly newsletters:
2.
3.
4.
5.
6.
7.
8.
c. A company website restricted to company employees:
For the remainder of this project, you need access to a SharePoint site. Open Internet Explorer.
Navigate to your SharePoint site. If necessary, log on to the site.
Notice that you have app tiles on your home page to help you navigate the SharePoint site.
Click the Site Contents link on the left side of the screen.
Click the Documents icon to view the document library on the SharePoint site.
Once you are done browsing through the document library, click the Site Contents link on the left side of the screen.
Click another app tile to view the content of that app. Close Internet Explorer.
Points to Remember:
•
•
•
Intranets are websites and applications on private networks.
Extranets are intranets which allow external users to access the Intranet with proper credentials.
The Internet is the world’s largest public network.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Internet, Intranet, and Extranet: Describe Uses of Private Networks; Describe Uses of Public Networks
Project File: N/A
Difficulty: Advanced
Required Materials: A Windows device and access to a SharePoint site
Objectives:
3.0 Understand Device Security
3.1 Describe the Differences between the Internet, an Intranet, and an Extranet
3.1.a Describe Uses of Private Networks
3.1.b Describe Uses of Public Networks
66 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Uses of Firewalls
Description:
A firewall is a hardware device and/or software application with a main purpose of protecting systems from unwanted traffic,
specifically data packets. The main job of a firewall is to allow or block data packets based on the needs of a network or device.
Firewalls control the flow of data packets into and out of a system through three main settings:
Ports: Firewalls can be set to allow or block specific logical ports. For example, to make sure a system does not act as an email
relay client, the firewall can be set to block outgoing traffic on port 25, the port used for Simple Mail Transfer Protocol (SMTP),
the protocol used for outgoing email.
Protocols: Firewalls can be set to allow or block specific protocols. For example, a server that needs to not allow PING requests to
come in can have its firewall block all Internet Control Message Protocol (ICMP) traffic.
Programs: Though many programs run through ports, most firewalls have a list of programs an administrator can choose to
allow or block. For example, a firewall can be set to block incoming requests for programs that allow one to connect remotely to a
computer.
To achieve this goal of controlling network traffic, there are two main types of firewalls:
Host-based: A firewall for a single computer.
Network-based: A firewall for part of or an entire network.
The key to making firewalls work is to make sure to know which firewalls are turned on and fully functional in a network. A firewall
should always be placed at the point of entry in a network, next to the outgoing router, so the incoming traffic to the network is
controlled. If the same firewall controls internal traffic, firewalls are not necessarily needed on individual machines. In this project, you
will open a port for incoming traffic for a specific application on Windows Firewall.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
On a Windows 8.1 device, click the Start button.
Type: Firewall.
Click Windows Firewall.
On the left side of the screen, click Advanced Settings.
On the left side of the screen, click Inbound Rules.
To start setting a rule to open port 81 for incoming traffic, under Actions on the right side of the screen, click New Rule.
Choose the Port option.
Click the Next button.
Click in the Specific local ports field and type: 81.
Click the Next button.
Make sure the Allow the Connection option is selected and then click the Next button.
To make sure the port is open no matter how one is logged on to the device, make sure all three settings (Domain, Private, and
Public) are selected. Click the Next button.
Click in the Name box.
Type: Open Port 81.
Click the Finish button. You will see your new firewall rule in the list of inbound rules.
Close Windows Firewall.
Points to Remember:
•
•
•
A firewall can be a hardware device, a software application, or a combination of both.
Firewalls allow or block network traffic based on ports, protocols, and programs.
Firewalls can either be host-based or network-based.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Internet, Intranet, and Extranet: Describe Uses of Firewalls
67 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Project File: N/A
Difficulty: Intermediate
Required Materials: Windows 8.1 and enough permissions to configure Windows Firewall
Objectives:
3.0 Understand Device Security
3.1 Describe the Differences between the Internet, an Intranet, and an Extranet
3.1.c Describe uses of Firewalls
68 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Uses of Clouds
Description:
Cloud computing, a type of computing that has gained in popularity in the last few years, is a type of computing in which at least part
of the computing infrastructure is centrally hosted and shared. Cloud computing services range from storing files online to hosting an
entire business network, with users, groups, servers, and applications. To use cloud services, one needs an Internet connection and an
account to the cloud service to use. Here are some examples of cloud computing:
Applications: Part of Office 365 is the use of online apps, such as Word Online, Excel Online, and PowerPoint Online. These
apps allow users to use Word, Excel, and PowerPoint in a web browser rather than having to download and install the program.
Storage: OneDrive is an online storage drive. It functions like a physical hard drive in that it can be accessed from File Explorer.
However, the data is actually stored in the cloud and can be accessed from any device, including Android and iOS devices.
Networks: Microsoft Azure is an example of a complete network infrastructure in the cloud. Azure hosts network storage, virtual
machines, and Active Directory. This allows a business to have a complete network infrastructure without having to physically
install on-premises servers.
In this project, you will explore Microsoft’s cloud computing service, Microsoft Azure. You will need an Azure account or you can get a
trial account through the Azure website.
Steps for Completion:
1.
2.
3.
4.
5.
Open Internet Explorer.
Navigate to http://azure.microsoft.com.
Click the Portal link near the top of the page.
Log on to the site with your user name and password.
Click the Cloud Services link on the left side of the screen.
6. In the bottom-left corner of the page, click
.
7. From here, you could create a cloud service which can host virtual machines, SQL databases, and storage areas. Click the Network
Services link on the left side of the screen.
8. Notice that you can create an entire virtual network in Azure. Click the Data Services link on the left side of the screen.
9. In the Data Services area you could create a new SQL database, storage area, and recovery service for the purpose of backing up
and recovering data. Click the X in the top-right corner of the new screen to close it.
10. Log out of Microsoft Azure.
11. Close Internet Explorer.
Points to Remember:
•
•
•
•
Cloud computing allows for simple computing tasks to be done online, such as storing files, or, more complex computing such as
online applications or online networks.
Office 365 is an example of applications in the cloud.
OneDrive is an example of storage in the cloud.
Azure is an example of infrastructure in the cloud.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Internet, Intranet, and Extranet; Describe Uses of Clouds
Project File: N/A
Difficulty: Intermediate
Required Materials: A Microsoft Azure account
Objectives:
3.0 Understand Device Security
3.1 Describe the Differences Between the Internet, an Intranet, and an Extranet
3.1.d Describe Uses of Clouds
69 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Authentication
Description:
Authentication is the means by which a system verifies that a user and/or device trying to access a system is properly identified. Any
time a user logs on to a network, the user is being verified through means of a user name and password, perhaps a smart card, or even a
fingerprint. Authentication is not to be confused with authorization. Authorization is the granting of permissions to a resource.
Authentication has three factors: what you know, what you have, and who you are. Here are further definitions, along with some
examples of each:
Authentication Type
What You Know
What You Have
Who You Are
What it Involves
A user name and password. This is a very standard form of authentication.
A tangible item which is unique to a user or device. Examples include badges, a credit or ATM card,
and a smart card one inserts into a device in order to log on to it and/or a network. Smart cards have
chips in them to serve as the unique identifier for the card.
This is part of your person. This can include facial recognition, retina scanning, or fingerprint scanning. This is known as biometrics.
Should two or more authentication types be needed, multifactor authentication is taking place. For example, a user trying to log on to
an Office 365 portal may need a user name, password, and a code from a text message received on the user’s smartphone in order to log
on to the portal. The what you know (user name and password) and what you have (a smartphone) are the two authentication types
used for the login. In this project, you will identify the types of authentication taking place.
Steps for Completion:
1. For each authentication situation, identify the types of authentication (what you know, what you have, who you are) taking place.
Some of these situations may use more than one authentication type.
a. Entering a passcode to enter a building:
b. Entering a user name and password while a smart card is plugged into a device:
c. Using a rewards card to earn points at a local Microsoft store:
d. Swiping a fingerprint to unlock a turnstile:
e. Entering a PIN to unlock a device:
Points to Remember:
•
•
•
Authentication is the means by which a user and/or device is properly identified when logging on to a system.
Authentication is not authorization. Authorization is the granting of permissions to a system.
Multifactor authentication is the use of two or more authentication types (what you know, what you have, who you are).
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Authentication: Describe Multifactor Authentication; Describe Smart Cards; Describe Biometrics
Project File: N/A
Difficulty: Beginner
Required Materials: None
Objectives:
3.0 Understand Device Security
3.2 Describe User Authentication
3.2.a Describe Multifactor
70 | Session 3
Authentication
3.2.b Describe Smart Cards
3.2.d Describe Biometrics
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Windows Rights Management Services
Description:
Windows Rights Management is a service which, when configured, allows users to control individual permissions on Office documents
and email messages in Outlook. For example, a user may want to make sure that only one other individual in a company can edit a
file the user is working on. Ordinarily, this permission restriction would need to be set up through a permission setting on the file by a
network administrator. But, with Windows Rights Management, the person working on the file can control the permissions on the file.
Later in this course, you will see how to set up permissions on a document using Windows Rights Management. In this project, you
will set up Windows Rights Management. Windows Rights Management can be set up on-premises through Active Directory or, as
you will do in this project, through Azure on Office 365.
Steps for Completion:
1. Log in to an Office 365 site with an administrator account.
2. Click the Apps button near the top-left corner of the screen.
. If you get a message box asking to allow contacts, click the Allow button.
3. Click
4. On the left side of the screen, click the triangle next to the Service Settings section to expand it if it is not already expanded. Then,
click Rights Management.
5. Click the Manage link. You will see an
image similar to the one on the right.
6. Click the activate button.
7. Click the activate button again.
When the screen refreshes, Rights
Management will be activated.
8. To further configure Rights
Management, you need an Azure
subscription. For now, close Internet
Explorer.
Points to Remember:
•
•
Windows Rights Management allows users to set individual permissions on their own files.
Windows Rights Management is available either through Active Directory or Azure through Office 365.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Authentication: Windows Rights Management Services
Project File: N/A
Difficulty: Intermediate
Required Materials: Administrative access to an Office 365 portal.
Objectives:
3.0 Understand Device Security
3.2 Describe User Authentication
3.2.c Describe Windows Rights Management Services
71 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Password Procedures
Description:
Whether administering an entire network, or a single device, a strong password along with a strong password policy should be set. A
strong password is a password which is not easily guessed or cracked. A strong password will have at least eight characters and at least
three of the following:
• Uppercase letters
• Lowercase letters
• Numbers
• Symbols
Furthermore, the password should not contain words which can be found in a dictionary. For example, IamMTA98368 does have
uppercase letters, lowercase letters, and numbers, so it is considered a strong password. However, the word, am, is in the dictionary,
so the password is somewhat susceptible to being cracked. [email protected]@98368 is much stronger for two reasons: first, it has a symbol.
Secondly, it does not contain any dictionary words. This will help prevent dictionary attacks. A dictionary attack is an attack in which
an attacker uses dictionary words to attempt to guess a password. In the next project, you will examine and then set a password policy
on your device. Then, you will set a strong password on your device.
Steps for Completion:
1. On a Windows 8.1 device, click the Start button.
, click the setting. The administrative tools window will appear.
2. Type: Administrative Tools. When you see
3. Double-click the Local Security Policy shortcut.
4. Click the arrow to the left of Account Policies to expand the
Account Policies group.
5. Click the password policy folder.
6. To set the minimum password length to eight characters, doubleclick the Minimum password length policy. You will see the
screen on the right:
7. Click in the characters text box and type: 8 (to set the minimum
password length to eight characters).
8. Click the OK button. You will be taken back to the local security
policy window.
9. To make sure the password needs to be a strong password,
double-click the Password must meet complexity requirements
policy.
10. If the setting is set to Disabled, click the Enabled option to enable it. This will enforce having a password that has at least three of
the four characteristics needed for a strong password (uppercase letters, lowercase letters, numbers, and symbols).
11. Click the OK button.
12. To set your password, hover your mouse over the right side of
the screen to show the Charms bar.
13. Click Settings.
14. Click PC Settings.
15. Click Accounts.
16. Click Sign-in options. You will see the screen on the right:
17. Click the Change button.
18. Click in the Password text box and type in your current password.
19. Click the Next button.
20. Click in the Old password text box and type your old password.
21. Click in the Create password text box and type a new, strong password.
22. Click in the Reenter password text box and retype your new password.
23. Click the next button. You will see a message indicating your password has been changed.
24. Close all open windows.
72 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Points to Remember:
•
•
Every network and every device should have a password policy in place to define minimum requirements for a password.
A strong password policy is a password policy in which the password needs to be at least eight characters long and must contain
three of the four following characters: uppercase letters, lowercase letters, numbers, and symbols.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Authentication: Describe Password Procedures
Project File: N/A
Difficulty: Intermediate
Required Materials: Windows 8.1
Objectives:
3.0 Understand Device Security
3.2 Describe User Authentication
3.2.a Describe Password Policies
73 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Setting Up Permissions on Folders and Files
Description:
When managing any device with files and folders which need to be accessed by multiple people, permissions need to be granted on
those files and folders. Permissions relate to what users can do with files and folders. Rights relate to what people can do on their own
operating systems. For example, a user being able to access a folder on a network server has permissions to the folder. A user who
can customize a desktop background has the right to change a desktop background. When giving permissions out on folders, the
permissions should be given to groups and not individual users as much as possible. The more individual permissions given out, the
more difficult permissions are to manage.
Take this situation, for example. Five members of the sales team need to be able to write files to two folders on a network server. Here
is how that would look if the team members were given individual permissions to the folders:
Folder
Sales A
Permission
Write
Names
Salesperson 1, Salesperson 2, Salesperson 3, Salesperson 4, Salesperson 5
Sales B
Write
Salesperson 1, Salesperson 2, Salesperson 3, Salesperson 4, Salesperson 5
If you need to remove one of the salesperson’s permissions in this situation, you would need to remove those permissions on each
folder.
Using groups, however, simplifies permission administration. Using the example above, an administrator could create a group called
Salespersons and add all five salespersons to the group. Then, the administrator could assign the group to each folder, as seen here:
Folder
Sales A
Permission
Write
Names
Salespersons
Sales B
Write
Salespersons
Now, if one of the salespersons leaves or another is added, only one change needs to be made, and that is to either add a salesperson to
the Salespersons group or remove a person from the Salespersons group. This makes managing permissions much easier than that of
individuals being given permissions to folders. Should the folder being shared be a OneDrive folder, giving permissions to individuals
is more likely, as the default account type used for sharing OneDrive folders is an email account. So, unless the email address is a group
address, individuals will get permissions to OneDrive folders.
The key to managing permissions well is to keep track of permissions which one has assigned. Whether this is an administrator
managing permissions on a file server or an individual sharing a OneDrive folder, whoever is doing the sharing should always know
who has permissions and the permission levels each person or group has on the folder. In this project, you will share a OneDrive folder
with someone via the person’s email address.
Steps for Completion:
1. Log on to a Windows 8.1 device with a Microsoft account.
2. Open File Explorer.
3. In the navigation menu on the left side of the screen, right-click the Documents folder in the OneDrive section, click Share with,
and then click OneDrive. Internet Explorer will open.
4. Click the Share this folder button. This window will appear:
74 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
5. Click in the To text box and type in an email address.
6. Click the Recipients can edit link. You will see the options on the right
side of the page.
7. Click the drop-down arrow on the Recipients can edit field and click Recipients can only view. This will allow the person to whom
you are sharing this folder the ability to view what is in this folder but not change it.
8. Click the drop-down arrow on the Recipients don’t need a Microsoft account field and notice the setting allows for requiring
a Microsoft account. Do not change this setting unless you know for sure that the person you are sharing this folder with has a
Microsoft account.
9. Click the Share button. Your screen will look similar to the image on the screen below:
10. Click the Close button. Your Documents folder is now shared with the person with the email address you specified when sharing
the folder.
11. Close all open windows.
Points to Remember:
•
•
When possible, use groups to manage permissions on files and folders.
When sharing folders via OneDrive, the sharing is done with email recipients.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Permissions: Configure File and Share Permissions
Project File: N/A
Difficulty: Intermediate
Required Materials: Windows 8.1 and a Microsoft account
Objectives:
3.0 Understand Device Security
3.3 Describe Permissions
3.3.a Configure File and Share Permissions
75 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Permission Changes on File Location Changes
Description:
When moving files from one folder to another or from one device to another, permissions on the
files can be affected. By default, files and folders inherit permissions from their parent objects. As an
example, look at the file structure on a device, found on the right of the page:
Permissions for any files in a folder, such as the Basic Test folder, will inherit from the Sharing folder
which, in turn, inherit from the C: drive. That is one set of permissions which apply to files and folders,
that of inheritance. Permissions can also be granted to files and folders. For example, there could be
files inside of the Basic Test folder and permissions could be given on those files. Then, if the files are
moved or copied, one needs to know how that affects permissions, both granted and inherited. In this
project, you will grant permissions to files in folders, and then move a file and see how that affects
permissions. Then, you will copy a file and see how that affects permissions.
Steps for Completion:
1.
2.
3.
4.
5.
On a Windows 8.1 device, open File Explorer.
On your C: drive, create a folder and name it Move and Copy.
Navigate to your Documents folder in the This PC section.
In your Documents folder, create two folders. Name one Moving and the other Copying.
In the Moving folder, create a text file and name it Moving Test. The file
does not need to have any text in it.
6. In the Copying folder, create a text file and name it Copying Test. The
file does not need to have any text in it.
7. Open the Moving folder.
8. Right-click the Moving Test file and click Properties.
9. Click the Security tab. You will see a screen that resembles the screen on
the right:
10. Click each of the user names and groups in the Group or user names
box. Notice all of the check marks are gray, indicating that permissions
have been inherited from the folder in which this file is located.
11. To add a permission for the Users group, click the Edit button.
12. Click the Add button.
13. In the Enter the object names to select text box, type: Users.
14. Click the OK button. Your screen should look like the image on the right:
15. Notice the Users group has been given Read & execute and Read permissions.
The black check mark indicates that these permissions were granted, not
inherited, as seen in the image on the right:
16. Select the Write check box in the Allow column to grant Write permissions on
this file to the Users group.
17. Click the OK button.
18. Click the OK button again to close the Properties dialog box.
19. Navigate to the Copying folder inside of the Documents folder.
20. Right-click the Copying Test file and click Properties.
21. Click the Security tab.
22. As in the previous file, to grant permissions to the Users group, click the Edit
button.
23. Click the Add button.
24. In the Enter the object names to select text box, type: Users.
25. Click the OK button. Notice that the Users group now has Read & execute
and Read permissions on the file.
26. To add Write permissions to the file, select the Write check box in the Allow column.
27. Click the OK button.
28. Click the OK button to close the Properties box.
76 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
To test the effect copying a file has on permissions, copy the Copying Test file.
Paste it into the C:\Move and Copy folder.
Right-click the file (now in the Move and Copy folder) and click Properties.
Click the Security tab. Notice that the three permissions (Read & execute, Read, and Write) did not follow the file as it was
copied to the Move and Copy folder.
Click the OK button to close the Properties box.
Navigate to your Moving folder inside of the Documents folder.
Cut the Moving Test file.
Paste the Moving Test file inside of the C:\Move and Copy folder.
Right-click the Moving Test file and click Properties.
Click the Security tab.
Click the Users group. Notice that the permissions followed the file as it was moved from the Moving folder to this folder.
Click the OK button to close the Properties box.
Points to Remember:
•
•
•
•
By default, permissions on files are inherited from the permissions on the folders in which the files are located.
Permissions can also be explicitly granted to files inside of folders.
When a file is copied from one folder to another, the explicitly granted permissions do not follow the file.
When a file is moved from one folder to another, the explicitly granted permissions do follow the file.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Permissions: Move and Copy Files
Project File: N/A
Difficulty: Intermediate
Required Materials: Windows 8.1
Objectives:
3.0 Understand Device Security
3.3 Describe Permissions
3.3.b Describe the Behavior when Moving or Copying Files from one Location to Another
77 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Basic and Advanced Permissions
Description:
When granting permissions on files and folders, there are several basic permission levels available to grant on
those files and folders. These basic permission levels include Full control, Modify, Read & execute, List folder
contents, Read, and Write. These permission levels were described in detail in the Describing NTFS and Share
Permissions project earlier in this course. Permissions, by default, also inherit from folders and drives above.
Sometimes, however, you may not want inheritance to take place. Take a look at the folder structure on the right.
Now, suppose that the Users group has Read and Read & execute permissions on the Testing folder. This would also mean that
the Users group has Read and Read & execute permissions on both the Confidential and Everyone folders, as those folders inherit
permissions from the parent folder, Testing.
In a case such as this, an administrator may not want the Users group to have permissions on the Confidential folder. To remove the
permissions, an administrator can look at the Advanced Permissions area of permissions and disable the inheritance of permissions
from the folder above and then remove the Users group permissions from the folder.
Another feature of advanced permissions is auditing. Auditing allows for logging of activity on a folder. For example, an administrator
may want to know when a user or group accessed a folder. Turning auditing on and writing a log to the Event Viewer whenever the
audit conditions are true allows an administrator to see the activity on the folder.
In this project, you will explore advanced permissions on a folder and disable inheritance on a folder. Then, you will enable auditing for
a folder.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
On a Windows 8.1 device, open File Explorer.
Navigate to the Documents folder inside of the This PC section.
Create a folder inside of the Documents folder. Name the folder Testing.
Create two folders inside of the Testing folder. Name one folder Confidential and name the other folder Everyone.
To set some inherited permissions, right-click the Testing folder and click Properties.
Click the Security tab.
Click the Edit button.
Click the Add button.
In the Enter the object names to select text box, type: Users.
Click the OK button.
Notice that the Users group now has Read & execute, List folder contents, and Read check boxes selected.
Click the OK button to close the Permissions for Testing box.
Click the OK button to close the Properties box.
To disable inheritance on the Confidential folder, right-click the folder and click Properties.
Click the Security tab.
Click the Users group. Notice that the Users group has Read & execute, List folder contents, and Read permissions on the
Confidential folder, and the check marks are gray,
indicating that these are inherited permissions.
17. To start the process of disabling inheritance on this
folder, click the Advanced button.
18. Click the Disable inheritance button. You will see the
dialog box on the right:
19. Click Remove all inherited permissions from this
object. Notice that you, as the owner of this folder, still
can assign permissions to this folder.
20. Click the OK button.
21. Click the Yes button. Notice that all of the permissions
for this folder have been deleted.
78 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
Click the OK button.
To start setting up auditing on a folder, right-click the Everyone folder and click Properties.
Click the Security tab.
Click the Advanced button.
Click the Auditing tab.
Click the Continue button. The Auditing entries area should be blank.
Click the Add button.
Click the Select a Principal link.
Click in the Enter the object name to select text box and type: Users.
Click the OK button. Notice that the check marks for Read & execute, List folder contents, and Read are checked, indicating the
permissions the Users group has on this folder.
32. To make sure that the auditing only takes place for this folder, select the Only apply these auditing settings to objects and/or
containers within this container check box.
33. Notice the audit type is set to Success, which will log each time someone in the Users group accesses this folder.
34. Click the OK button three times.
Points to Remember:
•
•
•
•
The Advanced Permissions area allows for viewing of which permissions on an object (a file or folder) are inherited and which
ones are not inherited.
The Advanced Permissions area is the area where inheritance can be disabled.
When disabling inheritance, permissions can be left in place or they can be removed.
Auditing allows an administrator to track successful or failed attempts to access a folder.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3
Permissions: Describe Basic and Advanced Permissions
Project File: N/A
Difficulty: Intermediate
Required Materials: Windows 8.1
Objectives:
3.0 Understand Device Security
3.3 Describe Permissions
3.3.c Describe Basic and Advanced Permissions
79 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Taking Ownership and Delegating
Description:
Every object, meaning every file and folder on a device, has an owner. The owner has complete permissions on the object and the
ability to give out permissions on the object. Even if all of the other permissions for the object are taken away, the owner still has
complete permissions on the object. For this reason, it is important to know who the owner is for each object on a device. Ownership
for an object can be changed in one of two ways:
Taking ownership: In this model, you can assign yourself ownership of an object you do not currently own. You must be an
administrator on the device in order to take ownership of any object.
Delegating: In this model, you can assign someone else ownership of an object you own. Keep in mind that in doing so, the new
owner has full control permissions on the object, so choose wisely when delegating ownership.
When changing ownership on an object, an individual can become the owner of the object or, the ownership can be transferred to a
group. Groups are preferable in that if a group owns the object, any member of the group can control permissions on the object. And, if
one group member should leave the company, the other group members can still control permissions on the object.
In this project, you will take ownership of a folder and delegate ownership of a different folder.
Steps for Completion:
1. If you created the Confidential and Everyone folders in the Documents folder during the previous exercise, go to the step two.
Otherwise, on a Windows 8.1 device, create two folders inside your Documents folder in the This PC section of your device,
naming one folder Confidential and the other folder Everyone.
2. Right-click the Confidential folder and click Properties.
3. Click the Security tab.
4. Click the Advanced button.
5. To the right of the current owner of the folder, click the Change link.
6. To assign the Administrators group, of which you are a member, as owners, click in the Enter object name to select text box and
type: Administrators.
7. Click the OK button. Notice the ownership has changed to the Administrators group.
8. To ensure all the files and folders in this object have a new owner, select the Replace owner on subcontainers and objects check
box.
9. Click the OK button twice.
10. To start the process of delegating ownership on an object, right-click the Everyone folder and click Properties.
11. Click the Security tab.
12. Click the Advanced button.
13. Next to the Owner setting, click the Change link.
14. In the Enter the object name to select text box, click and type: Users. Note, you will not typically let users have ownership of an
object, but each device has a Users group, so that is why we are using the group in this project.
15. Click the OK button three times.
Points to Remember:
•
•
•
Taking ownership of an object allows the owner to control permissions on an object.
Delegating permissions transfers ownership on an object to a user other than yourself or a group to which you do not belong.
An object owner can access and control permissions on that object even if no other permissions exist on the object. This prevents
the object from becoming completely inaccessible in the case in which all of its permissions are deleted.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Permissions: Describe Taking Ownership; Describe Delegating
Project File: N/A
Difficulty: Beginner
80 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Required Materials: Windows 8.1
Objectives:
3.0 Understand Device Security
3.3 Describe Permissions
3.3.d Describe Taking Ownership
3.3.e Describe Delegating
81 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describe Resultant Permissions
Description:
Resultant permissions are a set of cumulative permissions a user or group has on an object. The more groups a user is a member of, the
more likely the user has a higher set of permissions on objects. For example, a user is in both a Sales group and an Operations group.
The Sales group has read access to a Documentation folder. The Operations group has write access to the same folder. In this case, the
user, being a member of both the Sales and Operations groups, will have the higher set of permissions on the folder, meaning the user
has write access to the folder, since write access offers a higher set of permissions than does read access. Resultant permissions can be
difficult to figure out manually. Fortunately, the Advanced Security Settings section of an object’s properties will show the resultant
permissions for a user or group, as you will learn in this project.
Steps for Completion:
1. If you created a Testing folder in your Documents folder and then a Confidential folder and an Everyone folder inside the Testing
folder in a previous project, go to the next step. If not, create a folder called Testing inside of your Documents folder and then
create a folder called Everyone inside of your testing folder.
2. Right-click the Everyone folder and then click Properties.
3. Click the Security tab.
4. Click the Advanced button.
5. Click the Effective Access tab.
6. Click the Select a user link.
7. Click in the Enter the object name to select text box and type: Users.
8. Click the OK button.
9. Click the View effective access button.
10. You can now see the resultant permissions the Users group has on this folder. When you are done viewing the permissions, click
the OK button.
11. Click the OK button to close the Properties box.
Points to Remember:
•
•
Resultant permissions are the cumulative permissions a user or group has on an object.
To see the resultant permissions, utilize the Effective Access tab under the Advanced Security Settings window.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Permissions: Describe Resultant Permissions
Project File: N/A
Difficulty: Intermediate
Required Materials: Windows 8.1
Objectives:
3.0 Understand Device Security
3.3 Describe Permissions
3.3.f Describe Resultant Permissions
82 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Malware
Description:
Malware is an all-encompassing term defined as code or a program with an intent to cause harm to a system. Malware comes in many
forms. Most of the time, malware is referred to as a virus. However, a virus is just one type of malware. Here are the different types of
malware, their definitions, and an example of each type:
Malware Type
Virus
Worm
Trojan Horse
Spyware
What It Is
An Example
A piece of code with the intent of interrupting, corrupting, or destroying data. A virus
needs a program in order to propagate itself.
A macro in a Microsoft Excel file set to delete Windows
system files when it runs.
A program posing as legitimate but is actually
malware.
A program claiming to be an antivirus program but actually
contains a virus.
Similar to a virus but does not need a program An executable program set to rename or delete Windows
to propagate. A worm is self-contained.
system files when it runs.
Software which secretly obtains computer
A cookie on a hard drive is viewed and then its information
activity and often sends the data to advertisers. is sent to sites which then advertise a service on webpages
one views.
Adware
Pop-up windows containing advertisements.
A window comes up asking one to fill out a survey. The survey may or may not be legitimate.
One way to avoid malware is to pay attention to websites you visit. Anything that looks too good to be true probably is too good to
be true. If a suspicious-looking pop-up window, avoid clicking anywhere in it. Press Alt+F4 on the keyboard to close the window and
then immediately close the browser. In this project, you will identify the type of malware present given a description of a situation.
Steps for Completion:
1. For each situation, identify the type of malware present:
a. A window pops up trying to sell an upgrade to a software application:
b. An advertisement on a website says “Click here to clean unwanted files off of your computer”:
c. You visited an e-commerce website. Now, when you go to other websites, advertisements from the e-commerce website
appear:
d. A program that was downloaded now runs and prevents you from getting onto the Internet:
Points to Remember:
•
•
•
•
Viruses, worms, Trojan horses, spyware, and adware are all forms of malware.
Viruses need a program in order to propagate themselves.
Worms do not need a program in order to propagate themselves.
Trojan horses look like real programs but in fact are imposter programs with the intent of doing harm to a device.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Describe Malware: Describe Computer Viruses; Describe Trojan Horses; Describe Spyware; Describe Adware
Project File: N/A
Difficulty: Beginner
Required Materials: N/A
Objectives:
3.0 Understand Device Security
83 | Session 3
3.4 Describe Malware
3.4.a Describe Computer Viruses
3.4.b Describe Trojan Horses
3.4.c Describe Spyware
3.4.d Describe Adware
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Antivirus and Antimalware Strategies
Description:
To combat malware, a sound antivirus and antimalware strategy needs to be employed. This strategy employs some basic steps:
• Be careful where you go on the Internet. Avoid illegitimate websites as much as possible. Internet Explorer has a SmartScreen
Filter than can tell a user if a website has been reported as being potentially harmful.
• Software companies will never send you an update to download without your asking for it. Any emails with attachments from
recipients claiming to be software companies should be quarantined and reported to an email administrator right away.
• Get a good antivirus/antimalware program. Windows Defender comes with Windows 8.1, so there is no reason not to have an
active antivirus/antimalware program.
• Keep the definitions for the antivirus/antimalware program updated. Malware forms and changes rapidly, so keeping the antivirus/
antimalware program current is of utmost importance.
In this project, you will examine a website to make sure it passes the SmartScreen Filter. Then, you will ensure that Windows Defender
is running and you will check for antivirus/antimalware definition updates.
Steps for Completion:
1. On a Windows 8.1 device, open Internet Explorer.
2. Navigate to www.microsoft.com.
. Click Safety and then click Check this website.
3. Near the top-right corner of the screen, click the Tools button
4. Click the OK button.
5. To check to make sure Windows Defender is running and updated, click the Start button.
6. Start typing: Windows Defender. When you see the Windows Defender icon
, click it. You will see the
Windows Defender screen.
7. Click the Settings tab.
8. Ensure the Turn on real-time protection check box is selected. If you need to select the check box, select it and then click the Save
changes button.
9. Click the Home tab. You may see a message stating that the device is protected or you may see this:
10. No matter what the message is, click the Update button to update Windows Defender to the latest antivirus/antimalware
definitions. The update could take several minutes.
11. The update will still run even if you close Windows Defender, so close Windows Defender.
Points to Remember:
• Prevention of malware starts with being careful as to where one goes on the Internet.
• A device should have a reputable antivirus/antimalware application with the definitions kept current.
84 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
•
Use the SmartScreen Filter when in doubt as to whether a website is legitimate.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 3:
Describe Malware: Antivirus and Antimalware Strategies
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1
Objectives:
3.0 Understand Device Security
3.4 Describe Malware
3.4.e Describe Antivirus and Antimalware Strategies
85 | Session 3
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
86 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Fill-in-the-Blanks
Instructions: While watching Session 4, fill in the missing words according to the information presented by the instructor.
[References are found in the brackets.]
Describe the Types of Cloud Services
1. SharePoint is an online
tool that is a part of Office 365. [Describe Productivity Services]
and
2. With Office 365 both
Productivity Services]
can be used in the cloud. [Describe
blobs, and Page blobs.
3. There are two types of BLOB storage which are used to store large files,
[Describe Storage Services]
4. You can use Azure to store data as a table which allows you to store data without SQL server called a
data store. [Describe Storage Services]
and Skype for Business. [Describe
5. The two types of communications services are
Communications Services]
6. Exchange Online is highly
in Office 365 Admin. [Describe Communications Services]
, and instant messaging.
7. Skype for Business is a communication piece for online meetings,
[Describe Communications Services]
8. Search services is the
of how search results will appear in a cloud app. [Describe Search Services]
from search results.
9. An example of what search services can do on SharePoint you can block a
[Describe Search Services]
Microsoft Intune
10. Microsoft Intune is the tool that manages devices and computers and their interactions with a
[Describe Microsoft Intune Capabilities]
.
indicating what is allowed, what the devices must
11. Microsoft Intune works through a setup of
have to be eligible to be connected, and rules that govern their overall use on the network. [Describe Microsoft Intune
Capabilities]
12. When security on a device is
13. Remote Wipe is the act of
14. Location Setting is the decision as to whether
Location Settings]
87 | Session 4
, data needs to be wiped off of it. [Describe Selective Wipe]
a device and erasing all of its data remotely. [Describe Selective Wipe]
is configured on a Windows 8.1 device. [Describe
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
15. A global point about managing devices is that not all
Location Settings]
are available on all platforms. [Describe
Describe Microsoft Azure
16. Virtual machines are machines that are created in the cloud and then accessed
Machines]
17. In Azure, the higher the
[Describe Virtual Machines]
. [Describe Virtual
and the RAM used the higher the hourly cost of the virtual machine.
across multiple platforms and
18. Azure has a mobile service which can be used to create mobile
access to on-premises data. [Describe Azure Services]
service in Azure allows for the creation of secure solutions to stream videos, both live and on19. A
demand. [Describe Azure Services]
storage for data. [Describe Disaster
20. One of the best plans for disaster recovery is to have a/an
Recovery]
21. One method of disaster recovery is to back up on-premises files to
. [Describe Disaster Recovery]
22. High availability is the concept of making sure services are up and
Availability]
24/7/365. [Describe High
which is the equivalent of about 8.5 hours of
23. Microsoft’s current Service Level Agreement is
downtime per year. [Describe High Availability]
24. Redundancy involves that your very important data is
hard drive fails, a user will not lose their data. [Describe Redundancy]
different drives. [Describe Redundancy]
25. Azure storage will write data to
26. Fault tolerance is the idea that if an application or hardware device
its place. [Describe Fault Tolerance]
27. Another form of fault tolerance is
available in case a sever fails. [Describe Fault Tolerance]
88 | Session 4
in multiple places so that in the event a
, another one is ready to take
where data is being copied to several servers to that it is
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Productivity Services
Description:
One of the main goals of mobility in Windows devices is the ability to access information from multiple devices and multiple places.
There are two main productivity services that fit this need:
Office 365: Office apps that can be installed on a desktop, and, in the case of Word, Excel, and PowerPoint, used via the web and
on mobile device platforms such as Android, iOS, and Windows Phone.
SharePoint: An online collaboration tool that is part of Office 365. SharePoint hosts collaboration through lists and libraries of
information known as apps. Examples of apps include task lists, calendars, and document libraries.
In this project, you will add a calendar app to a SharePoint site. Then, you will create a meeting on the calendar. For this project, you
need to have an Office 365 account that can add apps to an existing SharePoint site.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
Log on to an Office 365 site through portal.office.com.
Click the Apps button near the top-left corner of the screen.
Click the sites icon. If you get a message asking to allow contacts, click the Allow button.
On the sites screen, click the Team Site icon.
To start the process of adding a calendar app, click the Add lists, libraries, and other apps button.
Click the Calendar icon.
To name this calendar, click in the Name box and type:
Training Calendar.
Click the Create button.
Click the Training Calendar icon. The calendar will appear.
Hover your mouse over the next Friday on the calendar.
When you see a green plus sign with the word Add next
to it, click Add. You will see something similar to the
image on the right.
Click in the Title field.
Type: Safety Training.
Click the Save button. Your meeting will show on the
calendar, as seen in the image on the right.
Close Internet Explorer.
Points to Remember:
•
•
With Office 365, apps can be used on the desktop, online, and on mobile devices. Word, Excel, and PowerPoint are apps which
can be used on all three platforms.
SharePoint is a web-based collaboration tool that often serves as a company intranet.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 4:
Describe the Types of Cloud Services: Describe Productivity Services
Project File: N/A
Difficulty: Intermediate
Required Materials: Windows 8.1 and access to a SharePoint site
Objectives:
4.0 Understand Cloud Services
4.1 Describe the Types of Cloud Services
4.1.a Describe Productivity Services
89 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Storage Services
Description:
Storage services are storage areas which are set up in Azure. Storage services allow for apps to use cloud space to store large amounts
of data. This saves a system administrator the trouble of having to store data on premises and the worry of not having enough space on
hard disks on premises. Should there be a need for more storage space, the storage can be provisioned as needed on Azure through a
storage space. Apps which access the storage space are usually developed in Visual Studio. There are possible types of storage used in a
storage service. They are:
Binary Large Object (BLOB) storage: This storage type is used to store large files. Block blobs can store up to 200 GB of data
while Page blobs can store up to 1 TB of data.
Table storage: This storage type can store massive amounts of nonrelational data in a NoSQL data store. Data can be stored
without the need of a SQL server.
Queue: Queues are used to store and retrieve messages of up to 64 KB each. For example, if someone uploads an image to a web
app, a queue can be created to make a thumbnail of the image. This way, the customer does not have to wait for the upload to
complete.
In this project, you will create a BLOB storage space in Azure. For this project, you need an Azure account. A trial version can be
started at azure.microsoft.com if you do not already possess an Azure account.
Steps for Completion:
1. On a Windows 8.1 device, open Internet Explorer.
2. Navigate to azure.microsoft.com.
3. Log on to the Azure site with your account.
4. On the left side of the screen, click
.
5. If you do not have any storage services listed, create one, following the steps for completion in the Describing Microsoft Azure
Storage project in session two of this project workbook. If you do have a storage service, click on it.
6. Click the Containers link near the top of the page.
7.
8.
9.
10.
11.
12.
To add a BLOB storage object, click
. You will see the image on the right:
Click in the Name box.
Type: testblob.
Click the drop-down arrow on the Access field and click Public Blob.
Click the check mark to finish creating the container.
Close Internet Explorer.
Points to Remember:
•
•
•
•
Storage services in Azure are used for the purpose of storing large amounts of data in the cloud.
Binary Large Object (BLOB) storage objects can hold up to 1 TB of data.
Table storage is used to store massive amounts of nonrelational data.
Queues are used to store messages with the goal of speeding up application performance.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 4:
Describe the Types of Cloud Services: Describe Storage Services
Project File: N/A
Difficulty: Intermediate
Required Materials: An Azure account
Objectives:
4.0 Understand Cloud Services
4.1 Describe the types of cloud services
4.1.b Describe Storage Services
90 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Communications Services
Description:
Before the advent of cloud computing and especially Office 365, companies wanting Exchange Server as their email service always had
to host an Exchange server on-premises. Now, a company can use Exchange as part of their Office 365 subscription and thus not have
to administer its own Exchange server. This is one of many communications services available through Microsoft and their push for a
more mobile environment. In addition to Exchange, Skype for Business, formerly known as Lync Online, is a communication service
that hosts online meetings, conferencing, and instant messaging. In this project, you will briefly explore features in both Exchange
online and Skype for Business. In doing so, you will set an Outlook Web App policy that does not allow one to open attachments from
a public computer. You will need an Office 365 account with administrative permissions in order to do this project.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Log on to an Office 365 site with an administrative account.
Click the Apps button near the top-left corner of the screen.
Click the Admin app.
On the left side of the screen, expand the Admin group if necessary.
Then, click the Exchange link.
In the permissions group, click Outlook Web App policies.
On the Outlook Web App policies, click the plus sign to add a
policy. Your screen will look like the image on the right:
Click in the Policy name field.
Type: Shared Devices.
Clear the Direct file access check box. This will prevent users from
opening files on public or shared devices.
Click the Save button.
To set a policy on Skype for Business to only allow instant messaging conversations among those in the company, click the Admin
link near the top of the page.
On the Admin page, in the menu on the left side of the screen, look for the Admin section and then within the Admin section,
click Skype for Business.
Click the organization link on the left side of the screen.
On the organization screen, click the external communications link.
To no longer let company users communicate through Skype with those outside of the organization, clear the Let people use
Skype for Business to communicate with Skype users outside your organization check box.
Click the save button. You will briefly see a message that the changes have been saved successfully.
Close Internet Explorer.
Points to Remember:
•
•
Exchange through Office 365 allows a company to have a dedicated email server without having to set one up on-premises.
Skype for Business is a communications service that allows users to collaborate through instant messaging, conferencing, and
online meetings.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 4:
Describe the Types of Cloud Services: Describe Communications Services
Project File: N/A
Difficulty: Intermediate
Required Materials: Administrative permissions on an Office 365 portal
Objectives:
4.0 Understand Cloud Services
4.1 Describe the Types of Cloud Services
4.1.c Describe Communications Services
91 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Search Services
Description:
Search services are services that control how search results appear in an app. For example, in a SharePoint site, an administrator can
control which apps (lists and libraries) will have their items appear in site-wide search results. Site administrators can also control
search results based on keywords. An example of this is a user searching for training and the first result that appears is a link to
a training calendar. This is done through controlling query rules in SharePoint. In this project, you will make sure items from a
SharePoint app do not appear in search results. To do this exercise, you will need administrative permissions on a SharePoint team site.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
Log on to a SharePoint team site for which you have administrative permissions.
From the home page of the SharePoint site, click the Site Contents link on the left side of the page.
From the list of your site apps, click the Documents app.
On the ribbon, click the Library tab.
In the Settings group, click Library Settings.
Click the Advanced Settings link. The Advanced Settings page will appear.
Scroll down the page until you see this section:
8. Select the No option for the Allow items from this document library to appear in search results setting.
9. Scroll down to the bottom of the page and click the OK button to save the settings.
10. Close Internet Explorer.
Points to Remember:
•
•
Search services control how search results appear in an app.
With Search services, an administrator can manipulate search results based on keywords.
Reference:LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 4:
Describe the Types of Cloud Services: Describe Search Services
Project File: N/A
Difficulty: Intermediate
Required Materials: Administrative permissions on a SharePoint site
Objectives:
4.0 Understand Cloud Services
4.1 Describe the Types of Cloud Services
4.1.d Describe Search Services
92 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Taking a Tour of Microsoft Intune
Description:
Microsoft Intune is one of two possible tools (the other being System Center Configuration Manager) used to manage devices and
their interaction with a corporate network. As more users are migrating from a device-centric environment, where users possess a
single laptop or desktop, to a people-centric environment, where users will have a desktop or laptop plus a number of corporate or
personal devices they use to access company data, policies that govern the use of those devices need to be part of an overall network
infrastructure. Microsoft Intune can set policies that govern the use of these devices, specifically Windows, iOS, and Android devices.
BlackBerry devices are not supported through Microsoft Intune.
As is the case with network administration in general, groups should be created and then users and devices should be added to groups.
In this project, you will take a tour of Microsoft Intune and its features and then create a group for the purpose of administering users
and their devices. In order to complete this project, you need to have an Intune account. A trial version can be found at:
manage.microsoft.com.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Open Internet Explorer.
Navigate to manage.microsoft.com.
Log on to the site with an Intune account.
Click the Groups button on the left side of the screen.
On the right side of the screen, click the Create Group button.
To name the group, click in the Group name box. Type: Executives.
In Intune, groups need to be a part of a parent group. Click the All Users group to
select that as the parent group.
Click the Next button. The next screen allows you to build a membership based on
using security groups as managers. For now, we will leave the group empty. Click the
Next button.
The next screen allows you directly add users as members. We will not add any members
at this time. Click the Next button.
Click the Finish button at the bottom of the screen. The Executives group page will
appear, as seen in the image on the right.
Log off of Microsoft Intune.
Points to Remember:
•
•
•
Microsoft Intune is a tool which manages devices and their permissions and settings on a corporate network.
Device policies affect what rights devices have once they connect to a corporate network.
Microsoft Intune supports Windows, iOS, and Android devices but not BlackBerry devices.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 4:
Microsoft Intune: Describe Microsoft Intune Capabilities
Project File: N/A
Difficulty: Intermediate
Required Materials: A Microsoft Intune account
Objectives:
4.0 Understand Cloud Services
4.2 Describe Microsoft Intune
4.2.a Describe Microsoft Intune Capabilities
93 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Wiping a Device
Description:
As devices age and are no longer needed for use in a corporate environment, these devices should be removed from the corporate
network and prevented from connecting to the corporate network. Data which has been obtained from a corporate network should be
removed from any device that will no longer be connecting to the network. To accomplish this, Microsoft Intune can perform a remote
wipe on a device. Remote wiping a device involves removing it from the corporate network and deleting at least the corporate data, if
not all of the data, from the device. There are two types of wipes Intune can perform:
Full wipe: In a full wipe, all of the data, including personal data, is removed from the device and the device is reset to factory
default settings. This is usually done if the security of the device has been compromised.
Selective wipe: In a selective wipe, only the company data is removed. Exactly what is removed varies by the type of device being
wiped. A link to what is removed in a selective wipe is found here: https://technet.microsoft.com/en-us/library/JJ676679.aspx.
When performing a remote wipe on a device, pay close attention to the settings chosen. Choosing the Wipe the device before retiring
setting does a complete wipe on all platforms except for Windows 8.1. Avoid choosing this setting if the goal for a device is a selective
wipe. In this project, you will perform a remote wipe for a device. To complete this project, you need a Microsoft Intune administrative
account and there needs to be at least one device on your Intune server that is ready for a remote wipe. If you need to add a device
to Intune, look at the Describing Company Portal exercise in this workbook. If needed, a trial account for Intune can be obtained at
manage.microsoft.com.
Steps for Completion:
1.
2.
3.
4.
5.
6.
Open Internet Explorer.
Navigate to manage.microsoft.com.
Log on with an Intune administrative account.
Click the Groups icon on the left side of the page.
Click All Users.
In the Computers and Mobile Devices section, click the device that will be wiped through a remote wipe. You will see a screen
similar to the one on the right:
7. On the right side of the screen, in the Tasks area, click Retire/Wipe.
8. Take care to make sure the Selectively wipe the device option is selected and then click the Yes button.
9. The remote wipe usually takes a few minutes to complete. While it is completing, minimize Internet Explorer.
Points to Remember:
•
•
•
Remote wiping a device removes it from the corporate network.
When doing a remote wipe, a full wipe removes all of the data from the device and resets the device to factory settings.
A selective wipe removes company data from the device but preserves personal data on the device.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 4:
Microsoft Intune: Describe Selective Wipe
Project File: N/A
Difficulty: Advanced
Required Materials: An administrative Microsoft Intune account and a device connected to Intune.
Objectives:
4.0 Understand Cloud Services
4.2 Describe Microsoft Intune
4.2.b Describe Selective Wipe
94 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Setting up Geolocation on a Windows Device
Description:
As part of setting up a policy for devices on a corporate network, one decision to make is whether to allow the device’s location to be
tracked. Another decision to make is whether to allow the device to automatically connect to open Wi-Fi networks. Allowing a device
to be tracked is usually favorable in that should the device be lost or stolen, a GPS tracking device can find it. Allowing a device to
automatically connect to an open Wi-Fi network, however, is considered a security risk so administrators will be less likely to enable
that feature in a device policy.
Different devices will have different available settings in a policy. Windows 8.1 and Android devices can have a geolocation policy set
but iOS devices cannot. When creating policies in a real-life setting, review the settings you can control per device type. In this project,
you will add a Wi-Fi and geolocation policy for Windows devices which will connect to the network through a company portal.
Steps for Completion:
1.
2.
3.
4.
Open Internet Explorer.
Log on to manage.microsoft.com with an administrative account. This will bring you to the Microsoft Intune home page.
Click the Policy button on the left side of the page.
To start to add a Wi-Fi and geolocation policy for Windows devices, click the Add Policy button on the Policy home page. You
will see the following:
5.
6.
7.
8.
9.
10.
Expand the Windows group on the policy template page.
Click General Configuration (Windows Phone 8.1 and later).
Click the Create Policy button.
Click in the Name text box and type Executive Policy.
Click the Device Capabilities section.
For this policy, we will allow geolocation but not automatic connection to free Wi-Fi hotspots. Click the switch button to the left
of the Allow geolocation is not configured setting. The setting should now look like the image below:
11. Notice that the default setting is No. To allow geolocation, click the
drop-down arrow on the setting field and click Yes.
12. To make sure devices with this policy cannot connect automatically
to free Wi-Fi hotspots, click the switch button to the left of the Allow automatic connection to free Wi-Fi hotspots is not
configured.
13. The default value for this setting is Disabled, which is the setting we want. Click the Save Policy button.
14. Click the Yes button. You will see a group list.
15. If you created the Executives group in the Taking a Tour of Microsoft Intune project, select the Executives group. Otherwise,
select the Ungrouped Users group.
16. Click the Add button.
17. Click the OK button. The policy is now assigned to a group.
18. Close Internet Explorer.
Points to Remember:
•
The purpose of setting a policy is to control what a device can do when connected to a corporate network.
95 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
•
Different types of devices will have different available settings when setting a device policy.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 4:
Microsoft Intune: Describe Location Settings
Project File: N/A
Difficulty: Intermediate
Required Materials: An administrative account on Microsoft Intune
Objectives:
4.0 Understand Cloud Services
4.2 Describe Microsoft Intune
4.2.c Describe Location Settings
96 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Virtual Machines
Description:
Virtual machines are fully functional operating system installations which run inside of a host operating system. For example, a
server running Windows Server 2012 R2 can run several other instances of Windows Server inside of it. Virtual machines can also
be provisioned in Azure and then accessed through a remote desktop connection or a custom-built app. Virtual machines run on a
hypervisor. A hypervisor is a software application that accesses computer hardware and allocates it to virtual machines. Examples of
hypervisors include Hyper-V, VMWare, and Virtual Box. Through the hypervisor, virtual machines are allocated RAM, hard disk
space, and, in many cases, CPU cores. Though the RAM and CPU allocation is always for the full amount as specified through the
hypervisor, hard disk space is often dynamically allocated.
Here is an example of dynamic allocation: A virtual hard drive could be set to be 100 GB for a virtual machine, yet only take 20 GB
of space on the host machine after Windows is installed on the guest machine. The virtual hard disk then dynamically expands as apps
are installed on the virtual machine. Eventually, the virtual machine could reach its allocated 100 GB size. In this project, you will
provision a virtual machine on Azure and then use a remote desktop connection to connect to the virtual machine. For this project, you
will need an Azure account. A trial version, should you need one, can be started at azure.microsoft.com.
Steps for Completion:
1. Open Internet Explorer.
2. Navigate to azure.microsoft.com
3. Log on to the Azure website.
4. On the left side of the page, click
machines, if any are present, will be listed.
. A list of virtual
5. To start to add a new virtual machine, click the
button near the
bottom-left corner of the page.
6. Click the Quick Create link. You will see the following on the right side of the
screen:
7. Click in the DNS Name text box. Type your first initial, last name, and today’s
date in mmddyy format (example: jmanibog110115).
8. Click in the User Name text box. Type your first initial and last name.
9. Click in the New Password text box. Type a strong password you can remember for the length of this exercise.
10. Click in the Confirm text box. Type the password you typed in the previous step.
11. Click
. The new virtual machine will show as Starting (Provisioning) for a minute or two and
then the virtual machine will show as Starting for several minutes and then will show as Running (Provisioning) for several
minutes.
12. When the machine status changes to Running, click the Connect button near the bottom of the page.
13. When prompted to open or save the .rdp file, click the Open button.
14. Click the Connect button.
15. On the Windows Security screen, click the Use another account button.
16. Click in the User name text box. Type your first initial and last name.
17. Click in the Password text box. Type the password you created earlier in this exercise.
18. Click the OK button.
19. If you see the following screen, click the Yes button.
20. After a few moments, you will be connected to your virtual machine. If you followed the default setting in this exercise, you will
see an instance of Windows Server.
21. Hover your mouse near the top edge of the screen. You will see a blue line with the name of your virtual machine.
22. On that blue line, click the white X to close the connection to the virtual machine.
23. Click the OK button.
24. On the Internet Explorer screen, click the OK button to return to the virtual machine list.
25. With your new virtual machine selected, click the Shut Down button to shut down the virtual machine.
26. Click the Yes button to finish shutting down the virtual machine.
97 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
27. When the virtual machine reaches a status of Stopped (Deallocated), close Internet Explorer.
Points to Remember:
•
•
•
Virtual machines allow for an operating system to be set up without the need for an extra physical machine.
Virtual machines use the physical RAM, CPU, and hard disk space on a host machine. This is done through a hypervisor.
Virtual machines can also be provisioned in Azure and then accessed through a remote desktop connection or a custom app.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 4:
Describe Microsoft Azure: Describe Virtual Machines
Project File: N/A
Difficulty: Intermediate
Required Materials: A Microsoft Azure account
Objectives:
4.0 Understand Cloud Services
4.3 Describe Microsoft Azure
4.3.a Describe Virtual Machines
98 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Azure Services
Description:
Azure services are Azure features which enhance the ability for a company to move more of its infrastructure from being on-premises
to being in the cloud. This move to the cloud has become necessary for some businesses due to users using multiple devices to access
data and, more IT departments wish to spend less time supporting hardware and more time supporting users. Here is a list of the more
common Azure features and their purpose in an Azure infrastructure:
Service
What It Does
Mobile
Allows for creation of mobile apps across multiple platforms and access to on-premises data.
Example: An app which tracks snack deliveries with data stored in an on-premises SQL database.
Cloud
Allows for deploying of highly available and scalable applications and application programming interfaces (APIs).
Batch
Allows for running batch processes using a high number of processors. Similar to running batches in a command
prompt but on a much larger scale (up to 100,000 processes in some cases).
Media
Allows for creating secure solutions to stream videos, both live and on-demand.
BizTalk
Allows for using BizTalk to integrate enterprise applications with the cloud. Example: A purchase order app on
one platform can talk to a business app on another platform.
Recovery
Allows for creating places to store recovery data either for backups or entire sites.
Management
Shows alerts and operations logs for Azure instance.
In this project, you will identify the service being used given a situation. Then, you will look at operations logs for an Azure instance.
You will need an Azure account in order to look at Azure operations logs. A trial version can be started at azure.microsoft.com.
Steps for Completion:
1. For each of the following situations in Azure, identify the service being used:
a. A video is streamed from a secure app:
b. A storage place for the purpose of backing up a site is created:
2.
3.
4.
5.
6.
7.
c. A mobile app to access data in a SQL-based app is built:
For the remainder of this project, you need an Azure account. Open Internet Explorer.
Navigate to azure.microsoft.com.
Log on to the site with an Azure account.
On the left side of the screen, click Management Services.
On the management services screen, click the Operation Logs link.
When you are done with looking at the log, close Internet Explorer.
Points to Remember:
•
•
Azure has several services available to enhance cloud-based infrastructure capabilities.
Management logs are used to see the overall activity and performance of an Azure infrastructure.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 4:
Describe Microsoft Azure: Describe Azure Services
Project File: N/A
Difficulty: Intermediate
Required Materials: An Azure account
Objectives:
4.0 Understand Cloud Services
4.3 Describe Microsoft Azure
4.3.b Describe Azure Services
99 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Disaster Recovery
Description:
In any network infrastructure, physical devices can be replaced. Data, however, cannot be replaced. Thus, it is imperative for important
company data, from an end-user device all the way to the largest data server, be backed up frequently. For the data, there needs to be
a solid recovery plan in place should a disaster happen to where any device storing data is lost or fails to function. The most sound
disaster recovery plan involves having an off-site storage place for on-premises data. The off-site storage location could be another
physical building. Or, it can involve storing the files in the cloud.
One method users can use to back up files to an off-site storage is to keep important files in a OneDrive or OneDrive for Business
folder on their device. OneDrive offers the benefits of both synchronization to multiple devices and a backup storage location for files
and folders. Then, should a device be compromised or wiped out, the files and folders are still available in the OneDrive folder. Another
method used for data storage is Azure Recovery Services. Azure Recovery Services offers these two methods for aiding in a possible
need for disaster recovery:
Site Recovery Vault: In this vault, on-premises servers can be backed up by replicating them with either another on-premises site
or with an Azure site.
Backup Vault: A simple backup mechanism for backing up files from Windows Server to Azure.
In this project, you will set up a backup vault on an Azure site. To do this, you will need an Azure account. A trial account, if you need
one, can be started at azure.microsoft.com.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Open Internet Explorer.
Navigate to azure.microsoft.com.
Sign in to Azure with an Azure account.
In the navigation pane on the left side of the screen, scroll down to and then click Recovery Services.
To add a backup
vault, click the
New button in the
lower-left portion
of the screen. You
will see the screen
on the right:
Click Backup
Vault.
Click Quick
Create.
Click in the Name text box and type your first initial and last name for a name.
Click the drop-down arrow on the Region field and choose the region closest to you.
Click Create Vault. The vault will be listed in the recovery services list.
Close Internet Explorer.
Points to Remember:
•
•
•
The key to a disaster recovery plan is to have a backup site that is away from your current location.
The backup site can be a different physical building or it can be cloud-based.
Azure Recovery Services has a site recovery vault, which can back up on-premises servers to another on-premises site or to Azure,
and, a backup vault, which allows for backing up files for Windows Server to Azure.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 4:
Describe Microsoft Azure: Describe Disaster Recovery
Project File: N/A
100 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Difficulty: Beginner
Required Materials: Windows 8.1
Objectives:
4.0 Understand Cloud Services
4.3 Describe Microsoft Azure
4.3.c Describe Disaster Recovery
101 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
High Availability, Redundancy, and Fault Tolerance
Description:
In addition to a disaster recovery plan, data needs to be available as close to 100% of the time as possible. There are a few conceptual
tools an administrator can use to ensure that data is available nearly 100% of the time. This involves taking steps for both hardware and
software availability.
High availability is the concept of making sure services are up and running 24 hours a day, 7 days a week, and 365 days a year.
Microsoft’s current Service Level Agreement states that paid Azure services should be up 99.9% of the time, or the equivalent of only
8.5 hours of downtime per year. Some companies have a service level agreement of 99.999% uptime, meaning only five minutes of
downtime per year is allowed.
Redundancy is the concept of making sure any data written to a hard drive is replicated to another hard drive. This ensures that data is
immediately written to multiple sources. With redundancy, a hard drive failure will not result in a complete loss of data. For example,
when a storage service is set up in Azure, redundancy is set up so that data is written to three different drives.
Redundancy is a form of fault tolerance. Fault tolerance is the concept by which should an application or hardware device fail, another
installation of the application or another hardware device is ready to take its place. For example, a single database server without fault
tolerance would cause major harm to a network should it fail. But, if a second database server is set up with the sole purpose of being a
failover server, it will take over the operation should the primary server fail.
Another form of fault tolerance is degraded functionality. With degraded functionality, a system still works, but not every part of the
system works. As you will see in this project, Office 365 is not always fully functional. However, Microsoft does have alerts on the
administrative home page indicating whether there are any facets experiencing degraded functionality. For this project, you will need
an Office 365 administrative account. You can get a trial account at portal.office.com.
Steps for Completion:
1.
2.
3.
4.
5.
6.
Open Internet Explorer.
Navigate to portal.office.com.
Log on to Office 365 with an Office 365 administrative account.
Click the Apps button in the top-left corner of the screen.
Click the Admin button. The Office 365 administrative page will appear.
Look at the Current health section. It will look similar to one of the two examples shown here:
7. If you see all green indicators with no issues, there is no degraded functionality. Otherwise, you can click on the item that has
degraded functionality to get details.
102 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
8. To get an overview of recent system health on Office 365, click the View Details and History link. Your screen will resemble this:
9. When you are done viewing the system health results, close Internet Explorer.
Points to Remember:
•
•
•
High availability involves making sure a system is up as close to 100% of the time as possible.
Redundancy involves writing data to multiple sources so that in case one hard drive fails, the data is not lost.
Fault tolerance involves having a backup application server and/or hardware device ready to use should a primary application
server and/or hardware device fail.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 4:
Describe Microsoft Azure: Describe High Availability; Describe Redundancy; Describe Fault Tolerance
Project File: N/A
Difficulty: Intermediate
Required Materials: An Office 365 administrative account
Objectives:
4.0 Understand Cloud Services
4.3 Describe Microsoft Azure
4.3.d Describe High Availability
4.3.e Describe Redundancy
4.3.f Describe Fault Tolerance
103 | Session 4
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Fill-in-the-Blanks
Instructions: While watching Session 5, fill in the missing words according to the information presented by the instructor.
[References are found in the brackets.]
Describe Identity Services
1. Active Directory is the
that stores accounts, groups, organizational units, and information on
those accounts, groups, and organizational units. [Describe Windows Server AD and Azure AD]
2. If you want to connect Windows Server Active Directory to Azure Active Directory you will need a tool called
. [Describe Windows Server AD and Azure AD]
Active Directory. [Describe Windows Server AD and
3. Windows Server Active Directory is an
Azure AD]
for Windows 8 and 8.1. [Describe Microsoft Account]
4. A Microsoft Account is used as the main
account, it does not need to be on outlook.com or
5. A Microsoft Account just needs to be a valid
Microsoft.com account. [Describe Microsoft Account]
. [Describe Microsoft Account]
6. A Microsoft account is needed to buy apps from the
7. Active Directory Federation Services is a software that allows for users to have a
systems applications across organizations. [Describe Federation Services]
and then access
8. Federation services allows for a single-sign on to access multiple resources across
and across
. [Describe Federation Services]
Describe Business Data Access
9. A Company Portal is the app users download on their devices to
Company Portal]
10. Devices may need a
company resources. [Describe
before signing up for the company portal. [Describe Company Portal]
that shows company name, IT contact information, where to
11. The company portal is the piece of
go for support, and terms and conditions. [Describe Company Portal]
12. Work folders are folders on a Windows Server that host files that can be
Work Folders]
13. A user saves a file to a Windows Server Work Folder while in the
with devices. [Describe
. [Describe Work Folders]
14. When using OneDrive or OneDrive for Business, data is stored in the cloud. If you are using Work Folder, data is stored
. [Describe Work Folders]
105 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
15. Azure RemoteApp is a service that
RemoteApp]
apps users can access via their devices. [Describe Azure
16. Applications are installed in Azure RemoteApp and then apps are published so that access can be
given to users. [Describe Azure RemoteApp]
tool for Windows Server. [Describe Azure RemoteApp]
17. App-V is the on-premises application
Describe Bring Your Own Device
18. In device-centric IT users are expected to work on the same
People-Centric IT]
devices. [Device-Centric to People-
19. In people-centric IT users can work in any location and on
Centric IT]
20. In people-centric IT apps are
Centric to People-Centric IT]
21. For desktop virtualization a
Desktop Virtualization]
at all times. [Device-Centric to
distributed so they are available on any device a user has. [Device-
client logs into a virtual desktop that is centrally located. [Describe
22. An example of desktop virtualization is when a user uses a Surface tablet to
[Describe Desktop Virtualization]
a desktop at work.
23. Dynamic Access Control Policies give users the ability to not only control access to files but also to
who has accessed the files. [Describe Dynamic Access Control Policies]
of files,
24. Dynamic Access Control Policies do not just mean users and groups, but also includes
an Active Directory field, claims which are built off of Active Directory attributes, and Central Access Policies. [Describe
Dynamic Access Control Policies]
25. Windows Rights Management is a service that allows for an extra layer of
documents. [Describe Windows Rights Management]
106 | Session 5
for emails and
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Active Directory Services
Description:
Active Directory is the database which stores the information needed to best manage data, permissions, and settings for accounts,
groups, devices, and organizational units for a network infrastructure. Active Directory serves as the single, central management
point for network resources. There are two versions of Active Directory: Windows Server Active Directory, which is the on-premises
version of Active Directory, and Azure Active Directory, the cloud-based version of Active Directory. Azure Active Directory has the
following three editions:
Free: Included in every Azure subscription. This edition can synchronize with on-premises Active Directory and get single signon across Azure, Office 365, and many Software as a Service (SaaS) applications.
Basic: Includes everything in the free edition plus the ability to publish on-premises web applications through Azure Active
Directory and a customizable environment for launching enterprise and cloud applications.
Premium: Includes everything in the free and basic editions plus enterprise-level identity management capabilities.
One prominent aspect of Active Directory is Active Directory Federation Services (AD FS). AD FS allows for users to have a single
sign-on (a single user name and password) and then use that single sign-on across multiple applications, both on-premises and with
Azure-based apps. The single sign-on can even be used across multiple organizations. For example, a parent company may have two
subsidiaries, both with apps. AD FS allows users to use a single sign-on to access apps across both subsidiaries.
For an organization which has used Windows Server Active Directory and wishes to move part or all of their Active Directory
infrastructure to the cloud, a tool called Azure AD Connect is needed. In this project, you will add a user to Azure Active Directory.
To complete this project, you will need an Azure Active Directory subscription. If you do not have a subscription, you can start a trial
version at azure.microsoft.com.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
On a Windows 8.1 device, open Internet Explorer.
Navigate to azure.microsoft.com.
Log on to the Azure site with an Azure account.
Scroll down the navigation pane on the left side of the
screen. Click Active Directory.
Click the Default Directory link.
Click the Users link near the top of the page. A list of users
will appear.
To begin adding a user, click Add User. This screen on the
right will appear:
Click in the User Name text box and type a user name.
9. Click the
to continue to the next step in creating a
user.
10. Click in the First Name field. Type the new user’s first name.
11. Click in the Last Name field. Type the new user’s last name.
12. Click in the Display Name field. Type the new user’s first and last name.
13. Click the drop-down arrow on the Role field. Note that you have several administrative roles you could assign the user.
14. Make sure User is selected for the role.
15. Click the right-facing arrow at the bottom of the screen to continue to the next step.
16. Click the create button. You will see a screen with the new, temporary password for the new user.
17. Click the check mark at the bottom the screen to finish creating the user.
Points to Remember:
•
•
•
Active Directory is the database which centrally manages the properties of users, groups, devices, and other objects in a network.
Window Server Active Directory is the on-premises version of Active Directory.
Azure Active Directory is the cloud-based version of Active Directory.
107 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 5:
Describe Identity Services: Describe Windows Server AD and Azure AD
Project File: N/A
Difficulty: Advanced
Required Materials: An Azure account
Objectives:
5.0 Understand Enterprise Mobility
5.1 Describe Identity Services
5.1.a Describe Windows Server Active Directory and Azure Active Directory
5.1.c Describe Federation Services
108 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Setting Up a Company Portal
Description:
The Company Portal is the app devices will install and then use to connect to a corporate network. Before users connect a device to the
company portal, policies and terms and conditions should be clearly set. Once policies and terms and conditions are set, devices can
enroll into the corporate network through the Company Portal app. Depending upon the type of device which needs to be enrolled,
here is where the Company Portal app can be found:
Device Platform
Where to find Company Portal app
Windows
(Windows) Store
Android
Play Store
iOS
App Store
In this project, you will set terms and conditions for users who wish to connect to your network using the company portal. Then, you
will connect a device to the company portal. You will need an administrative account on Microsoft Intune and a Windows, iOS, or
Android device to connect to your network through the company portal. Note the device being added to the corporate network is an
Android device, but Windows devices and iOS devices can be added to a corporate network through the Company Portal app.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Open Internet Explorer.
Log on to manage.microsoft.com with a Microsoft Intune administrative account.
Click the Policy button, located in the menu on the left-hand side of the page.
Click Terms and Conditions.
Click Add.
In the General section, click in the Name field. Type: Company Terms.
Click in the Title field in the Details section. Type: User Terms.
Click in the Text for terms field and type: You agree to use this for company business.
Click in the Text to explain what it means if the user accepts field. Type: If you violate
this policy, you could lose all of your data on your device.
10. Click the Save button to save the Terms and Conditions.
11. With the new policy selected, click Manage Deployment.
12.
13.
14.
15.
In the Search groups area on the left side of the screen, click the All Users group.
Click the Add button. The All Users group will be added to the Selected groups area.
Click the OK button. The policy will be deployed to all of the users on the network.
To enroll a device using the Company Portal app, download and install the Company
Portal app, using the app store that matches to the platform the device is on.
16. Tap the app.
17. Log on to the app.
18. Tap Accept to accept the terms and conditions. The next screen you will see is the
Device Enrollment screen, as seen in the image on the left:
19. Tap Enroll.
20. Tap the Activate button.
21. Tap the OK button to accept the default settings for the certificate. The device
will now be enrolled and it will have access to the company resources made
available through Microsoft Intune.
Points to Remember:
•
•
•
As part of enrolling devices into a company portal, terms and conditions should be made clear.
The Company Portal app needs to be downloaded from a device store.
Once the app is downloaded, the device can be enrolled into a corporate network.
109 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 5:
Describe Business Data Access: Describe Company Portal
Project File: N/A
Difficulty: Advanced
Required Materials: A Microsoft Intune account and a Windows, iOS, or Android device
Objectives:
5.0 Understand Enterprise Mobility
5.2 Describe Business Data Access
5.2.a Describe Company Portal
110 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Setting Up Work Folders
Description:
Work Folders are folders on a Windows Server which host files available for synchronization with devices. This is similar to the
concept of using OneDrive and OneDrive for Business for file storage and synchronization. The difference is this: While OneDrive
and OneDrive for Business store files and folders in the cloud, Work Folders are stored on-premises.
To enable synchronization on a device, a user needs to first save a file that needs to be synchronized to a Work Folder. Then, through
the Control Panel, a user can set up a connection to the Work Folder. This needs to be done while the user is connected to the
corporate network. Once the connection is set, synchronization between the Work Folder and the device takes place. Once the
synchronization is complete, the user can then work on the file while disconnected from the corporate network. Then, the next time the
user signs in to the corporate network, synchronization takes place. In this project, you will set up Work Folders on a Windows Server
2012 (or 2012 R2) installation. Thus, you will need an administrative account on a Windows Server 2012 or 2012 R2 instance in order
to do this project.
Steps for Completion:
1. Log on to a Windows Server 2012 or 2012 R2 instance with an administrative account.
2. Create a folder on the C: drive and name it marketing campaigns.
3. Share the folder with a
group. If you do not have
a particular group to use,
share the folder with the
Domain Users group.
4. If the Server Manager
window is open, go to the
next step. Otherwise, click
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
to open Server
Manager. Server Manager
looks like the image on the
right:
On the left side of the
screen, click the File and
Storage Services link.
Click Work Folders.
To start the setup of a Work Folder, click the drop-down arrow on the Tasks field and click New Sync Share.
Click the Next button.
Click the Browse button. A Select Folder screen will appear.
Expand the C: drive.
Click the marketing campaigns folder.
Click the Select Folder button.
Click the Next button twice.
Take the default name for the share name and click the Next button.
To grant sync access to a group, click the Add button.
Click in the Enter the object name to select text box. Type: Domain Users.
Click the Next button.
If the Automatically lock screen, and require a password check box is selected, clear it.
Make sure the Encrypt Work Folders check box is not selected and click the Next button.
Click the Create button. The Work Folder will be created. Now, users can synchronize this data to their devices.
Points to Remember:
•
•
Work Folders allow users to synchronize files from their devices with shared folders hosted on Windows Server.
Work Folders are on-premises while OneDrive is in the cloud, but both tools allow for synchronization of offline files.
111 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 5:
Describe Business Data Access: Describe Work Folders
Project File: N/A
Difficulty: Advanced
Required Materials: An administrative account on Windows Server 2012 or 2012 R2.
Objectives:
5.0 Understand Enterprise Mobility
5.2 Describe Business Data Access
5.2.b Describe Work Folders
112 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describe Azure RemoteApp
Description:
Azure RemoteApp is a service which hosts apps users can access on their devices. This allows users to run apps on their devices without
having to install them. Azure RemoteApp is an app hosting service in the cloud while App-V is an on-premises app hosting service.
As an example, a corporation may have a business app that users with a Surface tablet need to run. Rather than having to distribute the
app to every Surface tablet, the app can be published using Azure RemoteApp and then the users with the Surface devices can run the
app as if it were installed on the device.
Another benefit of Azure RemoteApp is that an administrator can choose which users and groups will have access to certain apps. For
example, a human resources app may be installed in Azure RemoteApp. Only those in human resources should have access to the app.
An administrator can make sure that only the human resources group (if there is one) has access to the app. In this project, you will see
what apps are available with a trial version of Azure RemoteApp.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Open Internet Explorer.
Navigate to azure.microsoft.com/en-us/services/remoteapp.
Click the Take a test drive link.
Download and Install the version of Azure RemoteApp that matches the device you have.
Launch the app. On the Azure RemoteApp screen, click the Get Started button.
Enter the email address of a Microsoft account.
Click the Continue button.
Enter the password of the Microsoft account you are using.
Click the Continue button.
Click the Start free trial button.
Double-click the Word 2013 icon. Microsoft Word will open in a RemoteApp window.
Close all open windows.
Points to Remember:
•
•
Azure RemoteApp allows an Azure administrator to publish apps and then share those apps with network users.
With Azure RemoteApp, users do not need to install published apps on their devices.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 5:
Describe Business Data Access: Describe Azure RemoteApp
Project File: N/A
Difficulty: Advanced
Required Materials: A Windows, iOS, or Android device
Objectives:
5.0 Understand Enterprise Mobility
5.2 Describe Business Data Access
5.2.c Describe Azure RemoteApp
113 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing IT Centricity and Desktop Virtualization
Description:
Before mobile devices became popular, most users in a corporate environment were given one desktop or laptop to use for all workrelated activities. The only true mobile users were those who had a laptop. This type of IT setting is known as device-centric IT. Users
will often use a laptop, tablet, and smartphone all in a corporate setting and will use all of these devices to access centrally-located data.
The data can be on a machine they use while at work, an on-premises server, in the cloud, or, a combination of these. This is known
as people-centric IT. In addition to reaching data from multiple devices, apps can be centralized through App-V for on-premises app
distribution or Azure RemoteApp for app storage in the cloud.
One example of people-centric IT is desktop virtualization. In desktop virtualization, a user’s desktop is hosted either by a server onpremises or in the cloud. In this setup, a user logs on to the desktop using a device such as a tablet, thin client, or even a smartphone
in some cases. In this project, you will remotely log on to a desktop. To do this project, you need to have a desktop you can connect to
remotely and you need to know the IP address or computer name and logon information for the remote desktop.
Steps for Completion:
1. On a Windows 8.1 device, click the Start button.
2. Type: Remote Desktop.
3. When you see the link to the Remote Desktop Connection, click it.
You will see a screen similar to the screen on the right.
4. Click in the Computer field and type the IP address or the name of
the computer to which you are connecting.
5. Click in the User name field. Type your user name.
6. Click Connect.
7. Click in the Password text box, and type your password.
8. Click the OK button. If you see the screen on the right, click Yes to
continue.
9. After a few moments, you will see the desktop you connected to using Remote Desktop Connection. When you are done viewing
the desktop, close the connection.
Points to Remember:
•
•
•
Device-centric IT is an IT concept in which users do all of their work on one device.
People-centric IT is a newer IT concept in which users do work on different devices but the data is located in one spot.
In desktop virtualization, users connect to a centrally-located desktop through a device. The destination desktop can be an onpremises machine, a virtual machine hosted on-premises, or a virtual machine in the cloud.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 5:
Describe Bring Your Own Device: Device-Centric to People-Centric IT; Describe Desktop Virtualization
Project File: N/A
Difficulty: Intermediate
Required Materials: A device, a desktop to connect to with a remote desktop connection, and the logon information for that
desktop
Objectives:
5.0 Understand Enterprise Mobility
5.3 Describe Bring Your Own Device (BYOD)
5.3.a Describe Device-Centric to People-Centric IT
5.3.b Describe Desktop Virtualization
114 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describing Dynamic Access Control Policies
Description:
Dynamic Access Control allows a server administrator to control access to files and have the ability to audit who has accessed
files. While both control and audit features are available with regular permissions to files and folders, Dynamic Access Control has
additional criteria that can be used to control access to files. This criteria includes:
Classification: An attribute which can be placed on a file or folder. Classifications describe files and folders.
Active Directory field: Describes a resource. This is also known as an Active Directory attribute.
Claim: A piece of information about a user, device, or resource. Claims can be used to authorize access to files and folders. Most
claims are based off of Active Directory attributes.
Central Access Policies: Authorization policies that include conditional expressions. An administrator can classify a file and then
make it accessible only to users and groups that have a certain claim type.
In this project, you will set up a Dynamic Access Control claim type. You will need permissions on Active Directory in a Windows
Server 2012 or 2012 R2 environment to complete this project.
Steps for Completion:
1.
2.
3.
4.
Log on to a Windows Server 2012 or 2012 R2 domain controller.
If Server Manager does not appear, click the Server Manager icon to the right of the Start button to start Server Manager.
Near the top-right corner of Server Manager, click the Tools menu and then click Active Directory Administrative Center.
On the left side of the screen, click Dynamic Access Control. You will see the following:
5.
6.
7.
8.
9.
10.
11.
12.
13.
Double-click the Claim Types folder.
On the right side of the screen, in the Claim Types group, click New and then click Claim Type.
In the Active Directory field list, scroll down and select the department field.
Click the OK button. The claim type will be listed in the Claim Types list.
To use this claim type as a basis for folder permissions, open File Explorer.
On the C: drive, create a folder and name it Marketing Proposals.
Right-click the Marketing Proposals folder and click Properties.
Click the Security tab.
Click the Advanced button. The Advanced Security Settings screen
will appear.
Click the Add button. You will see a screen similar to the one on the
right:
Click the Select a principal link.
Click in the Enter the object name to select text box. Type: Domain Users.
Click the OK button.
To add the claim type to limit access to this folder to the marketing department users and groups, click the Add a condition link.
Click the drop-down arrow on the Group field and click department.
Click in the Enter value here field. Type: Marketing.
Click the OK button. The folder is now only accessible to users in the Marketing department.
14.
15.
16.
17.
18.
19.
20.
21.
115 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
22. Close all open windows.
Points to Remember:
•
•
•
Dynamic Access Control allows an administrator flexible criteria in assigning permissions to users and groups.
Most of the criteria for Dynamic Access Control revolves around Active Directory attributes.
Dynamic Access Control settings are done in the Active Directory Administrative Center.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 5:
Describe Bring Your Own Device: Describe Dynamic Access Control Policies
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1
Objectives:
5.0 Understand Enterprise Mobility
5.3 Describe Bring Your Own Device (BYOD)
5.3.c Describe Dynamic Access Control Policies
116 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
Describe Windows Rights Management
Description:
Windows Rights Management allows users to take control of permissions of their own files. With Windows Rights Management,
users can protect their own emails and documents from being edited and, in some cases, viewed by others. In order for users to use
Windows Rights Management, the Windows Rights Management service has to be enabled either through Active Directory or
through Azure. Once this is complete, users can use the backstage in Microsoft Office to set permissions on a file or email through
Windows Rights Management. The granularity (meaning the details) of Windows Rights Management permissions vary as they are
set by the Windows Rights Management administrator. In this project, you will set permissions on a file through Windows Rights
Management. You will need Microsoft Word on a device and a connection to a network that is using Windows Rights Management in
order to complete the project.
Steps for Completion:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
On a Windows 8.1 device, open Microsoft Word.
Start a new, blank file.
Type a sentence into the file.
Save the file. The name and location of the file are your choice.
Click the File tab to access the backstage.
If necessary, click the Info setting on the left side of the backstage.
Click the Protect Document button. You will see the screen on the
right:
Click the Restrict Access setting. A list of choices will appear.
Click the Restricted Access option.
Select the Restrict permission to this document check box.
Click in the Read text box. Type an email address.
Click in the Change text box. Type the same email address. This will allow the person at the email address to read and change this
file but no one besides that person and the file author will be able to read or change the file.
Click the OK button. You will see the screen to the right:
Save and close the file.
Close all open windows.
Points to Remember:
•
•
•
Windows Rights Management allows users to control permissions on their own files.
The details to which users can control permissions on their own files is subject to the settings an administrator chooses when
setting up the Windows Rights Management service.
The Windows Rights Management service can be set up in Active Directory or in Azure.
Reference:
LearnKey’s MTA Mobility and Device Fundamentals (98-368) Training, Session 5:
Describe Bring Your Own Device: Describe Windows Rights Management
Project File: N/A
Difficulty: Beginner
Required Materials: Windows 8.1
Objectives:
5.0 Understand Enterprise Mobility
5.3 Describe Bring Your Own Device (BYOD)
5.3.d Describe Windows Rights Management
117 | Session 5
MTA: Mobility and Device Fundamentals (98-368) Project Workbook
118 | Introduction
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Session 1 Course Map
Topic Subtopic Objectives Files
Welcome
Test Tips and Course Road
Map
Tools for Exercises
Notes on the Project
Workbook
Configure Device
Options
Describe Microsoft
Accounts
Create a Microsoft Account
Add Account to a Device
Configure Control Panel
Configure System Options
1.0 Understand Device Configurations
1.1 Configure Device Options
Desktop Settings
Configure Desktop Settings
Synchronize Devices
Configure the Start Menu
Configure Profiles
Check for an Existing
Account
Add a Local Account
Configure Display Settings
Corners and Edges
Configure Shortcuts
Group Configurations and
Capabilities
1.0 Understand Device Configurations
1.2 Configure Desktop Settings
S1P4: Configuring the
Start Menu
S1P5: Configuring
Profiles
S1P6: Configuring
Desktop Settings
S1P7: Configuring
Shortcuts
S1P8: Configuring
Group
Configurations and
Capabilities
Configure Drive
Encryption
Configure BitLocker
Prepare for File Encryption
1.0 Understand Device Configurations
1.3 Configure Drive Encryption
S1P9: Configuring
BitLocker
S1P10: Preparing for
File Encryption
Configure Updates
Describe Windows Updates
Describe App Updates
Describe Device System
Updates
1.0 Understand Device Configurations
1.4 Configure Updates
S1P11: Describing
Windows Updates
S1P12: Describing
App Updates
S1P13: Describing
Device System
Updates
119 | Appendix
1.1.a Describe Microsoft Account
1.1.b Configure Control Panel
1.1.c Configure System Options
1.2.a Configure the Start Menu
1.2.b Configure Profiles
1.2.c Configure Display Settings
1.2.d Configure Shortcuts
1.2.e Configure Group Configurations and Capabilities
1.3.a Configure BitLocker
1.3.b Prepare for File Encryption
1.4.a Describe Windows Update
1.4.b Describe App Updates
1.4.c Describe Device System Updates
S1P1: Obtaining a
Microsoft Account
S1P2: Configuring the
Control Panel
S1P3: Joining a
Device to a
Network
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Session 2 Course Map
Topic Subtopic Objectives Files
Describe Cloud
Storage Services
Describe OneDrive
Describe OneDrive for
Business
Describe Microsoft Azure
Storage
Describe OneNote
Describe Outlook
Describe Office 365
2.0 Understand Data Access and Management
2.1 Describe Cloud Storage Services
S2P14: Describing OneDrive
S2P15: Describing Azure
Storage
S2P16: Describing OneNote
S2P17: Describing Outlook
S2P18: Describing 365
Local Storage
Describe Storage Spaces,
Storage Pools
Create Storage Pool
2.0 Understand Data Access and Management
2.2 Describe Local Storage
S2P19: Describing Storage
Spaces and Storage Pools
Describe FAT
Describe FAT32
Describe NTFS
Describe Resilient File
System
2.0 Understand Data Access and Management
2.3 Describe File Systems
S2P20: Describing File Systems
Describe File and Print
Sharing
Describe NTFS and Share
Permissions
Describe HomeGroup
Describe Print Drivers
Describe Effective
Permissions
Public, Basic, and Advanced
Shares
Map Drives
Network Discovery
Recap Permissions
2.0 Understand Data Access And Management
2.4 Describe File and Print Sharing
S2P21: Describing NTFS and
Share Permissions
S2P22: Setting Up a
HomeGroup
S2P23: Describing Print Drivers
S2P24: Describing Effective
Permissions
S2P25: Creating Public Shares
S2P26: Creating Basic and
Advanced Shares
S2P27: Mapping a Drive
Describe Encrypting File
System
Impact on Moving and
Copying Files
Describe BitLocker to Go
Describe Virtual Private
Network
Describe Public Key
Describe Private Key
Describe AD Certificate
Services
Describe SSL
2.0 Understand Data Access and Management
2.5 Describe Data Encryption
S2P28: Using Encryption File
System (EFS)
S2P29: Describing BitLocker
To Go
S2P30: Describing Virtual
Private Networks
S2P31: Describing Encryption
Keys
S2P32: Describing Certificate
Services and Secure Sockets
Layer (SSL)
File Systems
File and Print Sharing
Describe Data
Encryption
120 | Appendix
2.1.a Describe OneDrive,
2.1.b Describe Microsoft Azure Storage,
2.1.c Describe OneNote
2.1.d Describe Outlook
2.1.e Describe Office 365
2.2.a Describe Storage Spaces and Storage Pools
2.3.a Describe FAT
2.3.b Describe FAT32
2.3.c Describe NTFS
2.3.d Describe Resilient File System Overview (ReFS)
2.4.a Describe NTFS and Share Permissions
2.4.b Describe HomeGroup
2.4.c Describe Print Drivers
2.4.d Describe Effective Permissions
2.4.e Create Public, Basic, and Advanced Shares
2.4.f Map Drives
2.5.a Describe Encrypting File System (EFS)
2.5.b Describe How EFS-Encrypted Folders Impact Moving and
Copying Files
2.5.c Describe BitLocker To Go
2.5.d Describe Virtual Private Network (VPN)
2.5.e Describe Public Key
2.5.f Describe Private Key
2.5.g Describe Certificate Services
2.5.h Describe SSL
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Session 3 Course Map
Topic Internet, Intranet, and
Extranet
Authentication
Permissions
Describe Malware
121 | Appendix
Subtopic Objectives Files
Introduction to Device
Security
Differences
SharePoint
Describe Uses of Private
Networks
Describe Uses of Public
Network
Describe Uses of Firewalls
Describe Uses of Clouds
3.0 Understand Device Security
3.1 Describe the Differences between the Internet, an
Intranet, and an Extranet
S3P33: Private and Public Networks
S3P34: Describing Uses of Firewalls
S3P35: Describing Uses of Clouds
Describe User
Authentication
Describe Multifactor
Authentication
Describe Smart Cards
Windows Rights
Management Services
Describe Biometrics
Describe Password
Procedures
3.0 Understand Device Security
3.2 Describe User Authentication
S3P36: Descibing Authentication
S3P37: Describing Windows Rights
Management Services
S3P38: Describing Password
Procedures
Describe Permissions
Configure File and Share
Permissions
Assign Permissions
Move and Copy Files
Describe Basic and
Advanced Permissions
Describe Taking Ownership
Describe Delegating
Describe Resultant
Permissions
3.0 Understand Device Security
3.3 Describe Permissions
S3P39: Setting Up Permissions on
Folders and Files
S3P40: Permission Changes on File
Location Changes
S3P41: Describing Basic and
Advanced Permissions
S3P42: Describing Taking Ownership
and Delegating
S3P43: Describe Resultant
Permissions
Describe Computer Viruses
Describe Trojan Horses
Describe Spyware
Describe Adware
Antivirus and Antimalware
Strategies
SmartScreen Filter
3.0 Understand Device Security
3.4 Describe Malware
S4P44: Describing Malware
S4P45: Describing Antivirus and
Antimalware Strategies
3.1.a Describe Uses of Private Networks
3.1.b Describe Uses of Public Networks
3.1.c Describe Uses of Firewalls
3.1.d Describe Uses of Clouds
3.2.a Describe Multifactor Authentication
3.2.b Describe Smart Cards
3.2.c Describe Windows Rights Management Services
3.2.d Describe Biometrics
3.2.e Describe Password Procedures
3.3.a Configure File and Share Permissions
3.3.b Describe the Behavior when Moving or Copying Files
from One Location to Another
3.3.c Describe Basic and Advanced Permissions
3.3.d Describe Taking Ownership
3.3.e Describe Delegating
3.3.f Describe Resultant Permissions
3.4.a Describe Computer Viruses
3.4.b Describe Trojan Horses
3.4.c Describe Spyware
3.4.d Describe Adware
3.4.e Describe Antivirus and Antimalware Strategies
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Session 4 Course Map
Topic Subtopic Objectives Files
Describe the Types of
Cloud Services
Describe Productivity
Services
Describe Storage Services
Describe Communications
Services
Describe Search Services
4.0 Understand Cloud Services
4.1 Describe the Types of Cloud Services
S4P46: Describing Productivity
Services
S4P47: Describing Storage
Services
S4P48: Describing
Communications Services
S4P49: Describing Search Services
Microsoft Intune
Describe Microsoft Intune
Capabilities
Describe Selective Wipe
Describe Location Settings
4.0 Understand Cloud Services
4.2 Describe Microsoft Intune
S4P50: Taking a Tour of Microsoft
Intune
S4P51: Wiping a Device
S4P52: Setting up Geolocation on
a Windows Device
S4P53: Describing Virtual
Machines
Describe Microsoft
Azure
122 | Appendix
Describe Virtual Machines
Describe Azure Services
Describe Disaster Recovery
Describe High Availability
Describe Redundancy
Describe Fault Tolerance
4.1.a Describe Productivity Services
4.1.b Describe Storage Services
4.1.c Describe Communications Services
4.1.d Describe Search Services
4.2.a Describe Microsoft Intune Capabilities
4.2.b Describe Selective Wipe
4.2.c Describe Location Settings
4.0 Understand Cloud Services
4.3 Describe Microsoft Azure
4.3.a Describe Virtual Machines
4.3.b Describe Azure Services
4.3.c Describe Disaster Recovery
4.3.d Describe High Availability
4.3.e Describe Redundancy
4.3.f Describe Fault Tolerance
S4P54: Describing Azure Services
S4P55: Describing Disaster
Recovery
S4P56: High Availability,
Redundancy, and Fault Tolerance
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Session 5 Course Map
Topic Subtopic Describe Identity
Services
Describe Windows Server
AD and Azure AD
Describe Microsoft Account
Describe Federation
Services
Describe Business
Data Access
Describe Company Portal
Describe Work Folders
Describe Azure RemoteApp
Describe Bring Your
Own Device
Device-Centric to PeopleCentric IT
Describe Desktop
Virtualization
Describe Dynamic Access
Control Policies
Describe Windows Rights
Management
Course Recap
Test Tips
123 | Appendix
Objectives Files
5.0 Understand Enterprise Mobility
5.1 Describe Identity Services
S1P1: Obtaining a Microsoft Account
S5P57: Describing Active Directory
Services
5.0 Understand Enterprise Mobility
5.2 Describe Business Data Access
S5P58: Setting Up a Company Portal
S5P59: Setting Up Work Folders
S5P60: Describe Azure RemoteApp
5.0 Understand Enterprise Mobility
5.3 Describe Bring Your Own Device (BYOD)
S5P61: Descibing IT Centricity and
Desktop Virtualization
S5P62: Describing Dynamic Access
Control Policies
S5P63: Describe Windows Rights
Management
5.1.a Describe Windows Server Active Directory and
Azure Active Directory
5.1.b Describe Microsoft Account
5.1.c. Describe Federation Services
5.2.a Describe Company Portal
5.2.b Describe Work Folders
5.2.c Describe Azure Remoteapp
5.3.a Describe Device-Centric to People-Centric IT
5.3.b Describe Desktop Virtualization
5.3.c Describe Dynamic Access Control Policies
5.3.d Describe Windows Rights Management
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Session 1 Outline
Welcome
Test Tips and Course Road Map
Tools for Exercises
Notes on the Project Workbook
Configure Device Options
Describe Microsoft Accounts
Create a Microsoft Account
Add Account to a Device
Configure Control Panel
Configure System Options
Desktop Settings
Configure Desktop Settings
Synchronize Devices
Configure the Start Menu
Configure Profiles
Check for an Existing Account
Add a Local Account
Configure Display Settings
Corners and Edges
Configure Shortcuts
Group Configurations and Capabilities
Configure Drive Encryption
Configure BitLocker
Prepare for File Encryption
Configure Updates
Describe Windows Updates
Describe App Updates
Describe Device System Updates
124 | Appendix
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Session 2 Outline
Describe Cloud Storage Services
Describe OneDrive
Describe OneDrive for Business
Describe Microsoft Azure Storage
Describe OneNote
Describe Outlook
Describe Office 365
Local Storage
Describe Storage Spaces, Storage Pools
Create Storage Pool
File Systems
Describe FAT
Describe FAT32
Describe NTFS
Describe Resilient File System
File and Print Sharing
Describe File and Print Sharing
Describe NTFS and Share Permissions
Describe HomeGroup
Describe Print Drivers
Describe Effective Permissions
Public, Basic, and Advanced Shares
Map Drives
Network Discovery
Recap Permissions
Describe Data Encryption
Describe Encrypting File System
Impact on Moving and Copying Files
Describe BitLocker to Go
Describe Virtual Private Network
Describe Public Key
Describe Private Key
Describe AD Certificate Services
Describe SSL
125 | Appendix
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Session 3 Outline
Internet, Intranet, and Extranet
Introduction to Device Security
Differences
SharePoint
Describe Uses of Private Networks
Describe Uses of Public Network
Describe Uses of Firewalls
Describe Uses of Clouds
Authentication
Describe User Authentication
Describe Multifactor Authentication
Describe Smart Cards
Windows Rights Management Services
Describe Biometrics
Describe Password Procedures
Permissions
Describe Permissions
Configure File and Share Permissions
Assign Permissions
Move and Copy Files
Describe Basic and Advanced Permissions
Describe Taking Ownership
Describe Delegating
Describe Resultant Permissions
Describe Malware
Describe Computer Viruses
Describe Trojan Horses
Describe Spyware
Describe Adware
Antivirus and Antimalware Strategies
SmartScreen Filter
126 | Appendix
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Session 4 Outline
Describe the Types of Cloud Services
Describe Productivity Services
Describe Storage Services
Describe Communications Services
Describe Search Services
Microsoft Intune
Describe Microsoft Intune Capabilities
Describe Selective Wipe
Describe Location Settings
Describe Microsoft Azure
Describe Virtual Machines
Describe Azure Services
Describe Disaster Recovery
Describe High Availability
Describe Redundancy
Describe Fault Tolerance
127 | Appendix
MTA Mobility and Device Fundamentals (98-368)
MTA Mobility and Device Fundamentals (98-368) Session 5 Outline
Describe Identity Services
Describe Windows Server AD and Azure AD
Describe Microsoft Account
Describe Federation Services
Describe Business Data Access
Describe Company Portal
Describe Work Folders
Describe Azure RemoteApp
Describe Bring Your Own Device
Device-Centric to People-Centric IT
Describe Desktop Virtualization
Describe Dynamic Access Control Policies
Describe Windows Rights Management
Course Recap
Test Tips
128 | Appendix
MTA Mobility and Device Fundamentals (98-368)
8 Week Sample Lesson Plan
Monday
Tuesday
Wednesday
Thursday
Friday
Week 1
Session 1 PreAssessment
Session 1
Session 1
Session 1
Projects
Week 2
Projects
Projects
Projects
Projects
Projects
Week 3
Online Labs Projects
Session 1 Post Test
Session 2 PreAssessment
Session 2
Session 2
Week 4
Session 2
Projects
Projects
Projects
Projects
Week 5
Projects
Projects
Online Labs Projects
Session 2 Post Test
Session 3 PreAssessment
Week 6
Session 3
Session 3
Session 3
Projects
Projects
Week 7
Projects
Project
Project
Projects
Online Labs Projects
Week 8
Session 3 Post Test
MasterExam
MasterExam
MasterExam
MasterExam
*LearnKey training segments are underlined.
*Activities are italicized.
*Tests are bolded.
129 | Appendix
MTA Mobility and Device Fundamentals (98-368)
6 Week Sample Lesson Plan
Monday
Tuesday
Wednesday
Thursday
Friday
Week 1
Session 1 PreAssessment
Session 1
Projects
Projects
Projects
Week 2
Projects
Projects
Online Labs
Session 1 Post Test
Session 2 PreAssessment
Week 3
Session 2
Projects
Projects
Projects
Projects
Week 4
Projects
Online Labs
Session 2 Post Test
Session 3 PreAssessment
Session 3
Week 5
Projects
Projects
Projects
Projects
Projects
Week 6
Online Labs
Session 3 Post Test
MasterExam
MasterExam
MasterExam
*LearnKey training segments are underlined.
*Activities are italicized.
*Tests are bolded.
130 | Appendix
MTA Mobility and Device Fundamentals (98-368)
7 Week Sample Lesson Plan
Monday
Tuesday
Wednesday
Thursday
Friday
Week 1
Session 1 PreAssessment
Session 1
Session 1
Projects
Projects
Week 2
Projects
Projects
Projects
Online Labs Projects
Session 1 Post Test
Week 3
Session 2 PreAssessment
Session 2
Session 2
Projects
Projects
Week 14
Projects
Projects
Projects
Online Labs Projects
Projects
Week 15
Session 2 Post Test
Session 3 PreAssessment
Session 3
Session 3
Projects
Week 6
Projects
Projects
Projects
Projects
Online Labs Projects
Week 7
Projects
Session 3 Post Test
MasterExam
MasterExam
MasterExam
*LearnKey training segments are underlined.
*Activities are italicized.
*Tests are bolded.
131 | Appendix
MTA Mobility and Device Fundamentals (98-368)
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement