Numerics
A
account lockout policy, 153
Action Center, 45
after reinstalling Windows 10, 74
checking status, 73
first-time, 74
refurbished devices running Windows 10, 74–75
using the Activation troubleshooter, 75
virtual machines, 72
volume activation services, 71
AD (Active Directory), 119
computer accounts, 119
distribution groups, 119
user accounts, 119
AD DS (Active Directory Domain Service), 118, 120–121
ADK (Assessment and Deployment Kit), 12, 14
Allow and Deny permissions, 247
AMSI (Antimalware Scan Interface), 170
APIPA (Automatic Private IP Address), 215
apps
allowing through Windows Defender Firewall, 173–174
Universal Windows, 94–95, 96–98
authentication. See also MFA (multifactor authentication)
Windows Admin Center, 413
automatic device driver installation, 327–328
Azure AD, 121
connecting devices, 126
join a new Windows 10 device, 126–127
join an existing Windows 10 device, 127–128
device management, 121, 123–125
joined devices, 122
B
backup and recovery, 16
BitLocker and, 195
configuring a recovery drive, 305–306
creating a system image backup, 315–316
support for encryption, 300–301
Fresh Start, 315
recovering files from OneDrive, 302–304
scheduling backups, 293
identifying affected apps and files, 308–309
modifying the task schedule, 309–310
WBAdmin, 295
Backup and Restore tool. See also data recovery
baseline performance, real-time monitoring and, 374
battery
biometric devices, 8
computer upgrades and, 193–194
configuring startup key storage and recovery options, 195
configuring using command-line tools, 191–192
enabling without a TPM, 189–190
moving an encrypted drive to another computer, 194
recovery key backup, 125
built-in local groups, 114–116, 117–118
C
cellular connections
troubleshooting, 223
Client Hyper-V, 6
Command Prompt, uninstalling updates, 358–359
command-line
ipconfig, 232
permission masks, 248
ping, 232
tracert, 232
computer accounts, 119
Computer Management, managing local user accounts, 110–111
Continuum, 6
Control Panel
managing local user accounts, 111–112
uninstalling updates, 357
convertible devices, Tablet mode, 35–36
Cortana, 6
D
data access
file and folder permissions, 240, 243–244
Allow and Deny, 247
granting, 248
NTFS and ReFS, 245
security, 244
viewing effective access, 251–253
shared permissions, 255
network discovery, 257
Shared Folders snap-in, 258–259
SMB (Server Message Block), 256–257
Windows PowerShell and, 261
taking ownership of resources, 253
data collector sets, 370–371, 373
data recovery, 291. See also backup and recovery
determine Windows 10 Edition requirements for particular features, 5
selecting the appropriate Windows edition, 2–4
32-bit or 64-bit versions, 4–5
determine requirements for particular features, 5–8
desktop
configuring Start tiles, 36–38
grouping Start tiles, 38
support for multiple, 44
device drivers, 324
automatic installation, 327–328
packages, 335
managing with DISM, 340
support for older hardware, 333–334
troubleshooting, 330
devices, 107–108. See also Azure AD; printers
connecting to your Microsoft account, 137
enrolling to Microsoft 365, 129–130
enrolling to Microsoft 365 Business, 130–132
enrolling to Microsoft 365 Enterprise, 133–134
disabling, driver updates, 326–327
Disk Cleanup tool, 340
removable storage, 280
formatting, 280
securing removable devices, 280–282
Storage Spaces, 275
managing with Windows PowerShell, 279–280
creating with Disk Management, 272
creating with Hyper-V Manager, 272
creating with Windows PowerShell, 273–274
Windows PowerShell and, 268–269
distribution groups, 119
DNS (Domain Name System), 212
Dynamic Lock, 145
E
EFS (Encrypting File System), 180–181
file and folder encryption, 181–183
performing backup and recovery of encrypted files, 183–185
encryption, 180
EFS (Encrypting File System), 180–181
file and folder encryption, 181–183
performing backup and recovery of encrypted files, 183–185
enrolling devices
to Microsoft 365 Business, 130–132
to Microsoft 365 Enterprise, 133–134
eSIM (embedded SIM), 222
accessing remotely, 364
Event Viewer, 232
subscriptions, 362
F
feature updates, 343
support for encryption, 300–301
file systems
NTFS, 241
ReFS, 242
files, 243–244. See also back up and recovery; shared permissions
Allow and Deny permissions, 247
moving, 251
NTFS and ReFS permissions, 245
OneDrive document version history, 304
permissions, 240
granting, 248
recovering, 292
using Windows Backup and Restore, 292–295
recovering from OneDrive, 302–304
security permissions, 244
folders, 243–244. See also back up and recovery; shared permissions
Allow and Deny permissions, 247
moving, 251
NTFS and ReFS permissions, 245
permissions, 240
granting, 248
security permissions, 244
formatting removable storage, 280
Fresh Start, 315
G
GPOs (Group Policy Objects), 157
Remote Assistance and, 401
Remote Desktop and, 408
GPResult command-line tool, 160–161
granting permissions, 248
Group Policy(ies), 157
configuring Start menu, 41
settings, 158
troubleshooting
connection issues, 159
GPResult command-line tool, 160–161
RSoP (Resultant Set of Policy) tool, 160
H
Hotspot 2.0 networks, 237
Hyper-V Manager, creating VHDs, 272
I
IKEv2 (Internet Key Exchange, Version 2), 226
installation, 9–11. See also performing a clean installation; post-installation configuration
configure Windows for additional regional and language support, 27–28
DISM command-line tool, 30
Lpksetup command-line tool, 30–32
determine the appropriate installation media, 11–14
methods, 9
migrating from previous versions of Windows, 21–22
considerations, 23
side-by-side migration, 22
USMT (User State Migration Tool), 23–27
wipe-and-load migration, 22–23
perform an in-place upgrade, 14, 15–17
in corporate environments, 16
supported upgrade paths, 14–15
using installation media, 19–20
using MDT (Microsoft Deployment Toolkit), 17–18
strategies, 11
InstantGo, 6
ipconfig command, 232
IPv4, 212
address classes, 213
default gateway address, 212
DNS (Domain Name System), 212
public and private addresses, 214–215
subnet mask, 212
subnets, 212
simple networks, 213
IPv6, 217
advanced DNS settings, 221–222
Windows PowerShell networking-related cmdlets, 219
J-K
joined devices, Azure AD, 122
Kerberos, 226
L
L2TP (Layer 2 Tunneling Protocol), 226
LLTP (Link Layer Topology Discovery), 257
Local Group Policy, 146
special identity groups, 117–118
removing, 117
Local Security Policy, 150–152
account lockout policy, 153
configure a password policy, 152–153
local policies
security options, 157
user rights policies, 156
local accounts, 108
managing using Computer Management, 110–111
managing using Control Panel, 111–112
managing using Settings app, 112–113
managing using Windows PowerShell, 113
M
MDT (Microsoft Deployment Toolkit), 17–18
MFA (multifactor authentication), 8, 138, 139
configure the picture password, 144
Dynamic Lock, 145
Windows Hello for Business, 139
Microsoft 365 Business, enrolling devices, 130–132
Microsoft 365 Enterprise, enrolling devices, 133–134
Microsoft accounts
connecting to your device, 137
limiting the use of, 138
signing up for, 137
Microsoft Store for Business, 95–96
Microsoft Store, Universal Windows apps, 94–95
migrating from previous versions of Windows, 21–22
considerations, 23
side-by-side migration, 22
USMT (User State Migration Tool), 23–27
wipe-and-load migration, 22–23
Miracast, 6
MMC (Microsoft Management Console), remote management and, 397–398
mobile networking, 222
setting up Windows 10 as a mobile hotspot, 224
setting up Windows 10 for a cellular data plan, 222–223
mobility settings, 77
configure basic power settings, 77–78, 79
configure presentation settings, 83–84
power settings, viewing process power usage, 82–83
monitoring, Windows Defender Firewall, 172–173
moving, files and folders, 251
N
IPv6
advanced DNS settings, 221–222
network discovery, 257
Network Troubleshooter, 233
networks, 211–212. See also IPv4; IPv6
mobile, 222
setting up Windows 10 as a mobile hotspot, 224
setting up Windows 10 for a cellular data plan, 222–223
VPNs (virtual private networks)
authenticating remote users, 226–227
configure using the Settings app, 229
creating a connection in Network and Sharing Center, 227–229
enabling VPN Reconnect, 230–231
wireless, 234
advanced settings, 238
connecting to, 236
Hotspot 2.0, 237
security, 235
standards, 235
notifications, configuring, 47–49
NSLookup, 232
O
document version history, 304
P
commonly tracked objects, 372–373
creating data collector sets, 373
performance monitoring
baseline performance and, 374
creating a performance baseline, 374–375
using Performance Monitor and Data Collector Sets, 369–371
using Resource Monitor, 366–368
using Task Manager, 366
performing a clean installation, 8–11. See also post-installation configuration
configure Windows for additional regional and language support, 27–28
DISM command-line tool, 30
Lpksetup command-line tool, 30–32
determine the appropriate installation media, 11–14
identify an installation strategy, 11
migrating from previous versions of Windows, 21–22
considerations, 23
side-by-side migration, 22
USMT (User State Migration Tool), 23–27
wipe-and-load migration, 22–23
perform an in-place upgrade, 14, 15–17
in corporate environments, 16
supported upgrade paths, 14–15
using installation media, 19–20
using MDT (Microsoft Deployment Toolkit), 17–18
using Windows Deployment Services, 17
permissions, 243–244. See also shared permissions
Allow and Deny, 247
documenting, 255
granting, 248
NTFS and ReFS, 245
security, 244
network discovery, 257
SMB (Server Message Block), 256–257
taking ownership of resources, 253
ping command, 232
PINs, configuring for Windows Hello, 141–144
policies. See also Local Group Policy
account lockout, 153
user rights, 156
post-installation configuration, 32
configure Action Center, 45, 49–50
customize the Windows desktop, 32, 41–43
configuring Start tiles, 36–38
grouping Start tiles, 38
support for multiple desktops, 44
viewing process power usage, 82–83
PPTP (Point-to-Point Tunneling Protocol), 225–226
principle of least administration, 247
Print Management console, 88–90, 377–378
adding and removing, 90
managing
with Print Management, 377–378
with Windows PowerShell, 378–379
managing with Windows PowerShell, 91–92
Print Management console, 88–90
Q-R
quality updates, 344
recovery drive, configuring, 305–306
ReFS, 242
registration, Azure AD devices, 122–123, 129
manage settings with PowerShell, 149–150, 389–390
Registry Editor (Regedit.exe), 149, 388–389
Remote Assistance, 395–396, 398, 401
configuring with GPOs, 401
configuring
from the command line, 406–407
with GPOs, 408
creating and editing connections, 404–406
remote management
Remote Assistance and, 401
settings, 393
System Properties and, 395
using Windows Admin Center, 411
Windows Defender Firewall and, 393–395
Windows PowerShell and, 409–411
removable storage, 280
formatting, 280
securing removable devices, 280–282
removing
local groups, 117
printers and print servers, 90
Resource Monitor, performance monitoring and, 366–368
RSoP (Resultant Set of Policy) tool, 160
S
SAM (Security Accounts Manager), 108
scheduled backups, 293
SDHC (Secure Digital High-Capacity) memory cards, 306
Secure Boot, 7
security, 162. See also encryption; Windows Security
computer upgrades and, 193–194
configuring startup key storage and recovery options, 195
configuring using command-line tools, 191–192
enabling without a TPM, 189–190
moving an encrypted drive to another computer, 194
encryption, File History and, 300–301
UAC (User Account Control), 165–166
Windows Defender Antivirus, 199–203
Windows Defender Firewall, 170–171
allowing an app through, 173–174
configure connection security rules with IPsec, 177–179
creating firewall rules, 179–180
Firewall & Network Protection page, 171
wireless networks, 235
configurable options, 384
dependencies, 101
managing
from the command line, 384
with Windows PowerShell, 385
viewing from Task Manager, 101–102
servicing channel, selecting, 345–346
Settings App
managing local user accounts, 112–113
uninstalling updates, 358
Shared Folders snap-in, 258–259
creating using the Shared Folders snap-in, 258–259
network discovery, 257
NTFS and, 265
SMB (Server Message Block), 256–257
Windows PowerShell and, 261
sign-in options, 136
SMB (Server Message Block), 256–257
special identity groups, 117–118
SSTP (Secure Socket Tunneling Protocol), 226
Start menu
configuring Start tiles, 36–38
grouping Start tiles, 38
available options for recovery, 321–322
Storage Spaces, 275
managing with Windows PowerShell, 279–280
subnet mask, 212
subnets
simple networks, 213
System Configuration tool, 385–386
System Image Recovery, 317–318
System Properties, remote management and, 395
system repair disk, creating, 318–319
system resources, 374
identifying affected apps and files, 308–309
modifying the task schedule, 309–310
T
Performance tab, 366
viewing process power usage, 82–83
taskbar
configure notifications area, 50–52
TPM (Trusted Platform Module), 7, 187
tracert command, 232
troubleshooting
activation
after a hardware configuration change, 74
using the Activation troubleshooter, 75
volume activation services, 72–73
cellular connections, 223
device drivers, 330
EFS (Encrypting File System), 185–186
Group Policy(ies)
connection issues, 159
GPResult command-line tool, 160–161
RSoP (Resultant Set of Policy) tool, 160
troubleshooting tools, 232–233
volume license activation renewal, 72
U
UAC (User Account Control), 165–166
Secure Desktop, 170
uninstalling updates
using Control Panel, 357
using Settings app, 358
using the Command Prompt, 358–359
configure application settings, 96–98
Universal Windows driver, 334
updates. See also Windows Update
deferrals, 344
feature, 343
planning for, 343
quality, 344
rolling back, 357
servicing channel selection and, 345–346
testing and validation, 355
uninstalling
using Control Panel, 357
using Settings app, 358
using the Command Prompt, 358–359
user accounts. See also Microsoft accounts
AD (Active Directory), 119
local accounts, 108
managing using Computer Management, 110–111
managing using Control Panel, 111–112
managing using Settings app, 112–113
managing using Windows PowerShell, 113
user rights policies, 156
USMT (User State Migration Tool), 23–27
V
VHDs (virtual hard disks), 270–271
creating with Disk Management, 272
creating with Hyper-V Manager, 272
creating with Windows PowerShell, 273–274
virtual machines, activation, 72
VPNs (virtual private networks), 211, 225
Always On feature, 229
App-Triggered, 230
authenticating remote users, 226–227
configure using the Settings app, 229
creating a connection in Network and Sharing Center, 227–229
enabling VPN Reconnect, 230–231
rules, 230
traffic filters, 230
VSS (Volume Shadow Copy Service), 294
W
WBAdmin, 295
Windows 10. See also performing a clean installation
after reinstalling Windows 10, 74
first-time, 74
refurbished devices running Windows 10, 74–75
volume activation services, 71
ADK (Assessment and Deployment Kit), 12, 14, 24
Business license, 4
configuring using provisioning packages, 92–93
deploying, selecting the appropriate Windows edition, 2–4
configure Windows for additional regional and language support, 27–28
considerations, 23
determine the appropriate installation media, 11–14
DISM command-line tool, 30
Lpksetup command-line tool, 30–32
methods, 9
migrating from previous versions of Windows, 21–22
perform an in-place upgrade, 14, 15–17
side-by-side migration, 22
strategies, 11
USMT (User State Migration Tool), 23–27
wipe-and-load migration, 22–23
Internet of Things (IoT) editions, 4
mobility settings, 77
configure basic power settings, 77–78
performing a clean installation, 8–11
post-installation configuration, 32
configure Action Center, 45
configure notifications area, 50–52
configure Quick Action tiles, 45–47
configuring Start tiles, 36–38
configuring the taskbar, 49–50
customize the Windows desktop, 32, 33–35, 41–43
grouping Start tiles, 38
support for multiple desktops, 44
using recovery drives, 305–306
setting up as a mobile hotspot, 224
setting up for a cellular connection, 222–223
sign-in options, 136
upgrading
using installation media, 19–20
using MDT (Microsoft Deployment Toolkit), 17–18
using Windows Deployment Services, 17
Virtual Secure Mode, 8
Windows 10 Education, 3
Windows 10 Enterprise, 3
Windows 10 Enterprise LTSC, 3
Windows 10 Home, 2
Windows 10 Pro, 2
Windows 10 Pro for Workstations, 3
Windows Admin Center, 411, 413–415
authentication, 413
Windows Biometric Framework (WBF), 138
Windows Configuration Designer, 92
Windows Defender Antivirus, 199–203
Windows Defender Firewall, 170–171
allowing an app through, 173–174
configure connection security rules with IPsec, 177–179
creating firewall rules, 179–180
enabling remote management, 393–395
Firewall & Network Protection page, 171
Windows Deployment Services, upgrading Windows 10, 17
configure the picture password, 144
Dynamic Lock, 145
Windows Hello for Business, 139
Windows Mobility Center, 83. See also mobility settings
Windows Network Diagnostic, 232
IPv4 networking-related cmdlets, 217
IPv6 networking-related cmdlets, 219
managing driver packages, 337–338
managing local user accounts, 113
managing registry settings, 149–150, 389–390
managing services, 385
printer management, 91–92, 378–379
remote management and, 409–411
System Image Recovery, 317–318
Windows Remote Management, 392. See also remote management tools
Windows Update
configuring settings on an individual computer, 347–349
configuring settings using GPOs, 350–354
delivery optimization, 295–350
rolling back updates, 357
uninstalling updates
using Control Panel, 357
using Settings app, 358
using the Command Prompt, 358–359
update testing and validation, 355
wireless networks, 234
advanced settings, 238
connecting to, 236
Hotspot 2.0, 237
security, 235
standards, 235