32-bit Windows 10 versions, 5
64-bit Windows 10 versions, 5
Access Denied errors, 158
account lockout policies, configuring, 148–149
accounts (Microsoft)
local account management, 102–107
with Computer Management, 103–105
configuring accounts, 102
with Windows PowerShell, 107
local group management, 107–110
creating/deleting groups, 109–110
special identity groups, 110
elevation prompt types, 160–161
Action Center, configuring, 62–69
by phone, 38
steps in, 34
of virtual machines, 34
volume activation services, 33
Active Directory-based activation, 33
active styluses, requirements, 7
Add-BitLockerKeyProtector cmdlet, 114
addresses (IPv4), 212
public versus private, 214–215
addresses (IPv6), 218
administrative users, UAC prompts, 159–160
Administrators local group permissions, list of, 109
Advanced Startup Settings troubleshooting mode, 293–294
AMSI (Antimalware Scan Interface), 162
answer files, naming, 14
anycast addresses, 218
APIPA (Automatic Private IP Address), 215
apps
allowing through firewall, 164
identifying affected with System Restore, 281
MigApp.xml support, 24
migrating, 23
notifications, configuring, 66–67
uninstalling, 54
audit policies, configuring, 149–153
authentication of VPN users, 226–227. See also sign-in options, configuring
automatic driver installation, disabling, 300
Automatic Private IP Address (APIPA), 215
Azure AD (Active Directory), 111–112
BitLocker keys, 189
background (desktop), configuring, 59
Background Intelligent Transfer Service (BITS), 328
Backup And Restore tool, 264–267, 287–291
backups
Backup And Restore tool, 264–267
BitLocker recovery key, 114
BitLocker startup key, 185
EFS-protected files, 172–173, 272
for in-place upgrades, 16
scheduling, 288
system image creation, 287–290
BackupToAAD-BitLockerKeyProtector cmdlet, 114
baseline performance
real-time monitoring versus, 336
biometrics
enabling without TPM, 175
key protectors, 175
recovery key backup, 114
requirements, 7
startup key storage/recovery options, 185
upgrading computers with, 178–183
BitLocker To Go
BITS (Background Intelligent Transfer Service), 328
bloatware, 8
Bootrec.exe, 296
bootup process. See startup process
CHAP protocol, 227
Checkpoint-Computer cmdlet, 280
CIDR (Classless Interdomain Routing), 213
Cipher.exe, 173
classful addressing, 213
classless addressing, 213
Classless Interdomain Routing (CIDR), 213
installation media creation, 9
installation media selection, 11–14
strategies for, 11
Client Hyper-V, requirements, 6
color schemes, configuring, 59
complexity requirements for passwords, 147–148
configuration requirements, Windows 10 editions, 5–8
configuring
net share command, 134
network discovery, 133
Shared Folders snap-in, 133–134
SMB, 133
Registry Editor, 146
Local Security Policy, 147–154
account lockout policies, 148–149
user rights policies, 153
local user accounts, 102
hotspots, 224
power plans, 90
Ultimate Performance power plan, 90–91
regional and language support, 26–30
Local Experience Pack installation, 27–28
Lpksetup command line tool, 29–30
steps in, 26
MMC (Microsoft Management Console), 250–251
Remote Assistance, 244–245, 246–250
Remote Desktop, 245–246, 252–256
System Properties, 244
Windows Defender Firewall, 242–244
Dynamic Lock, 49
multi-factor authentication (MFA), 42–43
Backup And Restore tool, 264–267
recovery drive creation, 277–278
system image backup creation, 287–290
system repair disk creation, 290–291
UAC (User Account Control), 157–162
elevation prompt types, 160–161
VPNs
in Network and Sharing Center, 227–229
in Settings app, 229
Windows Defender Firewall, 162–169
advanced security options, 165–166
allowing apps through firewall, 164
connection security rules with IPsec, 166–184
filter types, 163
Firewall and Network Protection page, 162
monitoring firewall, 163
connections, 235
Hotspot 2.0 networks, 237
modes, 234
security, 235
standards, 234
connection issues, troubleshooting, 154
connection security rules with IPsec, 166–184
Continuum, requirements, 6
Control Panel
local user account management, 105–106
printer management, 341
uninstalling updates, 328
Convenience PINs, 48
corporate environment, in-place upgrades in, 16
Cortana, requirements, 6
custom event views, creating, 329–330
customization settings, migrating, 19
customizing. See configuring; desktop customization
data access
characteristics of NTFS, 121–122
combining with shared permissions, 139
inheritance, 132
resource ownership changes, 133
troubleshooting, 133
combining with NTFS permissions, 139
folder share configuration, 133–137
Data Collector Sets, 336
data migration. See user data migration
data recovery. See recovery
Data Recovery Agent (DRA), EFS (Encrypting File System) and, 171–172
default gateway addresses, 212
default local user accounts, 102–103
deleting
delivery optimization for updates, 321–325
DEM (device enrollment manager), 120
by phone, 38
steps in, 34
of virtual machines, 34
volume activation services, 33
installation media creation, 9
installation media selection, 11–14
strategies for, 11
32-bit versus 64-bit, 5
hardware/configuration requirements, 5–8
in corporate environment, 16
with installation media, 17–19
steps in, 16
post-installation configuration
steps in, 39
regional and language support configuration, 26–30
Local Experience Pack installation, 27–28
Lpksetup command line tool, 29–30
steps in, 26
side-by-side migrations, 20–21
User State Migration Tool (USMT), 22–25
Windows customization settings, 19
wipe-and-load migrations, 21
Deployment Image Servicing and Management (DISM), 12, 28–29, 312–314
tile grouping, 55
device enrollment manager (DEM), 120
device health attestation, requirements, 7
configuring device management, 112–113
registering devices, 111–112, 116
disabling automatic installation, 300
updating, 298
viewing/managing devices, 120–121
older hardware support, 305–306
recycling devices, 286
viewing device settings, 304–305
Device Manager
older hardware support, 305–306
troubleshooting with, 302
updating drivers, 298
viewing device settings, 304–305
Devices And Printers (Control Panel), 341
digital licenses, 31
Disable-ComputerRestore cmdlet, 280
Disable-LocalUser cmdlet, 107
Disable-NetFirewallRule cmdlet, 169
Disable-PnpDevice cmdlet, 311
disabling
automatic driver installation, 300
driver updates, 302
Microsoft Edge kiosk mode, 79
Disk Cleanup, 313
DISM (Deployment Image Servicing and Management), 12, 28–29, 312–314
DNS (Domain Name System)
server addresses, 212
downloading
Internet Explorer, 83
DRA (Data Recovery Agent), EFS (Encrypting File System) and, 171–172
DRA certificates
creating, 170
drive letters in Windows RE, 269
disabling automatic driver installation, 300
disabling updates, 302
troubleshooting drivers, 302–308
updating drivers, 298
DVD installation, 12
Dynamic Lock, configuring, 49
EAP-MS-CHAPv2 protocol, 226–227
Edge browser. See Microsoft Edge, configuring
editing Windows Registry, 146
Effective Access, viewing, 133–137
EFS (Encrypting File System), 169–173
DRA (Data Recovery Agent) and, 171–172
troubleshooting, 173
elevation prompt types, 160–161
Enable-ComputerRestore cmdlet, 280
Enable-LocalUser cmdlet, 107
Enable-NetFirewallRule cmdlet, 169
Enable-PnpDevice cmdlet, 311
enable-PSremoting -force cmdlet, 257
Encrypting File System (EFS), 169–173
DRA (Data Recovery Agent) and, 171–172
troubleshooting, 173
enabling without TPM, 175
key protectors, 175
startup key storage/recovery options, 185
upgrading computers with, 178–183
BitLocker To Go
EFS (Encrypting File System), 169–173
DRA (Data Recovery Agent) and, 171–172
troubleshooting, 173
enrolling devices
in Microsoft 365 Business, 117–119
in Microsoft 365 Enterprise, 119–120
Enterprise Mode, Microsoft Edge, 81–83
Enter-PSSession cmdlet, 258
erasing existing operating systems, 10
event subscription configuration, 330–331
remote access, 331
event subscriptions, configuring, 330–331
Event Viewer, 232, 314, 329–331
existing operating systems, erasing, 10
exit-PSSession cmdlet, 258
exporting Start tile layout, 56–59
Export-StartLayout cmdlet, 56
F8 support, 283
failover to Windows RE, 294
fast startup, 292
FAT volumes, NTFS permissions inheritance, 132
feature updates, 316
File Explorer
file sharing, 137
folder sharing, 134
file management
NTFS permissions inheritance, 132
sharing files, 137
file recovery. See recovery
File Signature Verification, 303–304
Firewall and Network Protection page (Windows Defender Firewall), 162
firewalls. See Windows Defender Firewall
firmware upgrades, activation after, 36
first-run experience, joining devices, 114–115
folder management
NTFS permissions inheritance, 132
folder shares, configuring, 133–137
net share command, 134
network discovery, 133
Shared Folders snap-in, 133–134
SMB, 133
gestures, 47
Get-Acl cmdlet, 132
Get-BitLockerVolume cmdlet, 114, 177
Get-ChildItem cmdlet, 146
Get-ComputerRestorePoint cmdlet, 280
Get-Item cmdlet, 147
Get-LocalUser cmdlet, 107
Get-NetFirewallRule cmdlet, 169
Get-NetIPAddress cmdlet, 217, 219
Get-NetIPv4Protocol cmdlet, 217
Get-NetIPv6Protocol cmdlet, 219
Get-PnpDevice cmdlet, 311
Get-PnpDeviceProperty cmdlet, 311
Get-WmiObject cmdlet, 103
global IPv6 addresses, 218
GPO (Group Policy Objects). See Group Policy
GPResult command line tool, 155
creating/deleting groups, 109–110
special identity groups, 110
Group Policy
BitLocker, 175
BitLocker data recovery, 188–189
Dynamic Lock, 49
File History, 272
Internet Explorer, 86
Local Security Policy, 147–154
account lockout policy configuration, 148–149
audit policy configuration, 149–153
password policy configuration, 147–148
security options configuration, 153–154
user rights policy configuration, 153
Microsoft account restrictions, 41–42
Microsoft Edge kiosk mode, 76–77
Microsoft Edge settings, 76
network discovery, 133
notifications, 67
picture passwords, 49
Remote Assistance configuration, 249
Remote Desktop configuration, 255
connection issues, 154
GPResult command line tool, 155
RSoP tool, 155
UAC settings, 161
update validation/testing, 328
Windows Hello configuration, 47–48
Windows Update configuration, 322–328
grouping Start tiles, 55
hardware changes, activation after, 36
hardware requirements, Windows 10 editions, 5–8
hives (Windows Registry), 142
host names, 219
Hotspot 2.0 networks, 237
hotspots, configuring, 224
ICACLS, 132
IKEv2 (Internet Key Exchange, Version 2), 226
image-based installation, 13
indexing options, configuring, 344–345
inheritance, NTFS permissions, 132
in corporate environment, 16
with installation media, 17–19
steps in, 16
installation media
creating, 9
installing
Windows 10. See deploying Windows 10
Install.wim, 11
Internet Explorer
downloading, 83
Microsoft Edge Enterprise Mode, 81–83
Internet Key Exchange, Version 2 (IKEv2), 226
Invoke-command cmdlet, 258
IPv4
configuring connections, 215–217
public versus private addressing, 214–215
terminology, 212
IPv6
addresses, 218
configuring connections, 218–219
reasons for usage, 217
IPConfig, 232
IPsec, connection security rules, 166–184
IPv4
configuring connections, 215–217
public versus private addressing, 214–215
terminology, 212
IPv6
addresses, 218
configuring connections, 218–219
reasons for usage, 217
key protectors (BitLocker), 175
keys (Windows Registry), 144–145
kiosk mode, Microsoft Edge, 76–79
KMS (Key Management Service), 33
L2TP (Layer 2 Tunneling Protocol), 226
languages. See regional and language support, configuring
Last Known Good Configuration, 284
link-local addresses, 218
Link-Local Multicast Name Resolution, 220
LoadState.exe, command syntax, 24
Local Experience Packs, installing, 27–28
local group management, 107–110
creating/deleting groups, 109–110
special identity groups, 110
local registry, configuring, 141–147
Registry Editor, 146
Local Security Policy, configuring, 147–154
account lockout policies, 148–149
user rights policies, 153
local user account management, 102–107
with Computer Management, 103–105
configuring accounts, 102
with Windows PowerShell, 107
Lock Screen, configuring, 59–60
log files, 314
Lpksetup command line tool, 29–30
LTSB (Long-Term Servicing Branch)
Microsoft Edge, 80
updates, 318
MAK (Multiple Activation Key), 33
MCT (Media Creation Tool), 17
MFA (multi-factor authentication)
requirements, 8
device enrollment
in Microsoft 365 Business, 117–119
in Microsoft 365 Enterprise, 119–120
viewing/managing devices, 120–121
Microsoft 365 Business
subscription components, 117
Microsoft 365 Business Admin Center, 120–121
Microsoft 365 Enterprise, device enrollment, 119–120
Microsoft accounts
local account management, 102–107
with Computer Management, 103–105
configuring accounts, 102
with Windows PowerShell, 107
local group management, 107–110
creating/deleting groups, 109–110
special identity groups, 110
elevation prompt types, 160–161
Microsoft Edge, configuring, 70–83
Microsoft Management Console (MMC), 241
MigApp.xml, supported applications, 24
migrating
applications, 23
side-by-side migrations, 20–21
User State Migration Tool (USMT), 22–25
Windows customization settings, 19
wipe-and-load migrations, 21
Miracast, requirements, 6
MMC (Microsoft Management Console), 241, 250–251
mobile networking, configuring, 222–224
hotspots, 224
Mobile Plans app, 223
mobility settings, configuring, 87–97
power plans, 90
Ultimate Performance power plan, 90–91
modes (wireless networking), 234
event subscription configuration, 330–331
remote access, 331
indexing option configuration, 344–345
performance management, 331–341
Performance Monitor, 336
moving BitLocker-encrypted drives, 184–185
MS-CHAPv2 protocol, 227
multicast addresses, 218
multi-factor authentication (MFA)
requirements, 8
Multiple Activation Key (MAK), 33
name resolution
naming answer files, 14
net share command, 134
Network and Sharing Center, VPN configuration, 227–229
network discovery, configuring, 133
Network Reset, 232
Network Troubleshooter, 232
networking
hotspots, 224
steps in, 231
connections, 235
Hotspot 2.0 networks, 237
modes, 234
security, 235
standards, 234
New-Item cmdlet, 147
New-LocalUser cmdlet, 107
New-NetFirewallRule cmdlet, 164, 169
New-PSWorkflowSession cmdlet, 258
New-SmbShare cmdlet, 135
notification area, configuring, 68–69
notifications
service management, 314
NSLookup, 232
characteristics of NTFS, 121–122
combining with shared permissions, 139
inheritance, 132
resource ownership changes, 133
troubleshooting, 133
OEM activation, 32
offering assistance (Remote Assistance), 248–249
older hardware support, 305–306
OneDrive
requirements, 7
ownership of resources changes, 133
DISM command line tool, 312–314
downloading driver packages, 311–312
PAP protocol, 227
partitions, 291
passwords
complexity requirements, 147–148
Microsoft accounts, 40
picture passwords, configuring, 48–49
Pathping, 232
performance management, 331–341
Performance Monitor, 336
Performance Monitor, 336
permissions
characteristics of NTFS, 121–122
combining with shared permissions, 139
inheritance, 132
resource ownership changes, 133
troubleshooting, 133
combining with NTFS permissions, 139
folder share configuration, 133–137
personalization. See configuring; desktop customization
phone, activation by, 38
picture passwords, configuring, 48–49
Ping, 232
pinning Start tiles, 54
Plug and Play, older hardware support, 305–306
Point-to-Point Protocol (PPP), 225
Point-to-Point Tunneling Protocol (PPTP), 225–226
post-installation configuration
power plans, 90
Ultimate Performance power plan, 90–91
Dynamic Lock, 49
multi-factor authentication (MFA), 42–43
steps in, 39
power plans
configuring, 90
power settings, configuring, 88–89, 91–92
PowerShell. See Windows PowerShell
PPP (Point-to-Point Protocol), 225
PPTP (Point-to-Point Tunneling Protocol), 225–226
presentation settings, configuring, 95–97
private IPv4 addresses, 214–215
product keys, 31
protector keys, 46
public IPv4 addresses, 214–215
Public network location profile, 257
quality updates, 316
real-time monitoring, baseline performance versus, 336
recovery
BitLocker startup key, 185
BitLocker-encrypted data, 187–189, 272
Backup And Restore tool, 264–267
recovery drive creation, 277–278
system image backup creation, 287–290
system repair disk creation, 290–291
EFS-protected files, 172–173, 272
recovery drive, creating, 277–278
Recycle Bin for OneDrive, 274–275
recycling devices, 286
ReFS, 124
refurbished devices, activation, 36–37
regional and language support, configuring, 26–30
Local Experience Pack installation, 27–28
Lpksetup command line tool, 29–30
steps in, 26
registering devices to Azure AD, 111–112, 116
Registry. See Windows Registry
Registry Editor, 146
reinstalling Windows 10, activation after, 36
remote access to event logs, 331
Remote Assistance, 241
Remote Desktop, 241
with Group Policy, 255
creating/editing connections, 252–254
troubleshooting, 256
remote management, configuring, 240–259
MMC (Microsoft Management Console), 250–251
Remote Assistance, 244–245, 246–250
Remote Desktop, 245–246, 252–256
System Properties, 244
Windows Defender Firewall, 242–244
remote printers, 343
Remove-LocalUser cmdlet, 107
Rename-LocalUser cmdlet, 107
requesting assistance (Remote Assistance), 246–248
requirements, Windows 10 editions, 5–8
resource ownership changes, 133
restoration. See recovery
Resultant Set of Policy (RSoP) tool, 155
retail activation, 32
rolling back
updates, 328
RSoP (Resultant Set of Policy) tool, 155
Safe Mode, 314
ScanState.exe, command syntax, 24
scheduled tasks, modifying, 282
scheduling backups, 265–266, 288
SDHC (Secure Digital High-Capacity) memory cards, 278
Secure Boot, requirements, 7
Secure Socket Tunneling Protocol (SSTP), 226
security
EFS (Encrypting File System), 169–173
Local Security Policy configuration, 147–154
account lockout policies, 148–149
user rights policies, 153
elevation prompt types, 160–161
Windows Defender Firewall configuration, 162–169
advanced security options, 165–166
allowing apps through firewall, 164
connection security rules with IPsec, 166–184
filter types, 163
Firewall and Network Protection page, 162
monitoring firewall, 163
Windows Security, configuring, 156–157
wireless networking, 235
selecting
remote management tools, 241–242
32-bit versus 64-bit, 5
hardware/configuration requirements, 5–8
Server Message Block (SMB), 133
service management, 314–316, 346–350
Services management console snap-in, 346–347
servicing channel, selecting, 316–321
Set-Acl cmdlet, 132
Set-DNSClientServerAddress cmdlet, 221
Set-Item cmdlet, 147
Set-LocalUser cmdlet, 107
Set-Location cmdlet, 146
Set-NetFirewallRule cmdlet, 169
Set-NetIPAddress cmdlet, 217, 219
Set-NetIPv4Protocol cmdlet, 217
Set-NetIPv6Protocol cmdlet, 219
Settings app
local user account management, 106–107
uninstalling updates, 328
VPN configuration, 229
Shared Folders snap-in, 133–134
shared network folder installation, 13
combining with NTFS permissions, 139
folder share configuration, 133–137
configuring permissions, 137–140
net share command, 134
network discovery, 133
Shared Folders snap-in, 133–134
SMB, 133
side-by-side migrations, 20–21
signed device drivers, 307–308
sign-in options, configuring, 39–49
Dynamic Lock, 49
multi-factor authentication (MFA), 42–43
SIM cards for cellular data plans, 222–223
site-local addresses, 218
SMB (Server Message Block), 133
special identity groups, 110
SSTP (Secure Socket Tunneling Protocol), 226
standard users, UAC prompts, 158–159
standards, wireless networking, 234
tiles
grouping, 55
startup key (BitLocker), storage/recovery, 185
startup process
architecture components, 291–292
device driver management, 296–314
Startup Settings troubleshooting mode, 283–284
stop codes, 314
subnet masks, 212
Suspend-BitLocker cmdlet, 184
Sync Your Settings, requirements, 7
System Configuration, 294, 349–350
System Image Recovery, 288–290
system images, creating, 287–290
System Properties, remote management configuration, 244
system recovery. See recovery
system repair disks, creating, 290–291
Task Manager
performance management, 331–342
task schedule, modifying, 282
taskbar, configuring, 60–61, 67–68
test-connection cmdlet, 232
testing updates, 328
themes, configuring, 60
tiles (Quick Action), configuring, 63–65
tiles (Start)
grouping, 55
touch, requirements, 6
TPM (Trusted Platform Module), 174–175
Tracert, 232
troubleshooting
EFS (Encrypting File System), 173
connection issues, 154
GPResult command line tool, 155
RSoP tool, 155
steps in, 231
NTFS permissions, 133
performance management, 340–341
Remote Desktop connections, 256
architecture components, 291–292
device driver management, 296–314
updates, 328
UAC (User Account Control), configuring, 157–162
elevation prompt types, 160–161
Ultimate Performance power plan, configuring, 90–91
unicast addresses, 218
uninstalling
apps, 54
updates, 328
Universal Windows driver, 307
unsigned device drivers, 307–308
updates
checking for, 328
for device drivers, 298
rolling back, 328
servicing channel selection, 316–321
troubleshooting, 328
validating and testing, 328
Windows Update configuration, 321–328
upgrading BitLocker-enabled computers, 178–183
upgrading to Windows 10, in-place upgrades, 14–19
in corporate environment, 16
with installation media, 17–19
steps in, 16
USB installation, 12
User Account Control (UAC), configuring, 157–162
elevation prompt types, 160–161
user accounts. See accounts (Microsoft)
side-by-side migrations, 20–21
User State Migration Tool (USMT), 22–25
Windows customization settings, 19
wipe-and-load migrations, 21
user interface configuration. See desktop customization
user rights policies, configuring, 153
validating updates, 328
values (Windows Registry), 145
VAMT (Volume Activation Management Tool), 33
verifying device drivers, 303–304
viewing
devices in Microsoft 365, 120–121
remote event logs, 331
virtual machines, activation, 34
virtual private networks. See VPNs (virtual private networks)
Virtual Secure Mode, requirements, 8
Virtual Smart cards, requirements, 8
Volume Activation Management Tool (VAMT), 33
volume activation services, 33
VPN Reconnect, enabling, 237–238
VPNs (virtual private networks), 225–231
configuring
in Network and Sharing Center, 227–229
in Settings app, 229
WDS deployment, 13
web browsers. See Internet Explorer; Microsoft Edge, configuring
WEP (Wired Equivalent Privacy), 235
Wi-Fi Protected Access (WPA), 235
Windows 7 Home, upgrading from, 15
Windows 10 Business, 4
Windows 10 editions, selecting, 2–8
32-bit versus 64-bit, 5
hardware/configuration requirements, 5–8
“Windows 10 Enterprise: FAQ for IT Professionals”18
Windows 10 in S mode, 4
Windows 10 IoT (Internet of Things) editions, 4
Windows 10 Pro for Workstations, Ultimate Performance power plan, 90–91
Windows ADK (Assessment and Deployment Kit), 12, 22
Windows Boot Manager, 291
Windows Configuration Designer, 12
Windows customization settings, migrating, 19
Windows Defender Firewall
advanced security options, 165–166
allowing apps through firewall, 164
connection security rules with IPsec, 166–184
filter types, 163
Firewall and Network Protection page, 162
monitoring firewall, 163
remote management configuration, 242–244
Windows Defender Security Center. See Windows Security, configuring
Windows Hello
requirements, 8
Windows Insider Program, 318
Windows Management Instrumentation (WMI), 328
Windows Mobility Center, 95–97
Windows Network Diagnostics, 232
Windows OS Loader, 291
Windows PE, 14
Windows PowerShell
BitLocker configuration, 177–180
firewall configuration, 164, 168–169
IPv4 connection configuration, 217
IPv6 connection configuration, 219
local registry configuration, 146–147
local user account management, 107
networking troubleshooting, 232
Plug and Play driver package management, 311
remote management, 241, 256–259
System Restore configuration, 279–280
Windows RE (Recovery Environment)
failover to, 294
recovery with WBAdmin, 269
service management, 314
startup recovery, 293
System Image Recovery, 288–290
System Restore within, 282
Registry Editor, 146
Windows Resume Loader, 291
Windows Secure Boot, 291
Windows Security, configuring, 156–157
Windows SIM (System Image Manager), 14
Windows Update, configuring, 321–328
Windows Update Stand-Alone Installer (Wusa.exe), 328
Windows.old folder, 25
wipe-and-load migrations, 21
Wired Equivalent Privacy (WEP), 235
wireless networking, configuring, 234–240
connections, 235
Hotspot 2.0 networks, 237
modes, 234
security, 235
standards, 234
WMI (Windows Management Instrumentation), 328
WPA (Wi-Fi Protected Access), 235
WPA2, 235
Wusa.exe (Windows Update Stand-Alone Installer), 328
3.145.20.193