You are on page 1of 102

Windows New Hire Training

Windows Basics

Lesson: Applications

© 2011 Microsoft Corporation. All rights reserved.
Microsoft Confidential - For Internal and Partner Use Only
This training package content is proprietary and confidential, and is intended only for
users described in the training materials. This content and information is provided to
you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing
all or any portion of the content and/or information included in this package is strictly
prohibited. Some elements of this document are subject to change. This document is
for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR
IMPLIED, IN THIS SUMMARY. Microsoft is a registered trademark of Microsoft Corporation
in the United States and/or other countries. Other product and company names
mentioned herein may be the trademarks of their respective owners.
02/2011

Microsoft Confidential - For Internal and Partner Use Only

2

Lesson: Applications

Overview
This module provides a broad set of topics to familiarize you with Windows. Topics
include PC hardware basics, Windows versions and features, installing Windows,
updating the OS, steps in the startup process, adding devices, maintaining Windows and
solving simple problems.
Together, these topics form a foundation knowledge set for an intermediate user of
Windows.

Goals
At the end of this module, you should be able to:

Discuss Windows versions and editions.

Discuss Windows 7 startup terms and concepts

Discuss the purpose of key Windows 7 configuration interfaces

List some principal disk and file management tools

Demonstrate methods for freeing disk space on a consumer computer

Discuss concepts and tasks associated with Windows security and maintenance

Identify key hardware components and device management concepts

Demonstrate steps used to verify Internet connectivity on Windows 7.

Expected Time for this Module
This module takes approximately 6 hours to complete.
Labs in this module take an additional 5.25 hours to complete.
The assessment for this module takes an additional 30 minutes to complete.

Lesson: PC Basics
This lesson introduces you to PC hardware and Windows.

Microsoft Confidential - For Internal and Partner Use Only

3

Lesson: Applications

Goals
At the end of this lesson, you should be able to:

Discuss PC hardware and software concepts.

Discuss the Windows versions and editions currently available, and currently
supported by Microsoft.

Expected Time for this Lesson
This lesson takes approximately 2.5 hours to complete.
Labs in this lesson take an additional 2 hours to complete.

Microsoft Confidential - For Internal and Partner Use Only

4

Lesson: Applications

Computer Basics
This topic explores elements of the PC – hardware and software.

Hardware Basics
It is expected that you are familiar with computers, including the following PC hardware
concepts:

Desktop versus Mobile PC

Computer parts, such as hard disks, input devices, monitor, printer, etc.

Review the following pages for basics if you could use a refresher in any areas:

http://windows.microsoft.com/en-US/windows7/Introduction-to-computers

http://windows.microsoft.com/en-US/windows7/Parts-of-a-computer

Virtualization
Some customers use virtualization software to run their copy of Windows. Virtualization
software provides the ability to run multiple operating systems on the same physical PC.
It accomplishes this by creating a virtual instance of all of the hardware necessary to run
an operating system, from a virtual CPU to a virtual hard disk. By running an operating
system in a virtualized environment, you can run as many operating systems as you
need to without requiring any additional PCs.
Using virtualization you can simultaneously run a copy of Windows XP and Windows
Vista on top of a copy of Windows 7, all at the same time. Some users of Mac OSX also
use virtualization to run Windows on top of OSX.
The PC that hosts the virtualized operating systems is referred to as the host PC. Each
virtualized operating system instance is referred to as a guest. There is only one host,
which is the OS instance running on the physical PC, but there can be multiple guests
running simultaneously. Each operating system will have it’s own data, settings, and
applications.
Each guest operating system will be presented to the user as a separate window. Some
virtualization software is also capable of displaying any applications running in the guest
OS as if they were running on the host desktop directly. In the case of Windows Virtual
PC, this feature is called seamless mode.

Examples of Virtualization Software
There are many different virtualization programs available. Microsoft makes the
following virtualization solutions:

Windows Virtual PC: This desktop virtualization software is considered to be a
feature of Windows 7, although it is available as a separate download for users of

Microsoft Confidential - For Internal and Partner Use Only

5

Lesson: Applications
Windows 7 Home Basic and above. This version of Windows Virtual PC is only
supported on Windows 7 and will not install on Windows XP or Windows Vista.
o

Microsoft also provides a solution called Windows XP Mode that is a
virtualized copy of Windows XP that is provided for users of Windows 7 to
run older software that is incompatible with Windows 7. Windows XP Mode
runs on top of Windows Virtual PC and is provided for free for users of
Windows 7 Professional, Ultimate, and Enterprise PCs.

Virtual PC 2007: This desktop virtualization software is a free download from
the Microsoft Download Center and is the version that was released prior to
Windows Virtual PC. Virtual PC 2007 will install on Windows XP, Windows Vista,
and Windows 7.

Hyper-V: This server virtualization software is part of Microsoft’s Windows Server
operating system family, and integrates.

Of these three solutions, only Windows Virtual PC (and Windows XP Mode) is support by
Microsoft Consumer support.
Other examples of other virtualization solutions that you might encounter while working
with customers are listed below:

VMWare Workstation or VMWare Player (Windows)

Parallels Workstation (Windows)

Oracle VirtualBox (Windows and OSX)

VMware Fusion (OSX)

Parallels Desktop (OSX)

The use of virtualization software is a common way for Mac OSX users to install and run
Windows applications. Another option you may hear about for OSX users is called Boot
Camp. Boot Camp should not be confused with virtualization solutions however.
BootCamp is simply software that enables Windows to be installed on Apple hardware.
Windows installed using Boot Camp runs natively on Apple hardware, allowing the user
to dual boot between Windows and OSX. Both operating systems are not running at the
same time. The primary difference between Windows on a standard PC and Windows on
a Mac using Boot Camp is that the setup process is started from a wizard in OSX instead
of just simply booting from a Windows DVD. Once installed though, the experience of
use Windows is almost exactly the same.

Software Basics
In addition to the hardware discussed above, you need software to make a PC useful.
Software on your PC falls into the following categories:

BIOS/Firmware: The basic input/output system (BIOS) is low-level software that
runs on your computer, enabling you to start an operating system. This is built
into the computer, in the form of a read-only memory (ROM) chip on the

Microsoft Confidential - For Internal and Partner Use Only

6

to show images on-screen. or play a movie. to receive your instructions via the keyboard and mouse. backup software). hardware or utilities that are used with Windows. but they can have other file extensions.  Utility Software: This is another category of software. Software Components Just like your computer. utility software does not typically help you perform a final output task. the device that ties your CPU to all the other hardware in the computer.INI) or the Windows registry – a database containing settings for Windows. Antivirus programs are an example of utility software. and writes configuration information to the registry. Example: Comctl32. This could be a task like writing a letter. Microsoft Confidential . programs and users on the system. to connect you to the Internet to send and receive information. which could be considered a subset of application software. The focus of this course is on the Windows Operating System. most software consists of several components. storage. either to help protect your data (security software. but many do.  Configuration: The configuration for a program can be saved in text files (. Windows is an operating system.For Internal and Partner Use Only 7 .DLL files for its own use.  Library File: These are support files.DLL” files. you will find that knowledge of Windows basics is required when troubleshooting applications.DLL files.  Program Executable: This is the file that you activate to start a program. which allow the executable to be smaller. On Windows it often has a name ending in “. Windows includes a set of . On Windows these are typically “. input. and in the form of shared services for programs written for Windows. or enhance some function an operating system or application. This includes services like graphics. performing math calculations. The program uses routines in library files as needed. Utility software typically performs a service for you. Not all programs have all of these types of components. Many programs use a “registration” process to set up their basic configuration. editing a home movie.  Application: An application is a program that enables you to perform a task. and networking. Many devices have their own embedded software – similar to BIOS for the entire system. Example: Notepad. and it is built into the hardware.  Operating System (OS): This is the software that manages connections to the hardware. Microsoft Word and Windows Live Mail are examples of applications. Unlike application software. Even if you will be supporting something other than Windows. This process reads the information from one or more . and provides common program elements needed for applications to work.EXE” – a filename extension that represents an executable in Windows.dll.Lesson: Applications mainboard/motherboard. Instead it is designed to help your applications to run better or more safely.exe. This device-specific software is called firmware.

64-bit Windows can run most 32-bit programs. driver or other component. music. etc. It is the reason you use a program – to give you output data of some kind. movies. banking data. Recent Windows versions come in both 32-bit and 64-bit versions. supporting large memory PCs. Drivers are generally only supported in one architecture – so a device with only 32-bit drivers would not be usable on a 64-bit version of Windows. In the case of PCs. and applications that require large blocks of memory to perform well.For Internal and Partner Use Only 8 . application. This term refers to the number of bits used to store a value or an address.Lesson: Applications  Data: This is the output of a program. 32-bit Windows cannot run 64-bit programs. Microsoft Confidential . 64-bit processors can address a larger amount of memory than 32-bit processors. This might be pictures. Architecture or Bitness One key consideration for software and compatibility is the bitness of an operating system. the bitness describes the architecture of the CPU. documents.

consolidate features Upgrades were supported from Windows XP only. This was the last solely business-oriented client Windows version built on the Windows Microsoft Confidential . with key usability and consumer feature improvements. These are covered in the Windows Editions section below. This was the update to Windows XP. There were several later releases of Windows XP editions. or from Windows 2000. This was an update of Windows 2000. which was from the MS-DOS® and Windows 95 legacy. Table 1: Windows Versions Version Windows® 7 Release Date October 2009 Windows Vista® January 2007 Windows ® XP December 2001 Windows® Me September 2000 Windows® 2000 February 2000 Notes This release was focused on simplifying the Windows user experience. limited release of a 64-bit Windows XP OS. Windows XP was released as the new Consumer and Business version of Windows. This ranged from easier feature usage and configuration to a more robust core. There was a later.For Internal and Partner Use Only 9 . such as Media Center Edition. and others. Tablet PC Edition. This was the last of the consumer Windows versions built on the older codebase. Upgrades are supported from Windows Vista only. Upgrades were supported from Windows 98 or later.Lesson: Applications Windows Versions The recent history of Windows releases is shown in the table below. As a result it is not compatible with Windows XP updates and service packs. Shipped in 32-bit versions only. which was to provide improvements in usability. but it was based on a Windows Server 2003 core. Shipped in 64-bit and 32-bit variants of most editions. which would provide more stability and better performance than Windows Vista. Shipped in 64-bit and 32-bit variants of most editions.

com/en-US/windows/products/lifecycle Microsoft Confidential . This support expires according to a published lifecycle.For Internal and Partner Use Only 10 .Lesson: Applications NT codebase. More information on this lifecycle.microsoft. and support expiration dates for various Windows versions is available here: http://windows. Support Lifecycle Microsoft provides warranty and paid support for each Windows version within a certain time period.

Editions for recent Windows versions are discussed in the pages that follow. If you have more specialized needs. Figure 1: Windows 7 Editions Microsoft Confidential . four other editions are available.For Internal and Partner Use Only 11 . This makes it easier for customers and partners to choose the right version of Windows 7 for their needs. The full set of six main editions is shown in the image below. you will find a set of editions. There is one main consumer edition. When you purchase a Windows license. Windows 7 Editions and Features Microsoft provides several different editions of Windows 7 to meet a variety of customer needs. and one main business edition.Lesson: Applications Windows Editions Within each Windows versions. you are deciding on a set of features and capabilities included in the edition you select.

Windows 7 Ultimate has the same features as the Enterprise Edition but is licensed differently. Professional is the business-focused edition for small and lower mid-market companies and users who have Microsoft Confidential . Figure 2: Windows 7 Editions – Feature Set Relationship Upgrading from a lower to a higher edition is easy with Windows Anytime Upgrade (WAU).For Internal and Partner Use Only 12 . Customers can buy Ultimate preinstalled from OEMs or as a retail upgrade. The upgrade is typically done in less than 15 minutes. Enterprise ships in both 32-bit and 64-bit versions. Ultimate ships in both 32-bit and 64-bit versions. Ultimate is the no-compromise edition for those who want all Windows features. and then enter it in the WAU interface in Windows 7. advanced data protection. All you need to do is purchase a product key for the edition you want. It is designed for large enterprises and organizations with complex desktop infrastructures. This version of Windows is offered exclusively through Microsoft Software Assurance agreement. Table 2: Windows 7 Editions Windows® 7 Enterprise Windows® 7 Ultimate Windows ® 7 Professional Enterprise is the business-focused edition for managed environments.Lesson: Applications All Windows 7 editions are a super set of the one below with no trade off on features when you upgrade from one version to the next. including business. networking and security needs.

among other features.Lesson: Applications networking. This version of Windows is offered Worldwide through OEM only. and security needs and multiple PCs or servers. backup. there are other options available to meet the needs of users in some other regions. These editions lack built-in multimedia functionality and Internet Explorer is not included. Home Basic is meant for accessing the internet and running basic productivity applications. Home Premium ships in both 32-bit and 64-bit versions. It has the fewest features of the Windows 7 editions. Home Basic ships in both 32-bit and 64-bit versions.For Internal and Partner Use Only 13 . Home Premium is the standard consumer edition. Windows® 7 Home Premium Windows® 7 Home Basic Windows® 7 Starter Professional ships in both 32-bit and 64-bit versions. This version of Windows is offered through both OEM and retail as well as through volume licensing agreements. providing full functionality on the latest hardware and easy ways to connect. Home Premium features advanced graphics effects. However. Other Editions In addition to the six main editions. This version of Windows is offered through both OEM and retail channels. and Media Center. Starter ships in a 32-bit version only. Starter Editions of those OSs were available exclusively in emerging markets. It offers a basic Windows interface and feature list. Microsoft Confidential . support for touch-screen interfaces. This edition of Windows 7 is aimed at beginning computer users. Home Basic is a simple version of Windows 7. This version of Windows is offered through OEM and retail channels in emerging markets only. while Windows 7 Starter Edition will be available to OEMs worldwide. Korea and European Union Windows 7 editions are listed below: European Union (N) Editions labeled with an N represent editions available in the European Union. Windows XP and Vista also had Starter Editions with significant limitations.

For Internal and Partner Use Only 14 . This SKU is different than the KN SKU in that it does not lack any of the functionality available in other versions of Windows. so that consumers are provided with an additional choice. This release is available in these editions:  Windows® 7 Professional N  Windows® 7 Starter N These editions are available alongside non-N editions. but it does include some slight differences such as an additional shortcut has been added on the desktop. Removed functionality can be installed using the restore pack(s) available for PC manufacturers and consumers. South Korea (KN) The editions labeled with a KN represent the editions available in Korea that lack multimedia functionality and related technologies and features included in other versions of Windows 7. This release is available in these editions:  Windows® 7 Enterprise K  Windows® 7 Ultimate K  Windows® 7 Professional K  Windows® 7 Home Premium K  Windows® 7 Starter K Microsoft Confidential . This release is available in these editions:  Windows® 7 Enterprise KN  Windows® 7 Ultimate KN  Windows® 7 Professional KN  Windows® 7 Home Premium KN  Windows® 7 Starter KN South Korea (K) The editions labeled with a K are also available in Korea.Lesson: Applications Removed functionality can be installed using the restore pack(s) available for PC manufacturers and consumers.

including Play To Bluetooth support √ Fax & Scan √ Basic “inbox” √ games Credential √ Manager Improved √ Windows® Taskbar & Jump Lists Live Thumbnail Previews from Taskbar Fast User Switching Create ad-hoc wireless networks Internet Connection Sharing Multi-monitor √ √ √ Windows® 7 Enterprise / Windows® 7 Ultimate √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ Microsoft Confidential .Lesson: Applications Summary of Major Features by Edition Table 3: Windows 7 Features by Edition Feature Windows® Windows Windows Windows 7 Starter ® 7 Home ® 7 Home ® 7 Basic (EM Premium Profession only) al Improved √ Windows® Taskbar & Jump Lists Windows® √ Search Join a HomeGroup√ Windows Media® √ Player Back-up & √ Restore Enhanced Media √ Playback Action Center √ Device Stage™ √ Enhanced home √ media streaming.For Internal and Partner Use Only 15 .

Windows Journal Windows Slideshow (auxiliary display) Location Aware Printing Domain Join & Group Policy Controls Remote Desktop Host Advanced Backup (Network & Group Policy) Encrypting File System Windows Mobility Center. Offline Folders BitLocker & BitLocker To Go √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ Microsoft Confidential . Sticky Notes. Presentation Mode.For Internal and Partner Use Only 16 .Lesson: Applications support Windows Mobility Center (w/o presentation settings) * Aero® Glass & advanced Window navigation Aero® Background Windows® Touch (Multi-touch and handwriting support) Create a HomeGroup Windows Media Center DVD Video playback and authoring Premium "inbox" games Snipping Tool.

Lesson: Applications AppLocker DirectAccess BranchCache MUI Language Packs Enterprise Search Scopes VDI Enhancements Boot from VHD Microsoft Confidential .For Internal and Partner Use Only √ √ √ √ √ √ √ 17 .

Figure 3: Recommending a Windows 7 Architecture For more information about 32-bit and 64-bit Windows. consider asking the following questions and recommending the solution listed.Lesson: Applications Recommending a Windows 7 Edition to Customers If a customer asks you what Windows 7 edition you would recommend. Microsoft Confidential .For Internal and Partner Use Only 18 . refer to the FAQ located here.

Lesson: Applications Figure 4: Recommending a Windows 7 Edition Microsoft Confidential .For Internal and Partner Use Only 19 .

such as Media Center. It includes all of the network and security features in Windows Vista. Provides an enhanced home networking and media experience. Includes these editions. This is the edition for enterprise commercial customers. The only exception to this was the upgrade from Business to Ultimate. Includes these editions. which was supported.For Internal and Partner Use Only 20 . from Home Premium to Ultimate) but not across branches. It is not available at retail stores. like the new Aero user interface enhancements with transparency. This is only available for volume license customers. Also supports volume licensing capability for deploying multiple PCs in a work environment. This is the merger of the Commercial and Consumer branches of the product tree. Business was the basic commercial edition of Windows Vista. from most to fewest features: o Enterprise o Business You could upgrade within a branch (e. but supports usage Microsoft Confidential . along with Vista Premium capabilities. from most to fewest features: o Ultimate o Home Premium o Home Basic o Starter Commercial: Provides security and networking features focused at commercial use. purchasing Windows licenses from a reseller. Table 4: Windows Vista Editions Edition Windows Vista Ultimate Windows Vista Home Premium Windows Vista Home Basic Windows Vista Starter Windows Vista Enterprise Windows Vista Business Notes Contains all features of Windows Vista.g. This was the globally-available basic home user edition.Lesson: Applications Windows Vista Editions Windows Vista shipped editions in two edition branches:   Consumer: Provides features focused at consumers. Starter was available in limited markets on low-cost PCs. It lacked many of the consumer-centric features of Windows Vista. This edition included several restrictions on customization and applications to ensure performance and provide differentiation between Starter and Home Basic.

Microsoft Confidential .Lesson: Applications on a tablet form factor PC. on new PCs and in a volume license version. Windows Vista editions Home Basic or Business and higher could be installed in either 32-bit or 64-bit versions. It is available for retail purchase.For Internal and Partner Use Only 21 . and domain membership.

OEM and volume license forms. Also purchased by many home users who were interested in the specific features included in this edition. This was the edition targeted at commercial and advanced home use.Lesson: Applications Windows XP Editions Windows XP originally shipped with the following two editions:  Professional: This is the business oriented edition.For Internal and Partner Use Only 22 . such as domain join. This is the primary edition of Windows XP for home use. to be used as a home theater PC. Table 5: Windows XP Editions Edition Windows XP Professional Windows XP Home Edition Windows XP Media Center Edition Notes Commercial use version of Windows XP. encrypting file system. This makes Microsoft Confidential . The focus was on home PCs. This was available primarily on a new PC with a TV tuner card. This edition was released after Windows XP. Later releases updated these capabilities: Windows XP Tablet PC Edition Windows XP Starter Edition Windows XP Professional x64 Edition  Media Center Edition 2004  Media Center Edition 2005  Media Center Edition 2005 Update Rollup 2 This later edition was designed for use on a PC in a tablet form factor. networking and domain membership features. It lacked the more advanced security features of Professional.  Home Edition: This is the basic home use version of Windows XP. with a stylus for input. and others. It provided an interface for use with a television and remote control. with full security. This later edition of Windows XP was released to provide a lower-cost Windows license for PCs in some markets. such as “ink” support – writing with the pen as input – and handwriting recognition. It includes features for pen input. Later releases increased the set of Editions in the Windows XP family. This was a release of Windows XP Professional with the ability to run in native 64-bit mode on the new x64 (also known as amd64) architecture. This is the only edition built on the Windows Server 2003 code base – the server version in the same Windows generation as Windows XP. Professional was available in retail.

For Internal and Partner Use Only 23 . With FlexGo. The model was much like a prepaid or contract subsidized mobile phone. or through prepaid cards that would unlike usage time. Microsoft Confidential . and pay overtime via a periodic subscription charges. you could purchase a new PC at a low cost.Lesson: Applications Windows XP Home Edition for Prepaid Windows XP Home Edition for Subscription service packs for Windows XP incompatible with Windows XP x64 Edition. These variations of Windows XP Home Edition were designed with Microsoft FlexGo technology. Special service packs are required. These PCs were sold in some markets where up-front cost was seen as a barrier to PC ownership.

you will install Windows on your classroom PC. Follow the steps to install Windows XP to the first partition on your classroom computer. Resolve any setup issues encountered with the help of the instructor and peers in your class. Start your PC using the Windows XP CD-ROM. 2. 1. Exercise: Install Windows 7 1. a. Discuss issues encountered as a group. d. Exercise: Install Windows XP If you will be supporting Windows XP. following guidance from your instructor. Requirements To perform this lab you will need the following:  A PC that meets the hardware requirements for Windows 7.  Windows installation media. based on the guidance provided by your instructor. Expected Time for this Lab This lab takes 60-120 minutes to complete.For Internal and Partner Use Only 24 . Near the end of Setup. b. ii. Install Windows 7 on your classroom computer using guidance from your instructor. enter the username “Student” when prompted. Remain disconnected from the network until you have enabled the Firewall (Internet Connection Firewall). complete the steps below. if you are using Windows XP SP1 or earlier media you should disconnect your PC from the network to protect against malware infection during and after setup. During setup. Follow your instructor’s guidance for entering a computer name. c. Select the Exercises most appropriate for your support scope. 3.Lesson: Applications Lab: Installing Windows In this lab. Microsoft Confidential . While installing. depending on the exercises selected. i. create a 20 GB partition for Windows. a. Install Windows XP to this partition. Boot the computer using the Windows 7 DVD.

e. Start installing Windows 7 as a Custom installation. Select an “Unallocated space” entry in the drives list that has at least 40 GB free space. iii. 3. Microsoft Confidential . Resolve any questions or issues encountered with the help of the instructor and peers in your class. c. Proceed with the installation to this new partition. Follow your instructor’s guidance for entering a computer name.Lesson: Applications b. Discuss issues encountered as a group. create a new 40 GB partition for Windows 7 using these steps: i. iv. Click New. When you reach the step asking where you want to install. Near the end of Setup. Enter the new partition size as 40960 MB. enter the username “Student” when prompted. 2.For Internal and Partner Use Only 25 . Click Drive options (advanced) ii. v. d.

Figure 5: Windows Desktop Some of the important concepts for using Windows Explorer are:  Start Menu and Taskbar  Desktop  Common Windows folder locations o Program Files o Windows o Users or Documents and Settings folder  Shortcuts  Copy. folder windows. Cut and Paste Microsoft Confidential .For Internal and Partner Use Only 26 . taskbar and other elements onscreen.Lesson: Applications Windows Explorer The interface (shell) you use to interact with Windows is called Windows Explorer. Start Menu. This provides the desktop area.

The search index for your files is exposed into categorized Library folders for ease of access.Lesson: Applications  Copy. To run any installed program or open a Windows interface.For Internal and Partner Use Only 27 . The Start Menu provides a search field. This is also provided via Search. These Libraries are displayed in Windows Explorer in the left pane. as shown below. Microsoft Confidential . Demo: Starting Programs with Search Open a few Windows interfaces with search:  Notepad  Troubleshooting  On-Screen Keyboard Libraries Windows 7 presents data files to you in the form of Libraries. search for it in this search field. Move and Delete  Hide File Extensions  Hidden Files Search The main method for finding and starting programs in Windows 7 is via search.

to include your own folder locations in the library scope.For Internal and Partner Use Only 28 .Lesson: Applications Figure 6: Libraries in Windows Explorer Each library shows a certain type of file – documents. music. Microsoft Confidential . You can add additional folder paths if you want. pictures or video files – in multiple locations.

For Internal and Partner Use Only 29 . This is a special folder that provides access to configuration interfaces for Windows and installed programs.Lesson: Applications Control Panel The interface for configuring and maintaining Windows is called the Control Panel. Figure 7: Control Panel Key Control Panel interfaces include:  System Properties  Device Manager  Programs and Features  Problem Reports and Solutions  Windows Update  Security Center  User Accounts  Network and Sharing Center Microsoft Confidential .

View installed software b. Security Center . Main view . Problem Reports and Solutions a.Windows version.Lesson: Applications Demo: Control Panel Open each of the following Control Panel interfaces and discuss key functionality provided by each: 1. Programs and Features a. Looking at the list of users b. View the problem history by date and product 5. Diagnose connection issues Microsoft Confidential . Windows Update . Check for and review solutions b. User Accounts a. Review User Profile List in Advanced System Settings 2. change and remove software 4.For Internal and Partner Use Only 30 . Creating a new administrator user 8. View device list b. Repair. Network and Sharing Center a. System Protection Settings c. Remove problem devices c. Activation/Genuine status b. computer name. Check connection status b. Check for hardware changes 3.Status of PC security essentials 7.Checking for and installing updates 6. System Properties a. Device Manager a.

com. software.Lesson: Applications Windows Updates and Service Packs Windows exists in a changing PC landscape – new hardware.For Internal and Partner Use Only 31 . and occasionally new functionality. Figure 8: Windows Update Note: On older versions of Windows.microsoft. language. and previously installed updates. Microsoft makes updates available to currently supported Windows versions. to stay current in this changing ecosystem. as shown in the Microsoft Lifecycle. we would say that you are running “Windows 7 SP1”. Microsoft releases updates for Windows and other products. So for Windows 7 with Service Pack 1 installed. You can use this URL to update a Windows XP PC. user scenarios and security threads arise each day. As new issues are found and resolved. A service pack (SP) is a special update. Microsoft Confidential . Windows Update is provided as a web site – http://update. When you have a certain service pack. You should have the latest Windows service pack installed whenever possible. such as Windows XP and earlier. This service evaluates available updates to provide you with a list of updates to install. The primary method for consumers to obtain these updates is Windows Update. Windows Update is shown below. this helps identify the state of your PC. which collects together previously released updates. based on your Windows version.

Lesson: Applications Service packs can either be downloaded like other updates. You can install on one PC via Windows Update.microsoft. For additional information on updates and changes in Windows 7 SP1. It also helps ensure that new PCs do not need to install large numbers of updates after purchase. SP2 is the latest available Windows Vista Service Pack.com/en-us/library/ff817622(WS.10).aspx Windows Vista Service Packs At the time of the writing.10).microsoft. See: http://technet.com/en-us/library/ff817622(WS. There are only modest new changes introduced in Windows 7 SP1 that could impact Consumer Support. or you may be able to order Service Pack Update media from Microsoft to update your Windows PC with the service pack. or download a full installation package to update several PCs. Installation media for the latest Windows version is typically updated to include the latest service pack. Table 6: Windows 7 Service Packs Service Pack Windows 7 SP1 Description Provides the following for consumers:  Previously released updates  Minor issues are resolved The service pack includes more significant changes for Windows Server 2008 R2. Windows 7 Service Packs Windows 7 service packs can be installed as an update to Windows. and enterprise environments.For Internal and Partner Use Only 32 . here: http://technet. which is linked from the TechNet page on SP1. This means that you do not need to install the service pack after performing a clean installation from that media. see the Notable Changes document. You should have the latest Windows service pack installed whenever possible.aspx Windows 7 Service Pack 1 Most of the impact of Windows 7 SP1 comes from the collection of previously released updates. Table 7: Windows Vista Service Packs Service Pack Description Microsoft Confidential .

Includes:  Previously released updates  Multimedia performance improvements  Windows Search 4. compatibility.11n Wireless Networking. It contains previously released updates as well as enhancements in reliability. and support for new technology standards. Windows Vista Service Pack 1 Windows Vista Service SP1 contains previously released updates as well as enhancements in reliability. 802.  New low-level interfaces for antivirus software vendors.For Internal and Partner Use Only 33 . Requires SP1 to be installed in order to install this update. performance.0  Other improvements. and others. The recommended (and easiest) way to get SP1 is to turn on automatic updating in Windows Update in Control Panel.com/windows/windows-vista/quick-start/sp1. SP3 is the latest available Windows XP Service Pack. compatibility. Windows XP Service Packs At the time of the writing. performance. For more information about Windows Vista SP1. New computers purchased after the release of a Windows Service Pack will typically be shipped with the service pack already installed.Lesson: Applications Windows Vista SP1 Windows Vista SP2 Includes:  Previously released updates  Performance improvements  Support for new Hardware technologies: exFAT.aspx Windows Vista Service Pack 2 Windows Vista Service Pack 1 (SP1) is available at no charge for all users running a genuine version of Windows Vista.microsoft. Table 8: Windows Vista Service Packs Service Pack Windows XP Description Includes: Microsoft Confidential . You can also manually download SP1 from the Microsoft Download Center. and wait for Windows Vista to notify you that SP1 is ready to install. and support for new technology standards. consult the SP home page at http://www.

Goals At the end of this lesson. WPA encryption for wireless networks More information on this service pack is provided below.  Review information available on Windows and home user security. This includes protecting your computer from threats on the Internet.  Windows XP SP2 Windows XP SP3 Support for new hardware technologies: USB 2. Microsoft Confidential .0. larger hard drives This was a major update. you should be able to:  Demonstrate how to check Windows health using Action Center or Security Center.For Internal and Partner Use Only 34 . Lesson: Windows Health and Security This lesson discusses the considerations needed to maintain a safe computing environment.  Feature and technology support additions. with a focus on security improvements and new security capabilities:  Previously released updates. and securing your data against unwanted access.  Windows Security Center. which shows whether you have certain basic security recommendations implemented to help protect your PC from malware.  Discuss recommended PC Safety best practices.  Improved firewall. Includes:  Previously released updates.Lesson: Applications  SP1 Previously released updates. based on improvements in Windows Vista Demo: Update Windows Demonstrate the use of Windows Update to install a few critical updates on Windows 7 and Windows XP.  Support for new hardware technologies: Bluetooth. enabled by default.

Labs in this module take an additional 45 minutes to complete.For Internal and Partner Use Only 35 . Microsoft Confidential .Lesson: Applications Expected Time for this Lesson This module takes approximately 30 minutes to complete.

Make sure your firewall is always turned on. Use Updated Antivirus Software Viruses and spyware are two kinds of usually malicious software that you need to protect your computer against. Protect your Computer What does it mean to protect your PC? See this page: http://www.Lesson: Applications System Health It is important to maintain the health of your PC. This means keeping the hardware and software running properly. or even steal your passwords or credit card numbers. you may find that data files could be damaged or missing.com/en-US/windows7/Security-checklist-for-Windows-7 Keep your Firewall Turned On A firewall helps protect your computer from hackers who might try to delete information. or malware could cause private information to be stolen. on the second Tuesday of the month. Use Updated Antispyware Technology You need antispyware technology to help prevent spyware. Microsoft provides Windows Defender to provide this capability. crash your computer. Microsoft provides new updates. protecting against bad software (malware). as necessary. Microsoft provides Microsoft Security Essentials as a no-additional-cost antivirus solution for licensed Windows users. It is included in Windows Vista and later. Another site with useful information is the Windows Help page on Security: http://windows.microsoft. They offer the latest protection against malicious online activities. and you need to keep it regularly updated. You need antivirus technology to help prevent viruses. If you do not maintain PC health. Microsoft Confidential .mspx This site is a key resource for our home users. and protecting the integrity of your data.microsoft. and you need to keep it regularly updated. The guidance here is intended to provide basic recommendations on how to protect your Windows computers.For Internal and Partner Use Only 36 . Keep your Operating System Up to Date High priority updates are critical to the security and reliability of your computer. There are also other choices available from third parties.com/protect/computer/default.

Social Engineering Beyond the basics above. credit card company. This information is then usually used for identity theft. such as a bank. Here are some specifics on identifying Phishing schemes: http://www.microsoft. In the e-mail message. Examples of these actions could be divulging sensitive information. such as an account number or password. These are the Windows interfaces that show your status on these key PC protection considerations. or reputable online merchant. Action Center is the Control Panel interface in Windows 7 which provides a single location for Windows notifications and alerts.mspx And some steps to avoid falling victim to some email-based phishing schemes: http://www.mspx Action Center Windows provides several methods to help you protect against PC problems. you should also be aware of Social Engineering. or voluntarily installing malicious software.com/protect/yourself/phishing/prevent. You can quickly see whether there are any new messages in Action Center by hovering your mouse over the Action Center icon in the notification area on the taskbar. Phishing Online phishing (pronounced like the word fishing) is a way to trick computer users into revealing personal or financial information through a fraudulent e-mail message or website.Lesson: Applications How to Check? Use Action Center on Windows 7 or Windows Security Center on Windows Vista. recipients are directed to a fraudulent website where they are asked to provide personal information. Microsoft Confidential .For Internal and Partner Use Only 37 .com/protect/yourself/phishing/identify. The first and most important of these is the Action Center. A common online phishing scam starts with an e-mail message that looks like an official notice from a trusted source. This is the term used to describe attempts by malicious people to manipulate you into performing an action that is against your best interests.microsoft. You are less likely to be a target of malicious software if you are cautious while using the Internet.

Lesson: Applications Figure 9: Action Center Status Click the icon to view more detail. shown below. Microsoft Confidential . Figure 10: Action Center Status Detail You can click a message or open Action Center to view the full message and steps to help you resolve the issue.For Internal and Partner Use Only 38 .

Action Center will show a message. click the heading or the arrow next to the heading to expand or collapse the section.For Internal and Partner Use Only 39 . The Action Center settings interface is where you can select which types of messages you don’t want to receive:  Security messages: o Network firewall o Windows update o Virus protection Microsoft Confidential . Figure 11: Action Center To view details about either the Security or Maintenance section. If you’re having a problem with your computer. If you don’t want to see certain types of messages. check Action Center to see if the issue has been identified. you can also find links to the Troubleshooting and Recovery Control Panels here. as in the above example. Red items in Action Center are labeled Important. If it hasn’t. Yellow items are suggested tasks that you should consider addressing.Lesson: Applications Action Center Usage Action Center lists important messages about security and maintenance settings that need your attention. If it has been identified. such as an outdated antivirus program that needs updating. and indicate significant issues that should be addressed soon. you can choose to hide them from view by clicking the option to Turn off messages about the particular message types. like recommended maintenance tasks.

Microsoft Confidential . Discuss each point here. and how it impacts consumer support scenarios: 1.For Internal and Partner Use Only 40 . you can find some of this information in the Windows Security Center.Lesson: Applications  o Spyware and unwanted software protection o Internet security settings o User Account Control o Network Access Protection Maintenance messages o Check for solutions to problem reports o Backup o Check for updates o Troubleshooting: System Maintenance Security Center On Windows Vista. Figure 12: Windows Vista – Windows Security Center Demo: Protect your Computer Work through verifying each of the main steps provided on the Microsoft Protect site. Keep your firewall turned on. This is shown below. a. Windows Firewall properties.

Paid solutions ii. formerly known as the Phishing Filter in Internet Explorer Microsoft Confidential . 2. Open the antivirus program and choose Help. Discuss: How can you check to see if your antivirus is up to date? i.For Internal and Partner Use Only 41 . Discuss: What are some common antivirus software solutions for home users? b. 3. Right-click Taskbar icon and choose 'Status'. SmartScreen Filter. Discuss: What are some common antispyware solutions for home users? b. Free solutions c.network type 2. Use updated antispyware technology. 4. Check the solution in Windows to see if it is up to date. a. Check Automatic Update settings.Lesson: Applications b. Phishing and Windows a. a. Keep your operating system up to date. Use updated antivirus software. What is required to keep them up to date? i. ii. 5. About. Some common methods: 1. a. Depends on the antivirus. Network and Sharing Center . 'Version' or 'About'.

Disable Windows Firewall using the Control Panel. What is listed? b. Windows Firewall interface. c. f. Has the state of Security Center changed? If so. Did this satisfy all of the recommendations in Action Center? 2. Check for Security Center for warnings or notifications. Start the computer to Windows XP: a. Expected Time for this Lab This lab takes approximately 60 minutes to complete. e.Lesson: Applications Lab: Health and Security This lab explores configuration and notifications related to Windows protection. Check for Action Center for warnings or notifications. Has the state of Action Center changed? If so. c. Re-enable Windows Firewall. Requirements To perform this lab you will need the following:  A PC with Windows 7 installed  Internet access Exercise: Windows Security and Maintenance 1. e. Download and install Microsoft Security Essentials. Download and install Microsoft Security Essentials. Disable Windows Firewall using the Control Panel. What is listed? b. Did this satisfy all of the recommendations in Security Center? Microsoft Confidential .For Internal and Partner Use Only 42 . List the recommended element(s) of home user Windows security that cannot be satisfied without additional software. List the recommended element(s) of home user Windows security that cannot be satisfied without additional software. g. how? d. Re-enable Windows Firewall. g. f. Start the computer to Windows 7: a. how? d. Windows Firewall interface.

groups.  Demonstrate the steps to check and change group membership. Labs in this module take an additional 30 minutes to complete.For Internal and Partner Use Only 43 .  Check and change permissions for a folder in Windows. Microsoft Confidential . Goals At the end of this lesson. you should be able to:  Discuss user accounts on Windows.  Discuss UAC configuration options. Expected Time for this Lesson This module takes approximately 45 minutes to complete.  Explore your user profile folder. These are core concepts related to security on a Windows PC. user profiles.Lesson: Applications Lesson: Users and Groups This module discusses the concepts of user accounts. and permissions.

Administrators have complete access to the computer and can make desired changes.For Internal and Partner Use Only 44 . Password-protected files. password. Microsoft Confidential . and a unique number that identifies your account. There are four kinds of user accounts in Windows. The administrator account provides the most control over the computer and should only be used when necessary. You use your user account when you enter your user name and password to log on to the computer. Table 9: User Types User Type Standard Administrator Guest Service Accounts Description Standard account users can use most software and change system settings that do not affect other users or security on the computer. The standard account is the account to use for everyday computing. or settings are not accessible to guest users. administrators are asked to provide their password or confirmation before making changes that affect other users.Lesson: Applications Users Accounts A user account is a collection of information that tells Windows which user rights and access permissions you have on the computer. If you turn on the Guest account. Each account type has different rights and restrictions. folders. Services are programs that run in the background. To help make the computer more secure. so a special type of account is provided for them. people who do not have an account can use the guest account to log on to the computer. This type of program needs an account to access resources and objects on the operating system. The user account records your user name.

as they should not be modified by users.For Internal and Partner Use Only 45 . Special accounts. 4. Demo: User Accounts 1. Figure 13: User Accounts The Manage another account option in the view above is the option that takes you to a list of all the user login accounts on this Windows installation. like service accounts are not shown. Then logon as the original user again. create a new standard user account 2. 5. In User Accounts.Lesson: Applications You can view users in the User Accounts interface in Control Panel. 3. change the password for the new user account. change your picture and password. Using the User Accounts Control Panel. Microsoft Confidential . A single administrator-type user account is shown below. While running as this user. Discuss the warning provided. Logon as the new user.

For Internal and Partner Use Only 46 . Standard users can change settings that affect only their Windows usage. available in Computer Management. you are an Administrator. and have limited access to the PC. An administrator can change the group membership of a user with the Change your account type option shown in Error: Reference source not found. They cannot change system settings or access other users’ files.  Guests group: Members of the Guests group are Guests. Members of this group can gain access to all the files stored on the PC. Note: To view Windows groups directly. If you are in both Users and Administrators.  Administrators group: Members of the Administrators group are Administrators.  Users group: Members of the Users group are Standard users. and have wide control over aspects of Windows. and have very limited access to the PC.Lesson: Applications Groups The user type for each user account is determined by its group membership. use the Local Users and Groups interface. This is little used on most consumer PCs. Microsoft Confidential .

2. but it is an important location in Windows 7. NTUser. and other files that are needed by programs on your computer. which is where Windows saves your documents. Microsoft Confidential . The example below identifies several key elements that are included in the profile: 1. 3.Lesson: Applications User Profiles Part of the configuration of a user account is the path to the user’s profile. Data folders. 4. configuration files for a photo editing program. such as My Documents. The user profile is a folder containing your files and settings. This includes things like template files for use in an Office program. temporary Internet files.DAT. which is the user-specific registry file.For Internal and Partner Use Only 47 . This contains settings that customize your Windows and program configuration. Public Folder: This is not a part of your profile. which contains user-specific files for installed programs. Windows 7 makes it easy to share files in this folder. by default. This is where you can save files when you want to share them with other users. AppData folder.

If a program wants to save configuration that applies to all users on the PC. This ProgramData folder works like an AppData folder that is used by all users.Lesson: Applications Figure 14: User Profile This example is from a Windows installation with only one user account. each has a user profile folder under C:\Users. Microsoft Confidential . When you have multiple user accounts. there is also a C:\ProgramData folder in Windows 7. it uses ProgramData rather than your user-specific AppData folder. In addition to the Public folder where you can store files for all users.For Internal and Partner Use Only 48 .

NTUser.For Internal and Partner Use Only 49 .Lesson: Applications Windows XP Profile Windows XP saves user profiles in a different folder than Windows 7 – “Documents and Settings”. The example below shows a sample Windows XP profile: 1. 2.DAT. All Users Profile Folder: This is somewhat like the Public folder on Windows 7. which is the main user data folder. 4. which contains user-specific files for installed programs. Application Data folder. which is the user-specific registry file. Other data folders like My Pictures exist as subfolders of My Documents. 3. Figure 15: Windows XP User Profile Microsoft Confidential . an Application Data folder and other locations like you would find in any other user profile. The main difference is that it is a more fully implemented profile – it contains a My Documents folder. My Documents.

For Internal and Partner Use Only 50 . Example: saving a file. It is private. you will receive an “Access Denied” error message. Windows uses permissions. This means that other users on the computer will not be able to open the My Documents folder in my user profile. To see the properties of an item. open the object’s Properties and go to the Security tab.  Writing to an object. Example: running a program file. Example: opening a file. An example of the Figure 16: Folder Permissions Notice that the Users group is not shown. due to your account and the object’s permissions. Administrators.  Deleting an object. The types of actions controlled by permissions include:  Reading an object. If you try to perform an action that is not permitted. In order to determine what you should be able to access.  Executing an object. however. This is a set of attributes on each folder. file and registry key that lists the level of control each user or group can exert on the object. have access.Lesson: Applications Permissions Basics Your user account is how Windows identifies you on the computer. Microsoft Confidential .

The Owner(s) of an object have the ability to make changes.For Internal and Partner Use Only 51 . c. b.Lesson: Applications You can modify the permissions of an object using the Edit or Advanced buttons. Microsoft Confidential . View the permissions for your user profile folder. Open the Advanced interface and discuss Permissions and Owner settings. Administrators on a PC can take ownership of an object. 3. such as to recover access to a folder that has bad permission settings. Permissions show the actions you can perform on an object. a. 2. This gives you the ability to grant access to other users. Add Read & Execute permissions to this folder for another user account on the PC (such as the new user created in the previous demonstration). even if they are not listed as having permissions. Demo: Permissions 1.

such as file shares or web sites.Lesson: Applications Saved Passwords Credential Manager is the mechanism within Windows 7 that is used to save user names and passwords that are used to connect to network resources. The interfaces in the older versions of Windows do not provide a backup and restore capability.CRD file containing your saved credentials.For Internal and Partner Use Only 52 . and the Stored User Names and Passwords interface in Windows XP. Figure 17 – Credential Manager The passwords saved in the vault are included when you perform a system image backup. Saved Passwords and Internet Explorer You can also save passwords using Internet Explorer. If you want to preserve your saved credentials separate from a system image backup. use the Back up vault option here. which you can manage in Internet Options. This creates a . Content. This is especially useful for retaining your saved credentials when performing a reinstallation. which is the primary new improvement in Windows 7. Microsoft Confidential . These passwords are saved as part of the AutoComplete feature. Credential Manager is much the same as the Manage Network Passwords Control Panel in Windows Vista. AutoComplete Settings.

you need to contact your system administrator. UAC does this by asking you for permission or an administrator password before performing actions that could potentially affect your computer's operation or that change settings that affect other users. A program that is not part of Windows needs your permission to start. To run this program. When your permission or password is needed to complete a task. A program with an unknown publisher needs your permission to start.Lesson: Applications User Account Control User Account Control (UAC) is a feature that can help prevent unauthorized changes to your computer. This program has a valid digital signature. Description This item has a valid digital signature that verifies that Microsoft is the publisher of this item. By verifying these actions before they start. You have been blocked by your system administrator from running this program. you should use extra caution and only allow a program to run if you obtained it from a trusted source. If you are unsure. it's usually safe to continue. This doesn't necessarily indicate danger. read it carefully. and then make sure the name of the action or program that's about to start is one that you intended to start. If you get this type of dialog box. If you get this type of dialog box. If you are unsure.For Internal and Partner Use Only 53 . as many older. make sure the program is the one that you want to run and that you trust the publisher. which helps to ensure that the program is what it claims to be and verifies the identity of the publisher of the program. look up the name of the program on the Internet to determine if it is a known program or malicious software. This program doesn't have a valid digital signature from its publisher. UAC can help prevent malicious software (malware) and spyware from installing or making changes to your computer without permission. check the name of the program or function to decide if it’s something you want to run. Microsoft Confidential . UAC will alert you with one of the following messages: Table 10: UAC Messages Icon Type A setting or feature that is part of Windows needs your permission to start. such as the original CD or a publisher's website. However. When you see a UAC message. legitimate programs lack signatures. This program has been blocked because it is known to be untrusted.

the user can enter the user name and password of an account that is a member of the local Administrators group. This means that even if you are a member of the administrators group. When an administrator application is starting.  Users are presented with four choices for the UAC prompt experience through a new control panel interface. for example when installing applications from IE. this version of Windows prompts the users to change or “elevate” their security context from a standard user to an administrator. In this mode. which makes UAC prompts less frequent in normal use of the PC. applications require specific permission to run as an administrator application (an application that has the same access as an administrator). The standard user access token contains the same user-specific information as the administrator access token. this version of Windows creates two separate access tokens for the user: a standard user access token and an administrator access token. Microsoft Confidential .Lesson: Applications How does UAC Work? On Windows 7 and Windows Vista. The standard user access token is used to start applications that do not perform administrative tasks ("standard user applications").  The default setting for UAC is set to notify when programs attempt to change settings. Changes in Windows 7 Windows 7 made a change to the UAC experience by reducing the overall number of prompts.  The UAC settings screen is more discoverable and more understandable. When the administrator needs to run applications that perform administrative tasks ("administrator applications"). the message gives a choice to allow the application to start or to prevent it from starting. but the administrative Windows privileges and SIDs have been removed. This access token contains information about the level of access that the user is granted. This default administrator user experience is called Admin Approval Mode.  There are numerous instances of duplicate notifications for common activities that are reduced. When an administrator logs on.  Additional Windows operations that users perform often are enabled to work without administrative rights. The following lists some of the changes to UAC in Windows 7. When any user logs on to a computer.For Internal and Partner Use Only 54 . you do not have full administrator capabilities all the time. If the user is an administrator. which the remaining prompts more meaningful when they do appear. both standard users and administrators access resources and run applications in the security context of standard users by default. If the user is a standard user. by default a User Account Control message appears. the system creates an access token for the user. including specific security identifiers (SIDs) and Windows privileges.

Click Change User Account Control settings. Click Open Action Center. To access the settings interface. In Windows 7. resulting in a high number of administrator prompts. In Windows Vista there were only two UAC setting choices versus the 4 available in Windows 7. Network diagnostics tries all automatic repairs that do not require elevation first. In Windows Vista. Based on customer feedback. Microsoft Confidential . The changes in Windows 7 offer more choice and control over this feature. fewer operating system applications and tasks require elevation. Click Change your settings.Lesson: Applications  It is easier for administrators to look at specific Windows settings on the system without needing administrative privileges. Windows 7 reduces the number of prompts. This is possible by refactoring many of our control panel applications to separate interfaces for viewing system settings from those that modify them. The Windows Vista UI makes it difficult for people to choose to not receive notifications through UAC prompts. administrative repairs were mixed in with the non-administrative repairs. and local administrators have more control over consent prompt behavior to reduce user interruption. Settings You can configure UAC settings in Windows 7. use one of the following paths.  Control Panel \Getting Started.  Control Panel\User Accounts\User Accounts.  Control Panel\System and Security\Action Center.For Internal and Partner Use Only 55 . Click Change User Account Control settings.  Click the Action Center icon. The settings interface is shown below. Click Change User Account Control settings. Click Choose when to be notified about changes to your computer.

Always Notify Always Notify me when: o Programs try to install software or make changes to my computer. your desktop will be dimmed. When you are notified. Security Impact: This is the most secure setting.Lesson: Applications Figure 18 – UAC Default setting Configuring User Account Control Settings The four settings for the UAC feature in Windows 7 are discussed below. Microsoft Confidential .For Internal and Partner Use Only 56 . o I make changes to Windows settings. Description: You will be notified before programs make changes to your computer or Windows settings that require the permissions of an administrator. The dimming of your desktop is referred to as the secure desktop because other programs cannot run while it is dimmed. When you are notified. and you must either approve or deny the request in the UAC dialog box before you can do anything else on your computer. you should carefully read the contents of each dialog box before allowing changes to be made to your computer.

but you can still do other things on your computer while the UAC dialog box is open. other programs might be able to interfere with the dialog's visual appearance. This is the default setting for Windows 7. If you are logged on as a standard user. you will need to restart the computer to complete the process of turning off UAC. Security Impact: Because the UAC dialog box is not on the Secure Desktop with this setting. You will be notified if a program outside of Windows tries to make changes to a Windows setting. programs can make changes to your computer without you knowing about it.Lesson: Applications Default: Only Notify when Programs Make Changes Default – Notify me only when programs try to make changes to my computer. Microsoft Confidential . certain programs that come with Windows can have commands or data passed to them.  Do not notify me when I make changes to Windows settings. Description: You will be notified before programs make changes to your computer that require the permissions of an administrator. If you select this setting.  Don’t notify me when I make changes to Windows settings. You need to either approve or deny the request in the UAC dialog box to continue with that task. Description: You will be notified before programs make changes to your computer or Windows settings that require the permissions of an administrator.  I make changes to Windows settings. Never Notify Never notify me when:  Programs try to install or make changes to my computer. You will not be notified if you try to make changes to Windows settings that require the permissions of an administrator.For Internal and Partner Use Only 57 . Only Notify when Programs Make Changes and Do Not Dim Notify me only when programs try to make changes to my computer (do not dim my desktop). It is usually safe to allow changes to be made to Windows settings without you being notified. However. Description: You will not be notified before any changes are made to your computer. If you are logged on as an administrator. Security Impact: This setting has a medium level of security. any changes that require the permissions on an administrator will automatically be denied. Once UAC is off. people that log on as administrator will always have the permissions of an administrator. This setting is fairly secure. both on clean installations and on upgrade installations from Windows Vista to Windows 7. and malicious software can take advantage of this by using these programs to install files or change settings on your computer.

or a direct need for troubleshooting. This includes reading and making changes to protected system areas. and anything else stored on the computer. Best Practices and Troubleshooting It is recommended to use UAC in Windows 7 when it is available. Best Practices Consider the following best practices for UAC:  Default or Higher Recommended: It is recommended that you use the default UAC setting or higher.  Exercise Caution with Downloads: You should be cautious when downloading and running programs from the Internet or from potentially untrusted sources. you open up your computer to potential security risks. When you turn off UAC.  Recommend Standard Accounts: It is recommended that customers use Standard User accounts when possible. UAC can help you keep your computer more secure. you should be careful about which programs you run because they will have the same access to the computer as you do. If there is a need to disable UAC for troubleshooting.  No Support-initiated Reduction of UAC Level: Do not recommend a reduced UAC level to a customer unless there is a request from them to change it. This can help reduce the likelihood of a security or reliability issue. Additional troubleshooting and best practices are discussed below.Lesson: Applications Note: If this UAC setting is selected.For Internal and Partner Use Only 58 . Security Impact: This is the least secure setting. while still ensuring you are notified of potential issues. Microsoft Confidential . Programs will also be able to communicate and transfer information to and from anything your computer connects with. you should return to the default setting when the troubleshooting is completed. but once malicious software is copied to your computer there is no guarantee of safety. your personal data. The default UAC level has been improved in Windows 7 to reduce the number of prompts. If you turn off UAC. However. protected mode can be configured independently using Internet Options. including the Internet. saved files. IE will run in protected mode with no UAC prompts. particularly for users who may inadvertently make system changes.

Create a new administrator user. Create a new standard user. d. Requirements To perform this lab you will need the following:  A PC with Windows 7 installed Exercise: Working with Users and Permissions 1. a. a. Log off. check the C:\Users folder to see if they have user profiles yet. 6. Log off. View the permissions of Bill’s private documents folder. Create a document in Bill’s private documents folder. 7. and then log on as Lucy again. 4. Why is this different from what you saw while logged on as Bill? Microsoft Confidential . named “Bill”. 2.For Internal and Partner Use Only 59 . What user accounts are currently configured in Windows on your PC? 3. b. 5.Lesson: Applications Lab: Users and Groups This lab explores user accounts and user profiles. Can you access Lucy’s private documents folder? b. 9. Create a text file in Lucy’s private documents folder (My Documents). What happens when you try to get to Bill’s private folders? 10. and then log on as Bill. Expected Time for this Lab This lab takes approximately 30 minutes to complete. Create another in the Public documents folder. After the users are created. Start the computer to Windows 7. 8. Log on to the computer as Lucy. Can you access the document in the Public documents folder? c. named “Lucy”.

This includes application usage.Lesson: Applications Lesson: Applications This module examines applications running on Windows.  Discuss application compatibility resources. and application compatibility considerations. Goals At the end of this lesson.For Internal and Partner Use Only 60 . Microsoft Confidential .  Outline the steps to install and remove applications. Labs in this module take an additional 45 minutes to complete. application installation and removal. application types. Expected Time for this Lesson This module takes approximately 15 minutes to complete. you should be able to:  Discuss application types supported on Windows.

This is the application type written for Windows 3. Java Server Pages . Some types of these scripts run on your PC (Jscript/JavaScript.Lesson: Applications Application Basics Applications are the programs you install to perform tasks on a Windows PC. Table 11: Application Types Application Type 32-Bit Windows Applications 64-Bit Windows Applications MS-DOS® Applications Description This is currently the most common type of Windows application. Batch Files (. or other related Windows versions. This application type is written to run natively on a 32-bit Windows operating system. Scripts are commonly used on the internet to provide interactive content on web pages. 16-Bit Windows Applications Scripts These programs cannot be run on 64-bit Windows versions. such as 32-bit editions of Windows 7.JSP. A script requires software to read and execute the instructions in the script file. the predecessor to Windows 95.BAT.CMD). This is a process that creates a temporary 16-bit MS-DOS operating system environment to host an MS-DOS application.ASP. Such programs can be run on 32bit versions of Windows using the WOW (Windows on Windows) technology.. and Hypertext Preprocessor – PHP pages).VBS). using the built-in NTVDM (the Windows NT Virtual DOS Machine). Several supported types are listed in the table below. This application can run on 32-bit Windows versions. Other scripts are used to perform tasks on your PC – Visual Basic scripts (. and other types run on the server (Active Server Pages . An MS-DOS application is one written for the MS-DOS operating system. A script is a text file that contains instructions which are run by a script engine. along with NTVDM. This application can only be run on 64-bit Windows. when we refer to applications running on Windows. and PowerShell scripts Microsoft Confidential . This is the common feature of a script – it cannot run on its own. for example). . These programs cannot be run on 64-bit Windows versions.11 and earlier. this means a 32-bit or 64bit Windows application – the first two types listed. that is able to run 32-bit code.For Internal and Partner Use Only 61 . This application type will also run on 64-bit Windows through the WOW64 (Windows on Windows 64) technology. Generally speaking. or to run in a command window on Windows 95. Application Types Windows supports a variety of application types. This is a native 64-bit application.

or to the “C:\Program Files (x86)” folder if you are installing a 32-bit program on 64-bit Windows. In order to run Java applications.NET Framework Applications. While the Start Menu contains the shortcuts to start programs. as a shortcut you can use to launch it. by providing many reusable components for a program developer.com.For Internal and Partner Use Only 62 . the files for each application are typically installed to the “C:\Program Files” folder. you must have the Java Runtime installed. The . Java is a language for programs often used on the Internet in a browser. Microsoft Confidential . This is available from Java. This is done to help find the programs you have installed and are likely to want to run. but which may also be standalone programs. Figure 19: Start Menu Programs Recently installed programs are highlighted for you. This technology makes application development easier.PS1). as shown in the example above.Lesson: Applications .NET™ Framework Applications Java Applications (. it is typically added to the Start Menu.NET Framework is a runtime component installed on Windows which provides support for . Finding Applications in Windows When you install an application.

but many programs provide an option to change the installed location.Lesson: Applications Program Files is the default location used. Microsoft Confidential .For Internal and Partner Use Only 63 .

Remove and Repair Programs The Programs and Features interface in Control Panel is where you can find the list of installed programs.  Repair: This is the choice you can use when a program is not working properly. use the Windows 7 Compatibility Center: http://www. This program copies files needed by the application. Microsoft Confidential . and sets up its default configuration for users to run the program. registers services or features with Windows. These could include:  Uninstall: This removes the program from your PC. It re-runs all or part of the setup program to get it working again. In some cases this is the choice you pick to Uninstall or Repair a program. If you are running Windows Vista and plan to upgrade your computer to Windows 7. Often there are specific programming actions used that changed in Windows. This is for programs that install for use by any user account on the computer. To check whether a program is compatible with Windows 7. Selecting a program typically provides you with options. necessitating an update to the program if you want to run it on a new version of Windows. Application Compatibility Will my program work with my version of Windows? Beyond the application type. or which need to make system changes to run correctly. This website contains a list of programs that have been tested to work with Windows 7.  Change: This may give you a chance to change the features installed by the application. but typically involve running a setup program. there could be compatibility issues that prevent an application from running on a newer or older version of Windows. you can find out if your programs have known issues with Windows 7 by downloading and running the Windows 7 Upgrade Advisor from the Microsoft website. It will scan your computer and tell you which programs may have issues after you install Windows 7.For Internal and Partner Use Only 64 .com/compatibility. Other applications may install for just one user without the need for administrator permissions.microsoft. Note: Installing applications sometimes requires you to be an administrator on the PC. This could be from a downloaded installation source. This includes information about comp ability with 64-bit Windows versions.Lesson: Applications Installing and Removing Programs The steps you use to install program vary. or from an optical disc.

For Internal and Partner Use Only 65 . Figure 20: Installed Programs Microsoft Confidential . so they vary from one to another. An example view of Programs and Features is shown below.Lesson: Applications The exact options offered for a program are determined by the program publisher.

2. .DOC files are Microsoft Word documents. Discuss the options here for changing the default for a single file type.Lesson: Applications Program Defaults How does Windows know what program to start when you open a particular type of file? Files that contain a particular type of data commonly have the same file name extension. Demo: Default Programs 1.For Internal and Partner Use Only 66 . When you double-click a . Using the Program Defaults interface. Windows uses this extension to associate it with an application that handles the file type. it is opened by winword. This is appended to the file name and typically consists of a period followed by three or more alphanumeric characters. make Internet Explorer the default for all of its file types and protocols. if installed. The mechanism which supports this association is managed through the Default Programs interface in Windows Explorer as shown below. So for example.exe. Microsoft Confidential . Figure 21: Default Programs Using this interface you can give a program control of all its default file types. or change the program that is used to open a specific file type.DOC file. Examine the Associate a file type or protocol with a program interface.

Then eject and re-insert the disc. b.Open With Microsoft Confidential . Windows Explorer provides an Open With option in the shortcut menu for files. or by using the Choose default program link. Insert a CD or DVD and examine the options provided in the AutoPlay window that appears.Lesson: Applications 3. a. Figure 22: Default Program . 4. you can choose a new default program. Open With In addition to the file associations configured for a file type. Discuss the different disc types shown.For Internal and Partner Use Only 67 . either just this one time. c. Disable AutoPlay for the disc type you just inserted. Open the AutoPlay settings interface. This enables you to select an application to use for opening the file.

 Define the purpose of drivers in Windows 7. Lesson: Hardware and Device Drivers We have seen examples of hardware used with Windows. Work as a group to investigate and resolve the problem. Goals At the end of this lesson. and we have seen drivers loading in the steps of Windows startup.For Internal and Partner Use Only 68 . Expected Time for this Lesson This module takes approximately 30 minutes to complete. Expected Time for this Lab This lab takes approximately 45 minutes to complete. you should be able to:  Identify resources for determining hardware compatibility with Windows. Requirements To perform this lab you will need the following:  A PC with Windows XP and Windows 7 installed  Internet Connectivity Exercise: Applications Mock Call In this scenario. They are experiencing an upgrade problem. Microsoft Confidential . Labs in this module take an additional 30 minutes to complete.Lesson: Applications Lab: Applications This lab provides an opportunity to practice call handling best practices in the context of an application support mock call. the instructor is your customer. This section examines hardware compatibility and drivers on Windows from a user perspective.

and a camera. If you want a new type of experience. Some examples:  Gaming: When you purchase the latest games.1/2.For Internal and Partner Use Only 69 . Windows compatibility. Hardware Compatibility Does my PC support adding the type of device I need? Check the device manufacturer’s information to determine the requirements for using a device. In order to have a good experience adding a new device. you may find that you need new hardware. Typically this is the only type of device you would add to a notebook computer. used to connect to a cable. Cameras and hard drives commonly use a high-speed connection.0: Also known as Low Speed or Full Speed devices. you will need a microphone and speakers (or a headset). and driver availability.  USB 2. Each of these is discussed below.0: These devices offer even higher speed connections. satellite or broadcast receiving antenna. USB 3. USB USB devices come in several varieties:  USB 1. This is common for devices such as mice. Common internal and external connection types are shown below.Lesson: Applications Installing Hardware for use with Windows All of the capabilities of a PC are experienced through the hardware. keyboards. Several common connectors are shown below. Each of these scenarios has specific hardware requirements. you may need to update your display adapter (also known as a video card) to support the graphics requirements of the game. These devices connect at up to 15Mbps. and lower-resolution webcams. you will need a TV Tuner. you should consider the hardware compatibility.0/1.  Video conferencing: If you are connecting to other people over the internet for a video conference.  Television: If you want to use your PC to view and record television programming. This new port is Microsoft Confidential . Unlike the previous two types.0 High Speed: These devices connect at up to 480Mbps. External Connection Types It is most common for users to add external devices. These are devices that you can connect without opening the system unit.0 requires a different connector and port type. In most cases the requirements include an available port of the right type on your computer.  USB 3.

0 and earlier connectors come in 2 main types.0 connection. When in doubt of a connector type needed.0 extends the previous A and B type connectors with additional pins.  USB B: This is the connector type at the end of the cable that you connect to a device. USB devices may be bus-powered or self-powered. with some variations:  USB A: This is the connector type typically at the end of the cable you connect to your PC.0 port.0 port. with two rounded corners. Self-powered devices require a separate power supply to be plugged in. This is the new standard for smaller USB connectors.Lesson: Applications backward-compatible. It is roughly square.For Internal and Partner Use Only 70 . USB 3. check the documentation for a device.0 style ports. o USB Micro B type: This is a thinner connector than the Mini type.0 plug can connect to a USB 3. and accepts USB 2.0 plug can connect to a USB 2. The Universal Serial Bus (USB) connection uses a rectangular connector for most devices. and a USB 2. Microsoft Confidential . It comes in several varieties: o USB B type: This connector is used to connect to typical devices. This is important to check when connecting a new device. These new plugs are backward-compatible.0 style plugs. such as mobile phones and MP3 players. but the device will be limited to the speed capabilities of the USB 2.0 plugs also connect to USB 2. USB 3. As a result it can be implemented in smaller devices. A USB 3. You will also see several other connection types. Bus-powered devices receive power through the USB cable. o USB Mini B type: These connectors are used to connect smaller devices. It is being replaced in many newer devices by the Micro type. Figure 23: USB A type connector and ports USB 2. such as printers. It is flat and rectangular. These are presented below.

Figure 24: Wireless device transceiver You may also have a Bluetooth device. The same standard and mini type connectors are used in all cases. Smaller devices like camcorders typically use the mini connector. 1394 cables do not have different connectors on the PC and device ends. Note: These device-to-PC wireless connections are different from a wireless network connection. such as what it provided with Microsoft wireless keyboards and mice. This looks like a US telephone cable connector made wider. Wireless network connections require a wireless network adapter to be installed. You will see these connections commonly used for video cameras. IEEE 1394 This connection is also known as Firewire. RJ-45 for Ethernet Networking When you make a wired network connection. or on hard drives. to accommodate more wires. you are typically doing it with an RJ-45 connector. Microsoft Confidential . or a small external transceiver similar to the one shown above.Lesson: Applications Wireless Wireless devices require a transceiver to be installed on your computer. which is much smaller and looks “pinched” on one side. Unlike USB connectors. Standard (right) You will commonly find standard 1394 connectors on a PC. and sometimes on external hard drives. This is often in the form of a small USB device. which requires your PC to have an internal Bluetooth transceiver (common on notebook PCs). Figure 25: IEEE 1394 connectors: Mini (left).For Internal and Partner Use Only 71 .

This is very similar to the internal connector used to install a hard drive in a desktop PC. This connection type is used to connect an audio source to a receiver/amplifier or other playback device. ExpressCard slots are 34mm or 54mm wide and 5mm tall. to connect an audio source to the PC. the same as used for analog audio connections between stereo components. often black or with a black plug to prevent dust. Modern desktop PCs often have 6 or more audio ports.Lesson: Applications Figure 26: RJ-45 Connector This connection type is commonly found on PCs with a wired network adapter. You may also find S/PDIF (Sony Philips digital interface) digital audio connectors on a PC. broadband modems.  Optical/TOSLINK: This is a roughly square port. This is the same type of connector used for headphones connected to a portable music player.5mm TRS (tip. or more commonly outputs. network adapters.For Internal and Partner Use Only 72 . These digital ports typically come in one of the following varieties:  Coaxial/RCA: This is a round connector. ring. which receives a fiber optic cable connection. and sleeve) connector. to play audio from the PC to another device. and host controllers for other bus types (a card of this type might have 1394 or eSATA ports). This is a faster replacement for the earlier PC Card and PCMCIA (Personal Computer Memory Card International Association) standards. The most important consideration when making this connection is to determine which port to use. ExpressCard for Mobile PCs ExpressCard connections are found on the side of some mobile PCs. Device types you typically find in this form factor are memory card readers. Microsoft Confidential . Audio When you connect headphones or speakers to a PC you typically use 3. These could be inputs. and home network routers (devices for sharing a network connection with multiple PCs). eSATA for Storage eSATA is a connector used for some storage devices.

the longer the connector. Current support variants are x1. this is increasingly being supplanted by PCI-Express. SATA (Serial Advanced Technology Attachment) SATA is the most popular internal storage connection type for PCs at the time of the writing. such as a network adapter or low-end video card. This means that you could put an x4 device in an x16 slot.microsoft. you can find out if your computer is ready for Windows 7 by downloading and Microsoft Confidential . If you are running Windows XP or Windows Vista and plan to install Windows 7 on your computer. The more lines required. to support higher bandwidth devices than PCI. and the slot. One of the considerations in the past has been driver availability for 64-bit versions of Windows. AGP (Accelerated Graphics Port) This connection type was developed for display adapters. This website contains a list of computers and devices that have been tested to work with Windows 7. required to connect it. One advantage of the PCI-E architecture is that lower throughput devices can be placed in higher throughput slots. use the Windows 7 Compatibility Center: http://www. These are usually connected using “slots” – long ports with multiple connections. Like PCI. PCI (Peripheral Component Interface) This is a connection type for PC expansion cards that is fading in popularity. x4. if that is what you have available. This is less commonly an issue today.For Internal and Partner Use Only 73 . replaced by the faster PCI-Express slot. Windows Compatibility Will my device work with my version of Windows? Beyond the physical connection. used to add devices to your motherboard. This connector comes in several variations. PCI-E (PCI-Express) PCI-E is the most popular expansion slot for new PCs at the time of the writing. x1 devices are typically lower-bandwidth. you must consider whether a device is compatible with your version of Windows.com/compatibility. you have the option of adding internal devices.Lesson: Applications Internal Connection Types If you have a desktop PC. To check a device for Windows 7 compatibility. based on the number of data lanes required. The reverse is not possible. more flexible cables. This includes information about comp ability with 64-bit Windows versions. High performance video cards currently require x16 slots. x16 and x32. SATA replaced the older Parallel ATA standard by supporting higher data rates and smaller. Each lane supports 2Gbps throughput or more for later versions of the specification. x8. As a result.

as well as alert you to any incompatible programs. It will scan your computer and tell you which components and devices you should upgrade or replace before upgrading to Windows 7.Lesson: Applications running the Windows 7 Upgrade Advisor from the Microsoft website.For Internal and Partner Use Only 74 . Microsoft Confidential .

This is needed if Windows does not include driver support for your device.Lesson: Applications Drivers Once you have your device physically connected. Microsoft Confidential . so you may need to locate a driver for your hardware.  Check the Device Installation Settings interface from the Hardware tab of Advanced System Properties. This is enabled by default on Windows. to turn on driver downloading.  Check the device manufacturer’s website. If Windows reports that there is not a driver available. the hardware you connect to your computer—for example. you may need to install a driver. Drivers are written to work with a specific device or device type. This will offer updated drivers. How can I find a driver? In many cases your hardware will be supported by drivers that are included with Windows. there are several options to proceed:  Check the Action Center for messages about drivers for your hardware. The Device Installation Settings interface is shown below. a video card or a printer—will not work properly.  Use Windows Update to check for updates. What is a driver? A driver is software that allows your computer to communicate with hardware or devices.For Internal and Partner Use Only 75 . Without drivers. Enabling this setting causes Windows to check Windows Update for available drivers.

Microsoft Confidential .Lesson: Applications Figure 27: Device Installation Settings Note: This interface is called Windows Update Driver Settings on Windows Vista. it should be listed in Device Manager.For Internal and Partner Use Only 76 . and drivers used by Windows. This interface provides the overall view of devices connected to your PC. Viewing Installed Drivers Once you have a device installed. Each device entry in Device Manager provides information on the driver files and driver version being used to support the device.

and another device.For Internal and Partner Use Only 77 . Microsoft Confidential .Lesson: Applications Figure 28: Device Manager In the above example. we are missing a driver for the sound card (multimedia audio controller).

Lesson: Applications Update Driver You can right-click a device entry in Device Manager. Microsoft Confidential . Figure 29: Update Driver If you choose Search automatically for updated driver software.For Internal and Partner Use Only 78 . Windows checks for better drivers available with Windows. and from Windows Update online if you chose the recommended settings during Windows installation. and use the Update driver option to find a driver for one of these devices or for a device where you already have a working driver. This opens the interface shown below.

For Internal and Partner Use Only 79 . This folder shows a subset of devices – just the device types users tend to interact with regularly. Windows 7 shows these as a single device in Devices and Printers. or your web cam configuration. which is a popular device that provides several different pieces of functionality all in one package.Lesson: Applications Device and Printers Once you have a device and its driver installed. let's look at the Canon Pixma MX850. Figure 30: Devices and Printers Multifunction Devices Some devices include multiple functions – like a scanner and printer together in one device. you can interact with it in the Devices and Printers folder on Windows 7. You can use the Devices and Printers folder to access device specific tasks you may want to perform. such as changing your printer settings.  Printer  Scanner  Fax Machine Microsoft Confidential . As an example. You will typically find them listed separately on previous versions of Windows.

 The scanner appears under Scanners and Cameras.  The flash media reader listed as a generic Removable Disk in Windows Explorer. several different entry points for the device get created in different locations. Figure 32: Printer Locations in Windows 7  The Fax and Printer appears in the Printers folder.For Internal and Partner Use Only 80 . Microsoft Confidential .Lesson: Applications  Copy Machine  Flash media reader Figure 31: Example Printer When a user plugs the Pixma MX850 into a Windows Vista PC.

fingerprint reader. Windows 7 makes an effort to bring the view of the device within Windows closer to the view the customer sees.Lesson: Applications This is contrary to the way the user sees the device. When we plug in the device to a Windows 7 PC.For Internal and Partner Use Only 81 . IEEE1394. and cannot be removed or replaced (webcam. and PCMCIA (PC Card) devices  All Printers  Bluetooth and Wireless USB devices  Network connected devices supporting PnP-X  All other externally connected PnP devices Several peripheral devices are physically integrated into the laptop. Device and Printers gives us a consolidated view of these same functions in one menu. which is as one single component. All externally detectable and connected devices Laptop These include:  USB. Figure 33: Printers and Faxes What Devices Appear in Device and Printers? The following table shows examples of how devices will appear in the Device and Printers Control Panel. and audio controls) The user should only see the laptop in Devices and Microsoft Confidential .

Lesson: Applications
Printers. In the laptop properties, the Hardware tab
shows the underlying device functions, and subdevices. This is illustrated below.
MP3 Player

Connected to the above laptop using USB.
User should see a single instance of the MP3 player in
Devices and Printers.

PCMCIA Wireless
Network Card

Connected to the above laptop through the PCMCIA
slot.
User would see a single instance of this card in Devices
and Printers

The computer provides several different types of functionality within a single device so it
is also displayed in Devices and Printers. It is treated just like any other device by
Devices and Printers. Notebook PCs in particular include many functions in one device.
As a result, a notebook PC has many options in the shortcut menu.

Figure 34: Computer Device

Pairing Devices
Devices and Printers is also used as a unified interface to pair and unpair wireless and
network connected devices, including the following.

Bluetooth devices

Wireless USB devices

Microsoft Confidential - For Internal and Partner Use Only

82

Lesson: Applications

Windows Connect Now (WCN) wireless networks

Network Connected Devices supporting PnP-X

This replaces the Bluetooth Control Panel that existed in Windows Vista, and
consolidates the pairing for Bluetooth and Wireless USB devices in the same interface
with finding and installing Ethernet and Wi-Fi connected devices. You can install and
start using a certified Bluetooth or network-connected device in just a few minutes.
Windows 7 displays all the wireless devices that are available to install and use; choose
a device, enter a PIN number, and start using the device.

Microsoft Confidential - For Internal and Partner Use Only

83

Lesson: Applications

Lab: Hardware and Device Drivers
This lab provides hands-on practice updating drivers in Windows.

Expected Time for this Lab
This lab takes approximately 30 minutes to complete.

Requirements
To perform this lab you will need the following:

A PC with Windows 7 installed

An Internet connection

Exercise: Update a Driver
1. Locate your display adapter in Device Manager.
2. View the properties of the device in Device Manager, and find the driver
information. Note the following details:
a. Version
b. Date
c. Digital Signer – this tells you the source of the driver.
3. Update the driver for your display adapter using the Update driver option.
4. After the update is complete, view the properties of the device in Device
Manager again and note what changed.
5. Check the computer or device manufacturer's site for an updated driver.
Consider and discuss the following questions with the class:
a. Is the driver from the manufacturer site newer than the version from
Windows Update?
b. Who built your video card? Can you tell from the entry in Device
Manager?
i. Could be the chipset vendor (nVidia, ATI, Intel, etc.).
ii. Could be the video card manufacturer (ATI, nVidia, PNY, VisionTek,
Sapphire, MSI, Asus, EVGA, etc.).
iii. Could be the computer manufacturer (Dell, HP, Acer, Sony,
Toshiba, Gateway, Asus, etc.).

Microsoft Confidential - For Internal and Partner Use Only

84

Compatibility Center for Windows 7? Lesson: Storage This lesson reviews concepts and considerations related to files.) e. Now check the Windows 7 Compatibility Center.For Internal and Partner Use Only 85 . audio.  Discuss hard drive partitioning and drive management. Expected Time for this Lesson This module takes approximately 60 minutes to complete. Goals At the end of this lesson. Is there a different driver provided beyond the versions you’ve found above? 7. networking. Who provides the "best" driver? Is there a best driver? Considerations: a. Windows Update? b. Microsoft Confidential . Labs in this module take an additional 30 minutes to complete. etc.Lesson: Applications 6. you should be able to:  Discuss key disk management concepts and tasks. Chipset driver only? c. disks and maintaining data integrity. PC Manufacturer driver only? d. Depends on device? (Video.

are organized in partitions (also called volumes).For Internal and Partner Use Only 86 . each of which is given a drive letter by Windows. These are the drive letters shown in Windows Explorer. included in the Computer Management interface. You can see a fairly complex example below. the primary storage devices on your computer. is the interface where you can manage your disks and partitions. Figure 35: Disk Management Microsoft Confidential .Lesson: Applications Disk Basics Hard disks. Disk Management.

or CDFS/UDF for optical media.sys. o Crash Dump: This indicates the location where memory dump files are written in the event of a blue screen (kernel error). That file is used to implement virtual memory. This is the partition or volume where Windows is installed. such as NTFS. o Page File: This is the location of the Windows Page file. Dynamic is the alternative).For Internal and Partner Use Only 87 . o Active: This shows the partition marked as bootable for a disk. Microsoft Confidential . The most common partition type used with Windows 7 is the Primary Partition. Volume/Partition Type: This indicates the type of drive. pagefile. also called a Simple Volume. or advanced troubleshooting. which ensures that you can run multiple programs and not exhaust your physical RAM space. such as bootmgr and the \Boot folder. so you may see more than one disk marked with Page File. FAT32. Your System partition must be marked Active. As part of that map you can find information about these important storage roles and attributes for partitions:  File System: Shows the file system. Each partition is described with the file system and roles assigned to the partition by Windows. RAW (unformatted or damaged partition).Lesson: Applications Disk Management shows information for each disk – the total size and the disk type (Basic is the most common. o System: This identifies the location of the Boot directory and boot files.  Roles  o Boot: This identifies the location of the Windows directory. Note that you can configure Windows to use multiple page files. usually C:. A memory dump saves the contents of RAM for use by error reporting.

you must first create one or more partitions on it. so you probably won't need to format them. You can choose to use a single partition on each disk. To create a partition. Figure 36: Creating a partition After you've partitioned the hard disk. you can format each partition. you might need to format it. If you buy an additional hard disk to expand the storage of your computer. This is another right-click option. Storage devices such as USB flash drives and flash memory cards usually come preformatted by the manufacturer.Lesson: Applications Partition and Format Before formatting a hard disk. you configure it with a file system so that Windows can store information on the disk. this time with a partition selected. right-click a section of unallocated space on a drive. and choose New Simple Volume as shown below. Figure 37: Formatting a partition Hard disks in new computers running Windows are already formatted.For Internal and Partner Use Only 88 . or multiple partitions. Partitions need to be formatted before you can use them. When you format a partition. Microsoft Confidential . Often it is easier to keep track of your data it you use fewer drive letters.

2. 4. Steps to add a partition. Microsoft Confidential .Lesson: Applications Demo: Disk Management Open Disk Management and discus common disk management tasks: 1. 5. Locate information on disk types and file systems. 3. View disk and partition layout.For Internal and Partner Use Only 89 . Free space check. Steps to format a partition.

This tool provides the ability to remove temporary files. Free More Space Also check for programs that are not being used. Consider moving some of these files to a second hard drive.For Internal and Partner Use Only 90 . Microsoft Confidential . and other files that are not typically needed for long term Windows use. or cause errors when you try to save a file to the drive. If you must free more disk space. files used by Setup. Open Windows Explorer 2. Select the drive for which you will determine free space. ask the customer how they use the computer. Disk Cleanup Usage Disk Cleanup is the tool provided with Windows Vista that can be used to free disk space.Lesson: Applications Disk Issues What kind of problems might you encounter with disks and partitions? Low Disk Space You may find that Windows warns of low disk space on of your drives. this can use a great deal of space. this could cause poor performance. 3. If they have a large amount of music or video content on the computer. Picture files are also a significant disk space usage item on many customer computers. Uninstalling disused programs can help reduce disk space usage without much usage impact. How Much Free Space do you have? View the amount of free space on your hard disk: 1. View the details pane at the bottom for free space. Depending on the partition.

shown below. the new sections of the file must be stored elsewhere on the disk . You can start Chkdsk from the properties of a drive in Windows Explorer. Consider data backup a high priority.For Internal and Partner Use Only 91 .exe tool in Windows to check for and fix problems. displayed in Action Center. where the BIOS reports a missing disk. But there still may be an underlying problem with the hard disk. This is called fragmentation. Microsoft Confidential . Disk Performance Issues Beyond low disk space.not contiguously with the original file. If the file is surrounded by other files. As a result if problems are found it's good to recommend that periodic re-checking be done to see if additional problems surface. use the Chkdsk. Figure 38: Disk Tools This can help when the hardware has caused a problem in the files on the disk.Lesson: Applications Disk Errors You might have errors on the disk. Fragmentation is a normal process that results when files get larger and are written to the hard disk. there is also the possibility of disk fragmentation causing performance issues. Or you could see periodic problems starting the computer. These can indicate a damaged or failing drive. If the problem is related to the file system.

but when that fragmentation becomes widespread it can slow performance by causing the hard drive to perform more movement of the read/write head to reach or write these files.Lesson: Applications Fragmentation doesn't harm the files. You can improve performance by freeing disk space and defragmenting the drive.For Internal and Partner Use Only 92 . This is done automatically by Windows. but you can start it manually using the Defragmentation option shown in Error: Reference source not found above. as new files may need to start as fragments if there aren't contiguous free disk areas available. Microsoft Confidential . Low disk space can exacerbate the problem.

or that a drive supports both R and RW type discs. Read-only DVD. or for carrying data from one PC to another. Write-Once Compact Disc Rewritable Compact Disc. Drives supporting this format are more prevalent in Japan than in the USA. pronounced “DVD Plus RW”.Lesson: Applications Disc Burning If your computer includes either a CD or DVD recorder. pronounced “DVD Dash R”. Table 12: CD and DVD Disc Types Media Type CD-ROM CD-R CD-RW DVD-ROM DVD-RAM DVD+R DVD+R DL DVD-R DVD-R DL DVD+RW DVD-RW Blu-ray Disc (BD) BD-R BD-RE Description Read-only Compact Disc. also known as “DVD+R Double Layer”. The important factor is having media that works with your drive. Dual layer DVD-R media Rewritable DVD. Write Once DVD. These store more data than a DVD+R disc. pronounced “DVD Dash RW”. Randomly Writable DVD. Write Once DVD. Note: When examining optical drive specifications.For Internal and Partner Use Only 93 . creating audio or video discs to play in consumer electronics devices.7 GB (single layer). Dual layer DVD+R media. Rewritable DVD. you may find labels like “DVD±R/RW”. but require a drive that supports Dual Layer writing. Read-only Blu-ray disc. Write Once Blu-ray Disc. Stores 25 GB (single layer) or 50 GB (dual layer) or more for later variants. Media Types There are many different types of media that are supported by CD/DVD devices. This indicates that a drive supports either + or .5 GB (dual layer). Microsoft Confidential . or ~8. Stores 4. Rewritable Blu-ray Disc. pronounced “DVD Plus R”. Stores ~700 MB. This is useful for backup. Some examples are shown in the following table.media. You can erase and write different data to this type of disc. Supports hardware defect management (often compared to hard disk drive behavior). you can use it to record to blank discs with Windows 7.

When the formatting is complete. Burn a few files to another disc in Mastered ISO format. 5. 4. Eject the disc to show the procedure to make it ready for reading on another PC. Microsoft Confidential . Examine each burned disc in turn and show how the format type is displayed in the disc properties. an empty disc folder opens. 3. 3. Open the folder that contains the files you want to burn. Steps to Record to a Disc The steps to copy data to a disc are: 1. A UDF disc will be created with the default settings. A mastered ISO disc can be created if you change the format used. DVD players and car stereos. but you can also choose to burn discs in the Mastered International Organization for Standardization (ISO) 9660 format. Windows burns discs in the Universal Disk Format (UDF) file system format. 4. This burns a disc in the most compatible format. Demo: Disc Burning 1. you can use the Show formatting options setting at step 3 to choose the Mastered format. Insert a writeable CD or DVD into your computer's CD or DVD recorder. If you need to use the disc on an older device. Walk through options in the prompt that appears: a. b. but requires additional steps to burn the data to the disc. 6. In the dialog box that appears. 2. click Burn files to data disc. Note: It might take several minutes for the disc to be formatted in the default Live File System format. Note: Blu-ray discs support the UDF file format only for use with a computer.For Internal and Partner Use Only 94 . type a name for this disc. Burn a few files to a UDF disc. The ISO format is more commonly used with CD players. and then drag the files into the empty disc folder. In the Burn a Disc dialog box. Insert a blank CD or DVD disc in your burner drive. and then click Next.Lesson: Applications Write Format By default. 2.

Microsoft Confidential . Figure 39: Backup and Restore Previous versions of Windows include Backup options in other locations. In order to copy your important data. This is one of the reasons Windows defaults to saving data files a few known folders – Documents. It is important to back up your data regularly.For Internal and Partner Use Only 95 . If you need to save your data files to an external drive. optical discs. Windows 7 provides backup options in the Backup and Restore interface in Control Panel. you must know where to find it. If you have saved files in the default locations. This is a good way to make a quick copy of your important files. Check the Help and Support documentation online for steps to perform a backup in an earlier OS. Videos. so that a problem with your PC does not result in a loss of important files. before making changes on the computer. Pictures. a backup solution may not be available. Music. You can back up to an external hard disk. or a network location in most cases. shown below. Manual File Copy In some cases. you can do a file copy using Windows Explorer.Lesson: Applications Backup Windows includes tools to safeguard your data from loss. you can complete a manual file copy backup fairly quickly. or may not provide the capabilities you need.

or videos. Show the steps you would use for a manual file copy backup of Documents using Windows Explorer.Lesson: Applications You should be very cautious of making any destructive changes on the PC if this is your only form of backup. Desktop folder b. This can help you find unexpected data locations on their hard drive. this can help identify the file types you should look for. If they mainly work with photos. Folder on the root of the hard drive c.For Internal and Partner Use Only 96 . 3. it can be useful to find out what kinds of files they create or use on their PC. Set up backup on your computer to backup data files in your user profile. Folders on a second hard drive Microsoft Confidential . Demo: Backup 1. Discuss alternate locations sometimes used by customers to store data on their PC: a. Tip: If you are helping a customer backup their data. 2. or spreadsheets.

Configure Backup to perform a file backup of your user profile data. 3. This is a directory where many programs save temporary files that can be removed later. Start Disk Cleanup. e. f. Expected Time for this Lab This lab takes approximately 30 minutes to complete. Create a file on the desktop. Both are in the Disk Cleanup list. Examine the options available. g. You can access the directory by typing %temp% in the “Run” interface. Configure Disk Cleanup to clean up the C:\ drive. Open the %temp% directory. Move.exe. h. i. Microsoft Confidential . copy and rename a few files using Windows Explorer. Check file system integrity with Chkdsk.For Internal and Partner Use Only 97 . which is where Internet Explorer saves files from the Internet so that they can be loaded later without re-downloading. 6. b. Uncheck everything except “Temporary Files”. 4. and then click Ok. Files for cleanup: a. What is the actual location of the %temp% directory on your hard drive? d. Start your computer to Windows 7. check the %temp% folder again. 2. c. Copy the file you created to the %temp% directory. When Disk Cleanup is finished.Lesson: Applications Lab: Storage This lab provides experience using disk maintenance and management tools. Was your file deleted? 5. Review your disk configuration in Disk Management. Requirements To perform this lab you will need the following:  A PC with Windows 7 installed Exercise: Storage 1. Note: This is not the same as “Temporary Internet Files”.

Goals At the end of this lesson. Expected Time for this Lesson This module takes approximately 30 minutes to complete.For Internal and Partner Use Only 98 . Disable the option to save a System Image. you should be able to:  Identify necessary elements for an Internet connection. Save this backup to D:\ (This should be the drive where Windows XP is installed).  Discuss steps to verify a connection to the Internet. c. The focus is on verifying the state of the connection. if this option is enabled. b.Lesson: Applications a. Lesson: Internet Connections This lesson discusses concepts related to Internet connectivity. Microsoft Confidential . Monitor the backup for success. and running repair tools to restore connectivity.

Table 13: Internet Connectivity Components Component Internet Service Provider (ISP) Part of Windows? No Modem No Router No Network Adapter No Description This is the company that you typically pay in order to connect to the Internet. you require a Modulator/Demodulator (modem for short). These are listed in the table below.For Internal and Partner Use Only 99 . This is a modem. which sends network data over a telephone or cable TV line. This is the device in your computer that accepts a network cable. With many consumer Internet connections. this may also be your telephone provider. such as:  Internet Explorer  Windows Update  Windows Media Center  Time and Date: Internet Time Synchronization  Linked online IDs  Windows Troubleshooters: online updates This widespread Internet usage means that you will often need to verify the state of the Internet connection even if you do not primarily support network technologies. Internet Connection Components In order for your Windows PC to connect to the Internet. Microsoft Confidential . Depending on your locality. It may connect directly to your computer using a USB or network cable. or it may connect to a router in your home. This is an optional component if you have a modem that connects via USB. These include features from all over the product. used to share a single network connection with multiple PCs. you need several components in place. This is an optional component. It manages the data sent using the RJ-45 port on your PC.Lesson: Applications Verifying the Internet Connection There are many areas of Windows that rely on an Internet connection to function properly. cable television provider or satellite television company. This device often provides wireless network capabilities so that you can connect a computer using WiFi.

or external devices. If Internet Explorer cannot load web pages. Status Indicators You can use several interfaces in Windows to check the connection status:  Internet Explorer: This is an easy way to check the status of the Internet connection. You need this to be in place even if your modem connects via USB. For a wireless adapter on a mobile PC. even if it is included with Windows. there could be a wireless on/off or activity status indicator light. how to ask for an address from your router or modem. or can be an add-in utility Internet Program Yes. This driver forms the connection between the network adapter (or modem) and Windows. you might find that your PC is the object of attacks from malicious software on other computers on the Internet. If these are not lit. A problem here could suggest the need for the customer to check their cables. or can be an add-in program This is a device driver for your network adapter. If you connect directly to the Internet. Windows Live Mail. there are usually lights indicating that there is a link and activity on the connection. This is the interface you use when you think of the Internet. which use the Internet in order to provide the functionality you want. and how to send data from a program to a web server. check the cables. Microsoft Confidential . it could indicate a problem. Moving further up the internet connection components. or contact their ISP for assistance:  Network adapter link and activity lights: If you are using a wired network adapter. Look at the RJ45 connector to see if there are lights. If there is a red or yellow icon shown.  Network System Icon: The network icon on the Windows taskbar gives you the best quick indication of your connection status.Lesson: Applications Network Adapter Driver No Internet Protocols Yes Firewall Yes. These are the Windows components that understand how network devices talk to each other. This set of components understands how to address messages on the Internet. Windows Live Messenger. the Internet connection may be down. and if they are lit. or other similar programs. See if that is present and lit. This could be Internet Explorer.For Internal and Partner Use Only 100 . It is provided by the manufacturer of your network hardware. A firewall program blocks traffic it thinks you don’t want to receive. you can also check these indicators. to help protect your PC.

the Windows network troubleshooter is started. using a light labeled WAN. Help direct the customer for Microsoft Confidential . DSL. or other similar name. Simply help your customer follow the steps in the wizard. ready. cable. sync. or the modem may be off. It does this by performing some testing steps for you. You can start the network troubleshooter from the error page typically shown by Internet Explorer when it cannot load a page: Figure 40: Internet Explorer cannot display the webpage When you click this option on the error page. you may need to consider your support boundaries. If the lights suggest a problem. Try the Windows network troubleshooter first. You can also use the “Troubleshoot problems” or "Diagnose and repair" option provided when you right-click the network system icon. If not. restart the modem by disconnecting and reconnecting the power as you would do with a router. there are some easy actions you can take to diagnose the issue. Diagnosing Internet Connection Problems If the connection seems to be down. broadband.Lesson: Applications  Router status lights: When using a home router for an Internet connection you can check the WAN connection light to be sure it has a connection to the modem. Using the Windows Troubleshooter The Windows network troubleshooter provides guided steps for troubleshooting connection problems.For Internal and Partner Use Only 101 . and possibly fix it.  Modem status lights: Most cable and DSL modems provide status lights to indicate a good connection to the ISP. You may also need to restart the router by unplugging the power cable for 30 seconds and then reconnecting it. there could be a cable problem. If the network troubleshooter is unable to diagnose and repair the connection issue you have.

4. use the Diagnose link to start Network Diagnostics. Demo: Verifying Internet Connectivity 1.For Internal and Partner Use Only 102 . Verify that you have connectivity in Internet Explorer. Then try to view a page. On the error page. Module Review This module has covered the following main topics. Follow the diagnostic steps to resolve the issue. 5.  PC Basics  Windows Versions and Editions  Windows Updates and Service Packs  Windows Health and Security Features  User Accounts  User Profiles  Applications  Installing Devices on Windows  Managing Devices on Windows  Disk Basics  Storage Features in Windows  Internet Connection Basics Microsoft Confidential . 3.Lesson: Applications assistance with their Internet connection or perform additional network troubleshooting as appropriate. Set bad proxy server configuration information in Internet Options. Perform the following steps: 2.