98-349 2E Lesson 3 Slides
98-349 2E Lesson 3 Slides
Lesson 3
Understanding Native Applications, Tools,
Mobility, and Remote Management and
Assistance
Objectives
Skill/Concept Exam Objective Objective Number
Configuring Internet Explorer Configure native applications and tools 1.3
Configure applications 3.1
Configuring Microsoft Edge Configure native applications and tools 1.3
Configuring Cortana Configure native applications and tools 1.3
Introducing Accessory Programs Configure native applications and tools 1.3
Supporting Mobile Access and Data Configure mobility settings 1.4
Synchronization Understand offline files 4.4
Using Windows Mobility Center Configure mobility settings 1.4
Accessing a Computer Remotely Configure native applications and tools 1.3
Configure and use management tools 1.5
Configuring Internet Explorer
• Internet Explorer is the traditional Microsoft browser that
offers a number of features to protect your security and
privacy while you browse the web, including phishing filters,
Protected Mode, Pop-up Blocker, Add-on Manager, download
files or software notification, and the use of digital signatures
and 128-bit secure (SSL) connections when using secure
websites.
Cookies
• A cookie is text stored by a user’s web browser that contain
information about the user and his browsing preferences
which can make the browsing experience easier and faster.
• Can be used by spyware programs and websites to track the
user’s online behavior which is a security risk.
Deleting Browsing History
• Use Delete Browsing
History to delete
cookies, temporary
Internet files,
history, and other
information.
Other Internet Explorer Security Features
• InPrivate Browsing prevents Internet Explorer from storing personal
information and browsing history.
• Tracking Protection controls which Web sites can track online
browsing activity and receive that information.
• Pop-up Blocker can prevent some or all pop-ups. (Which are
annoying advertisements and might load spyware or other malicious
programs).
• ActiveX Filtering blocks ActiveX controls.( Which are small
applications that provide interaction content to websites. However,
these applications can contain malware).
Configuring Security Zones
• To help manage Internet Explorer security when visiting
websites, Internet Explorer divides your network connection
into security zones based on four content types. For each
zone, a security level is assigned.
Configuring Security Zones
Using Dynamic Security and Protected Mode
• Internet Explorer offers multiple security features to defend
against malware and data theft, including dynamic security
and protected mode.
• Dynamic security is a set of tools and technology that
protects your computer as you browse the internet with
Internet Explorer. It includes ActiveX opt-in, Security Status
Bar, Phishing Filter, Address Bar Protection, and protected
mode.
Configuring the SmartScreen Filter and
Phishing
• Phishing is a fraudulent technique where users are enticed
(usually through email or other websites) to go to illegitimate
websites that look similar to legitimate websites in an effort
to take personal information, such as passwords and account
numbers.
• SmartScreen Filter detects threats on Web sites, such as
phishing attacks and malware downloads, and prevents them
from running.
Managing Add-Ons
• To make Internet Explorer more flexible, Internet Explorer
(1/2)
allows you to add add-ons to your browser, such as extra
toolbars, animated mouse pointers, stock tickers, and pop-up
blockers.
• Add-ons are downloaded from the internet and installed as
an executable program.
Managing Add-Ons
• As newer technology is implemented on websites, sometimes
(2/2)
websites don’t look like you expect them to.
• Images might not appear, menus might be out of place, and
text could be jumbled together.
• In these situations, you can try to run the site in compatibility
mode.
Configuring SSL and Certificates
• Secure Sockets Layer (SSL) uses a cryptographic system that
(1/2)
uses two keys—one key to encrypt the data and another key
to decrypt the data.
• The public key is known to everyone and a private or secret
key is known only to the recipient of the message. The public
key is published in a digital certificate, which also confirms
the identity of the web server.
Configuring SSL and Certificates (2/2)
• If a site is secured using SSL,
a lock icon appears in the
address bar. Clicking the lock icon
displays information about the
site, including the identity
of the certificate authority (CA)
that issued the certificate.
Managing Favorites
• Favorites allow you to keep track of websites that you visit
frequently so that you can visit them quickly in the future.
• If you’re on a site that you want to make a favorite, click the
Favorites (star) button and click Add to favorites. You can also
save a favorite by pressing Ctrl+D. You will then be prompted
to name the favorite and identify which folder the favorite
will be stored in.
Managing LAN Settings
• Although Classless Inter-Domain Routing (CIDR) helped use
the IPv4 addresses more efficiently, additional steps were
necessary to prevent the exhaustion of IPv4 addresses.
• Network Address Translation (NAT) allows multiple
computers on a network to connect to the internet through a
single IP address.
Configuring Microsoft Edge
• Microsoft Edge is a new Microsoft lightweight web browser
with a layout engine built around web standards designed to
replace Internet Explorer as the default web browser.
• It integrates with Cortana, annotation tools, Adobe Flash
Player, a PDF reader, and a reading mode.
Configuring Cortana
• Cortana is a search feature and personal assistant for
(1/2)
Windows 10.
• It can help you find programs and files on your computer and
manage your calendar events.
• It can also deliver sports scores, weather, news, navigation,
reminders, and more. When you search, you can either type
what you are looking for, or if you have a microphone, you
can speak to Cortana.
Configuring Cortana
(2/2)
Windows 10 Accessory Programs
Program Description
Calculator Performs basic mathematical functions such as addition,
subtraction, multiplication, division. Also includes scientific,
programmer, and statistics functions, along with unit conversions,
date calculations, and worksheets.
Command Prompt Opens a window in which you run MS DOS and other computer
commands.
Math Input Panel Allows you to write and correct free-hand math equations using
your mouse or other pointing device.
Notepad Serves as a simple text editor.
Run Allows you to run commands from the Start menu. Some
commands require elevated or administrative privileges; to run
these commands, use the Run as administrator command.
Snipping Tool Allows you to capture, annotate, and save screen shots.
Sound Recorder Allows you to record sound from different audio devices, such as a
microphone that's plugged into the sound card on your computer.
Sticky Notes Allows you to keep notes on the desktop to help you remember
important items. Available in different colors.
Windows 10 Accessory Programs
Program Description
Sync Center Allows you to sync any folder in your computer with a folder on an
external drive connected to your computers or a network drive.
File Explorer Allows you to access files and folders on your computer, copy and
move items, search for items, and more. This graphical file
management system is built in to many versions of Windows.
Windows Allows you to control many different computer settings, such as
Mobility Center screen brightness, volume, power/battery, WiFi, Bluetooth, sound,
and so on.
WordPad Serves as a word processor, with many more features than Notepad.
Windows 10 Accessory Programs
Program Description
Ease of Access Allows you to open the Ease of Access Center to configure
accessibility options, and gives you access to the speech recognition
feature.
Tablet PC Gives you access to tools to use a tablet PC’s input device.
Windows Media Enables you to play audio and video and display images; rip music
Player from and copy music to compact disks; and burn recordable discs in
Audio CD format or as a data disk.
Windows Opens a command window useful for IT professionals.
PowerShell
Using the Snipping Tool
• A screenshot, also referred to as a snip or screen grab, is a
snapshot of whatever is displayed on the computer screen.
• Snipping Tool is an accessory program that comes with
Windows 10 that allows you to take screen shots, annotate
them, and save them.
Using Windows Media Player
• Windows Media Player 12 is a program that allows you to
play back music and video files and view photos.
• Files stored in your Music, Pictures, and Videos libraries
appear in the Windows Media Player file list by default.
• On a network, you can stream digital media files—audio,
video, or photos—for playback or viewing from another
computer or a server that hosts Windows media files.
Windows Media Player
Windows Media Player can do the following:
• Create Playlists.
• Rip music from CDs to the computer.
• Burn CDs.
• Create Slide show.
• Share media across a network.
Sync Center
• Allows files to be synced between a computer or mobile
devices and a network location.
• Syncing keeps two or more versions of the same file, stored
on a computer and on a network folder, identical to the other
• After syncing is complete, network files can be accessed
without being connected to the resource; referred to as
offline files.
• Changes made to the files while offline will be made to the
files in the network folder when reconnect.
Using Windows Mobility Center
• Windows Mobility Center is a similar to control panel that
(1/2)
gives you access to several laptop settings, from volume to
screen brightness to power options to Wi-Fi and Bluetooth
settings—all in one place.
• Although the settings can be accessed from various icons and
commands within Windows, you can make adjustments from
a single window in Windows Mobility Center.
Using Windows Mobility Center
(2/2)
Configuring Remote Desktop
• Remote Desktop Protocol (RDP) connects to another
(1/2)
computer over a network connection using the same
graphical interface as if you were sitting in front of the
physical server.
• Typically, you would access computers remotely using the
Remote Desktop Connection (RDC), which allows you to
connect to a Remote Desktop Session Host or to a Remote
Application.
Configuring Remote Desktop
• Remote Assistance is a Windows 10 feature that enables an
(2/2)
administrator, trainer, or support person to connect to a
remote user’s computer, chat with the user, and either view all
of the user’s activities or take complete control of the system.
Configuring Remote Management Settings
To enable remote management,
open the System Properties
(Control Panel >
System and Security
>System
>Remote settings)
Computer Management
Microsoft Management Console (MMC)
Collection of administrative tools called snap-ins which are
used for managing hardware, software, and network
components on a computer.
Creating a Custom MMC
Using Windows Remote Management
• Windows Remote Management (WinRM) is a Windows 10
service that enables administrators to execute commands on
remote computers using Windows PowerShell or the
Windows Remote Shell (WinRS.exe) command-line program.
• However, Windows 10 does not start the service by default or
configure the computer to allow remote management
communications.
Using WinRS.exe
• After you have configured the Remote Management service,
you can execute commands on other computers that have
been similarly configured.
• To execute a command from the Windows 10 command
prompt, you must use the WinRS.exe program.
Introducing Windows PowerShell
• Windows PowerShell is a command-line interface used
mainly by IT professionals.
• Enables you to:
Run cmdlets (pronounced command-lets)