Microsoft TS:Windows Server 2008 R2, Desktop Virtualiazation

Size: px
Start display at page:

Download "Microsoft TS:Windows Server 2008 R2, Desktop Virtualiazation"

Transcription

1 Microsoft TS:Windows Server 2008 R2, Desktop Virtualiazation Number: Passing Score: 700 Time Limit: 100 min File Version: 1.0

2 Exam A QUESTION 1 Your franchise company is deploying a Microsoft Virtual Desktop Infrastructure (VDI) on servers that run Windows Server 2008 R2. The franchise owners need access to corporate applications that run on virtual desktops. The owners will use a web browser to connect to the virtual desktops. Web Single Sign-On (SSO) is not required. You need to authorize the Microsoft Remote Desktop (RD) servers for Microsoft RemoteApp and Desktop Connection. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) A. On the RD Session Host server, add the RD Virtualization Host server to the TS Web Access Computers group. B. Add the RD Licensing role service to the RD Web Access server. C. On the RD Connection Broker server, add the RD Web Access server to the Session Broker Computers group. D. On the RD Session Host server, add the RD Web Access server to the TS Web Access Computers group. E. On the RD Session Host server, add the RD Connection Broker server to the TS Web Access Computers group. F. On the RD Connection Broker server, add the RD Virtualization Host server to the Session Broker Computers group. G. Add the RD Licensing role service to the RD Connection Broker server. Correct Answer: DEF Populate the TS Web Access Computers Security Group If the RD Web Access server and the Remote Desktop Session Host (RD Session Host) server that hosts the RemoteApp programs are separate servers, you must add the computer account of the RD Web Access server to the TS Web Access Computers security group on the RD Session Host server AND--- In this step, you will configure RemoteApp and Desktop Connection so that users in the CONTOSO domain can access it by using Remote Desktop Web Access (RD Web Access). Use the following steps to configure RemoteApp and Desktop Connection: Add the RDCB-SRV (RD Connection Broker) computer account object to the TS Web Access Computers security group on RDSH-SRV (RD Session Host). Add a RemoteApp program by using RemoteApp Manager. Add the RDWA-SRV (RD Web Access) computer account object to the TS Web Access Computers security group on RDCB-SRV. Assign a RemoteApp source on the RD Web Access server (RDWA-SRV). Add a RemoteApp source on the RDCB-SRV computer by using Remote Desktop Connection Manager., you must add the RDCB-SRV computer account object to the TS Web Access Computers security group on RDSH-SRV.

3 ---AND--- Configure Security Groups on an RD Connection Broker Server You must configure the following two security groups on the Remote Desktop Connection Broker (RD Connection Broker) server: TS Web Access Computers Session Broker Computers If you have installed and configured a Remote Desktop Session Host (RD Session Host) server to provide redirection to virtual desktops, you must add the computer account for that computer to the local Session Broker Computers group on the RD Connection Broker server. For information about configuring an RD Session Host server for redirection, see Configuring an RD Session Host Server to Provide Redirection to Virtual Desktops. If you have deployed a load-balanced RD Session Host server farm to provide RemoteApp programs through RemoteApp and Desktop Connection, add the computer account for each RD Session Host server in the loadbalanced RD Session Host server farm to the Session Broker Computers group. Note The Session Broker Computers group on the RD Connection Broker server must also contain the computer accounts for any Remote Desktop Virtualization Host (RD Virtualization Host) servers that are hosting virtual machines used for RemoteApp and Desktop Connection. The computer account for an RD Virtualization Host server is automatically added to the Session Broker Computers group when you add the RD Virtualization Host server by using the Remote Desktop Connection Manager tool. For more information, see Add an RD Virtualization Host Server for RemoteApp and Desktop Connection. QUESTION 2 The company has the following profile redirection requirements: A single GPO must be used to perform all redirection. All users' Documents folders must reside on their client computers. Redirection must be based on the membership of five existing AD DS security groups. All five AD DS security groups must be defined with a unique folder redirection path. You need to redirect the users' Pictures folders. Which Group Policy setting should you select? To answer, select the appropriate setting in the answer area. Point and Shoot:

4 Correct Answer: Basic Redirection and Advanced Redirection Basic Redirection and Advanced Redirection are available to all folders listed in the snap-in. You use basic redirection when you store the selected folder in the Group Policy object on the same share for all users. You use Advanced Redirection when you want to redirect the selected folder to a different location based on a security group membership of the user. For example, you would use Advanced Folder Redirection when you want to redirect folders belonging to the Accounting group to the Finance server and folders belonging to the Sales group to the Marketing server.

5 Note If a user is a member of multiple security groups listed for a specific folder, Folder Redirection will use the path of the first security group that matches for the given user. Follow Documents folder The Music, Pictures, and Videos folders support another Folder Redirection setting called Follow Documents folder. The Follow Documents folder setting redirects the Music, Pictures, and Videos folders as subfolders of the Documents folder. This folder redirection will make the selected folder inherit folder redirection options from the Documents folder and disable the folder redirection options for the selected folder. QUESTION 3 A university is deploying folder redirection for the members of the Students, Staff, and Faculty Active Directory Domain Services (AD DS) security groups. All client computers run Windows 7. Currently, there are no redirection policies in place. The IT department requires that members of each security group store data on a separate file server. Each user must have access to only their data from any client computer. You need to enable folder redirection for all of the users. What should you do? A. Deploy a single Group Policy object and use the Grant the user exclusive rights setting. B. Deploy a single Group Policy object and use the Also apply redirection policy to Windows 2000, Windows 2000 Server, Windows XP, and Windows 2003 operating systems setting. C. Deploy a single Group Policy object and use the Advanced - Specify locations for various user groups setting.

6 D. Deploy three Group Policy objects and use the Redirect to the local user profile location setting. Correct Answer: C Basic Redirection and Advanced Redirection Basic Redirection and Advanced Redirection are available to all folders listed in the snap-in. You use basic redirection when you store the selected folder in the Group Policy object on the same share for all users. You use Advanced Redirection when you want to redirect the selected folder to a different location based on a security group membership of the user. For example, you would use Advanced Folder Redirection when you want to redirect folders belonging to the Accounting group to the Finance server and folders belonging to the Sales group to the Marketing server. Note If a user is a member of multiple security groups listed for a specific folder, Folder Redirection will use the path of the first security group that matches for the given user. QUESTION 4 Your company uses Microsoft Remote Desktop Services (RDS) in a virtual environment. The Remote Desktop Licensing (RD Licensing) database has become corrupted. You need to ensure that you can manage the RDS client access licenses (RDS CALs). What should you do first?

7 A. Reinstall the RDS CALs. B. Migrate the RDS CALs from another license server to this license server. C. Rebuild the license server database. D. Reactivate the license server. Correct Answer: A Event ID 47 Remote Desktop License Server Database Availability Event Details Message: The RD Licensing database is corrupt. RD Licensing could not rename the RD Licensing database file "%1!s!" to create a backup. Rename the file manually and restart the Remote Desktop Licensing service. To reinstall the Remote Desktop Services client access licenses (RDS CALs), you will need to call the Microsoft Clearinghouse. When you call the Clearinghouse, ensure that your License Purchase Agreement information is readily available. Resolve Reinstall the RDS CALs onto the license server by using the telephone method To resolve this issue, do the following on the Remote Desktop license server: Rename the RD Licensing database file. Start the Remote Desktop Licensing service. Reinstall the Remote Desktop Services client access licenses (RDS CALs) by using the telephone method. To perform these procedures, you must have membership in the local Administrators group, or you must have been delegated the appropriate authority. QUESTION 5 A company is migrating all of its computers from Windows Vista to Windows 7. You need to use the Microsoft User State Migration Tool (USMT) to migrate user profiles and application customization settings to Windows 7. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder:

8 Correct Answer: Scenario One: PC refresh using a compressed migration store For example, a company has just received funds to update all of its computers to Windows 7. Each employee will keep the same computer, but the operating system on each computer will be updated. 1. An administrator runs the ScanState command-line tool on each computer. ScanState saves each user state to a server. 2. On each computer, an administrator installs the company's standard operating environment, which includes Windows 7, Microsoft Office, and other company applications. 3. An administrator runs the LoadState command-line tool on each computer. LoadState restores each user state back to the source computer. QUESTION 6 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You use a virtual desktop infrastructure (VDI) environment to provide access to applications. AII virtual desktop computer objects are located in an organizational unit (OU) named VirtuaIDesktops. All client computer objects are located in an OU named Desktops.

9 You need to ensure that all existing users receive the same desktop shortcuts, and that they are not able to modify the shortcuts from virtual desktops. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Create a new default user profile. B. Create a Group Policy object (GPO) that configures the user profile. Link the GPO to the VirtuaIDesktops OU. C. Create a Group Policy object (GPO) that configures the user profile. Link the GPO to the Desktops OU. D. Create a mandatory user profile. Correct Answer: BD A mandatory user profile is a special type of pre-configured roaming user profile that administrators can use to specify settings for users. With mandatory user profiles, a user can modify his or her desktop, but the changes are not saved when the user logs off. The next time the user logs on, the mandatory user profile created by the administrator is downloaded. There are two types of mandatory profiles: normal mandatory profiles and supermandatory profiles. User profiles become mandatory profiles when the administrator renames the NTuser.dat file (the registry hive) on the server to NTuser.man. The.man extension causes the user profile to be a read-only profile. User profiles become super-mandatory when the folder name of the profile path ends in.man; for example, \ \server\share\mandatoryprofile.man\. Super-mandatory user profiles are similar to normal mandatory profiles, with the exception that users who have super-mandatory profiles cannot log on when the server that stores the mandatory profile is unavailable. Users with normal mandatory profiles can log on with the locally cached copy of the mandatory profile. Only system administrators can make changes to mandatory user profiles. To create a roaming user profile 1. Open Active Directory Users and Computers. 2. Click the domain and the OU where the user account resides. 3. Right-click the user account for which to set a roaming profile, and then click Properties. 4. Click the Profile tab, and then type the profile path information in Profile path. (Use the full path in each user account. For example, type \\Server\ShareName\UserName.) To create a roaming user profile for a user that has a local profile Open Active Directory Users and Computers. 1. Click the domain and the OU where the user account resides. 2. Right-click the appropriate user account for which to set a roaming profile, and then click Properties. 3. Click the Profile tab, and type the profile path information in Profile path (for example, type \\Server \ShareName\UserName). Additional Policy Settings That Are Related to User Profiles Prevent roaming profile changes from propagating to the server This policy determines if the changes a user makes to their roaming profile are merged with the server copy of their profile. If this policy is set, at logon users receive their roaming profile, but any changes users make to

10 their profile are not merged to the users roaming profile at logoff. Then create a dummy account as described earlier, log on to a desktop machine using this account, preconfigure the desktop, and log off. Log on to the desktop as Administrator and open the User Profiles dialog box as before, using System in Control Panel. Select the local profile for your template account and click on Copy To as before. But this time, in the Copy To box above, type \\<dcname>\netlogon\default User, where <dcname> is the name of your domain controller. Then click on Change and specify Everyone so that any user can use this new profile. Now when you click on OK, your preconfigured profile is copied to the NETLOGON share on your domain controller as a folder named Default User. When a user logs on to the network for the first time, her machine will access this share and use this preconfigured profile as the basis for creating her roaming profile, which is saved in \\<servername>\<sharename> as before. QUESTION 7 Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All client computers run Windows 7. You need to ensure that the current Libraries from users' computers are available when they Iog on to the RD Session Host server. What should you do? A. Redirect each user s Documents folder to a network share. B. Use Group Policy Preferences to copy.library-ms files from the client computers to the RD Session Host server. C. Redirect each user's Links folder to the RD Session Host server. D. Use a startup script to copy.library-ms files from the client computers to the RD Session Host server. Correct Answer: B Administrators can deploy customized libraries in the following ways: Using a logon script or Group Policy Preferences (through the Default User profile) Adding custom libraries to the server where Roaming User Profiles are redirected Deploying through a logon script or Group Policy Preferences You can copy the.library-ms files to a local computer or copy them to a server if the users library directories are redirected to a network location. You can use a logon script or Group Policy Preferences to copy libraries to the %userprofile%\appdata\roaming\microsoft\windows\libraries directory. The locations specified in custom libraries need to be accessible by the target users. These locations include known folders, fixed local folders, mapped drives on the users computers, or network shared resources where users have access. If a user does not have permissions to a folder, that folder does not appear in the library and no warning appears for the user. Using the Default User profile Administrators can edit the set of libraries associated with the Default User profile, and then deploy the libraries to users who derive from Default User. Deploying libraries using Roaming User Profiles Remote libraries can include content from locations that are local or remote to the server, much as local libraries can. To support this, the user s known folders are ideally redirected and available in the Roaming User Profiles. Library definition files are located in the %userprofile%\appdata\roaming\microsoft\windows \Libraries directory, and they can be shared on a server. QUESTION 8

11 Your company has an Active Directory Domain Services (AD DS) domain that runs at the Windows Server 2008 functional level. All servers run Windows Server 2008 R2. AII client computers run Windows XP Professional. You use the Key Management Service (KMS) to manage your volume license activations. AII servers have been activated by using KMS. You deploy 20 Windows 7 virtual desktops. The virtual desktop operating systems do not activate. You need to ensure that the virtual desktops activate by using KMS. What should you do? A. Deploy five more virtual desktops. B. Raise the domain functional level to Windows Server 2008 R2. C. Use the Volume Activation Management Tool (VAMT). D. Run slmgr vbs with the -ato parameter. Correct Answer: A KMS Activation Thresholds KMS can activate both physical computers and virtual machines. To qualify for KMS activation, a network must meet the activation threshold: KMS hosts activate client computers only after meeting this threshold. To ensure that the activation threshold is met, a KMS host counts the number of computers that are requesting activation on the network. For computers running Windows Server 2008 or Windows Server 2008 R2, the activation threshold is five. For computers running Windows Vista or Windows 7, the activation threshold is 25. The thresholds include client computers and servers that are running on physical computers or virtual machines. A KMS host responds to each valid activation request from a KMS client with the count of how many computers have contacted the KMS host for activation. Clients that receive a count below their activation threshold are not activated. For example, if the first two computers that contact the KMS host are running Windows 7, the first receives an activation count of 1, and the second receives an activation count of 2. If the next computer is a Windows 7 virtual machine, it receives an activation count of 3, and so on. None of these computers is activated, because computers running Windows 7 must receive an activation count 25 to be activated. KMS clients in the grace state that are not activated because the activation count is too low connect to the KMS host every two hours to get the current activation count and will be activated when the threshold is met. QUESTION 9 Your company has an Active Directory Domain Services (AD DS) domain. You have multiple Remote Desktop Session Host (RD Session Host) servers. You have 100 Windows Server 2008 R2 Remote Desktop Services client access licenses (RDS CALs) installed on your license server. You need to return 10 RDS CALs to the pool on the license server. What should you do? A. Remove the Per User RDS CALs. B. Remove the Per Device RDS CALs. C. Revoke the Per User RDS CALs. D. Revoke the Per Device RDS CALs. Correct Answer: D

12 A permanent RDS Per Device CAL issued by a license server is configured to automatically expire after a random period between 52 and 89 days, at which time the RDS Per Device CAL returns to the pool of available RDS Per Device CALs on the license server. In some circumstances, you might want or need to return an RDS Per Device CAL that has been issued back to the available pool on the license server before the automatic expiration period has been reached. For example, you might want to do this if the client computer or device is no longer a part of your environment. You can revoke an RDS Per Device CAL by using the Remote Desktop Licensing Manager tool. Important You can only revoke an RDS Per Device CAL. You cannot revoke an RDS Per User CAL. QUESTION 10 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You provide access to some applications through a virtual desktop infrastructure (VDI) environment.aii virtual desktop computers are located in an organizational unit (OU) named VirtuaIDesktops. All other client computer objects are located in an OU named Desktops. Many users experience long logon times when logging into virtual desktop computers due to large roaming profiles. You need to reduce the user logon times for virtual desktop computers. What should you do? A. Create a Group Policy object (GPO) that enables folder redirection for all users. Enable loopback processing, and link the GPO to the VirtuaIDesktops OU. B. On each virtual desktop computer, set a disk quota on the system drive. C. Create a Group Policy object (GPO) that enables folder redirection for all users. Enable slow link detection, and link the GPO to the VirtuaIDesktops OU. D. On each client computer, set the temporary folders option to not use session-specific temporary folders. Correct Answer: A Combine Roaming User Profiles with Folder Redirection When a user gets a roaming user profile, the data and settings that are stored in the user s local profile directories become mobile. The profile data is stored on a server and copied to a workstation when the user logs on. Storing this data on servers simplifies data backup and security. However, because large folders, such as My Documents, are copied, there can be logon delays. You can avoid these delays by using Folder Redirection in combination with Roaming User Profiles. When a user profile folder is redirected to a shared folder on the network, the folder is no longer part of the user profile. While other profile data is copied to the local workstation when the user logs on, the redirected folder remains on the server and is accessed over the network. Limiting use of Group Policy loopback processing if you use roaming profiles The User Group Policyloopback processing mode policy setting is an advanced option that is intended to keep the desktop configuration the same regardless of who logs on. This option is appropriate for use in certain closely managed environments, such as classrooms, public kiosks, reception areas, servers, and terminal

13 servers. When you enable the loopback processing policy setting in a GPO, you can configure user-based policy settings within that GPO, and those settings are applied regardless of which user logs on to the computer, meaning that those settings override individual user settings. When you use the User Group Policyloopback processing mode policy setting, you must ensure that both the computer and user portions of the GPO are enabled. The User Group Policyloopback processing mode policy setting is available in the Computer Configuration\Administrative Templates\System\Group Policy node of the Group Policy Object Editor. By default, the user s Group Policy objects determine which user settings apply. When you enable this policy setting, you also specify either the Replace mode or the Merge mode, which determines the policies that are applied. Replace mode The user settings that are defined in the computer s Group Policy objects replace the user settings that are typically applied to the user. Merge mode The user settings that are defined in the computer s Group Policy objects and the user settings that are typically applied to the user are combined. If the settings conflict, the user settings in the computer s Group Policy objects take precedence over the user s policy settings. If you disable or do not configure the User Group Policyloopback processing mode setting, the user s Group Policy objects determine which user settings apply. QUESTION 11 Your company is deploying 200 Windows 7 Enterprise virtual machines (VMs). The company uses Key Management Service (KMS) for client computer activation. Two servers named Server1 and Server2 are KMS hosts that run Windows Server 2008 R2. After deployment, the VMs are unable to activate on Server1. You need to ensure that the VMs can activate by using KMS. On Server1, which firewall rule should you change? To answer, select the appropriate setting in the answer area. Point and Shoot: Correct Answer:

14 Q. I've enabled Key Management Service (KMS) on a server, but clients can t activate. Why not? A. There s a minimum number of activations before a KMS server will start activating clients. However, if the clients can t even connect, make sure the firewalls on the server and client have the Key Management Service (TCP-In) exception enabled, which allows KMS communications through port 1688 as shown. server-but-clients-can-t-activate-why-not- QUESTION 12 Your company has a Windows Hyper-V environment with existing virtual machines (VMs). You manage the VMs with Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and VMM 2008 R2 Self-Service Portal (VMMSSP) that runs on Windows Server 2008 R2. The company has the following VMMSSP environment requirements: Developers must be able to create and manage VMs on two Windows Hyper-V hosts. Other hosts must not be impacted by the developers' VMs. You need to configure the VMMSSP environment to meet company requirements. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder:

15 Correct Answer: 1. Go to Microsoft System Center => Virtual Machine Manager 2008 and launch the virtual machine administrator console. 2. Create a new group called HyperV by right-clicking All Hosts and selecting New host group. Figure 8: Creating a host group 3. Click on the Hosts button in the left pane and click the Add Hosts link on the right. Notice the Add VMware VirtualCenter Server link. This feature is used to add your VitrtualCenter server to VMM and will be explored in an upcoming article!

16 Figure 9: Adding a host ---AND--- The Virtual Machine Manager (VMM) Self-Service Portal is an optional, Web-based component that a VMM administrator can configure to enable end users to create and manage their own virtual machines within a controlled environment. 4. The VMM administrator limits the scope of self-service users by creating self-service policies. A selfservice policy grants a user or group permissions to create, operate, manage, store, create checkpoints for, and connect to their own virtual machines. QUESTION 13 A company is deploying a Microsoft Virtual Desktop Infrastructure (VDI) for hosting Windows 7 client computers on a server that runs Windows Server 2008 R2 Enterprise. Each device connecting to the VDI needs a license for compliance. The company acquires Windows Server 2008 R2 client access licenses (CALs) for all users. The company does not use Microsoft Application Virtualization (App-V). You need to specify the license types required for the devices that connect to the VDI. Which three license types you should specify? (Each correct answer presents a complete solution. Choose three.) A. Windows Virtual Enterprise Centralized Desktop (VECD) B. RDS Client Access License (CAL) C. Windows 7 Client Access License (CAL) D. Microsoft VDI Standard Suite license E. Microsoft VDI Premium Suite license F. Windows Virtual Desktop Access (VDA) Correct Answer: ADF Microsoft's VECD a mandatory license for virtualization VECD stands for "Virtual Enterprise Centralized Desktop." It's the license that Microsoft requires to use its desktop virtualization. VECD must be purchased in addition to the base Windows operating system license. So if you want to virtualize Windows, you have to buy this VECD license as a second license. If you don't like it -- too bad. Don't use Windows then. (Ah, the joys of a monopoly.)

17 Thin Client Devices Still Need Licensing Certain devices, such as thin clients, are not eligible for Software Assurance and therefore will not have Windows Virtual Desktop Access Rights. You can license such devices with a Windows VDA subscription license. The VDI Standard Suite is a collection of technology to help organizations deploy the basic infrastructure for VDI. Hyper-V Server 2008 R2 is the virtualization platform for hosting your servers and desktops. Management of your virtual infrastructure is taken care of the various system center components, including System Center Virtual Machine Manager, System Center Operations Manager 2007 R2 and System Center Configuration Manager 2007 R2. Applications can be delivered dynamically via App-V, since MDOP is also included in the VDI standard suite. The standard suite also enables restricted use rights for Remote Desktop Services, to deliver VDI desktops to users. overview-and-licensing-tcs/ QUESTION 14 Note: This question is part of s series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. All client computers in a test environment run Windows 7 Enterprise with Windows XP Mode. You are planning to publish a new application on a Windows XP Mode virtual machine (VM). You need to ensure that you can discard all of the changes to the VM by using the least amount of administrative effort. What should you do? A. Merge the disk. B. Compact the disk. C. Create a fixed-size disk. D. Create a differencing disk. E. Create a dynamically expanding disk. F. Enable Integration Features. G. Configure Enable Undo Disks. H. Configure the VM network adapter to Not Connected. I. Configure the VM network adapter to Internal Network. J. Configure the VM network adapter to Shared Networking (NAT). K. Configure the VM network adapter to the physical network adapter. Correct Answer: G Use Undo Disks Undo Disks is a feature that saves changes to a virtual machine in a separate undo disk file in case you want to reverse the changes. The Undo Disks setting applies to all virtual hard disks attached to the virtual machine. When you run a virtual machine that is using Undo Disks, any changes to a virtual hard disk are temporarily stored in an undo disk (.vud) file, rather than in the virtual hard disks attached to the virtual machine. As you continue to make changes to a virtual machine, those changes continue to grow in the undo disk. If you decide to either apply or discard the changes stored in an undo disk, that action applies to all changes stored in the

18 undo disk in other words, you cannot selectively apply or discard changes on an undo disk. To turn the Undo Disks feature on or off If the virtual machine is running or hibernated, shut it down. For instructions, see Shut down a virtual machine manually. 1. Open the Virtual Machines folder. 2. Right-click the name of the virtual machine, and then click Settings. 3. In the left pane of Windows Virtual PC Settings, click Undo Disks. 4. In the right pane, click Enable Undo Disks, and then click OK. After you turn on the Undo Disks feature for a virtual machine, an undo disk stores all the changes associated with that virtual machine from the time that you start using the feature. These changes can include data that you add or delete to a virtual machine, updates applied to the guest operating system or applications, or even the addition or removal of applications. All virtual hard disks attached to the virtual machine are unaffected by the changes unless you apply the changes. To delete the undo disk file, you discard all the changes. This effectively leaves the virtual hard disks intact and eliminates the possibility that the changes will be applied to the virtual hard disk. Refer to the following steps to apply or delete an undo disk. You also can configure the virtual machine so you can choose to discard the undo disk when you close the virtual machine. For more information, see Close a virtual machine. Note. The undo disk file is stored in the same folder as the virtual machine configuration (.vmc) file. To apply or delete an undo disk 1. Follow the steps in the previous section to open the Enable Undo Disks setting. 2. In the right pane, click either Apply changes or Discard changes, and then click OK. QUESTION 15 Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. All client computers in your company run Windows 7 Enterprise and Windows Virtual PC with multiple virtual machines (VMs). A new company security policy states that all VMs must be able to communicate only with other VMs on the same host. You need to ensure that the VMs do not connect to the company's network. What should you do? A. Merge the disk. B. Compact the disk. C. Create a fixed-size disk. D. Create a differencing disk. E. Create a dynamically expanding disk. F. Enable Integration Features. G. Configure Enable Undo Disks. H. Configure the VM network adapter to Not Connected. I. Configure the VM network adapter to Internal Network. J. Configure the VM network adapter to Shared Networking (NAT). K. Configure the VM network adapter to the physical network adapter. Correct Answer: I

19 Configure networking for virtual machines You can configure networking to provide virtual machines with different types of network connectivity. A virtual machine can have as many as four network adapters enabled, each of which can be configured to use a different type of networking. You can use the following types of networking in a virtual machine: Internal network. This option provides networking between virtual machines only. This type of network connection is useful when you want to provide a networking communications channel to the virtual machines on one physical computer while isolating the virtual machines from all external networks, both wired and wireless, as well as the host operating system. <Network adapter name> (on host operating system). This option is sometimes referred to as bridged mode. It uses a physical network adapter to connect the virtual machine to a physical TCP/IP-based network as a separate computer. The virtual machine appears and operates like a separate physical computer on the network. You use this option by selecting the name of the physical network adapter that is connected to the network you want to use. You can choose from both wired and wireless network adapters. Shared networking (NAT). This option is available for the first network adapter in the virtual machine. It allows the virtual machine to share one connection to a physical TCP/IP network with the host operating system. When you use this option, the virtual machine is not listed as a separate computer on the network. This is useful if you regularly move the host between different network configurations, if you want to connect the virtual machine to the Internet through a broadband or dial-up connection used by the host, including a virtual private network (VPN) connection, or if there is a shortage of IP addresses. However, performance is not as fast as the performance offered by bridged mode. If the Windows 7 host uses a wireless WAN (WWAN) device to connect to the Internet and you want a virtual machine to be able to use this connection, you must configure the virtual machine to use shared networking (NAT). QUESTION 16 Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company is deploying Windows XP Mode virtual machines (VMs) to all its Windows 7 client computers. You need to ensure that the VMs are visible to the client computers on the company network. What should you do? A. Merge the disk. B. Compact the disk. C. Create a fixed-size disk. D. Create a differencing disk. E. Create a dynamically expanding disk. F. Enable Integration Features. G. Configure Enable Undo Disks. H. Configure the VM network adapter to Not Connected. I. Configure the VM network adapter to Internal Network. J. Configure the VM network adapter to Shared Networking (NAT). K. Configure the VM network adapter to the physical network adapter. Correct Answer: K

20 Configure networking for virtual machines You can configure networking to provide virtual machines with different types of network connectivity. A virtual machine can have as many as four network adapters enabled, each of which can be configured to use a different type of networking. You can use the following types of networking in a virtual machine: Internal network. This option provides networking between virtual machines only. This type of network connection is useful when you want to provide a networking communications channel to the virtual machines on one physical computer while isolating the virtual machines from all external networks, both wired and wireless, as well as the host operating system. <Network adapter name> (on host operating system). This option is sometimes referred to as bridged mode. It uses a physical network adapter to connect the virtual machine to a physical TCP/IP-based network as a separate computer. The virtual machine appears and operates like a separate physical computer on the network. You use this option by selecting the name of the physical network adapter that is connected to the network you want to use. You can choose from both wired and wireless network adapters. Shared networking (NAT). This option is available for the first network adapter in the virtual machine. It allows the virtual machine to share one connection to a physical TCP/IP network with the host operating system. When you use this option, the virtual machine is not listed as a separate computer on the network. This is useful if you regularly move the host between different network configurations, if you want to connect the virtual machine to the Internet through a broadband or dial-up connection used by the host, including a virtual private network (VPN) connection, or if there is a shortage of IP addresses. However, performance is not as fast as the performance offered by bridged mode. If the Windows 7 host uses a wireless WAN (WWAN) device to connect to the Internet and you want a virtual machine to be able to use this connection, you must configure the virtual machine to use shared networking (NAT). QUESTION 17 Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has a main office and several branch offices. Each branch office is connected to the main office by a low-bandwidth link. You have a virtual hard disk (VHD) that contains Windows 7 and a large amount of data. You delete a significant portion of the data. You need to prepare the existing VHD for deployment to the branch offices while minimizing the deployment time. What should you do? A. Merge the disk. B. Compact the disk. C. Create a fixed-size disk. D. Create a differencing disk. E. Create a dynamically expanding disk. F. Enable Integration Features. G. Configure Enable Undo Disks. H. Configure the VM network adapter to Not Connected.

21 I. Configure the VM network adapter to Internal Network. J. Configure the VM network adapter to Shared Networking (NAT). K. Configure the VM network adapter to the physical network adapter. Correct Answer: B Compacting a dynamically expanding virtual hard disk reduces the size of the virtual hard disk (.vhd) file as much as possible. Typically you would compact a virtual hard disk in situations such as the following: After you install the guest operating system (which uses many temporary files) After you delete large amounts of data When you are preparing the virtual hard disk for archiving, for deployment to another computer or CD-ROM, or for distribution You can compact a dynamically expanding virtual hard disk. You cannot compact any other type of virtual hard disk. However, you can convert a fixed-size virtual hard disk to a dynamically expanding virtual hard disk and then compact the disk. If you want to compact a differencing virtual hard disk or an undo disk, you must merge the changes to the parent disk and then compact the parent disk, if it is a dynamically expanding virtual hard disk. For instructions on converting disks, see Convert a virtual hard disk. For instructions on merging disks, see Merge a virtual hard disk. QUESTION 18 You manage a server that runs Windows Server 2008 R2 with the Remote Desktop Services (RDS) roles. Some applications are accessible through Remote Desktop Web Access (RD Web Access). You need to ensure that a newly installed application is accessible through RD Web Access. Which tool should you use? A. RemoteApp Manager B. Remote Desktops C. Remote Desktop Session Host Configuration D. RD Web Access Configuration E. Remote Desktop Services Manager Correct Answer: A 1. Choose Start, Administrative Tools, Remote Desktop Services, RemoteApp Manager to open its MMC snap-in:

22 Click the A Remote Desktop Connection for This Server Is Not Visible in RD Web Access Change link to open the RemoteApp Deployment Settings dialog with the RD Session Host Server tab active and mark the Show a Remote Desktop Connection check box:

23 ----AND--- To enable users to have access to remote applications is needed to publish them in the RemoteApp Server, as the following procedure. Procedure The first step is to install all applications on RemoteApp that will be available on Server. Is interesting to check with the vendor if the application supports Windows Server 2008 for compatibility issues. After that, click Start> Administrative Tools> Remote Desktop Services and open the RemoteApp Manager. On the right side of the screen click Add RemoteApp Programs, as shown in Figure 1.

24 Figure 1 - Adding an application to the RemoteApp Server Soon will be displayed a to add the application. Click Next. On the next screen you can see a list of all applications available to add. Some of them are native to Windows and the rest are the ones that were installed on the server. Choose programs that will be added and click Next. In the example 2 were added to WordPad and Notepad.

25 Figure 2 - the RemoteApp Programs Available After this, click Next and Finish to confirm the addition. In RemoteApp Manager will be displayed a list of applications that have been added. By default all users that have access to RemoteApp Server can use them. If you need to restrict access to a user group, click the right application and then click Properties. Click the User Assignment tab and add the desired groups. After this procedure, only those groups and / or users of this list will have access to the software.

26 Figure 3 - Users with access to software Users can now access the programs through the RDP connection. For demonstration in Figure 4 and 5 was used the Remote Desktop Web portal access to applications. The user used is a member of the access group added in step one.

27 Figure 4 Remote Desktop Web Portal Figure 5 - Access Group RDS

28 This is not the only way to use the applications. You can also create an MSI file to install an icon on the desktop and start menu containing the access settings or creating a connection to access RemoteApp. QUESTION 19 Your company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You have the following requirements: Local devices from remote desktop clients must be redirected to the RD Session Host server. USB devices from remote desktop clients must not be redirected to the RD Session Host server. What should you do? A. Enable the Prevent installation of removable devices Group Policy setting on the RD Session Host server. B. Disable drive redirection on the RD Session Host server. C. Disable drive redirection on the remote desktop clients. D. Enable the Prevent installation of removable devices Group Policy setting on the remote desktop clients. Correct Answer: A Prevent Installation of Removable Devices You can use this procedure to prevent installation of any removable device. A device is considered removable when its device driver, or the device driver for the bus to which the device is attached, reports that it is a removable device. If this policy is enabled, in addition to preventing installation of the affected devices, it also prevents users from updating the device drivers for already installed devices that match the policy. QUESTION 20 You deploy a Microsoft RemoteApp program on a Remote Desktop Session Host (RD Session Host) server farm. The RD Session Host servers run on Windows Server 2008 R2. When users log in to the RemoteApp program, a list of the local drives of the RD Session Host servers is displayed. Users often save files on local server drives in the Downloads folder and on the server desktop of the RD Session Host servers. You need to ensure that a list of local drives and folders on the RD Session Host servers is not displayed to users. The solution cannot negatively impact performance of the RemoteApp program. Which two actions should you take? (Each correct answer presents part of the solution. Choose two.) A. Modify the registry on each RD Session Host server to hide Favorites and Libraries from the navigation pane. B. Configure the RD Session Host servers to disable redirection of the local device. C. Deploy the Group Policy settings Hide these specified drives in My Computer and Prevent access to drives from My Computer to the RD Session Host servers. D. Deploy the Group Policy settings for a Software Restriction Policy with a security level of Basic User to the

29 RD Session Host servers. Correct Answer: AC The primary reason to remove Favorites and Libraries and access to drives is because they contain mostly accessed locations on a system, so in the case of the RD Session Host server, this includes the desktop, downloads, recent places, etc. It is recommended that a user not save any documents to these locations. Removing Favorites and Libraries You must perform these modifications on the RD Session Host server. You can use the Registry to make these changes. Using the Registry (applies to all users including the administrators) 1. For Favorites, the key is: [HKEY_CLASSES_ROOT\CLSID\{323CA680-C24D-4099-B94D-446DD2D7249E}\ShellFolder] "Attributes"=dword:a Changing a to a will hide Favorites from the navigation pane. 2. For Libraries, the key is: [HKEY_CLASSES_ROOT\CLSID\{031E4825-7B94-4dc3-B131-E946B44C8DD5}\ShellFolder] "Attributes"=dword:b080010d Changing b080010d to b090010d will hide Libraries from the navigation pane. Hiding/Preventing Access to Drives You can use Group Policy settings to hide and restrict access to drives on the RD Session Host server. By enabling these settings you can ensure that users do not inadvertently access data stored on other drives, or delete or damage programs or other critical system files on drive C. The following settings are located in the Group Policy Management Console under User Configuration \Policies\Administrative Templates\Windows Components\Windows Explorer: Hide these specified drives in My Computer. You can remove the icons for specified drives from a user s My Computer folder by enabling this setting and using the drop-down list to select the drives you would like to hide. However, this setting does not restrict access to these drives. Prevent access to drives from My Computer. Enable this setting to prevent users from accessing the chosen combination of drives. Use this setting to lock down the RD Session Host server for users accessing it for their primary desktop. QUESTION 21 Your company runs Remote Desktop Services. You have a Remote Desktop Web Access (RD Web Access) server. You publish several applications on the internal network by using RD Web Access. You need to ensure that the published applications are accessible from the Internet via an HTTPS connection over port 443. What should you do first? A. Use Internet Information Services (IIS) Manager to enable Windows Authentication. B. Use Internet Information Services (IIS) Manager to disable Forms Authentication. C. Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on the RD Web Access server.

30 D. Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Access server. Correct Answer: D Remote Desktop Services in Windows 2008 R2 Part 2 RD Gateway The RD Gateway was formerly known as Terminal Server (TS) Gateway. TS Gateway opened up Remote Access barriers providing access to our Terminal Servers via SSL or port 443, as opposed to the conventional legacy VPN access through either IPSEC or L2TP. In Windows Server 2008 R2, not much has changed and in today s article I will provide you with a step by step guide on configuring your RD Gateway which will provide your remote users access to the Remote Desktop Host or RD Web Access via any Internet connection utilising Remote Desktop Connection client over HTTPS. Checklist: Make RemoteApp Programs Available from the Internet By using RemoteApp together with RD Gateway, you can enable users to connect from the Internet to individual programs on a Remote Desktop Session Host (RD Session Host) server without having to first establish a virtual private network (VPN) connection. Depending on the deployment method that you choose, remote users can connect to a program by opening an.rdp file, by clicking a shortcut to a Windows Installer package on their desktop or Start menu, or by accessing a RemoteApp program through RemoteApp and Desktop Connection by using RD Web Access. Configure the Remote Desktop Web Access Server to Allow Access from the Internet To allow users to access the RD Web Access server from the Internet, you can also deploy RD Gateway. A recommended configuration is to place both the RD Gateway server and the RD Web Access server in the perimeter network, with the Remote Desktop Session Host (RD Session Host) servers that host RemoteApp programs behind the internal firewall. For more information about how to deploy RD Gateway and about how to make RemoteApp programs available from the Internet, see Checklist: Make RemoteApp Programs Available from the Internet. After you have deployed RemoteApp programs, RD Gateway, and RD Web Access, you must configure your firewall to allow Windows Management Instrumentation (WMI) traffic from the RD Web Access server to the RD Session Host server. Additionally, verify that the RD Web Access Web site is configured to use Forms Authentication. To configure the RD Web Access Web site to use Windows Authentication instead of Forms Authentication or to not use SSL, see Remote Desktop Web Access Security. Important The RD Web Access Web site is automatically configured to use Secure Sockets Layer (SSL) with a selfsigned certificate. By default, the self-signed certificate is not a trusted certificate, and self-signed certificates are recommended only for testing and evaluation purposes. For more information about configuring the RD Web Access Web site to use a trusted certificate, such as a certificate issued by a trusted public certification authority (CA), see Remote Desktop Web Access Security. QUESTION 22 Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can print only to the printers that are installed on the RD Session Host server. What should you do?

31 A. Disable the Do not allow client printer redirection Group Policy setting. B. Enable the Do not set default client printer to be default printer in a session Group Policy setting. C. Disable the Do not set default client printer to be default printer in a session Group Policy setting. D. Enable the Do not allow client printer redirection Group Policy setting. Correct Answer: D Do not allow client printer redirection This policy setting allows you to specify whether to prevent the mapping of client printers in Terminal Services sessions. You can use this policy setting to prevent users from redirecting print jobs from the remote computer to a printer attached to their local (client) computer. By default, Terminal Services allows this client printer mapping. If you enable this policy setting, users cannot redirect print jobs from the remote computer to a local client printer in Terminal Services sessions. If you disable this policy setting, users can redirect print jobs with client printer mapping. If you do not configure this policy setting, client printer mapping is not specified at the Group Policy level. However, an administrator can still disable client printer mapping by using the Terminal Services Configuration tool. QUESTION 23 Your company is installing the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All client computers that connect to the RD Session Host run Windows 7. Audio redirection, printer redirection, and clipboard redirection are enforced by a Group Policy object (GPO). Users who connect to the RD Session Host over low-speed broadband report poor performance. You need to configure the Remote Desktop Connection on the client computers for optimal performance over a low-speed broadband connection. The display size and color depth must not be altered. Which tab should you select to configure the appropriate setting? To answer, select the appropriate setting or settings in the answer area. Point and Shoot:

32 Correct Answer: Experience settings The settings that you ll find on the Experience tab, shown in Figure 5, allow you to choose your connection speed and then choose to enable or disable certain graphical enhancement settings that may take a heavy toll on bandwidth. There are four connection speed settings on the drop down list and each setting has a corresponding default set of graphical enhancement settings. However, you can pick and choose the settings you feel you need and your bandwidth can support.

33 Figure 5: When you choose a connection speed, you can choose a set of graphical enhancement settings that are appropriate for your connection s bandwidth. The Desktop Background check box allows the remote system s desktop wallpaper to appear on your remote desktop. Desktop wallpaper will hog a lot of bandwidth and only makes sense for LAN connections. When the Desktop Background check box is unchecked, Remote Desktop displays a blank desktop using the default background color. The next two check boxes allow animation special effects settings to be used during a remote session. If you have a high-speed connection, you can leave these settings enabled. However, both of these settings will add unnecessary drag to your connection, so you may want to turn them off to enhance performance even if you have a high-speed connection. If your office system is using Desktop Themes, you can opt to have them appear in a Remote Desktop session. However, transmitting all the graphics associated with a Desktop Theme will definitely add unnecessary drag to your connection, so you may want to turn it off. Now, the last setting on the Experience tab, Bitmap Caching, allows a Remote Desktop session to cache certain graphical screen elements to reduce the amount of data that must be transferred in order to display the remote system s screen on your client system. This will help with some of the graphical enhancement settings mentioned above, but may not provide significant enough improvement to warrant using the graphical enhancements in low to medium bandwidth situations. QUESTION 24 Your company uses the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All client computers run Windows 7. Company policy restricts users from copying files between a remote computer and a client computer during a Remote Desktop Services session. You need to ensure that the Remote Desktop clients comply with the company policy.

34 Which Group Policy setting should you use? To answer, select the appropriate settings in the answer area. Point and Shoot: Correct Answer: Since Windows 7 and Windows Server 2008 it is possible to copy any files or folders between local and remote computers without disk redirection, just by enabling clipboard redirection (see screenshot under point 1). Do not allow drive redirection This policy setting allows you to specify whether to prevent the mapping of client drives in a Terminal Services session (drive redirection). By default, Terminal Services maps client drives automatically upon connection. Mapped drives appear in the session folder tree in Windows Explorer or My Computer in the format <driveletter> on <computername>. You can use this policy setting to override this behavior. If you enable this policy setting, client drive redirection is not allowed in Terminal Services sessions. If you disable this policy setting, client drive redirection is always allowed. If you do not configure this policy setting, client drive redirection is not specified at the Group Policy level. However, an administrator can still disable client drive redirection by using the Terminal Services Configuration tool.

35 Note Remote Desktop Services in Windows Server 2008 R2 supports redirection of some additional supported Plug and Play devices. These additional supported Plug and Play devices exclude the various kinds of Plug and Play devices that are already supported in other categories, such as Drives, Printers, or Smart Cards. For example, a USB thumb drive that gets installed as a drive letter on the client computer will be listed as available for redirection under the Drives category, and a USB Plug and Play printer attached to the client computer will be redirected under the Printers category. QUESTION 25 A software company is developing two applications (App1 and App2) that will run on multiple versions of Windows operating systems. Both applications are hosted from a Microsoft Remote Desktop Services (RDS) infrastructure that runs on Windows Server 2008 R2. The company has the following requirements: App1 must not display that it is a remote application. App2 is a large application and must minimize overall disk space consumption. The browser has been disabled on client computers. You need to deploy the applications by using RemoteApp. What should you use to deploy the applications? (To answer, drag the appropriate answer from the list of answer choices to the correct location or locations in the answer area.) Select and Place: Correct Answer:

36 QUESTION 26 You manage a server that runs Windows Server 2008 R2 with the Remote Desktop Services role. Your company uses a custom Line-of-Business (LOB) application that generates document files with the ".lob" custom filename extension. The files can be opened only by the LOB client application, which resides on the Remote Desktop Session Host (RD Session Host) server. The application is accessible as a RemoteApp application. You need to enable users to open the RemoteApp application by double-clicking a.lob file on their client computer. What should you do? A. Distribute the URL for the RemoteApp application to the users. B. Deploy a Windows Installer (MSI) package for the RemoteApp application to the client computers. C. Install a custom administrative (ADM) template on the client computers. D. Copy a Remote Desktop Protocol (RDP) package for the RemoteApp application to the client computers. Correct Answer: B At this point you should see the program you chose to deploy as a RemoteApp in the RemoteApp Programs list at the bottom of the RemoteApp Manager. The next step is to create an.rdp or.msi file to run the RemoteApp on your client. The.rdp file will be able to open your RemoteApp when users double-click on it, but it will not associate a file extension with the RemoteApp. To make the file association you need to create an.msi file for your RemoteApp. When you run the.msi file on a compatible client it will setup the file association and create icons (which you can configure). Terminal-Services.htm

37 QUESTION 27 You have an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. The Remote Desktop Services (RDS) environment includes a Remote Desktop Session Host (RD Session Host) server in the LAN environment, and a Remote Desktop Gateway (RD Gateway) server in the perimeter network. You deploy a Remote Desktop Web Access (RD Web Access) server in the perimeter network. You publish a RemoteApp application. The RemoteApp application is not visible to users when they log in to RD Web Access. You need to ensure that authorized users can run RemoteApp applications from RD Web Access. What should you do? A. Allow Windows Management Instrumentation (WMI) communication between the RD Web Access server and the RD Session Host server. B. Restart the World Wide Web Publishing Service on the RD Web Access server. C. Allow Windows Management Instrumentation (WMI) communication between the RD Gateway server and the RD Session Host server. D. Disable Forms Authentication on the Default Web Site on the RD Web Access server. Correct Answer: A Configure the Remote Desktop Web Access Server to Allow Access from the Internet After you have deployed RemoteApp programs, RD Gateway, and RD Web Access, you must configure your firewall to allow Windows Management Instrumentation (WMI) traffic from the RD Web Access server to the RD Session Host server. QUESTION 28 Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You enable Microsoft Word as a RemoteApp application on the RD Session Host server. You need to ensure that the RemoteApp application opens when a user double-clicks a Word (.docx) file on a client computer. Which two actions should you performs (Each correct answer presents part of the solution. Choose two.) A. In the properties of the RemoteApp application, enable the Allow any command-line arguments setting. B. Enable the Associate client extensions for this program with the RemoteApp program setting for the file. C. Create a Windows Installer (.msi) file. D. Create a Remote Desktop Protocol (.rdp) file. Correct Answer: BC At this point you should see the program you chose to deploy as a RemoteApp in the RemoteApp Programs list

38 at the bottom of the RemoteApp Manager. The next step is to create an.rdp or.msi file to run the RemoteApp on your client. The.rdp file will be able to open your RemoteApp when users double-click on it, but it will not associate a file extension with the RemoteApp. To make the file association you need to create an.msi file for your RemoteApp. When you run the.msi file on a compatible client it will setup the file association and create icons (which you can configure). Terminal-Services.htm Creating a Windows Installer Package from a RemoteApp Program To view what file name extensions are associated with a program on the terminal server, click Start, click Control Panel, and then double-click Default Programs. Click Associate a file type or protocol with a program to view the file name extensions and their default associated program. QUESTION 29 Your company has an Active Directory Domain Services (AD DS) domain. You are installing the RD Session Host (RD Session Host) role service in Server Manager on a server that runs Windows Server 2008 R2. The Audio and video playback check box on the Configure Client Experience page is not available. You need to ensure that you can enable audio and video playback for users connecting to the RD Session Host server. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Start the Windows Audio EndPoint Builder service. B. Start the Windows Audio service. C. Install the Desktop Experience feature. D. Install Connection Manager Administration Kit feature. Correct Answer: BC Configure Audio and Video Playback on an RD Session Host Server Audio and video playback allows users to redirect the remote computer s audio in a remote session, and provides an improved experience for video playback in remote sessions. By default, audio and video playback is not allowed when connecting to a computer running Windows Server 2008 R2. Manually configuring audio and video playback To manually configure audio and video playback on a Remote Desktop Session Host (RD Session Host) server, you need to do the following: 1. Install the Desktop Experience feature. 2. Start the Windows Audio service. 3. Enable the Allow audio and video playback redirection Group Policy setting. 4. Set the maximum color depth to 32 bits per pixel. QUESTION 30 You manage a server that runs Windows Server 2008 R2 with SP1 with the Remote Desktop Services role. Users do not have the necessary permissions to install applications on their computers. You install a new application on the server. Users must be able to access the application by double-clicking an

39 icon on their desktops. You need to configure the environment to meet the company requirements. You launch RemoteApp Manager and add the RemoteApp application. Which three actions should you perform next in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder: Correct Answer: You can distribute RemoteApp programs to users several ways. Depending on the method that you choose, users can: Access a link to the program through RemoteApp and Desktop Connection by using RD Web Access. RD Web Access is a Remote Desktop Services role service that lets you make RemoteApp programs available to users through RemoteApp and Desktop Connection. For more information, see Remote Desktop Web Access (RD Web Access). Double-click an.rdp file that has been created and distributed by their administrator. You can create a Remote Desktop Protocol (.rdp) file to distribute RemoteApp programs to users. You can distribute an.rdp file to client computers by using your existing software distribution process, such as

40 Microsoft System Center Configuration Manager, or through a file share. Double-click a program icon on their desktop or Start menu that has been created and distributed by their administrator with a Windows Installer package. You can create a Windows Installer (.msi) package to distribute RemoteApp programs to users. To distribute a Windows Installer package to client computers, you can use your existing software distribution process, such as Microsoft System Center Configuration Manager or Active Directory Group Policy. You can also make the Windows Installer package available through a file share. Double-click a file where the file name extension is associated with a RemoteApp program. If you distribute RemoteApp programs through Windows Installer packages, you can configure whether the RD Session Host server will take over client file name extensions for the RemoteApp program. To create a Windows Installer package 1. On the RD Session Host server, open RemoteApp Manager. To open RemoteApp Manager, click Start, point to Administrative Tools, point to Remote Desktop Services, and then click RemoteApp Manager. 2. In the RemoteApp Programs list, click the program that you want to create a Windows Installer package for. To select multiple programs, press and hold the CTRL key when you click each program name. 3. In the Actions pane for the program or selected programs, click Create Windows Installer Package. QUESTION 31 Your company is planning to use Microsoft Desktop Enterprise Virtualization (MED-V) 1.0 SP1 on servers that run Windows Server 2008 SP2. The company plans to provide virtual desktops for all client computers. You deploy a server to store and distribute virtual machines (VMs). You need to configure the image distribution server for MED-V. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder:

41 Correct Answer: MED-V Installation Prerequisites The following are prerequisites for installing MED-V: Active Directory Requirements Report Database Antivirus/Backup Software Configuration Microsoft Virtual PC 2007 SP1 How to Configure the Image Web Distribution Server An image repository is an optional server that is used for image distribution (where administrators upload new images and client computers check the server every 15 minutes and update their image if a new one is available). An image distribution server requires the following: Internet Information Services (IIS) For information, see Internet Information Services. During the IIS installation, when adding role services, select the following supported authentication methods: Basic Authentication

42 Windows Authentication Client Certificate Mapping Authentication When configuring IIS, include the following: 1. Add a virtual directory, with the alias named MEDVImages. The physical path should point to the location of the images. 2. Enable BITS. 3. Add the following MIME types:.ckm (application/octet-stream).index (application/octet-stream) 4. On the MED-V site, add read permissions to Everyone. 5. Restart IIS. BITS Server Extensions for IIS For information, see Install BITS Server Extensions. Goog guide from MS: QUESTION 32 A company is migrating all of its client computers from Windows XP to Windows 7 Enterprise. The company has a legacy application that does not work in Windows 7. The application only installs a shortcut on the user's desktop. You need to ensure that the application can be launched from the Windows 7 Start menu. Which three actions should you perform in sequence on the client computers? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder: Correct Answer:

43 Windows XP Mode provides a virtual Windows XP Professional with Service Pack 3 (SP3) environment for computers running Windows 7 Professional, Windows 7 Ultimate, or Windows 7 Enterprise. You can use this environment to run your applications for Windows XP directly from the Windows 7 desktop. When you install applications on virtual machines that you use with Windows Virtual PC on Windows 7, you can start these virtual applications directly from the Windows 7 Start menu. This document answers several common questions about publishing virtual applications to the Windows 7 Start menu, explains which virtual applications start automatically when the virtual environment starts, and describes how to troubleshoot common problems with virtual applications published to the Windows 7 Start menu. If you have installed an application on a Windows XP or Windows Vista virtual machine and it does not appear in the Windows 7 Start menu, check the following: Verify that the appropriate Integration Components are installed on the virtual machine. To install Integration Components, start the virtual machine. From the Tools menu of the virtual machine window, click Install Integration Components or Update Integration Components. Verify that the appropriate RemoteApp update is installed on the virtual machine. Verify that Auto Publish is enabled in the virtual machine settings. Open the Virtual Machines folder, select the virtual machine, and click Settings in the toolbar. In the list of settings, click Auto Publish, and verify that Automatically publish virtual applications is selected. If it is not selected, you must shut down the virtual machine (if it is running), change the setting, and then start the virtual machine again. Verify that the application was installed in the %ALLUSERSPROFILE%\Start Menu\Programs\ directory. If it was installed in a different location, it will not appear in the Windows 7 Start menu unless you create an application shortcut in the All Users profile. QUESTION 33 You are using Microsoft Enterprise Desktop Virtualization (MED-V) 2.0 to manage URL redirection in a MED-V workspace. You need to ensure that all new URLs are redirected to the MED-V workspace. Which two actions should you perform? (Each correct answer presents a complete solution. Choose two.) A. Use Group Policy to edit the system registry value RedirectUrls with updated URL redirection information. B. Use the MED-V Workspace Packager to rebuild and redeploy the existing MED-V workspace package with updated URL redirection in formation. C. Use the MED-V Workspace Packager to build and deploy a new MED-V workspace package with new URL redirection information. D. Use Group Policy to edit the system registry value UrIAllowList with updated URL redirection information. Correct Answer: AB

44 How to Add or Remove URL Redirection Information in a Deployed MED-V Workspace To edit URL redirection information in a deployed MED-V workspace, we recommend that you update the system registry by using Group Policy. Although we do not recommend it, you can also rebuild and redeploy the MED-V workspace with the updated URL redirection information. The registry key is usually located at: Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MEDV\v2\UserExperience The following multi-string value must be present: RedirectUrls The value data for RedirectUrls is a list of all of the URLs that you specified for redirection when you built the MED-V workspace package by using the MED-V Workspace Packager. For more information, see Create a MED-V Workspace Package OR-- 1: UPDATE URL REDIRECTION INFORMATION USING GROUP POLICY 7.1 Managing URL Redirection After you deploy a MED-V workspace you can use the MED-V Workspace Packager to add or remove URL redirection in the MED-V workspace. <..> METHOD 2: UPDATE URL REDIRECTION INFORMATION USING GROUP POLICY Note: This method will overwrite any current settings for URL Redirection so all of the current URLs would need to be included unless the intent is in removal. 1. Launch GPMC.MSC on your Domain Controller. 2. Expand Domains, yourdomain, Group Policy Objects. 3. Right-click Group Policy Objects and click New. 4. In the Name field, enter MED-V Web Redirection and click Ok. 5. Right-click MED-V Web Redirection and select Edit. 6. Under Computer Configuration, expand Preferences, Windows Settings. 7. Right-click Registry and select New, Registry Item. 8. Set Action to Replace. Set Hive to HKEY_LOCAL_MACHINE, Set Key Path to SOFTWARE\Microsoft \Medv\v2\UserExperience, Set Value Name to RedirectUrls, Set Value type to REG_MULTI_SZ. In Value data enter and click Ok. 9. Close the Group Policy Management Editor window. 10. Under Group Policy Objects, drag-and-drop the MED-V Web Redirection GPO to the OU that contains the MEDVADMIN machine. Open Internet Explorer and browse to Notice that the web page opens within the Internet Explorer 6 browser from the MED-V workspace OR --- 2: Create a Workspace Deployment Package Perform the following steps on the MEDVADMIN computer: 1. Open the MED-V Workspace Packager, click Start\All programs\microsoft Enterprise Desktop Virtualization\MED-V Workspace Packager. 2. On the MED-V Workspace Packager main panel, click Create a MED-V Workspace Package. <..> h. Web Redirection: i. URL redirection contains those URLs that you want redirected from the host computer to Internet Explorer 6 in the MED-V workspace. When you are using the packaging wizard to create the MED-V workspace, you type, import or copy and paste this redirection information. Enter each web address on a single line. For example:

45 ii. Select Do no change the Internet zone security level and Remove default browsing capabilities and click Next. Deploying the MED-V Workspace After you have created your MED-V installer package, you can deploy it throughout your enterprise by using your company s preferred method of provisioning software and other applications or manually. QUESTION 34 AII client computers on your network run Windows 7 Enterprise. You are deploying Windows XP Mode images on the Windows 7 computers. You need to copy data to a folder within a Windows XP Mode image without starting the virtual machine (VM). Which tool should you use first? A. Disk Management B. Device Manager C. fdisk.exe D. Disk Cleanup Correct Answer: A One tool that comes with Windows 7 is very handy when customizing Windows XP Mode images, however. That tool is Diskpart. By using Diskpart, you can attach a Windows XP VHD to the computer, add or remove files from the image, and then detach the VHD from the computer. You can also use the Disk Management to attach the Windows XP VHD: On the Start menu, type disk management, and click create and format hard disk partitions. Click Action and click Attach VHD. In the Location box, type the path and file name of the VHD you want to edit or click Browse to open the file. Click OK to mount the VHD to a drive letter (Figure 1).

46 Figure 1. An attached VHD By using Windows Explorer and other tools, edit the VHD as necessary. For example, you can add files to the VHD, edit a settings file, or even delete files from the VHD. In the Disk Management console, right-click the attached VHD, and click Detach VHD. Click OK to confirm that you want to detach the VHD. QUESTION 35 You are planning to deploy Windows 7 client computers in a virtual environment. Company policy states that all deployments must be to known computers. You need to deploy the virtual desktop images in the virtual environment while meeting the company policy. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder:

47 Correct Answer: You can find the server GUID from the VM config XML file. Usually the XML file is named as the VM Name. And you will find the config file in the Virtual Machine folder. But if you have not changed the default path for the virtual machine config folder in Hyper-V Management console you will end up having all XML config files in the same folder. Then it will be difficult to find out which file is pointing to which server. Here are some easy methods to find out all virtual machines, their operational state, and their process ID & GUID. All these information are usually stored in WMI namespace root\virtualization & class msvm_computersystem. So we are going to query the WMI namespace & retrieve all these info. Using Powershell Get-WmiObject -Namespace root\virtualization -class msvm_computersystem select elementname, operationalstatus, processid, name ft -auto

48 To prestage client computers by using the Windows interface On the server running Active Directory Users and Computers, open the Active Directory Users and Computers MMC snap-in (click Start, click Run, type dsa.msc, and then click OK). Note To manage the server remotely, you can install AD DS Snap-Ins and Command-Line Tools in Remote Server Administration Tools. To do this, click Add Features in Server Manager, and install the feature from the following location: Remote Server Administration Tools>Remote Administration Tools>AD DS and AD LDS Tools>AD DS Tools>AD DS Snap-Ins and Command-line Tools. In the console tree, right-click the organizational unit that will contain the new client computer. Click New, and then click Computer. Type the client computer name, click Next, and then click This is a managed computer. In the text box, type the client computer's media access control (MAC) address preceded with twenty zeros or the globally unique identifier (GUID) in the format: {XXXXXXXX-XXXX-XXXX-XXX-XXXXXXXXXXXX}. Click Next, and click one of the following options to specify which server or servers will support this client computer: Any available remote installation server The following remote installation server Click Next, and then click Finish. Windows Deployment Services uses two basic image types, both of which use the Windows Image (.wim) file format: Install image: The operating system image that you deploy to the client computer. To create install images using Windows Deployment Services, you must first create a capture image. Boot image: The Microsoft Windows Preinstallation Environment (Windows PE) image that you boot a client into before you install the install image. To install an operating system, you first boot the computer into the boot image, and then you select the install image to install. You can also create two additional types of boot images: Capture image: A type of boot image that you boot a client computer into to capture the operating system as a.wim file. You must first create a capture image when you are creating custom install images. Discover image: A type of boot image that you can use to install an operating system on a computer that is not Pre-Boot Execution Environment (PXE) enabled. When you boot a computer into a discover image, a Windows Deployment Services server will be located, and then you can choose the install image you want to install. QUESTION 36 Your company has an Active Directory Domain Services (AD DS) domain. AII servers run Windows Server 2008 R2. AII client computers run Windows 7. You use Microsoft Enterprise Desktop Virtualization (MED-V) to support client virtualization requirements. You need to ensure that all MED-V virtual machine (VM) images can be centrally stored and are available to all client computers. What should you do? A. Install and configure IIS on a member server.

49 B. Install and configure Microsoft SQL Server 2008 on a member server. C. Configure a shared folder on a member server. D. Create a single workspace for all client computers. Correct Answer: A MED-V Installation Prerequisites The following are prerequisites for installing MED-V: Active Directory Requirements Report Database Antivirus/Backup Software Configuration Microsoft Virtual PC 2007 SP1 How to Configure the Image Web Distribution Server An image repository is an optional server that is used for image distribution (where administrators upload new images and client computers check the server every 15 minutes and update their image if a new one is available). An image distribution server requires the following: Internet Information Services (IIS). During the IIS installation, when adding role services, select the following supported authentication methods: Basic Authentication Windows Authentication Client Certificate Mapping Authentication When configuring IIS, include the following: 1. Add a virtual directory, with the alias named MEDVImages. The physical path should point to the location of the images. 2. Enable BITS. 3. Add the following MIME types:.ckm (application/octet-stream).index (application/octet-stream) 4. On the MED-V site, add read permissions to Everyone. 5. Restart IIS. BITS Server Extensions for IIS For information, see Install BITS Server Extensions. Goog guide from MS: QUESTION 37 Your company has a Windows 7 image named WinImage with an image index of 5. All images are stored in C: \Mount. An update named Critical1 has been released and must be applied to all new Windows 7 deployments. You need to add the update to the image.

50 Which three commands should you run in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder: Correct Answer: Apply Updates to an Image Using DISM Although the recommended method of applying packages and updates to a Windows Embedded Standard 7 image is by creating a Configuration Set and then using Deployment Imaging Servicing and Management (DISM) to install that configuration set, DISM can be used to install individual updates to an image as well. This method some additional risks and is not recommended. Note: You can only use DISM to apply an.msu file to an offline image. For online images, you must use Windows Update Standalone Installer or create a configuration set or answer file for use with DISM. Apply an update package to an offline image 1. Create a directory on your development computer and mount your image to that directory by typing the following at the a command prompt: MD C:\MyDir\Mount DISM \Mount-Wim /Wimfile:E:\images\myimage.wim /index:1 /Mountdir:C:\MyDir\Mount

51 2. Apply the update package (.msu) file by typing the following at a command prompt, replacing <file_path> with the full path to the configuration set: DISM /image:c:\mydir\mount /Add-Package /Packagepath:<file_path> 3. Unmount the image and commit your changes by typing the following at a command prompt: DISM /Unmount-Wim /Mountdir:C:\MyDir\Mount /Commit QUESTION 38 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. AII client computers run Windows 7. Your environment includes Microsoft Enterprise Desktop Virtualization (MED-V). You use MED-V to support temporary test environments. You need to ensure that the disk space used by obsolete Workspaces is automatically minimized. Which two actions should you performs? (Each correct answer presents part of the solution. Choose two.) A. Set an expiration date for the Workspace. B. Configure automatic deletion of the Workspace. C. Specify the number of image versions to keep. D. Configure the Workspace as revertible. Correct Answer: AB Workspace Expiration Options Using the MED-V Management Console, Workspace expiration options are set in the General section of the deployment tab. Expiration options can be set on a per-user or per-group basis. When the workspace expiration date is set, it takes effect for the workspace during the next policy refresh (which is on login, every 15 minutes, or manually through the system tray). If a workspace is active, and the workspace expiration occurs, it will not affect an active workspace session. But once the workspace stops in that case, the workspace will no longer be made available to the user. Workspace Deletion Options An additional option is made available for determining the behavior of workspace images on the client under certain configuration parameters. These include when the workspace is expired, when the workspace is offline for a certain amount of time, or the workspace has been disabled. These options were primarily designed for revertible workspaces in that deletion of persistent workspaces are often only used for added security of normally connected workspaces. If a parameter triggering workspace deletion has occurred and the workspace is currently running, the deletion will take place once the workspace is stopped. It is important to note only the images (all versions) beneath C:

52 \MED-V Images\<IMAGENAME> will be deleted and not pre-staged CKM images. The Behavior Note that it is important that you understand the behavior from a user s standpoint. If the user is attempting to start a MED-V Workspace, he may receive a message stating that there are no workspaces available, or he may see a list of workspaces but the one the user is looking for is not available. This usually means one of the following: The workspace has not been enabled for the user The workspace is enabled but has expired Users will receive no warning prior to expiration. In addition, users will not receive any notice once the workspace has expired. Tip by J.C. Hornbeck, a System Center Knowledge Engineer at Microsoft. Among other duties, J.C. Hornbeck manages a variety of TechNet blogs, including The Microsoft Enterprise Desktop Virtualization (MED-V) Blog. Check it out for more information on Microsoft Application Virtualization. QUESTION 39 You use Microsoft Enterprise Desktop Virtualization (MED-V) 2.0 workspaces to provide a virtual desktop environment for all the users in your company. All servers run Windows Server 2008 R2. The virtual environment becomes inconsistent when workspace policies are deployed. To fix the inconsistencies, you need to change a value in the search path for MED-V 2.0. What should you do? A. Change the value under the HKLM\Security registry key. B. Modify the Config.ini file on the MED-V server. C. Change the value under the HKLM\Software registry key. D. Modify the Web.config file on the MED-V server. Correct Answer: C After you have deployed your MED-V workspaces, you can change certain MED-V configuration settings by editing the registry entries.

53 MED-V uses the following search path when looking for the resultant settings values: MED-V first looks in the machine policy. If the value is not found, MED-V looks in the user policy. If the value is not found, MED-V looks in the HKEY_LOCAL_MACHINE\System hive. If the value is not found, MED-V looks in the HKEY_CURRENT USER registry hive. If the value is still not found, MED-V uses the default. A general best practice is to set the value in the HKEY_LOCAL_MACHINE\System hive or in the machine policy. But if you want the end user to be able to configure a particular setting, then you should leave it out. Most settings is stored at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Medv\v2\ hive. QUESTION 40 Your company has an Active Directory Domain Services (AD DS) forest with a single domain. All servers run Windows Server 2008 R2. AII client computers run Windows 7 Enterprise. You deploy Microsoft Enterprise Desktop Virtualization (MED-V) in the environment. After deployment, you are unable to connect to the MED-V environment. You need to ensure that firewalls allow connections to the MED-V environment. Which port should you open in the firewalls? A. 143 B C D E. 464 F Correct Answer: B One port, that is needed to distribute (and deploy) MED-V packages is the HTTP/HTTPS port (TCP 80). Second port, that is needed for operations between MED-V Host Agent and MED-V Server is the RDP (TCP 3389). : When a user starts a MED-V seamless application from the host, an instance of VMSAL.exe is launched to initiate, monitors, and controls the application. An in-process ActiveX control, MSTSCAX.dll, actually acts as the RDP client. VMSAL.exe will create a named pipe to connect to the appropriate RDP server service on the VM guest and specifies port TCP port 3389 as the target server port on the guest. PS. Port TCP 8051 was set "for example" in one of technet's guides. See archive/2009/07/21/full-guide-to-med-v-server-settings.aspx QUESTION 41 You manage a Microsoft Application Virtualization (App-V) environment. Users report that they receive an error when they use a sequenced application. You trace the problem to a registry value present in the sequenced application.

54 You need to modify the Open Software Description (OSD) file for the sequenced application to reconfigure this registry value. Which two actions should you perform? (Each correct answer presents a complete solution. Choose two.) A. Configure settings on the Files tab in the Sequencer. B. Configure settings on the OSD tab in the Sequencer. C. Update the OSDSourceRoot registry value on the client with the new registry values. D. Configure settings on the Properties tab in the Sequencer. E. Use a text editor to manually edit the OSD file. Correct Answer: BE There s basically two ways for you to add script into your existing package; using OSD Editor in the Sequencer or editing OSD files directly with suitable text editor (I prefer Notepad++ which is very able and, best of all, a free text editor; just remember to add OSD as custom extension into style configurator configuration so it will automatically use XML highlighting for OSD files). Application Virtualization Sequencer Console Overview The following tabs are displayed when you view a virtual application in the App-V Sequencer Console: <...> OSD Displays information about the Open Software Descriptor (OSD) associated with the virtual application. You can update the files associated with the OSD file by right-clicking the appropriate entry and selecting the action that you want. QUESTION 42 Your company is deploying a third-party application named App1 by using Microsoft Application Virtualization (App-V) 4.6. App-V 4.6 SP1 has not been installed in the environment.

55 All App-V deployments must conserve memory when possible. You need to sequence the application for deployment. Which six actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder: Correct Answer: Sample Sequencing This section describes some of the key points to remember during sequencing. To begin open the Application Virtualization Sequencer and select Create a Package from the Welcome Screen. 1. Welcome Screen

56 2. Package Information 3. Advanced Options When advanced options are selected in the package information screen, the Sequencer will be presented with options for Microsoft Update and Rebasing DLLs. 4. Monitor Installation After the package information has been collected, the next step is to monitor the installation of the application.

57 Selecting Begin Monitoring will prompt for an installation directory. Next, the virtual environment will be built and the Sequencer will start monitoring specific locations and processes for activity. In App-V 4.6, one change is that the Monitor Installation page will not minimize after choosing to Begin Monitoring. After selecting Begin Monitoring, most operations will be recorded as part of the package, unless a specific exception has been configured on the Sequencer. After you click Begin Monitoring you will be prompted to create the installation folder. In version 4.2 this was done when you clicked Stop Monitoring. 5. Configure Applications 6. Launch Applications 7. Package Deployment 8. Saving the Package The last step in the process of sequencing is to save the package. Saving the package should be done to a different directory than the installation of the application(s).

58 46_Sequencing_Guide_Final.docx QUESTION 43 You manage applications that are deployed with Microsoft Application Virtualization (App-V). A software vendor has released a new plug-in for a sequenced application. You need to update the parent application with the new plug-in. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder: Correct Answer:

59 How to Upgrade an Existing Virtual Application You can upgrade an existing virtual application to a new version by using the Application Virtualization (App-V) Sequencer. The upgrade process is similar to creating a new virtual application. You must open the existing virtual application for an upgrade, make the necessary updates, and then save the updated virtual application to a new location in the package root directory. You can also use the App-V Sequencer Console to make changes to an existing virtual application without performing an upgrade. However, you cannot make modifications to the virtual application s file system by using this method because the App-V Sequencer does not actually decode the associated.sft file. For example; you can open an existing virtual application in the App-V Sequencer Console by selecting Open on the File menu. You can update the Package Name and the associated Comments, and you can make changes to the virtual file system and virtual registry. You can also create a Windows Installer file. To upgrade an existing virtual application 1. To start the App-V Sequencer Console, on the computer running the App-V Sequencer, select Start/ Programs/Microsoft Application Virtualization/Microsoft Application Virtualization Sequencer. 2. To open the existing virtual application, in the App-V Console, select File/Open for Package Upgrade. Use the Open For Package Upgrade dialog box to locate the associated SPRJ file you want to open for upgrade. 3. To specify the location of where the package will be decoded, click Browse For Folder and specify the Q:\. This is the location where the package root directory will be created as specified in the associated SFT file. When you create the updated version of the package, it will be denoted with a sequential addition to the directory name for example,.1 will be added to the directory name located on the Q:\ drive. 4. To open the Sequencing Wizard, select Tools/Sequencing Wizard. On the Package Information page, optionally specify the new Package Name and add optional comments that will be associated with the updated virtual application. Click Next. 5. On the Monitor Installation page, to begin monitoring the new installation, click Begin Monitoring. After the virtual environment has finished loading, install the updated version of the application, or apply updates to the existing application. After you have finished updating the virtual application, click Stop Monitoring, and then click Next. 6. On the Additional Files to Map to Virtual File System (VFS) page, to specify additional files to be added to the Virtual File System (VFS), click Add. Browse to the file you want to add, and click Open. To clear existing files that have been added, click Reset, and then click Next. 7. On the Configure Applications page, configure the shortcuts and file type associations that will be associated with the updated virtual application. Select the element you want to update, and then click Edit Locations. Specify the configurations in the Shortcut Locations dialog box, and then click Next. 8. On the Launch Applications page, to start the application to ensure that the package is optimized for streaming, select the package and click Launch. This step is useful for configuring how the application initially runs on target computers and for accepting any associated license agreements before the package is made available to clients. If there are multiple applications associated with this package, you can select Launch All to open all of the applications. To sequence the new version of the virtual application, click Next. 9. To finish and to close the Sequencing Wizard, on the Sequence Package page, click Finish. 10. After you have successfully updated the virtual application, to save the package, in the App-V Sequencer Console, on the File menu, select Save. The virtual application can be accessed in the directory specified in step 3.

60 Expand the parent package to the local system and select the.sprj file. Install the plug-in. - We do not need to expand something. Save the package as a new package by using a package accelerator. - MS doesn't mention about "accelerators". QUESTION 44 Your company has a single domain Active Directory Domain Services (AD DS) forest. All servers run Windows Server 2008 R2. All client computers run Windows 7. You install a Microsoft Application Virtualization (App-V) management server. Your company policy requires that the information transmitted between the clients and the App-V server must be secured with Transport Layer Security (TLS). You need to install a certificate on the App-V server. Which type of certificate should you install? A. PKCS# 10 B. X.509 v2 C. X.509 v3 D. X.521 Correct Answer: C Installing App-V Management Server or Streaming Server Securely Note: Installing or configuring an App-V Management or Streaming Server to use enhanced security (for example, Transport Layer Security, or TLS) requires that an X.509 V3 certificate has been provisioned to the App-V server. --- OR --- Configuring Certificates to Support Secure Streaming By default, the App-V service runs under the Network Service account. However, you can create a service account in Active Directory Domain Services and replace the Network Service account with the Active Directory Domain account. The security context under which the service runs is important for configuring enhanced secure communications. This security context must have read permissions for the certificate private key. When a PKCS#10 Certificate Signing Request (CSR) is generated for the App-V server, the Windows Cryptographic Service Provider is called and a private key is generated. The private key is secured with permissions given to the System and Administrator accounts only. QUESTION 45 Your company has a single-domain Active Directory Domain Services (AD DS) forest. All servers run Windows Server 2008 R2. You are implementing a Microsoft Application Virtualization (App-V) environment. You need to configure the servers that run Windows Server 2008 R2 to support App-V installations. Which server role should you install? To answer, select the appropriate setting in the answer area.

61 Point and Shoot: Correct Answer:

62 3 App-V Server Deployment 3.1 Pre-installation Create AD groups Create the following groups in AD App-V Admins App-V Users Create content share Create shared folder on the management servers and share them with the below permissions for NTFS and share permissions App-V_admins: Full control App-V_users: read only Msappv: read only Network Service: Read permission install management server prerequisites Install IIS 7 and make sure the below are selected ASP.NET (and all its required role services and features) Windows Authentication IIS Management Scripts and Tools IIS 6 Management Compatibility

63 Install and wait for the installation to complete and click close Install.Net framework from features from add new feature wizard install management server QUESTION 46 You use Microsoft Application Virtualization for Desktops to virtualize applications for client computers. A virtual application that was installed by using a Windows Installer Package (.msi) file has become corrupted. You need to restore access to the virtual application. Which two actions should you perform? (Each correct answer presents a complete solution. Choose two.) A. Reinstall the virtual application package.

64 B. Reload the virtual application package. C. Use the Repair function in the Windows Installer Package. Use the Microsoft Application Virtualization (App- V) to re-sequence the application. D. Use the Microsoft Application Virtualization (App-V) Sequencer to edit the virtual application package. Correct Answer: AB 1: RE-LOAD PACKAGE FROM Application Virtualization Client Management Console: How to Load or Unload an Application You can use the following procedures to load or unload an application from the cache, directly from the Results pane of the Application node in the Application Virtualization Client Management Console. When you select this node, the Results pane displays a list of applications. Note: When you load or unload a package, all the applications in the package are loaded into or removed from cache. When loading a package, if you do not have adequate space in cache to load the applications, increase your cache size. For more information about cache size, see How to Change the Cache Size and the Drive Letter Designation OR : Remove and Install an MSI-PACKAGE (which automatically re-load app-v package) Stand-Alone Mode with MSI The App-V 4.5 Sequencer supports creating an MSI during the sequencing process. This process does not have a formal publishing or streaming procedure. This MSI will contain the ICO, OSD, and Manifest.xml files that are necessary for publishing the application on the machine it is run from and how to import the SFT file into the App-V client cache. The package file (SFT) is not part of the MSI that is generated during sequencing and will need to be in the same directory as the MSI to successfully complete by default. In some scenarios it may be necessary to place the SFT files at an alternate location like a file server. In this scenario the administrator could use the SFTPATH parameter to specify an alternate location of the SFT file. This would not require the SFT file to be in the same directory as the MSI. In Standalone mode the package will be published and the SFT file contents will be loaded into the client cache completely. The following command shows how to install an MSI based package when the SFTFILE is located on a file server. Msiexec.exe /i \\PathToMsi\packagename.msi SFTPATH=\\server\share\package.sft /q Streaming Mode with MSI Another option is to use MSI based packages but choose to stream the SFT file contents from an App-V Server, file server, or local file location. In this scenario the package will be published, but the SFT file will be streamed to the App-V client cache. The process of streaming the SFT will be done by default as part of the installation of the MSI, but could optionally be configured to happen when the user launches the application the first time. Source: App-V Application Publishing and Client Interaction Copyright 2008 MICROSOFT CORPORATION --- NOT --- Use the Repair function in the Windows Installer Package. Use the Microsoft Application Virtualization (App-V) to re-sequence the application. - it is WRONG. Repair function of MSI-package not reload SFT-package. But you can choose Repair function of Client Management Console: How to Repair an Application To repair a selected application, you can perform the following procedure directly from the Results pane of the Application node in the Application Virtualization Client Management Console. When you repair an application,

65 you remove any custom user settings and restore the default settings. This action does not change or delete shortcuts or file type associations, and it does not remove the application from cache NOT--- Use the Microsoft Application Virtualization (App-V) Sequencer to edit the virtual application package. - it is WRONG. Question about user's side, not server's side. QUESTION 47 Your company has servers that run Windows Server 2008 R2 with Microsoft Application Virtualization (App-V) and Microsoft System Center Configuration Manager (ConfigMgr) Your company creates a new internal department and purchases new client computers for the department's employees. The new client computers are pre-loaded with the App-V and ConfigMgr client applications. You have sequenced a new custom line-of-business (LOB) application in App-V. You need to deploy the LOB application to the new department's client computers. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of answer choices to the answer area and arrange them in the correct order.) Build List and Reorder: Correct Answer: You need at least SCCM 2007 R2 to work with APP-V

66 QUESTION 48 All client computers in a company run Windows 7 Enterprise. The company is deploying a 4.1-GB application named App1 by using Microsoft Application Virtualization (App-V). The App-V Sequencer configuration dialog box is shown in the graphic in the work area. You need to ensure that you can deploy the application only to client computers that run all versions of Windows 7. Which options should you select in the App-V Sequencer? (To answer, drag the appropriate solution from the list of answer choices to the correct location or locations in the answer area.) Select and Place: Correct Answer:

67 Operating Systems Use the Operating Systems controls to specify the application's operating system requirements. If an Application Virtualization Desktop Client cannot support any of the selected operating systems, the application will not start. Compression Algorithm Use to select the method for compressing the SFT file for streaming across a network. Select one of the following compression methods: Compressed Specifies that the SFT file be compressed in the ZLIB format. QUESTION 49 Your company plans to deploy Microsoft Application Virtualization (App-V) 4.6 applications from servers that run Windows Server 2008 R2. The App-V applications will be streamed to the following computers: 10,000 client computers within the corporate office firewall 1,000 client computers in a field office that is connected to the corporate site via a limited-capacity and highlatency WAN Individual client computers connecting via the Internet without the use of a virtual private network (VPN) The company has the following deployment requirements: All application publishing must be accomplished from one place. WAN usage must be minimized. CPU usage of client computers must be minimized when possible. A minimum number of ports must be opened on the corporate firewall for inbound Internet connections. You need to deploy streaming solutions to the corporate office and field office. You also need to select the appropriate protocol for client connections. Which solution should be deployed at the corporate and field office, and which protocol should be used for client computers at each location? (To answer, drag the appropriate solution from the list of answer choices to the correct location or locations in the answer area.)

68 Select and Place: Correct Answer: QUESTION 50 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All portable computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App-V). You are deploying servers to five new branch offices. Each branch office has its own subnet, and will stream virtual applications from a local IIS server. Users frequently move between branch offices with their portable

69 computers. You need to ensure that branch office users access virtualized applications only from the local IIS server. What should you do? A. Create a single DNS A record and configure an HTTP host header for each IIS server. B. Create five DNS CNAME records with the same name. Point each CNAME record to a single IIS server. Disable the netmask ordering option. C. Create a single DNS SRV record that contains all servers. D. Create five DNS A records with the same name. Point each A record to a different IIS server and disable the round robin option. Correct Answer: D Configuring Subnet Prioritization If the resolver receives multiple A resource records from a DNS server, and some have IP addresses from networks to which the computer is directly connected to, the resolver orders those resource records first. This reduces network traffic across subnets by forcing computers to connect to network resources that are closer to them. Subnet prioritization prevents the resolver from using the round robin feature, defined in RFC Using the round robin feature, the server rotates the order of resource record data returned in a query answer in which multiple resource records of the same type exist for a queried DNS domain name. You can also change the round robin setting from the registry; however, do so from the DNS snap-in instead. If Enable round robin is selected (the default) and the value of LocalNetPriority is 1, the server rotates among the A resource records that it returns in the order of their similarity to the IP address of the querying client.if Enable round robin is deselected and the value of LocalNetPriority is 1, the server returns the records in local net priority order. It does not rotate among available addresses. QUESTION 51 You manage servers that run Windows Server 2008 R2 and Microsoft Application Virtualization (App-V). You configure a Group Policy object to allow disconnected operations. However, users are unable to run some cached applications while they are disconnected from the network. You need to allow users to run any cached application, even if they have not run the application before, while they are disconnected from the network. Which Group Policy setting should you modify? To answer, select the appropriate setting in the answer area. Point and Shoot:

70 Correct Answer: If you plan to use the Microsoft App-V Stand-Alone Mode some Registry Settings are required for the Application Virtualization Client as described in detail on this App-V site here. But instead of setting these registry keys manually or through a custom script, you can also manage these settings through Group Policy. First download the Microsoft Application Virtualization Administrative Template (ADM Template). The ADM Template provides configuration options for the App-V 4.5/4.6 Client settings such as Client Permissions, Client Interface behavior and Client Communication Settings. Once you have added the ADM Template to your GPO object you can find them under the Classic Administrative Templates (ADM) branch as shown in the picture below.

71 Then configure the Group Policy Settings as shown below. Once the GPO is enabled run the command gpupdate /force on the client to ensure that all GPO settings get applied. Then open the Registry Editor and validate that all settings are configured as described here Now install your previously sequenced application through the generated MSI installation package. If all goes well, you should be able to launch your Virtual Application in Stand-Alone mode now.

72 QUESTION 52 You manage a Microsoft Application Virtualization (App-V) environment. A user cannot launch App-V applications that have been cached on a 32-bit client computer. You need to clear the client cache. What should you do? A. Set the HKEY_LOCAL_MACHINE\SOFTlNARE\Microsoft\SoftGrid\4.5\CIient\AppFS\State registry value to 0 and restart the computer. B. Set the HKEY_LOCAL_MACHINE\SOFTlNARE\Microsoft\SoftGnd\4.5\Client\AppFS\State registry value to 1 and restart the computer. C. Open an elevated command prompt and run the SFTMIME DELETE APP command. D. Open an elevated command prompt and run the SFTMIME CLEAR APP command. E. Open an elevated command prompt and run the SFTMIME LOCK APP command. Correct Answer: A How to Reset the FileSystem Cache Resetting the FileSystem cache is not something that should usually be necessary. However if you need to completely reset the FileSystem cache, perhaps for troubleshooting purposes, you can use the following procedure. Administrative rights are required to perform this action. To reset the FileSystem cache 1. Set the following registry value to 0 (zero): HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\State 2. Restart the computer. QUESTION 53 Your company hosts all virtual applications through Microsoft Application Virtualization (App-V) 4.6 on servers that run Windows Server 2008 R2. You will use Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3 to deploy all virtual applications to client computers via the App-V client. The company has the following deployment requirements: All client computers must be enabled for virtual application packages in ConfigMgr. AII client computers must be configured to check for new application packages that are scoped to Active Directory Domain Services (AD DS) security groups. The new program notification icon must be enabled to open the Run Advertised Programs window. You need to enable the client computers for software distribution. Which settings should you select in the ConfigMgr Advertised Programs Client Agent Properties dialog box? To answer, select the appropriate check box or check boxes in the dialog box. Hot Area:

73 Correct Answer:

74 QUESTION 54 Your company has a server that runs Windows Server 2008 R2 with the Remote Desktop Session Host (RD Session Host) role service. All client computers run 64-bit Windows 7. You need to terminate active sessions for Remote Desktop client connections after one hour. You must not impact any other session states. Which RD Session Host settings should you use? To answer, select the appropriate settings in the answer area. Hot Area: Correct Answer:

75 Active sesstion limit + End session QUESTION 55 Your company is deploying an application by using Microsoft Application Virtualization (App-V) 4.6. App-V 4.6 SP1 is not installed. Company policy states that the application must meet the following requirements: Services must not be virtualized. The Windows Installer must be disabled. Filenames must contain build numbers. Operating system activities must be virtualized. You need to deploy the application according to company policy. Which settings should you choose? To answer, select the appropriate setting or settings in the answer area. Hot Area:

76 Correct Answer:

TS: Windows Server 2008 R2, Desktop Virtualization

TS: Windows Server 2008 R2, Desktop Virtualization TS: Windows Server 2008 R2, Desktop Virtualization Number: 070-669 Passing Score: 700 Time Limit: 120 min File Version: 1.2 http://www.gratisexam.com/ Microsoft EXAM 70-669 TS:Windows Server 2008 R2,Desktop

More information

70-669_. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Microsoft

70-669_.   Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Microsoft 70-669_ Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Microsoft 70-669 TS: Windows Server 2008

More information

TS: Windows Server 2008 R2, Desktop Virtualization

TS: Windows Server 2008 R2, Desktop Virtualization 70-669 - TS: Windows Server 2008 R2, Desktop Virtualization Number: 070-669 Passing Score: 700 Time Limit: 100 min File Version: 1.0 http://www.gratisexam.com/ Microsoft EXAM 70-669 - TS:Windows Server

More information

TS:Windows Server 2008 R2, Desktop Virtualiazation

TS:Windows Server 2008 R2, Desktop Virtualiazation TS:Windows Server 2008 R2, Desktop Virtualiazation Number: 070-669 Passing Score: 700 Time Limit: 165 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 All client computers in your company

More information

Exam Questions

Exam Questions Exam Questions 70-686 Pro: Windows https://www.2passeasy.com/dumps/70-686/ 1.u are designing a Windows 7 virtual desktop infrastructure. You have the following requirements:. Provide access to Remote Desktop

More information

Managing Group Policy application and infrastructure

Managing Group Policy application and infrastructure CHAPTER 5 Managing Group Policy application and infrastructure There is far more to managing Group Policy than knowing the location of specific policy items. After your environment has more than a couple

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm Page 1 of 17 Windows 2000 Server Step-by-Step Guide to Understanding the Group Policy Feature Set Operating System Abstract Group Policy is the central component of the Change and Configuration Management

More information

Demo Lab Guide vworkspace

Demo Lab Guide vworkspace Demo Lab Guide vworkspace Product Domain: Cloud Client Computing Author: Dan Coleman Version: 1.01 Table of Contents 1 Product Overview... 4 1.1 Lab Preparation Considerations and Caveats... 4 2 Introduction...

More information

Managing Group Policy application and infrastructure

Managing Group Policy application and infrastructure CHAPTER 5 Managing Group Policy application and infrastructure There is far more to managing Group Policy than knowing the location of specific policy items. After your environment has more than a couple

More information

- Windows 7, Enterprise Desktop Administrator

- Windows 7, Enterprise Desktop Administrator - Windows 7, Enterprise Desktop Administrator Number: 70-686 Passing Score: 700 Time Limit: 120 min File Version: 2013-02-26 http://www.gratisexam.com/ Sections 1. 1. Planning and Managing a Client Life

More information

Microsoft v12.39

Microsoft v12.39 Microsoft.70-693.v12.39 Number: 70-693 Passing Score: 800 Time Limit: 120 min File Version: 12.39 http://www.gratisexam.com/ Copyright?2006-2011 Lead2pass.com, All Rights Reserved. Vendor: Microsoft Exam

More information

Course 10324A: Implementing and Managing Microsoft Desktop Virtualization

Course 10324A: Implementing and Managing Microsoft Desktop Virtualization Course 10324A: Implementing and Managing Microsoft Desktop Virtualization Length: 5 days Audience: IT Professionals OVERVIEW This five-day, instructor-led course provides you with the knowledge and skills

More information

TS: Windows Server 2008 R2, Desktop Virtualization

TS: Windows Server 2008 R2, Desktop Virtualization TS: Windows Server 2008 R2, Desktop Virtualization Number: 070-669 Passing Score: 700 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Microsoft EXAM 70-669 TS:Windows Server 2008 R2,Desktop

More information

PASS4TEST 専門 IT 認証試験問題集提供者

PASS4TEST 専門 IT 認証試験問題集提供者 PASS4TEST 専門 IT 認証試験問題集提供者 http://www.pass4test.jp 1 年で無料進級することに提供する Exam : 70-697 Title : Configuring Windows Devices Vendor : Microsoft Version : DEMO Get Latest & Valid 70-697 Exam's Question and Answers

More information

Installing and Configuring VMware User Environment Manager

Installing and Configuring VMware User Environment Manager Installing and Configuring VMware User Environment Manager VMware User Environment Manager 9.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

Below is the list of Windows Server Group Policy Interview Questions Asked in Windows System Administrator / L1/l2/l3 Support Engineer Interviews.

Below is the list of Windows Server Group Policy Interview Questions Asked in Windows System Administrator / L1/l2/l3 Support Engineer Interviews. Below is the list of Windows Server Group Policy Interview Questions Asked in Windows System Administrator / L1/l2/l3 Support Engineer Interviews. What is group policy in active directory? What are Group

More information

Microsoft Windows Server Administration Fundamentals.

Microsoft Windows Server Administration Fundamentals. 98-365 Microsoft Windows Server Administration Fundamentals http://www.pass4sureofficial.com Passforsure.co is a reputable IT certification examination guide, study guides and audio exam provider, we not

More information

Microsoft MCSE Exam

Microsoft MCSE Exam Microsoft MCSE 70-414 Exam Vendor:Microsoft Exam Code: 70-414 Exam Name: Implementing an Advanced Server Infrastructure www.ensurepass.com/70-414.html QUESTION 1 Your network contains an Active Directory

More information

MCSA Guide to Administering Microsoft Windows Server 2012/R2, Exam Chapter 10 Managing Group Policies

MCSA Guide to Administering Microsoft Windows Server 2012/R2, Exam Chapter 10 Managing Group Policies MCSA Guide to Administering Microsoft Windows Server 2012/R2, Exam 70-411 Chapter 10 Managing Group Policies Objectives Configure group policy scope, precedence, and inheritance Configure group policy

More information

Exam

Exam Exam 70-697 Number: 70-697 Passing Score: 800 Time Limit: 120 min File Version: 8.0 Exam Microsoft Exam 70-697 Configuring Windows Devices Exam A QUESTION 1 You are setting up a Windows 10 Enterprise computer.

More information

Microsoft User Experience Virtualization Deployment Guide

Microsoft User Experience Virtualization Deployment Guide Microsoft User Experience Virtualization Deployment Guide Microsoft User Experience Virtualization (UE-V) is an enterprise-scalable user state virtualization solution that can provide users a consistent

More information

Installing and Configuring VMware User Environment Manager. VMware User Environment Manager 9.3

Installing and Configuring VMware User Environment Manager. VMware User Environment Manager 9.3 Installing and Configuring VMware User Environment Manager VMware User Environment Manager 9.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Vendor: Microsoft. Exam Code: Exam Name: Implementing a Desktop Infrastructure. Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Implementing a Desktop Infrastructure. Version: Demo Vendor: Microsoft Exam Code: 70-415 Exam Name: Implementing a Desktop Infrastructure Version: Demo Testlet 1 Proseware Inc Overview Proseware, Inc. is an independent software vendor. The company has a

More information

Xcalibur Global Version Rev. 2 Administrator s Guide Document Version 1.0

Xcalibur Global Version Rev. 2 Administrator s Guide Document Version 1.0 Xcalibur Global Version 1.1 - Rev. 2 Administrator s Guide Document Version 1.0 September 2006 COPYRIGHT NOTICE 2006 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd. All rights reserved. This product

More information

Yesuse

Yesuse Yesuse 70-169 Number: 70-169 Passing Score: 700 Time Limit: 120 min ht t p:/ / w w w.gratisexam.com/ www.yesuse.com Exam A QUESTION 1 You create an email-enabled security group named Accounting. You add

More information

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions VMware Enterprise Desktop Solutions Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions Agenda The Enterprise Desktop Market Assured Computing Environment (ACE) Virtual Desktop

More information

REVISED 1 AUGUST REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes and later

REVISED 1 AUGUST REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes and later REVISED 1 AUGUST 2018 REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes 2.13.1 and later Table of Contents Introduction Audience What You Will Learn Navigating This Document for App Volumes Use

More information

Installing and Configuring VMware User Environment Manager. VMware User Environment Manager 9.2

Installing and Configuring VMware User Environment Manager. VMware User Environment Manager 9.2 Installing and Configuring VMware User Environment Manager VMware User Environment Manager 9.2 Installing and Configuring VMware User Environment Manager You can find the most up-to-date technical documentation

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

Migration Manager User s Guide

Migration Manager User s Guide Migration Manager User s Guide Table of Contents 1. Introduction... 8 Overview... 8 What is User State?... 8 Operating System Settings... 8 Application Settings... 8 Documents and Data Files... 8 Custom

More information

Licensing Guide. BlackBerry Enterprise Service 12. Version 12.0

Licensing Guide. BlackBerry Enterprise Service 12. Version 12.0 Licensing Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-13 SWD-20141118133401439 Contents About this guide... 5 What is BES12?... 6 Key features of BES12...6 Product documentation...

More information

Server based Networking & Security IS375 Group 5 Project. The purpose of this project is to put into practice what we learned in classroom.

Server based Networking & Security IS375 Group 5 Project. The purpose of this project is to put into practice what we learned in classroom. Server based Networking & Security IS375 Group 5 Project The purpose of this project is to put into practice what we learned in classroom. Beatris M., Zim Y., Lawton P., Mike S. 12/13/2011 Document: Steps

More information

REVISED 1 AUGUST QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes and later

REVISED 1 AUGUST QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes and later REVISED 1 AUGUST 2018 QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes 2.13.1 and later Table of Contents Introduction Audience What You Will Learn Navigating This Document for App Volumes

More information

Vendor: Microsoft. Exam Code: Exam Name: Pro: Windows 7, Enterprise Desktop Administrator. Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Pro: Windows 7, Enterprise Desktop Administrator. Version: Demo Vendor: Microsoft Exam Code: 70-686 Exam Name: Pro: Windows 7, Enterprise Desktop Administrator Version: Demo Question No : 1 You are planning to upgrade Internet Explorer. You have the following requirements:

More information

Exam Questions

Exam Questions Exam Questions 70-685 Pro: Windows 7, Enterprise Desktop Support Technician https://www.2passeasy.com/dumps/70-685/ 1.Portable computer users report that they can use Internet Explorer to browse Internet

More information

EXAM Windows Server Administration Fundamentals. Buy Full Product.

EXAM Windows Server Administration Fundamentals. Buy Full Product. Microsoft EXAM - 98-365 Windows Server Administration Fundamentals Buy Full Product http://www.examskey.com/98-365.html Examskey Microsoft 98-365 exam demo product is here for you to test the quality of

More information

MCITP: Windows Server 2008 R2, Virtualization Administrator

MCITP: Windows Server 2008 R2, Virtualization Administrator MCITP: Windows Server 2008 R2, Virtualization Administrator Course Description and Overview Overview SecureNinja s MCITP: Windows Server 2008 R2, Virtualization Administrator training and certification

More information

Windows Server 2008 Administration

Windows Server 2008 Administration Hands-On Course Description This course provides hands on experience installing and configuring Windows Server 2008 to work with clients including Windows Vista. Students will perform full and core CD-based

More information

Installing and Configuring Windows Server 2012

Installing and Configuring Windows Server 2012 Course Code: M20410 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Installing and Configuring Windows Server 2012 Overview Get hands-on instruction and practice installing and configuring Windows

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

Using the Terminal Services Gateway Lesson 10

Using the Terminal Services Gateway Lesson 10 Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

CXD-203: Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.5

CXD-203: Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.5 CXD-203: Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.5 The Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.5 course provides students with the skills required

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

EXAM Pro: Windows Server 2008 R2, Virtualization Administrator. Buy Full Product.

EXAM Pro: Windows Server 2008 R2, Virtualization Administrator. Buy Full Product. Microsoft EXAM - 70-693 Pro: Windows Server 2008 R2, Virtualization Administrator Buy Full Product http://www.examskey.com/70-693.html Examskey Microsoft 70-693 exam demo product is here for you to test

More information

Getting Started with VMware View View 3.1

Getting Started with VMware View View 3.1 Technical Note Getting Started with VMware View View 3.1 This guide provides an overview of how to install View Manager components and provision virtual desktops. Additional View Manager documentation

More information

TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN. Revised

TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN. Revised TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN Revised 2018-01-30 2 Table of Contents Introduction Section 1.1: Windows as a Server... 5 Section 1.2: Windows Server 2012 Interface

More information

Windows 7, Configuring

Windows 7, Configuring Windows 7, Configuring Microsoft 70-680 Dumps Available Here at: /microsoft-exam/70-680-dumps.html Enrolling now you will get access to 493 questions in a unique set of 70-680 dumps Question 1 Your company

More information

Microsoft Virtualizing Enterprise Desktops and Apps

Microsoft Virtualizing Enterprise Desktops and Apps 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20694 - Virtualizing Enterprise Desktops and Apps Length 5 days Price $4290.00 (inc GST) Version B Overview This five-day, hands-on training course is designed

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Administrator Guide Software version 2.2 D14197.06 February 2011 Contents Contents... 2 Introduction... 4 Pre-Installation Information...

More information

Exam Questions

Exam Questions Exam Questions 70-980 Recertification for MCSE: Server Infrastructure https://www.2passeasy.com/dumps/70-980/ 1. You need to recommend which type of clustered file server and which type of file share must

More information

Deploying the Core Optimized Desktop Using the Microsoft Deployment Toolkit 2010

Deploying the Core Optimized Desktop Using the Microsoft Deployment Toolkit 2010 Deploying the Core Optimized Desktop Using the Microsoft Deployment Toolkit 2010 Microsoft Corporation Published: December 2010 Abstract The optimized desktop enables flexible provisioning and management

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

Colligo Engage Outlook App 7.1. Offline Mode - User Guide

Colligo Engage Outlook App 7.1. Offline Mode - User Guide Colligo Engage Outlook App 7.1 Offline Mode - User Guide Contents Colligo Engage Outlook App 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Engage Outlook App 3 Checking

More information

Enable the Always Offline Mode to Provide Faster Access to Files

Enable the Always Offline Mode to Provide Faster Access to Files Enable the Always Offline Mode to Provide Faster Access to Files 13 out of 16 rated this helpful - Rate this topic Published: April 18, 2012 Updated: July 3, 2013 Applies To: Windows 8, Windows 8.1, Windows

More information

COPYRIGHTED MATERIAL. Contents. Assessment Test

COPYRIGHTED MATERIAL. Contents. Assessment Test Contents Introduction Assessment Test xxvii xxxvii Chapter 1 Installing Windows 7 1 Introducing Windows 7 2 Windows 7 Architecture 5 Preparing to Install Windows 7 6 Windows 7 Starter 7 Windows 7 Home

More information

Configure & Troubleshoot Windows Server 2008 R2 Application Infrastructure

Configure & Troubleshoot Windows Server 2008 R2 Application Infrastructure Configure & Troubleshoot Windows Server 2008 R2 Application Infrastructure Course 6439A - Five days - Instructor-led - Hands-on Introduction This course introduces students to a series of Windows Server

More information

A mandatory user profile is created by an administrator and assigned to one or more users to create a consistent user profile.

A mandatory user profile is created by an administrator and assigned to one or more users to create a consistent user profile. Mandatory profile Introduction On computers running Windows 2000, user profiles automatically create and maintain the desktop settings for each user's work environment on the local computer. A user profile

More information

Immidio White Paper Migration to Windows 7 with Immidio Flex Profiles

Immidio White Paper Migration to Windows 7 with Immidio Flex Profiles Immidio White Paper Migration to Windows 7 with Immidio Flex Profiles Abstract When updating from Windows XP to Windows 7 you may notice that compatibility for user profiles containing all personal desktop

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Administering Cloud Pod Architecture in Horizon 7. Modified on 4 JAN 2018 VMware Horizon 7 7.4

Administering Cloud Pod Architecture in Horizon 7. Modified on 4 JAN 2018 VMware Horizon 7 7.4 Administering Cloud Pod Architecture in Horizon 7 Modified on 4 JAN 2018 VMware Horizon 7 7.4 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Printer and Driver Management

Printer and Driver Management 2017 PrinterLogic, All Rights reserved. Business Problem From an end user s perspective, printing is easy click Print and pick up the document at a nearby printer. What they don t know is all that s involved

More information

"Charting the Course to Your Success!" Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.6 CXD 203.

Charting the Course to Your Success! Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.6 CXD 203. Description Course Summary The 7.6 course provides students with the skills required to effectively support a Citrix application and desktop virtualization solution in a Windows 2012 R2 environment. During

More information

Immidio White Paper Things You Always Wanted To Know About Windows Profile Management

Immidio White Paper Things You Always Wanted To Know About Windows Profile Management Immidio White Paper Things You Always Wanted To Know About Windows Profile Management Abstract Why are Windows user profiles so critically important for corporate IT environments and how can they be managed

More information

INUVIKA TECHNICAL GUIDE

INUVIKA TECHNICAL GUIDE Version 1.6 December 13, 2018 Passing on or copying of this document, use and communication of its content not permitted without Inuvika written approval PREFACE This document describes how to integrate

More information

Installing and Configuring Windows Server 2012

Installing and Configuring Windows Server 2012 Installing and Configuring Windows Server 2012 Course # Exam: Prerequisites Technology: Delivery Method: Length: 20697-1 70-697 Windows Instructor-led (classroom) 5 Days Overview About this Course This

More information

JPexam. 最新の IT 認定試験資料のプロバイダ IT 認証であなたのキャリアを進めます

JPexam.   最新の IT 認定試験資料のプロバイダ IT 認証であなたのキャリアを進めます JPexam 最新の IT 認定試験資料のプロバイダ http://www.jpexam.com IT 認証であなたのキャリアを進めます Exam : 070-693 Title : Windows Server 2008R2, Virtualization Administrator Vendors : Microsoft Version : DEMO Get Latest & Valid 070-693

More information

Bessere Outlook-365-Performance mit Citrix Profil Management

Bessere Outlook-365-Performance mit Citrix Profil Management Herzlich willkommen Bessere Outlook-365-Performance mit Citrix Profil Management Bessere Outlook-365-Performance mit Citrix Profil Management 20.11.2018 2 Inhalt Overview Office 365 ProPlus Exchange Online

More information

Microsoft licensing for the Consumerization of IT

Microsoft licensing for the Consumerization of IT Volume Licensing brief Microsoft licensing for the Consumerization of IT Table of Contents This brief applies to all Microsoft Volume Licensing programs. Summary... 1 What s New in This Brief... 1 Introduction...

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control

Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control Windows Server 2012 Hands-on lab In this experience, you will configure a

More information

Managing Windows Environments with Group Policy

Managing Windows Environments with Group Policy Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Course Description In this course, you will learn how to reduce costs and increase efficiencies in your network. You will

More information

ControlPoint. Advanced Installation Guide. September 07,

ControlPoint. Advanced Installation Guide. September 07, ControlPoint Advanced Installation Guide September 07, 2017 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2017 All rights reserved. No part or section of the contents

More information

About XenClient Synchronizer

About XenClient Synchronizer About XenClient Synchronizer About XenClient Synchronizer About XenClient Synchronizer Synchronizer performs all the administrative tasks for the XenClient Enterprise solution. It keeps a database of all

More information

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview.

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview. Citrix Connector 3.1 May 02, 2016 About this release System requirements Technical overview Plan Install Citrix Connector Upgrade Create applications Deploy applications to machine catalogs Publish applications

More information

XIA Links. Administrator's Guide. Version: 3.0. Copyright 2017, CENTREL Solutions

XIA Links. Administrator's Guide. Version: 3.0. Copyright 2017, CENTREL Solutions Administrator's Guide Version: 3.0 Copyright 2017, CENTREL Solutions Table of contents About... 4 Installation... 6 Installation Requirements (Server)... 7 Prerequisites (Windows Server 2016)... 9 Prerequisites

More information

Accops HyWorks v3.0. Quick Start Guide. Last Update: 4/25/2017

Accops HyWorks v3.0. Quick Start Guide. Last Update: 4/25/2017 Accops HyWorks v3.0 Quick Start Guide Last Update: 4/25/2017 2017 Accops Technologies Pvt. Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Technologies

More information

Implement_a_Desktop_Infrastructure_v by.VINGADOR_PALADINO_BR

Implement_a_Desktop_Infrastructure_v by.VINGADOR_PALADINO_BR Implement_a_Desktop_Infrastructure_v2012-12-08.by.VINGADOR_PALADINO_BR Number: 70-415 Passing Score: 700 Time Limit: 140 min File Version: 2.1 http://www.gratisexam.com/ Exam 70-415 - Implementing a Desktop

More information

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server How Parallels RAS Enhances Microsoft RDS White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Overview of Microsoft Remote Desktop Services... 3 Microsoft RDS Pain Points...

More information

Windows Server : Installing and Configuring Windows Server 2012 R2. Upcoming Dates. Course Description. Course Outline

Windows Server : Installing and Configuring Windows Server 2012 R2. Upcoming Dates. Course Description. Course Outline Windows Server 2012 20410: Installing and Configuring Windows Server 2012 R2 Get the skills and knowledge necessary to implement a core Windows Server 2012 R2 infrastructure in this 5-day class. You'll

More information

Exam : Title : PRO: Windows Server 2008, Enterprise Administrator Ver :

Exam : Title : PRO: Windows Server 2008, Enterprise Administrator Ver : Exam : 070-647 Title : PRO: Windows Server 2008, Enterprise Administrator Ver : 06-26-2008 QUESTION 1 You are an enterprise administrator for Certkiller. The company has a head office in San Diego and

More information

Deploying F5 with Microsoft Remote Desktop Services

Deploying F5 with Microsoft Remote Desktop Services Deployment Guide Deploying F5 with IMPORTANT: This guide has been archived. There are two newer deployment guides and downloadable iapp templates available for Remote Desktop Services, one for the Remote

More information

Dell EMC Microsoft Storage Spaces Direct Ready Nodes for VDI

Dell EMC Microsoft Storage Spaces Direct Ready Nodes for VDI Dell EMC Microsoft Storage Spaces Direct Ready Nodes for VDI Microsoft Remote Desktop Services for Dell EMC Microsoft Storage Spaces Direct Ready Nodes May 2018 H17099 Deployment Guide Abstract This deployment

More information

Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician

Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician Vendor: Microsoft Exam Code: 70-682 Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician Version: DEMO QUESTION 1 Scenario 1 For your convenience, the scenario is repeated

More information

How to create a System Logon Account in Backup Exec for Windows Servers

How to create a System Logon Account in Backup Exec for Windows Servers How to create a System Logon Account in Backup Exec for Windows Servers Problem How to create a System Logon Account in Backup Exec for Windows Servers Solution The Backup Exec System Logon Account (SLA)

More information

Course 20410D: Installing and Configuring Windows Server 2012

Course 20410D: Installing and Configuring Windows Server 2012 Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course 20410D: Installing and Configuring Windows Server 2012 Course Specifications

More information

Windows Server 2003, MCSA Security Specialization Skills Update. Exam.

Windows Server 2003, MCSA Security Specialization Skills Update. Exam. Microsoft 70-699 Windows Server 2003, MCSA Security Specialization Skills Update Exam TYPE: DEMO http://www.examskey.com/70-699.html Examskey Microsoft70-699 exam demo product is here for you to test the

More information

Load Balancing Microsoft Remote Desktop Services. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Microsoft Remote Desktop Services. Deployment Guide v Copyright Loadbalancer.org Load Balancing Microsoft Remote Desktop Services Deployment Guide v2.0.2 Copyright Loadbalancer.org Table of Contents About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

MCSA Windows Server A Success Guide to Prepare- Microsoft Upgrading Your Skills to MCSA Windows Server edusum.

MCSA Windows Server A Success Guide to Prepare- Microsoft Upgrading Your Skills to MCSA Windows Server edusum. 70-417 MCSA Windows Server 2012 A Success Guide to Prepare- Microsoft Upgrading Your Skills to MCSA Windows Server 2012 edusum.com Table of Contents Introduction to 70-417 Exam on Upgrading Your Skills

More information

Installing and Configuring Windows Server 2012

Installing and Configuring Windows Server 2012 Installing and Configuring Windows Server 2012 Course 20410C - Five days - Instructor-led - Hands-on Introduction Get hands-on instruction and practice installing and configuring Windows Server 2012, including

More information

microsoft.

microsoft. 70-697 microsoft Number: 70-697 Passing Score: 800 Time Limit: 120 min Sections 1. Manage identity 2. Plan desktop and device deployment 3. Plan and implement a Microsoft Intune device management solution

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

Course: CXD-203 Managing Citrix XenDesktop 7 Solutions

Course: CXD-203 Managing Citrix XenDesktop 7 Solutions Course: CXD-203 Managing Citrix XenDesktop 7 Solutions OVERVIEW The Managing Citrix XenDesktop 7 Solutions course provides students with the skills required to effectively support a Citrix application

More information

Session W-06. Brian Lauge Pedersen Technical Solutions Professional - Datacenter

Session W-06. Brian Lauge Pedersen Technical Solutions Professional - Datacenter Session W-06 Brian Lauge Pedersen Technical Solutions Professional - Datacenter blauge@microsoft.com Introducing & Benefits of Remote Desktop Services Remote Desktop Architecture What's New for Windows

More information

ForeScout CounterACT Resiliency Solutions

ForeScout CounterACT Resiliency Solutions ForeScout CounterACT Resiliency Solutions User Guide CounterACT Version 7.0.0 About CounterACT Resiliency Solutions Table of Contents About CounterACT Resiliency Solutions... 5 Comparison of Resiliency

More information

COPYRIGHTED MATERIAL. Configuring, Deploying, and Troubleshooting Security Templates. Chapter MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

COPYRIGHTED MATERIAL. Configuring, Deploying, and Troubleshooting Security Templates. Chapter MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 1 Configuring, Deploying, and Troubleshooting Security Templates MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Configure security templates. Configure registry and file system permissions.

More information