1 / 42

Module 8

Module Overview. Configuring Mobile Computer and Device SettingsConfiguring Remote Desktop and Remote Assistance for Remote AccessConfiguring DirectAccess for Remote AccessConfiguring BranchCache for Remote Access. Lesson 1: Configuring Mobile Computer and Device Settings. Discussion: Types of Mo

erasto
Télécharger la présentation

Module 8

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Module 8 Configuring Mobile Computing and Remote Access in Windows 7 This module helps you to identify and configure the appropriate mobile computer for your needs. It describes mobile devices, and how to synchronize them with a computer running the Windows 7 operating system. Additionally, this module describes various power options that you can configure in Windows 7. With DirectAccess, VPN Reconnect, and BranchCache, Windows 7 helps end users to be productive, regardless of where they are or where the data they need resides. After completing this module, students will be able to: Configure mobile computer and device settings on a Windows 7 client computer Configure Remote Desktop and Remote Assistance on a Windows 7 client computer Configure DirectAccess on a Windows 7 client computer for remote access Configure BranchCache on a branch office Windows 7 client computer Required materials To teach this module, you need the Microsoft Office PowerPoint file 6292A_08.ppt. Important: It is recommended that you use PowerPoint 2003 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides might not be displayed correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Work through the Module Review and Takeaways section and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. Have access to a Windows 7 client and a Windows Server 2008 R2 Domain Controller on a 64-bit platform Additional Reading: Make sure that students are aware that there are additional information and resources for the module on the Course Companion CD. This module helps you to identify and configure the appropriate mobile computer for your needs. It describes mobile devices, and how to synchronize them with a computer running the Windows 7 operating system. Additionally, this module describes various power options that you can configure in Windows 7. With DirectAccess, VPN Reconnect, and BranchCache, Windows 7 helps end users to be productive, regardless of where they are or where the data they need resides. After completing this module, students will be able to: Configure mobile computer and device settings on a Windows 7 client computer Configure Remote Desktop and Remote Assistance on a Windows 7 client computer Configure DirectAccess on a Windows 7 client computer for remote access Configure BranchCache on a branch office Windows 7 client computer Required materials To teach this module, you need the Microsoft Office PowerPoint file 6292A_08.ppt. Important: It is recommended that you use PowerPoint 2003 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides might not be displayed correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Work through the Module Review and Takeaways section and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. Have access to a Windows 7 client and a Windows Server 2008 R2 Domain Controller on a 64-bit platform Additional Reading: Make sure that students are aware that there are additional information and resources for the module on the Course Companion CD.

    2. Module Overview Configuring Mobile Computer and Device Settings Configuring Remote Desktop and Remote Assistance for Remote Access Configuring DirectAccess for Remote Access Configuring BranchCache for Remote Access The slide contains the lessons that are included in this module. To introduce students to these topics, review the following key messages: Microsoft introduces several new networking features to help improve the productivity of mobile users and users at branch offices. This module describes those features, and other networking improvements in Windows 7. It is important to stress that these technologies-DirectAccess, VPN Reconnect, and BranchCache-are part of the Windows Server 2008 R2 and Windows 7 environment. Talk about the increasing need for mobile computing and remote access and the different features of Windows 7 help improve the mobile computing and remote access end user experience. Also stress that Remote Access is not only for Mobile Computers but is also used by Desktop Computers to access remote resources.The slide contains the lessons that are included in this module. To introduce students to these topics, review the following key messages: Microsoft introduces several new networking features to help improve the productivity of mobile users and users at branch offices. This module describes those features, and other networking improvements in Windows 7. It is important to stress that these technologies-DirectAccess, VPN Reconnect, and BranchCache-are part of the Windows Server 2008 R2 and Windows 7 environment. Talk about the increasing need for mobile computing and remote access and the different features of Windows 7 help improve the mobile computing and remote access end user experience. Also stress that Remote Access is not only for Mobile Computers but is also used by Desktop Computers to access remote resources.

    3. Lesson 1: Configuring Mobile Computer and Device Settings Discussion: Types of Mobile Computers and Devices Tools for Configuring Mobile Computer and Device Settings What Are Mobile Device Sync Partnerships? Demonstration: Creating a Sync Partnership Power Plans and Power-Saving Options in Windows 7 Demonstration: Configuring Power Plans Key message: This lesson focuses on configuring mobile computer and device settings, including the creation of mobile device sync partnerships and configuring of power plans. After completing this lesson, students will be able to: Identify the different types of mobile computers and mobile devices Describe the tools available in Windows 7 for configuring mobile computer and device settings Explain the functionality of a sync partnership Explain how to create a sync partnership to synchronize settings with a mobile device Explain the power plans and power-saving options available in Windows 7 Explain how to configure a power planKey message: This lesson focuses on configuring mobile computer and device settings, including the creation of mobile device sync partnerships and configuring of power plans. After completing this lesson, students will be able to: Identify the different types of mobile computers and mobile devices Describe the tools available in Windows 7 for configuring mobile computer and device settings Explain the functionality of a sync partnership Explain how to create a sync partnership to synchronize settings with a mobile device Explain the power plans and power-saving options available in Windows 7 Explain how to configure a power plan

    4. Discussion: Types of Mobile Computers and Devices Key message: Computers play an important part in peoples daily lives, and the ability to carry out computing tasks at any time and in any place has become a necessity for many users. A mobile computer is a device that you can continue to use for work while away from your office. Have students identify and describe the features of various mobile computing devices. Make sure they describe the differences between the different types of available mobile devices. Discussion prompt: Ask students about the types of mobile computers they use. How do mobile computers differ from desktops? What are the key end user needs that mobile computers help resolve? During the discussion, talk about the following: Laptops and notebook computers Tablet PCs Ultra-Mobile computers PDAs Windows Mobile devices Portable media players Mobile phones Additional information about these types of computers and devices is included on the Course Companion CD. Ensure that you make a clear distinction between mobile computers and mobile devices. Mobile devices include personal digital assistants (PDAs) and Smartphones, which the next lesson discusses. Emphasize that mobile computers and Ultra-Mobile computers run the Windows 7 operating system while mobile devices might run the Windows Mobile 6.0 operating system or a third-party operating system. Emphasize that Windows 7 includes support for synchronizing to and from mobile devices. Note: For more details on Ultra-Mobile PCs, see the Ultra-Mobile PC Web site at http://go.microsoft.com/fwlink/?LinkId=153748 For information on Sync Center, see the Sync Center: Recommended Links Web site at http://go.microsoft.com/fwlink/?LinkId=151718 Key message: Computers play an important part in peoples daily lives, and the ability to carry out computing tasks at any time and in any place has become a necessity for many users. A mobile computer is a device that you can continue to use for work while away from your office. Have students identify and describe the features of various mobile computing devices. Make sure they describe the differences between the different types of available mobile devices. Discussion prompt: Ask students about the types of mobile computers they use. How do mobile computers differ from desktops? What are the key end user needs that mobile computers help resolve? During the discussion, talk about the following: Laptops and notebook computers Tablet PCs Ultra-Mobile computers PDAs Windows Mobile devices Portable media players Mobile phones Additional information about these types of computers and devices is included on the Course Companion CD. Ensure that you make a clear distinction between mobile computers and mobile devices. Mobile devices include personal digital assistants (PDAs) and Smartphones, which the next lesson discusses. Emphasize that mobile computers and Ultra-Mobile computers run the Windows 7 operating system while mobile devices might run the Windows Mobile 6.0 operating system or a third-party operating system. Emphasize that Windows 7 includes support for synchronizing to and from mobile devices. Note: For more details on Ultra-Mobile PCs, see the Ultra-Mobile PC Web site at http://go.microsoft.com/fwlink/?LinkId=153748 For information on Sync Center, see the Sync Center: Recommended Links Web site at http://go.microsoft.com/fwlink/?LinkId=151718

    5. Tools for Configuring Mobile Computer and Device Settings Key message: This is a build slide. Use the builds to show each of the tools. When selecting a mobile computer operating system, ensure that the mobile computer can adapt to a variety of scenarios. Windows 7 provides you with the opportunity to change configuration settings quickly and simply based on specific requirements. Discussion prompt: Ask students to talk about the mobile devices they use. Focus on the available types of mobile devices and their configuration options. Additional information: Be ready to discuss Bluetooth and wireless connection options with students. Explain that the following tools are available for configuring computers and devices in Windows 7: Power Management Options Windows Mobility Center Windows Mobile Device Center Sync Center Presentation Settings Click through to build this slide. The slide begins with a summary table, then screenshots of each tool are available with a click. Show them while explaining their purpose briefly. When you are showing the Windows Mobility Center, mention that this window can be opened by pressing the Windows key + x. Do not get into too many details since some of the tools are discussed in detail in the next set of topics. The last build of this slide shows the summary table again so that you can review features and use the information as needed to answer student questions. Here is a scenario about when to use a Sync Partnership. You might create a Sync Partnership that instructs the Sync Center to copy every new file in the My Documents folder to a USB hard disk each time you plug the device into the computer. Alternatively, you may create a more complex Sync Partnership to keep a wide variety of files, folders, and other information synchronized between the computer and a network server. Question: Aside from USB, how can you establish a connection for synchronizing a Windows Mobile device? Answer: You can establish a connection for synchronizing a Windows Mobile Device with Serial, Bluetooth, Wireless, and Infrared connections. Key message: This is a build slide. Use the builds to show each of the tools. When selecting a mobile computer operating system, ensure that the mobile computer can adapt to a variety of scenarios. Windows 7 provides you with the opportunity to change configuration settings quickly and simply based on specific requirements. Discussion prompt: Ask students to talk about the mobile devices they use. Focus on the available types of mobile devices and their configuration options. Additional information: Be ready to discuss Bluetooth and wireless connection options with students. Explain that the following tools are available for configuring computers and devices in Windows 7: Power Management Options Windows Mobility Center Windows Mobile Device Center Sync Center Presentation Settings Click through to build this slide. The slide begins with a summary table, then screenshots of each tool are available with a click. Show them while explaining their purpose briefly. When you are showing the Windows Mobility Center, mention that this window can be opened by pressing the Windows key + x. Do not get into too many details since some of the tools are discussed in detail in the next set of topics. The last build of this slide shows the summary table again so that you can review features and use the information as needed to answer student questions. Here is a scenario about when to use a Sync Partnership. You might create a Sync Partnership that instructs the Sync Center to copy every new file in the My Documents folder to a USB hard disk each time you plug the device into the computer. Alternatively, you may create a more complex Sync Partnership to keep a wide variety of files, folders, and other information synchronized between the computer and a network server. Question: Aside from USB, how can you establish a connection for synchronizing a Windows Mobile device? Answer: You can establish a connection for synchronizing a Windows Mobile Device with Serial, Bluetooth, Wireless, and Infrared connections.

    6. Tools for Configuring Mobile Computer and Device Settings Slide is here for image purposes.Slide is here for image purposes.

    7. What Are Mobile Device Sync Partnerships? Key message: A mobile device sync partnership updates information about the mobile device and the host computer. It typically synchronizes calendar information, clocks, and e-mail messages, in addition to Microsoft Office documents and media files on supported devices. You can create mobile device Sync Partnerships with PDAs, mobile phones, Windows Mobile devices, and portable media players. To build this slide: Click to have the definition fly out the bottom of the slide. Click to have the desktop computer and mobile device image fly in. Click to have the desktop files fly in with a description. Describe that the files are sent from the desktop to the mobile device. Click to have the files from the mobile device synchronize with the desktop. Describe this action. Discussion prompt: Ask students about the methods they use to synchronize their mobile devices. Information about the steps to connect a portable media player to a computer that is running Windows 7, creating a Sync Partnership, and synchronizing media to the device are included on the Course Companion CD. Talk about the Windows Mobile Device Center. Explain that Windows Mobile Device Center is the new name for ActiveSync in Windows 7. It provides overall device management features for Windows Mobile-based devices in Windows 7, including Smartphones and Pocket PCs. Ensure that the students are aware that all of the features previously available in ActiveSync are available in Windows 7, including synchronization and partnership setup. Additional information: Be prepared to discuss Microsoft Exchange synchronization. For more information, see http://go.microsoft.com/fwlink/?LinkId=153749 Key message: A mobile device sync partnership updates information about the mobile device and the host computer. It typically synchronizes calendar information, clocks, and e-mail messages, in addition to Microsoft Office documents and media files on supported devices. You can create mobile device Sync Partnerships with PDAs, mobile phones, Windows Mobile devices, and portable media players. To build this slide: Click to have the definition fly out the bottom of the slide. Click to have the desktop computer and mobile device image fly in. Click to have the desktop files fly in with a description. Describe that the files are sent from the desktop to the mobile device. Click to have the files from the mobile device synchronize with the desktop. Describe this action. Discussion prompt: Ask students about the methods they use to synchronize their mobile devices. Information about the steps to connect a portable media player to a computer that is running Windows 7, creating a Sync Partnership, and synchronizing media to the device are included on the Course Companion CD. Talk about the Windows Mobile Device Center. Explain that Windows Mobile Device Center is the new name for ActiveSync in Windows 7. It provides overall device management features for Windows Mobile-based devices in Windows 7, including Smartphones and Pocket PCs. Ensure that the students are aware that all of the features previously available in ActiveSync are available in Windows 7, including synchronization and partnership setup. Additional information: Be prepared to discuss Microsoft Exchange synchronization. For more information, see http://go.microsoft.com/fwlink/?LinkId=153749

    8. What Are Mobile Device Sync Partnerships? Slide is here for image purposes.Slide is here for image purposes.

    9. Demonstration: Creating a Sync Partnership In this demonstration, you will show how to configure Windows Mobile Device Center, and then synchronise a Windows Mobile device. Start the LON-DC1 and the LON-CL1 virtual machines. Leave them running throughout the duration of the module. Duration - 10 minutes. Demonstration Steps - The Companion Content CD also includes these steps. Create Appointments and Contacts in Outlook Log on to LON-CL1 as Contoso\Administrator with the password Pa$$w0rd. Click Start, point to All Programs, click Microsoft Office, and then click Microsoft Office Outlook 2007. In the Outlook 2007 Startup wizard, click Next. On the E-mail accounts page, click No, and then click Next. On the Create Data File page, select the Continue with no e-mail support check box and then click Finish. In the User Name dialog box, click OK. If prompted, in the Welcome to the 2007 Microsoft Office System, click Next, click I dont want to use Microsoft Update, and then click Finish. If prompted, in the Microsoft Office Outlook dialog box, click No. In Outlook, on the left, click Calendar. In the results pane, click the Month tab and then double-click tomorrow. In the Untitled Event dialog box, in the Subject field, type Quarterly meeting. In the Location field, type Meeting room 1 and then click Save & Close. If prompted with a reminder for the appointment, click Dismiss. In Outlook, on the left, click Contacts. On the menu, click New. In the Untitled Contact dialog field, in the Full Name field, type Amy Rusko. In the Job title box, type Production Manager and then click Save & Close. Close Outlook. The steps continue on the next hidden slide. In this demonstration, you will show how to configure Windows Mobile Device Center, and then synchronise a Windows Mobile device. Start the LON-DC1 and the LON-CL1 virtual machines. Leave them running throughout the duration of the module. Duration - 10 minutes. Demonstration Steps - The Companion Content CD also includes these steps. Create Appointments and Contacts in Outlook Log on to LON-CL1 as Contoso\Administrator with the password Pa$$w0rd. Click Start, point to All Programs, click Microsoft Office, and then click Microsoft Office Outlook 2007. In the Outlook 2007 Startup wizard, click Next. On the E-mail accounts page, click No, and then click Next. On the Create Data File page, select the Continue with no e-mail support check box and then click Finish. In the User Name dialog box, click OK. If prompted, in the Welcome to the 2007 Microsoft Office System, click Next, click I dont want to use Microsoft Update, and then click Finish. If prompted, in the Microsoft Office Outlook dialog box, click No. In Outlook, on the left, click Calendar. In the results pane, click the Month tab and then double-click tomorrow. In the Untitled Event dialog box, in the Subject field, type Quarterly meeting. In the Location field, type Meeting room 1 and then click Save & Close. If prompted with a reminder for the appointment, click Dismiss. In Outlook, on the left, click Contacts. On the menu, click New. In the Untitled Contact dialog field, in the Full Name field, type Amy Rusko. In the Job title box, type Production Manager and then click Save & Close. Close Outlook. The steps continue on the next hidden slide.

    10. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane. Configure Windows Mobile Device Center Click Start, point to All Programs, and then click Windows Mobile Device Center. In the Windows Mobile Device Center dialog box, click Accept. In the Windows Mobile Device Center dialog box, click Mobile Device Settings and then click Connection settings. In the Connection Settings dialog box, in the Allow connections to one of the following list, click DMA and then click OK. In the User Account Control dialog box, in the User name box, type administrator. In the Password box, type Pa$$w0rd and then click Yes. Close Windows Mobile Device Center. Connect the Windows Mobile Device Click Start, point to All Programs, click Windows Mobile 6 SDK, click Standalone Emulator Images, click US English, and then click WM 6.1.4 Professional. Wait until the emulator has completed startup. Click Start, point to All Programs, click Windows Mobile 6 SDK, click Tools, and then click Device Emulator Manager. In the Device Emulator Manager dialog box, click the play symbol. From the menu, click Actions and then click Cradle. Close Device Emulator Manager. Synchronize the Windows Mobile Device In the Windows Mobile Member Center dialog box, click Dont Register. In Windows Mobile Device Center, click Set up your device. In the Set up Windows Mobile Partnership wizard, on the What kinds of items do you want to sync? page, click Next. On the Ready to set up the Windows Mobile partnership page, click Set Up. After synchronization is complete, close Windows Mobile Device Center. Verify That Data Has Been Synchronized On the Windows Mobile Device, click Start and then click Calendar. Click tomorrows date. Is the Quarterly Meeting showing? Click Start and then click Contacts. Are there contacts listed? Close all open Windows. Do not save changes. Configure Windows Mobile Device Center Click Start, point to All Programs, and then click Windows Mobile Device Center. In the Windows Mobile Device Center dialog box, click Accept. In the Windows Mobile Device Center dialog box, click Mobile Device Settings and then click Connection settings. In the Connection Settings dialog box, in the Allow connections to one of the following list, click DMA and then click OK. In the User Account Control dialog box, in the User name box, type administrator. In the Password box, type Pa$$w0rd and then click Yes. Close Windows Mobile Device Center. Connect the Windows Mobile Device Click Start, point to All Programs, click Windows Mobile 6 SDK, click Standalone Emulator Images, click US English, and then click WM 6.1.4 Professional. Wait until the emulator has completed startup. Click Start, point to All Programs, click Windows Mobile 6 SDK, click Tools, and then click Device Emulator Manager. In the Device Emulator Manager dialog box, click the play symbol. From the menu, click Actions and then click Cradle. Close Device Emulator Manager. Synchronize the Windows Mobile Device In the Windows Mobile Member Center dialog box, click Dont Register. In Windows Mobile Device Center, click Set up your device. In the Set up Windows Mobile Partnership wizard, on the What kinds of items do you want to sync? page, click Next. On the Ready to set up the Windows Mobile partnership page, click Set Up. After synchronization is complete, close Windows Mobile Device Center. Verify That Data Has Been Synchronized On the Windows Mobile Device, click Start and then click Calendar. Click tomorrows date. Is the Quarterly Meeting showing? Click Start and then click Contacts. Are there contacts listed? Close all open Windows. Do not save changes.

    11. Power Plans and Power-Saving Options in Windows 7 Key message: Windows 7 power options enable the user to conserve a mobile computers battery. The user can change various performance options, such as: CPU speed Display brightness By using the CPU speed option, you can lower the speed of the computer processor and thus reduce its power consumption. Screen brightness requires power; therefore, lowering the brightness reduces power usage. To build this slide: Click to have the power plan table exit the bottom of the slide. The power saving options and computer graphic fly in automatically. Describe the factors that affect power consumption. Explain the power plans (including high performance, balanced, and power saver, and the power-saving options (shutdown, hibernate, and sleep). Use the tables on the slide as you discuss this information. Provide real-life implementation examples while explaining these power plans and power saving options. Note: For more information on Windows 7 Power Plans, see the Windows 7 Power Plans: Frequently Asked Questions Web site at http://go.microsoft.com/fwlink/?LinkId=91084Key message: Windows 7 power options enable the user to conserve a mobile computers battery. The user can change various performance options, such as: CPU speed Display brightness By using the CPU speed option, you can lower the speed of the computer processor and thus reduce its power consumption. Screen brightness requires power; therefore, lowering the brightness reduces power usage. To build this slide: Click to have the power plan table exit the bottom of the slide. The power saving options and computer graphic fly in automatically. Describe the factors that affect power consumption. Explain the power plans (including high performance, balanced, and power saver, and the power-saving options (shutdown, hibernate, and sleep). Use the tables on the slide as you discuss this information. Provide real-life implementation examples while explaining these power plans and power saving options. Note: For more information on Windows 7 Power Plans, see the Windows 7 Power Plans: Frequently Asked Questions Web site at http://go.microsoft.com/fwlink/?LinkId=91084

    12. Power Plans and Power-Saving Options in Windows 7 Slide is here for image purposes.Slide is here for image purposes.

    13. Demonstration: Configuring Power Plans In this demonstration, you show how to configure a power plan. Duration - 5 minutes. Demonstration Steps - The Companion Content CD also includes these steps. Create a Power Plan for Amys Laptop On LON-CL1, click Start and then click Control Panel. Click System and Security, click Power Options, and then on the left, click Create a power plan. On the Create a power plan page, click Power saver. In the Plan name box, type Amys plan and then click Next. On the Change settings for the plan: Amys plan page, in the Turn off the display box, click 5 minutes and then click Create. Configure Amys Power Plan In Power Options, under Amys plan, click Change plan settings. On the Change settings for the plan: Amys plan page, click Change advanced power settings. Configure the following properties for the plan and then click OK. Turn off hard disk after: 10 minutes Wireless Adapter Settings, Power Saving Mode: Maximum Power Saving Power buttons and lid, Power button action: Shut down On the Change settings for the plan: Amys plan page, click Cancel. Close Power Options. Question: Why are options such as what to do when I shut the power lid not configurable in the Wireless Adapter Settings, Power Saving Mode? Answer: This virtual machine emulates a desktop computer, and those options are unavailable on desktop computers. During this demonstration you will need to explain the Advanced Settings for the Power Options. State that the Advanced Settings start form a base of one of the default settings and then allows you to get more specific on choices concerning: Password request on wakeup Turn off Hard Disk after a number of minutes or never Desktop Background Settings such as slideshows Wireless Adapter power saving options Demonstrate working through the options in the Advanced Settings In this demonstration, you show how to configure a power plan. Duration - 5 minutes. Demonstration Steps - The Companion Content CD also includes these steps. Create a Power Plan for Amys Laptop On LON-CL1, click Start and then click Control Panel. Click System and Security, click Power Options, and then on the left, click Create a power plan. On the Create a power plan page, click Power saver. In the Plan name box, type Amys plan and then click Next. On the Change settings for the plan: Amys plan page, in the Turn off the display box, click 5 minutes and then click Create. Configure Amys Power Plan In Power Options, under Amys plan, click Change plan settings. On the Change settings for the plan: Amys plan page, click Change advanced power settings. Configure the following properties for the plan and then click OK. Turn off hard disk after: 10 minutes Wireless Adapter Settings, Power Saving Mode: Maximum Power Saving Power buttons and lid, Power button action: Shut down On the Change settings for the plan: Amys plan page, click Cancel. Close Power Options. Question: Why are options such as what to do when I shut the power lid not configurable in the Wireless Adapter Settings, Power Saving Mode? Answer: This virtual machine emulates a desktop computer, and those options are unavailable on desktop computers. During this demonstration you will need to explain the Advanced Settings for the Power Options. State that the Advanced Settings start form a base of one of the default settings and then allows you to get more specific on choices concerning: Password request on wakeup Turn off Hard Disk after a number of minutes or never Desktop Background Settings such as slideshows Wireless Adapter power saving options Demonstrate working through the options in the Advanced Settings

    14. Lesson 2: Configuring Remote Desktop and Remote Assistance for Remote Access What Are Remote Desktop and Remote Assistance? Configuring Remote Desktop Demonstration: Configuring Remote Assistance Key message: This lesson focuses on Remote Access and Remote Desktop. Highlight how Remote Access allows a technician to access the users computer while Remote Desktop allows the user to connect to remote computer resources. After completing this lesson, students will be able to: Explain the purpose of the Remote Desktop and Remote Assistance features Explain how to configure Remote Desktop on a Windows 7 client computer Explain how to configure Remote Assistance on a Windows 7 client computer Mention that Remote Access is not a feature only for Mobile computers but a feature that can be used even on desktops from which one needs to get remote access to resources. The reason for this emphasis is so that students do not get an impression that Remote Access is only available through mobile computers. Key message: This lesson focuses on Remote Access and Remote Desktop. Highlight how Remote Access allows a technician to access the users computer while Remote Desktop allows the user to connect to remote computer resources. After completing this lesson, students will be able to: Explain the purpose of the Remote Desktop and Remote Assistance features Explain how to configure Remote Desktop on a Windows 7 client computer Explain how to configure Remote Assistance on a Windows 7 client computer Mention that Remote Access is not a feature only for Mobile computers but a feature that can be used even on desktops from which one needs to get remote access to resources. The reason for this emphasis is so that students do not get an impression that Remote Access is only available through mobile computers.

    15. What Are Remote Desktop and Remote Assistance? Key message: Describe the Remote Desktop and Remote Assistance features. Remote Desktop uses the Remote Desktop Protocol (RDP) to enable users to access files on their office computer from another computer, such as one at their home. Additionally, Remote Desktop enables administrators to connect to multiple Windows Server sessions for remote administration purposes. Remote Assistance enables a user to request help from a remote administrator. To access Remote Assistance, run the Windows Remote Assistance tool. Discussion prompt: Ask students if they can see any benefits in using remote management tools. Explain the purpose of Remote Desktop and Remote Assistance features. Mention some real-life situations when these two features will be used. Do not cover anything about how to enable Remote Desktop and Remote Assistance because this is covered in the demonstration topic later. Briefly discuss that Windows Firewall may prevent the connection of troubleshooting tools remotely. To enable support for remote troubleshooting tools, complete the following steps: Open Windows Firewall from Control Panel. Click Allow a program or feature through the Windows Firewall and select what you want to enable an exception for. Key message: Describe the Remote Desktop and Remote Assistance features. Remote Desktop uses the Remote Desktop Protocol (RDP) to enable users to access files on their office computer from another computer, such as one at their home. Additionally, Remote Desktop enables administrators to connect to multiple Windows Server sessions for remote administration purposes. Remote Assistance enables a user to request help from a remote administrator. To access Remote Assistance, run the Windows Remote Assistance tool. Discussion prompt: Ask students if they can see any benefits in using remote management tools. Explain the purpose of Remote Desktop and Remote Assistance features. Mention some real-life situations when these two features will be used. Do not cover anything about how to enable Remote Desktop and Remote Assistance because this is covered in the demonstration topic later. Briefly discuss that Windows Firewall may prevent the connection of troubleshooting tools remotely. To enable support for remote troubleshooting tools, complete the following steps: Open Windows Firewall from Control Panel. Click Allow a program or feature through the Windows Firewall and select what you want to enable an exception for.

    16. Configuring Remote Desktop Key message: This topic focuses on configuration of the Remote Desktop Options. Explain how to allow remote connections on the computer that you want to connect to by configuring the Remote Desktop feature on that computer. Explain how to remotely access a computer on which the Remote Desktop feature is enabled. Explain the key settings in the Remote Desktop Connection Dialog box. This is a build slide. Step through each frame to show the students the options they can select in Remote Desktop. These screenshots are as follows: System Properties/Remote is where you allow remote connections to a computer General Enter the logon credentials to connect to the remote computer. Display Allows you to choose the Remote desktop display size. You have the option of running the remote desktop in full screen mode. Local Resources The user can configure local resources for use by the remote computer such as clipboard and printer access. Programs Lets you specify which programs you want to start when you connect to the remote computer. Experiences - Allows you to choose connection speeds and other visual options. Advanced Provides security credentialed options. Key message: This topic focuses on configuration of the Remote Desktop Options. Explain how to allow remote connections on the computer that you want to connect to by configuring the Remote Desktop feature on that computer. Explain how to remotely access a computer on which the Remote Desktop feature is enabled. Explain the key settings in the Remote Desktop Connection Dialog box. This is a build slide. Step through each frame to show the students the options they can select in Remote Desktop. These screenshots are as follows: System Properties/Remote is where you allow remote connections to a computer General Enter the logon credentials to connect to the remote computer. Display Allows you to choose the Remote desktop display size. You have the option of running the remote desktop in full screen mode. Local Resources The user can configure local resources for use by the remote computer such as clipboard and printer access. Programs Lets you specify which programs you want to start when you connect to the remote computer. Experiences - Allows you to choose connection speeds and other visual options. Advanced Provides security credentialed options.

    17. Configuring Remote Desktop Slide is here for image purposes.Slide is here for image purposes.

    18. Demonstration: Configuring Remote Assistance In this demonstration, show how to enable and use Remote Assistance. Amy needs help with a Word feature. She requests assistance, and you provide guidance on the feature by using Remote Assistance. Duration - 12 minutes. Demonstration Steps - The Companion Content CD also includes these steps. Create a Microsoft Office Word 2007 Document Log on to the LON-CL1 virtual machine as Contoso\Don with a password of Pa$$w0rd. Click Start, point to All Programs, click Microsoft Office, and then click Microsoft Office Word 2007. In the Document window, type This is my document, and then click the Office button. Click Save and then click Save again. Request Remote Assistance Click Start, and in the Search box, type remote assistance. In the Programs list, click Windows Remote Assistance. In the Windows Remote Assistance wizard, click Invite someone you trust to help you. On the How do you want to invite someone to help you page, click Save this invitation as a file. On the Save as page, in the File name box, type \\LON-dc1\users\Public\Dons-Invitation.msrcincident and then click Save. Note the password. The steps continue on the next hidden slide. In this demonstration, show how to enable and use Remote Assistance. Amy needs help with a Word feature. She requests assistance, and you provide guidance on the feature by using Remote Assistance. Duration - 12 minutes. Demonstration Steps - The Companion Content CD also includes these steps. Create a Microsoft Office Word 2007 Document Log on to the LON-CL1 virtual machine as Contoso\Don with a password of Pa$$w0rd. Click Start, point to All Programs, click Microsoft Office, and then click Microsoft Office Word 2007. In the Document window, type This is my document, and then click the Office button. Click Save and then click Save again. Request Remote Assistance Click Start, and in the Search box, type remote assistance. In the Programs list, click Windows Remote Assistance. In the Windows Remote Assistance wizard, click Invite someone you trust to help you. On the How do you want to invite someone to help you page, click Save this invitation as a file. On the Save as page, in the File name box, type \\LON-dc1\users\Public\Dons-Invitation.msrcincident and then click Save. Note the password. The steps continue on the next hidden slide.

    19. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane. Provide Remote Assistance Switch to the 6292A-LON-DC1 virtual machine and log on as Administrator with the password of Pa$$w0rd. Open Windows Explorer, navigate to C:\Users\Public, and then double-click Dons-Invitation.msrcincident. In the Remote Assistance dialog box, in the Enter password box, type the password you noted in the previous task and then click OK. Switch to the LON-CL1 virtual machine. In the Windows Remote Assistance dialog box, click Yes. Switch to the LON-DC1 virtual machine. On the menu, click Request control. Switch to the LON-CL1 virtual machine. In the Windows Remote Assistance dialog box, click Yes. Switch to the LON-DC1 virtual machine. In Word, click the Review menu and select the text in the document window. In the menu, click New Comment and then type This is how you place a comment in a document. Click the cursor elsewhere in the document window. In the Windows Remote Assistance Helping Don menu, click Chat. In the Chat window, type Does that help? and then press ENTER. Switch to the LON-CL1 virtual machine. Observe the message. Type Yes, thanks, press ENTER, and then in the Menu, click Stop sharing. Close all open windows. Discard the file changes and then log off of LON-CL1. Switch to the LON-DC1 virtual machine. Close all open windows and then log off of LON-DC1. Question: Under what circumstances does one use Remote Desktop Connection or Remote Assistant? Answer: Use Remote Desktop to access one computer from another remotely. For example, you can use Remote Desktop to connect to your work computer from home. You will have access to all of your programs, files, and network resources, as if you were sitting at your work computer. Use Remote Assistance to give or receive assistance remotely. For example, a friend or a technical support person can remotely access your computer to help you with a computer problem or show you how to do something. You can help someone else the same way. In either case, both you and the other person see the same computer screen and will both be able to control the mouse pointer. Provide Remote Assistance Switch to the 6292A-LON-DC1 virtual machine and log on as Administrator with the password of Pa$$w0rd. Open Windows Explorer, navigate to C:\Users\Public, and then double-click Dons-Invitation.msrcincident. In the Remote Assistance dialog box, in the Enter password box, type the password you noted in the previous task and then click OK. Switch to the LON-CL1 virtual machine. In the Windows Remote Assistance dialog box, click Yes. Switch to the LON-DC1 virtual machine. On the menu, click Request control. Switch to the LON-CL1 virtual machine. In the Windows Remote Assistance dialog box, click Yes. Switch to the LON-DC1 virtual machine. In Word, click the Review menu and select the text in the document window. In the menu, click New Comment and then type This is how you place a comment in a document. Click the cursor elsewhere in the document window. In the Windows Remote Assistance Helping Don menu, click Chat. In the Chat window, type Does that help? and then press ENTER. Switch to the LON-CL1 virtual machine. Observe the message. Type Yes, thanks, press ENTER, and then in the Menu, click Stop sharing. Close all open windows. Discard the file changes and then log off of LON-CL1. Switch to the LON-DC1 virtual machine. Close all open windows and then log off of LON-DC1. Question: Under what circumstances does one use Remote Desktop Connection or Remote Assistant? Answer: Use Remote Desktop to access one computer from another remotely. For example, you can use Remote Desktop to connect to your work computer from home. You will have access to all of your programs, files, and network resources, as if you were sitting at your work computer. Use Remote Assistance to give or receive assistance remotely. For example, a friend or a technical support person can remotely access your computer to help you with a computer problem or show you how to do something. You can help someone else the same way. In either case, both you and the other person see the same computer screen and will both be able to control the mouse pointer.

    20. Lesson 3: Configuring DirectAccess for Remote Access What Is VPN Connection? Creating a VPN What Is DirectAccess? How DirectAccess Works DirectAccess Requirements Key message: The lesson focuses on two connection methods in Windows 7: VPN Reconnect and DirectAccess. DirectAccess enables remote users to access the corporate network anytime they have an Internet connection; it does not require virtual private networking (VPN). VPN Reconnect enhances the connectivity experience for those who rely on VPN connections. VPN Reconnect provides consistent connectivity by automatically reestablishing a VPN connection. After completing this lesson, students will be able to: Explain the purpose of VPN connections Explain how to create a VPN connection Explain the purpose and benefits of DirectAccess Explain how DirectAccess works Identify the prerequisites and requirements for configuring DirectAccess Explain how to configure DirectAccess on a Windows 7 client computerKey message: The lesson focuses on two connection methods in Windows 7: VPN Reconnect and DirectAccess. DirectAccess enables remote users to access the corporate network anytime they have an Internet connection; it does not require virtual private networking (VPN). VPN Reconnect enhances the connectivity experience for those who rely on VPN connections. VPN Reconnect provides consistent connectivity by automatically reestablishing a VPN connection. After completing this lesson, students will be able to: Explain the purpose of VPN connections Explain how to create a VPN connection Explain the purpose and benefits of DirectAccess Explain how DirectAccess works Identify the prerequisites and requirements for configuring DirectAccess Explain how to configure DirectAccess on a Windows 7 client computer

    21. What Is a VPN Connection? Key message: VPNs are point-to-point connections across a private or public network such as the Internet. A VPN client uses special TCP/IP-based protocols, called tunneling protocols, to make a virtual call to a virtual port on a VPN server. Discussion Prompt: Ask students about their experiences with VPNs. Explain how VPN connections work: Talk about the protocols used. Discuss Authentication and how it affects VPN Connections Differentiate between PPTP, L2TP, and SSTP tunneling protocols Explain that for remote access connections, an organization can use VPN connections to leverage the worldwide connectivity of the Internet. Point out that students can also trade their direct-dial remote access solutions (and their corresponding equipment and maintenance costs) for a single connection to an Internet service provider (ISP) without sacrificing the privacy of a dedicated dial-up connection. Explain that for routed connections, an organization can use VPN connections to leverage the worldwide connectivity of the Internet. Students can also trade long-distance dial-up or leased lines for simple connections to an Internet service provider (ISP) without sacrificing the privacy of a dial-up or dedicated site-to-site link. Emphasize that VPN can be used side-by-side with DirectAccess, which is discussed in a later topic. Additionally, Microsoft is improving VPN usability in Windows 7 with VPN Reconnect. VPN Reconnect provides seamless and consistent VPN connectivity by using a single VPN server for laptops, desktops, and mobile computers. Describe how with VPN Reconnect, Windows 7 automatically re-establishes active VPN connections when Internet connectivity re-establishes. While the re-connection might take several seconds, it is completely transparent to users, who are more likely to stay connected to a VPN and get more use out of internal network resources. Key message: VPNs are point-to-point connections across a private or public network such as the Internet. A VPN client uses special TCP/IP-based protocols, called tunneling protocols, to make a virtual call to a virtual port on a VPN server. Discussion Prompt: Ask students about their experiences with VPNs. Explain how VPN connections work: Talk about the protocols used. Discuss Authentication and how it affects VPN Connections Differentiate between PPTP, L2TP, and SSTP tunneling protocols Explain that for remote access connections, an organization can use VPN connections to leverage the worldwide connectivity of the Internet. Point out that students can also trade their direct-dial remote access solutions (and their corresponding equipment and maintenance costs) for a single connection to an Internet service provider (ISP) without sacrificing the privacy of a dedicated dial-up connection. Explain that for routed connections, an organization can use VPN connections to leverage the worldwide connectivity of the Internet. Students can also trade long-distance dial-up or leased lines for simple connections to an Internet service provider (ISP) without sacrificing the privacy of a dial-up or dedicated site-to-site link. Emphasize that VPN can be used side-by-side with DirectAccess, which is discussed in a later topic. Additionally, Microsoft is improving VPN usability in Windows 7 with VPN Reconnect. VPN Reconnect provides seamless and consistent VPN connectivity by using a single VPN server for laptops, desktops, and mobile computers. Describe how with VPN Reconnect, Windows 7 automatically re-establishes active VPN connections when Internet connectivity re-establishes. While the re-connection might take several seconds, it is completely transparent to users, who are more likely to stay connected to a VPN and get more use out of internal network resources.

    22. Creating a VPN Connection Creating a VPN connection in the Windows 7 system environment requires authenticated access to a Windows a VPN Server From the Network and Sharing Center- choose to the Setup a new connection wizard or type VPN at the Windows 7 search bar Choose Connect to a workplace Set up a dial-up or VPN connection Create a new connection Select your VPN server after choosing Use my Internet Connection (VPN) Key message: Creating a VPN connection in the Windows7 system environment requires Windows VPN Server. This is a build slide indicating the steps to explain the procedure to make a VPN connection: From Control Panel, select Network and Internet to access the Network and Sharing Center. From Network and Sharing Center, choose Set up a new connection or wizard. From Set Up a Connection or Network, choose Connect to a workplace Set up a dial-up or VPN connection to your workplace and then click Next. In the Connect to a Workplace window, answer the question: Do you want to use a connection that you already have? Choose to create a new connection or choose an existing connection. One the next screen, in Connect to a Workplace, choose to Use my Internet connection (VPN), not to Dial Directly. At the next screen, select your VPN connection. Tell the students that to complete these steps, they must know the name of the VPN connection. Key message: Creating a VPN connection in the Windows7 system environment requires Windows VPN Server.

    23. Creating a VPN Connection Creating a VPN connection in the Windows 7 system environment requires authenticated access to a Windows a VPN Server From the Network and Sharing Center- choose to the Setup a new connection wizard or type VPN at the Windows 7 search bar Choose Connect to a workplace Set up a dial-up or VPN connection Create a new connection Select your VPN server after choosing Use my Internet Connection (VPN) Slide is here for image purposes.Slide is here for image purposes.

    24. What Is DirectAccess? Key message: DirectAccess provides users transparent access to internal network resources whenever they are connected to the Internet, without using VPN. Discussion prompt: Talk about the security and performance features. They are as follows: Support of multifactor authentication methods, such as smart card authentication. IPv6 to provide globally routable IP addresses for remote access clients. Encryption across the Internet using IPsec. Encryption methods include DES, which uses a 56-bit key, and 3DES, which uses three 56-bit keys. Integrating with Network Access Protection (NAP) to perform compliance checking on client computers before allowing them to connect to internal resources. Configuring the DirectAccess server to restrict which servers, users, and individual applications are accessible. If you have experience directly with any of the security and performance features, share it with the class. Continue to describe DirectAccess. With DirectAccess, authorized users on Windows 7 computers can access corporate shares, view intranet Web sites, and work with intranet applications without going through a VPN. Explain the following features of DirectAccess and how they may replace the need for VPN connections: Improved manageability of remote users Secure and flexible network infrastructure IT simplification Cost reduction Explain that DirectAccess benefits IT professionals by enabling them to manage remote computers outside of the office. Each time a remote computer connects to the Internet, before the user logs on, DirectAccess establishes a bi-directional connection that enables the client computer to remain current with company policies and to receive software updates. Key message: DirectAccess provides users transparent access to internal network resources whenever they are connected to the Internet, without using VPN. Discussion prompt: Talk about the security and performance features. They are as follows: Support of multifactor authentication methods, such as smart card authentication. IPv6 to provide globally routable IP addresses for remote access clients. Encryption across the Internet using IPsec. Encryption methods include DES, which uses a 56-bit key, and 3DES, which uses three 56-bit keys. Integrating with Network Access Protection (NAP) to perform compliance checking on client computers before allowing them to connect to internal resources. Configuring the DirectAccess server to restrict which servers, users, and individual applications are accessible. If you have experience directly with any of the security and performance features, share it with the class. Continue to describe DirectAccess. With DirectAccess, authorized users on Windows 7 computers can access corporate shares, view intranet Web sites, and work with intranet applications without going through a VPN. Explain the following features of DirectAccess and how they may replace the need for VPN connections: Improved manageability of remote users Secure and flexible network infrastructure IT simplification Cost reduction Explain that DirectAccess benefits IT professionals by enabling them to manage remote computers outside of the office. Each time a remote computer connects to the Internet, before the user logs on, DirectAccess establishes a bi-directional connection that enables the client computer to remain current with company policies and to receive software updates.

    25. How DirectAccess Works Key message: DirectAccess clients can connect to internal resources by using one of the two methods: selected server access or full enterprise network access. Explain how the various features of DirectAccess work. The connection method is configured using the DirectAccess console or may be configured manually by using IPsec policies. For the highest security level, deploy IPv6 and IPsec throughout the organization, upgrade application servers to Windows Server 2008 R2, and enable selected server access. This allows end-to-end authentication and encryption from the DirectAccess client to the internal resources. Alternatively, organizations can use full enterprise network access, where the IPsec session is established between the DirectAccess client and server, but IPsec is not used for communications across the internal network. Full enterprise network access closely resembles VPN and can be more straightforward to deploy. Let students know that the default DirectAccess client configuration is optimized for performance; however, Windows 7 provides flexible configurability to meet the organizations security requirements. Key message: DirectAccess clients can connect to internal resources by using one of the two methods: selected server access or full enterprise network access. Explain how the various features of DirectAccess work. The connection method is configured using the DirectAccess console or may be configured manually by using IPsec policies. For the highest security level, deploy IPv6 and IPsec throughout the organization, upgrade application servers to Windows Server 2008 R2, and enable selected server access. This allows end-to-end authentication and encryption from the DirectAccess client to the internal resources. Alternatively, organizations can use full enterprise network access, where the IPsec session is established between the DirectAccess client and server, but IPsec is not used for communications across the internal network. Full enterprise network access closely resembles VPN and can be more straightforward to deploy. Let students know that the default DirectAccess client configuration is optimized for performance; however, Windows 7 provides flexible configurability to meet the organizations security requirements.

    26. DirectAccess Requirements Key message: The requirements (for example IPv6, IPSec) are significant and may require considerable implementation time. However, the advantages of DirectAccess for users and IT professionals help offset the requirement overhead. The DirectAccess installation is flexible and it provides a scalable solution for remote network access. Discussion prompt: If you have experience with any of the required technologies, share them. Ask students what their experiences are and how they see DirectAccess benefiting their organization. Explain the following prerequisites and requirements for DirectAccess: Active Directory Group Policy Domain controller Public key policy (PKI) IPsec policies IPv6 and transition technologies Describe how scalability is determined by the number of DirectAccess servers and that there are multiple ways to install DirectAccess depending on deployment requirements. Additional information is available in the Course Companion CD. Question: What is the certificate used for in DirectAccess? Answer: To provide authentication. Question: List three ways to deploy DirectAccess. Answer: Three ways to deploy DirectAccess are as follows: DirectAccess Deployment Wizard - simplifies deployment. The wizard can create and export scripts, which can be reviewed, further customized, and applied manually. Custom Scripts - primarily uses netsh.exe and is more complex, but provides vast design flexibility. Group Policy - only supported for configuring clients, not DirectAccess servers. Key message: The requirements (for example IPv6, IPSec) are significant and may require considerable implementation time. However, the advantages of DirectAccess for users and IT professionals help offset the requirement overhead. The DirectAccess installation is flexible and it provides a scalable solution for remote network access. Discussion prompt: If you have experience with any of the required technologies, share them. Ask students what their experiences are and how they see DirectAccess benefiting their organization. Explain the following prerequisites and requirements for DirectAccess: Active Directory Group Policy Domain controller Public key policy (PKI) IPsec policies IPv6 and transition technologies Describe how scalability is determined by the number of DirectAccess servers and that there are multiple ways to install DirectAccess depending on deployment requirements. Additional information is available in the Course Companion CD. Question: What is the certificate used for in DirectAccess? Answer: To provide authentication. Question: List three ways to deploy DirectAccess. Answer: Three ways to deploy DirectAccess are as follows: DirectAccess Deployment Wizard - simplifies deployment. The wizard can create and export scripts, which can be reviewed, further customized, and applied manually. Custom Scripts - primarily uses netsh.exe and is more complex, but provides vast design flexibility. Group Policy - only supported for configuring clients, not DirectAccess servers.

    27. Lesson 4: Configuring BranchCache for Remote Access What Is BranchCache? How BranchCache Works BranchCache Requirements Demonstration: Configuring BranchCache on a Windows 7 Client Computer Key message: This lesson focuses on how BranchCache can help resolve connection issues between a branch office and main office. BranchCache does this by caching content from remote file and Web servers so that users can access information more quickly. The cache can be hosted centrally on a server in the branch location, or it can be distributed across user computers. If the cache is distributed, the branch users' computer automatically checks the cache pool to determine if the data has already been cached. If the cache is hosted on a server, the branch users' computer checks the branch server to access data. Each time a user tries to access a file, his or her access rights are authenticated against the server in the data center to ensure that the user has access to the file and is accessing the latest version. After completing this lesson, students will be able to: Explain the purpose and benefits of BranchCache Explain how BranchCache works Identify the requirements for configuring BranchCache Explain how to configure BranchCache on a Windows 7 client computerKey message: This lesson focuses on how BranchCache can help resolve connection issues between a branch office and main office. BranchCache does this by caching content from remote file and Web servers so that users can access information more quickly. The cache can be hosted centrally on a server in the branch location, or it can be distributed across user computers. If the cache is distributed, the branch users' computer automatically checks the cache pool to determine if the data has already been cached. If the cache is hosted on a server, the branch users' computer checks the branch server to access data. Each time a user tries to access a file, his or her access rights are authenticated against the server in the data center to ensure that the user has access to the file and is accessing the latest version. After completing this lesson, students will be able to: Explain the purpose and benefits of BranchCache Explain how BranchCache works Identify the requirements for configuring BranchCache Explain how to configure BranchCache on a Windows 7 client computer

    28. What Is BranchCache? Key message: Discuss how BranchCache helps reduce WAN link utilization and improve the responsiveness of network applications for branch office workers that are accessing main office servers. Explain the features and benefits of BranchCache. Talk about the protocols it supports. A table of protocol information is included in the Course Companion CD. The main benefit of BranchCache for users is the reduction in application responsiveness and file transfer time. For IT professionals, review the benefits that are included on the slides. Discussion prompt: Have students contribute other benefits that they may encounter. Talk about how malicious users are unable to access content that they are not authorized to view because cached content is encrypted. Explain the concept of identifiers. Use this information in the following slides as you talk about how information and data is cached and retrieved. A computer must obtain the identifier that describes a piece of content to decrypt that content after downloading. The identifiers, provided by the server, include a digest of the content. Talk about how after downloading from the cache, the client computer verifies that the content matches the digest in the identifier. If a client downloads an identifier from the server, but cannot find the data cached on any computers in the branch, the client returns to the server for a full download. BranchCache only serves content to users who have the correct permissions and always checks to make sure it is delivering the latest version of the file. Share the following scenario with students: A company posts a large training presentation on a file share and sends an e-mail to all employees. Arvind opens the presentation and waits several minutes for the file to download. After the file is downloaded, Windows 7 stores it in the cache for others to use. When Luciana downloads the file, Windows 7 retrieves it from the cache and she opens it in less time. Question: How does BranchCache prevent malicious users from accessing content? Answer: Malicious users are unable to access content that they are not authorized to view because cached content is encrypted. Key message: Discuss how BranchCache helps reduce WAN link utilization and improve the responsiveness of network applications for branch office workers that are accessing main office servers. Explain the features and benefits of BranchCache. Talk about the protocols it supports. A table of protocol information is included in the Course Companion CD. The main benefit of BranchCache for users is the reduction in application responsiveness and file transfer time. For IT professionals, review the benefits that are included on the slides. Discussion prompt: Have students contribute other benefits that they may encounter. Talk about how malicious users are unable to access content that they are not authorized to view because cached content is encrypted. Explain the concept of identifiers. Use this information in the following slides as you talk about how information and data is cached and retrieved. A computer must obtain the identifier that describes a piece of content to decrypt that content after downloading. The identifiers, provided by the server, include a digest of the content. Talk about how after downloading from the cache, the client computer verifies that the content matches the digest in the identifier. If a client downloads an identifier from the server, but cannot find the data cached on any computers in the branch, the client returns to the server for a full download. BranchCache only serves content to users who have the correct permissions and always checks to make sure it is delivering the latest version of the file. Share the following scenario with students: A company posts a large training presentation on a file share and sends an e-mail to all employees. Arvind opens the presentation and waits several minutes for the file to download. After the file is downloaded, Windows 7 stores it in the cache for others to use. When Luciana downloads the file, Windows 7 retrieves it from the cache and she opens it in less time. Question: How does BranchCache prevent malicious users from accessing content? Answer: Malicious users are unable to access content that they are not authorized to view because cached content is encrypted.

    29. How BranchCache Works Key message: This slide is a build slide that provides an overview of the caching modes that can be used with BranchCache. Explain that for each mode, data is copied from the main office server to the branch office; where it resides in the branch office is determined by the type of caching mode. When another client on the same network requests the file, the client downloads it from the local cache without downloading the same content across the WAN. Describe each caching mode, distributed cache and hosted cache, using the information on the slide and the information that follows. Then, use the question to confirm student understanding. Distributed cache uses a peer-to-peer architecture where Windows 7 client computers cache copies of files and send them directly to other Windows 7 client computers as they need it. Distributed Cache is especially beneficial for branch offices that do not have a local server with Windows Server 2008 R2. Hosted cache uses a client/server architecture where Windows 7 client computers cache content to a computer on the local network running Windows Server 2008 R2. Other clients who need the same content retrieve it directly from the Hosted Cache on the server at the branch office. The Hosted Cache computer can run the Server Core installation option of Windows Server 2008 R2 and can host other applications. Hosted cache mode and distributed cache mode are mutually exclusive. BranchCache only retrieves data from a server when the client requests it. Because it is a passive cache, it does not increase WAN utilization. BranchCache only caches read requests and does not interfere with a user saving a file. Question: Which BranchCache caching mode has a peer-to-peer architecture? Answer: The distributed or cooperative caching mode has a peer-to-peer type of architecture; content is cached on Windows 7 clients computers after it is retrieved from a Windows Server 2008 R2. Then, it is sent directly to other Windows 7 clients, as they need it, without those clients having to retrieve the same content over the WAN link.Key message: This slide is a build slide that provides an overview of the caching modes that can be used with BranchCache. Explain that for each mode, data is copied from the main office server to the branch office; where it resides in the branch office is determined by the type of caching mode. When another client on the same network requests the file, the client downloads it from the local cache without downloading the same content across the WAN. Describe each caching mode, distributed cache and hosted cache, using the information on the slide and the information that follows. Then, use the question to confirm student understanding. Distributed cache uses a peer-to-peer architecture where Windows 7 client computers cache copies of files and send them directly to other Windows 7 client computers as they need it. Distributed Cache is especially beneficial for branch offices that do not have a local server with Windows Server 2008 R2. Hosted cache uses a client/server architecture where Windows 7 client computers cache content to a computer on the local network running Windows Server 2008 R2. Other clients who need the same content retrieve it directly from the Hosted Cache on the server at the branch office. The Hosted Cache computer can run the Server Core installation option of Windows Server 2008 R2 and can host other applications. Hosted cache mode and distributed cache mode are mutually exclusive. BranchCache only retrieves data from a server when the client requests it. Because it is a passive cache, it does not increase WAN utilization. BranchCache only caches read requests and does not interfere with a user saving a file. Question: Which BranchCache caching mode has a peer-to-peer architecture? Answer: The distributed or cooperative caching mode has a peer-to-peer type of architecture; content is cached on Windows 7 clients computers after it is retrieved from a Windows Server 2008 R2. Then, it is sent directly to other Windows 7 clients, as they need it, without those clients having to retrieve the same content over the WAN link.

    30. How BranchCache Works Slide is here for image purposes only.Slide is here for image purposes only.

    31. BranchCache Requirements Key message: There are different configurations for the client and server in a BranchCache environment. They depend, in part, on what type of caching is used. Reinforce the previous cache model topic. Discussion prompt: If possible, build on the discussion from the previous topic about caching; have students explain how caching affects client and server configuration in their remote locations. Explain the prerequisites and requirements for BranchCache and then talk about common configuration settings. Use the information on the slide and the following information to accomplish this. On Windows 7 clients, BranchCache is off by default. Client configurations can be performed through Group Policy or done manually. The following are common configuration settings: Set the caching mode to cooperative or hosted. Set the hostname of hosted cache server. Set the client cache size to percentage of the disk or maximum size in bytes. Set the cache location on the disk. Set firewall rules as follows: Content discovery: UDP 3702 (WS-Discovery protocol) Content download: TCP 80 (HTTP protocol) On the Windows Server 2008 R2, BranchCache is not automatically installed. After it is installed, you can configure BranchCache by using Group Policy and the following guidelines: Enable for all, file shares on a computer or on a file share by file share basis. Enable on a Web server (it must be enabled for all Web sites). Equip Hosted Cache with a certificate trusted by client computers that is suitable for Transport Layer Security (TLS). Question: Which of the following operating systems is a requirement on client computers using BranchCache? Answer: The answer(s) are in bold. Windows Server 2008 R2 Windows Vista Windows 7 Windows XP Key message: There are different configurations for the client and server in a BranchCache environment. They depend, in part, on what type of caching is used. Reinforce the previous cache model topic. Discussion prompt: If possible, build on the discussion from the previous topic about caching; have students explain how caching affects client and server configuration in their remote locations. Explain the prerequisites and requirements for BranchCache and then talk about common configuration settings. Use the information on the slide and the following information to accomplish this. On Windows 7 clients, BranchCache is off by default. Client configurations can be performed through Group Policy or done manually.

    32. Demonstration: Configuring BranchCache on a Windows 7 Client Computer In this demonstration, you show how to enable and configure BranchCache on a Windows 7 Computer. Duration - 20 minutes Demonstration Steps - The Companion Content CD also includes these steps. Create and Secure a Shared Folder Log on to the LON-DC1 virtual machine as Contoso\Administrator with a password of Pa$$w0rd. Click Start, click Computer, and double-click Local Disk (C:). In the menu, click New folder. Type BranchCache and press ENTER. Right-click BranchCache and then click Properties. In the BranchCache Properties dialog box, on the Sharing tab, click Advanced Sharing. In the Advanced Sharing dialog box, select the Share this folder check box and then click Permissions. Click Remove and then click Add. In the Select Users, Computers, Service Accounts, or Groups dialog box, in the Enter the object names to select (examples) field, type authenticated users, click Check Names, and then click OK. In the Permissions for Authenticated Users list, select the Allow check box next to Full Control and then click OK. In the Advanced Sharing dialog box, click Caching. Select the Enable BranchCache check box and then click OK. In the Advanced Sharing dialog box, click OK. In the BranchCache Properties dialog box, click the Security tab. Click Edit and then click Add. In the Select Users, Computers, Service Accounts, or Groups dialog box, in the Enter the object names to select (examples) field, type Authenticated Users, click Check Names, and then click OK. In the Permissions for Authenticated Users list, select the Allow check box next to Full Control and then click OK. In the BranchCache Properties dialog box, click the Close button. The steps continue on the next hidden slide. In this demonstration, you show how to enable and configure BranchCache on a Windows 7 Computer. Duration - 20 minutes Demonstration Steps - The Companion Content CD also includes these steps. Create and Secure a Shared Folder Log on to the LON-DC1 virtual machine as Contoso\Administrator with a password of Pa$$w0rd. Click Start, click Computer, and double-click Local Disk (C:). In the menu, click New folder. Type BranchCache and press ENTER. Right-click BranchCache and then click Properties. In the BranchCache Properties dialog box, on the Sharing tab, click Advanced Sharing. In the Advanced Sharing dialog box, select the Share this folder check box and then click Permissions. Click Remove and then click Add. In the Select Users, Computers, Service Accounts, or Groups dialog box, in the Enter the object names to select (examples) field, type authenticated users, click Check Names, and then click OK. In the Permissions for Authenticated Users list, select the Allow check box next to Full Control and then click OK. In the Advanced Sharing dialog box, click Caching. Select the Enable BranchCache check box and then click OK. In the Advanced Sharing dialog box, click OK. In the BranchCache Properties dialog box, click the Security tab. Click Edit and then click Add. In the Select Users, Computers, Service Accounts, or Groups dialog box, in the Enter the object names to select (examples) field, type Authenticated Users, click Check Names, and then click OK. In the Permissions for Authenticated Users list, select the Allow check box next to Full Control and then click OK. In the BranchCache Properties dialog box, click the Close button. The steps continue on the next hidden slide.

    33. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane. Configure BranchCache Group Policy settings On LON-DC1, click Start, point to Administrative Tools, and then click Group Policy Management. In Group Policy Management, expand Forest: Contoso.com, expand Domains, expand Contoso.com, expand Group Policy Objects, click BranchCache, right-click BranchCache, and then click Edit. Expand Computer Configuration, expand Policies, expand Administrative Templates, expand Network, and then click BranchCache. Double-click Turn on BranchCache, click Enabled, and then click OK. Double-click Set BranchCache Distributed Cache mode, click Enabled, and then click OK. Double-click Configure BranchCache for network files, click Enabled, under Options type 0, and then click OK. Double-click Set percentage of disk space used for client computer cache, click Enabled, under Options, type 10, and then click OK. Close Group Policy Management Editor. Close Group Policy Management. Close all open windows. The steps continue on the next hidden slide.Configure BranchCache Group Policy settings On LON-DC1, click Start, point to Administrative Tools, and then click Group Policy Management. In Group Policy Management, expand Forest: Contoso.com, expand Domains, expand Contoso.com, expand Group Policy Objects, click BranchCache, right-click BranchCache, and then click Edit. Expand Computer Configuration, expand Policies, expand Administrative Templates, expand Network, and then click BranchCache. Double-click Turn on BranchCache, click Enabled, and then click OK. Double-click Set BranchCache Distributed Cache mode, click Enabled, and then click OK. Double-click Configure BranchCache for network files, click Enabled, under Options type 0, and then click OK. Double-click Set percentage of disk space used for client computer cache, click Enabled, under Options, type 10, and then click OK. Close Group Policy Management Editor. Close Group Policy Management. Close all open windows. The steps continue on the next hidden slide.

    34. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane. Configure the Client Switch to the LON-CL1 computer and log on as Contoso\Administrator with a password of Pa$$w0rd. Click Start, click Control Panel, click System and Security, and then click Windows Firewall. In Windows Firewall, click Allow a program or feature through Windows Firewall. Under Allowed programs and features, in the Name list, select the following check boxes and then click OK. Also ensure that the check box under Domain is selected. BranchCache Content Retrieval (Uses HTTP) BranchCache Peer Discovery (Uses WSD) Close Windows Firewall. Open a Command Prompt. At the Command Prompt, type gpupdate /force and then press ENTER. At the Command Prompt, type netsh branchcache set service mode=DISTRIBUTED and then press ENTER. Verify the Status of BranchCache At the Command Prompt, type netsh branchcache show status and then press ENTER. Question: What is the effect of having the Configure BranchCache for network files value set to zero (0)? Answer: This is the acceptable round-trip delay time before caching is enabled. If you set a high value, then caching might not occur at all. Setting the value of zero means that all files in a share are cached, regardless of the delay.Configure the Client Switch to the LON-CL1 computer and log on as Contoso\Administrator with a password of Pa$$w0rd. Click Start, click Control Panel, click System and Security, and then click Windows Firewall. In Windows Firewall, click Allow a program or feature through Windows Firewall. Under Allowed programs and features, in the Name list, select the following check boxes and then click OK. Also ensure that the check box under Domain is selected. BranchCache Content Retrieval (Uses HTTP) BranchCache Peer Discovery (Uses WSD) Close Windows Firewall. Open a Command Prompt. At the Command Prompt, type gpupdate /force and then press ENTER. At the Command Prompt, type netsh branchcache set service mode=DISTRIBUTED and then press ENTER. Verify the Status of BranchCache At the Command Prompt, type netsh branchcache show status and then press ENTER. Question: What is the effect of having the Configure BranchCache for network files value set to zero (0)? Answer: This is the acceptable round-trip delay time before caching is enabled. If you set a high value, then caching might not occur at all. Setting the value of zero means that all files in a share are cached, regardless of the delay.

    35. Lab: Configuring Mobile Computing and Remote Access in Windows 7 Exercise 1: Creating a Sync Partnership Exercise 2: Configuring Power Options Exercise 3: Enabling Remote Desktop Exercise 4: Enabling BranchCache In this lab, students will read the lab scenario and associated support ticket. They will then complete the tasks related to resolving the issues on the support ticket and finally update the ticket with their resolution steps. Exercise 1 In this exercise, students configure a sync partnership by using Windows Mobile Device Center. Exercise 2 In this exercise, students configure power options to optimize the battery life of Amy Ruskos laptop computer. Exercise 3 In this exercise, students help Amy by enabling remote desktop on her office computer so that she can access it from a production plant. Exercise 4 In this exercise, students enable and configure BranchCache to help users at the Slough plant access files more efficiently in the absence of a local file server. Before students begin the lab, read the scenario associated with each exercise to the class. This will reinforce the broad issue that the students are troubleshooting and will help to facilitate the lab discussion at the end of the module. Remind students to complete the discussion questions after the last lab exercise. Note: The lab exercise answer keys are provided on the Course Companion CD. To access the answer key, click the link located at the bottom of the relevant lab exercise page. In this lab, students will read the lab scenario and associated support ticket. They will then complete the tasks related to resolving the issues on the support ticket and finally update the ticket with their resolution steps. Exercise 1 In this exercise, students configure a sync partnership by using Windows Mobile Device Center. Exercise 2 In this exercise, students configure power options to optimize the battery life of Amy Ruskos laptop computer. Exercise 3 In this exercise, students help Amy by enabling remote desktop on her office computer so that she can access it from a production plant. Exercise 4 In this exercise, students enable and configure BranchCache to help users at the Slough plant access files more efficiently in the absence of a local file server. Before students begin the lab, read the scenario associated with each exercise to the class. This will reinforce the broad issue that the students are troubleshooting and will help to facilitate the lab discussion at the end of the module. Remind students to complete the discussion questions after the last lab exercise. Note: The lab exercise answer keys are provided on the Course Companion CD. To access the answer key, click the link located at the bottom of the relevant lab exercise page.

    36. Lab Scenario The Contoso Corporation is implementing Windows 7 desktops throughout their organization. You are a help-desk technician in the Contoso Corporation. Don is the Production manager for Contoso in the UK. Don is about to visit all the manufacturing plants in the UK. Before he leaves, Don wants you to enable and configure a sync partnership with his Windows Mobile device. He also wants you to configure a power plan on his laptop computer. In addition, he wants you to enable Remote Desktop on his office computer so he can connect to it while hes travelling. Finally, users in the Slough production plant require timely access to corporate HQ files during Dons visit. Slough does not have a file server at present, and so you must enable BranchCache in Distributed Cache mode. Use the following information as needed to describe specific scenarios for each exercise. This information is also included in the student handbook. Use the following information as needed to describe specific scenarios for each exercise. This information is also included in the student handbook.

    37. Lab Review In exercise 2, you enabled the Remote Desktop feature through the firewall by editing the local firewall settings. Is there an alternative way in which you can make this change? If you attempted to connect to Dons computer from a computer out on the Internet somewhere, what additional settings must you consider? In exercise 3, you established the necessary settings to support BranchCache in Distributed cache mode. If the Slough plant installed a file server, what other way can you implement BranchCache? Yes, you can configure the settings through Group Policy on a domain controller. This enables you to apply the settings to a larger group of computers in a single administrative step. It is likely that in addition to Dons computers firewall settings, you will need to configureor request configuration ofthe corporate firewall. You will need to enable TCP port 3389 to support remote desktop. It is possible to use different ports over which to connect using Remote Desktop, but this must be configured at the computer to which you want to connect. In Hosted cache mode, where the local server can be used to store cached documents for subsequent retrieval. The file server must be running Windows Server 2008. Yes, you can configure the settings through Group Policy on a domain controller. This enables you to apply the settings to a larger group of computers in a single administrative step. It is likely that in addition to Dons computers firewall settings, you will need to configureor request configuration ofthe corporate firewall. You will need to enable TCP port 3389 to support remote desktop. It is possible to use different ports over which to connect using Remote Desktop, but this must be configured at the computer to which you want to connect. In Hosted cache mode, where the local server can be used to store cached documents for subsequent retrieval. The file server must be running Windows Server 2008.

    38. Module Review and Takeaways Review Questions Common Issues Review Questions Amy wants to connect to the network wirelessly but is unable to, so she checks the Windows Mobility Center to turn on her wireless network adapter. She does not see it in the Windows Mobility Center. Why is that? You have purchased a computer with Windows 7 Home edition. When you choose to use Remote Desktop to access another computer, you cannot find it in the OS. What is the problem? You have some important files on your desktop work computer that you need to retrieve when you are at a clients location with your laptop computer. What do you need to do on your desktop computer to ensure that you can download your files when at a customer site? Your company recently purchased a Windows Server 2008 computer. You have decided to convert from a database server to a DirectAccess Server. What do you need to do before you can configure this computer with DirectAccess? Amy needs to configure her Windows 7 client computer access to take advantage of BranchCache. How can Amy configure the client to do this? Review Answers If a setting does not appear in the Windows Mobility Center, it might be because the requested hardware (such as a wireless network adapter) or drivers is missing. Remote Desktop is not available in Windows7 Home editions. You need to configure remote access on your desktop computer. Select one of the access options in the Remote Settings tab of System from System and Security in Control Panel. You will need to upgrade to Windows Server 2008 R2 and potentially upgrade to an IPv6 infrastructure, in addition to possibly installing a second network adapter in the server. In Windows 7, BranchCache is off by default. Client configurations can be performed through Group Policy or manually on a per-client computer basis. Review Questions Amy wants to connect to the network wirelessly but is unable to, so she checks the Windows Mobility Center to turn on her wireless network adapter. She does not see it in the Windows Mobility Center. Why is that? You have purchased a computer with Windows 7 Home edition. When you choose to use Remote Desktop to access another computer, you cannot find it in the OS. What is the problem? You have some important files on your desktop work computer that you need to retrieve when you are at a clients location with your laptop computer. What do you need to do on your desktop computer to ensure that you can download your files when at a customer site? Your company recently purchased a Windows Server 2008 computer. You have decided to convert from a database server to a DirectAccess Server. What do you need to do before you can configure this computer with DirectAccess? Amy needs to configure her Windows 7 client computer access to take advantage of BranchCache. How can Amy configure the client to do this? Review Answers If a setting does not appear in the Windows Mobility Center, it might be because the requested hardware (such as a wireless network adapter) or drivers is missing. Remote Desktop is not available in Windows7 Home editions. You need to configure remote access on your desktop computer. Select one of the access options in the Remote Settings tab of System from System and Security in Control Panel. You will need to upgrade to Windows Server 2008 R2 and potentially upgrade to an IPv6 infrastructure, in addition to possibly installing a second network adapter in the server. In Windows 7, BranchCache is off by default. Client configurations can be performed through Group Policy or manually on a per-client computer basis.

    39. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane. Common Issues BytesAddedToCache does not increase on the first client when you are accessing the BranchCache-enabled server. The client computer may be retrieving content from the Internet Explorer cache. Be sure to clear the IE cache by selecting Internet Options from the Tools menu and then clicking Delete. Ensure that BranchCache is enabled on the first client using the netsh branchcache show status command. If attempting to access a file share, verify that the latency between the client and server is higher than the minimum threshold. Ensure that the BranchCache feature is installed on the server and is enabled for the protocol under test. Check that the peerdistsvc server has started on both the client and the server. An intermediate proxy may alter the HTTP request coming from the client. Verify that the proxy does not modify the ACCEPT-ENCODING HTTP header. An intermediate proxy may downgrade the outgoing request from HTTP 1.1 to HTTP 1.0. If the symptom is specific to file traffic, ensure that the file is not in the transparent cache. Transparent cache is a secondary cache where the file is stored in addition to the BranchCache. Storing the file in the transparent cache enables subsequent reads of the file to be satisfied locally, improving end-user response times and savings on WAN bandwidth. To delete transparently cached data, search for Offline Files applet in Control Panel. Click the Disk Usage tab and then click Delete Temporary Files. Note that this will not clear the BranchCache cache. BytesAddedToCache does increase on the first client when you are accessing the BranchCache enabled server. BytesFromCache does not increase on the second client when you are accessing the BranchCache enabled server. Deployment is Distributed Cache mode. Ensure that BranchCache is enabled and that both clients are configured to use the same caching mode using the netsh branchcache show status command. Ensure that the correct firewall exceptions are set on both clients using the netsh branchcache show status command. Ensure that both clients are connected to the same subnet using the ipconfig command. Make sure the client cache is not full using netsh branchcache show status ALL. Troubleshooting tips are continued on the next hidden slide.Common Issues BytesAddedToCache does not increase on the first client when you are accessing the BranchCache-enabled server. The client computer may be retrieving content from the Internet Explorer cache. Be sure to clear the IE cache by selecting Internet Options from the Tools menu and then clicking Delete. Ensure that BranchCache is enabled on the first client using the netsh branchcache show status command. If attempting to access a file share, verify that the latency between the client and server is higher than the minimum threshold. Ensure that the BranchCache feature is installed on the server and is enabled for the protocol under test. Check that the peerdistsvc server has started on both the client and the server. An intermediate proxy may alter the HTTP request coming from the client. Verify that the proxy does not modify the ACCEPT-ENCODING HTTP header. An intermediate proxy may downgrade the outgoing request from HTTP 1.1 to HTTP 1.0. If the symptom is specific to file traffic, ensure that the file is not in the transparent cache. Transparent cache is a secondary cache where the file is stored in addition to the BranchCache. Storing the file in the transparent cache enables subsequent reads of the file to be satisfied locally, improving end-user response times and savings on WAN bandwidth. To delete transparently cached data, search for Offline Files applet in Control Panel. Click the Disk Usage tab and then click Delete Temporary Files. Note that this will not clear the BranchCache cache. BytesAddedToCache does increase on the first client when you are accessing the BranchCache enabled server. BytesFromCache does not increase on the second client when you are accessing the BranchCache enabled server. Deployment is Distributed Cache mode. Ensure that BranchCache is enabled and that both clients are configured to use the same caching mode using the netsh branchcache show status command. Ensure that the correct firewall exceptions are set on both clients using the netsh branchcache show status command. Ensure that both clients are connected to the same subnet using the ipconfig command. Make sure the client cache is not full using netsh branchcache show status ALL. Troubleshooting tips are continued on the next hidden slide.

    40. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane. BytesAddedToCache does increase on the first client when you are accessing the BranchCache enabled server. BytesFromCache does not increase on the second client when you are accessing the BranchCache enabled server. Deployment is Hosted Cache mode. Ensure that BranchCache is enabled and that both clients are configured to use the same caching mode using the netsh branchcache show status command. Verify basic connectivity from both client computers to the Hosted Cache using the ping command. Ensure that the correct firewall exceptions are set on both clients using the netsh branchcache show status command. Ensure that the correct firewall exceptions are set on the Hosted Cache server using the netsh branchcache show status command. Ensure that the certificate is properly installed and bound to port 443 on the Hosted Cache computer. Netsh shows BranchCache firewall rules have not been set, even though they have been configured using Group Policy. Netsh checks the predefined BranchCache firewall rule group. If you have not enabled the default exceptions defined for BranchCache on Windows7, Netsh will not report your configuration correctly. This is likely to happen if you defined firewall rules for clients using Group Policy and you defined the Group Policy object on a computer running an operating system older than Windows7 or Windows Server2008R2 (which does not have the BranchCache firewall rule group). Note that this does not mean BranchCache will not function. A client computer is running slowly. Is BranchCache at fault? Many computers drawing large amounts of content from one client in a short time period may impact desktop performance. Use performance monitor to check for high service rates to peers. Examine BytesServedToPeers relative to BytesFromCache and BytesFromServer. The BranchCache service runs isolated in its own service host. Examine the CPU and memory consumption of the service host process that is housing the branch caching service. Sustained high rates of service to peers may be evidence of a configuration problem in the branch office. Check to make sure that the other clients in the branch office are capable of service data. Clear the cache on the affected client using the netsh branchcache flush command or reduce the cache size on the affected client. Troubleshooting tips are continued on the next hidden slide. BytesAddedToCache does increase on the first client when you are accessing the BranchCache enabled server. BytesFromCache does not increase on the second client when you are accessing the BranchCache enabled server. Deployment is Hosted Cache mode. Ensure that BranchCache is enabled and that both clients are configured to use the same caching mode using the netsh branchcache show status command. Verify basic connectivity from both client computers to the Hosted Cache using the ping command. Ensure that the correct firewall exceptions are set on both clients using the netsh branchcache show status command. Ensure that the correct firewall exceptions are set on the Hosted Cache server using the netsh branchcache show status command. Ensure that the certificate is properly installed and bound to port 443 on the Hosted Cache computer. Netsh shows BranchCache firewall rules have not been set, even though they have been configured using Group Policy. Netsh checks the predefined BranchCache firewall rule group. If you have not enabled the default exceptions defined for BranchCache on Windows7, Netsh will not report your configuration correctly. This is likely to happen if you defined firewall rules for clients using Group Policy and you defined the Group Policy object on a computer running an operating system older than Windows7 or Windows Server2008R2 (which does not have the BranchCache firewall rule group). Note that this does not mean BranchCache will not function. A client computer is running slowly. Is BranchCache at fault? Many computers drawing large amounts of content from one client in a short time period may impact desktop performance. Use performance monitor to check for high service rates to peers. Examine BytesServedToPeers relative to BytesFromCache and BytesFromServer. The BranchCache service runs isolated in its own service host. Examine the CPU and memory consumption of the service host process that is housing the branch caching service. Sustained high rates of service to peers may be evidence of a configuration problem in the branch office. Check to make sure that the other clients in the branch office are capable of service data. Clear the cache on the affected client using the netsh branchcache flush command or reduce the cache size on the affected client. Troubleshooting tips are continued on the next hidden slide.

    41. Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane. A page fails to load or a share cannot be accessed. When BranchCache is unable to retrieve data from a peer or from the Hosted Cache, the upper layer protocol will return to the server for content. If a failure occurs in the Branch Caching component, the upper layer protocol must seamlessly download content from the server. No BranchCache misconfiguration or failure must prevent the display of a webpage or connection to a share. If a failure does occur, use the Network Diagnostic Framework Diagnose button provided by Windows Explorer or Internet Explorer. The client computer is unable to access the file share even when connected to the server. If the client computer is unable to access a file share on the server due to the Offline (network disconnected) error, restart the client computer and access the share again. If the client computer is unable to access a file share on the server due to the Offline (slow connection) error, delete the temporarily cached data, restart the computer and access the share. To delete temporarily cached data (the same as the transparent cache described above), search for Offline Files applet in Control Panel. Click the Disk Usage tab and then click Delete Temporary Files. A page fails to load or a share cannot be accessed. When BranchCache is unable to retrieve data from a peer or from the Hosted Cache, the upper layer protocol will return to the server for content. If a failure occurs in the Branch Caching component, the upper layer protocol must seamlessly download content from the server. No BranchCache misconfiguration or failure must prevent the display of a webpage or connection to a share. If a failure does occur, use the Network Diagnostic Framework Diagnose button provided by Windows Explorer or Internet Explorer. The client computer is unable to access the file share even when connected to the server. If the client computer is unable to access a file share on the server due to the Offline (network disconnected) error, restart the client computer and access the share again. If the client computer is unable to access a file share on the server due to the Offline (slow connection) error, delete the temporarily cached data, restart the computer and access the share. To delete temporarily cached data (the same as the transparent cache described above), search for Offline Files applet in Control Panel. Click the Disk Usage tab and then click Delete Temporary Files.

    42. Course Evaluation Remind students to complete the course evaluation.Remind students to complete the course evaluation.

More Related