There are many tasks involved in keeping Windows clients secure and performing at their best. Microsoft helps in that regard by offering the tools you need to manage and maintain them. You can use Windows Update to protect computers from hackers and known security holes. If by chance an update causes problems, you can remove it easily. You can also use Disk Management to manage disk volumes and use tools like Disk Defragmenter, Disk Cleanup, and Check Disk to keep your drives healthy and running efficiently. Finally, you can use myriad tools to monitor performance, including but not limited to Task Manager, Performance Monitor, and Event Viewer.
Objectives in this chapter:
Windows Updates are provided by Microsoft and have been part of the ongoing attempt to keep Microsoft operating systems safe and secure week after week, year after year, for decades. These updates often offer new features or functionality, but for the most part they are pushed out to fix security issues, address new security threats, and provide new device drivers. This is a necessary part of any company’s maintenance plan, because there will always be those who will try to hack into systems, unleash viruses, hide malware, and so on. You need to be protected. Thus, you have to install these updates and it’s best if you create a policy for doing so.
In small organizations that do not make use of an Active Directory infrastructure and instead are small peer-to-peer networks, most client computers are configured to automatically install updates. There’s often no policy and no one to oversee the process. In larger organizations, even those that are configured as workgroups (and not Active Directory domains), administrators often prefer to set policies for updates through Local Group Policy. In Active Directory domains, there’s commonly an isolated lab where updates are tested before they are rolled out, and sometimes there’s even a specialized server that caches those updates first to lessen the bandwidth that would be required should each client get updates directly from Microsoft. With this approach, updates can be tested before releasing them to clients, too. Of course, there are Group Policies for Windows Update in domains to help administrators manage them as well.
Windows Store apps update themselves automatically unless you change the default configuration or apply Group Policies. These updates are generally safe to install, because all apps and app updates go through Microsoft first and are offered through the Microsoft Store only after thorough testing. However, in some instances you might want or need to disable these automatic updates.
The first time you log on to a new Windows 8.1 installation, the default apps will be updated.
On a single workstation, you can disable automatic app updates by following these steps:
On the Start screen, click Store.
Press Windows key+I to open the Settings charm.
Click App Updates.
Move the Automatically Update My Apps slider from Yes to No.
If you opt to disable automatic updates, you’ll have to update them manually. Watch for updates from the Store in the upper-right corner.
Before moving on, here are a few more things you should know about Windows Store and app updates:
There are four settings in Group Policy that relate to the Store in Computer Configuration, Administrative Templates, Windows Components, Store. See Figure 6-1. They are:
There are two settings in Group Policy that relate to the Store in User Computer Configuration, Administrative Templates, Windows Components, Store. They are:
Turn Off The Offer To Update To The Latest Version Of Windows
Turn Off The Store Application
Network administrators can control how updates are installed from the Windows Store in an Active Directory domain using AppLocker. For more information about AppLocker, refer to the TechNet article at http://technet.microsoft.com/en-us/library/ee424367.aspx.
Organizations can create their own apps through a process called sideloading. Sideloading enables companies to create their own apps and forgo Microsoft’s inspection process. Apps must be digitally signed and the computers to which you want to offer the apps must be configured to allow the installation (use Group Policy to enable Allow Trusted App To Install).
You might see something about sideloading on the exam, so make sure you’re familiar with these Windows PowerShell commands:
Add-AppxPackage. Adds a signed app package (.appx) to a user account
Get-AppxPackage. Gets a list of the app packages (.appx) that are installed in a user profile
Remove-AppxPackage. Removes an app package (.appx) from a user account
Also, at an elevated command prompt you can use these commands:
Slmgr /ipk <sideloading product key>. Adds a sideloading key
slmgr /ato (followed by the key). Activates the sideloading key
The following is a sample command:
add-appxpackage C:\companyapp8.appx –DependencyPath C:\winjs.appx.
Unless you are specifically asked about Store updates or something very specific such as firmware updates, any references to updates on the exam refer to Windows Updates. These are the updates you’re familiar with from Control Panel; these are the updates you’ve been working with for years.
The settings you need to access are available in the Windows Update window, from Control Panel, in System And Security, from Windows Update. Here you’ll find the options Check For Updates, Change Settings, View Update History, Restore Hidden Updates, Installed Updates, and Add Features To Windows 8.1. You’ll also see any available updates that are scheduled to install, optional updates, and information about when you received updates. Figure 6-2 shows this window.
You can use PC Settings, Update And Recovery to quickly see if a client machine is configured to receive updates. You can also view the update history and choose how updates get installed. However, most network administrators still prefer the Windows Update window, available from Control Panel, because all options are available there, not just the ones that end users would likely access.
To configure update settings from Control Panel, follow these steps:
Click System And Security and click Windows Update.
In the Windows Update window shown in Figure 6-2, click Change Settings.
Make your preferred choices using the options available in the Important Updates drop-down list. See Figure 6-3.
Click the scheduling option shown. The default entry is Updates Will Be Automatically Installed During The Maintenance Window. See Figure 6-3.
If desired, use the Run Maintenance Tasks Daily At drop-down list to choose a different time. The default is 3 A.M.
If desired, select the Allow Scheduled Maintenance To Wake Up My Computer At The Scheduled Time check box.
Click OK.
Click OK.
Make sure you are knowledgeable about the four options from step 3:
Install Updates Automatically (Recommended)
Download Updates But Let Me Choose Whether To Install Them
Check For Updates But Let Me Choose Whether To Download Or Install Them
Never Check For Updates (Not Recommended)
When a new device is connected to a computer, Windows 8.1 searches for a driver on the computer. If it doesn’t find one, it looks to Windows Update.
Standard users can install drivers that have been downloaded from Windows Update without a User Account Control (UAC) prompt.
Optional updates might be available in the Windows Update window that weren’t installed automatically, so occasionally check to see if any are available.
Windows Update, configured as detailed in this section, is a good solution for small workgroups and organizations (50 or fewer users is a general rule of thumb). If your organization is larger, you should install and configure a Windows Server Update Services (WSUS) server. With WSUS, updates are downloaded to the WSUS server and then the administrator can make them available when they are ready, perhaps after they’ve been tested. They can even pass on the updates to other WSUS servers in large organizations. This saves bandwidth, too, because the updates only need to be downloaded once from the Internet. After that they can be pushed out or downloaded from server to client over the local network.
To use WSUS, Windows clients must be configured to use the WSUS server through Group Policies. You can’t make that change in Control Panel. The policy you’re looking for is Specify Intranet Microsoft Update Service Location. It’s located in the applicable Group Policy editor: Computer Configuration, Administrative Templates, Windows Components, Windows Update. This is only one of many policies available in the Windows Update node. You’ll learn about these later in this section.
In Figure 6-2 you saw the View Update History option in the task pane of the Windows Update window. You click that option to view all of the updates that have been installed on the computer. They are organized by the date installed by default, but you can click any tab on the tab bar to sort them in other ways. You can sort by Importance, which organizes the updates by their type. If you look closely at Figure 6-4, you’ll notice there are lots of updates marked Important and only a handful marked Recommended.
Make sure you’re familiar with the various types of updates, what they offer, and why they are used: Important, Recommended, Optional, Security, Critical, and Service Packs.
You can also sort updates by name. When you do, you can more easily see what is being updated. You’ll likely see a lot of Definition updates for Windows Defender, updates for the Windows 8.1 operating system, updates for the Windows Malicious Software Removal Tool, updates for the dictionary, and more. You’ll also see Cumulative Security Updates for various items including Internet Explorer 11. To learn more about any update, including any related Knowledge Base articles, double-click it, as shown in Figure 6-5. (You can also right-click to copy it.)
When you roll back an update, you uninstall it. Logically then, it must have been installed first. To access an installed update, you need to open the Windows Update window and click Installed Updates in the upper-left corner. Once you’ve found the update to uninstall, click it and then click Uninstall. See Figure 6-6.
If you know ahead of time that an update is coming that you don’t want to install (and you don’t use a WSUS server), you might want to temporarily change the settings in Windows Update so that you are prompted when updates are available while retaining control regarding what to install and when. Then, you can hide the update before it is installed automatically and forgo the need to uninstall it later.
To hide an update, follow these steps:
Open the Windows Update window.
Click the notification for the available updates. Figure 6-7 shows that one update is available.
Locate the update in the Select Updates To Install pane that appears, right-click it, and click Hide Update.
If you decide later to install the update, from the Windows Update window, click Restore Hidden Updates. Select the desired updates and click Restore.
When you need more control over how Windows Updates are applied to client machines, you can set local and domain Group Policies. You’ll find the settings in the Group Policy Editor from Computer Configuration, Administrative Templates, Windows Components, Windows Update. There are quite a few to review, and because they aren’t always self-explanatory, we’ll cover them in more depth than previous Group Policy settings.
Remember, when you enable a specific Group Policy setting, you are configuring the policy to do exactly what it says it will do. So, if the policy setting starts with the words “Do not display...,” then when you enable the setting whatever it is will not be displayed. If the policy starts with the words “Turn on...,” then when you enable the policy the thing will be turned on. Unless otherwise stated, when you disable a policy the result is the same as not configuring it at all. So, unless there is a specific issue with a setting, we’ll only discuss what happens when you enable it here. The settings are shown in Figure 6-8.
When enabled, Install Updates And Shut Down will not appear as a choice in the Shut Down Windows dialog box, even if the updates are available for installation when the user selects the Shut Down option.
When enabled, the user’s last shut down choice is the default option in the Shut Down Windows dialog box, no matter if the Install Updates And Shut Down option is available in the What Do You Want The Computer To Do? list.
When enabled, Windows Update wakes up a system that is hibernating (using the Windows Power Management feature) to install the updates. If Windows Update wakes the system but discovers it is running on battery power, it goes back into hibernation in two minutes and does not install any updates.
When enabled, a restart timer will begin immediately after Windows Update installs important updates. It will not notify the user in advance of any plans to restart the system. You will then set your own restart timer in minutes. Users will be prompted to save their work, but a restart will occur no matter what the user would rather have happen. (If the No Auto-Restart With Logged On Users For Scheduled Automatic Updates Installations policy is enabled, this policy has no effect. This is another instance of Deny always overriding other settings.
This sets a Group Policy for how Automatic Updates are configured. If enabled, you choose the auto download and installation settings, and if you select Auto Download And Schedule The Install, then you can also opt to make those installs during automatic maintenance periods. You can also configure how often to schedule the installation and the install time. See Figure 6-9.
When enabled, you specify a server on your network that will hold Windows Updates. Clients will get the updates from this server. It’s likely a WSUS server, as noted earlier in this chapter. Larger networks will use a System Center Configuration Manager (SCCM) server instead. You need to type two fully qualified domain names (FQDNs) when you enable this policy:
Set The Intranet Update Service For Detecting Updates
Set The Intranet Statistics Server
When enabled, you specify the hours that Windows will use to determine how long to wait before checking for available updates. When you set an interval, say every 20 hours, the interval is actually calculated to 80 percent of this number to give a window. For 20 hours, the window becomes between 16 and 20 hours. Windows will check for updates during this interval.
When enabled, the client will not try to obtain any updates, even from the public Windows Update service or the Windows Store. Note that because this policy disables this, it might cause the Windows Store to stop working.
When enabled, non-administrators will receive update notifications. Users can install the updates for which a notification was received. There is a lot more information offered about this setting in the Policy Settings window. Make sure to review this as time allows. See Figure 6-10.
When enabled, a notification message will appear on the user’s computer when featured software updates are available. The featured software notifications come from the Microsoft update service. This feature should only be used in loosely managed environments.
When enabled, Automatic Updates will immediately install once they are downloaded and ready. If the Configure Automatic Updates policy is disabled, this policy has no effect.
When enabled, Automatic Updates will install recommended updates and important updates.
When enabled, Automatic Updates will not restart a computer automatically during a scheduled installation if a user is logged in. Instead, the user will be prompted to restart the computer. If disabled or not configured, the computer will notify the user and then restart after five minutes to complete the installation. If the Configure Automatic Updates policy is disabled, this setting has no effect.
When enabled, a scheduled restart will occur the specified number of minutes after the previous prompt for a restart was postponed. If this is not set or disabled, the default interval is 10 minutes. If the Configure Automatic Updates policy is disabled, this policy has no effect. It has no effect on Windows RT, either.
When enabled, a scheduled restart will occur the specified number of minutes after the installation is finished. If disabled or not configured, the default is 15 minutes. If the Configure Automatic Updates policy is disabled, this policy has no effect.
When enabled, a scheduled installation that did not take place earlier will occur the specific number of minutes after the computer is next started. When disabled, a missed scheduled installation will occur with the next scheduled installation. If this is not configured, a missed scheduled installation will occur one minute after the computer is next started. If the Configure Automatic Updates policy is disabled, this policy has no effect.
When enabled, the specified target group you name will be sent to the intranet Microsoft update server. This server can be configured to deploy updates as desired to the specified group. You might configure a setting for all laptop users, say, so that you can specify when and how updates are sent or downloaded.
When enabled, Automatic Updates from non-Microsoft companies that are received through the Microsoft update server will be accepted if they are signed with a certificate from within the Trusted Publishers certificate store. Updates signed by Microsoft will also be installed. When this is disabled or not configured, only those signed by Microsoft will be installed.
It’s important to keep the Windows 8.1 operating system as up to date as possible with Windows Store updates and Windows Updates.
After Windows Updates are applied, you can access the updates from the Windows Update window and roll them back if they cause problems.
You can configure Group Policies to manage how and when computers in an organization are updated.
Answer the following questions to test your knowledge of the information in this objective. You can find the answers to these questions and explanations of why each answer choice is correct or incorrect in the “Answers” section at the end of this chapter.
Although it might seem—especially with the integration of SkyDrive (which is being renamed OneDrive) and all the talk about domains and file servers—that no one stores anything locally anymore, they do. Even users who depend on cloud or on- or off-site storage might still use the local machine or attached drives for backups if for no other reason. Thus, it’s still important you understand how to manage local storage. In this objective, you’ll explore disk volumes, learn about file system fragmentation, and learn about a new feature, Storage Spaces.
This objective addresses how to manage existing hard disks. It likely does not ask questions about how to prepare a raw disk for use. However, you should know a little about this, if only to be comfortable with some of the terms you’ll see both on the job and on the exam. So, before we dive in to managing disk volumes, we’ll review (or introduce you to) some common disk-related terms.
When you install Windows 8.1, the installation program configures the hard disks for you. This includes but is not limited to selecting a partition style, selecting a disk type, creating the required volumes or partitions, and formatting the volumes with the desired file system. Once this is done and the operating system is up and running, you can make changes to the options you chose during installation or the options applied automatically.
To fully understand how the installation is achieved and what can be done using the various disk management tools, you need to be familiar with the following terms:
Partition style. Master Boot Record (MBR) and GUID Partition Table (GPT). MBR is the default partition style for x86- and x64-based computers. GPT can be used on x86- and x64-based Windows 8 computers and was first introduced with Windows Vista. Before then, only MBR was available.
MBR uses a table to point to locations on a disk. It supports partitions up to 2 TB; up to either four primary partitions or three primary and one extended. A hidden partition holds important data that is critical to computer operations. GPT with Windows 8.1 supports up to 128 primary partitions and volumes up to 18 exabytes, and data that is critical is saved on a partition that is not hidden. To use GPT, the computer must support Extensible Firmware Interface (EFI) boot partitioning. GPT offers redundancy for improved security and reliability.
Partition types. Primary and extended. These are used with basic disks. Primary partition types function as a separate disk, can be marked as the active partition, can host an operating system, and have their own drive letter. Extended partitions cannot host an operating system, cannot be marked as active, and can contain an unlimited number of logical partitions.
Volume types. Volumes (in contrast to partitions) are used with dynamic disks. They can be simple, spanned, striped, mirrored, or Redundant Array of Independent Disks-5 (RAID-5). Windows 8.1 doesn’t support RAID-5, though. You can’t use dynamic disks or any option here on a multiboot system. If you have basic disks you want to configure this way, the disks must be converted to dynamic. The system can do this for you.
Simple. A single disk that can be extended to create a spanned or striped volume. If a disk fails, the data on the disk is lost.
Spanned. From 2 to 32 dynamic disks that are created to combine disk space from those disks. Windows fills the first disk and then writes to the next and the next until all disks are full.
Striped. From 2 to to 32 dynamic disks. Data is written in stripes to each disk, increasing the write time. Data is written to one disk while the other(s) get ready to accept data. If one disk fails, the data on that disk is lost.
Mirrored. Two dynamic disks that are exactly the same size. Data is written to both simultaneously to provide fault tolerance. If a disk fails, the other disk contains mirrored data and thus data is not lost.
File systems. FAT, FAT32, exFat, NTFS. A file system defines how the drive is structured; NTFS is preferred.
If any of the terms here are new to you (dynamic, basic, partition, volume, MBR, GPT), make sure to do your own research to become familiar with them. For more information about these terms, refer to the MSDN article at http://msdn.microsoft.com/en-us/library/windows/desktop/aa363785(v=vs.85).aspx.
You learned about the Disk Management Microsoft Management Console (MMC) and related snap-in in Chapter 1, where you learned how to use it to create a virtual hard disk (VHD). Here you’ll explore this console further and discover options for managing existing disks, including viewing a disk list and disk properties and creating, managing, shrinking, and extending disk volumes, among other things.
One way to open the Disk Management tool is to type compmgmt.msc in a Run dialog box. You can also right-click the Start button and click Computer Management to gain access. In the Navigation pane, click Disk Management (under Storage). See Figure 6-11. Here you can see a list of disks, their status, volume letters, file system types, and so on.
To view the options for any disk partition or volume, right-click it. You’ll see different options for different entries. For instance, if you right-click the Recovery partition, you’ll only see one option, Help. If you right-click the primary partition, you’ll see other options, including but not limited to Change Drive Letter And Paths, Extend Volume, Shrink Volume, Delete Volume, Properties, and so on, as shown in Figure 6-12. If you right-click the volume and click Properties, you’ll see a familiar Properties dialog box that includes access to various tools including Disk Cleanup, Check Disk, Disk Defragmenter, and even the option to set disk quotas and log events when quota limits are set. Finally, if you right-click the disk box (in Figure 6-11 this is labeled Disk 0 Basic 465.64 GB Online), you’ll see the option to convert to Dynamic Disk and Convert to MBR Disk.
There are limitations to what you can do here, though. For example, you can’t extend a partition if there is no free space to extend to. You can shrink an existing volume (see Figure 6-12) and use the space you’ve created to perform additional tasks, however. You can’t add a mirror if a second disk isn’t available. You can’t delete a volume if it’s the primary volume, and so on. For the most part, though, if you opt to perform a task, you work through a wizard to complete it. You can do a lot of things, including adding disks.
To introduce you to a few of these tasks, in this section you’ll shrink a partition and create a new, simple volume by following these steps:
Open Disk Management.
Select a disk that has extra storage space that you can shrink.
Right-click the disk and click Shrink Volume.
In the Shrink dialog box, enter the amount of space to shrink in MB. You might want to accept the default for this exercise.
Click Shrink.
Note the newly created space and note that it is unallocated. Right-click it and click New Simple Volume. See Figure 6-13.
Click Next to start the New Simple Volume Wizard. Click Next again to accept the defaults for the volume size (you could enter your own size here).
Click Next to accept the assigned drive letter or choose a new letter as desired.
Choose how to format the volume. NTFS is best. Type a new name for the volume (New Volume is the default name) and click Next. See Figure 6-14.
Click Finish.
Note the new disk entry in the disk list. Then, open File Explorer, click This PC, and view your new simple volume there.
To explore further, in Disk Management, right-click the new volume. Note that Delete Volume is now available, as is Format. You can also save data to this new volume, as you would do if this were a USB drive or external backup device.
The Disk Management console is a friendly way to work with disks. However, what you can do there is limited, at least compared to what you can achieve through command-line tools, including Diskpart.exe. Network administrators use this tool when they want to automate disk tasks with scripts and batch files.
The command-line utility Fsutil performs tasks that are related to FAT and NTFS file systems, such as managing reparse points, managing sparse files, and dismounting a volume. If it is used without parameters, Fsutil displays a list of supported subcommands. This command is sometimes associated with tasks that can also involve Diskpart and might be included as a red herring on an exam question.
Diskpart is a command-line tool, but there are Windows PowerShell commands you can use, too. Make sure to review at least a few of these, including Format-Volume, New-Partition, Set-Disk, and Set-Partition.
There are a lot of Diskpart command parameters, including some with which you might already be familiar if you’ve ever created a bootable USB drive. If you have, you’ll likely recognize the commands Create Partition, Select Partition, Active, Format, and so on. You can view all of the command options by typing Diskpart at an elevated command prompt and pressing Enter on the keyboard. When you see the DISKPART> prompt, type Help and press Enter. See Figure 6-15.
Although you’ll need to familiarize yourself with all of the Diskpart parameters, here are a few you should pay special attention to:
Active. To mark the selected partition as active.
Add. To add a mirror to a simple volume.
Assign. To assign a drive letter to a selected volume.
Convert. To convert between basic and dynamic disks. (Basic to dynamic can be done without data loss; the opposite is not true.)
Exit. To exit Diskpart.
Extend. To extend a volume.
Format. To format the volume or partition. (You can convert a FAT partition to NTFS using something like FORMAT FS=NTFS LABEL=”New Volume” QUICK COMPRESS.)
Shrink. To reduce the size of a volume.
To review all of the Diskpart command-line parameters, refer to the article at http://technet.microsoft.com/en-us/library/cc766465(v=WS.10).aspx.
It might or might not be on the exam, but every network administrator should be familiar with how to create a bootable USB flash drive using the Windows ADK, Windows PE, and various Diskpart commands. Review this article to learn how: http://technet.microsoft.com/en-us/library/hh825109.aspx.
Two tools, Check Disk and Disk Cleanup, help you manage disks in two distinct ways. Check Disk will scan the physical disks, look for errors, and fix them automatically (most of the time). Specifically, Check Disk looks for bad storage blocks. You opt to scan the drive, and if errors are found you’ll be prompted to reboot the machine to let Windows fix them. The run line command is Chkdsk. You can also access this tool from the drive’s Properties dialog box on the Tools tab.
Disk Cleanup is also a disk management tool, and with it you can clean the drive by removing temporary files, emptying the Recycle Bin, deleting downloaded program files, and more. Disk Cleanup can be accessed from a drive’s Properties dialog box on the General tab. See Figure 6-16.
Data is written to physical, spinning disks sequentially, from outside to inside, in clusters. When a disk is new, the data is written contiguously, but as data is added and then deleted, areas become open. Data is written to these open areas, too, and eventually data becomes fragmented (stored in noncontiguous segments or clusters). When the disk has to look in multiple places to pull data and offer it to the user, it takes longer than if the data was stored together. Thus, it’s optimal to keep a disk defragmented.
The Disk Defragmenter tool runs automatically and in the background to keep your drives defragmented, but you can run it manually at any time (make sure to do a complete backup first, though). Like Disk Cleanup and Check Disk, you can access Disk Defragmenter from a drive’s Properties dialog box on the Tools tab. When you click Optimize, you’ll see what’s shown in Figure 6-17. From there you can analyze any drive or click Optimize to run Disk Defragmenter. You can also click Change Settings to choose how and when Disk Defragmenter runs on its own.
Storage Spaces is new to computers running Windows 8 and lets you combine free space from multiple disks to create a new type of virtual disk for storing data. It does this by using the unallocated space on those disks to create a storage pool. This makes it easy to expand the storage space just by adding disks. You can create a maximum storage limit before you add the disks as well (a limit that exceeds the disk capacity currently connected), and as you near the limit of the currently installed disks, you’ll be prompted to add more.
Here are a few things to know before you get started:
You cannot use the disk that contains the operating system as part of the storage space.
Serial ATA (SATA) or Serial Attached SCSI (SAS) connected disks are acceptable.
RAID adapters, if used, must have all RAID functionality disabled.
USB flash drives can be used, but USB 3.0 drives are recommended for best performance.
When using USB 2.0 drives, plug them directly into different USB controllers on your computer; do not use USB hubs.
There are various kinds of storage spaces, including simple (no fault tolerance), mirror, and parity. A two-way mirror mirrors data on two drives; a three-way mirror mirrors data on three. Parity enables two drives to hold data and a third to hold parity information, for fault tolerance. You can create a storage space from one disk, but there is no fault tolerance when you do.
You can use Windows PowerShell to manage Storage Spaces. Review common Windows PowerShell commands including Set –PhysicalDisk, Repair –VirtualDisk, and Remove –PhysicalDisk.
You can use Storage Spaces in place of more expensive storage area network (SAN) devices under the right circumstances.
If you move a storage pool, you must keep the pool together.
If you remove and then try to reuse a disk used in a storage pool, you have to format it first.
Refer to this TechNet article to learn more about Storage Spaces: http://technet.microsoft.com/en-us/library/hh831739.
To use this feature, you must first create a storage pool by following these steps:
Connect the disks to use. Format them prior to setup (or make sure you’re willing to let Windows do it during setup).
Open Control Panel, click System And Security, and click Storage Spaces.
Click Create A New Pool And Storage Space.
Select the check boxes for the drives to use and click Create Pool.
In the Create A Storage Space window, make additional configurations such as the name of the pool, resilience type, capacity, and so on. Click Create Storage Space.
Diskpart enables you to manage disks from a command line. You can use the tool to automate tasks and perform tasks not available in the Disk Management snap-in.
Disk Cleanup, Check Disk, and Disk Defragmenter help you maintain your disks by removing unwanted data, repairing bad disk sectors, and keeping files from being fragmented.
Storage Spaces enables you to create a storage pool using various kinds of external disks, including SATA drives and USB flash drives, among others.
Answer the following questions to test your knowledge of the information in this objective. You can find the answers to these questions and explanations of why each answer choice is correct or incorrect in the “Answers” section at the end of this chapter.
Once computer systems are configured and protected, you’ll need to monitor system performance to make sure those systems are functioning effectively and efficiently. There are many tools available to help you with this. In this objective, you’ll learn about some of these tools, specifically those that will be covered on the exam, including Task Manager and Performance Monitor.
Task Manager is one of the most useful tools available in Windows 8.1. Task Manager enables you to manage processes (discrete tasks) that use system resources and see how those resources are affected by those active processes. Because of its simplicity, end users can use it to end problematic processes, disable apps that don’t need to run at startup, view logged-on users, and more. Because it is such a powerful and feature-rich tool, the savviest network administrator can use it to monitor, diagnose, and improve computer performance quickly.
Because running processes are so important to system performance, Task Manager has been redesigned so you can see the process tree, which groups related processes together. The entire interface is much more user-friendly, too. Task Manager has seven tabs. You need to know how you can use each of these to improve performance, and you need to be well versed in what each offers before you take the exam. There are several ways to open Task Monitor, but the simplest is to use the Ctrl+Shift+Esc key combination. Open Task Manager on your own computer now and explore the tabs as you read the rest of this section.
The Processes tab shows all running processes, grouped together as process trees. Processes with trees have a right-facing arrow beside them. You click the arrow to see the related processes. Click a single process or a process tree name and click End Task when you want to close a process that is problematic.
You can sort the processes based on resource usage. As shown in Figure 6-18, the Store is using 53.5 MB of memory. If you believe the Store app is causing problems, you can click End Task to end and close it. Also note in Figure 6-18 that underneath the Store, Internet Explorer is using 47.8 MB of memory and has a right-facing arrow beside it, showing it includes a process tree.
The Performance tab shows real-time statistics for CPU, Memory, Disk, Ethernet, Bluetooth, and Wi-Fi usage. Figure 6-19 shows this tab with Wi-Fi selected. Under the graph you can see the adapter name, Service Set Identifier (SSID), Domain Name Service (DNS) name, connection type, IPv4 and IPv6 addresses, and signal strength. Right-click any entry on the left and click Summary View to minimize the window and show only the left pane. Doing this lets you keep an eye on the usage without using up much of your desktop area.
The App History tab shows usage associated with apps (not desktop apps). All apps are represented here, even if they are not currently in use. You can use this tab to determine the load placed on the system from these apps. Columns here include CPU Time, Network, Metered Network, and Tile Updates. Like the Processes tab, you might see related trees. For instance, the Mail, Calendar, and People app has a right-facing arrow beside it. You can double-click any entry here to open the app or switch to it.
The Startup tab shows what applications start when the computer boots. You can select any application listed here and disable it to keep it from starting when Windows does. Once disabled, you can return to this tab to enable it. You can also view the startup impact caused by the application, which can be marked None, Low, Medium, or High; its status (Enabled or Disabled); and more. You can also right-click any entry to open the file location for it.
In previous operating system editions, you could type msconfig.exe in the Run dialog box to open the System Configuration dialog box (which you can still do), and from there you could click the Startup tab to configure what applications started when Windows did. If you do that now, on the Startup tab of the System Configuration dialog box, you’ll only see one option: Open Task Manager.
The Users tab shows all of the users logged on to the computer, including those logged on remotely. You can expand the tree associated with any user (click the right-facing arrow) to view the processes open for that user. You can select any of these processes and end them by clicking End Task at the bottom of the window, and you can disconnect a user by clicking that user’s name and clicking Disconnect. The active user will be prompted regarding the disconnect command when you use it.
The Details tab shows what the Processes tab showed in previous versions of Task Manager. You can right-click any process to end the task, end the process tree, set a priority, set affinity, create a dump file, and more. Like other tabs, you can click any category name to sort the lists appropriately. See Figure 6-20.
The Services tab displays all of the enabled services. Like other tabs, you can right-click a service to perform a task. The options include Start, Stop, Restart, Open Services, Search Online, and Go To Details.
Resource Monitor is a powerful tool you can use to see even more statistics regarding real-time resources than Task Manager offers. You can open Resource Monitor on the Performance tab of Task Manager or in myriad other ways including searching for it from the Start screen. You can also launch it directly by typing resmon.exe in a Run dialog box. Once it is open, you’ll need to spend some time reviewing each tab.
Figure 6-21 shows Resource Monitor, the Overview tab, the graphs available (which are available from any tab), and what happens when you right-click a process that has been suspended. Suspended processes can cause problems, so if you see them, take note.
For the most part, you use Resource Monitor to troubleshoot problems that you were unable to uncover and resolve using Task Manager and other tools. For instance, on the Memory tab, you can sort processes by how much memory is committed to them. You might find that a single process is using a lot of memory and is problematic. You might not even need to run the application. From there you can right-click to end the process and then return to the Task Manager Startup tab to stop it from starting when Windows does to keep the problem from occurring in the future. This also reduces the load on memory, which will improve computer performance. As you can see in Figure 6-21, there are four graphs: CPU, Disk, Network, and Memory. These also show real-time information.
As you explore each tab, you’ll see a lot of terms you’ll need to know with regard to Resource Monitor, including PID (the Process ID of the application) and Commit (the amount of memory committed by an application). There’s not enough space here to discuss all of these terms, so you’ll have to take on that task yourself. You can learn about Resource Monitor from the TechNet article at http://technet.microsoft.com/en-us/library/dd883276(WS.10).aspx.
Windows 8.1 indexes the files, folders, documents, and other data on your computer so that the data can be found quickly when it’s needed. By default, specific areas are indexed, including the data associated with users and application data you access often, such as Microsoft Office Outlook or Windows Sticky Notes. You can control what is indexed from the Indexing Options dialog box and add or remove locations to suit your needs. You’ll need to do this if you store files on the hard drive where indexing doesn’t occur by default or if areas are being indexed that don’t require it. You can also reconfigure advanced settings from the Indexing Options dialog box to gain even more control. Type Index on the Start screen and click Indexing Options to see the Indexing Options dialog box shown in Figure 6-22.
Although you might think that indexing your entire hard disk would improve performance, it won’t. The size of the index, which would then include things like program and application files, would hinder searches.
When you click Modify in Figure 6-22, you can see exactly what’s being indexed and you can click Show All Locations to see any locations that are hidden by default. From there you can clear the check boxes for items you feel don’t require indexing. You can also click any right-facing arrow to see the subfolders available from the parent folder and from there you can add areas to index. Figure 6-23 shows this.
Finally, in the Indexing Options dialog box you can click Advanced. The Advanced Options dialog box has two tabs: Index Settings and File Types. The Index Settings tab lets you add or exclude encrypted files, treat similar words as different words, delete and rebuild the index (if it becomes corrupt), and change the index location. The File Types tab lets you exclude any type of file you want, and hundreds might be listed there. You can opt not to index files of a specific type or you can add file types that Windows doesn’t currently list. Some programs create proprietary file formats that you’ll need to add manually to index.
Another way you can manage and maintain computer performance is to use Event Viewer to analyze Windows logs. These include Application, Security, Setup, System, and Forwarded Events. These logs can help you uncover problems that are difficult if not impossible to diagnose elsewhere.
You can launch Event Viewer in many ways, including searching for it from the Start screen, adding it as a snap-in to an MMC, and opening it from the Administrative Tools window or from the Computer Management console. You learned how to configure object access auditing in Chapter 4, set alerts for the events when they occur, and more. Thus, you already know quite a bit about Event Viewer if you read this book from start to finish.
Each log you’ll explore here offers information about events that occur and their importance. While reviewing logs, you’ll see these levels of events:
Information. Events labeled as Information are normal events, but they have been logged to provide information about a change related to a component or process.
Error. These events warn that a problem has occurred, but the problem probably won’t affect the performance of the component being called out. It might affect the performance of other components, though.
Warning. These events warn of problems that you might need to deal with (unless noted otherwise in the log entry). If they are not resolved, problems will likely ensue.
Critical. These events warn of catastrophic failure or loss of function of a component. These events must be addressed quickly.
Verbose. These events only provide information related to progress or successes and do not imply any problem has or might occur.
Like other lists you’ve seen so far, including the lists you viewed earlier in Task Manager, you can sort any log’s entries by clicking any category title at the top of the log (such as Date And Time, Source, Level, and so on). Figure 6-24 shows the Application log.
Make sure you are familiar with the default logs:
Application. This log contains entries related to applications installed on the computer.
Security. This log contains entries related to security events, including successes and failures due to audited events. The events that are recorded are configured through audit policies in local computer policies and Group Policy.
Setup. This log contains entries that apply to system installation and setup history.
System. This log contains entries that have to do with the operating system. Entries might have to do with the failure of a service or a device driver that doesn’t start when it should.
Forwarded Events. This log contains events you create yourself using subscriptions. You’ll learn how to create a subscription later in this section.
You’ll want to explore Event Viewer and make sure you understand what is available from the interface, how to configure different views, how to create custom views, how to add and remove columns using those views, and so on. The Actions pane also offers tools with which you need to be familiar, including but not limited to saving a log, clearing a log, opening a saved log, and attaching a task to an event. Like other areas of this book, there is simply too much to cover here, and thus it’s up to you to learn what’s available on your own. However, for the sake of completeness, here are the steps required to create a custom view that shows only Critical events created in the System log.
To create a custom view in Event Viewer, follow these steps:
Open Event Viewer.
Click the Action menu and click Create Custom View.
On the Filter tab, for Event Level, select Critical (you could select additional entries).
From the By Log option, in the Event Logs window, click the down arrow, expand Windows Logs, and select the System check box (you could select additional entries as well).
Click outside the drop-down list to hide it.
Optionally, include entries for Keywords, User, or Computer(s); click OK. See Figure 6-25.
Type a name for the log (perhaps Critical System) and click OK.
Note any entries.
You can use Event Viewer for more than sorting already-logged events on a local computer or creating custom views. When you add the Event Viewer snap-in to an MMC, you can also opt to view other computers’ event logs. As you’ve likely experienced, though, these logs (whether they are local or on remote computers) are cumbersome because they contain so many entries. When you only want to receive information about specific events from other computers, you create event subscriptions. There are a few terms to know first, though:
Subscription. A subscription is a group of events you configure that meet specific criteria you name. You configure subscriptions so you can receive events from other computers called sources.
Source. A source computer is the computer from which you want to obtain events. A source computer is generally a workstation on your network that you need to manage remotely. You name the remote computer when you configure the Event Viewer snap-in.
Collector. A collector computer is the computer on which you want to view the events. A collector computer is generally your computer or network workstation—the one where you go to view events to which you’ve subscribed from source computers.
There are two kinds of subscriptions you can create:
Collector initiated. Your collector computer is configured to receive events from the source computer. This is used on small networks because each must be configured manually.
Source computer initiated. The source computer is configured to send events from it to the collector computer. This is used on large networks because you can use Group Policy to configure it.
Before you can configure any subscription, you must configure both computers to run the required services. You can’t just start remotely administering computers. You must first enable a service on the source computer called Windows Remote Management. This service enables the remote computer to be remotely managed. You must also enable a service on the collector computer called the Windows Event Collector service. This service enables a collector computer to collect events from remote computers.
On your collector computer, the workstation you’ll use to view subscriptions, perform the following steps:
Open an elevated command prompt.
Type wecutil qc and press Enter.
Type Y and press Enter when prompted to start the service.
Note the entry: Windows Event Collector service was configured successfully.
Close the command prompt window.
On the source computer, the workstation from which you’ll collect events, follow these steps:
Open an elevated command prompt.
Type winrm quickconfig and press Enter.
Type Y and press Enter when prompted; repeat when prompted.
Note the entry: WinRM firewall exception enabled.
Close the command prompt window.
For event log subscriptions to be successfully configured, the firewalls on both must be configured to allow traffic on TCP port 80 for HTTP or on TCP port 443 for HTTPS.
Recall that you can create two kinds of subscriptions: collector initiated and source computer initiated. Follow these steps to create a source computer–initiated subscription:
Open Event Viewer.
Right-click the Subscriptions node and click Create Subscription.
Type a name for the subscription.
Select Source Computer-Initiated and click Select Computer Groups. See Figure 6-26.
Click either Add Domain Computers or Add Non-Domain Computers as applicable.
Enter a computer name and click OK. What you must do here depends on your choice in step 5.
If prompted, perform additional steps, such as adding a certificate, entering credentials, and so on.
Click Select Events (shown in Figure 6-26).
Select Critical in Event Level, choose the desired logs to monitor, add keywords, and so on, as detailed earlier during the creation of Custom Logs.
Click OK and click OK again.
After you complete the process to create a source computer–initiated subscription, you must then enable the source computers to forward their events. The setting is in Group Policy, from Computer Configuration, Policies, Administrative Templates, Windows Components, Event Forwarding. You’ll enable the Configure Target Subscription Manager and input the applicable information there.
There are a lot more tools than those detailed in this chapter for managing computer performance. You should review all of the available tools before taking the exam. One way to access some of them is to open Administrative Tools. From there, explore Resource Monitor and Performance Monitor in depth, as well as System Configuration and System Information. Also, search for Reliability Monitor on the Start screen and click View Reliability History. This is where you’ll review your computer’s reliability and problem history. Finally, make sure you check out the Windows Experience Index; you can find this in the Performance Information And Tools window in Control Panel.
Users expect network uptime to be at 100 percent, every day, week after week, year after year. This might be one of your biggest challenges with regard to performance, because when the network is down, everyone notices and work comes to a standstill. You must maintain network components at all costs to make sure network performance is the best it can be.
There are a few things to keep in mind:
Keep Windows Update enabled and make sure you check for optional updates regularly. You might find driver updates there.
Check Action Center to see if solutions to known problems have been found.
Keep the routers and modems and any other applicable hardware up to date with firmware and read-only memory (ROM) updates.
If Ethernet is used, make sure cables are in good condition and away from the users’ chairs, desks, and other places where they might get damaged.
For Wi-Fi, check the positioning of access points occasionally to make sure they are placed optimally.
Keep network hardware away from anything that can interfere with its signals, which includes other electronics that give off radio signals, walls, and energy sources.
Update hardware when substantially better devices become available (routers, modems, cabling, network cards, and so on).
Know what tools are available to troubleshoot network problems and rank them from the simplest to the most complex. During troubleshooting sessions, start with the easiest solutions and work your way through your list.
In addition, before trying any troubleshooting that involves wizards or tools, check for these common issues:
A broken, loose, or otherwise damaged cable
A nonfunctioning network card
A nonfunctioning power supply or power outlet
A virus
A new device driver that failed or a bad device driver
Improperly configured firewall, security, Group Policy, and other settings
Unexpected (or expected) data traffic surges, such as when all users log on to their workstations at 8 A.M.
Outages with the Internet service provider (ISP)
You are likely familiar with the most basic troubleshooting tools available in Windows. There is an icon on the taskbar that will show when a network is unavailable. You can right-click the network icon in the taskbar to access the troubleshooting wizards (click Troubleshoot Problems) or to open the Network And Sharing Center. When you choose the former, the Windows Network Diagnostics Wizard opens and lets you state what type of problem you’re having if Windows doesn’t detect it automatically (Figure 6-27). The latter opens the Network And Sharing Center where you can review the most basic configurations, including whether the computer is connected to the Internet, part of a homegroup, part of a public or private network, and so on.
If the Windows Network Diagnostics Wizard doesn’t solve your problem, there are still a few options you can try before you turn to the more advanced tools. Return to Chapter 3, and review the options that enable you to reconfigure IP settings, networking settings, or change the network location; configure name resolution; and use command-line tools such as Ping, IPconfig, Netsh, and others to troubleshoot problems.
Performance Monitor (Perfmon.exe) lets you view your computer’s current performance. What you see is a snapshot, but you can use the information to uncover otherwise difficult-to-diagnose networking problems. For instance, you can monitor very specific performance data related to both the network adapter and the network interface. You can also monitor statistics related to the physical network interface card activity. You can monitor TCP/IP performance diagnostics, too, among other things. You create your own personal console views by adding counters for only the statistics you want to watch.
To understand what counters are available to add, open Performance Monitor and browse what’s available by following these steps:
In a Run dialog box, type perfmon.exe and press Enter.
In the left pane, click Performance Monitor. Note the single counter already configured: %ProcessorTime.
Right-click inside the graph and click Add Counters. See Figure 6-28.
Although you could browse to a different computer, verify Local Computer is selected in the Select Counters From Computer window.
In the window under Local Computer, click the arrow beside Network Interface.
Click Bytes Total/sec. See Figure 6-29.
Click Add.
If desired, select an option under Instances Of Selected Objects.
Repeat to add any other counters you’d like to review.
Click OK when finished.
Inside the graph, click any line to see what it represents; in the list underneath the graph, click any line to see its representation on the graph.
Deselect any counter instance to hide it on the graph.
Right-click inside the graph to configure properties, save the image, remove all counters, and more.
For more information about the available counters in Performance Monitor, review this TechNet article: http://technet.microsoft.com/en-us/library/cc749249.aspx.
There’s a lot more you can learn about Performance Monitor, including how to create Data Collector Sets. A Data Collector Set can be used to monitor multiple data collections that can be incorporated into logs. You can configure the data collected so that Performance Monitor will generate alerts when thresholds are reached. To learn more about Data Collector Sets, refer to this TechNet article: http://technet.microsoft.com/en-us/library/cc749337.aspx. Beyond that you can create user-defined reports and view system reports. You can review Event Trace Sessions. Event trace data is collected from trace providers, which are components of the operating system or of individual applications that report actions or events. Output from multiple trace providers can be combined into a trace session.
As you can see, there’s quite a bit to Performance Monitor, and too much to discuss here. However, there are many resources available on the Internet, specifically from TechNet and MSDN. Make sure you familiarize yourself with this tool and the terms related to it before taking the exam.
There are many ways to improve and troubleshoot performance using tools such as Task Manager, Reliability Manager, Resource Monitor, and Performance Monitor, among others.
You can manage computers remotely using the Event Viewer snap-in and enabling the applicable services on all affected computers.
Files are indexed so that they are easier to locate; you can configure how indexing works and add or delete file types and folders as desired.
Answer the following questions to test your knowledge of the information in this objective. You can find the answers to these questions and explanations of why each answer choice is correct or incorrect in the “Answers” section at the end of this chapter.
You must strive to keep your computers up to date with Windows Updates. In doing so you have additional tools at your disposal, including the ability to apply Group Policies, roll back problematic updates, configure update settings, and so on.
You can use Disk Management to manage hard disks, disk volumes, and file systems. When you need more options than Disk Management offers, you can use Diskpart, a command-line utility for configuring and managing disks.
Check Disk, Disk Defragmenter, Action Center, Disk Cleanup, and other tools help you maintain disks once they are configured and healthy.
Task Manager is a powerful tool for end users and network administrators and enables you to end processes, view performance summaries, view app history and usage history, configure applications to start or not when Windows does, view logged-on users and the computer resources they are using, and so on.
Other tools, including Performance Monitor, can help you troubleshoot network problems when traditional and more common solutions can’t be found.
Storage Spaces enables you to create a storage pool using various kinds of external disks including SATA drives and USB flash drives, among others.
This section contains the solutions to the thought experiments and answers to the objective review questions in this chapter.
A WSUS server
Specify Intranet Microsoft Update Service Location
Computer Configuration, Administrative Templates, Windows Components, Windows Update
Correct Answer: C
Incorrect: It is possible to remove the prompt to upgrade to Windows 8.1 in the Windows Store.
Incorrect: You can configure whether apps are updated automatically from the Settings charm while in the Store, but this is not a place where you can remove specific app updates from the Store.
Correct: You must set a Group Policy to remove that option here: Computer Configuration, Administrative Templates, Windows Components, Store.
Incorrect: You can control the Store using AppLocker in an Active Directory domain, but you don’t have to do so in this instance.
Correct Answer: B
Incorrect: Windows Updates can include device drivers.
Correct: Standard users can install drivers that have been downloaded from Windows Update without a UAC prompt.
Incorrect: This is true: not all updates are installed even if you choose Install Updates Automatically (Recommended) from the Windows Update, Change Settings options.
Incorrect: This is true: you can use PC Settings, Update and Recovery to quickly see if a client machine is configured to receive updates.
Correct Answer: C
Incorrect: Change Settings lets you change how and when updates are downloaded and installed.
Incorrect: View Update History lets you view and sort updates by type, name, date, and other options, but offers no way to uninstall an update.
Correct: Installed Updates is where you can uninstall a specific update.
Incorrect: View Update History can’t be used to uninstall unwanted updates.
Correct Answer: A
Correct: When enabled, Windows Update will wake up a system to install the updates. If Windows Update wakes the system but discovers it is running on battery power, it will go back into hibernation in two minutes and will not install any updates.
Incorrect:. When enabled, Windows Update will wake up a system to install the updates. If Windows Update wakes the system but discovers it is running on battery power, it will not install the updates; instead, it will go back into hibernation mode.
Incorrect: When enabled, Windows Update will wake up a system to install the updates even if it is running on battery power.
Incorrect: When enabled, Windows Update will wake up a system to install the updates.
Mirrored. Simple does not support any fault tolerance, nor do striped or spanned disks. RAID-5 isn’t supported in Windows 8.1. That leaves mirrored, which will write the data two times, once to each disk. Although this will cause a performance hit, the client is not worried about this.
No.
They must be the same size.
The basic disks will be converted to dynamic disks.
Correct Answer: D
Incorrect: You cannot create an 8 TB three-way mirror because you can’t use the disk with the operating system on it as part of the storage space. Thus, you only have two disks to work with.
Incorrect: You cannot create a three-way mirror because you can’t use the disk with the operating system on it as part of the storage space.
Incorrect: You cannot create a three-way parity because you can’t use the disk with the operating system on it as part of the storage space.
Correct: You can create a 4 TB two-way mirror.
Incorrect: You can create a two-way mirror that is larger than the capacity of the connected drives.
Correct Answer: A
Correct: Diskpart with the appropriate parameters can completely wipe the drive and partition table.
Incorrect: Fsutil can’t be used to remove the files from the drive.
Incorrect: Format lets you remove the data but does nothing with regard to the disk volumes and related partition tables.
Incorrect: Format is not a valid option. Format lets you remove the data but does nothing with regard to the disk volumes and related partition tables.
Correct Answer: B
Incorrect: Fsutil is used to manage reparse points and dismount volumes.
Correct: Chkdsk (Check Disk) scans for hard disk errors including bad storage blocks and attempts to repair them automatically.
Incorrect: Disk Cleanup lets users safely delete temporary files, downloaded program installation files, and more to maintain a hard drive.
Incorrect: Disk Defragmenter runs automatically in the background and is used to move fragmented files closer together so they are stored on contiguous hard drive sectors.
Incorrect: Diskpart is used to create bootable USB drives, to create boot partitions, to manage drives, and to wipe files from drives, among other things.
Incorrect: The Disk Management snap-in is used to manage installed drives and can be used to extend and shrink volumes, among other things.
Correct Answer: B
Incorrect: Dynamic disks configured as spanned volumes is a type of solution, but data is written sequentially onto the disks, which does nothing to improve the write time.
Correct: Dynamic disks configured as striped volumes will write data in stripes to each disk (one disk at a time), increasing the write time.
Incorrect: Only dynamic disks can be configured as mirrored volumes. However, mirrored volumes actually slow down the write time because data is written twice, once to each disk.
Incorrect: Basic disks configured as primary volumes are just normal disks. This does not improve write time.
Incorrect: Although dynamic disks can be configured as mirrored volumes, this does nothing to improve write time. In fact, data must be written two times, once to each disk, slowing write time.
Correct Answer: B
Incorrect: The App History tab lists the available apps and information about data usage. Although it does have a tab for CPU, because it only offers information about apps and not all aspects of the system, it is not the proper choice.
Correct: The Performance tab offers an overview of CPU, Memory, Disk, Ethernet, Bluetooth, and Wi-Fi in the form of a graph. You can easily tell here if the CPU is overworked.
Incorrect: The Startup tab lists the applications configured to start when Windows does. It does not offer a CPU tab.
Incorrect: The Users tab shows who is logged on and what apps, services, and applications are running. Although it offers a CPU tab, what is shown there only relates to the selected user, not the entire system.
Incorrect: The Services tab lists services and does not offer a CPU tab.
Correct Answer: D
Incorrect: All file types are not indexed by default, only those that Windows recognizes.
Incorrect: You must click the Advanced option to add file types to the indexing list.
Incorrect: This is not how you add areas of the hard drive to index. Additionally, it would be a bad idea to index the entire root drive.
Correct: In the Indexing Options dialog box, click Advanced. From there, click the File Types tab. Add the file type to index there.
Correct Answer: E
Incorrect: Application does contain events.
Incorrect: Security does contain events.
Incorrect: Setup does contain events.
Incorrect: System does contain events.
Correct: Forwarded Events does not have any entries by default. You must choose the events you want to appear here by creating subscriptions.
Correct Answer: C
Incorrect: One counter is added by default: % Processor Time.
Incorrect: Bytes Total/Sec is not shown by default and must be added from Network Adapter or Network Interface.
Correct: % Processor Time is added by default.
Incorrect: Current Bandwidth is not shown by default and must be added from Network Adapter or Network Interface.