Module 8 Configuring Mobile Computers and Remote Access in Windows 7.

Slides:



Advertisements
Similar presentations
Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
At their deskAt their desk In a branchIn a branch On the roadOn the road Protect data & PCsProtect data & PCs Built on Windows Vista foundation Easy.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Course 201 – Administration, Content Inspection and SSL VPN
Microsoft ® Official Course Module 9 Configuring Applications.
Deploying and Managing Windows Server 2012
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Module 13: Configuring Availability of Network Resources and Content.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Configuring Mobile Computing and Remote Access
Module 4: Add Client Computers and Devices to the Network.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Deploying and Maintaining Server Images
Implementing Network Access Protection
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Microsoft DirectAccess & Work Folders NICHOLAS A. HAY MONROE COUNTY ISD
Module 2 Designing Microsoft® Exchange Server 2010 Integration with the Current Infrastructure.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
Module 5 Configuring Wireless Network Connection.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 1: Installing and Configuring Servers. Module Overview Installing Windows Server 2008 Managing Server Roles and Features Overview of the Server.
Module 11: Remote Access Fundamentals
Module 8: Configuring Network Access Protection
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Module 9: Fundamentals of Securing Network Communication.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 3: Managing a Microsoft ® Windows ® Small Business Server Environment.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Module 10: Windows Firewall and Caching Fundamentals.
Module 9 Planning and Implementing Monitoring and Maintenance.
Module 3 Planning for Active Directory®
Chapter Eight Internetworking with Remote Access.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Module 9: Configuring Network Access
Unit 27: Network Operating Systems
Presentation transcript:

Module 8 Configuring Mobile Computers and Remote Access in Windows 7

Module Overview Configuring Mobile Computer and Device Settings Configuring Remote Desktop and Remote Assistance for Remote Access Configuring DirectAccess for Remote Access Configuring BranchCache for Remote Access

Lesson 1: Configuring Mobile Computer and Device Settings Discussion: Types of Mobile Computers and Devices Tools for Configuring Mobile Computer and Device Settings What Are Mobile Device Sync Partnerships? Demonstration: Creating a Sync Partnership Power Plans and Power-Saving Options in Windows 7 Demonstration: Configuring Power Plans

Discussion: Types of Mobile Computers and Devices 1.How do mobile computers differ from desktops? 2.What are key end-user needs that mobile computers help resolve? 10 min

Tool Features Power Options Updated Battery Meter Power Plans Windows Mobility Center Key system settings collected in one place Display brightness, power plan, volume, wireless networking, external display settings, display orientation, and synchronization status Windows Mobile Device center Successor to Active Sync Synchronizes various content including music, video, contacts, calendar events, web browser favorites, and other files between Windows Mobile devices and Windows 7 Sync Center Sync data between desktop computers, network servers, and mobile devices Shows current status of all sync partnerships Presentation Settings Reconfigure your computer for a presentation One click changes multiple settings Presentation Settings Tools for Configuring Mobile Computer and Device Settings

Mobile Device Sync Partnerships update information about the mobile device and the host computer. What are Mobile Device Sync Partnerships? Desktop Files sent to Mobile Device Mobile Device Files sent to Desktop

Demonstration: How to Create a Sync Partnership 10 min Your instructor will demonstrate how to: Configure Windows Mobile Device Center Synchronize a Windows Mobile device

Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

Power PlanDescription Power Saver This plan saves power on a mobile computer by reducing system performance. Its primary purpose is to maximize battery life. High performance This plan provides the highest level of performance on a mobile computer by adapting processor speed to your work or activity and by maximizing system performance. Balanced This plan balances energy consumption and system performance by adapting the computer’s processor speed to your activity. Method for turning a computer on or off Data Storage State Power Needs Sleep or Standby System State Saved to Memory Low Hibernate System State Saved to Disk None Shut Down All Data Saved to Disk None Power Plans and Power-Saving Options in Windows 7

Demonstration: How to Configure a Power Plan 5 min Your instructor will demonstrate how to configure a power plan.

Lesson 2: Configuring Remote Desktop and Remote Assistance for Remote Access What Are Remote Desktop and Remote Assistance? Configuring Remote Desktop Demonstration: Configuring Remote Assistance

What are Remote Desktop and Remote Assistance? Remote Desktop Remote Assistance A Windows 7 feature that enables users to connect to their desktop computer from another device Enables administrators to connect to multiple remote servers for administrative purposes A Windows 7 feature that enables users to connect to their desktop computer from another device Enables administrators to connect to multiple remote servers for administrative purposes A Windows 7 feature that enables support staff to connect to a remote desktop computer Optionally allows for remote control of that computer Assistance can be sought or offered A Windows 7 feature that enables support staff to connect to a remote desktop computer Optionally allows for remote control of that computer Assistance can be sought or offered

Configuring Remote Desktop includes setting it up on the remote computer and the host computer. Host Computer Launch the Remote Desktop Connection Choose Options to see the Remote Desktop configuration settings On the General Tab, enter the remote computer’s name and your authentication credentials Save your Connection Settings Select preferences on the remaining Option’s tabs Host Computer Launch the Remote Desktop Connection Choose Options to see the Remote Desktop configuration settings On the General Tab, enter the remote computer’s name and your authentication credentials Save your Connection Settings Select preferences on the remaining Option’s tabs Remote Computer Open the System Window Select Remote Settings In the System Properties Window select Allow Remote Assistance Under Remote Desktop select or add the users who can connect to this computer. Remote Computer Open the System Window Select Remote Settings In the System Properties Window select Allow Remote Assistance Under Remote Desktop select or add the users who can connect to this computer. Configuring Remote Desktop

Demonstration: Configuring Remote Access Your instructor will demonstrate how to: Request Remote Assistance Configure Windows Firewall to Enable Remote Administration Provide Remote Assistance 12 min

Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

Lesson 3: Configuring DirectAccess for Remote Access What is VPN Connection? Creating a VPN What is DirectAccess? How DirectAccess Works DirectAccess Requirements

VPNs are point-to-point connections across a private or public network such as the Internet. A VPN client uses special TCP/IP-based protocols, called tunneling protocols, to make a virtual call to a virtual port on a VPN server What is a VPN? PPTP uses Point-to-Point Protocol (PPP) for user-level authentication, and Microsoft Point-to-Point Encryption (MPPE) for encryption PPTP uses Point-to-Point Protocol (PPP) for user-level authentication, and Microsoft Point-to-Point Encryption (MPPE) for encryption L2TP uses PPP authentication and IPsec encryption VPN connections use either Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol/Internet Protocol security (L2TP/IPsec)

Creating a VPN Connection Creating a VPN connection in the Windows 7 system environment requires authenticated access to a Windows a VPN Server  From the Network and Sharing Center- choose to the Setup a new connection wizard or type VPN at the Windows 7 search bar  Choose Connect to a workplace – Set up a dial-up or VPN connection Create a new connection  Select your VPN server after choosing Use my Internet Connection (VPN)

What is DirectAccess? Features Provides users transparent access to internal network resources whenever they are connected to the Internet Enables IT Professionals to manage remote computers outside of the office Establishes a bi-directional connection that enables the client computer to remain current with company policies and to receive software updates Does not require a VPN connection Supports multifactor authentication methods Configurable to restrict which servers, users, and individual applications are accessible Provides users transparent access to internal network resources whenever they are connected to the Internet Enables IT Professionals to manage remote computers outside of the office Establishes a bi-directional connection that enables the client computer to remain current with company policies and to receive software updates Does not require a VPN connection Supports multifactor authentication methods Configurable to restrict which servers, users, and individual applications are accessible

How DirectAccess Works Selected ServerFull Enterprise Network Configured using DirectAccess console or IPsec policies IPsec session is established between the DirectAccess client and server IPsec is not used for communications across the internal network Enterprise internal security is unchanged Closely resembles VPN and can be more straightforward to deploy IPsec session is established between the DirectAccess client and server IPsec is not used for communications across the internal network Enterprise internal security is unchanged Closely resembles VPN and can be more straightforward to deploy Highest level of security: Deploy IPv6 and IPsec in the organization Upgrade application servers Windows Server 2008 R2 Enable selected server access Allows end-to-end authentication and encryption from the DirectAccess client to internal resources Highest level of security: Deploy IPv6 and IPsec in the organization Upgrade application servers Windows Server 2008 R2 Enable selected server access Allows end-to-end authentication and encryption from the DirectAccess client to internal resources Flexible configuration meets organizational security requirements

DirectAccess Requirements Requirements Deployment Requirements Deployment Windows Server 2008 R2 with two network adapters One domain controller and DNS server running Windows Server 2008 or Windows Server 2008 R2 Public Key Infrastructure (PKI) IPsec policies IPv6 transition technologies Windows 7 Enterprise on the client computers Optionally, a NAT-PT device to provide IPv4 access Windows Server 2008 R2 with two network adapters One domain controller and DNS server running Windows Server 2008 or Windows Server 2008 R2 Public Key Infrastructure (PKI) IPsec policies IPv6 transition technologies Windows 7 Enterprise on the client computers Optionally, a NAT-PT device to provide IPv4 access IPv6-over-IPsec to encrypt communications Scalability determined number of Direct Access servers Multiple ways to install Direct Access IPv6-over-IPsec to encrypt communications Scalability determined number of Direct Access servers Multiple ways to install Direct Access

Lesson 4: Configuring BranchCache for Remote Access What Is BranchCache? How BranchCache Works BranchCache Requirements Demonstration: Configuring BranchCache on a Windows 7 Client Computer

BranchCache caches content from remote and Web servers in the branch location so users can quickly access the content. Cache can be hosted centrally in the branch location or distributed across user PCs What Is BranchCache? Key benefits for IT professionals Remains transparent to the user Optimizes traffic flow between clients and servers Supports commonly used network protocols Supports end-to-end encryption between clients and servers Provides compatibility with end-to-end security protocols Helps reduce WAN link utilization

Distributed Cache Mode  Cache is distributed across client computers  Additional client computers retrieve content from the first requesting client computer  Beneficial for branch offices that do not have a local server with Windows Server 2008 R2 Hosted Cache Mode  Cache is on a server at the branch office  Client computers retrieve content from the branch office server  Beneficial for larger branch offices that have hardware resources for a local server with Windows Server 2008 R2 Client computers are configured to use only one caching mode at a time. Data Main Office Branch Office How BranchCache Works IDs Get Data Get Data Get Distributed Cache Branch Office Data Get Data Put Data Get Hosted Cache

Client Configuration Server Configuration BranchCache Requirements Off by default Enable and configure manually or by Group Policy Caching mode to cooperative or hosted Host name of hosted cache server Set client cache size Set cache location on disk Firewall rules required Off by default Enable and configure manually or by Group Policy Caching mode to cooperative or hosted Host name of hosted cache server Set client cache size Set cache location on disk Firewall rules required Windows Server 2008 R2 - required either in the main server location or at the branch office Windows 7 Enterprise - required on the client PCs Windows Server 2008 R2 - required either in the main server location or at the branch office Windows 7 Enterprise - required on the client PCs Not installed by default Enable and configure manually or by Group Policy Enable for all file shares or on a file share by file share basis If enabled on a Web server, must be enabled for all Web sites Hosted cache equipped with a certificate trusted by client computers suitable for TLS Not installed by default Enable and configure manually or by Group Policy Enable for all file shares or on a file share by file share basis If enabled on a Web server, must be enabled for all Web sites Hosted cache equipped with a certificate trusted by client computers suitable for TLS

Demonstration: Configuring BranchCache on a Windows 7 Client Computer Your instructor will demonstrate how to: Configure BranchCache client-side Group Policy settings Enable BranchCache on a shared folder Configure Windows 7 client BranchCache settings Verify BranchCache configuration 20 min

Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

Lab: Configuring Mobile Computing and Remote Access in Windows 7 Exercise 1: Creating a Sync Partnership Exercise 2: Configuring Power Options Exercise 3: Enabling Remote Desktop Exercise 4: Enabling BranchCache Logon information: Virtual machine LON-DC1, LON-CL1 User name Contoso\Administrator Password Pa$$w0rd Estimated time: 55 minutes

Lab Scenario The Contoso Corporation is implementing Windows 7 desktops throughout their organization. You are a help-desk technician in the Contoso Corporation. Amy Rusko is the Production manager for Contoso in the UK. Amy is about to visit all the manufacturing plants in the UK. Before she leaves, Amy would like you to enable and configure a sync partnership with her Windows Mobile device. She also wants you to configure a power plan on her laptop computer. In addition, she wants you to enable Remote Desktop on her office computer so she can connect to it while she’s travelling. Finally, users in the Slough production plant require timely access to corporate HQ files during Amy’s visit. Slough does not have a file server at present, and so you must enable BranchCache in Distributed Cache mode.

Lab Review 1.In exercise 2, you enabled the Remote Desktop feature through the firewall by editing the local firewall settings. Is there an alternative way in which you could make this change? 2.If you attempted to connect to Amy’s computer from a computer out on the Internet somewhere, what additional settings must you consider? 3.In exercise 3, you established the necessary settings to support BranchCache in Distributed cache mode. If the Slough plant installed a file server, what other way could you implement BranchCache?

Module Review and Takeaways Review Questions Common Issues Tools

Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

Course Evaluation