IT109 Microsoft Windows Operating Systems Unit 09 lesson12

31
Using Mobile Computers Using Mobile Computers Lesson 12

Transcript of IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Page 1: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Using Mobile ComputersUsing Mobile ComputersLesson 12

Page 2: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

ObjectivesObjectives

• Understand wireless security• Configure wireless networking• Use Windows mobility controls• Synchronize data• Use BitLocker Drive Encryption• Use remote network connections

Page 3: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Using Windows 7 on a Mobile Using Windows 7 on a Mobile ComputerComputer

• Special configuration settings– Power and display options

• Windows 7 supports tablet PCs– Reversible screen, touch sensitive,

write on with a stylus

• Handheld devices, such as SmartPhones, need to be synchronized

Page 4: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Understanding Wireless SecurityUnderstanding Wireless Security

• Easy to establish a wireless connection, but a secure one is more difficult. Some types of attacks common to unsecured networks:– Eavesdropping– Masquerading– Attacks against wireless clients– Denial of service– Data tampering

Page 5: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Evaluating Wireless Networking Evaluating Wireless Networking HardwareHardware

• IEEE 802.11 standards dictate frequencies, transmission speeds, and ranges of wireless networking products.

• Newer devices can fall back to support older devices at lower speeds.

• Security protocols are not backward compatible:– Wired Equivalent Privacy (WEP)– WiFi Protected Access (WPA and WPA2)

Page 6: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Using Wired Equivalent Privacy (WEP)Using Wired Equivalent Privacy (WEP)

• Uses a security setting to encrypt network traffic – Secret or shared key

• Administrators must configure all devices with the same shared secret key

• Relatively weak cryptography

Page 7: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Using Wi-Fi Protected Access Using Wi-Fi Protected Access (WPA and WPA2)(WPA and WPA2)

• Addresses the weakness of WEP• Two encryption options:

– Temporal Key Integrity Protocol (TKIP)– Advanced Encryption System (AES)

• WPA has two operational modes:– WPA-Personal (WPA-PSK)– WPA-Enterprise (WPA-RADIUS)

Page 8: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Configuring Wireless NetworkingConfiguring Wireless Networking

• Manual configuration for wireless adapters that are supported directly by Windows 7

Page 9: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Windows Mobility CenterWindows Mobility Center

• Provides quick access to configuration settings used by mobile computer users

Page 10: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Configuring Mobile Display OptionsConfiguring Mobile Display Options

• One of the benefits of mobile computing is the ability to collaborate with others.

• Display configurations are often changed to accommodate viewing:– Connecting an external display– Configuring multiple displays– Using a display projector

Page 11: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Configuring Presentation SettingsConfiguring Presentation Settings• Configuration

settings that users most often adjust before giving a presentation

Page 12: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Configuring Power OptionsConfiguring Power Options

• Power consumption is a critical issue for laptop users who rely on batteries.

Page 13: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Synchronizing DataSynchronizing Data

• For users who connect to a network when in the office and need to take files with them when they are not connected

• Two types of synchronization:– One-way– Two-way

Page 14: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Using Offline FilesUsing Offline Files

• A form of fault tolerance• Workstations copy server-based

folders to the local drive• Users can work with the files whether

the network is operational or not, or even if they disconnect from the network

• When the workstation reconnects, synchronization of the files occurs

Page 15: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Transparent CachingTransparent Caching

• Causes Windows 7 to save copies of files accessed on a remote server on a local drive

• Do not remain available when disconnected from the network

• Provides users with faster repeat access and conserves bandwidth

• Similar to BranchCache feature, except cached files are not shared with other workstations

Page 16: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Using Sync CenterUsing Sync Center

• Central control panel for all synchronization partnerships

• Pairs of folders or devices are configured to synchronize their data on a regular basis

Page 17: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Using BitLockerUsing BitLocker

• First released in Vista, and now available with Windows 7 Enterprise and Ultimate

• Encrypts an entire volume to protect against unauthorized persons, such as someone stealing a hard drive:– Increased data protection– Integrity checking

Page 18: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Understanding BitLocker RequirementsUnderstanding BitLocker Requirements

• Computer must have a Trusted Platform Module (TPM) and a compatible BIOS.

• Has 5 operational modes:– TPM + startup PIN + startup key– TPM + startup key– TPM + startup PIN– Startup key only– TPM only

Page 19: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Turning on BitLockerTurning on BitLocker

Page 20: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Using Data Recovery Agents (DRA)Using Data Recovery Agents (DRA)

• A user account authorized to recover BitLocker drives with a digital certificate on a Smart Card

• Must be configured using Group Policy in an AD DS

• Must enable DRA recovery for each type of BitLocker resource you want to recover

Page 21: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Using BitLocker To GoUsing BitLocker To Go

• New feature in Windows 7• Enables user to encrypt removable

USB drives – Flash drives and external HDs

Page 22: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Using Remote Network ConnectionsUsing Remote Network Connections

• For travelling or telecommuting users who must connect to the company network from a remote site:– Dial-up– Virtual Private Networking (VPN)– Direct Access (new)

Page 23: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Understanding Virtual Private Understanding Virtual Private NetworkingNetworking

Dial-up Connection – Point-to-Point Protocol (PPP)

Virtual Private Network (VPN) - tunneling

Page 24: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

VPN Protocol EncapsulationVPN Protocol Encapsulation• Point-to-Point Tunneling Protocol (PPTP)• Layer 2 Tunneling Protocol (L2TP)• Secure Socket Tunneling Protocol (SSTP)• Internet Key Exchange, Version 2 (IKEv2)

Page 25: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Creating a VPN ConnectionCreating a VPN Connection

Page 26: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Using VPN ReconnectUsing VPN Reconnect• When a VPN was

interrupted, users had to manually re-establish the connection.

• Wireless has made this more of a problem.

• VPN Reconnect enables a computer to reconnect automatically.

Page 27: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Introducing DirectAccessIntroducing DirectAccess• Replacement for VPN• Eliminates the need

for clients to manually establish wide area connections to their networks

• Automatically connects to the network when connected to the Internet

Page 28: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Understanding the DirectAccess Understanding the DirectAccess InfrastructureInfrastructure

• Invisible to the client, but complicated communications process with a long list of back-end infrastructure requirements:– IPV6 – Globally routable addresses– Ipsec – Provides additional security– Extensive Server requirements– Clients running Windows 7 Ultimate or

Enterprise or Server 2008 R2, in the same domain as the DirectAccess Server

Page 29: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

DirectAccess SetupDirectAccess Setup

Page 30: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Skills SummarySkills Summary• Windows Mobility Center is a shell application

that provides a central point of access to configuration settings that mobile computer users need.

• Configuring external displays is a common task for mobile computer users.

• Power settings allow you to control the power consumption of components in your mobile device.

• Offline files store copies of network files on the local drive, for use when the computer is disconnected.

Page 31: IT109 Microsoft Windows Operating Systems Unit 09 lesson12

Skills Summary (cont.)Skills Summary (cont.)• Sync Center is a central control panel for

all of the synchronization partnerships.• BitLocker encrypts all of the files on a

volume and performs an integrity check before it permits the system to start.

• Dial-up or virtual private network (VPN) connections enable users to connect to a network from remote locations.

• DirectAccess simplifies the remote connection process for inexperienced users.