Hands-on Training Experience
Microsoft Certified Trainers
Microsoft Official Curriculum
- Professionals working in IT sector, performing installation, configuration, general local Management and maintenance of Windows 10 and later Core Services.
- Candidates with a basic knowledge of Business Scenarios and Cloud-integrated Services.
After the successful course completion, learners will understand the following:
- Understand Windows Client and its features.
- Windows Client Editions and Requirements.
- Windows Client Installation and Customization.
- Updates, drivers, network and devices Configuration for Windows.
- Configuration of Remote Management Settings and Browsers in Windows.
- Browser Management in Windows.
- Account Access and Authentication Configuration.
- Safety and Protection of Windows Client and Corrective Measures.
- File and Folder Permission Configuration.
- Troubleshoot File issues and execute Recoveries.
- Troubleshoot Windows, Hardware, Driver Issues and Application Installation
- Foundational Knowledge of OS and Application concepts.
- Prior Experience in operating Windows OS.
- Basic familiarity with Hardware Concepts and Computer Networks.
- It is suggested/recommended to do MD-101T00: Managing Modern Desktops (Modern Desktop) certification.
About Related Certification:
- Microsoft 365 (M365) Certified Enterprise Administrator Expert
- Microsoft 365 (M365) Certified Modern Desktop Administrator Associate
The Microsoft 365 (M365) Certified Enterprise Administrator Expert certification enhances your knowledge in evaluating, planning, migrating, deploying, and managing Microsoft 365. It gives you expertise in Microsoft 365 applications, infrastructure, identity, and integration of hub for all Microsoft 365 workloads. Learners will gain knowledge in Microsoft 365 workloads and Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra. Learners will understand networking, server administration, DNS, and Power Shell. This certification is primarily for candidates working as Server Administrators and Network Administrators.
It is mandatory to qualify MS-100 (Microsoft 365 Identity and Services) and MS-101 (Microsoft 365 Mobility and Security) exams to earn this certification.
The Microsoft 365 (M365) Certified Modern Desktop Administrator Associate
This certification facilitates knowledge regarding deployment, configuration, security and protection, and management and keeps track of devices and client applications in a business environment. The course befits M365 Enterprise Administrators involved in creating and executing device strategies as per the organizational needs. They will get detailed information on Deploying Windows, Managing Devices and Data, Configuring Connectivity, Maintaining Windows, and Deploying and Updating Operating Systems.
It is mandatory to qualify MD-100 (Windows Client) and MD-101 (Managing Modern Desktops) exams to earn this certification.
Virtual Instructor-Led Session
- Instructor-led Online Training
- Experienced Subject Matter Experts
- Approved and Quality Ensured Training Material
- 24*7 Leaner Assistance And Support
- Describe Windows 10 and Windows 11
- Explain the new features available in Windows
- Explain the benefits of using the Windows client for small and medium-sized organizations
- Discuss managing the Windows client in an enterprise environment
- Describe the elements of the new Windows 10 and 11 user interfaces
- Explain the differences between the different editions of Windows
- Select the most suitable Windows device for your needs
- Describe the minimum recommended hardware requirements for installing Windows 10 and 11
- Describe the options available for installing and deploying the Windows client -Understand the process of installing the Windows client
- Describe the methods of activation for the Windows client
- Describe the factors to consider in a new machine deployment
- Describe the process of upgrading to a newer version of Windows
- Describe the factors to consider when deciding to upgrade to Windows
- Describe the process of migrating to Windows
- Understand the considerations when choosing between the upgrade and migration processes
- Upgrade a Windows device
- Describe the different methods of automated desktop deployments
- Describe common tools used to perform automated steps
- Describe how to leverage virtualization in Windows client
- Configure a Hyper-V virtual machine
- Configure a service account
- Set up a local account
- Use Credential Manager to manage credentials
- Describe and configure Windows Hello
- Describe Active Directory Domain Services
- Describe Azure Active Directory
- Describe the differences between Active Directory Domain Services and Azure Active Directory
- Describe Active Directory Distribution and Security groups
- Describe the authentication process in Active Directory
- Describe User Account Control (UAC)
- Explain how UAC works
- Explain how to configure UAC notification settings
- Describe the challenges that BYOD introduces
- Describe Device Registration and its uses
- Describe how Device Registration works
- Describe the infrastructure requirements for Device Registration
- Describe how to register and enroll a device
- Use advanced startup options
- Customize desktop settings
- Describe the various display settings in Windows
- Configure display options
- Describe how to manage mobile-device settings in Windows
- Describe power plans
- Configure power options
- Deploy customized Start menu configurations
- Describe activation methods
- Describe Active Directory
- Describe the benefits of using Group Policy
- Configure and apply a Group Policy Object
- Describe Windows PowerShell
- Explain how to use Windows PowerShell cmdlets
- Explain the use and importance of device drivers
- Explain how to manage device peripherals
- Describe Windows printer features
- Describe printing components
- Describe the benefits of Type 4 printer drivers
- Describe how to manage client-side printing
- Describe how to manage print server properties
- Install and share a printer
- Describe IPv4
- Describe IPv4 subnets
- Explain the difference between public and private IPv4 addressing
- Implement automatic IPv4 address allocation
- Describe the tools available to configure network settings in Windows
- Describe the tools available to troubleshoot network connections
- Configure an IPv4 network connection
- Describe IPv6
- Explain IPv6 addressing
- Describe name resolution
- Describe DNS
- Explain how to troubleshoot name resolution
- Configure and test name resolution settings in Windows
- Describe wireless technologies
- Configure wireless settings in Windows
- Discuss the considerations for implementing wireless networks within organizations
- Describe how to use VPNs to connect to a remote network
- Explain how Always On VPN can help remote users connect
- Discuss the considerations of enabling remote access for your users
- Describe Remote Desktop in Windows
- Enable and use Remote Assistance, including Easy Connect
- Describe Azure Remote Desktop Services
- Describe the different ways to access storage
- Explain the difference between network-attached storage (NAS) and storage area networks (SANs)
- Compare MBR and GUID partition table (GPT) disks
- Describe how to convert a basic disk to a dynamic disk
- Describe the tools available for managing disks
- Describe a simple volume
- Describe mirrored, spanned, and striped volumes
- Create volumes, resize, and manage volumes
- Explain the primary characteristics of the Storage functionality in Windows client
- Describe how to use the Storage functionality
- Describe how files stored on disks might fragment
- Describe how to defragment volumes
- Explain folder compression
- Describe how to compress folders
- Describe what disk quotas are
- Describe how to configure disk quotas
- Explain what the Storage Spaces feature is
- Describe the features of Storage Spaces
- Discuss in which scenarios to use Storage Spaces
- Show how to configure Storage Spaces
- Describe the features of the FAT file system
- Explain the features of the NTFS file system
- Describe the features of the ReFS file system
- Work with the file systems available in the Windows client
- Describe the tools for managing files and folders
- Describe how to configure file and folder permissions
- Describe the concept of permission inheritance
- Implement conditions to limit file and folder access
- Secure files and folders by using file permissions
- Use the effective permissions feature
- Describe how copying and moving files and folders affect permissions
- Describe shared folders
- Describe methods for sharing folders
- Describe the effect of combining file permissions and share permissions
- Describe Windows Libraries
- Describe the capabilities of OneDrive
- Configure Windows to synchronize files and settings using OneDrive
- Describe Work Folders and how they contrast to OneDrive
- Configure a client to use Work folders
- Differentiate between the types of apps in Windows
- Describe manual app installation
- Explain the methods for automating installation of desktop apps
- Describe the Universal Windows apps, Microsoft Store, and Microsoft Store for Business
- Explain how to manage and restrict access to Microsoft Store
- Explain how to resolve issues related to Universal Windows apps
- Explain how to configure assigned access to a Universal Windows app
- Describe the process of using AppLocker to control Universal Windows apps
- Describe the features of Microsoft Edge
- Configure and use Microsoft Edge
- Discuss the appropriate browser to use in your organization
- List the productivity features in Microsoft Edge
- Describe the Windows client service model
- Describe the different Windows service channels
- Describe the available methods for applying updates to Windows
- Describe the available methods for applying updates to Windows
- Explain the Windows Update configuration options
- Explain the Group Policy Object (GPO) settings available for configuring Windows Update
- Configure Windows Update
- Describe how to use Windows Server Update Services (WSUS) to provide updates to Windows
- Describe malware
- Understand the sources of malware
- Describe ways of mitigating malware
- Identify common network-related security threats
- Describe the methods by which you can mitigate these common security threats
- Describe tools for securing users' identity
- Describe tools for securing data on Windows
- Describe tools for securing Windows devices
- Use Microsoft Defender to detect and quarantine malware
- Describe the purpose of a firewall
- Describe Windows Defender Firewall functionality
- Explain network-location profiles
- Explain the increased functionality of Windows Defender Firewall with Advanced Security
- Describe the benefits of drive encryption with BitLocker
- Describe the benefits of an Encrypted File System
- Describe the purpose and functionality of IPsec
- Describe how to configure IPsec
- Describe connection security rules
- Explain authentication options
- Monitor connections
- Describe the features and use of the Security Compliance Toolkit
- Describe the features of AppLocker
- Describe methods of securing data in the enterprise
- Describe the benefits and features of Microsoft Defender for Endpoint
- Describe the Enterprise Desktop Support Technician (EDST) job role.
- Describe the desktop support environment.
- Describe how to interact with end users.
- Explain the key stages and terminology of a troubleshooting methodology
- Describe how different form factors and hardware options affect supporting the device
- Explain the Windows operating system architecture
- Describe the Windows registry
- Use the Registry Editor tool to change Windows settings
- Explain how to use the Task Manager tool
- Use Event Viewer to identify problems
- Explain how to use the Reliability Monitor
- Use the Diagnostics and Recovery Toolset
- Use the Steps Recorder to record details of a problem
- Use the Microsoft Management Console
- Understand the Windows Registry
- Describe key system components in Windows
- Describe performance monitoring tools in Windows
- Explain how to establish a performance baseline
- Explain how to optimize disk and memory performance in a Windows computer
- Explain the Windows file recovery methods and tools
- Use File History to recover files
- Describe and use the Previous Version's feature
- Describe how to configure and use the Azure Backup tool
- Troubleshoot File Recovery Options
- Explain how and when to use the Reset this PC tool
- Explain how to use provisioning packages
- Describe desktop app deployment methods
- Discuss desktop app deployment issues
- Describe Microsoft 365
- Describe the difference between Microsoft 365 apps and desktop apps
- Resolve desktop app deployment issues
- Troubleshoot Windows Installer issues
- Describe how to use AppLocker to control apps
- Control desktop app installation with AppLocker policies
- Describe the Windows startup architecture
- Explain the repair and recovery options available in Windows
- Describe the available advanced startup recovery tools
- Explore the advanced startup environment
- Describe the System Restore process in Windows
- Access the Windows System Restore tool to fix the startup environment
- Describe volume activation considerations
- Describe the role of the BCD store
- Describe BCD configuration settings
- Describe operating system services
- Identify failed services by using Windows tools
- Explain how to use tools and utilities to disable services
- Explain how to resolve locked-out accounts
- Describe the role and importance of device drivers
- Manage and troubleshoot device drivers
- Explain the difference between the staging and installation of device drivers
- Restrict installation of device drivers by using Group Policy
- Describe hardware-related problems
- Describe the considerations for using USB devices
- Describe considerations for using wireless devices
- Explain how you can use built-in diagnostic tools to gather hardware information
- Determine how to approach hardware problems best
- Apply the guidelines for troubleshooting hardware-related problems
- Apply device-replacement considerations
- Identify the most vulnerable hardware devices
- Apply the guidelines for replacing hardware
- Diagnose memory problems
- Diagnose and troubleshoot disk problems
This course is a detailed guide on Windows Clients, its components and the procedures associated with it. It also helps learners to gain knowledge about Windows Client Security and protection with the corrective actions to mitigate against them. This course also contains the troubleshooting procedures related to Windows Client.
This exam helps learners to showcase their skills in Windows Client functions, i.e. Managing and Deploying Devices and Client applications in a business environment, Installing and Configuring Windows, Connectivity and Storage, and Windows Management and its protection.
The certification you earn after clearing the exam can be renewed annually for free on Microsoft. Learners are required to pass the online renewal assessment annually to renew the certificate and can extend it for one year from the existing expiration.
The Passing score is 700 out of 1000 marks.
Learners working in the IT sector can take this course. They should have a basic understanding of Operating Systems, Hardware, Computer Networks and Application concepts.
Learners can get the roles of Windows Administrator, Desktop Administrator, Modern Desktop Administrator Associate and more.
The course has duration of 5 days (40 hours).
No, This course will be retired on July 31, 2023.
Yes, MD-102T00: Microsoft 365 Endpoint Administrator is the replacement course which is going to release on May 1, 2023.
Vinsys not only provides great quality IT training but also recognizes the skills and accomplishments of the learners by providing Course Completion Digital Badges for Achievement, Validation, Excellence, Verification, Trust and Industry-Wide Recognition. It is a renowned organization delivering top-notch services to the professionals. Joining Vinsys will enrich your experience in all possible facets!