This course describes the preparation steps for a successful deployment of Windows 10 in an enterprise environment by using Microsoft Deployment Toolkit and System Center Configuration Manager. It also explains the other methods available today for migrating to Windows 10.
This course is the second of four courses in the Windows 10 Features for a Mobile Workforce XSeries, which has been created to help you prepare for Microsoft certification Exam 70-697: Configuring Windows Devices.
Module 1: Desktop and Device Deployment
Before you can deploy Windows 10, you need to make sure your organization is ready. This module will introduce the required information gathering, compatibility analysis, project management, and piloting – an iterative process. In this module, we show the tools to help with common concerns around app and hardware compatibility, web compatibility, and readiness for upgrades.
Module 2: Device and App Management
Protecting company assets on mobile devices will continue to grow as a crucial challenge to IT. In this module, we will cover the latest advancements in Microsoft Intune’s Mobile Application Management solution. The focus will be on two differentiating technologies: first, enforcing application management for specific identities to ensure company assets are protected and personal assets remain under user control; and second, enabling application-level data protection independent of MDM.
Module 3: Configuring and Troubleshooting Networking
Configuring network settings is a common administrative task that in many organizations can account for a significant percentage of overall administrative effort. Windows 10 includes several tools that you can use to set up and troubleshoot both wired and wireless network connections more efficiently. To support your organization’s network infrastructure, it is important that you understand how to configure and troubleshoot network connections.
Module 4: Backup, Restore, and Recovery
Deep dive into Windows 10 bundled backup and recovery tools that can against accidental loss, corruption, and edits that users may wish to undo.
Philip E. Helsel and Kimberly Rasmusson-Anderson