Windows Installation Instructions
Step-by-Step Installation and Configuration Instructions
Follow the instructions below to install and configure Windows 10, taking screenshots to document your work as you go. Once you have completed these tasks, follow the instructions in the template to complete your report.
Part 1: Install Windows 10
Use any hypervisor to install Windows 10. Many hypervisors are available, including Oracle’s VirtualBox, an open-source (free) virtualization product. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. Ask your instructor for access to VMware.
Note: It is not necessary to include screenshots of installing the hypervisor software.
You can get an evaluation copy of Windows 10 here:
https://www.microsoft.com/en-us/evalcenter/evaluate-windows-10-enterprise
Take these screenshots to include in your report:
• Accept license screenshot
• OS version screenshot
• Disk configuration screenshot
• Custom installation vs. upgrade installation
• Installing Windows setup screen screenshot
• Region/keyboard screenshot. (REGION use SOUTH KOREA)
• Host machine up and running screenshot (include annotated screenshot with date and time)
Part 2: Configuration
You must take screenshots of each of the following activities (more than one screenshot many be needed to demonstrate some of the commands).
You should include a screenshot for each step in your proof-of-concept document.
1. Change the name of the computer to yourfirstInitialLastName-PC (i.e., jsmith-PC) “USE THIS” (msorrentino-PC)
2. Change the desktop theme and take a screenshot. Include the current date and time in the taskbar.
3. Use PowerShell to create a local user account called yourFirstInitialLastName (i.e., jsmith) USE THIS (msorrentino)
4. Use PowerShell to create a local group account called Tetraaccounting
5. Use PowerShell to add the user created in Step 3 to the Tetra Shillings Accounting local group.
6. Use Local Group Policy to create a password policy. The policy should be based on best practices.
7. Create a folder called Tetra on the root of the C Drive. Assign the Tetra Shillings Accounting read/write access to the folder.
8. Using the Tetra folder that you created in step 7, show that the members in the Tetra Shillings Accounting group have read/write permissions to the folder over the network.
9. Configure Windows Firewall to block inbound ICMPv4. This may require research.
For this short paper activity, you will learn about the three delays model, which explains…
Topic : Hospital adult medical surgical collaboration area a. Current Menu Analysis (5 points/5%) Analyze…
As a sales manager, you will use statistical methods to support actionable business decisions for Pastas R Us,…
Read the business intelligence articles: Getting to Know the World of Business Intelligence Business intelligence…
The behaviors of a population can put it at risk for specific health conditions. Studies…