Course Overview

Ch 1: Course Introduction

Chapter 1 presents an introduction to the TestOut Client Pro course, outlining fundamental course concepts and explaining how to interact with the simulated lab environment. Additionally, this chapter provides an overview of the TestOut Client Pro and Microsoft MD-102 certifications.

Ch 2: Windows Installation

Chapter 2 covers various Windows versions, their features, and interfaces. It discusses the installation process, including using the ADK to customize installation and upgrading to Windows 11. The chapter also covers Hyper-V on Windows Client, including adding virtual hard drives to VMs, creating and managing checkpoints, using Windows Sandbox, and creating virtual machines and virtual hard disks.

Ch 3: Post Installation Tasks

Chapter 3 delves into essential post-installation tasks, starting with the importance of Windows activation as well as troubleshooting activation issues. Students will practice common configuration tasks for new activations such as managing system settings, language and region, and startup applications. The chapter explores how to configure web browsers and other desktop applications, including modifying file associations. It also covers printer-related tasks, such as installing, configuring, managing, and sharing printers. Lastly, it addresses the configuration of Windows with provisioning packages, including basic and advanced runtime provisioning.

Ch 4: Deploy Windows

Chapter 4 provides a comprehensive guide to deploying Windows, focusing on system images, user profile and data migration, Windows Dynamic Deployment, and Autopilot deployment. The chapter covers image preparation, capture, and deployment using the Microsoft Deployment Toolkit (MDT), as well as the User State Migration Tool (USMT) for migrating user profiles and data. Additionally, it demonstrates how to use Windows Dynamic Deployment and Autopilot to extract device hardware information, import device information into Intune, and use deployment profiles.

Ch 5: Manage Identity

Chapter 5 offers an extensive overview of managing identity, encompassing topics such as Active Directory, Azure AD, users and groups, credential management, certificate management, and privileged accounts. It reviews the differences between workgroup and domain setups, Active Directory management, and joining workstations to a domain. It also covers local, online, and domain user account management, as well as the use of Credential Manager. The chapter explores Azure Active Directory topics such as, device joining, role-based access control (RBAC), Intune Connector for Active Directory, and how user and group management varies in Azure AD. Lastly, it discusses privileged account security and the management and configuration of client certificates.

Ch 6: Group Policy

Chapter 6 provides a thorough exploration of Group Policy, covering topics such as password and policies, user rights assignment, security options, and user account control. It covers topics such as configuring local policies, Group Policy processing, creating and linking Group Policy Objects (GPOs), managing Group Policy inheritance, and troubleshooting Group Policies. The chapter also delves into password policies, including configuring and managing Active Directory Domain Services (AD DS) passwords and implementing Local Administrator Password Solutions (LAPS). Additionally, it discusses security options, user rights assignment, and audit policies, offering insights into configuring these settings for optimal security. Finally, the chapter examines User Account Control (UAC), its configuration, enforcement, and Group Policy settings, as well as methods for elevating permissions and prompting for changes.

Ch 7: Network Connectivity

Chapter 7 focuses on network connectivity, providing a comprehensive overview of topics related to IP addressing. The chapter explores IP address numbering systems, IP address assignment, subnetting, and configuring IP settings on workstations. It also covers troubleshooting IP configuration issues using tools like ipconfig and network connectivity issues using ping and tracert. Furthermore, the chapter discusses IPv6 addressing, migration from IPv4 to IPv6, and configuring IPv6 addresses and DHCP6 servers. Additionally, it covers wireless networking concepts, installation of wireless network adapters, configuring and connection to wireless networks, wireless security, encryption, authentication, and troubleshooting wireless networks. Finally, the chapter provides an overview of VPNs, their configuration, and connection management.

Ch 8: File and Storage Management

Chapter 8 offers an in-depth look at file and storage management, covering topics such as local storage, OneDrive storage, storage optimization, file and folder management, and NTFS and share permissions. The chapter discusses configuring, managing, and optimizing local storage. It also delves into managing OneDrive storage, configuration, and file recovery. The chapter explores storage optimization techniques, including disk optimization and Storage Sense. Additionally, it covers Windows file and folder properties, system file locations, and managing files and directories from the command prompt. Finally, the chapter covers NTFS and share permissions, basic and advanced folder sharing, and configuring share and NTFS permissions for optimal security.

Ch 9: System Recovery and Protection

Chapter 9 focuses on system recovery and protection, covering various aspects such as the Windows boot process, data backup and recovery, Windows updates, BitLocker, malware protection, and Windows firewall. The chapter delves into the details of modifying and configuring the boot order, using advanced boot options, troubleshooting system startup, utilizing restore points, and employing Windows system recovery tools. It discusses creating backups, configuring file history, using file recovery tools, and restoring data from backups. It also explores managing Windows updates, configuring updates with group policy, and validating and troubleshooting updates. Additionally, the chapter explores implementing and configuring BitLocker for data protection, managing Windows security to protect against malware, and configuring the Windows client firewall for enhanced security.

Ch 10: Monitor and Manage Windows

Chapter 10 covers monitoring and managing Windows systems, focusing on performance and reliability, system configuration and troubleshooting tools, and remote management. The chapter discusses using Event Viewer, Resource Monitor, Process Explorer, and Reliability Monitor to monitor and manage performance and reliability. It also explores various system configuration tools, such as System Information, System Configuration Utility, Management Consoles, Task Scheduler, and Local Registry. The chapter delves into remote management tools, including Remote MMC, PowerShell Remoting, and Windows AdminCenter. Additionally, it covers Remote Desktop, Remote Assistance, Quick Assist, and configuring remote help in Intune. Finally, the chapter discusses system troubleshooting tools and techniques for startup issues and other common problems.

Ch 11: Compliance Policies and Configuration Profiles

Chapter 11 focuses on compliance policies and configuration profiles, covering policies and profiles, conditional access policies, device compliance policies, inventory reports, alerts, troubleshooting, and device configuration profiles. The chapter presents the creation of conditional access and device compliance policies, configuring inventory reports to monitor compliance, and troubleshooting compliance policies. The chapter further explores device configuration profiles through, their implementation, configuring devices for kiosk mode, Microsoft Tunnel for Intune, and troubleshooting techniques.

Ch 12: Manage, Maintain, and Protect Devices

Chapter 12 addresses managing, maintaining, and protecting devices, focusing on device lifecycle management. The chapter discusses configuring enrollment settings in Intune, policy sets, and managing device lifecycle tasks such as restarting, retiring, or wiping devices. It also covers monitoring devices with Intune, Azure Monitor, and Endpoint Analytics. The chapter delves into device updates and update policies by configuring update rings with Intune, feature and quality updates, Android updates, monitoring updates, and client delivery optimization and troubleshooting updates in Intune. Lastly, the chapter explores endpoint protection through security baselines in Intune, configuration policies for endpoint security, onboarding devices into Defender for Endpoint, automated response capabilities in Defender for Endpoint, and investigating and responding to threats.

Ch 13: Application Management

Chapter 13 focuses on managing apps, app protection, and configuration policies. It covers deploying and updating apps with Intune, deploying apps to platform-specific stores, app protection policies, and app configuration policies. The chapter also discusses using the Microsoft Office Deployment Tool, Microsoft 365 Apps Admin Center, and deploying Microsoft 365 Apps by using Intune.

Ch 2: Windows Installation

Windows Versions

  • Windows Operating Systems
  • Windows 10 versions
  • Windows 11 versions
  • Windows Features

Windows Installation

  • Install Windows
  • Use ADK to Customize Installation

Windows Upgrade

  • Upgrade to Windows 11


  • Hyper-V on Windows Client
  • Add Virtual Hard Drive to VM
  • Create and Manage Checkpoints on Hyper-V
  • Use Windows Sandbox
  • Create Virtual Machines

Ch 3: Post Installation Tasks

Windows Activation

  • Windows Activation
  • Managing Activation from the Command Line
  • Troubleshooting Windows Activation

Configure Windows

  • Configure System Settings
  • Configure Language and Region
  • Configuring Accessibility Options
  • Windows Post-Installation
  • Manage Startup Applications
  • Configure Startup Items
  • Configure and Manage Services

Web Browser

  • Microsoft Web Browsers
  • Configuring Edge


  • Manage Desktop Applications
  • Modify File Associations


  • Printing Overview
  • Install a Local Printer
  • Manage Printer Properties
  • Install and Configure a Local Printer
  • Configure Default Printers
  • Share a Printer

Ch 4: Deploy Windows

System Images

  • Image Preparation
  • MDT Image Preparation
  • Image Capture
  • Capturing Images with MDT
  • Creating an Answer File

User Migration

  • Plan User Profile and Data Migration
  • USMT Migration


  • Image Deployment
  • Windows Dynamic Deployment
  • Use Deployment Profiles


  • Autopilot Deployment
  • Extracting Device HW Info to a CSV
  • Importing Device Info into Intune
  • Enrollment Status Page (ESP)
  • Provision Windows with Autopilot
  • Troubleshooting Autopilot

Ch 5: Manage Identity

Active Directory

  • Active Directory Overview
  • Workgroup vs. Domain Setup
  • Join a Domain
  • Join a Workstation to a Domain
  • Manage Active Directory Objects
  • Create User Accounts
  • Create OUs
  • Delete OUs

Users and Groups

  • Manage Local Users and Groups
  • Manage Users and Groups
  • Local User Accounts for Sign-in
  • Online User Accounts for Sign-in
  • Domain User Accounts for Sign-in
  • Manage Users in Azure
  • Manage Groups in Azure


  • Use Credential Manager
  • Manage and Configure Client Certificates
  • Install Certificate

Azure AD

  • Azure Active Directory Overview
  • Join Devices to Azure AD
  • Manage role-based access control (RBAC)
  • Intune Connector for Active Directory
  • Manage Users in Azure AD
  • Manage Groups in Azure AD

Privileged Accounts

  • Privileged Accounts
  • Secure User Accounts

Ch 6: Group Policy

Group Policy

  • Configure Local Policies
  • Group Policy Processing
  • Create and Link Group Policy Objects
  • Manage Group Policy Inheritance
  • Group Policy Categories
  • Create and Link a GPO
  • Create a Starter GPO

Password Policies

  • Password Policies
  • Configure and Manage AD DS Passwords
  • Local Administrator Password Solutions (LAPS)


  • Security Options
  • Configure Security Options

User Rights

  • Manage User Rights
  • Configure User Rights

Audit Policies

  • Audit Policies
  • Configure Audit Policies

User Account Control

  • Configure Local UAC Settings
  • Configure User Account Control
  • UAC Group Policy Settings
  • Enforce User Account Control
  • Configure UAC Settings to Prompt for Changes
  • Configure UAC Settings to Elevate Automatically

Ch 7: Network Connectivity

IP Addressing

  • Numbering Systems
  • IP Addresses
  • Subnets
  • IP Address Assignment
  • Configure IP Settings on Workstation
  • Configure IP Addresses
  • Explore IP Configuration


  • IP Configuration Troubleshooting
  • Use ipconfig
  • Network Connectivity Troubleshooting
  • Use ping and tracert
  • Wireless Network Troubleshooting
  • Explore Network Connectivity


  • IP Version 6
  • IPv4 to IPv6 Migration
  • IPv6 Address Assignment
  • Configure IPv6 Addresses
  • Configure a DHCP6 Server

Wireless Networking

  • Install a Wireless Network Adapter
  • Wireless Security
  • Wireless Encryption and Authentication
  • Configure a Wireless Connection
  • Connect to a Wireless Network
  • Create a Home Wireless Network
  • Secure Home Wireless Network
  • Configure a Wireless Profile
  • Wireless Considerations

Virtual Private Network (VPN)

  • Create a VPN Client
  • Configure a VPN Connection

Ch 8: File and Storage Management

Local Storage

  • Manage and Optimize Storage
  • Configure Local Storage
  • Optimize Disks in Windows
  • Storage Sense


  • Configuring OneDrive
  • Recovering Files from OneDrive
  • Configure OneDrive Storage

File Management

  • Windows File and Folder Properties
  • System File Locations
  • Manage Files on Windows
  • Manage Directories from the Command Prompt
  • Manage Files from the Command Prompt
  • File Management Commands
  • Manage Files and Folders

NTFS and Share Permissions

  • Basic and Advanced Folder Sharing on Windows
  • Configure Share and NTFS Permissions
  • Configure NTFS Permissions
  • Share and Secure Folders

Ch 9: System Recovery and Protection

Boot and Startup

  • Windows Boot Process and Options
  • Modify the Boot Order
  • Configure the Boot Order
  • Advanced Boot Options
  • Use the bootrec Command
  • Troubleshoot System Startup

System Recovery

  • Recovery Environment
  • Create and Use Restore Points
  • Use Windows System Recovery Tools
  • Boot into the Windows Recovery Environment


  • System and Data Backup
  • Configure File History
  • Back Up the Computer
  • Create Backups in Windows


  • Use File Recovery Tools
  • Recovering Files from Backup
  • Restore Data from File History
  • Recover a File from Previous  Versions
  • BitLocker Recovery

Windows Updates

  • System and Data Backup
  • Windows Servicing Options
  • Configure Windows Update
  • Configure Updates with Group Policy
  • Validating and Troubleshooting Updates


  • Implementing BitLocker
  • Configure BitLocker

Malware Protection

  • Malware Protection
  • Configure and Manage Windows Security


  • Configure Windows Client Firewall

Ch 10: Monitor and Manage Windows

Monitor Performance and Reliability

  • Use Event Viewer
  • Performance Monitoring
  • Resource Monitor and Process Explorer
  • Monitoring Resources
  • Use Reliability Monitor

System Configuration Tools

  • View System Information
  • Use the System Configuration Utility
  • Use Management Consoles
  • Use Task Scheduler
  • Configure the Local Registry

Remote Management

  • Remote Management Tools
  • Use Remote MMC
  • Use PowerShell Remoting
  • Use Windows Admin Center
  • Configure Remote Desktop
  • Remote Assistance
  • Use Quick Assist
  • Use Remote Assistance
  • Remote Help in Intune Facts

System Troubleshooting

  • System Troubleshooting Tools
  • Troubleshooting Startup

Ch 11: Compliance Policies and Configuration Profiles

Compliance Profiles

  • Policies and Profiles
  • Create Conditional Access Policies
  • Create Device Compliance Policies
  • Configure Inventory Reports and Alerts

Device Configuration Profiles

  • Policies and Profiles
  • Implement and Troubleshoot Device Configuration Profiles

Ch 12: Manage, Maintain, and Protect Devices

Manage Devices

  • Manage Device Lifecycle
  • Configure Enrollment Settings in Intune
  • Device Enrollment
  • Policy Sets
  • Restart, Retire, or Wipe Devices
  • Monitor Devices with Intune, Azure Monitor, and Endpoint Analytics

Device Updates

  • Device Updates and Update Policies
  • Update Rings with Intune
  • Configure Feature and Quality Updates
  • Android Updates with Configuration Policies
  • Client Delivery Optimization with Intune
  • Troubleshoot Updates in Intune

Ch 13: Application Management

Manage Apps

  • Deploy and Update Apps with Intune
  • Use Microsoft Office Deployment Tool
  • Use Microsoft 365 Apps Admin Center
  • Deploy Apps to Platform-Specific Stores

App Protection

  • App Protection Policies
  • App Configuration Policies