MD-100T00 - Windows Client

In this course, students will learn how to support and configure Windows desktops in an organizational environment. Students will develop skills that include learning how to install, customize, and update Windows 10 and later operating systems. Students will learn how to managing storage, files, and devices as well as how to configure network connectivity for Windows. Students will also learn how to secure the Windows OS and protect the data on the device. Finally, students will learn how to manage and troubleshoot Windows clients.

Duration: 5.0 days

Enquire Now


Virtual ILT | 11 Mar 2024 - 15 Mar 2024 India

Start learning today!

Click Hereto customize your Training


  • Describe Windows 10 and Windows 11.
  • Explain the new features available in Windows.
  • Explain the benefits of using the Windows client for small and medium-sized organizations.
  • Discuss managing the Windows client in an enterprise environment.
  • Describe the elements of the new Windows 10 and 11 user interfaces.
  • Explain the differences between the different editions of Windows.
  • Select the most suitable Windows device for your needs.
  • Describe the minimum recommended hardware requirements for installing Windows 10 and 11.
  • Describe the options available for installing and deploying the Windows client. -Understand the process of installing the Windows client.
  • Describe the methods of activation for the Windows client.
  • Describe the factors to consider in a new machine deployment.
  • Describe the process of upgrading to a newer version of Windows.
  • Describe the factors to consider when deciding to upgrade Windows.
  • Describe the process of migrating to Windows.
  • Understand the considerations when choosing between the upgrade and migration processes.
  • Upgrade a Windows device.
  • Describe the different methods of automated desktop deployments.
  • Describe common tools used to perform automated steps.
  • Describe how to leverage virtualization in Windows client.
  • Configure a Hyper-V virtual machine.
  • Configure a service account.
  • Set up a local account.
  • Use Credential Manager to manage credentials.
  • Describe and configure Windows Hello.
  • Describe Active Directory Domain Services.
  • Describe Azure Active Directory.
  • Describe the differences between Active Directory Domain Services and Azure Active Directory.
  • Describe Active Directory Distribution and Security groups.
  • Describe the authentication process in Active Directory.
  • Describe User Account Control (UAC).
  • Explain how UAC works.
  • Explain how to configure UAC notification settings.
  • Describe the challenges that BYOD introduces.
  • Describe Device Registration and its uses.
  • Describe how Device Registration works.
  • Describe the infrastructure requirements for Device Registration.
  • Describe how to register and enroll a device.
  • Use advanced startup options.
  • Customize desktop settings.
  • Describe the various display settings in Windows.
  • Configure display options.
  • Describe how to manage mobile-device settings in Windows.
  • Describe power plans.
  • Configure power options.
  • Deploy customized Start menu configurations
  • Describe activation methods
  • Describe Active Directory
  • Describe the benefits of using Group Policy
  • Configure and apply a Group Policy Object
  • Describe Windows PowerShell
  • Explain how to use Windows PowerShell cmdlets
  • Explain the use and importance of device drivers.
  • Explain how to manage device peripherals.
  • Describe Windows printer features.
  • Describe printing components.
  • Describe benefits of Type 4 printer drivers.
  • Describe how to manage client-side printing.
  • Describe how to manage print server properties.
  • Install and share a printer.
  • Describe IPv4.
  • Describe IPv4 subnets.
  • Explain the difference between public and private IPv4 addressing.
  • Implement automatic IPv4 address allocation.
  • Describe the tools available to configure network settings in Windows.
  • Describe the tools available to troubleshoot network connections.
  • Configure an IPv4 network connection.
  • Describe IPv6.
  • Explain IPv6 addressing.
  • Describe name resolution.
  • Describe DNS.
  • Explain how to troubleshoot name resolution.
  • Configure and test name resolution settings in Windows.
  • Describe wireless technologies.
  • Configure wireless settings in Windows.
  • Discuss the considerations for implementing wireless networks within organizations.
  • Describe how to use VPNs to connect to a remote network.
  • Explain how Always On VPN can help remote users connect.
  • Discuss the considerations of enabling remote access for your users.
  • Describe Remote Desktop in Windows.
  • Enable and use Remote Assistance, including Easy Connect.
  • Describe Azure Remote Desktop Services.
  • Describe the different ways to access storage.
  • Explain the difference between network-attached storage (NAS) and storage area networks (SANs).
  • Compare MBR and GUID partition table (GPT) disks.
  • Describe how to convert a basic disk to a dynamic disk.
  • Describe the tools available for managing disks.
  • Describe a simple volume.
  • Describe mirrored, spanned, and striped volumes.
  • Create volumes, resize, and manage volumes.
  • Explain the primary characteristics of the Storage functionality in Windows client.
  • Describe how to use the Storage functionality.
  • Describe how files stored on disks might fragment.
  • Describe how to defragment volumes.
  • Explain folder compression.
  • Describe how to compress folders.
  • Describe what disk quotas are.
  • Describe how to configure disk quotas.
  • Explain what the Storage Spaces feature is.
  • Describe the features of Storage Spaces.
  • Discuss in which scenarios to use Storage Spaces.
  • Show how to configure Storage Spaces.
  • Describe the features of the FAT file system.
  • Explain the features of the NTFS file system.
  • Describe the features of the ReFS file system.
  • Work with the file systems available in Windows client.
  • Describe the tools for managing files and folders.
  • Describe how to configure file and folder permissions.
  • Describe the concept of permission inheritance.
  • Implement conditions to limit file and folder access.
  • Secure files and folders by using file permissions.
  • Use the effective permissions feature.
  • Describe how copying and moving files and folders affect permissions.
  • Describe shared folders.
  • Describe methods for sharing folders.
  • Describe the effect of combining file permissions and share permissions.
  • Describe Windows Libraries.
  • Describe the capabilities of OneDrive.
  • Configure Windows to synchronize files and settings using OneDrive.
  • Describe Work Folders and how they contrast to OneDrive.
  • Configure a client to use Work folders.
  • Differentiate between the types of apps in Windows.
  • Describe manual app installation.
  • Explain the methods for automating installation of desktop apps.
  • Describe the Universal Windows apps, Microsoft Store, and Microsoft Store for Business.
  • Explain how to manage and restrict access to Microsoft Store.
  • Explain how to resolve issues related to Universal Windows apps.
  • Explain how to configure assigned access to a Universal Windows app.
  • Describe the process of using AppLocker to control Universal Windows apps.
  • Describe the features of Microsoft Edge.
  • Configure and use Microsoft Edge.
  • Discuss the appropriate browser to use in your organization.
  • List the productivity features in Microsoft Edge.
  • Describe the Windows client service model.
  • Describe the different Windows service channels.
  • Describe the available methods for applying updates to Windows.
  • Describe the available methods for applying updates to Windows.
  • Explain the Windows Update configuration options.
  • Explain the Group Policy Object (GPO) settings available for configuring Windows Update.
  • Configure Windows Update.
  • Describe how to use Windows Server Update Services (WSUS) to provide updates to Windows.
  • Describe malware.
  • Understand the sources of malware.
  • Describe ways of mitigating malware.
  • Identify common network-related security threats.
  • Describe the methods by which you can mitigate these common security threats.
  • Describe tools for securing users identity.
  • Describe tools for securing data on Windows.
  • Describe tools for securing Windows devices.
  • Use Microsoft Defender to detect and quarantine malware.
  • Describe the purpose of a firewall.
  • Describe Windows Defender Firewall functionality.
  • Explain network-location profiles.
  • Explain the increased functionality of Windows Defender Firewall with Advanced Security.
  • Describe the benefits of drive encryption with BitLocker
  • Describe the benefits of Encrypted File System
  • Describe the purpose and functionality of IPsec.
  • Describe how to configure IPsec.
  • Describe connection security rules.
  • Explain authentication options.
  • Monitor connections.
  • Describe the features and use of the Security Compliance Toolkit
  • Describe the features of AppLocker
  • Describe methods of securing data in the enterprise
  • Describe the benefits and features of Microsoft Defender for Endpoint
  • Describe the Enterprise Desktop Support Technician (EDST) job role.
  • Describe the desktop support environment.
  • Describe how to interact with end users.
  • Explain the key stages and terminology of a troubleshooting methodology
  • Describe how different form factors and hardware options affect supporting the device.
  • Explain the Windows operating system architecture.
  • Describe the Windows registry
  • Use the Registry Editor tool to change Windows settings.
  • Explain how to use the Task Manager tool.
  • Use Event Viewer to identify problems.
  • Explain how to use the Reliability Monitor.
  • Use the Diagnostics and Recovery Toolset.
  • Use the Steps Recorder to record details of a problem.
  • Use the Microsoft Management Console
  • Understand the Windows Registry
  • Describe key system components in Windows.
  • Describe performance monitoring tools in Windows.
  • Explain how to establish a performance baseline.
  • Explain how to optimize disk and memory performance in a Windows computer.
  • Explain the Windows file recovery methods and tools.
  • Use File History to recover files.
  • Describe and use the Previous Versions feature.
  • Describe how to configure and use the Azure Backup tool.
  • Troubleshoot File Recovery Options.
  • Explain how and when to use the Reset this PC tool.
  • Explain how to use provisioning packages.
  • Describe desktop app deployment methods.
  • Discuss desktop app deployment issues.
  • Describe Microsoft 365.
  • Describe the difference between Microsoft 365 apps and desktop apps.
  • Resolve desktop app deployment issues.
  • Troubleshoot Windows Installer issues.
  • Describe how to use AppLocker to control apps.
  • Control desktop app installation with AppLocker policies.
  • Describe the Windows startup architecture.
  • Explain the repair and recovery options available in Windows.
  • Describe the available advanced startup recovery tools.
  • Explore the advanced startup environment.
  • Describe the System Restore process in Windows.
  • Access the Windows System Restore tool to fix the startup environment.
  • Describe volume activation considerations.
  • Describe the role of the BCD store.
  • Describe BCD configuration settings.
  • Describe operating system services.
  • Identify failed services by using Windows tools.
  • Explain how to use tools and utilities to disable services.
  • Explain how to resolve locked-out accounts.
  • Describe the role and importance of device drivers.
  • Manage and troubleshoot device drivers.
  • Explain the difference between the staging and installation of device drivers.
  • Restrict installation of device drivers by using Group Policy.
  • Describe hardware-related problems.
  • Describe the considerations for using USB devices.
  • Describe considerations for using wireless devices.
  • Explain how you can use built-in diagnostic tools to gather hardware information.
  • Determine how to best approach hardware problems.
  • Apply the guidelines for troubleshooting hardware-related problems.
  • Apply device-replacement considerations.
  • Identify the most vulnerable hardware devices.
  • Apply the guidelines for replacing hardware.
  • Diagnose memory problems.
  • Diagnose and troubleshoot disk problems.


1. Explore the Windows client

This module describes the new features in Windows and provides guidance with respect to navigating and customizing the user interface.

Click here to know more

2. Examine Windows client editions and requirements

This module introduces the different editions of Windows, the features of each, and describes why and when you might select a specific Windows edition. This module also covers methods for installations.

Click here to know more

3. Evaluate Windows client installation methods

In this module, you will also learn about the different processes and methods for installing Windows 10 and later.

Click here to know more

4. Upgrade and migrate Windows clients

This module examines the fundamentals of upgrading and migrating processes for a single Windows device.

Click here to know more

5. Evaluate deployment methods

This module will provide an introduction to the tools and processes for automating and performing large-scale deployments.

Click here to know more

6. Explore authentication

In this module, you will learn about the differences between authentication and authorization.

Click here to know more

7. Manage users and groups

This module introduces the management of users and groups using Active Directory, and compares the differences between Active Directory Services and Azure Active Directory.

Click here to know more

8. Configure User Account Control

This module introduces how User Account Control works and how you can use UAC-related desktop features to reduce security risks.

Click here to know more

9. Implement device registration

This module examines the process of device restrigration and discusses how to register and enroll devices in Active Directory.

Click here to know more

10. Explore common configuration options

This module discusses configuring and customizing some of the common default settings in Windows clients.

Click here to know more

11. Explore advanced configuration methods

This module describes how administrators can activate Windows clients at scale and use Group Policy and PowerShell to apply configuration settings to groups of Windows clients.

Click here to know more

12. Manage drivers and device peripherals

This module introduces device drivers. Student will learn how drivers work and the tools used to manage common peripheral devices such as printers.

Click here to know more

13. Configure IP network connectivity

This module explores configuring Windows clients to communicate over IPv4 and IPv6 networks.

Click here to know more

14. Explore name resolution

This module focuses on name resolution in Windows client and the methods used to resolve device names to addresses.

Click here to know more

15. Configure wireless network connectivity

This module discusses the various wireless standards and the configuration and support of Windows wireless clients.

Click here to know more

16. Explore remote access

This module explores how Windows clients can connect to resources over public networks using virtual private networks.

Click here to know more

17. Employ remote management

This module demonstrates the various tools for connecting remotely to a Windows client.

Click here to know more

18. Manage storage on Windows clients

This module describes some of the different storage technologies, including different types of server-based and cloud-based storage. This module will also cover considerations for configuring storage for use in Windows client.

Click here to know more

19. Maintain disks and volumes

This module explores file system fragmentation and the tools that you can use to reduce fragmentation. Students will learn how Windows can compress files to take up less space on the hard disk.

Click here to know more

20. Implement Storage Spaces

This module explains how to configure and implement the Storage Spaces feature in Windows.

Click here to know more

21. Explore Windows client file systems

In this module, you will learn about the differences and benefits of the file systems that Windows client supports.

Click here to know more

22. Configure and manage file access

This module describes how to control access to files and folders using permissions.

Click here to know more

23. Configure and manage shared folders

This module examines various methods of sharing folders, along with the effect this has on file and folder permissions when you create shared folders on an NTFS-formatted partition.

Click here to know more

24. Manage user files

The module examines the various options that enable administrators to protect user files against data loss.

Click here to know more

25. Provide apps to users

In this module, you'll learn about traditional app-deployment methods, as well as methods that you can use to help to automate app deployment.

Click here to know more

26. Manage Universal Windows Platform apps

This module explores using Microsoft Store to manage Universal Windows Platform apps.

Click here to know more

27. Manage the Microsoft Edge browser

This module explores the features of Microsoft Edge and describes how to configure Edge for the common scenarios in an organization.

Click here to know more

28. Explore the Windows servicing model

This module examines the Windows client service module and describes the available methods for applying Windows updates.

Click here to know more

29. Update Windows clients

This module describes the various methods for applying updates to Windows and explains how to configure Windows update in an organization.

Click here to know more

30. Explore malware and threat protection

In this module, you will learn about malware and common network-related security threats and the steps that you can take to mitigate them.

Click here to know more

31. Explore Microsoft Defender

The module explains how Microsoft Defender can be used to protect against malware and reduce exposure to attacks using a firewall.

Click here to know more

32. Explore device encryption features

This module explains the benefits of using encryption to protect drives and files against unauthorized access.

Click here to know more

33. Explore connection security rules

This module describes how connection security rules can be used to provide additional security to protect data transmitted across networks.

Click here to know more

34. Explore advanced protection methods

This module explores additional tools used to provide additional layers of security within an organization.

Click here to know more

35. Explore troubleshooting methodologies

This module introduces the Enterprise Desktop Support Technician role and describes how an EDST best supports end users, both directly and indirectly, in a Windows client environment.

Click here to know more

36. Explore Windows architecture

This module provides information about the operating system’s architecture and supported devices. It also describes the desktop support environment and troubleshooting terminology.

Click here to know more

37. Explore support and diagnostic tools

This module introduces the tools for troubleshooting the Windows client operating system and provides guidance on how to use them.

Click here to know more

38. Monitor and troubleshoot Windows client performance

This module explores methods and tools for monitoring and troubleshooting Windows client performance issues.

Click here to know more

39. Employ file recovery in Windows client

In this module, you will learn about the Windows file backup and recovery tools.

Click here to know more

40. Explore application troubleshooting

This module explores the methods and tools used for troubleshooting application deployment issues.

Click here to know more

41. Troubleshoot Windows startup

This module examines the Windows startup architecture and discusses the methods used to troubleshoot client startup issues.

Click here to know more

42. Troubleshoot operating system service issues

This module discusses the role of operating system services and how to troubleshoot issues that restrict functionality. This module also discusses resolving issues with signing in to Windows.

Click here to know more

43. Troubleshoot device driver failures

This module focuses on the role of device drivers and troubleshooting problems that pertain to them.

Click here to know more

44. Explore physical hardware troubleshooting

This module provides an overview of troubleshooting hardware-related problems and discusses specific considerations for using USB and wireless devices on computers that are running Windows.

Click here to know more

45. Troubleshoot physical failures on Windows clients

The module examines the methods for identifying and troubleshooting issues related to the device's physical hardware.

Click here to know more


Candidates for this exam are IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 and later core services. Candidates may also be familiar with enterprise scenarios and cloud-integrated services.


  • Basic understanding of computer networks and hardware concepts.
  • Basic understanding of OS and Application concepts.
  • Experience with using the Windows OS.



Skills Measured

  • Install and configure Windows (20-25%)
  • Configure and manage connectivity and storage (15-20%)
  • Maintain Windows (30-35%)
  • Protect devices and data (25-30%)

Course Benefits

  • Career growth
  • Broad Career opportunities
  • Worldwide recognition from leaders
  • Up-to Date technical skills
  • Popular Certification Badges

Microsoft Popular Courses


The Managing Microsoft Teams course is designed for those aspiring to be Microsoft 365 Teams Administrators to deploy, configure and manage Office 365 workloads


This course is a high-level overview of Azure. The course will provide foundational level knowledge of cloud services and how those services are provided with M


This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.


MB-335T00 is a course code that refers to a specific training program or course offered by Microsoft. Unfortunately, as of my knowledge cutoff in September 2021
Enquire Now
By clicking "Submit", I agree to the Terms Of Use and Privacy Policy