Windows NT Network Management: Reducing Total Cost of Ownership - 9 - Performance Monitoring

Total Page:16

File Type:pdf, Size:1020Kb

Windows NT Network Management: Reducing Total Cost of Ownership - 9 - Performance Monitoring Windows NT ...: Reducing Total Cost of Ownership - Chapter 9 - Performance Monitorin Page 1 of 13 [Figures are not included in this sample chapter] Windows NT Network Management: Reducing Total Cost of Ownership - 9 - Performance Monitoring AN OLD ADAGE SAYS, "IF YOU can’t measure it, you can’t manage it." Even if you can measure something, how can you tell if your changes are making a difference if you don’t have baseline information? It’s important to monitor a server’s or work- station’s performance to maximize your investment in these tools. If a user complains that her computer is too slow, you often need more information to fix the problem. For example, if the problem is loading Web pages on a computer using an analog modem, the modem is probably limiting the system’s performance. However, if the computer is an older model, certain operations may wait for the CPU to finish processing. In this case, a complete system upgrade may be the best solution. The usefulness of performance monitoring goes far beyond handling user expectations. A network and systems administrator can use information obtained by analyzing the operations of existing hardware, software, and networking devices to predict the timing of upgrades, justify the cost of replacing and upgrading devices, and assist in troubleshooting. Performance monitoring ultimately reduces TCO and is a vital part of managing any IT environment. Performance monitoring helps answer important questions about your current environment. For example, you may want to know which activity specifically uses the most resources in your environment. If you determine that it is loading Web pages, then upgrading the RAM or the CPU speed of client machines may not help much. Here the performance bottleneck is likely to be the remote access device. With modern desktop computers and analog modems, the latter is often the point of slowest data throughput. The details of performance monitoring--which tools to use and which information to track--are largely based on the specifics of your environment. For example, suppose the user complaining of a slow computer is connected to a network with Internet access. The administrator might want to check basic network utilization statistics--perhaps the new marketing database application is causing a lot of collisions on this subnet, thereby reducing overall performance. On the other hand, if this machine is a home computer using a modem to dial up an Internet service provider, the best place to check would be the modem itself. In this chapter, we look at some good ways to monitor performance levels. Windows NT includes tools that are designed to profile hardware, software, and network metrics. After reading this chapter, you should have a better idea of what’s going on in your own environment. Performance Monitoring Methodology To monitor performance, you need to have a baseline of information. This baseline should be file://I:\chapters\z\zc846.html 3/21/01 Windows NT ...: Reducing Total Cost of Ownership - Chapter 9 - Performance Monitorin Page 2 of 13 compiled over time and should be used for measuring any significant changes to your system. A nagging question that may have occurred to you is, By measuring performance, am I not actually decreasing it? And the definitive answer is, Sometimes. In some cases, performance monitoring may present a significant drain on resources. For example, the Windows NT Performance Monitor application itself uses CPU time, memory, and display resources. On modern systems, however, this drain is negligible. In this chapter, I note where significant performance reductions may occur. Whether you are running the Performance Monitor application or not, Windows NT automatically keeps track of performance data for tuning itself. Therefore, it does not matter if you measure 100 different parameters or only 1. The impact of running Performance Monitor also remains constant for most types of monitoring, so you need not worry about it as long as you consistently use the same tool to measure performance. When you’re monitoring performance, it is always a good idea to make only one change at a time. This way, you can measure the effects of modifying a single parameter. Also, if performance decreases or other problems come up, you’ll know what to change to return to the original configuration. Documenting performance values is just as important as making changes. Windows NT includes several tools that can aid in the evaluation of performance. This chapter covers three of them: l Performance Monitor l Task Manager l Network Monitor The Windows NT Performance Monitor The Windows NT Performance Monitor is installed by default with all Windows NT installations. You open Performance Monitor by clicking Start, Programs, Administrative Tools, Performance Monitor. The program starts with the default, blank Chart view, which is one of the four Performance Monitor views. We discuss these four modes and their typical uses later in this chapter. For now, you can switch between them by clicking on the View menu and then choosing one view at a time. The settings for each view are independent of the values examined in other views, so you can specify different counters for each at any time. The Performance Monitor includes many counters and objects with which you can monitor certain aspects of system performance. Counters are general aspects of the system that can be monitored (for example, memory, processor). Objects are the actual details you wish to track for the selected object (for example, bytes committed, processor utilization). To add a counter to the default view, click on the Add button and view the various options. In the Add dialog box, you can click on the Explain button for more information about each option (see Figure 9.1). Table 9.1 lists some of the most useful measurements. Some counters include instances if multiple items are available. For example, on a dual-processor server, you can choose to monitor data for one or both processors. Note that the guidelines in the Usefulness column should be taken as generalizations for sustained levels. For example, pages/sec often goes above the recommended value for short periods of time. file://I:\chapters\z\zc846.html 3/21/01 Windows NT ...: Reducing Total Cost of Ownership - Chapter 9 - Performance Monitorin Page 3 of 13 FIGURE 9.1 Adding a counter to Performance Monitor. TABLE 9.1 Useful Performance Monitor Counters and Objects Counter Object Meaning Usefulness Memory Pages/sec The number of times/ seconds the If sustained greater than five, memory subsystem had to get you may want to consider a information from the hard disk RAM upgrade. Logical % Free Space Percentage of free space per volume A value of less than 10% Disk or per all volumes indicates that additional storage space is needed. Physical Avg. Disk The number of tasks that had to wait If high, disk performance may Disk Queue Length for disk-based data not be sufficient. Server Bytes Total/sec The amount of data transferred by High values indicate many this server and/or large file transfers to and from the server. Server Server Sessions Number of active processes on this Indicates current activity; use to server compare loads on different machines. Network % Network Percentage of total network If sustained greater than 40%, it Segment Utilization bandwidth in use may be decreasing performance. Redirector Reads/writes Rejected requests for data transfer Large file transfers may be denied/sec occurring to/from this server. The objects and counters that are available are based on the services and applications installed on the local machine. For example, if you have the Remote Access Service (RAS) installed, the RAS Port and RAS Total counters are available. These counters help you determine the current status of your remote access users. Microsoft ships Windows NT with basic performance counters enabled. For most systems administrators, these defaults are sufficient. If you require more specific information, however, you can also enable other counters and objects. For example, to measure disk performance, you need to specifically turn on disk performance logging. To do so, you must go to a command prompt and type diskperf -ye (the y flag activates disk performance monitoring, and the e flag specifies performance monitoring for stripe set volumes). This change takes effect the next time you restart the system. Why isn’t this option enabled by default? Well, keeping track of disk performance information creates a slight decrease in performance (Microsoft estimates less than 5% in most cases). Whether this slowdown is worth the additional information depends on your environment and the use of the server. To monitor various network performance values, you also need to add the Simple Network Management Protocol (SNMP) service and the Network Monitor Agent in the Network Control Panel applet. Figure 9.2 shows a Performance Monitor chart while performing a large file copy over the network. This example includes the counters and objects in Table 9.2. Note that certain instances are system specific. For example, the instance for % Network Utilization is a 3Com Etherlink III network file://I:\chapters\z\zc846.html 3/21/01 Windows NT ...: Reducing Total Cost of Ownership - Chapter 9 - Performance Monitorin Page 4 of 13 interface card. Although the type of information captured is the same, the specific names of instances will be based on the network adapter or adapters present in your system. Similarly, if you are monitoring a multiprocessor system, instances will be available for viewing statistics on one or all of the processors. TABLE 9.2 Performance Monitor Values Measured During a Large File Copy Object Counter Instance Processor % Processor Time 0 LogicalDisk Free Megabytes Total Memory Pages/sec N/A Server Bytes Total/sec N/A Network Segment % Network Utilization El3c5741 FIGURE 9.2 Performance Monitor values during a large file copy over the network.
Recommended publications
  • PC Magazine Fighting Spyware Viruses And
    01_577697 ffirs.qxd 12/7/04 11:49 PM Page i PC Magazine® Fighting Spyware, Viruses, and Malware Ed Tittel TEAM LinG - Live, Informative, Non-cost and Genuine ! 01_577697 ffirs.qxd 12/7/04 11:49 PM Page ii PC Magazine® Fighting Spyware, Viruses, and Malware Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256-5774 www.wiley.com Copyright © 2005 by Wiley Publishing Published simultaneously in Canada ISBN: 0-7645-7769-7 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1B/RW/RS/QU/IN No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, e-mail: [email protected]. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials.
    [Show full text]
  • Comparing Systems Using Sample Data
    Operating System and Process Monitoring Tools Arik Brooks, [email protected] Abstract: Monitoring the performance of operating systems and processes is essential to debug processes and systems, effectively manage system resources, making system decisions, and evaluating and examining systems. These tools are primarily divided into two main categories: real time and log-based. Real time monitoring tools are concerned with measuring the current system state and provide up to date information about the system performance. Log-based monitoring tools record system performance information for post-processing and analysis and to find trends in the system performance. This paper presents a survey of the most commonly used tools for monitoring operating system and process performance in Windows- and Unix-based systems and describes the unique challenges of real time and log-based performance monitoring. See Also: Table of Contents: 1. Introduction 2. Real Time Performance Monitoring Tools 2.1 Windows-Based Tools 2.1.1 Task Manager (taskmgr) 2.1.2 Performance Monitor (perfmon) 2.1.3 Process Monitor (pmon) 2.1.4 Process Explode (pview) 2.1.5 Process Viewer (pviewer) 2.2 Unix-Based Tools 2.2.1 Process Status (ps) 2.2.2 Top 2.2.3 Xosview 2.2.4 Treeps 2.3 Summary of Real Time Monitoring Tools 3. Log-Based Performance Monitoring Tools 3.1 Windows-Based Tools 3.1.1 Event Log Service and Event Viewer 3.1.2 Performance Logs and Alerts 3.1.3 Performance Data Log Service 3.2 Unix-Based Tools 3.2.1 System Activity Reporter (sar) 3.2.2 Cpustat 3.3 Summary of Log-Based Monitoring Tools 4.
    [Show full text]
  • Solarwinds Web Performance Monitor Administrator Guide
    ADMINISTRATOR GUIDE Web Performance Monitor Version 2.2.2 Last Updated: Monday, June 11, 2018 ADMINISTRATOR GUIDE: WEB PERFORMANCE MONITOR © 2018 SolarWinds Worldwide, LLC. All rights reserved. This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors. SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS, OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION NONINFRINGEMENT, ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION CONTAINED HEREIN. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY, EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes
    [Show full text]
  • System Administration Guide
    Experion PKS Release 516 System Administration Guide EPDOC-X139-en-516A August 2020 DISCLAIMER This document contains Honeywell proprietary information. Information contained herein is to be used solely for the purpose submitted, and no part of this document or its contents shall be reproduced, published, or disclosed to a third party without the express permission of Honeywell International Sàrl. While this information is presented in good faith and believed to be accurate, Honeywell disclaims the implied warranties of merchantability and fitness for a purpose and makes no express warranties except as may be stated in its written agreement with and for its customer. In no event is Honeywell liable to anyone for any direct, special, or consequential damages. The information and specifications in this document are subject to change without notice. Copyright 2020 - Honeywell International Sàrl 2 Contents CONTENTS Contents 3 Chapter 1 - About this guide 9 Before reading this guide 10 Chapter 2 - System administration 11 Administering users 12 Windows user accounts 12 Users and groups 12 Passwords administration 13 Deleting a user 13 Experion Operator accounts 14 Control Builder client licenses 14 Administering displays 15 Changing service account passwords 16 Service account scope types 18 Changing passwords for single-machine scope accounts 21 Changing passwords for multi-machine scope accounts 22 Preparing to change passwords for system-wide scope accounts 23 Changing passwords for system-wide scope accounts 26 Changing DSA Advanced Security
    [Show full text]
  • Deploying Microsoft SQL Server on Amazon Web Services
    Deploying Microsoft SQL Server on Amazon Web Services This paper has been archived. November 2019 For the latest technical content about the AWS Cloud, see the AWS Whitepapers & Guides page: https://aws.amazon.com/whitepapers Archived Notices Customers are responsible for making their own independent assessment of the information in this document. This document: (a) is for informational purposes only, (b) represents current AWS product offerings and practices, which are subject to change without notice, and (c) does not create any commitments or assurances from AWS and its affiliates, suppliers or licensors. AWS products or services are provided “as is” without warranties, representations, or conditions of any kind, whether express or implied. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers. © 2019 Amazon Web Services, Inc. or its affiliates. All rights reserved. Archived Contents Introduction .......................................................................................................................... 1 Amazon RDS for SQL Server .......................................................................................... 1 SQL Server on Amazon EC2 ........................................................................................... 1 Hybrid Scenarios .............................................................................................................. 2 Choosing Between
    [Show full text]
  • Performance Monitor
    PeopleTools 8.57: Performance Monitor March 2020 PeopleTools 8.57: Performance Monitor Copyright © 1988, 2020, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications.
    [Show full text]
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • An Evolutionary Study of Linux Memory Management for Fun and Profit Jian Huang, Moinuddin K
    An Evolutionary Study of Linux Memory Management for Fun and Profit Jian Huang, Moinuddin K. Qureshi, and Karsten Schwan, Georgia Institute of Technology https://www.usenix.org/conference/atc16/technical-sessions/presentation/huang This paper is included in the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC ’16). June 22–24, 2016 • Denver, CO, USA 978-1-931971-30-0 Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC ’16) is sponsored by USENIX. An Evolutionary Study of inu emory anagement for Fun and rofit Jian Huang, Moinuddin K. ureshi, Karsten Schwan Georgia Institute of Technology Astract the patches committed over the last five years from 2009 to 2015. The study covers 4587 patches across Linux We present a comprehensive and uantitative study on versions from 2.6.32.1 to 4.0-rc4. We manually label the development of the Linux memory manager. The each patch after carefully checking the patch, its descrip- study examines 4587 committed patches over the last tions, and follow-up discussions posted by developers. five years (2009-2015) since Linux version 2.6.32. In- To further understand patch distribution over memory se- sights derived from this study concern the development mantics, we build a tool called MChecker to identify the process of the virtual memory system, including its patch changes to the key functions in mm. MChecker matches distribution and patterns, and techniues for memory op- the patches with the source code to track the hot func- timizations and semantics. Specifically, we find that tions that have been updated intensively.
    [Show full text]
  • 05 Vcloud Services Consultant
    Optimizing Windows for VMware View 4.5 Optimizing Windows for VMware View™ 4.5 (Optimizing Windows 7, Windows Vista and XP) Version 2.0 For use only by VMware PSO and VMware Solution Providers Consulting Service Delivery Aid – Not a Customer Deliverable Optimizing Windows for VMware View 4.5 Version History Date Ver. Author Description Rev iewers February 2011 V2.0 Tim Federwitz Second Release (Added Dav id Richardson, John Windows XP and Vista) Dodge, Matt Coppinger, Matt Wood August 2010 V1.0 Tim Federwitz First Release (Windows 7 John Dodge, Matt only ) Coppinger, Matt Lesak, Ry an Miersma, Justin Venezia © 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html . VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc 3401 Hillview Ave Palo Alto, CA 94304 www.vmware.com © 2011 VMware, Inc. All rights reserved. Page 2 of 44 Optimizing Windows for VMware View 4.5 Contents 1. Introduction ......................................................................................... 4 1.1 Comparing Default and Optimized Windows 7 Installations ........................................ 4 1.2 How to use this Guide ............................................................................................... 4 2.
    [Show full text]
  • Comptia A+ Complete Study Guide A+ Essentials (220-601) Exam Objectives
    4830bperf.fm Page 1 Thursday, March 8, 2007 10:03 AM CompTIA A+ Complete Study Guide A+ Essentials (220-601) Exam Objectives OBJECTIVE CHAPTER Domain 1.0 Personal Computer Components 1.1 Identify the fundamental principles of using personal computers 1 1.2 Install, configure, optimize and upgrade personal computer components 2 1.3 Identify tools, diagnostic procedures and troubleshooting techniques for personal computer components 2 1.4 Perform preventative maintenance on personal computer components 2 Domain 2.0 Laptops and Portable Devices 2.1 Identify the fundamental principles of using laptops and portable devices 3 2.2 Install, configure, optimize and upgrade laptops and portable devices 3 2.3 Identify tools, basic diagnostic procedures and troubleshooting techniques for laptops and portable devices 3 2.4 Perform preventative maintenance on laptops and portable devices 3 Domain 3.0 Operating Systems 3.1 Identify the fundamentals of using operating systems 4 3.2 Install, configure, optimize and upgrade operating systems 5 3.3 Identify tools, diagnostic procedures and troubleshooting techniques for operating systems 6 3.4 Perform preventative maintenance on operating systems 6 Domain 4.0 Printers and Scanners 4.1 Identify the fundamental principles of using printers and scanners 7 4.2 Identify basic concepts of installing, configuring, optimizing and upgrading printers and scanners 7 4.3 Identify tools, basic diagnostic procedures and troubleshooting techniques for printers and scanners 7 Domain 5.0 Networks 5.1 Identify the fundamental
    [Show full text]
  • Windows Internals, Sixth Edition, Part 2
    spine = 1.2” Part 2 About the Authors Mark Russinovich is a Technical Fellow in ® the Windows Azure™ group at Microsoft. Windows Internals He is coauthor of Windows Sysinternals SIXTH EDITION Administrator’s Reference, co-creator of the Sysinternals tools available from Microsoft Windows ® The definitive guide—fully updated for Windows 7 TechNet, and coauthor of the Windows Internals and Windows Server 2008 R2 book series. Delve inside Windows architecture and internals—and see how core David A. Solomon is coauthor of the Windows Internals book series and has taught components work behind the scenes. Led by a team of internationally his Windows internals class to thousands of renowned internals experts, this classic guide has been fully updated Windows developers and IT professionals worldwide, SIXTH for Windows 7 and Windows Server® 2008 R2—and now presents its including Microsoft staff. He is a regular speaker 6EDITION coverage in two volumes. at Microsoft conferences, including TechNet As always, you get critical, insider perspectives on how Windows and PDC. operates. And through hands-on experiments, you’ll experience its Alex Ionescu is a chief software architect and internal behavior firsthand—knowledge you can apply to improve consultant expert in low-level system software, application design, debugging, system performance, and support. kernel development, security training, and Internals reverse engineering. He teaches Windows internals courses with David Solomon, and is ® In Part 2, you will: active in the security research community.
    [Show full text]
  • Computer Training Options Click Here
    Your Total Training Resource Microsoft® Windows 10® Learn how to perform management, wide varieties of operations, run myriads of built-in programs and maintenance tools of Windows 10. Perform managerial and maintenance commands and features. Learn about Windows essentials, tips and tricks, Managing files and folders on local, network and cloud storage areas like OneDrive. Learn how to customize the Windows environment to personalize the system to work best for you. Work with Cortana to control your computer with voice commands. The modules for Windows 10 are as follows: Module 1 – Learn All the Essential Features of Windows 10 To Schedule / Need Additional Information To schedule sessions, receive more information or for questions/clarifications contact us at: Email: Ken Keller at [email protected] or Dean Carroll at [email protected] or Phone: (630) 495-0505 or (800) 869-7497. To see a complete list of our current computer training options click here. 101 W. 22nd Street, Suite 100 630-495-0505 Lombard, IL 60148 630-495-1321 Fax www.c-kg.com Your Total Training Resource Module 1 – Learn All the Essential Features of Windows 10 • This comprehensive course covers everything you Edge browser, and work with Mail, Calendars, and need to know to install Windows, customize it to People (aka contacts). your liking, and start working with files and • Plus, learn about sharing via a home network, applications. multiuser configurations, security and privacy, and • See how to manage folders, use Cortana to search troubleshooting Windows. and navigate, browse the web with the new Microsoft Management and Maintenance: • Learn how to configure updates, monitor events and • Reviewing event logs.
    [Show full text]