About the Authors |
|
xxi | |
About the Technical Reviewer |
|
xxiii | |
|
Introducing Windows Vista |
|
|
1 | (18) |
|
|
2 | (3) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
New and Improved in Vista |
|
|
5 | (14) |
|
|
5 | (3) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
13 | (2) |
|
|
15 | (1) |
|
Performance and Stability |
|
|
16 | (1) |
|
|
17 | (2) |
|
Meeting the Hardware Requirements |
|
|
19 | (12) |
|
Using the Windows Vista Upgrade Advisor |
|
|
20 | (4) |
|
|
24 | (3) |
|
Upgrading from Windows XP |
|
|
25 | (1) |
|
|
26 | (1) |
|
Understanding the Windows Experience Index |
|
|
27 | (4) |
|
Installing and Setting Up Vista |
|
|
31 | (24) |
|
Obtaining the Software License |
|
|
31 | (2) |
|
Licensing Vista in the Home |
|
|
32 | (1) |
|
Licensing Vista in Business |
|
|
32 | (1) |
|
Installing Vista on a Single Computer |
|
|
33 | (2) |
|
|
35 | (12) |
|
A Brief Word on Modularization |
|
|
37 | (1) |
|
Creating Unattended Answer Files |
|
|
37 | (4) |
|
Setting Up Your Master Computer |
|
|
41 | (1) |
|
Generalizing Your Master Computer Using Sysprep |
|
|
42 | (1) |
|
Using WinPE and ImageX to Create the Image |
|
|
42 | (2) |
|
Using WinPE and ImageX to Deploy the Image |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (2) |
|
Using Microsoft Solution Accelerator for Business Desktop Deployment |
|
|
47 | (1) |
|
Using Windows Easy Transfer |
|
|
47 | (6) |
|
Using the User State Migration Tool |
|
|
53 | (2) |
|
Finding Your Way Around the Desktop |
|
|
55 | (14) |
|
|
55 | (1) |
|
Exploring the Vista Desktop |
|
|
56 | (7) |
|
Personalizing the Desktop |
|
|
57 | (4) |
|
Using the Windows Sidebar |
|
|
61 | (2) |
|
Customizing the Start Menu and Taskbar |
|
|
63 | (3) |
|
Switching Through Windows |
|
|
66 | (3) |
|
|
67 | (1) |
|
|
68 | (1) |
|
Customizing Windows Vista |
|
|
69 | (20) |
|
Customizing Display Settings |
|
|
69 | (7) |
|
Customizing Windows Sidebar |
|
|
76 | (2) |
|
Customizing Windows SideShow |
|
|
78 | (1) |
|
Customizing with the Local Computer Policy |
|
|
79 | (10) |
|
How the Local Computer Policy Relates to the Registry |
|
|
79 | (3) |
|
Local Policy vs. Domain Policy |
|
|
82 | (1) |
|
|
82 | (2) |
|
How to Use the Local Computer Policy |
|
|
84 | (5) |
|
|
89 | (24) |
|
Exploring the Welcome Center |
|
|
89 | (2) |
|
Understanding the Start Menu |
|
|
91 | (5) |
|
Customizing the Start Menu |
|
|
96 | (3) |
|
Working with Windows Explorer |
|
|
99 | (9) |
|
Following the Breadcrumb Navigation |
|
|
100 | (1) |
|
|
101 | (3) |
|
Searching in Windows Explorer |
|
|
104 | (2) |
|
Increasing the Scope of Your Index |
|
|
106 | (2) |
|
Using Groups, Stacks, and Filters |
|
|
108 | (5) |
|
Administering Windows Vista |
|
|
113 | (20) |
|
|
113 | (5) |
|
Using System Administration Tools |
|
|
118 | (9) |
|
|
118 | (3) |
|
Restoring Files, Folders, and System Images |
|
|
121 | (1) |
|
Starting and Stopping Vista Services |
|
|
122 | (3) |
|
|
125 | (1) |
|
Adding or Removing User Accounts |
|
|
125 | (2) |
|
|
127 | (2) |
|
Using User Account Control |
|
|
129 | (4) |
|
Working with the Command Line |
|
|
133 | (16) |
|
Customizing the Command Shell |
|
|
134 | (2) |
|
|
136 | (3) |
|
|
139 | (4) |
|
Starting Out with a Simple Example |
|
|
139 | (1) |
|
Creating Advanced Batch Files |
|
|
140 | (3) |
|
Commands to Add to Your Admin Arsenal |
|
|
143 | (6) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
Understanding the New Folder Structures and Elements |
|
|
149 | (8) |
|
Introducing Search Folders |
|
|
149 | (2) |
|
Introducing Symbolic Links |
|
|
151 | (2) |
|
|
153 | (4) |
|
Working with the File System |
|
|
157 | (10) |
|
|
157 | (7) |
|
Introducing Standard and Special Permissions |
|
|
157 | (3) |
|
|
160 | (1) |
|
Introducing Inheritance and Ownership |
|
|
161 | (2) |
|
Determining Effective Permissions |
|
|
163 | (1) |
|
|
164 | (3) |
|
|
167 | (10) |
|
Understanding the BitLocker Essentials |
|
|
167 | (2) |
|
Under the Hood: BitLocker |
|
|
168 | (1) |
|
|
169 | (1) |
|
Initializing the Trusted Platform Module |
|
|
170 | (1) |
|
|
171 | (2) |
|
Using a PIN with TPM-Enabled BitLocker |
|
|
173 | (1) |
|
Using BitLocker Without the Trusted Platform Module |
|
|
173 | (1) |
|
Recovering BitLocker-Protected Data |
|
|
174 | (1) |
|
|
175 | (2) |
|
Hooking Up Wired and Wireless Networks |
|
|
177 | (10) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (8) |
|
The Network and Sharing Center |
|
|
179 | (6) |
|
|
185 | (1) |
|
|
185 | (2) |
|
|
187 | (12) |
|
|
188 | (2) |
|
Understanding the IP Address |
|
|
190 | (1) |
|
Configuring IP Addresses in Vista |
|
|
191 | (1) |
|
|
192 | (1) |
|
Understanding DHCP and Static Addressing |
|
|
193 | (1) |
|
Gathering TCP/IP Information |
|
|
194 | (1) |
|
Introducing TCP/IP Version 6 |
|
|
195 | (4) |
|
Who Needs More IP Addresses? |
|
|
196 | (3) |
|
Connecting to the Internet |
|
|
199 | (6) |
|
Gathering the ISP Account Details |
|
|
200 | (1) |
|
Creating the Connection in Vista |
|
|
201 | (2) |
|
Setting Up Internet Connection Sharing |
|
|
203 | (2) |
|
Using the Remote Desktop Connection |
|
|
205 | (8) |
|
Switching On Remote Access |
|
|
205 | (4) |
|
|
209 | (1) |
|
Setting the Remote Desktop Connection Options |
|
|
210 | (3) |
|
Setting Up a Network Presentation |
|
|
213 | (4) |
|
|
213 | (4) |
|
Using Windows Internet Explorer 7 |
|
|
217 | (18) |
|
Looking at the Major Areas of Improvement |
|
|
217 | (2) |
|
|
217 | (1) |
|
|
218 | (1) |
|
Internet Explorer Platform |
|
|
218 | (1) |
|
|
218 | (1) |
|
Examining the New Internet Explorer Features |
|
|
219 | (4) |
|
|
219 | (2) |
|
|
221 | (2) |
|
|
223 | (1) |
|
Customizing Internet Explorer 7 |
|
|
224 | (7) |
|
Hardening Internet Explorer 7 |
|
|
231 | (4) |
|
|
231 | (1) |
|
Protected Mode and the Phishing Filter |
|
|
232 | (1) |
|
|
232 | (3) |
|
|
235 | (16) |
|
|
235 | (2) |
|
Setting Up a Mail Account |
|
|
235 | (1) |
|
Setting Up a News Account |
|
|
236 | (1) |
|
Setting Up a Directory Service Account |
|
|
236 | (1) |
|
Working Within Windows Mail |
|
|
237 | (2) |
|
Personalizing Windows Mail |
|
|
238 | (1) |
|
|
239 | (2) |
|
Strategies for Managing Newsgroup Reading |
|
|
240 | (1) |
|
|
241 | (2) |
|
Protecting Against Unwanted Email and Attachments |
|
|
243 | (6) |
|
Changing the Junk Email Protection Level |
|
|
243 | (1) |
|
Adding and Removing Senders to the Blocked Senders and Safe Senders Lists |
|
|
244 | (2) |
|
Managing International Messages |
|
|
246 | (1) |
|
Guarding Against Phishing |
|
|
247 | (1) |
|
Blocking Potentially Problematic Attachments |
|
|
248 | (1) |
|
Performing Windows Mail Maintenance |
|
|
249 | (2) |
|
Collaborating with Windows Meeting Space |
|
|
251 | (6) |
|
What Is Windows Meeting Space? |
|
|
251 | (1) |
|
Using Windows Meeting Space |
|
|
252 | (5) |
|
Using Windows Fax and Scan |
|
|
257 | (8) |
|
|
257 | (5) |
|
Sending and Receiving Faxes Using a Modem |
|
|
257 | (3) |
|
Sending and Receiving Faxes Using a Network Fax Server |
|
|
260 | (1) |
|
Sending Faxes Through Other Applications |
|
|
261 | (1) |
|
|
262 | (3) |
|
Tips for Advanced Scanning |
|
|
263 | (2) |
|
Working with Windows Media Player 11 |
|
|
265 | (34) |
|
Setting Up Media Player for the First Time |
|
|
265 | (7) |
|
|
267 | (2) |
|
Selecting the Default Music and Video Player |
|
|
269 | (3) |
|
|
272 | (2) |
|
Introducing the Media Library |
|
|
274 | (10) |
|
Working with Different Types of Content |
|
|
277 | (1) |
|
Creating and Using Playlists |
|
|
277 | (3) |
|
Adding Content to the Library |
|
|
280 | (1) |
|
|
281 | (1) |
|
Getting Album Art and Media Information |
|
|
282 | (1) |
|
Using the Advanced Library Options |
|
|
282 | (2) |
|
Ripping Content to the Library |
|
|
284 | (2) |
|
Creating CDs and DVDs from Your Library |
|
|
286 | (3) |
|
Synchronizing with Portable Devices |
|
|
289 | (6) |
|
Shuffling Music Content on a Portable Device |
|
|
291 | (1) |
|
Setting Up Synchronizations |
|
|
292 | (1) |
|
Using the Advanced Options for Portable Devices |
|
|
293 | (2) |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
Customizing Windows Media Player |
|
|
297 | (2) |
|
Working with Windows Movie Maker |
|
|
299 | (24) |
|
|
300 | (3) |
|
Understanding Windows Movie Maker Projects |
|
|
301 | (1) |
|
Introducing the Tasks Pane |
|
|
301 | (1) |
|
Introducing the Collections Pane |
|
|
301 | (1) |
|
Introducing the Preview Pane |
|
|
302 | (1) |
|
Introducing the Storyboard and Timeline Panes |
|
|
302 | (1) |
|
|
302 | (1) |
|
Capturing and Importing Content |
|
|
303 | (5) |
|
Capturing Content from a Camcorder |
|
|
304 | (2) |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
307 | (1) |
|
Producing Your First Movie |
|
|
308 | (9) |
|
Getting to Know the Storyboard and Timeline Panes |
|
|
308 | (2) |
|
Adding Clips to the Storyboard |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (2) |
|
|
314 | (1) |
|
Adding Opening Titles and Closing Credits |
|
|
314 | (3) |
|
|
317 | (1) |
|
Setting Advanced Movie Maker Options |
|
|
317 | (1) |
|
Mastering Your Production |
|
|
318 | (5) |
|
Working with Windows Photo Gallery |
|
|
323 | (22) |
|
|
324 | (5) |
|
Capturing and Importing Images |
|
|
329 | (2) |
|
Importing Photo and Video Items from the File System |
|
|
329 | (1) |
|
Importing Photo and Video Items from a Digital Camera |
|
|
329 | (2) |
|
|
331 | (5) |
|
|
331 | (4) |
|
|
335 | (1) |
|
|
336 | (2) |
|
Printing and Online Ordering |
|
|
338 | (1) |
|
Creating a DVD, Movie, or Data Disc |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
341 | (2) |
|
|
341 | (1) |
|
|
341 | (1) |
|
Manually Controlling Slide Shows |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
Integrating with Other Applications |
|
|
343 | (2) |
|
Working with Windows DVD Maker |
|
|
345 | (18) |
|
Understanding the Interface |
|
|
346 | (5) |
|
|
351 | (5) |
|
Arranging Movie Items in Order |
|
|
351 | (1) |
|
Choosing Menu Styles and Viewing Previews |
|
|
352 | (3) |
|
|
355 | (1) |
|
|
356 | (3) |
|
|
356 | (1) |
|
|
357 | (2) |
|
|
359 | (4) |
|
Working with Windows Media Center |
|
|
363 | (16) |
|
|
364 | (1) |
|
|
364 | (3) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
Networking a Media Center PC |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (4) |
|
Setting Up the Music Library |
|
|
371 | (1) |
|
Setting Up Pictures and Videos |
|
|
372 | (1) |
|
Exploring More Setup Options |
|
|
373 | (1) |
|
|
374 | (5) |
|
Making the Most of the Guide |
|
|
374 | (2) |
|
|
376 | (1) |
|
Setting Parental Controls |
|
|
377 | (2) |
|
Managing General Windows Vista Security |
|
|
379 | (10) |
|
|
379 | (2) |
|
Using Workgroups and Domains |
|
|
381 | (2) |
|
Managing Data Execution Prevention |
|
|
383 | (1) |
|
Understanding and Using Security Templates |
|
|
383 | (4) |
|
Where Security Is Covered Elsewhere |
|
|
387 | (2) |
|
Implementing the Windows Firewall |
|
|
389 | (16) |
|
Using the Standard-Issue Windows Firewall |
|
|
389 | (5) |
|
|
391 | (1) |
|
|
392 | (2) |
|
|
394 | (1) |
|
Using the Windows Firewall with Advanced Security |
|
|
394 | (11) |
|
Inbound and Outbound Rules |
|
|
396 | (4) |
|
Connection Security Rules |
|
|
400 | (2) |
|
|
402 | (1) |
|
|
403 | (2) |
|
|
405 | (12) |
|
|
405 | (1) |
|
Introducing Windows Defender |
|
|
406 | (11) |
|
Getting Real-Time Protection |
|
|
407 | (1) |
|
|
408 | (1) |
|
|
409 | (3) |
|
Joining the Microsoft SpyNet Community |
|
|
412 | (1) |
|
|
413 | (4) |
|
Best Practices: A Six-Step Guide to Better Security |
|
|
417 | (14) |
|
Step 1: Strengthen Your Password Policy |
|
|
417 | (2) |
|
Step 2: Use or Convert Drives to NTFS |
|
|
419 | (1) |
|
Step 3: Understand and Use File System Security |
|
|
420 | (4) |
|
Step 4: Configure the Windows Firewall |
|
|
424 | (2) |
|
|
425 | (1) |
|
Configuring Through Group Policy |
|
|
425 | (1) |
|
Step 5: Think About Patching and Update Policies |
|
|
426 | (1) |
|
Step 6: Audit Sensitive Events |
|
|
427 | (4) |
|
Recommended Items to Audit |
|
|
429 | (2) |
|
Maintaining the Windows Registry |
|
|
431 | (8) |
|
Presenting a Brief Structural Overview |
|
|
431 | (1) |
|
Using the Registry Editor |
|
|
432 | (2) |
|
Using reg Files to Manage the Registry |
|
|
434 | (1) |
|
Understanding the Typical Registry Caveats |
|
|
435 | (1) |
|
Using Advanced Registry Tools |
|
|
436 | (3) |
|
|
439 | (10) |
|
|
439 | (5) |
|
Using Custom Views in Event Viewer |
|
|
441 | (1) |
|
Using Event Subscriptions |
|
|
442 | (2) |
|
Using the Reliability and Performance Monitor |
|
|
444 | (3) |
|
Setting Advanced Boot Options |
|
|
447 | (2) |
|
Recovering from Serious Issues |
|
|
449 | (12) |
|
Using the Windows Recovery Environment |
|
|
449 | (4) |
|
Exploring Other Recovery Options in the WinRE Environment |
|
|
450 | (1) |
|
|
451 | (2) |
|
|
453 | (6) |
|
What's New in Windows Vista System Restore? |
|
|
455 | (1) |
|
|
455 | (3) |
|
Being Aware of System Restore ``Gotchas'' |
|
|
458 | (1) |
|
|
459 | (2) |
Index |
|
461 | |