| Foreword to the Second Edition |
|
xxxvii | |
| Acknowledgments |
|
xxxix | |
| Introduction |
|
xli | |
| Overview of Book |
|
xli | |
| Document Conventions |
|
xlii | |
| Reader Aids |
|
xlii | |
| Sidebars |
|
xlii | |
| Command-Line Examples |
|
xlii | |
| Companion CD |
|
xliii | |
| Using the VBScript Scripts |
|
xliv | |
| Using Windows PowerShell Scripts |
|
xliv | |
| Disclaimer Concerning Scripts |
|
xlv | |
| Resource Kit Support Policy |
|
xlvi | |
|
|
|
|
overview of Windows Vista Improvements |
|
|
3 | (42) |
|
|
|
3 | (28) |
|
|
|
5 | (7) |
|
|
|
12 | (4) |
|
|
|
16 | (3) |
|
|
|
19 | (2) |
|
|
|
21 | (1) |
|
Reliability and Supportability |
|
|
22 | (5) |
|
|
|
27 | (2) |
|
Architecture Improvements |
|
|
29 | (2) |
|
Windows Vista Service Pack 1 Improvements |
|
|
31 | (6) |
|
|
|
37 | (4) |
|
|
|
39 | (1) |
|
|
|
39 | (1) |
|
Windows Vista Home Premium |
|
|
39 | (1) |
|
|
|
39 | (1) |
|
|
|
40 | (1) |
|
|
|
40 | (1) |
|
|
|
41 | (2) |
|
|
|
41 | (1) |
|
|
|
42 | (1) |
|
|
|
43 | (1) |
|
|
|
43 | (2) |
|
|
|
43 | (1) |
|
|
|
44 | (1) |
|
Security in Windows Vista |
|
|
45 | (42) |
|
Addressing Specific Security Concerns with Windows Vista |
|
|
45 | (9) |
|
|
|
46 | (1) |
|
Help Desk Calls Related to Malware |
|
|
46 | (6) |
|
|
|
52 | (2) |
|
New and Improved Windows Vista Security Features |
|
|
54 | (17) |
|
User Account Control (UAC) |
|
|
55 | (3) |
|
|
|
58 | (2) |
|
|
|
60 | (2) |
|
Internet Explorer Security Features |
|
|
62 | (2) |
|
|
|
64 | (3) |
|
Encrypting File System (EFS) |
|
|
67 | (1) |
|
|
|
68 | (2) |
|
|
|
70 | (1) |
|
Credential Manager Enhancements |
|
|
70 | (1) |
|
Architectural and Internal Windows Vista Security Improvements |
|
|
71 | (11) |
|
|
|
72 | (1) |
|
Windows Resource Protection (WRP) |
|
|
72 | (2) |
|
|
|
74 | (1) |
|
|
|
75 | (1) |
|
Windows Service Hardening |
|
|
76 | (1) |
|
|
|
77 | (1) |
|
Network Access Protection Client |
|
|
78 | (1) |
|
Web Services for Management |
|
|
79 | (1) |
|
Crypto Next Generation (CNG) Services |
|
|
79 | (1) |
|
Data Execution Prevention (DEP) |
|
|
79 | (1) |
|
Address Space Layout Randomization (ASLR) |
|
|
80 | (1) |
|
|
|
81 | (1) |
|
Rights Management Services (RMS) |
|
|
81 | (1) |
|
Multiple Local Group Policy Objects |
|
|
82 | (1) |
|
|
|
82 | (2) |
|
|
|
84 | (3) |
|
|
|
84 | (1) |
|
|
|
84 | (3) |
|
|
|
|
|
|
87 | (28) |
|
|
|
87 | (3) |
|
Windows Vista Deployment Terminology |
|
|
90 | (2) |
|
|
|
92 | (9) |
|
|
|
93 | (1) |
|
|
|
94 | (1) |
|
|
|
95 | (1) |
|
|
|
96 | (1) |
|
|
|
96 | (1) |
|
|
|
97 | (1) |
|
|
|
98 | (1) |
|
|
|
99 | (1) |
|
|
|
100 | (1) |
|
|
|
101 | (2) |
|
Upgrade Computer Scenario |
|
|
101 | (1) |
|
|
|
102 | (1) |
|
Replace Computer Scenario |
|
|
102 | (1) |
|
|
|
103 | (4) |
|
|
|
104 | (1) |
|
Online Configuration Phase |
|
|
105 | (1) |
|
|
|
106 | (1) |
|
|
|
107 | (2) |
|
Microsoft Deployment Toolkit Process |
|
|
109 | (4) |
|
|
|
113 | (1) |
|
|
|
114 | (1) |
|
|
|
114 | (1) |
|
|
|
114 | (1) |
|
|
|
115 | (28) |
|
Using Microsoft Deployment Toolkit for Planning |
|
|
115 | (11) |
|
|
|
117 | (5) |
|
|
|
122 | (2) |
|
|
|
124 | (1) |
|
|
|
125 | (1) |
|
Planning Low-Volume Deployment |
|
|
126 | (3) |
|
|
|
126 | (1) |
|
|
|
127 | (1) |
|
|
|
127 | (1) |
|
|
|
128 | (1) |
|
|
|
129 | (1) |
|
Windows Vista Requirements |
|
|
129 | (1) |
|
|
|
129 | (1) |
|
|
|
130 | (1) |
|
Preparing for Development |
|
|
130 | (7) |
|
|
|
131 | (1) |
|
|
|
132 | (1) |
|
|
|
133 | (1) |
|
Infrastructure Remediation |
|
|
134 | (1) |
|
|
|
135 | (1) |
|
|
|
135 | (1) |
|
|
|
136 | (1) |
|
Installing Microsoft Deployment Toolkit |
|
|
137 | (2) |
|
Starting Deployment Workbench |
|
|
139 | (1) |
|
Updating Microsoft Deployment Toolkit Components |
|
|
140 | (1) |
|
|
|
141 | (1) |
|
|
|
141 | (2) |
|
|
|
141 | (2) |
|
Testing Application Compatibility |
|
|
143 | (40) |
|
Understanding Compatibility |
|
|
143 | (2) |
|
|
|
144 | (1) |
|
|
|
144 | (1) |
|
|
|
145 | (4) |
|
Program Compatibility Assistant |
|
|
146 | (1) |
|
Program Compatibility Wizard |
|
|
146 | (1) |
|
Application Compatibility Toolkit |
|
|
147 | (1) |
|
Application Virtualization |
|
|
148 | (1) |
|
|
|
149 | (3) |
|
|
|
150 | (1) |
|
|
|
151 | (1) |
|
|
|
152 | (4) |
|
|
|
152 | (3) |
|
Choosing a Deployment Method |
|
|
155 | (1) |
|
Choosing a Log File Location |
|
|
155 | (1) |
|
|
|
156 | (4) |
|
Sharing the Log Processing Folder |
|
|
157 | (1) |
|
Preparing for Microsoft Compatibility Exchange |
|
|
157 | (1) |
|
|
|
158 | (1) |
|
|
|
158 | (2) |
|
Collecting Compatibility Data |
|
|
160 | (1) |
|
Analyzing Compatibility Data |
|
|
161 | (10) |
|
Creating and Assigning Categories |
|
|
162 | (2) |
|
Prioritizing Compatibility Data |
|
|
164 | (1) |
|
Assessing Application Compatibility |
|
|
165 | (1) |
|
Setting the Deployment Status |
|
|
166 | (1) |
|
Managing Compatibility Issues |
|
|
167 | (2) |
|
Filtering Compatibility Data |
|
|
169 | (1) |
|
Synchronizing with the Compatibility Exchange Service |
|
|
170 | (1) |
|
Rationalizing an Application Inventory |
|
|
171 | (2) |
|
Identifying the Missing Applications |
|
|
171 | (1) |
|
Selecting Specific Application Versions |
|
|
172 | (1) |
|
Testing and Mitigating Issues |
|
|
173 | (8) |
|
|
|
174 | (1) |
|
Modeling the Production Environment |
|
|
175 | (1) |
|
Using the Standard User Analyzer |
|
|
176 | (1) |
|
Using the Compatibility Administrator |
|
|
177 | (4) |
|
Deploying Application Mitigation Packages |
|
|
181 | (1) |
|
|
|
181 | (1) |
|
|
|
182 | (1) |
|
|
|
182 | (1) |
|
|
|
183 | (48) |
|
|
|
184 | (4) |
|
|
|
185 | (1) |
|
|
|
185 | (3) |
|
Capturing Images with Microsoft Deployment Toolkit |
|
|
188 | (1) |
|
Navigating Deployment Workbench |
|
|
189 | (1) |
|
Creating a Distribution Share |
|
|
190 | (1) |
|
Configuring the Distribution Share |
|
|
191 | (13) |
|
|
|
191 | (3) |
|
|
|
194 | (6) |
|
|
|
200 | (2) |
|
Adding Out-of-Box Drivers |
|
|
202 | (2) |
|
|
|
204 | (3) |
|
|
|
207 | (9) |
|
Configuring Group and Task Properties |
|
|
211 | (1) |
|
Configuring the Options Tab |
|
|
211 | (5) |
|
Creating the Lab Deployment Point |
|
|
216 | (6) |
|
Configuring the Deployment Point |
|
|
218 | (4) |
|
Updating the Deployment Point |
|
|
222 | (1) |
|
Capturing a Disk Image for LTI |
|
|
222 | (2) |
|
Capturing a Disk Image for ZTI |
|
|
224 | (2) |
|
Creating an Image Capture CD |
|
|
224 | (1) |
|
Preparing the Image for Capture |
|
|
224 | (2) |
|
|
|
226 | (1) |
|
Manually Preparing Images |
|
|
226 | (2) |
|
Customizing Microsoft Deployment Toolkit |
|
|
228 | (1) |
|
|
|
228 | (1) |
|
|
|
229 | (2) |
|
|
|
229 | (1) |
|
|
|
229 | (2) |
|
Migrating User State Data |
|
|
231 | (26) |
|
Evaluating Migration Technologies |
|
|
232 | (1) |
|
|
|
232 | (1) |
|
User State Migration Tool |
|
|
232 | (1) |
|
|
|
233 | (1) |
|
Using Windows Easy Transfer |
|
|
233 | (5) |
|
|
|
235 | (1) |
|
|
|
236 | (2) |
|
Planning User State Migration Using USMT |
|
|
238 | (6) |
|
Choosing Subject Matter Experts |
|
|
239 | (1) |
|
Identifying User State Data |
|
|
239 | (2) |
|
Prioritizing Migration Tasks |
|
|
241 | (1) |
|
Choosing a Data Store Location |
|
|
241 | (1) |
|
|
|
242 | (1) |
|
Testing User State Migration |
|
|
243 | (1) |
|
|
|
244 | (2) |
|
|
|
245 | (1) |
|
|
|
245 | (1) |
|
Microsoft Deployment Toolkit |
|
|
245 | (1) |
|
System Center Configuration Manager 2007 |
|
|
245 | (1) |
|
Understanding USMT Components |
|
|
246 | (2) |
|
|
|
246 | (1) |
|
|
|
247 | (1) |
|
|
|
247 | (1) |
|
Developing Migration Files |
|
|
248 | (2) |
|
|
|
248 | (1) |
|
|
|
249 | (1) |
|
Deploying Migration Files |
|
|
249 | (1) |
|
Using USMT in Microsoft Deployment Toolkit |
|
|
250 | (4) |
|
Downloading USMT Components |
|
|
250 | (2) |
|
Specifying the Data Store Location |
|
|
252 | (1) |
|
Adding Custom Migration Files |
|
|
253 | (1) |
|
|
|
254 | (1) |
|
|
|
255 | (2) |
|
|
|
255 | (1) |
|
|
|
255 | (2) |
|
|
|
257 | (26) |
|
|
|
257 | (1) |
|
|
|
258 | (5) |
|
|
|
260 | (1) |
|
|
|
260 | (1) |
|
|
|
261 | (1) |
|
|
|
262 | (1) |
|
|
|
262 | (1) |
|
Choosing a Deployment Strategy |
|
|
263 | (3) |
|
|
|
264 | (1) |
|
|
|
265 | (1) |
|
|
|
266 | (1) |
|
|
|
266 | (5) |
|
|
|
268 | (1) |
|
|
|
269 | (1) |
|
|
|
269 | (1) |
|
Legacy InstallShield PackageForTheWeb |
|
|
270 | (1) |
|
Legacy Wise Installation System |
|
|
270 | (1) |
|
|
|
271 | (1) |
|
Repackaging Legacy Applications |
|
|
271 | (2) |
|
|
|
272 | (1) |
|
|
|
272 | (1) |
|
Injecting in a Disk Image |
|
|
273 | (7) |
|
|
|
274 | (3) |
|
|
|
277 | (1) |
|
|
|
278 | (2) |
|
|
|
280 | (1) |
|
|
|
281 | (2) |
|
|
|
281 | (1) |
|
|
|
282 | (1) |
|
|
|
283 | (24) |
|
|
|
284 | (5) |
|
|
|
285 | (2) |
|
|
|
287 | (1) |
|
|
|
288 | (1) |
|
Setting up the Environment |
|
|
289 | (3) |
|
Installing the Windows AIK |
|
|
289 | (1) |
|
Configuring the Build Environment |
|
|
290 | (1) |
|
Removing the Build Environment |
|
|
291 | (1) |
|
|
|
292 | (9) |
|
|
|
292 | (1) |
|
Adding Optional Components |
|
|
292 | (2) |
|
|
|
294 | (1) |
|
|
|
295 | (1) |
|
|
|
295 | (1) |
|
|
|
295 | (1) |
|
|
|
296 | (1) |
|
|
|
297 | (3) |
|
|
|
300 | (1) |
|
|
|
301 | (2) |
|
Automating with Unattend.xml |
|
|
301 | (1) |
|
Adding Images to Windows DS |
|
|
302 | (1) |
|
Using Windows PE with Microsoft Deployment Toolkit |
|
|
303 | (3) |
|
|
|
306 | (1) |
|
|
|
306 | (1) |
|
|
|
306 | (1) |
|
|
|
306 | (1) |
|
|
|
307 | (30) |
|
|
|
308 | (6) |
|
|
|
308 | (4) |
|
|
|
312 | (2) |
|
|
|
314 | (4) |
|
|
|
314 | (1) |
|
|
|
315 | (1) |
|
|
|
316 | (1) |
|
|
|
317 | (1) |
|
|
|
318 | (1) |
|
|
|
318 | (3) |
|
|
|
318 | (2) |
|
|
|
320 | (1) |
|
|
|
321 | (2) |
|
Preparing Discover Images |
|
|
323 | (2) |
|
|
|
325 | (2) |
|
|
|
325 | (1) |
|
|
|
326 | (1) |
|
|
|
327 | (3) |
|
Pre-staging Client Computers |
|
|
328 | (1) |
|
Configuring Administrator Approval |
|
|
329 | (1) |
|
|
|
330 | (1) |
|
|
|
330 | (2) |
|
Creating Multicast Transmissions |
|
|
332 | (1) |
|
|
|
333 | (1) |
|
|
|
333 | (1) |
|
Using Windows DS with Microsoft Deployment Toolkit |
|
|
333 | (2) |
|
|
|
335 | (1) |
|
|
|
335 | (2) |
|
|
|
335 | (1) |
|
|
|
336 | (1) |
|
|
|
337 | (34) |
|
|
|
337 | (7) |
|
|
|
338 | (1) |
|
|
|
339 | (4) |
|
|
|
343 | (1) |
|
Planning an Activation Infrastructure |
|
|
344 | (2) |
|
Analyzing Activation Options |
|
|
344 | (1) |
|
Mapping Computers to Activation Options |
|
|
345 | (1) |
|
Implementing OEM Activation |
|
|
346 | (1) |
|
Installing Volume-Licensed Images on OEM Systems |
|
|
346 | (1) |
|
OEM Imaging of Volume Editions |
|
|
347 | (1) |
|
Implementing MAK Activation |
|
|
347 | (5) |
|
|
|
347 | (1) |
|
|
|
348 | (1) |
|
Obtaining Additional MAK Activations |
|
|
348 | (1) |
|
Assigning MAKs to Windows Vista Systems |
|
|
348 | (2) |
|
Volume Activation Management Tool |
|
|
350 | (2) |
|
Implementing KMS Activation |
|
|
352 | (6) |
|
Installing a KMS Computer |
|
|
353 | (3) |
|
Installing KMS Client Computers |
|
|
356 | (1) |
|
KMS Integration with the Deployment Workbench |
|
|
357 | (1) |
|
|
|
357 | (1) |
|
Configuring KMS Activation |
|
|
358 | (3) |
|
Using Slmgr.vbs to Configure KMS |
|
|
358 | (1) |
|
Using Registry Entries to Configure KMS |
|
|
359 | (1) |
|
KMS Computer Configuration |
|
|
359 | (1) |
|
|
|
360 | (1) |
|
Using WMI to Configure KMS |
|
|
360 | (1) |
|
Activation in Microsoft Deployment Toolkit 2008 |
|
|
361 | (2) |
|
Using the Windows Deployment Wizard |
|
|
362 | (1) |
|
Automating the Windows Deployment Wizard |
|
|
363 | (1) |
|
Troubleshooting Volume Activation |
|
|
363 | (5) |
|
|
|
363 | (2) |
|
|
|
365 | (1) |
|
Resolving Activation Issues |
|
|
365 | (3) |
|
|
|
368 | (1) |
|
|
|
369 | (2) |
|
|
|
369 | (2) |
|
Deploying with Microsoft Deployment Toolkit |
|
|
371 | (62) |
|
|
|
371 | (4) |
|
|
|
372 | (1) |
|
|
|
372 | (1) |
|
|
|
373 | (1) |
|
|
|
374 | (1) |
|
|
|
375 | (15) |
|
Creating Deployment Points |
|
|
375 | (3) |
|
|
|
378 | (1) |
|
|
|
379 | (1) |
|
Configuring CustomSettings.ini |
|
|
380 | (2) |
|
Automating the LTI Process |
|
|
382 | (2) |
|
Performing LTI Deployments |
|
|
384 | (6) |
|
|
|
390 | (17) |
|
Creating an OSD Deployment Point |
|
|
391 | (1) |
|
Preparing Windows PE for SMS 2003 |
|
|
392 | (5) |
|
|
|
397 | (1) |
|
|
|
397 | (1) |
|
Configuring ZTI Package Selection |
|
|
398 | (1) |
|
|
|
399 | (5) |
|
Configuring CustomSettings.ini |
|
|
404 | (2) |
|
Performing ZTI Deployments |
|
|
406 | (1) |
|
Using ZTI with System Center Configuration Manager 2007 |
|
|
407 | (9) |
|
Enabling System Center Configuration Manager 2007 Consol Integration |
|
|
408 | (1) |
|
Configuring Resource Access |
|
|
408 | (2) |
|
Configuring System Center Configuration Manager 2007 to Respond to PXE Boot Requests |
|
|
410 | (1) |
|
Defining Computers in System Center Configuration Manager 2007 |
|
|
411 | (3) |
|
Required Packages and Templates |
|
|
414 | (2) |
|
Advertising a Task Sequence |
|
|
416 | (1) |
|
|
|
416 | (12) |
|
Configuring Multiple Computers |
|
|
417 | (2) |
|
Configuring Individual Computers |
|
|
419 | (1) |
|
Customizing CustomSetting.ini |
|
|
420 | (1) |
|
Customizing BootStrap.ini |
|
|
421 | (1) |
|
Using the MDT 2008 Database |
|
|
422 | (6) |
|
|
|
428 | (1) |
|
|
|
428 | (5) |
|
|
|
428 | (5) |
|
Part III Desktop Management |
|
|
|
Managing the Desktop Environment |
|
|
433 | (36) |
|
Understanding Group Policy in Windows Vista Service Pack 1 |
|
|
433 | (18) |
|
Group Policy Issues on Earlier Versions of Windows |
|
|
434 | (2) |
|
New Group Policy Features in Windows Vista SP1 with Remote Server Administration Tools (RSAT) |
|
|
436 | (2) |
|
New Group Policy Settings in Windows Vista |
|
|
438 | (6) |
|
Understanding ADMX Template Files |
|
|
444 | (5) |
|
Understanding Multiple Local Group Policy |
|
|
449 | (2) |
|
Managing Windows Vista Computers Using Group Policy |
|
|
451 | (9) |
|
Configuring the Central Store |
|
|
452 | (1) |
|
Creating and Editing GPOs |
|
|
453 | (4) |
|
|
|
457 | (2) |
|
Configuring Group Policy Processing |
|
|
459 | (1) |
|
Using Advanced Group Policy Management |
|
|
460 | (1) |
|
Troubleshooting Group Policy |
|
|
460 | (5) |
|
|
|
461 | (1) |
|
|
|
462 | (1) |
|
|
|
463 | (1) |
|
|
|
464 | (1) |
|
|
|
465 | (1) |
|
|
|
465 | (4) |
|
|
|
465 | (2) |
|
|
|
467 | (2) |
|
Managing Users and User Data |
|
|
469 | (60) |
|
Understanding User Profiles in Windows Vista |
|
|
469 | (12) |
|
|
|
469 | (2) |
|
|
|
471 | (6) |
|
Application Compatibility Issues |
|
|
477 | (4) |
|
Implementing Corporate Roaming |
|
|
481 | (25) |
|
Understanding Roaming User Profiles and Folder Redirection |
|
|
482 | (3) |
|
Implementing Folder Redirection |
|
|
485 | (12) |
|
Implementing Roaming User Profiles |
|
|
497 | (9) |
|
Working with Offline Files |
|
|
506 | (20) |
|
Enhancements to Offline Files in Windows Vista |
|
|
507 | (3) |
|
|
|
510 | (3) |
|
|
|
513 | (13) |
|
|
|
526 | (1) |
|
|
|
526 | (3) |
|
|
|
526 | (2) |
|
|
|
528 | (1) |
|
Managing Disks and File Systems |
|
|
529 | (68) |
|
Overview of Partitioning Disks |
|
|
530 | (3) |
|
How to Choose Between MBR or GPT |
|
|
530 | (1) |
|
Converting from MBR to GPT Disks |
|
|
531 | (1) |
|
|
|
532 | (1) |
|
Choosing Basic or Dynamic Disks |
|
|
533 | (1) |
|
|
|
533 | (5) |
|
How to Create a Simple Volume |
|
|
533 | (1) |
|
How to Create a Spanned Volume |
|
|
534 | (1) |
|
How to Create a Striped Volume |
|
|
535 | (1) |
|
|
|
536 | (2) |
|
|
|
538 | (1) |
|
File System Fragmentation |
|
|
538 | (3) |
|
|
|
541 | (15) |
|
|
|
542 | (1) |
|
File and Folder Backup Structure |
|
|
543 | (2) |
|
How Complete PC Backups Work |
|
|
545 | (1) |
|
How to Start a Complete PC Backup from the Command Line |
|
|
545 | (1) |
|
How to Restore a Complete PC Backup |
|
|
546 | (3) |
|
Complete PC Backup Structure |
|
|
549 | (1) |
|
Best Practices for Computer Backups |
|
|
549 | (1) |
|
How to Manage Backup Using Group Policy Settings |
|
|
550 | (1) |
|
Previous Versions and Shadow Copies |
|
|
551 | (5) |
|
|
|
556 | (3) |
|
BitLocker Drive Encryption |
|
|
559 | (18) |
|
How BitLocker Encrypts Data |
|
|
560 | (1) |
|
How BitLocker Protects Data |
|
|
560 | (4) |
|
|
|
564 | (2) |
|
|
|
566 | (1) |
|
How to Configure BitLocker Partitions |
|
|
566 | (1) |
|
How to Enable the Use of BitLocker on Computers Without TPM |
|
|
567 | (1) |
|
How to Enable BitLocker Encryption |
|
|
568 | (2) |
|
How to Manage BitLocker Keys on a Local Computer |
|
|
570 | (1) |
|
How to Manage BitLocker from the Command Line |
|
|
571 | (2) |
|
How to Recover Data Protected by BitLocker |
|
|
573 | (1) |
|
How to Disable or Remove BitLocker Drive Encryption |
|
|
574 | (1) |
|
How to Permanently Decommission a BitLocker Drive |
|
|
575 | (1) |
|
How to Prepare Active Directory for BitLocker |
|
|
576 | (1) |
|
How to Manage BitLocker with Group Policy |
|
|
576 | (1) |
|
|
|
577 | (1) |
|
|
|
577 | (3) |
|
How to Export Personal Certificates |
|
|
578 | (1) |
|
How to Import Personal Certificates |
|
|
579 | (1) |
|
How to Grant Users Access to an Encrypted File |
|
|
580 | (1) |
|
|
|
580 | (6) |
|
How to Create Symbolic Links |
|
|
581 | (1) |
|
How to Create Relative or Absolute Symbolic Links |
|
|
582 | (2) |
|
How to Create Symbolic Links to Shared Folders |
|
|
584 | (1) |
|
|
|
585 | (1) |
|
|
|
586 | (3) |
|
How to Configure Disk Quotas on a Single Computer |
|
|
586 | (2) |
|
How to Configure Disk Quotas from a Command Prompt |
|
|
588 | (1) |
|
How to Configure Disk Quotas by Using Group Policy Settings |
|
|
588 | (1) |
|
|
|
589 | (4) |
|
|
|
589 | (1) |
|
|
|
589 | (1) |
|
|
|
590 | (1) |
|
|
|
590 | (2) |
|
|
|
592 | (1) |
|
|
|
592 | (1) |
|
|
|
593 | (1) |
|
|
|
594 | (3) |
|
|
|
594 | (1) |
|
|
|
595 | (2) |
|
Managing Devices and Services |
|
|
597 | (56) |
|
|
|
597 | (33) |
|
Changes to Device Management in Windows Vista |
|
|
597 | (2) |
|
Understanding Device Installation in Windows Vista |
|
|
599 | (9) |
|
Managing Devices Using Group Policy |
|
|
608 | (10) |
|
Troubleshooting Device Installation |
|
|
618 | (7) |
|
Troubleshooting Device Issues |
|
|
625 | (5) |
|
Understanding Power Management |
|
|
630 | (13) |
|
Configuring Power Management Settings |
|
|
632 | (11) |
|
|
|
643 | (7) |
|
Changes to Services in Windows Vista |
|
|
643 | (3) |
|
|
|
646 | (4) |
|
|
|
650 | (1) |
|
|
|
650 | (3) |
|
|
|
650 | (2) |
|
|
|
652 | (1) |
|
|
|
653 | (50) |
|
|
|
653 | (37) |
|
Understanding Local Sharing |
|
|
654 | (3) |
|
Understanding Network Sharing |
|
|
657 | (7) |
|
Implementing File Sharing |
|
|
664 | (18) |
|
Managing File Sharing Using Group Policy |
|
|
682 | (1) |
|
Creating and Managing Shares Using the Net Commands |
|
|
682 | (1) |
|
Creating and Managing Shares Using Scripts |
|
|
683 | (3) |
|
Troubleshooting File Sharing |
|
|
686 | (2) |
|
Best Practices for Implementing File Sharing in a Workgroup Environment |
|
|
688 | (1) |
|
Best Practices for Implementing File Sharing in a Domain Environment |
|
|
689 | (1) |
|
|
|
690 | (11) |
|
Media Sharing and Windows Firewall |
|
|
692 | (1) |
|
Media Sharing and Windows Firewall in Windows XP |
|
|
693 | (1) |
|
Media Sharing and Network Categories |
|
|
694 | (1) |
|
|
|
695 | (4) |
|
Managing Media Sharing with Group Policy |
|
|
699 | (1) |
|
Troubleshooting Media Sharing |
|
|
700 | (1) |
|
Best Practices for Media Sharing |
|
|
701 | (1) |
|
|
|
701 | (1) |
|
|
|
701 | (2) |
|
|
|
701 | (1) |
|
|
|
702 | (1) |
|
Managing Windows Meeting Space |
|
|
703 | (28) |
|
Understanding How Meeting Space Works |
|
|
704 | (12) |
|
Meeting Space and Microsoft P2P Collaboration Services |
|
|
704 | (1) |
|
|
|
705 | (2) |
|
Meeting Space and the Peer Name Resolution Protocol (PNRP) |
|
|
707 | (1) |
|
Meeting Space and People Near Me |
|
|
708 | (1) |
|
|
|
709 | (1) |
|
Meeting Space and Windows Firewall |
|
|
709 | (2) |
|
Meeting Space and Security |
|
|
711 | (2) |
|
|
|
713 | (1) |
|
Limitations of Meeting Space |
|
|
714 | (2) |
|
Deploying and Managing Meeting Space |
|
|
716 | (1) |
|
Managing Meeting Space in a Workgroup Environment |
|
|
716 | (2) |
|
Managing Meeting Space in a Domain Environment |
|
|
716 | (2) |
|
Managing Meeting Space in an Ad Hoc Wireless Environment |
|
|
718 | (1) |
|
|
|
718 | (9) |
|
|
|
719 | (2) |
|
Configuring People Near Me |
|
|
721 | (3) |
|
|
|
724 | (1) |
|
|
|
725 | (1) |
|
Inviting Others to Your Meeting |
|
|
726 | (1) |
|
Collaborating Within a Meeting |
|
|
727 | (1) |
|
Troubleshooting Meeting Space |
|
|
727 | (1) |
|
|
|
728 | (1) |
|
|
|
729 | (2) |
|
|
|
729 | (1) |
|
|
|
729 | (2) |
|
|
|
731 | (42) |
|
Enhancements to Printing in Windows Vista |
|
|
731 | (2) |
|
Understanding Printing in Windows Vista |
|
|
733 | (3) |
|
Understanding the XML Paper Specification |
|
|
733 | (1) |
|
Understanding the Windows Vista Print Subsystem |
|
|
734 | (2) |
|
Understanding Print Management |
|
|
736 | (8) |
|
Enhancements to Print Management in Windows Vista |
|
|
737 | (1) |
|
The Print Management Console |
|
|
738 | (1) |
|
Adding and Removing Print Servers |
|
|
739 | (1) |
|
Adding Printers Using the Network Printer Installation Wizard |
|
|
740 | (2) |
|
Creating and Using Printer Filters |
|
|
742 | (2) |
|
Managing Printers Using Print Management |
|
|
744 | (7) |
|
Configuring Properties of Printers |
|
|
744 | (1) |
|
Publishing Printers in Active Directory |
|
|
745 | (1) |
|
|
|
746 | (2) |
|
Exporting and Importing Print Server Configurations |
|
|
748 | (1) |
|
Performing Bulk Actions Using Print Management |
|
|
749 | (2) |
|
Client-Side Management of Printers |
|
|
751 | (5) |
|
Installing Printers Using the Printers CPL |
|
|
751 | (1) |
|
|
|
752 | (2) |
|
Installing Printers Using Point and Print |
|
|
754 | (1) |
|
|
|
755 | (1) |
|
Using the Color Management CPL |
|
|
755 | (1) |
|
Managing Client-Side Printer Experience Using Group Policy |
|
|
756 | (5) |
|
Configuring the Add Printer Wizard |
|
|
756 | (2) |
|
Disable Client-Side Printer Rendering |
|
|
758 | (1) |
|
Configuring Package Point and Print Restrictions |
|
|
758 | (3) |
|
Deploying Printers Using Group Policy |
|
|
761 | (5) |
|
Preparing to Deploy Printers |
|
|
762 | (1) |
|
Deploying a Printer Connection |
|
|
762 | (2) |
|
Limitations of Deploying Printers Using Group Policy |
|
|
764 | (1) |
|
Assigning Printers Based on Location |
|
|
765 | (1) |
|
|
|
766 | (2) |
|
Migrate Print Servers Using Print Management |
|
|
767 | (1) |
|
Migrating Print Servers Using Printbrm.exe |
|
|
768 | (1) |
|
Monitoring and Troubleshooting Printers |
|
|
768 | (3) |
|
Configuring E-Mail Notifications |
|
|
769 | (1) |
|
Configuring Print Server Notifications |
|
|
770 | (1) |
|
Configuring Script Actions |
|
|
770 | (1) |
|
Configuring Detailed Event Logging |
|
|
770 | (1) |
|
|
|
771 | (1) |
|
|
|
771 | (2) |
|
|
|
771 | (1) |
|
|
|
772 | (1) |
|
|
|
773 | (48) |
|
Search and Indexing Enhancements in Windows Vista |
|
|
773 | (3) |
|
Issues in Previous Windows Platforms |
|
|
773 | (1) |
|
Design Goals and New Features |
|
|
774 | (2) |
|
How Search and Indexing Works in Windows Vista |
|
|
776 | (24) |
|
Understanding Search Engine Terminology |
|
|
776 | (2) |
|
Windows Search Engine Processes |
|
|
778 | (3) |
|
Windows Search Engine Architecture |
|
|
781 | (1) |
|
Understanding the Catalog |
|
|
781 | (7) |
|
Understanding the Indexing Process |
|
|
788 | (10) |
|
Understanding Remote Search |
|
|
798 | (2) |
|
|
|
800 | (7) |
|
|
|
801 | (3) |
|
Configuring Offline Files Indexing |
|
|
804 | (1) |
|
Configuring Indexing of Encrypted Files |
|
|
804 | (2) |
|
Configuring Indexing of Similar Words |
|
|
806 | (1) |
|
Other Configuration Options |
|
|
807 | (1) |
|
|
|
807 | (10) |
|
Configuring Search Using Folder Options |
|
|
807 | (3) |
|
Search Integration in Windows Explorer |
|
|
810 | (1) |
|
|
|
810 | (2) |
|
Using the Search Explorer |
|
|
812 | (4) |
|
Other Search and Organization Features |
|
|
816 | (1) |
|
|
|
817 | (1) |
|
|
|
818 | (1) |
|
|
|
818 | (3) |
|
|
|
818 | (1) |
|
|
|
819 | (2) |
|
Managing Internet Explorer |
|
|
821 | (44) |
|
Non-Security Internet Explorer Improvements |
|
|
821 | (5) |
|
|
|
821 | (1) |
|
|
|
822 | (1) |
|
|
|
822 | (3) |
|
|
|
825 | (1) |
|
Improved Standards Support |
|
|
826 | (1) |
|
Expanded Group Policy Settings |
|
|
826 | (1) |
|
Internet Explorer 7 Security Features |
|
|
826 | (26) |
|
Defending Against Malware |
|
|
829 | (9) |
|
Protecting Against Data Theft |
|
|
838 | (10) |
|
|
|
848 | (4) |
|
Managing Internet Explorer with Group Policy |
|
|
852 | (3) |
|
Using the Internet Explorer Administration Kit |
|
|
855 | (1) |
|
Troubleshooting Internet Explorer Problems |
|
|
856 | (5) |
|
Internet Explorer Does Not Start |
|
|
857 | (1) |
|
An Add-on Does Not Work Properly |
|
|
857 | (1) |
|
Some Web Pages Do Not Display Properly |
|
|
857 | (3) |
|
An Unwanted Toolbar Appears |
|
|
860 | (1) |
|
The Home Page or Other Settings Have Changed |
|
|
860 | (1) |
|
|
|
861 | (1) |
|
|
|
861 | (4) |
|
|
|
861 | (1) |
|
|
|
861 | (4) |
|
Part IV Desktop Maintenance |
|
|
|
Maintaining Desktop Health |
|
|
865 | (110) |
|
Monitoring Reliability and Performance |
|
|
865 | (29) |
|
|
|
866 | (1) |
|
Opening the Reliability And Performance Monitor |
|
|
866 | (1) |
|
|
|
867 | (3) |
|
Using Performance Monitor |
|
|
870 | (17) |
|
Using Reliability Monitor |
|
|
887 | (7) |
|
Understanding Windows Eventing |
|
|
894 | (20) |
|
Overview of Windows Eventing |
|
|
894 | (1) |
|
Windows Eventing Capabilities |
|
|
894 | (7) |
|
Event Viewer User Interface |
|
|
901 | (13) |
|
Understanding the Windows System Assessment Tool |
|
|
914 | (9) |
|
|
|
914 | (4) |
|
How Desktop Window Manager Performs Composition |
|
|
918 | (2) |
|
Troubleshooting Aero Glass |
|
|
920 | (1) |
|
Overriding Windows Vista Automatic Detection Mechanisms |
|
|
921 | (2) |
|
Using Performance Information And Tools |
|
|
923 | (5) |
|
Accessing Performance Information And Tools |
|
|
923 | (1) |
|
Configuring Performance Information And Tools Using Group Policy |
|
|
924 | (1) |
|
Understanding Each Section of the Tool |
|
|
925 | (3) |
|
Understanding Windows Error Reporting |
|
|
928 | (18) |
|
|
|
929 | (1) |
|
|
|
930 | (2) |
|
|
|
932 | (4) |
|
Architecture of Windows Error Reporting |
|
|
936 | (2) |
|
Configuring Windows Error Reporting |
|
|
938 | (4) |
|
Using the Problem Reports And Solutions Control Panel |
|
|
942 | (4) |
|
|
|
946 | (25) |
|
Task Scheduler Enhancements and Improvements |
|
|
947 | (2) |
|
|
|
949 | (1) |
|
Task Scheduler Architecture |
|
|
949 | (1) |
|
|
|
950 | (2) |
|
AT and Task Scheduler v1.0 Compatibility Modes |
|
|
952 | (1) |
|
Task Scheduler User Interface |
|
|
953 | (1) |
|
|
|
954 | (10) |
|
|
|
964 | (2) |
|
Using the Sch Tasks.exe Command |
|
|
966 | (2) |
|
|
|
968 | (1) |
|
Troubleshooting Task Scheduler |
|
|
969 | (2) |
|
Interpreting Result and Return Codes |
|
|
971 | (1) |
|
|
|
971 | (1) |
|
|
|
972 | (3) |
|
|
|
972 | (1) |
|
|
|
973 | (2) |
|
Supporting Users Using Remote Assistance |
|
|
975 | (32) |
|
Understanding Remote Assistance |
|
|
975 | (14) |
|
Improvements to Remote Assistance in Windows Vista |
|
|
976 | (1) |
|
How Remote Assistance Works |
|
|
977 | (9) |
|
Using Remote Assistance in the Enterprise |
|
|
986 | (2) |
|
Interoperability with Remote Assistance in Windows XP |
|
|
988 | (1) |
|
Implementing and Managing Remote Assistance |
|
|
989 | (17) |
|
Initiating Remote Assistance Sessions |
|
|
989 | (3) |
|
Offering Remote Assistance Using DCOM |
|
|
992 | (2) |
|
Solicting Remote Assistance by Creating RA Tickets and Saving Them on Monitored Network Shares |
|
|
994 | (3) |
|
Managing Remote Assistance Using Group Policy |
|
|
997 | (2) |
|
Configuring Remote Assistance in Unmanaged Environments |
|
|
999 | (1) |
|
Additional Registry Settings for Configuring Remote Assistance |
|
|
1000 | (6) |
|
|
|
1006 | (1) |
|
|
|
1006 | (1) |
|
|
|
1006 | (1) |
|
Managing Software Updates |
|
|
1007 | (44) |
|
Update Improvements to Windows Vista |
|
|
1008 | (1) |
|
Methods for Deploying Updates |
|
|
1009 | (5) |
|
|
|
1010 | (1) |
|
Windows Server Update Services |
|
|
1011 | (2) |
|
Systems Management Server |
|
|
1013 | (1) |
|
Systems Center Configuration Manager 2007 |
|
|
1014 | (1) |
|
Manually Installing, Scripting, and Removing Updates |
|
|
1014 | (6) |
|
Overview of Windows Vista Update Files |
|
|
1015 | (1) |
|
How to Script Update Installations |
|
|
1015 | (1) |
|
|
|
1016 | (1) |
|
Deploying Updates to New Computers |
|
|
1017 | (3) |
|
|
|
1020 | (7) |
|
|
|
1020 | (1) |
|
BITS Group Policy Settings |
|
|
1021 | (2) |
|
|
|
1023 | (4) |
|
Windows Update Group Policy Settings |
|
|
1027 | (2) |
|
Configuring Windows Update to Use a Proxy Server |
|
|
1029 | (1) |
|
Tools for Auditing Software Updates |
|
|
1029 | (5) |
|
|
|
1030 | (2) |
|
|
|
1032 | (2) |
|
|
|
1034 | (1) |
|
Troubleshooting the Windows Update Client |
|
|
1034 | (3) |
|
The Process of Updating Network Software |
|
|
1037 | (8) |
|
Assembling the Update Team |
|
|
1037 | (1) |
|
|
|
1038 | (1) |
|
Creating an Update Process |
|
|
1039 | (6) |
|
How Microsoft Distributes Updates |
|
|
1045 | (4) |
|
|
|
1045 | (2) |
|
|
|
1047 | (1) |
|
|
|
1047 | (1) |
|
Microsoft Product Life Cycles |
|
|
1048 | (1) |
|
|
|
1049 | (1) |
|
|
|
1049 | (2) |
|
|
|
1049 | (1) |
|
|
|
1050 | (1) |
|
Managing Client Protection |
|
|
1051 | (48) |
|
Understanding the Risk of Malware |
|
|
1051 | (2) |
|
|
|
1053 | (22) |
|
|
|
1055 | (3) |
|
|
|
1058 | (1) |
|
|
|
1059 | (2) |
|
How Windows Vista Determines If an Application Needs Administrative Privileges |
|
|
1061 | (2) |
|
|
|
1063 | (1) |
|
|
|
1064 | (1) |
|
Compatibility Problems with UAC |
|
|
1065 | (2) |
|
How to Configure User Account Control |
|
|
1067 | (5) |
|
How to Configure Auditing for Privilege Elevation |
|
|
1072 | (1) |
|
|
|
1073 | (1) |
|
Best Practices for Using UAC |
|
|
1073 | (2) |
|
Managing Client Certificates |
|
|
1075 | (1) |
|
|
|
1076 | (13) |
|
Understanding Windows Defender |
|
|
1077 | (3) |
|
Windows Defender Alert Levels |
|
|
1080 | (1) |
|
Understanding Microsoft SpyNet |
|
|
1081 | (1) |
|
Configuring Windows Defender Group Policy |
|
|
1082 | (1) |
|
Configuring Windows Defender on a Single Computer |
|
|
1083 | (1) |
|
|
|
1084 | (2) |
|
Requiring Windows Defender Using Network Access Protection |
|
|
1086 | (1) |
|
Best Practices for Using Windows Defender |
|
|
1087 | (1) |
|
How to Troubleshoot Problems with Unwanted Software |
|
|
1088 | (1) |
|
Network Access Protection |
|
|
1089 | (1) |
|
Microsoft Forefront Client Security |
|
|
1090 | (3) |
|
|
|
1093 | (1) |
|
|
|
1094 | (5) |
|
|
|
1094 | (5) |
|
|
|
|
Configuring Windows Networking |
|
|
1099 | (56) |
|
|
|
1099 | (8) |
|
Network And Sharing Center |
|
|
1100 | (2) |
|
|
|
1102 | (3) |
|
|
|
1105 | (1) |
|
Networking Icons in the System Tray |
|
|
1106 | (1) |
|
The Set Up a Connection or Network Wizard |
|
|
1107 | (1) |
|
Manageability Improvements |
|
|
1107 | (11) |
|
|
|
1108 | (1) |
|
|
|
1109 | (7) |
|
Windows Firewall and IPsec |
|
|
1116 | (1) |
|
|
|
1116 | (2) |
|
Core Networking Improvements |
|
|
1118 | (15) |
|
|
|
1118 | (5) |
|
|
|
1123 | (1) |
|
|
|
1124 | (1) |
|
|
|
1125 | (2) |
|
802.1X Network Authentication |
|
|
1127 | (2) |
|
Server Message Block (SMB) 2.0 |
|
|
1129 | (1) |
|
|
|
1130 | (1) |
|
|
|
1131 | (2) |
|
|
|
1133 | (5) |
|
|
|
1133 | (1) |
|
|
|
1133 | (3) |
|
|
|
1136 | (1) |
|
Layered Service Provider (LSP) |
|
|
1137 | (1) |
|
Windows Sockets Direct Path for System Area Networks |
|
|
1137 | (1) |
|
How to Configure Wireless Settings |
|
|
1138 | (6) |
|
Manually Configuring Wireless Settings |
|
|
1139 | (1) |
|
Using Group Policy to Configure Wireless Settings |
|
|
1140 | (2) |
|
Configuring Wireless Settings from the Command Line or a Script |
|
|
1142 | (2) |
|
|
|
1144 | (7) |
|
|
|
1145 | (3) |
|
Manually Configuring IP Addresses |
|
|
1148 | (1) |
|
|
|
1149 | (2) |
|
How to Connect to Active Directory Domains |
|
|
1151 | (2) |
|
How to Connect to a Domain When 802.1X Authentication is Not Enabled |
|
|
1151 | (1) |
|
How to Connect to a Domain When 802.1X Authentication is Enabled |
|
|
1152 | (1) |
|
|
|
1153 | (1) |
|
|
|
1153 | (2) |
|
|
|
1153 | (1) |
|
|
|
1154 | (1) |
|
Configuring Windows Firewall and IPsec |
|
|
1155 | (72) |
|
Understanding Windows Firewall |
|
|
1155 | (53) |
|
Understanding the Windows Filtering Platform |
|
|
1157 | (2) |
|
Understanding Windows Service Hardening |
|
|
1159 | (3) |
|
Understanding Windows Firewall Profiles |
|
|
1162 | (3) |
|
Understanding Windows Firewall Policy Storage and Rule Merge Logic |
|
|
1165 | (2) |
|
Understanding Windows Firewall Rules |
|
|
1167 | (22) |
|
Understanding IPsec Integration |
|
|
1189 | (17) |
|
Understanding Windows Firewall Logging and Auditing |
|
|
1206 | (2) |
|
Managing Windows Firewall |
|
|
1208 | (15) |
|
Managing Windows Firewall Using the Windows Firewall With Advanced Security Snap-in |
|
|
1210 | (4) |
|
Managing Windows Firewall Using Group Policy |
|
|
1214 | (3) |
|
Managing Windows Firewall Using netsh |
|
|
1217 | (1) |
|
Managing Windows Firewall Using Scripts |
|
|
1218 | (2) |
|
|
|
1220 | (3) |
|
|
|
1223 | (1) |
|
|
|
1223 | (4) |
|
|
|
1223 | (2) |
|
|
|
1225 | (2) |
|
Connecting Remote Users and Networks |
|
|
1227 | (54) |
|
Understanding Connection Types |
|
|
1227 | (3) |
|
Outgoing Connection Types |
|
|
1228 | (1) |
|
Incoming Connection Types |
|
|
1229 | (1) |
|
Deprecated Connection Types |
|
|
1229 | (1) |
|
Configuring Virtual Private Network Connections |
|
|
1230 | (21) |
|
Supported Tunneling Protocols |
|
|
1230 | (1) |
|
Enhancements to VPN Security in Windows Vista |
|
|
1231 | (5) |
|
VPN Connection Negotiation Process |
|
|
1236 | (1) |
|
Creating and Configuring VPN Connections |
|
|
1237 | (14) |
|
Configuring Dial-Up Connections |
|
|
1251 | (5) |
|
Creating a Dial-Up Connection |
|
|
1252 | (1) |
|
Configuring a Dial-Up Connection |
|
|
1253 | (1) |
|
Advanced Connection Settings |
|
|
1254 | (1) |
|
Configuring Incoming Connections |
|
|
1254 | (2) |
|
Managing Connections Using Group Policy |
|
|
1256 | (3) |
|
|
|
1259 | (18) |
|
Understanding Remote Desktop |
|
|
1259 | (4) |
|
Steps for Using Remote Desktop |
|
|
1263 | (1) |
|
Enabling Remote Desktop and Authorizing Users on a Single Computer |
|
|
1263 | (3) |
|
Enabling Remote Desktop Using Group Policy |
|
|
1266 | (1) |
|
Configuring and Deploying Remote Desktop Connection |
|
|
1266 | (9) |
|
Establishing a Remote Desktop Session |
|
|
1275 | (1) |
|
Improving Remote Desktop Performance |
|
|
1275 | (1) |
|
Troubleshooting Remote Desktop |
|
|
1276 | (1) |
|
|
|
1277 | (1) |
|
|
|
1277 | (4) |
|
|
|
1277 | (2) |
|
|
|
1279 | (2) |
|
|
|
1281 | (40) |
|
|
|
1281 | (14) |
|
Understanding IPv6 Terminology |
|
|
1282 | (1) |
|
Understanding IPv6 Addressing |
|
|
1283 | (5) |
|
Understanding ICMPv6 Messages |
|
|
1288 | (1) |
|
Understanding Neighbor Discovery |
|
|
1288 | (2) |
|
Understanding Address Autoconfiguration |
|
|
1290 | (2) |
|
Understanding Name Resolution |
|
|
1292 | (3) |
|
IPv6 Enhancements in Windows Vista |
|
|
1295 | (2) |
|
Summary of IPv6 Enhancements in Windows Vista |
|
|
1295 | (2) |
|
Configuring and Troubleshooting IPv6 in Windows Vista |
|
|
1297 | (14) |
|
Displaying IPv6 Address Settings |
|
|
1298 | (5) |
|
Configuring IPv6 in Windows Vista Using the User Interface |
|
|
1303 | (1) |
|
Configuring IPv6 in Windows Vista Using Netsh |
|
|
1304 | (1) |
|
Other IPv6 Configuration Tasks |
|
|
1305 | (4) |
|
Troubleshooting IPv6 Connectivity |
|
|
1309 | (2) |
|
Planning for IPv6 Migration |
|
|
1311 | (5) |
|
|
|
1312 | (2) |
|
Migrating an Intranet to IPv6 |
|
|
1314 | (2) |
|
|
|
1316 | (1) |
|
|
|
1317 | (4) |
|
|
|
1317 | (1) |
|
|
|
1318 | (3) |
|
|
|
|
Configuring Startup and Troubleshooting Startup Issues |
|
|
1321 | (56) |
|
What's New with Windows Vista Startup |
|
|
1321 | (6) |
|
|
|
1322 | (2) |
|
|
|
1324 | (2) |
|
Windows Boot Performance Diagnostics |
|
|
1326 | (1) |
|
Understanding the Startup Process |
|
|
1327 | (12) |
|
|
|
1327 | (1) |
|
|
|
1328 | (3) |
|
Windows Boot Manager Phase |
|
|
1331 | (2) |
|
Windows Boot Loader Phase |
|
|
1333 | (1) |
|
|
|
1333 | (5) |
|
|
|
1338 | (1) |
|
|
|
1339 | (1) |
|
How to Configure Startup Settings |
|
|
1340 | (9) |
|
How to Use the Startup and Recovery Dialog Box |
|
|
1340 | (1) |
|
How to Use the System Configuration Tool |
|
|
1341 | (1) |
|
|
|
1342 | (5) |
|
How to Remove the Windows Vista Boot Loader |
|
|
1347 | (1) |
|
How to Configure a User Account to Automatically Log On |
|
|
1348 | (1) |
|
How to Disable the Windows Vista Startup Sound |
|
|
1348 | (1) |
|
How to Speed Up the Startup Process |
|
|
1348 | (1) |
|
The Process of Troubleshooting Startup |
|
|
1349 | (25) |
|
Startup Troubleshooting Before the Progress Bar Appears |
|
|
1350 | (9) |
|
Startup Troubleshooting After the Progress Bar Appears |
|
|
1359 | (11) |
|
Troubleshooting Startup Problems After Logon |
|
|
1370 | (4) |
|
|
|
1374 | (1) |
|
|
|
1375 | (2) |
|
|
|
1375 | (1) |
|
|
|
1375 | (2) |
|
Troubleshooting Hardware, Driver, and Disk Issues |
|
|
1377 | (48) |
|
Windows Vista Improvements for Hardware and Driver Troubleshooting |
|
|
1377 | (4) |
|
Windows Memory Diagnostics |
|
|
1378 | (1) |
|
|
|
1378 | (1) |
|
|
|
1379 | (1) |
|
|
|
1380 | (1) |
|
Improved Driver Reliability |
|
|
1380 | (1) |
|
|
|
1381 | (1) |
|
The Process of Troubleshooting Hardware Issues |
|
|
1381 | (4) |
|
How to Troubleshoot Problems That Prevent Windows from Starting |
|
|
1381 | (1) |
|
How to Troubleshoot Problems Installing New Hardware |
|
|
1381 | (1) |
|
How to Troubleshoot Problems with Existing Hardware |
|
|
1382 | (2) |
|
How to Troubleshoot Unpredictable Symptoms |
|
|
1384 | (1) |
|
How to Diagnose Hardware Problems |
|
|
1385 | (5) |
|
How to Use Device Manager to Identify Failed Devices |
|
|
1385 | (1) |
|
How to Check the Physical Setup of Your Computer |
|
|
1386 | (1) |
|
How to Check the Configuration of Your Hardware |
|
|
1387 | (1) |
|
How to Verify That System Firmware and Peripheral Firmware Are Up to Date |
|
|
1388 | (1) |
|
How to Test Your Hardware by Running Diagnostic Tools |
|
|
1388 | (2) |
|
How to Diagnose Disk-Related Problems |
|
|
1390 | (1) |
|
How to Use Built-In Diagnostics |
|
|
1391 | (9) |
|
How to Use Problem Reports And Solutions |
|
|
1391 | (1) |
|
How to Use Reliability Monitor |
|
|
1391 | (1) |
|
|
|
1392 | (1) |
|
How to Use Data Collector Sets |
|
|
1392 | (1) |
|
How to Use Windows Memory Diagnostics |
|
|
1393 | (7) |
|
How to Troubleshoot Disk Problems |
|
|
1400 | (8) |
|
How to Prepare for Disk Failures |
|
|
1400 | (1) |
|
|
|
1401 | (6) |
|
How to Use the Disk Cleanup Wizard |
|
|
1407 | (1) |
|
How to Disable Nonvolatile Caching |
|
|
1407 | (1) |
|
How to Troubleshoot Driver Problems |
|
|
1408 | (6) |
|
How to Find Updated Drivers |
|
|
1408 | (1) |
|
|
|
1409 | (1) |
|
How to Use Driver Verifier |
|
|
1409 | (2) |
|
How to Use the File Signature Verification |
|
|
1411 | (1) |
|
How to Use Device Manager to View and Change Resource Usage |
|
|
1412 | (1) |
|
How to Use System Restore |
|
|
1413 | (1) |
|
How to Troubleshoot USB Problems |
|
|
1414 | (1) |
|
How to Solve USB Driver and Hardware Problems |
|
|
1414 | (4) |
|
Understanding USB Limitations |
|
|
1415 | (1) |
|
How to Identify USB Problems Using Performance Monitor |
|
|
1416 | (1) |
|
|
|
1417 | (1) |
|
How to Troubleshoot Bluetooth Problems |
|
|
1418 | (1) |
|
|
|
1419 | (3) |
|
|
|
1419 | (1) |
|
|
|
1420 | (1) |
|
|
|
1421 | (1) |
|
|
|
1422 | (1) |
|
|
|
1422 | (3) |
|
|
|
1422 | (1) |
|
|
|
1423 | (2) |
|
Troubleshooting Network Issues |
|
|
1425 | (68) |
|
Tools for Troubleshooting |
|
|
1425 | (38) |
|
|
|
1427 | (2) |
|
|
|
1429 | (1) |
|
|
|
1430 | (1) |
|
|
|
1431 | (1) |
|
|
|
1432 | (1) |
|
|
|
1433 | (1) |
|
|
|
1434 | (2) |
|
|
|
1436 | (2) |
|
|
|
1438 | (1) |
|
|
|
1439 | (3) |
|
|
|
1442 | (4) |
|
|
|
1446 | (2) |
|
|
|
1448 | (1) |
|
|
|
1449 | (2) |
|
Reliability and Performance |
|
|
1451 | (2) |
|
|
|
1453 | (1) |
|
|
|
1454 | (2) |
|
|
|
1456 | (3) |
|
|
|
1459 | (1) |
|
|
|
1459 | (1) |
|
Testing Service Connectivity |
|
|
1460 | (1) |
|
|
|
1461 | (1) |
|
Windows Network Diagnostics |
|
|
1462 | (1) |
|
The Process of Troubleshooting Network Problems |
|
|
1463 | (27) |
|
How to Troubleshoot Network Connectivity Problems |
|
|
1465 | (5) |
|
How to Troubleshoot Application Connectivity Problems |
|
|
1470 | (4) |
|
How to Troubleshoot Name-Resolution Problems |
|
|
1474 | (3) |
|
How to Troubleshoot Performance Problems and Intermittent Connectivity Issues |
|
|
1477 | (3) |
|
How to Troubleshoot Joining or Logging on to a Domain |
|
|
1480 | (3) |
|
How to Troubleshoot Network Discovery |
|
|
1483 | (1) |
|
How to Troubleshoot File and Printer Sharing |
|
|
1484 | (3) |
|
How to Troubleshoot Wireless Networks |
|
|
1487 | (2) |
|
How to Troubleshoot Firewall Problems |
|
|
1489 | (1) |
|
|
|
1490 | (1) |
|
|
|
1490 | (3) |
|
|
|
1490 | (1) |
|
|
|
1491 | (2) |
|
Troubleshooting Stop Messages |
|
|
1493 | (80) |
|
|
|
1493 | (5) |
|
Identifying the Stop Error |
|
|
1494 | (1) |
|
Finding Troubleshooting Information |
|
|
1494 | (1) |
|
|
|
1495 | (2) |
|
|
|
1497 | (1) |
|
|
|
1498 | (11) |
|
Configuring Small Memory Dump Files |
|
|
1500 | (1) |
|
Configuring Kernel Memory Dump Files |
|
|
1501 | (1) |
|
Configuring Complete Memory Dump Files |
|
|
1502 | (1) |
|
How to Manually Initiate a Stop Error and Create a Dump File |
|
|
1502 | (1) |
|
Using Memory Dump Files to Analyze Stop Errors |
|
|
1503 | (6) |
|
Being Prepared for Stop Errors |
|
|
1509 | (2) |
|
Prevent System Restarts After a Stop Error |
|
|
1509 | (1) |
|
Record and Save Stop Message Information |
|
|
1509 | (1) |
|
Check Software Disk Space Requirements |
|
|
1510 | (1) |
|
Install a Kernel Debugger and Symbol Files |
|
|
1511 | (1) |
|
|
|
1511 | (26) |
|
Stop 0×A or IRQL_Not_Less_Or_Equal |
|
|
1511 | (2) |
|
Stop 0×1E or Kmode_Exception_Not_Handled |
|
|
1513 | (3) |
|
Stop 0×24 or NTFS_File_System |
|
|
1516 | (1) |
|
Stop 0×2E or Data_Bus_Error |
|
|
1517 | (1) |
|
Stop 0×3F or No_More_System_PTES |
|
|
1518 | (1) |
|
Stop 0×50 or Page_Fault_In_Nonpaged_Area |
|
|
1519 | (1) |
|
Stop 0×77 or Kernel_Stack_Inpage_Error |
|
|
1520 | (1) |
|
Stop 0×7A or Kernel_Data_Inpage_Error |
|
|
1521 | (2) |
|
Stop 0×7B or Inaccessible_Boot_Device |
|
|
1523 | (2) |
|
Stop 0×7F or Unexpected_Kernel_Mode_Trap |
|
|
1525 | (2) |
|
Stop 0×9F or Driver_Power_State_Failure |
|
|
1527 | (1) |
|
Stop 0×BE or Attempted_Write_To_Readonly_Memory |
|
|
1528 | (1) |
|
Stop 0×C2 or Bad_Pool_Caller |
|
|
1528 | (3) |
|
Stop 0×CE or Driver_Unloaded_Without_Cancelling_Pending_Operations |
|
|
1531 | (1) |
|
Stop 0×D1 or Driver_IRQL_Not_Less_Or_Equal |
|
|
1531 | (1) |
|
Stop 0×D8 or Driver_Used_Excessive_PTES |
|
|
1532 | (1) |
|
Stop 0×EA or Thread_Stuck_In_Device_Driver |
|
|
1532 | (1) |
|
Stop 0×ED or Unmountable_Boot_Volume |
|
|
1533 | (1) |
|
Stop 0×FE or Bugcode_USB_Driver |
|
|
1534 | (1) |
|
Stop 0×C000021A or Status_System_Process_Terminated |
|
|
1535 | (1) |
|
Stop 0×C0000221 or Status_Image_Checksum_Mismatch |
|
|
1536 | (1) |
|
Hardware Malfunction Messages |
|
|
1537 | (1) |
|
|
|
1537 | (5) |
|
|
|
1538 | (2) |
|
|
|
1540 | (2) |
|
|
|
1542 | (1) |
|
|
|
1543 | (2) |
|
|
|
1543 | (1) |
|
|
|
1543 | (2) |
|
|
|
|
|
|
1545 | (8) |
|
|
|
1545 | (1) |
|
|
|
1546 | (1) |
|
|
|
1547 | (1) |
|
|
|
1548 | (2) |
|
|
|
1550 | (2) |
|
|
|
1552 | (1) |
|
|
|
1552 | (1) |
|
|
|
1553 | (10) |
|
|
|
1553 | (2) |
|
|
|
1555 | (6) |
|
|
|
1561 | (1) |
|
|
|
1561 | (2) |
|
|
|
1563 | (10) |
|
|
|
1563 | (2) |
|
Additional Accessibility Features |
|
|
1565 | (2) |
|
Using the Ease of Access Center |
|
|
1567 | (1) |
|
|
|
1568 | (1) |
|
|
|
1569 | (1) |
|
Using the On-Screen Keyboard |
|
|
1569 | (1) |
|
Ease of Access Keyboard Shortcuts |
|
|
1570 | (1) |
|
Windows Speech Recognition |
|
|
1570 | (1) |
|
Assistive Technology Products |
|
|
1571 | (1) |
|
Microsoft Accessibility Resource Centers |
|
|
1571 | (1) |
|
|
|
1572 | (1) |
|
|
|
1572 | (1) |
| Glossary |
|
1573 | (18) |
| Index |
|
1591 | |