Muutke küpsiste eelistusi

Windows Vista Resource Kit 2nd edition [Multiple-component retail product]

  • Formaat: Multiple-component retail product, 1696 pages, kõrgus x laius: 229x187 mm, Contains 1 Paperback / softback and 1 CD-ROM
  • Ilmumisaeg: 28-Jan-2009
  • Kirjastus: Microsoft Press,U.S.
  • ISBN-10: 0735625964
  • ISBN-13: 9780735625969
Teised raamatud teemal:
  • Multiple-component retail product
  • Hind: 71,04 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Multiple-component retail product, 1696 pages, kõrgus x laius: 229x187 mm, Contains 1 Paperback / softback and 1 CD-ROM
  • Ilmumisaeg: 28-Jan-2009
  • Kirjastus: Microsoft Press,U.S.
  • ISBN-10: 0735625964
  • ISBN-13: 9780735625969
Teised raamatud teemal:
An in-depth resource for Windows Vista administrators furnishes detailed technical guidelines for deployment, security enhancements, group policy, files and folders, and administration, as well as more than 120 timesaving scripts to help automate administrative tasks.

Three MVPs show experienced IT professionals how to deploy Windows Vista in enterprise environments, manage user desktops with group policy, monitor performance, configure networks and firewalls, and troubleshoot startup issues. Black and white screenshots are provided for some of the step-by-step instructions. The CD contains 120 sample VBScripts and 25 PowerShell scripts for administration. The second edition reflects service pack 1 and Windows Server 2008. Annotation ©2009 Book News, Inc., Portland, OR (booknews.com)

In-depth, comprehensive, and fully updated for Service Pack 1, this RESOURCE KIT delivers the information you need to administer Windows Vista. You get authoritative technical guidance from those who know the technology best—Microsoft Most Valuable Professionals and the Windows Vista team—along with essential scripts and resources on the CD.

Get expert guidance on how to:

  • Use Microsoft Deployment Toolkit best practices and tools
  • Plan user-state migration and test application compatibility
  • Exploit new Group Policy features, settings, and ADMX templates
  • Configure software updates and client-security technologies
  • Administer disks, file systems, file sharing, search, and Internet Explorer
  • Install and troubleshoot printers, devices, and services
  • Manage IPsec, IPv6, wireless, and remote connectivity
  • Use performance monitoring and diagnostic tools to manage desktop health
  • Resolve common startup, hardware, and networking issues

CD features:

  • 120+ sample VBScript scripts
  • 25 sample Windows PowerShell scripts
  • Troubleshooting tools
  • Links to toolkits, documentation, and white papers
  • Complete eBook of INTRODUCING WINDOW SERVER 2008
  • Sample chapters from related Microsoft Press books
  • Fully searchable eBook of this guide

Plus: * See “Direct from the Source” sidebars for deep insights and troubleshooting tips from the Windows Vista team

Foreword to the Second Edition xxxvii
Acknowledgments xxxix
Introduction xli
Overview of Book xli
Document Conventions xlii
Reader Aids xlii
Sidebars xlii
Command-Line Examples xlii
Companion CD xliii
Using the VBScript Scripts xliv
Using Windows PowerShell Scripts xliv
Disclaimer Concerning Scripts xlv
Resource Kit Support Policy xlvi
Part I Overview
overview of Windows Vista Improvements
3(42)
What's New
3(28)
User Interactions
5(7)
Performance
12(4)
Mobility
16(3)
Tablet PC
19(2)
Deployment
21(1)
Reliability and Supportability
22(5)
Troubleshooting
27(2)
Architecture Improvements
29(2)
Windows Vista Service Pack 1 Improvements
31(6)
Windows Vista Editions
37(4)
Windows Vista Starter
39(1)
Windows Vista Home Basic
39(1)
Windows Vista Home Premium
39(1)
Windows Vista Business
39(1)
Windows Vista Enterprise
40(1)
Windoww Vista Ultimate
40(1)
Choosing Hardware
41(2)
Windows Vista Logos
41(1)
Hardware Requirements
42(1)
Summary
43(1)
Additional Resources
43(2)
Related Information
43(1)
On the Companion CD
44(1)
Security in Windows Vista
45(42)
Addressing Specific Security Concerns with Windows Vista
45(9)
Wireless Networks
46(1)
Help Desk Calls Related to Malware
46(6)
Data Theft
52(2)
New and Improved Windows Vista Security Features
54(17)
User Account Control (UAC)
55(3)
Windows Defender
58(2)
Windows Firewall
60(2)
Internet Explorer Security Features
62(2)
BitLocker
64(3)
Encrypting File System (EFS)
67(1)
Auditing Enhancements
68(2)
Smart Card Improvements
70(1)
Credential Manager Enhancements
70(1)
Architectural and Internal Windows Vista Security Improvements
71(11)
Code Integrity (CI)
72(1)
Windows Resource Protection (WRP)
72(2)
Kernel Patch Protection
74(1)
Required Driver Signing
75(1)
Windows Service Hardening
76(1)
Authorization Manager
77(1)
Network Access Protection Client
78(1)
Web Services for Management
79(1)
Crypto Next Generation (CNG) Services
79(1)
Data Execution Prevention (DEP)
79(1)
Address Space Layout Randomization (ASLR)
80(1)
New Logon Architecture
81(1)
Rights Management Services (RMS)
81(1)
Multiple Local Group Policy Objects
82(1)
Summary
82(2)
Additional Resources
84(3)
Related Information
84(1)
On the Companion CD
84(3)
Part II Deployment
Deployment Platform
87(28)
Tools Introduction
87(3)
Windows Vista Deployment Terminology
90(2)
Platform Components
92(9)
Windows Imaging
93(1)
Answer Files
94(1)
Windows SIM
95(1)
Windows Setup
96(1)
Sysprep
96(1)
Windows PE
97(1)
Other Tools
98(1)
Windows DS
99(1)
ImageX
100(1)
Deployment Scenarios
101(2)
Upgrade Computer Scenario
101(1)
New Computer Scenario
102(1)
Replace Computer Scenario
102(1)
Understanding Setup
103(4)
Preinstallation Phase
104(1)
Online Configuration Phase
105(1)
Windows Welcome Phase
106(1)
Basic Deployment Process
107(2)
Microsoft Deployment Toolkit Process
109(4)
Summary
113(1)
Additional Resources
114(1)
Related Information
114(1)
On the Companion CD
114(1)
Planning Deployment
115(28)
Using Microsoft Deployment Toolkit for Planning
115(11)
Planning Guide
117(5)
Feature Team Guides
122(2)
Solution Framework
124(1)
Job Aids
125(1)
Planning Low-Volume Deployment
126(3)
Scope and Objectives
126(1)
Current Environment
127(1)
Configuration Plan
127(1)
Testing and Piloting
128(1)
Rolling Out
129(1)
Windows Vista Requirements
129(1)
Hardware Requirements
129(1)
Upgrade Paths
130(1)
Preparing for Development
130(7)
Application Management
131(1)
Image Engineering
132(1)
Deployment
133(1)
Infrastructure Remediation
134(1)
Operations Readiness
135(1)
Security
135(1)
Migration
136(1)
Installing Microsoft Deployment Toolkit
137(2)
Starting Deployment Workbench
139(1)
Updating Microsoft Deployment Toolkit Components
140(1)
Summary
141(1)
Additional Resources
141(2)
Related Information
141(2)
Testing Application Compatibility
143(40)
Understanding Compatibility
143(2)
What Compatibility Means
144(1)
Why Applications Fail
144(1)
Choosing the Best Tool
145(4)
Program Compatibility Assistant
146(1)
Program Compatibility Wizard
146(1)
Application Compatibility Toolkit
147(1)
Application Virtualization
148(1)
Understanding the Act
149(3)
Support Topologies
150(1)
Compatibility Evaluators
151(1)
Planning for Act
152(4)
Targeting Deployment
152(3)
Choosing a Deployment Method
155(1)
Choosing a Log File Location
155(1)
Preparing for the Act
156(4)
Sharing the Log Processing Folder
157(1)
Preparing for Microsoft Compatibility Exchange
157(1)
Installing the Act 5.0
158(1)
Configuring the ACM
158(2)
Collecting Compatibility Data
160(1)
Analyzing Compatibility Data
161(10)
Creating and Assigning Categories
162(2)
Prioritizing Compatibility Data
164(1)
Assessing Application Compatibility
165(1)
Setting the Deployment Status
166(1)
Managing Compatibility Issues
167(2)
Filtering Compatibility Data
169(1)
Synchronizing with the Compatibility Exchange Service
170(1)
Rationalizing an Application Inventory
171(2)
Identifying the Missing Applications
171(1)
Selecting Specific Application Versions
172(1)
Testing and Mitigating Issues
173(8)
Building a Test Lab
174(1)
Modeling the Production Environment
175(1)
Using the Standard User Analyzer
176(1)
Using the Compatibility Administrator
177(4)
Deploying Application Mitigation Packages
181(1)
Summary
181(1)
Additional Resources
182(1)
Related Information
182(1)
Developing Disk Images
183(48)
Getting Started
184(4)
Prerequisite Skills
185(1)
Lab Requirements
185(3)
Capturing Images with Microsoft Deployment Toolkit
188(1)
Navigating Deployment Workbench
189(1)
Creating a Distribution Share
190(1)
Configuring the Distribution Share
191(13)
Adding Windows Vista
191(3)
Adding Applications
194(6)
Adding Packages
200(2)
Adding Out-of-Box Drivers
202(2)
Creating Task Sequences
204(3)
Editing a Task Sequence
207(9)
Configuring Group and Task Properties
211(1)
Configuring the Options Tab
211(5)
Creating the Lab Deployment Point
216(6)
Configuring the Deployment Point
218(4)
Updating the Deployment Point
222(1)
Capturing a Disk Image for LTI
222(2)
Capturing a Disk Image for ZTI
224(2)
Creating an Image Capture CD
224(1)
Preparing the Image for Capture
224(2)
Capturing the Image
226(1)
Manually Preparing Images
226(2)
Customizing Microsoft Deployment Toolkit
228(1)
Summary
228(1)
Additional Resources
229(2)
Related Information
229(1)
On the Companion CD
229(2)
Migrating User State Data
231(26)
Evaluating Migration Technologies
232(1)
Windows Easy Transfer
232(1)
User State Migration Tool
232(1)
Microsoft IntelliMirror
233(1)
Using Windows Easy Transfer
233(5)
Refresh Computer
235(1)
Replace Computer
236(2)
Planning User State Migration Using USMT
238(6)
Choosing Subject Matter Experts
239(1)
Identifying User State Data
239(2)
Prioritizing Migration Tasks
241(1)
Choosing a Data Store Location
241(1)
Automating USMT
242(1)
Testing User State Migration
243(1)
Installing USMT
244(2)
Local Installation
245(1)
Network Staging
245(1)
Microsoft Deployment Toolkit
245(1)
System Center Configuration Manager 2007
245(1)
Understanding USMT Components
246(2)
Scanstate.exe
246(1)
Loadstate.exe
247(1)
XML Migration Files
247(1)
Developing Migration Files
248(2)
Customizing USMT
248(1)
Control File Syntax
249(1)
Deploying Migration Files
249(1)
Using USMT in Microsoft Deployment Toolkit
250(4)
Downloading USMT Components
250(2)
Specifying the Data Store Location
252(1)
Adding Custom Migration Files
253(1)
Summary
254(1)
Additional Resources
255(2)
Related Information
255(1)
On the Companion CD
255(2)
Deploying Applications
257(26)
Preparing the Lab
257(1)
Planning Deployment
258(5)
Priorities
260(1)
Categories
260(1)
Installation Methods
261(1)
Subject Matter Experts
262(1)
Configurations
262(1)
Choosing a Deployment Strategy
263(3)
Thick Images
264(1)
Thin Images
265(1)
Hybrid Images
266(1)
Automating Installation
266(5)
Windows Installer
268(1)
InstallShield
269(1)
Legacy InstallShield
269(1)
Legacy InstallShield PackageForTheWeb
270(1)
Legacy Wise Installation System
270(1)
Windows Script Host
271(1)
Repackaging Legacy Applications
271(2)
The Repackaging Process
272(1)
Repackaging Tools
272(1)
Injecting in a Disk Image
273(7)
Adding Applications
274(3)
Creating Dependencies
277(1)
Installing Applications
278(2)
Summary
280(1)
Additional Resources
281(2)
Related Information
281(1)
On the Companion CD
282(1)
Preparing Windows PE
283(24)
Exploring Windows PE
284(5)
Capabilities
285(2)
Limitations
287(1)
New Features
288(1)
Setting up the Environment
289(3)
Installing the Windows AIK
289(1)
Configuring the Build Environment
290(1)
Removing the Build Environment
291(1)
Working with Windows PE
292(9)
Applying Windows PE
292(1)
Adding Optional Components
292(2)
Copying Applications
294(1)
Adding Device Drivers
295(1)
Installing Updates
295(1)
Prepping the Image
295(1)
Capturing the Image
296(1)
Creating Bootable Media
297(3)
Customizing Windows PE
300(1)
Automating Windows PE
301(2)
Automating with Unattend.xml
301(1)
Adding Images to Windows DS
302(1)
Using Windows PE with Microsoft Deployment Toolkit
303(3)
Summary
306(1)
Additional Resources
306(1)
Related Information
306(1)
On the Companion CD
306(1)
Configuring Windows DS
307(30)
Introducing Windows DS
308(6)
Service Architecture
308(4)
Operating Modes
312(2)
Planning for Windows DS
314(4)
Server Requirements
314(1)
Client Requirements
315(1)
DHCP Requirements
316(1)
Routing Requirements
317(1)
Capacity Requirements
318(1)
Installing Windows DS
318(3)
Windows Server 2003
318(2)
Windows Server 2008
320(1)
Configuring Windows DS
321(2)
Preparing Discover Images
323(2)
Importing Images
325(2)
Importing Boot Images
325(1)
Importing Install Images
326(1)
Managing Image Security
327(3)
Pre-staging Client Computers
328(1)
Configuring Administrator Approval
329(1)
Installing Windows Vista
330(1)
Capturing Custom Images
330(2)
Creating Multicast Transmissions
332(1)
Multicast Prerequisites
333(1)
Transmission Types
333(1)
Using Windows DS with Microsoft Deployment Toolkit
333(2)
Summary
335(1)
Additional Resources
335(2)
Related Information
335(1)
On the Companion CD
336(1)
Using Volume Activation
337(34)
Introduction
337(7)
Volume Activation
338(1)
Activation Options
339(4)
Activation Terminology
343(1)
Planning an Activation Infrastructure
344(2)
Analyzing Activation Options
344(1)
Mapping Computers to Activation Options
345(1)
Implementing OEM Activation
346(1)
Installing Volume-Licensed Images on OEM Systems
346(1)
OEM Imaging of Volume Editions
347(1)
Implementing MAK Activation
347(5)
Obtaining MAKs
347(1)
Managing MAKs
348(1)
Obtaining Additional MAK Activations
348(1)
Assigning MAKs to Windows Vista Systems
348(2)
Volume Activation Management Tool
350(2)
Implementing KMS Activation
352(6)
Installing a KMS Computer
353(3)
Installing KMS Client Computers
356(1)
KMS Integration with the Deployment Workbench
357(1)
KMS Reporting
357(1)
Configuring KMS Activation
358(3)
Using Slmgr.vbs to Configure KMS
358(1)
Using Registry Entries to Configure KMS
359(1)
KMS Computer Configuration
359(1)
KMS Client Configuration
360(1)
Using WMI to Configure KMS
360(1)
Activation in Microsoft Deployment Toolkit 2008
361(2)
Using the Windows Deployment Wizard
362(1)
Automating the Windows Deployment Wizard
363(1)
Troubleshooting Volume Activation
363(5)
Common Problems
363(2)
Event Log Entries
365(1)
Resolving Activation Issues
365(3)
Summary
368(1)
Additional Resources
369(2)
Related Information
369(2)
Deploying with Microsoft Deployment Toolkit
371(62)
Introducing MDT 2008
371(4)
Deployment Scenarios
372(1)
Comparing LTI and ZTI
372(1)
Deployment Points
373(1)
Resource Access
374(1)
Using LTI with MDT 2008
375(15)
Creating Deployment Points
375(3)
Preparing Windows DS
378(1)
Configuring Resources
379(1)
Configuring CustomSettings.ini
380(2)
Automating the LTI Process
382(2)
Performing LTI Deployments
384(6)
Using ZTI with SMS 2003
390(17)
Creating an OSD Deployment Point
391(1)
Preparing Windows PE for SMS 2003
392(5)
Preparing Windows DS
397(1)
Configuring Resources
397(1)
Configuring ZTI Package Selection
398(1)
Configuring SMS 2003
399(5)
Configuring CustomSettings.ini
404(2)
Performing ZTI Deployments
406(1)
Using ZTI with System Center Configuration Manager 2007
407(9)
Enabling System Center Configuration Manager 2007 Consol Integration
408(1)
Configuring Resource Access
408(2)
Configuring System Center Configuration Manager 2007 to Respond to PXE Boot Requests
410(1)
Defining Computers in System Center Configuration Manager 2007
411(3)
Required Packages and Templates
414(2)
Advertising a Task Sequence
416(1)
Customizing MDT 2008
416(12)
Configuring Multiple Computers
417(2)
Configuring Individual Computers
419(1)
Customizing CustomSetting.ini
420(1)
Customizing BootStrap.ini
421(1)
Using the MDT 2008 Database
422(6)
Summary
428(1)
Additional Resources
428(5)
Related Information
428(5)
Part III Desktop Management
Managing the Desktop Environment
433(36)
Understanding Group Policy in Windows Vista Service Pack 1
433(18)
Group Policy Issues on Earlier Versions of Windows
434(2)
New Group Policy Features in Windows Vista SP1 with Remote Server Administration Tools (RSAT)
436(2)
New Group Policy Settings in Windows Vista
438(6)
Understanding ADMX Template Files
444(5)
Understanding Multiple Local Group Policy
449(2)
Managing Windows Vista Computers Using Group Policy
451(9)
Configuring the Central Store
452(1)
Creating and Editing GPOs
453(4)
Using ADMX Migrator
457(2)
Configuring Group Policy Processing
459(1)
Using Advanced Group Policy Management
460(1)
Troubleshooting Group Policy
460(5)
Using Event Viewer
461(1)
Enabling Debug Logging
462(1)
Using GPLogView
463(1)
Using GPResult
464(1)
Summary
465(1)
Additional Resources
465(4)
Related Information
465(2)
On the Companion CD
467(2)
Managing Users and User Data
469(60)
Understanding User Profiles in Windows Vista
469(12)
Types of User Profiles
469(2)
User Profile Namespace
471(6)
Application Compatibility Issues
477(4)
Implementing Corporate Roaming
481(25)
Understanding Roaming User Profiles and Folder Redirection
482(3)
Implementing Folder Redirection
485(12)
Implementing Roaming User Profiles
497(9)
Working with Offline Files
506(20)
Enhancements to Offline Files in Windows Vista
507(3)
How Offline Files Works
510(3)
Managing Offline Files
513(13)
Summary
526(1)
Additional Resources
526(3)
Related Information
526(2)
On the Companion CD
528(1)
Managing Disks and File Systems
529(68)
Overview of Partitioning Disks
530(3)
How to Choose Between MBR or GPT
530(1)
Converting from MBR to GPT Disks
531(1)
GPT Partitions
532(1)
Choosing Basic or Dynamic Disks
533(1)
Working with Volumes
533(5)
How to Create a Simple Volume
533(1)
How to Create a Spanned Volume
534(1)
How to Create a Striped Volume
535(1)
How to Resize a Volume
536(2)
How to Delete a Volume
538(1)
File System Fragmentation
538(3)
Backup and Restore
541(15)
How File Backups Work
542(1)
File and Folder Backup Structure
543(2)
How Complete PC Backups Work
545(1)
How to Start a Complete PC Backup from the Command Line
545(1)
How to Restore a Complete PC Backup
546(3)
Complete PC Backup Structure
549(1)
Best Practices for Computer Backups
549(1)
How to Manage Backup Using Group Policy Settings
550(1)
Previous Versions and Shadow Copies
551(5)
Windows ReadyBoost
556(3)
BitLocker Drive Encryption
559(18)
How BitLocker Encrypts Data
560(1)
How BitLocker Protects Data
560(4)
BitLocker Phases
564(2)
BitLocker Requirements
566(1)
How to Configure BitLocker Partitions
566(1)
How to Enable the Use of BitLocker on Computers Without TPM
567(1)
How to Enable BitLocker Encryption
568(2)
How to Manage BitLocker Keys on a Local Computer
570(1)
How to Manage BitLocker from the Command Line
571(2)
How to Recover Data Protected by BitLocker
573(1)
How to Disable or Remove BitLocker Drive Encryption
574(1)
How to Permanently Decommission a BitLocker Drive
575(1)
How to Prepare Active Directory for BitLocker
576(1)
How to Manage BitLocker with Group Policy
576(1)
The Costs of BitLocker
577(1)
Encrypting File System
577(3)
How to Export Personal Certificates
578(1)
How to Import Personal Certificates
579(1)
How to Grant Users Access to an Encrypted File
580(1)
Symbolic Links
580(6)
How to Create Symbolic Links
581(1)
How to Create Relative or Absolute Symbolic Links
582(2)
How to Create Symbolic Links to Shared Folders
584(1)
How to Use Hard Links
585(1)
Disk Quotas
586(3)
How to Configure Disk Quotas on a Single Computer
586(2)
How to Configure Disk Quotas from a Command Prompt
588(1)
How to Configure Disk Quotas by Using Group Policy Settings
588(1)
Disk Tools
589(4)
Disk Usage
589(1)
EFSDump
589(1)
SDelete
590(1)
Streams
590(2)
Sync
592(1)
MoveFile and PendMoves
592(1)
Summary
593(1)
Additional Resources
594(3)
Related Information
594(1)
On the Companion CD
595(2)
Managing Devices and Services
597(56)
Managing Devices
597(33)
Changes to Device Management in Windows Vista
597(2)
Understanding Device Installation in Windows Vista
599(9)
Managing Devices Using Group Policy
608(10)
Troubleshooting Device Installation
618(7)
Troubleshooting Device Issues
625(5)
Understanding Power Management
630(13)
Configuring Power Management Settings
632(11)
Understanding Services
643(7)
Changes to Services in Windows Vista
643(3)
Managing Services
646(4)
Summary
650(1)
Additional Resources
650(3)
Related Information
650(2)
On the Companion CD
652(1)
Managing Sharing
653(50)
Managing File Sharing
653(37)
Understanding Local Sharing
654(3)
Understanding Network Sharing
657(7)
Implementing File Sharing
664(18)
Managing File Sharing Using Group Policy
682(1)
Creating and Managing Shares Using the Net Commands
682(1)
Creating and Managing Shares Using Scripts
683(3)
Troubleshooting File Sharing
686(2)
Best Practices for Implementing File Sharing in a Workgroup Environment
688(1)
Best Practices for Implementing File Sharing in a Domain Environment
689(1)
Managing Media Sharing
690(11)
Media Sharing and Windows Firewall
692(1)
Media Sharing and Windows Firewall in Windows XP
693(1)
Media Sharing and Network Categories
694(1)
Using Media Sharing
695(4)
Managing Media Sharing with Group Policy
699(1)
Troubleshooting Media Sharing
700(1)
Best Practices for Media Sharing
701(1)
Summary
701(1)
Additional Resources
701(2)
Related Information
701(1)
On the Companion CD
702(1)
Managing Windows Meeting Space
703(28)
Understanding How Meeting Space Works
704(12)
Meeting Space and Microsoft P2P Collaboration Services
704(1)
Meeting Space and IPv6
705(2)
Meeting Space and the Peer Name Resolution Protocol (PNRP)
707(1)
Meeting Space and People Near Me
708(1)
Meeting Space Services
709(1)
Meeting Space and Windows Firewall
709(2)
Meeting Space and Security
711(2)
How a Meeting Works
713(1)
Limitations of Meeting Space
714(2)
Deploying and Managing Meeting Space
716(1)
Managing Meeting Space in a Workgroup Environment
716(2)
Managing Meeting Space in a Domain Environment
716(2)
Managing Meeting Space in an Ad Hoc Wireless Environment
718(1)
Using Meeting Space
718(9)
Setting Up Meeting Space
719(2)
Configuring People Near Me
721(3)
Starting a New Meeting
724(1)
Joining a Meeting
725(1)
Inviting Others to Your Meeting
726(1)
Collaborating Within a Meeting
727(1)
Troubleshooting Meeting Space
727(1)
Summary
728(1)
Additional Resources
729(2)
Related Information
729(1)
On the Companion CD
729(2)
Managing Printing
731(42)
Enhancements to Printing in Windows Vista
731(2)
Understanding Printing in Windows Vista
733(3)
Understanding the XML Paper Specification
733(1)
Understanding the Windows Vista Print Subsystem
734(2)
Understanding Print Management
736(8)
Enhancements to Print Management in Windows Vista
737(1)
The Print Management Console
738(1)
Adding and Removing Print Servers
739(1)
Adding Printers Using the Network Printer Installation Wizard
740(2)
Creating and Using Printer Filters
742(2)
Managing Printers Using Print Management
744(7)
Configuring Properties of Printers
744(1)
Publishing Printers in Active Directory
745(1)
Managing Printer Drivers
746(2)
Exporting and Importing Print Server Configurations
748(1)
Performing Bulk Actions Using Print Management
749(2)
Client-Side Management of Printers
751(5)
Installing Printers Using the Printers CPL
751(1)
Searching for Printers
752(2)
Installing Printers Using Point and Print
754(1)
Using Printers Explorer
755(1)
Using the Color Management CPL
755(1)
Managing Client-Side Printer Experience Using Group Policy
756(5)
Configuring the Add Printer Wizard
756(2)
Disable Client-Side Printer Rendering
758(1)
Configuring Package Point and Print Restrictions
758(3)
Deploying Printers Using Group Policy
761(5)
Preparing to Deploy Printers
762(1)
Deploying a Printer Connection
762(2)
Limitations of Deploying Printers Using Group Policy
764(1)
Assigning Printers Based on Location
765(1)
Migrating Print Servers
766(2)
Migrate Print Servers Using Print Management
767(1)
Migrating Print Servers Using Printbrm.exe
768(1)
Monitoring and Troubleshooting Printers
768(3)
Configuring E-Mail Notifications
769(1)
Configuring Print Server Notifications
770(1)
Configuring Script Actions
770(1)
Configuring Detailed Event Logging
770(1)
Summary
771(1)
Additional Resources
771(2)
Related Information
771(1)
On the Companion CD
772(1)
Managing Search
773(48)
Search and Indexing Enhancements in Windows Vista
773(3)
Issues in Previous Windows Platforms
773(1)
Design Goals and New Features
774(2)
How Search and Indexing Works in Windows Vista
776(24)
Understanding Search Engine Terminology
776(2)
Windows Search Engine Processes
778(3)
Windows Search Engine Architecture
781(1)
Understanding the Catalog
781(7)
Understanding the Indexing Process
788(10)
Understanding Remote Search
798(2)
Managing Indexing
800(7)
Configuring the Catalog
801(3)
Configuring Offline Files Indexing
804(1)
Configuring Indexing of Encrypted Files
804(2)
Configuring Indexing of Similar Words
806(1)
Other Configuration Options
807(1)
Using Search
807(10)
Configuring Search Using Folder Options
807(3)
Search Integration in Windows Explorer
810(1)
Using Instant Search
810(2)
Using the Search Explorer
812(4)
Other Search and Organization Features
816(1)
Troubleshooting Search
817(1)
Summary
818(1)
Additional Resources
818(3)
Related Information
818(1)
On the Companion CD
819(2)
Managing Internet Explorer
821(44)
Non-Security Internet Explorer Improvements
821(5)
User Interface Changes
821(1)
Tabbed Browsing
822(1)
Search Bar
822(3)
RSS Feeds
825(1)
Improved Standards Support
826(1)
Expanded Group Policy Settings
826(1)
Internet Explorer 7 Security Features
826(26)
Defending Against Malware
829(9)
Protecting Against Data Theft
838(10)
Security Zones
848(4)
Managing Internet Explorer with Group Policy
852(3)
Using the Internet Explorer Administration Kit
855(1)
Troubleshooting Internet Explorer Problems
856(5)
Internet Explorer Does Not Start
857(1)
An Add-on Does Not Work Properly
857(1)
Some Web Pages Do Not Display Properly
857(3)
An Unwanted Toolbar Appears
860(1)
The Home Page or Other Settings Have Changed
860(1)
Summary
861(1)
Additional Resources
861(4)
Related Information
861(1)
On the Companion CD
861(4)
Part IV Desktop Maintenance
Maintaining Desktop Health
865(110)
Monitoring Reliability and Performance
865(29)
Component Binaries
866(1)
Opening the Reliability And Performance Monitor
866(1)
Using Resource Overview
867(3)
Using Performance Monitor
870(17)
Using Reliability Monitor
887(7)
Understanding Windows Eventing
894(20)
Overview of Windows Eventing
894(1)
Windows Eventing Capabilities
894(7)
Event Viewer User Interface
901(13)
Understanding the Windows System Assessment Tool
914(9)
Overview of WinSAT
914(4)
How Desktop Window Manager Performs Composition
918(2)
Troubleshooting Aero Glass
920(1)
Overriding Windows Vista Automatic Detection Mechanisms
921(2)
Using Performance Information And Tools
923(5)
Accessing Performance Information And Tools
923(1)
Configuring Performance Information And Tools Using Group Policy
924(1)
Understanding Each Section of the Tool
925(3)
Understanding Windows Error Reporting
928(18)
Error Reporting Cycle
929(1)
Report Data Overview
930(2)
Conceptual Components
932(4)
Architecture of Windows Error Reporting
936(2)
Configuring Windows Error Reporting
938(4)
Using the Problem Reports And Solutions Control Panel
942(4)
Using Task Scheduler
946(25)
Task Scheduler Enhancements and Improvements
947(2)
Operational Overview
949(1)
Task Scheduler Architecture
949(1)
Task Scheduler Security
950(2)
AT and Task Scheduler v1.0 Compatibility Modes
952(1)
Task Scheduler User Interface
953(1)
Creating New Tasks
954(10)
Managing Tasks
964(2)
Using the Sch Tasks.exe Command
966(2)
Scheduled Tasks Events
968(1)
Troubleshooting Task Scheduler
969(2)
Interpreting Result and Return Codes
971(1)
Summary
971(1)
Additional Resources
972(3)
Related Information
972(1)
On the Companion CD
973(2)
Supporting Users Using Remote Assistance
975(32)
Understanding Remote Assistance
975(14)
Improvements to Remote Assistance in Windows Vista
976(1)
How Remote Assistance Works
977(9)
Using Remote Assistance in the Enterprise
986(2)
Interoperability with Remote Assistance in Windows XP
988(1)
Implementing and Managing Remote Assistance
989(17)
Initiating Remote Assistance Sessions
989(3)
Offering Remote Assistance Using DCOM
992(2)
Solicting Remote Assistance by Creating RA Tickets and Saving Them on Monitored Network Shares
994(3)
Managing Remote Assistance Using Group Policy
997(2)
Configuring Remote Assistance in Unmanaged Environments
999(1)
Additional Registry Settings for Configuring Remote Assistance
1000(6)
Summary
1006(1)
Additional Resources
1006(1)
Related Information
1006(1)
Managing Software Updates
1007(44)
Update Improvements to Windows Vista
1008(1)
Methods for Deploying Updates
1009(5)
Windows Update Client
1010(1)
Windows Server Update Services
1011(2)
Systems Management Server
1013(1)
Systems Center Configuration Manager 2007
1014(1)
Manually Installing, Scripting, and Removing Updates
1014(6)
Overview of Windows Vista Update Files
1015(1)
How to Script Update Installations
1015(1)
How to Remove Updates
1016(1)
Deploying Updates to New Computers
1017(3)
Managing BITS
1020(7)
BITS Behavior
1020(1)
BITS Group Policy Settings
1021(2)
The BITSAdmin.exe Tool
1023(4)
Windows Update Group Policy Settings
1027(2)
Configuring Windows Update to Use a Proxy Server
1029(1)
Tools for Auditing Software Updates
1029(5)
The MBSA Console
1030(2)
MBSACLI
1032(2)
SMS
1034(1)
Troubleshooting the Windows Update Client
1034(3)
The Process of Updating Network Software
1037(8)
Assembling the Update Team
1037(1)
Inventorying Software
1038(1)
Creating an Update Process
1039(6)
How Microsoft Distributes Updates
1045(4)
Security Updates
1045(2)
Update Rollups
1047(1)
Service Packs
1047(1)
Microsoft Product Life Cycles
1048(1)
Summary
1049(1)
Additional Resources
1049(2)
Related Information
1049(1)
On the Companion CD
1050(1)
Managing Client Protection
1051(48)
Understanding the Risk of Malware
1051(2)
User Account Control
1053(22)
UAC for Standard Users
1055(3)
UAC for Administrators
1058(1)
UAC User Interface
1059(2)
How Windows Vista Determines If an Application Needs Administrative Privileges
1061(2)
UAC Virtualization
1063(1)
UAC and Startup Programs
1064(1)
Compatibility Problems with UAC
1065(2)
How to Configure User Account Control
1067(5)
How to Configure Auditing for Privilege Elevation
1072(1)
Other UAC Event Logs
1073(1)
Best Practices for Using UAC
1073(2)
Managing Client Certificates
1075(1)
Using Windows Defender
1076(13)
Understanding Windows Defender
1077(3)
Windows Defender Alert Levels
1080(1)
Understanding Microsoft SpyNet
1081(1)
Configuring Windows Defender Group Policy
1082(1)
Configuring Windows Defender on a Single Computer
1083(1)
Windows Defender Tools
1084(2)
Requiring Windows Defender Using Network Access Protection
1086(1)
Best Practices for Using Windows Defender
1087(1)
How to Troubleshoot Problems with Unwanted Software
1088(1)
Network Access Protection
1089(1)
Microsoft Forefront Client Security
1090(3)
Summary
1093(1)
Additional Resources
1094(5)
Related Information
1094(5)
Part V Networking
Configuring Windows Networking
1099(56)
Usability Improvements
1099(8)
Network And Sharing Center
1100(2)
Network Explorer
1102(3)
Network Map
1105(1)
Networking Icons in the System Tray
1106(1)
The Set Up a Connection or Network Wizard
1107(1)
Manageability Improvements
1107(11)
Network Location Types
1108(1)
Policy-Based QoS
1109(7)
Windows Firewall and IPsec
1116(1)
Windows Connect Now
1116(2)
Core Networking Improvements
1118(15)
Efficient Networking
1118(5)
Scalable Networking
1123(1)
Improved Reliability
1124(1)
IPv6 Support
1125(2)
802.1X Network Authentication
1127(2)
Server Message Block (SMB) 2.0
1129(1)
Strong Host Model
1130(1)
Wireless Networking
1131(2)
Improved APIs
1133(5)
Network Awareness
1133(1)
Improved Peer Networking
1133(3)
EAPHost Architecture
1136(1)
Layered Service Provider (LSP)
1137(1)
Windows Sockets Direct Path for System Area Networks
1137(1)
How to Configure Wireless Settings
1138(6)
Manually Configuring Wireless Settings
1139(1)
Using Group Policy to Configure Wireless Settings
1140(2)
Configuring Wireless Settings from the Command Line or a Script
1142(2)
How to Configure TCP/IP
1144(7)
DHCP
1145(3)
Manually Configuring IP Addresses
1148(1)
Command Line and Scripts
1149(2)
How to Connect to Active Directory Domains
1151(2)
How to Connect to a Domain When 802.1X Authentication is Not Enabled
1151(1)
How to Connect to a Domain When 802.1X Authentication is Enabled
1152(1)
Summary
1153(1)
Additional Resources
1153(2)
Related Information
1153(1)
On the Companion CD
1154(1)
Configuring Windows Firewall and IPsec
1155(72)
Understanding Windows Firewall
1155(53)
Understanding the Windows Filtering Platform
1157(2)
Understanding Windows Service Hardening
1159(3)
Understanding Windows Firewall Profiles
1162(3)
Understanding Windows Firewall Policy Storage and Rule Merge Logic
1165(2)
Understanding Windows Firewall Rules
1167(22)
Understanding IPsec Integration
1189(17)
Understanding Windows Firewall Logging and Auditing
1206(2)
Managing Windows Firewall
1208(15)
Managing Windows Firewall Using the Windows Firewall With Advanced Security Snap-in
1210(4)
Managing Windows Firewall Using Group Policy
1214(3)
Managing Windows Firewall Using netsh
1217(1)
Managing Windows Firewall Using Scripts
1218(2)
Common Management Tasks
1220(3)
Summary
1223(1)
Additional Resources
1223(4)
Related Information
1223(2)
On the Companion CD
1225(2)
Connecting Remote Users and Networks
1227(54)
Understanding Connection Types
1227(3)
Outgoing Connection Types
1228(1)
Incoming Connection Types
1229(1)
Deprecated Connection Types
1229(1)
Configuring Virtual Private Network Connections
1230(21)
Supported Tunneling Protocols
1230(1)
Enhancements to VPN Security in Windows Vista
1231(5)
VPN Connection Negotiation Process
1236(1)
Creating and Configuring VPN Connections
1237(14)
Configuring Dial-Up Connections
1251(5)
Creating a Dial-Up Connection
1252(1)
Configuring a Dial-Up Connection
1253(1)
Advanced Connection Settings
1254(1)
Configuring Incoming Connections
1254(2)
Managing Connections Using Group Policy
1256(3)
Using Remote Desktop
1259(18)
Understanding Remote Desktop
1259(4)
Steps for Using Remote Desktop
1263(1)
Enabling Remote Desktop and Authorizing Users on a Single Computer
1263(3)
Enabling Remote Desktop Using Group Policy
1266(1)
Configuring and Deploying Remote Desktop Connection
1266(9)
Establishing a Remote Desktop Session
1275(1)
Improving Remote Desktop Performance
1275(1)
Troubleshooting Remote Desktop
1276(1)
Summary
1277(1)
Additional Resources
1277(4)
Related Information
1277(2)
On the Companion CD
1279(2)
Deploying IPv6
1281(40)
Understanding IPv6
1281(14)
Understanding IPv6 Terminology
1282(1)
Understanding IPv6 Addressing
1283(5)
Understanding ICMPv6 Messages
1288(1)
Understanding Neighbor Discovery
1288(2)
Understanding Address Autoconfiguration
1290(2)
Understanding Name Resolution
1292(3)
IPv6 Enhancements in Windows Vista
1295(2)
Summary of IPv6 Enhancements in Windows Vista
1295(2)
Configuring and Troubleshooting IPv6 in Windows Vista
1297(14)
Displaying IPv6 Address Settings
1298(5)
Configuring IPv6 in Windows Vista Using the User Interface
1303(1)
Configuring IPv6 in Windows Vista Using Netsh
1304(1)
Other IPv6 Configuration Tasks
1305(4)
Troubleshooting IPv6 Connectivity
1309(2)
Planning for IPv6 Migration
1311(5)
Understanding ISATAP
1312(2)
Migrating an Intranet to IPv6
1314(2)
Summary
1316(1)
Additional Resources
1317(4)
Related Information
1317(1)
On the Companion CD
1318(3)
Part VI Troubleshooting
Configuring Startup and Troubleshooting Startup Issues
1321(56)
What's New with Windows Vista Startup
1321(6)
Boot Configuration Data
1322(2)
System Recovery
1324(2)
Windows Boot Performance Diagnostics
1326(1)
Understanding the Startup Process
1327(12)
Power-on Self Test Phase
1327(1)
Initial Startup Phase
1328(3)
Windows Boot Manager Phase
1331(2)
Windows Boot Loader Phase
1333(1)
Kernel Loading Phase
1333(5)
Logon Phase
1338(1)
Important Startup Files
1339(1)
How to Configure Startup Settings
1340(9)
How to Use the Startup and Recovery Dialog Box
1340(1)
How to Use the System Configuration Tool
1341(1)
How to Use BCDEdit
1342(5)
How to Remove the Windows Vista Boot Loader
1347(1)
How to Configure a User Account to Automatically Log On
1348(1)
How to Disable the Windows Vista Startup Sound
1348(1)
How to Speed Up the Startup Process
1348(1)
The Process of Troubleshooting Startup
1349(25)
Startup Troubleshooting Before the Progress Bar Appears
1350(9)
Startup Troubleshooting After the Progress Bar Appears
1359(11)
Troubleshooting Startup Problems After Logon
1370(4)
Summary
1374(1)
Additional Resources
1375(2)
Related Information
1375(1)
On the Companion CD
1375(2)
Troubleshooting Hardware, Driver, and Disk Issues
1377(48)
Windows Vista Improvements for Hardware and Driver Troubleshooting
1377(4)
Windows Memory Diagnostics
1378(1)
Disk Failure Diagnostics
1378(1)
Self-Healing NTFS
1379(1)
Reliability Monitor
1380(1)
Improved Driver Reliability
1380(1)
Improved Error Reporting
1381(1)
The Process of Troubleshooting Hardware Issues
1381(4)
How to Troubleshoot Problems That Prevent Windows from Starting
1381(1)
How to Troubleshoot Problems Installing New Hardware
1381(1)
How to Troubleshoot Problems with Existing Hardware
1382(2)
How to Troubleshoot Unpredictable Symptoms
1384(1)
How to Diagnose Hardware Problems
1385(5)
How to Use Device Manager to Identify Failed Devices
1385(1)
How to Check the Physical Setup of Your Computer
1386(1)
How to Check the Configuration of Your Hardware
1387(1)
How to Verify That System Firmware and Peripheral Firmware Are Up to Date
1388(1)
How to Test Your Hardware by Running Diagnostic Tools
1388(2)
How to Diagnose Disk-Related Problems
1390(1)
How to Use Built-In Diagnostics
1391(9)
How to Use Problem Reports And Solutions
1391(1)
How to Use Reliability Monitor
1391(1)
How to Use Event Viewer
1392(1)
How to Use Data Collector Sets
1392(1)
How to Use Windows Memory Diagnostics
1393(7)
How to Troubleshoot Disk Problems
1400(8)
How to Prepare for Disk Failures
1400(1)
How to Use Chkdsk
1401(6)
How to Use the Disk Cleanup Wizard
1407(1)
How to Disable Nonvolatile Caching
1407(1)
How to Troubleshoot Driver Problems
1408(6)
How to Find Updated Drivers
1408(1)
How to Roll Back Drivers
1409(1)
How to Use Driver Verifier
1409(2)
How to Use the File Signature Verification
1411(1)
How to Use Device Manager to View and Change Resource Usage
1412(1)
How to Use System Restore
1413(1)
How to Troubleshoot USB Problems
1414(1)
How to Solve USB Driver and Hardware Problems
1414(4)
Understanding USB Limitations
1415(1)
How to Identify USB Problems Using Performance Monitor
1416(1)
How to Examine USB Hubs
1417(1)
How to Troubleshoot Bluetooth Problems
1418(1)
Troubleshooting Tools
1419(3)
DiskView
1419(1)
Handle
1420(1)
Process Monitor
1421(1)
Summary
1422(1)
Additional Resources
1422(3)
Related Information
1422(1)
On the Companion CD
1423(2)
Troubleshooting Network Issues
1425(68)
Tools for Troubleshooting
1425(38)
Arp
1427(2)
Event Viewer
1429(1)
Ipconfig
1430(1)
IPsec Diagnostic Tool
1431(1)
Nblookup
1432(1)
Nbtstat
1433(1)
Net
1434(2)
Netstat
1436(2)
Network Monitor
1438(1)
Nslookup
1439(3)
PathPing
1442(4)
Performance Monitor
1446(2)
Ping
1448(1)
Portqry
1449(2)
Reliability and Performance
1451(2)
Resource Monitor
1453(1)
Route
1454(2)
Task Manager
1456(3)
TCPView
1459(1)
Telnet Client
1459(1)
Testing Service Connectivity
1460(1)
Test TCP
1461(1)
Windows Network Diagnostics
1462(1)
The Process of Troubleshooting Network Problems
1463(27)
How to Troubleshoot Network Connectivity Problems
1465(5)
How to Troubleshoot Application Connectivity Problems
1470(4)
How to Troubleshoot Name-Resolution Problems
1474(3)
How to Troubleshoot Performance Problems and Intermittent Connectivity Issues
1477(3)
How to Troubleshoot Joining or Logging on to a Domain
1480(3)
How to Troubleshoot Network Discovery
1483(1)
How to Troubleshoot File and Printer Sharing
1484(3)
How to Troubleshoot Wireless Networks
1487(2)
How to Troubleshoot Firewall Problems
1489(1)
Summary
1490(1)
Additional Resources
1490(3)
Related Information
1490(1)
On the Companion CD
1491(2)
Troubleshooting Stop Messages
1493(80)
Stop Message Overview
1493(5)
Identifying the Stop Error
1494(1)
Finding Troubleshooting Information
1494(1)
Stop Messages
1495(2)
Types of Stop Errors
1497(1)
Memory Dump Files
1498(11)
Configuring Small Memory Dump Files
1500(1)
Configuring Kernel Memory Dump Files
1501(1)
Configuring Complete Memory Dump Files
1502(1)
How to Manually Initiate a Stop Error and Create a Dump File
1502(1)
Using Memory Dump Files to Analyze Stop Errors
1503(6)
Being Prepared for Stop Errors
1509(2)
Prevent System Restarts After a Stop Error
1509(1)
Record and Save Stop Message Information
1509(1)
Check Software Disk Space Requirements
1510(1)
Install a Kernel Debugger and Symbol Files
1511(1)
Common Stop Messages
1511(26)
Stop 0×A or IRQL_Not_Less_Or_Equal
1511(2)
Stop 0×1E or Kmode_Exception_Not_Handled
1513(3)
Stop 0×24 or NTFS_File_System
1516(1)
Stop 0×2E or Data_Bus_Error
1517(1)
Stop 0×3F or No_More_System_PTES
1518(1)
Stop 0×50 or Page_Fault_In_Nonpaged_Area
1519(1)
Stop 0×77 or Kernel_Stack_Inpage_Error
1520(1)
Stop 0×7A or Kernel_Data_Inpage_Error
1521(2)
Stop 0×7B or Inaccessible_Boot_Device
1523(2)
Stop 0×7F or Unexpected_Kernel_Mode_Trap
1525(2)
Stop 0×9F or Driver_Power_State_Failure
1527(1)
Stop 0×BE or Attempted_Write_To_Readonly_Memory
1528(1)
Stop 0×C2 or Bad_Pool_Caller
1528(3)
Stop 0×CE or Driver_Unloaded_Without_Cancelling_Pending_Operations
1531(1)
Stop 0×D1 or Driver_IRQL_Not_Less_Or_Equal
1531(1)
Stop 0×D8 or Driver_Used_Excessive_PTES
1532(1)
Stop 0×EA or Thread_Stuck_In_Device_Driver
1532(1)
Stop 0×ED or Unmountable_Boot_Volume
1533(1)
Stop 0×FE or Bugcode_USB_Driver
1534(1)
Stop 0×C000021A or Status_System_Process_Terminated
1535(1)
Stop 0×C0000221 or Status_Image_Checksum_Mismatch
1536(1)
Hardware Malfunction Messages
1537(1)
Stop Message Checklist
1537(5)
Check Your Software
1538(2)
Check Your Hardware
1540(2)
Summary
1542(1)
Additional Resources
1543(2)
Related Information
1543(1)
On the Companion CD
1543(2)
Appendices
System Files Reference
1545(8)
System Files
1545(1)
Startup Files
1546(1)
Important Folders
1547(1)
Windows Folders
1548(2)
System 32 Folder
1550(2)
Additional Resources
1552(1)
Related Information
1552(1)
User Rights Reference
1553(10)
Logon Rights
1553(2)
Privileges
1555(6)
Additional Resources
1561(1)
Related Information
1561(2)
Accessibility
1563(10)
Ease of Access Center
1563(2)
Additional Accessibility Features
1565(2)
Using the Ease of Access Center
1567(1)
Using Magnifier
1568(1)
Using Narrator
1569(1)
Using the On-Screen Keyboard
1569(1)
Ease of Access Keyboard Shortcuts
1570(1)
Windows Speech Recognition
1570(1)
Assistive Technology Products
1571(1)
Microsoft Accessibility Resource Centers
1571(1)
Additional Resources
1572(1)
Related Information
1572(1)
Glossary 1573(18)
Index 1591
Jerry Honeycutt, MVP for Windows, is a popular author with more than 25 books to his credit, including Microsoft Windows Desktop Deployment Resource Kit. In addition, he is a columnist for Windows XP Expert Zone and Microsoft TechNet.