You are previewing Microsoft® Windows® Registry Guide, 2nd Edition.
O'Reilly logo
Microsoft® Windows® Registry Guide, 2nd Edition

Book Description

Get the in-depth information you need to modify—and seamlessly manage—the Windows registry. Written for IT professionals and power users, this vital resource reveals little-known registry techniques, tricks, tips, and secrets to make your job easier. Understand the inner workings of the Windows operating system—and use the registry to get Windows Server 2003 and Windows XP to run the way you want, on a single desktop or across the network. You’ll learn how to pinpoint registry settings and script registry changes, deal with registry permissions, use Windows Installer, and map Tweak UI settings. Also, find best practices for how to back up, restore, and maintain registry settings with confidence. The CD includes 100+ registry files for customizing operating system appearance and behavior, and the complete eBook. You’ll learn how to:

- Apply best practices to back up, restore, manage, and modify the registry

- Customize group and system policies to manage multiple PCs andusers remotely

- Track down registry settings and script changes

- Optimize server services, including network connections and authentication

- Deploy user profiles and Microsoft Office program settings

- Configure security services, including Windows Firewall, templates, and service pack features

- Troubleshoot the registry—resolving common problems and corruption issues

Visit the catalog page for Microsoft® Windows® Registry Guide, 2nd EditionVisit the errata page for Microsoft® Windows® Registry Guide, 2nd EditionDownload the supplemental electronic content for Microsoft® Windows® Registry Guide, 2nd Edition

Table of Contents

  1. Microsoft® Windows® Registry Guide, Second Edition
  2. A Note Regarding Supplemental Files
  3. Acknowledgments
  4. Introduction
    1. This Book Is Different—Really
    2. Power Users First, Then IT Professionals
    3. Some Terminology
    4. Why I Love Windows XP
    5. Sample Files and Scripts
    6. Resource Kit Support Policy
    7. Final Note
    8. System Requirements
  5. I. Registry Overview
    1. 1. Learning the Basics
      1. Heart and Soul of Windows
        1. For Power Users
        2. For IT Professionals
      2. Registry Warnings and Myths
      3. Must-Know Concepts
        1. Security Identifiers
        2. Globally Unique Identifiers
        3. Hexadecimal Notation
        4. Bits and Bit Masks
        5. Little-Endian and Big-Endian
        6. ANSI and Unicode Encoding
        7. Null and Empty Strings
      4. Registry Structure
        1. Keys
        2. Values
        3. Types
      5. Registry Organization
        1. HKEY_USERS
        2. HKEY_CURRENT_USER
        3. HKEY_LOCAL_MACHINE
        4. HKEY_CLASSES_ROOT
        5. HKEY_CURRENT_CONFIG
      6. Registry Management Tools
      7. Registry Hive Files
        1. Hives in HKLM
        2. Hives in HKU
    2. 2. Using Registry Editor
      1. Running Regedit
      2. Regedit
        1. Key Pane
        2. Value Pane
      3. Searching for Data
        1. Searching Incrementally
        2. Searching in Binary Values
        3. Bookmarking Favorite Keys
        4. Using Better Techniques
      4. Editing the Registry
        1. Changing Values
        2. Adding Keys or Values
        3. Deleting Keys or Values
        4. Renaming Keys or Values
      5. Printing the Registry
      6. Exporting Settings to Files
        1. Registration Files
        2. Win9x/NT4 Registration Files
        3. Hive Files
        4. Text Files
      7. Working with Hive Files
      8. Getting Beyond Basics
    3. 3. Backing Up the Registry
      1. Editing the Registry Safely
        1. Copying Single Values
        2. Backing Up to REG Files
        3. Backing Up to Hive Files
      2. Using System Restore
        1. Taking Configuration Snapshots
        2. Looking Inside System Restore
        3. Managing System Restore
        4. Customizing System Restore
        5. Scripting System Restore
      3. Backing Up the Registry Regularly
        1. Planning a Backup Strategy
        2. Backing Up System State Data
        3. Restoring System State Data
      4. Backing Up User Settings
    4. 4. Hacking the Registry
      1. Redirecting Special Folders
      2. Customizing Shell Folders
        1. Renaming Desktop Icons
        2. Using Custom Icon Images
        3. Adding Desktop Icons
        4. Hiding Desktop Icons
      3. Reorganizing Control Panel
      4. Customizing File Associations
        1. Running Programs from My Computer
        2. Opening Command Prompts at Targeted Folders
        3. Rooting Windows Explorer at a Targeted Folder
        4. Adding InfoTips to Program Classes
      5. Adding File Templates
      6. Preventing Messenger from Running
      7. Personalizing the Start Menu
        1. Configuring the Menu’s Contents
        2. Trimming the Frequently Used Programs List
        3. Restoring the Sort Order
      8. Disabling Windows Tour
      9. Creating Program Aliases
      10. Customizing Internet Explorer
        1. Extending the Shortcut Menus
        2. Changing the Toolbar Background
        3. Customizing Search URLs
        4. Maximum Concurrent Downloads
      11. Clearing History Lists
      12. Running Programs at Startup
      13. Controlling Registry Editor
        1. Default Action for REG Files
        2. Storing Window Position and Size
      14. Logging On Automatically
      15. Changing User Information
      16. Looking for More Hacks
    5. 5. Mapping Tweak UI
      1. General
        1. Focus
        2. ALT+TAB
      2. Mouse
        1. Hover
        2. Wheel
        3. X-Mouse
      3. Explorer
        1. Shortcut
        2. Colors
        3. Thumbnails
        4. Command Keys
        5. Customizations
        6. Slide Show
      4. Common Dialog Boxes
        1. Places Bar
      5. Taskbar and Start Menu
        1. Grouping
        2. Start Menu
      6. Desktop
        1. First Icon
      7. My Computer
        1. Drives
        2. Special Folders
        3. AutoPlay
        4. Drive Letters
      8. Control Panel
      9. Templates
      10. Internet Explorer
        1. Toolbar Background
        2. Search
        3. View Source
        4. Small Animation
        5. Large Animation
        6. Image Toolbar
      11. Command Prompt
      12. Logon
        1. Autologon
        2. Settings
        3. Screen Saver
    6. 6. Configuring Servers
      1. Server Customizations
        1. Adding Comments to Server Announcements
        2. Optimizing the Server Service
      2. Authentication
        1. Configuring Kerberos
        2. Disabling Global Catalog Requirement
        3. Enabling Verbose Winlogon Messages
      3. Internet Information Services
        1. Configuring Http.sys
        2. Using Incremental Site ID Numbers
      4. Network Connections
        1. Enabling IP Forwarding
        2. Changing MTU Settings
      5. Shutdown Event Tracker
  6. II. Registry in Management
    1. 7. Using Registry-Based Policy
      1. Editing Local Policies
        1. Group Policy Extensions
        2. Registry-Based Policy
        3. Group Policy Storage
      2. Extending Registry-Based Policy
        1. Comments
        2. Strings
        3. CLASS
          1. Syntax
          2. Example
        4. CATEGORY
          1. Syntax
          2. Example
          3. Keywords
        5. KEYNAME
        6. POLICY
          1. Syntax
          2. Example
          3. Keywords
        7. EXPLAIN
        8. VALUENAME
        9. VALUEON and VALUEOFF
        10. ACTIONLIST
          1. Syntax
          2. Example
        11. PART
          1. Syntax
          2. Example
          3. Keywords
        12. CHECKBOX
          1. Syntax
          2. Example
          3. Keywords
        13. COMBOBOX
          1. Syntax
          2. Example
          3. Keywords
        14. DROPDOWNLIST
          1. Syntax
          2. Example
          3. Keywords
        15. EDITTEXT
          1. Syntax
          2. Example
          3. Keywords
        16. LISTBOX
          1. Syntax
          2. Example
          3. Keywords
        17. NUMERIC
          1. Syntax
          2. Example
          3. Keywords
        18. TEXT
          1. Syntax
          2. Example
      3. Deploying Registry-Based Policy
        1. Windows 2000 Server-Based Networks
        2. Windows NT–Based Networks and Other Networks
      4. Customizing Windows
      5. Using the Group Policy Tools
        1. Gpresult
          1. Syntax
          2. Examples
        2. Gpupdate
          1. Syntax
          2. Examples
        3. Help and Support Center
        4. Resultant Set of Policy
      6. Using DesktopStandard PolicyMaker
      7. Finding More Resources
    2. 8. Configuring Windows Security
      1. Setting Permissions for Keys
        1. Adding Users to ACLs
        2. Removing Users from ACLs
        3. Assigning Special Permissions
      2. Mapping Default Permissions
      3. Taking Ownership of Keys
      4. Auditing Registry Access
      5. Preventing Local Registry Access
      6. Restricting Remote Registry Access
      7. Deploying Security Templates
        1. Creating a Security Management Console
        2. Choosing a Predefined Security Template
        3. Building a Custom Security Template
        4. Analyzing a Computer’s Configuration
        5. Modifying a Computer’s Configuration
        6. Deploying Security Templates on the Network
      8. Configuring New Security Features
        1. Security Center Alerts
        2. Windows Firewall
      9. Internet Explorer Privacy Settings
      10. Internet Explorer Security Zones
        1. TemplatePolicies
        2. ZoneMap
        3. Zones
    3. 9. Troubleshooting Problems
      1. Fixing Corrupt Settings
        1. Allowing Windows to Fix Errors
        2. Repairing an Application’s Settings
        3. Removing Programs from the Registry
        4. Using Another Computer’s Settings
      2. Recovering from Disasters
        1. Windows Advanced Options Menu
        2. Windows Recovery Console
        3. Automated System Recovery
      3. Diagnosing Registry Corruption
        1. Power Failure
        2. File Corruption and Faulty Hardware
        3. The Registry Is Written To at Shutdown
      4. Repairing a Corrupt Registry
        1. Step 1
        2. Step 2
        3. Step 3
        4. Step 4
    4. 10. Finding Registry Settings
      1. Comparing REG Files
        1. Using WinDiff
        2. Using Word 2003
      2. Comparing with Reg.exe
      3. Auditing the Registry
        1. Setting Audit Policy
        2. Auditing Registry Keys
        3. Analyzing the Results
      4. Monitoring the Registry
        1. Using Winternals Regmon
        2. Filtering for Better Results
    5. 11. Scripting Registry Changes
      1. Choosing a Technique
      2. Installing INF Files
        1. Starting with a Template
        2. Linking Sections Together
        3. Adding Keys and Values
          1. Syntax
          2. Example
        4. Deleting Keys and Values
          1. Syntax
          2. Example
        5. Setting and Clearing Bits
          1. Syntax
          2. Example
        6. Using Strings in INF Files
      3. Setting Values with REG Files
        1. Exporting Settings to REG Files
        2. Creating REG Files Manually
        3. Encoding Special Characters
        4. Deleting Keys Using a REG File
      4. Editing from the Command Prompt
        1. Adding Keys and Values
          1. Syntax
          2. Example
        2. Querying Values
          1. Syntax
          2. Example
        3. Deleting Keys and Values
          1. Syntax
          2. Example
        4. Comparing Keys and Values
          1. Syntax
          2. Example
        5. Copying Keys and Values
          1. Syntax
          2. Example
        6. Exporting Keys to REG Files
          1. Syntax
          2. Example
        7. Importing REG Files
          1. Syntax
          2. Example
        8. Saving Keys to Hive Files
          1. Syntax
          2. Example
        9. Restoring Hive Files to Keys
          1. Syntax
          2. Example
        10. Loading Hive Files
          1. Syntax
          2. Example
        11. Unloading Hive Files
          1. Syntax
          2. Example
      5. Scripting Using Windows Script Host
        1. Creating Script Files
        2. Running Script Files
          1. Syntax
        3. Formatting Key and Value Names
        4. Adding and Updating Values
          1. Syntax
          2. Example (VBScript)
          3. Example (JScript)
        5. Removing Keys and Values
          1. Syntax
          2. Example (VBScript)
          3. Example (JScript)
        6. Querying Registry Values
          1. Syntax
          2. Example (VBScript)
          3. Example (JScript)
      6. Creating Windows Installer Packages
  7. III. Registry in Deployment
    1. 12. Deploying User Profiles
      1. Exploring User Profiles
        1. Profile Hives
        2. Profile Folders
        3. Special Profiles
      2. Getting User Profiles
        1. Local Profiles
        2. Roaming Profiles
      3. Using Roaming User Profiles
        1. Managing Roaming User Profiles
        2. Understanding Fast Network Logon
        3. Understanding the New Merge
      4. Deploying Default User Profiles
        1. Customizing User Settings
        2. Cleaning User Profiles
        3. Creating Default User Folders
        4. Deploying Default User Folders
      5. Coexisting with Earlier Versions of Windows
      6. Migrating User Settings to Windows
        1. Files And Settings Transfer Wizard
        2. User State Migration Tool
    2. 13. Mapping Windows Installer
      1. Repairing Registry Settings
      2. Managing Windows Installer with Policies
        1. Installing with Elevated Privileges
        2. Caching Transforms in a Secure Location
        3. Locking Down Windows Installer
      3. Removing Windows Installer Data
        1. Msizap.exe
        2. Msicuu.exe
      4. Inventorying Applications
    3. 14. Deploying with Answer Files
      1. Creating Distribution Folders
      2. Customizing Answer Files
        1. Setup Manager
        2. Notepad and Other Text Editors
      3. Adding Settings to Unattend.txt
        1. [GuiRunOnce]
        2. Cmdlines.txt
      4. Adding Multiple Settings with One Script
      5. Logging On Automatically After Installation
    4. 15. Cloning Disks with Sysprep
      1. Cloning Windows
        1. Windows Tools
        2. Sysprep Limitations
      2. Building a Disk Image
        1. Customizing Mini-Setup
        2. Preparing for Duplication
        3. Cloning the Disk Image
      3. Reducing Image Count
        1. Filling SysprepMassStorage Manually
        2. Filling SysprepMassStorage Automatically
        3. Cleaning Up After Sysprep
      4. Removing the Paging File
      5. Mapping Sysprep Settings
      6. Keeping Perspective
    5. 16. Configuring Windows PE
      1. Exploring Windows PE
        1. Capabilities
        2. Limitations
      2. Using Windows PE as an Installation Platform
        1. Starting the Computer
        2. Configuring the Hard Disks
        3. Installing Windows
      3. Customizing Windows PE
        1. Command-Line Tools
        2. Optional Components
        3. Network Drivers
        4. Mass-Storage Drivers
        5. Languages
      4. Starting Windows PE
        1. CD-Based Installation
        2. RIS-Based Installation
        3. Disk-Based Installation
      5. Automating Installations
    6. 17. Deploying Office 2003 Settings
      1. Profile Wizard
        1. Customizing the Wizard
        2. Capturing Settings
        3. Deploying Settings
      2. Custom Installation Wizard
        1. Adding and Removing Registry Entries
        2. Customizing Default Application Settings
        3. Changing Office User Settings
        4. Adding Installations and Running Programs
      3. Custom Maintenance Wizard
      4. Group and System Policy
    7. 18. Fixing Common IT Problems
      1. Controlling Just-in-Time Setup
        1. Outlook Express
        2. Windows Media Player
        3. Desktop Themes
        4. Other Shortcuts
      2. Removing Components
        1. Answer File [Components] Section
        2. Extending Windows Components Wizard
        3. Hiding Non-Removable Components
      3. Removing Policy Tattoos
      4. Elevating Privileges of Processes
        1. Group Policy
        2. Secondary Logon
        3. Scheduled Tasks
        4. AutoLogon
      5. Severing File Associations
      6. Deploying Office Trusted Sources
      7. Enabling Remote Desktop Remotely
      8. Customizing the Windows Logon
      9. Restoring Administrative Shares
      10. Changing Source Location
  8. IV. Appendixes
    1. A. File Associations
      1. Merge Algorithm
      2. File Extension Keys
        1. OpenWithList
        2. PerceivedType
        3. ShellNew
      3. Program Class Keys
        1. DefaultIcon
        2. EditFlags
        3. Shell
      4. Specialized Keys
        1. Applications
        2. SystemFileAssociations
        3. Unknown
      5. COM Class Keys
    2. B. Network Settings
      1. HKCU\Network
      2. HKLM\SYSTEM\CurrentControlSet\Services
        1. LanmanServer
        2. LanmanWorkstation
        3. Tcpip\Parameters
        4. Tcpip\Interfaces
    3. C. Per-User Settings
      1. AppEvents
      2. Console
      3. Control Panel
        1. Desktop
        2. Desktop\WindowMetrics
        3. Mouse
      4. Environment
      5. Keyboard Layout
      6. Network
      7. Printers
      8. SessionInformation
      9. Software
        1. Classes
        2. Microsoft\Command Processor
        3. Microsoft\Internet Connection Wizard
        4. Microsoft\Internet Explorer
        5. Microsoft\Internet Explorer\MenuExt
        6. Microsoft\Internet Explorer\SearchURL
        7. Microsoft\MessengerService
        8. Microsoft\Office
        9. Microsoft\Search Assistant
        10. Microsoft\VBA\Trusted
        11. Policies
      10. Software\Microsoft\Windows\CurrentVersion
        1. Explorer\Advanced
        2. Explorer\AutoComplete
        3. Explorer\ComDlg32
        4. Explorer\HideDesktopIcons
        5. Explorer\HideMyComputerIcons
        6. Explorer\MenuOrder
        7. Explorer\RecentDocs
        8. Explorer\RunMRU
        9. Explorer\User Shell Folders
    4. D. Per-Computer Settings
      1. HARDWARE
        1. DESCRIPTION
        2. DEVICEMAP
      2. SAM
      3. SECURITY
      4. SOFTWARE
        1. Classes
        2. Clients
        3. Microsoft\Active Setup
        4. Microsoft\Command Processor
        5. Microsoft\Driver Signing
        6. Microsoft\DrWatson
        7. Microsoft\Internet Explorer
        8. Microsoft\Sysprep
        9. Microsoft\Windows NT\CurrentVersion
        10. Microsoft\Windows NT\CurrentVersion\Winlogon
        11. Policies
      5. SOFTWARE\Microsoft\Windows\CurrentVersion
        1. App Paths
        2. Applets
        3. Explorer
        4. Explorer\AutoplayHandlers
        5. Explorer\Desktop\NameSpace
        6. Explorer\FindExtensions
        7. Explorer\HideDesktopIcons
        8. Explorer\HideMyComputerIcons
        9. Explorer\MyComputer
        10. Explorer\NetworkNeighborhood\NameSpace
        11. Explorer\RemoteComputer\NameSpace
        12. Explorer\StartMenu
        13. Explorer\User Shell Folders
        14. Explorer\VisualEffects
        15. Policies
        16. Run
        17. RunOnce
        18. Uninstall
      6. SYSTEM
        1. CurrentControlSet\Control
        2. CurrentControlSet\Enum
        3. CurrentControlSet\Hardware Profiles
        4. CurrentControlSet\Services
  9. About the Author
  10. Index
  11. About the Author
  12. Copyright