You are previewing Microsoft® Windows® XP Registry Guide.
O'Reilly logo
Microsoft® Windows® XP Registry Guide

Book Description

Discover how to customize the registry—and how to take care of it—with this no-nonsense primer. It reveals little-known Windows registry techniques, tricks, tips, and secrets to make the tasks of IT professionals and desktop power users easier.

Table of Contents

  1. Copyright
  2. Acknowledgments
  3. Introduction
  4. Registry Overview
    1. Learning the Basics
      1. Heart and Soul of Windows XP
      2. Registry Warnings and Myths
      3. Must-Know Concepts
      4. Structure of the Registry
      5. Organization of the Registry
      6. Registry Management Tools
      7. Registry Hive Files
    2. Using the Registry Editor
      1. Running Regedit
      2. Exploring Regedit
      3. Searching for Data
      4. Editing the Registry
      5. Printing the Registry
      6. Exporting Settings to Files
      7. Working with Hive Files
      8. Getting Beyond Basics
    3. Backing Up the Registry
      1. Editing the Registry Safely
      2. Fixing Corrupt Settings
      3. Using System Restore
      4. Backing Up the Registry Regularly
      5. Backing Up User Settings
      6. Recovering from Disasters
    4. Hacking the Registry
      1. Redirecting Special Folders
      2. Customizing Shell Folders
      3. Customizing File Associations
      4. Adding File Templates
      5. Preventing Messenger from Running
      6. Personalizing the Start Menu
      7. Customizing Internet Explorer
      8. Clearing History Lists
      9. Running Programs at Startup
      10. Controlling Registry Editor
      11. Logging On Automatically
      12. Changing User Information
      13. Looking for More Hacks
    5. Mapping Tweak UI
      1. General
      2. Mouse
      3. Explorer
      4. Common Dialog Boxes
      5. Taskbar
      6. Desktop
      7. My Computer
      8. Control Panel
      9. Templates
      10. Internet Explorer
      11. Command Prompt
      12. Logon
  5. Registry in Management
    1. Using Registry-Based Policy
      1. Editing Local Policies
      2. Extending Registry-Based Policy
      3. Deploying Registry-Based Policy
      4. Customizing Windows XP
      5. Using the Group Policy Tools
      6. Finding More Resources
    2. Managing Registry Security
      1. Setting Keys’ Permissions
      2. Mapping Default Permissions
      3. Taking Ownership of Keys
      4. Auditing Registry Access
      5. Preventing Local Registry Access
      6. Restricting Remote Registry Access
      7. Deploying Security Templates
    3. Finding Registry Settings
      1. Comparing REG Files
      2. Comparing with Reg.exe
      3. Auditing the Registry
      4. Monitoring the Registry
  6. Registry in Deployment
    1. Scripting Registry Changes
      1. Choosing a Technique
      2. Installing INF Files
      3. Setting Values with REG Files
      4. Editing from the Command Prompt
      5. Scripting Using Windows Script Host
      6. Creating Windows Installer Packages
    2. Deploying User Profiles
      1. Exploring User Profiles
      2. Getting User Profiles
      3. Using Roaming User Profiles
      4. Deploying Default User Profiles
      5. Coexisting with Earlier Versions of Windows
      6. Migrating User Settings to Windows XP
    3. Mapping Windows Installer
      1. Repairing Registry Settings
      2. Managing Windows Installer with Policies
      3. Removing Windows Installer Data
      4. Inventorying Applications
    4. Deploying with Answer Files
      1. Creating Distribution Folders
      2. Customizing Answer Files
      3. Adding Settings to Unattend.txt
      4. Logging On Automatically After Installation
    5. Cloning Disks with Sysprep
      1. Cloning Windows XP
      2. Building a Disk Image
      3. Reducing Image Count
      4. Mapping Sysprep Settings
      5. Keeping Perspective
    6. Microsoft Office XP User Settings
      1. Profile Wizard
      2. Custom Installation Wizard
      3. Custom Maintenance Wizard
      4. Group and System Policy
    7. Working Around IT Problems
      1. Controlling Just-in-Time Setup
      2. Removing Components
      3. Removing Policy Tattoos
      4. Elevating Processes’ Privileges
      5. Severing File Associations
      6. Deploying Office XP Trusted Sources
      7. Enabling Remote Desktop Remotely
      8. Customizing the Windows XP Logon
  7. Appendices
    1. File Associations
      1. Merge Algorithm
      2. File Extension Keys
      3. Program Class Keys
      4. Specialized Keys
      5. COM Class Keys
    2. Per-User Settings
      1. AppEvents
      2. Console
      3. Control Panel
      4. Environment
      5. Keyboard Layout
      6. Network
      7. Printers
      8. SessionInformation
      9. Software
      10. Software\Microsoft\Windows\CurrentVersion
    3. Per-Computer Settings
      1. HARDWARE
      2. SAM
      3. SECURITY
      4. SOFTWARE
      5. SOFTWARE\Microsoft\Windows\CurrentVersion
      6. SYSTEM
    4. Group Policies
      1. Conf.adm
      2. Inetcorp.adm
      3. Inetres.adm
      4. Inetset.adm
      5. System.adm
      6. Wmplayer.adm
  8. Index