You are previewing Microsoft® Windows® XP Professional Resource Kit, 3rd Edition.
O'Reilly logo
Microsoft® Windows® XP Professional Resource Kit, 3rd Edition

Book Description

Install, configure, and support Windows XP Professional with definitive technical guidance from the Microsoft Windows team and two industry veterans. This official RESOURCE KIT has been fully updated and revised—with coverage of Windows XP Service Pack 2, featuring Advanced Security Technologies, along with new chapters on managing software updates, the Windows Firewall, and wireless networking. You’ll also find 120+ timesaving administrative tools and scripts—plus additional content and eBooks—on the CD. It’s everything you need to help maximize the performance and reliability of your business desktops—and help reduce ownership and support costs.

Get in-depth guidance on how to:

•Plan, customize, and troubleshoot your deployment •Use Group Policy and IntelliMirror technologies to manage users and network resources •Administer disks, file systems, devices, print services, and digital media •Manage authentication, authorization, access control, and EFS •Configure TCP/IP, IP addressing, name resolution, and remote networking services •NEW—Configure wireless networking protocols and standards; apply best practices for support •NEW—Implement the boot-time security feature and other Windows Firewall enhancements •NEW—Design and deploy a software update management strategy •Apply expert strategies to diagnose and resolve system problems faster

CD inside Resource Kit tools and eBooks inside!

CD features: •120+ tools and utilities for administering Windows-based clients and servers •Microsoft Windows Server 2003 Automating and Customizing Installations eBook •Microsoft Encyclopedia of Networking, Second Edition eBook •Microsoft Encyclopedia of Security eBook •Fully searchable eBook of the complete RESOURCE KIT

Table of Contents

  1. Microsoft® Windows® XP Professional Resource Kit, Third Edition
  2. A Note Regarding Supplemental Files
  3. Acknowledgments
  4. Introduction
    1. Document Conventions
    2. Resource Kit Support Policy
  5. I. Deployment
    1. 1. Planning Deployments
      1. Overview of the Deployment Process
        1. Defining Project Scope and Objectives
        2. Assessing Your Current Environment
        3. Testing and Piloting the Deployment Plan
        4. Rolling Out Your Deployment
      2. Mapping Windows XP Professional to Your Business Needs
        1. Security Features
        2. Networking and Communications Features
        3. Desktop Management Features
      3. Assessing Your Current Configuration
        1. Hardware Requirements and Compatibility
          1. Checking the BIOS
          2. Windows Catalog
        2. Hardware Compatibility with Windows Me, Windows 98, Windows 95, and Windows 3.x
          1. Hardware Compatibility with Windows NT Workstation 4.0
        3. Application Compatibility
          1. Application Compatibility–Migrating from Windows Me or Windows 98
          2. Application Compatibility–Migrating from Windows NT Workstation 4.0 or Windows NT Workstation 3.51
          3. Testing Commercial Applications
          4. Testing Custom Applications
        4. Using Check Upgrade Only Mode
        5. Network Infrastructure
      4. Planning Your Preferred Client Configuration
        1. Determining Desktop Management Strategies
        2. Choosing Desktop Computer Configurations
          1. Choosing Configurations for Portable Computers
        3. Determining a Client Connectivity Strategy
          1. TCP/IP Networks
          2. IPX Protocol
        4. Determining Security Strategies
          1. Authentication
          2. Authorization
          3. Encryption
        5. Determining Client Administration and Configuration Strategies
          1. Multilingual Options
          2. Hardware Devices
          3. File Systems
          4. Disk Partitions
          5. Applications to Install
          6. Accessibility Options
      5. Planning Installations
        1. Upgrading vs. Clean Installation
          1. Upgrading from Windows 98 or Windows Me
          2. Upgrading from Windows 2000 Professional or Windows NT Workstation 4.0
          3. Using the User State Migration Tool
        2. Choosing an Installation Method
        3. Determining How Many Operating Systems to Install
          1. Multiple Operating Systems and File System Compatibility
          2. Multiple Operating Systems and EFS
        4. Planning for Dynamic Update
          1. Using Dynamic Update
          2. Obtaining the Dynamic Update Package
        5. Planning for Windows Product Activation
      6. Additional Resources
    2. 2. Automating and Customizing Installations
      1. New in Windows XP Service Pack 2
      2. Overview of Automated and Customized Installations
        1. Design an Automated and Customized Installation
        2. Windows Product Activation
        3. Dynamic Update
      3. Choosing an Automated Installation and Customization Tool
        1. Unattended Installation
          1. When to Use Unattended Installation
          2. Using a Windows XP Professional Operating System CD to Perform Unattended Installations
        2. System Preparation Tool
          1. When to Use Sysprep
          2. Advantages of Sysprep
          3. Disadvantages of Sysprep
        3. Remote Installation Services
          1. When to Use Remote Installation Services
          2. Advantages of Remote Installation Services
          3. Disadvantages of Remote Installation Services
        4. Systems Management Server
          1. When to Use Systems Management Server
          2. Advantages of Systems Management Server
          3. Disadvantages of Systems Management Server
        5. Where to Find the Tools and Related Information
      4. Preparing for the Installations
        1. Verify Hardware and Software Requirements
        2. Create a Distribution Folder
          1. Distribution Folder Structure
          2. Using Setup Manager to Create a Distribution Folder
      5. Customizing Unattended Installations
        1. Using Windows XP Professional Customization Tools
          1. Customizing Unattended Installations
          2. Customizing Sysprep Installations
          3. Customizing RIS Installations
        2. Creating an Answer File Manually
        3. Customizing Components and Features
          1. Adding Hardware Device Support
          2. Customizing Regional and Language Options
          3. Presetting Time Zones
          4. Detecting Video Mode for Computer Displays
          5. Automatically Converting FAT32 to NTFS
          6. Converting Short File Names to Long File Names ($$rename.txt)
          7. Adding Applications
          8. Setting Passwords
      6. Installing the Operating System
        1. Unattended Installations
          1. File Copy
          2. Text Mode
          3. GUI Mode
          4. Winnt32.exe Parameters
          5. Parameter Descriptions
        2. Sysprep
          1. Overview of the Sysprep Process
          2. Requirements for Running Sysprep
          3. How Sysprep Works with Windows Product Activation
          4. Sysprep Components
          5. Running Sysprep
        3. RIS
          1. RIS Process
          2. Before You Use RIS
          3. Preparing for Client Configuration
          4. Using the Remote Installation Preparation Tool
          5. Using a Remote Installation Services Boot Disk
          6. Understanding GUIDs
      7. Additional Resources
          1. Related Tools
    3. 3. Multilingual Solutions for Global Business
      1. Overview
        1. New Multilingual Features in Windows XP Professional
      2. Multilingual Features in Windows XP Professional
        1. Built-In Language Support
        2. Locales
        3. Standards and Formats (User Locales)
        4. Input Method Editors, Input Languages, and Keyboard Layouts
          1. Keyboard Layouts
        5. Unicode and Code Pages
        6. Language for Non-Unicode Programs (System Locale)
        7. User Interface Language Options (MUI Pack Only)
        8. Windows XP Professional Language Versions
          1. Windows XP Professional International English Version
          2. Windows XP Professional Localized Language Versions
          3. Windows XP Professional MUI Pack
      3. Planning a Multilingual Deployment
        1. Determining Language and Regional Requirements
        2. Assessing Hardware Requirements for Multilingual Support
          1. Disk Space Requirements
          2. Specialized Hardware Needs
        3. Determining Roaming User Needs
        4. Upgrading from Earlier Versions of Windows
        5. Deploying a Single Global Image
        6. Creating Regional Builds
      4. Configuring Desktops
        1. Configuring Regional and Language Options
          1. Configuring Regional and Language Support for User Accounts
          2. Configuring the User Interface Language (MUI Pack Only)
        2. Configuring Localized Content
        3. Simplifying Multiple Language Access on Desktops
        4. Entering Special Characters or Code Points
        5. Controlling Desktops by Using Group Policy Settings
      5. Using Unattended and Silent Installations
        1. Creating Unattended Installations
          1. Options for Running Winnt32.exe or Winnt.exe
          2. Defining Language and Regional Settings in the Answer File
          3. Special Considerations for Installing the Windows XP Professional MUI Pack
        2. Using Silent Configurations
          1. Changing Language and Regional Options
          2. Changing MUI Pack Defaults
        3. Using Windows Installer Packages for On-Demand Installations (MUI Pack Only)
      6. Supporting Multilingual Applications
        1. Supporting World-Ready Applications
        2. Supporting Non-Unicode Applications
        3. Determining the Compatibility of Your Current Applications
        4. Developing Multilingual Applications
        5. Developing Multilingual Web Sites
      7. Ensuring Compatibility
        1. Multilingual Compatibility with Active Directory Objects, Clients, and Domain Controllers
        2. Using Office XP or Office 2003 and Windows XP Professional Together
          1. Localized Versions of Office
          2. Office XP and Office 2003 Editions Multilingual User Interface Pack
      8. Troubleshooting
        1. Tools for Troubleshooting Multilingual Issues
        2. Problems Inputting or Displaying Multiple Languages
          1. Characters in Complex Script, Right-to-Left, or East Asian Languages Do Not Display Correctly
          2. Characters from Another Language Appear as Question Marks, Black Boxes, or Lines
          3. Characters Typed at the Command Prompt Are Not Correct
          4. Numbers, Currencies, Dates, or Sorting Orders Are Incorrect
        3. Verifying Application Compatibility
      9. Additional Resources
    4. 4. Supporting Installations
      1. The Setup Process
        1. New Setup Features
          1. Dynamic Update
          2. Uninstall
        2. Running Setup
      2. Support Tools
      3. Installing Service Packs and Other Software Updates
        1. Service Pack and Software Update Setup Programs
          1. Service Pack Setup Program Naming Convention
          2. Windows XP Software Update Setup Program Naming Convention
          3. Planning the Deployment
        2. Update Installation
          1. Performing an Update Installation
        3. Integrated Installation
          1. Creating an Integrated Installation
        4. Combination Installation
          1. Creating a Combination Installation
      4. Uninstalling a Service Pack or Other Software Update
        1. Uninstalling a Service Pack
        2. Uninstalling a Software Update
      5. Troubleshooting Windows XP Professional Setup
        1. Recovery Console
      6. Additional Resources
  6. II. Desktop Management
    1. 5. Managing Desktops
      1. Managing Desktops in Various Network Environments
      2. Managing Desktops in an Active Directory Environment
        1. Implementing IntelliMirror
        2. Using IntelliMirror to Manage Desktops
          1. User Data Management
          2. User Settings Management
          3. Computer Settings Management
          4. Group Policy-Based Software Distribution
        3. Using Group Policy to Manage Desktops
          1. Group Policy Objects
          2. GPO Processing Order
          3. Resultant Set of Policy
          4. Managing Users and Desktops by Using Group Policy Extensions
          5. Refreshing Group Policy from the Command Line
      3. Managing Desktops Without Active Directory
        1. Roaming User Profiles and Logon Scripts
        2. My Documents Redirection
        3. Internet Explorer Maintenance
        4. System Policy
        5. Local Group Policy Object
        6. Managing Desktops in UNIX and Novell Environments
          1. Standards-Based Management
          2. Telnet Client and Server
          3. Novell NetWare IPX Network
          4. Novell ZENworks
      4. Creating and Managing Standard Desktop Configurations
          1. Creating Managed Desktops
          2. Managing Mobile Users
          3. Managing New Users
          4. Managing Multi-User Desktops
          5. Replacing Computers
      5. Additional Resources
    2. 6. Managing Files and Folders
      1. Overview of Managing Files and Folders
          1. Group Policy
          2. Folder Redirection
          3. Offline Files and Synchronization Manager
          4. IntelliMirror
      2. Managing Documents with Folder Redirection
        1. Selecting Folders for Redirection
        2. Tools for Configuring Folder Redirection
          1. Active Directory Environments
          2. Other Server Environments
      3. Using Offline Files
        1. Implementing Offline Files
          1. Offline Files Database
          2. Making Files Available Offline
          3. Encrypting Offline Files
        2. Reconnecting to the Network Resource
        3. Synchronizing Files
          1. How Synchronization Works
          2. Configuring Synchronization
        4. Deleting Files and Folders
          1. Deleting Files from the Offline Files Folder
          2. Reinitializing the Cache
        5. Group Policy Settings That Affect Offline Files
      4. Sharing Files and Folders
        1. Configuring Shared Folder Permissions
        2. Simple Sharing and ForceGuest
          1. How ForceGuest Works
          2. Sharing Files and Folders Using the Simple Sharing User Interface
          3. Sharing the Root Directory of a Drive
          4. Shared Documents Folder
      5. Searching for Files, Folders, and Network Resources
          1. Finding Files and Folders
          2. Using the History Folder and History View
        1. Connecting to Network Shares
        2. Using Indexing Service
        3. Searching for Network Resources in an Active Directory Environment
          1. Searching for Computers
          2. Searching for Shared Files and Folders
      6. Troubleshooting Files and Folders Management
          1. Folder Redirection Registry Keys
          2. Folders Are Not Redirected
          3. Folder Redirection Is Successful but Files and Folders Are Unavailable
          4. Offline Files Do Not Synchronize
          5. User Cannot Make Files and Folders Available Offline
          6. Files Available When Online Are Not Available When Offline
      7. Additional Resources
    3. 7. Supporting Mobile Users
      1. Overview of Windows XP Professional Support for Mobile Users
      2. Setting Up a Portable Computer
        1. Check BIOS Compatibility
        2. Grant Installation and Configuration Rights
        3. Verify Hardware Configuration
        4. Configure Power Management Options
        5. Install Applications
        6. Configure Offline File Storing
        7. Configure Security
        8. Configure Roaming User Profiles and Folder Redirection
      3. Managing Hardware on Portable Computers
        1. Hardware Profile Creation
        2. Dynamic Device Configuration
        3. Docking and Undocking
          1. Hot Docking and Undocking
          2. Cold Docking and Undocking
      4. Configuring Power Management
        1. ACPI Power Management
        2. APM Power Management
          1. Determining APM BIOS Compatibility
          2. Configuring APM BIOS
        3. Power Management Schemes and Options
          1. Configuring Power Schemes
          2. Configuring Hibernation and Standby
          3. Configuring the Group Policy Refresh Interval for Hibernation or Standby
          4. Configuring Battery Monitoring and Management
          5. Configuring Power Button, Sleep Button, and Lid Switch Behavior
          6. Enabling Devices to Wake the Computer
          7. Hiding Power Options
      5. Configuring Roaming User Profiles and Folder Redirection
        1. Roaming User Profiles in Windows XP Professional
          1. New Group Policy Settings
          2. Support for Windows XP Professional Fast Network Logon
          3. More Robust Roaming
        2. Combining Folder Redirection with Roaming User Profiles
      6. Configuring Offline Files for Portable Computers
        1. Configuring Files on a Network Share for Offline Use
          1. Automatic Caching
          2. Manual Caching
        2. Configuring Synchronization for Offline Files
          1. Synchronizing Offline Files by Using Group Policy
          2. Enabling Synchronization During an Idle State
          3. Preventing Scheduled Synchronization
          4. Enabling Automatic Connection During Scheduled Synchronization
          5. Synchronizing over a Slow Link
        3. Securing Offline Files
          1. Offline Files Folder Security
          2. Offline File and Folder Permissions
          3. Encrypting Offline Files
        4. Managing the Offline Files Folder
      7. Securing Portable Computers
        1. Securely Undocking Portable Computers
        2. Windows XP Professional BIOS Security
      8. Using Infrared Hardware and Video Devices with Portable Computers
        1. Using Infrared Devices with Portable Computers
        2. Using Video Devices with Portable Computers
      9. Wireless Networking
        1. WPAN
          1. Infrared Data Association
          2. IrDA User Profiles
      10. Additional Resources
    4. 8. Configuring Remote Desktop
      1. Overview
        1. Remote Desktop Components
          1. Remote Desktop Protocol
          2. Client Software
        2. Remote Desktop Features
          1. Console Security
          2. Enhanced, Flexible Color Support
          3. Resource Redirection
      2. Deploying Remote Desktop
        1. Enabling Remote Desktop on a Computer Running Windows XP Professional
        2. Adding Users to the Remote Desktop Users Group
        3. Installing Client Software
          1. Installing Remote Desktop Connection
          2. Installing Remote Desktop Web Connection
        4. Establishing a Remote Desktop Session
          1. Using Remote Desktop Web Connection
          2. Keyboard Shortcuts in a Remote Desktop Session
        5. Security and Encryption in Remote Desktop
          1. Setting Encryption Levels
          2. Enabling Password Authentication at Logon Time
          3. Disabling Clipboard Redirection
          4. Disabling Printer Redirection
          5. Disabling File Redirection
        6. Using Group Policy with Remote Desktop
          1. Enabling Group Policy on an Individual Computer
      3. Troubleshooting Remote Desktop
        1. Server Name Not Found Error Message
        2. A Specified Program Will Not Open
        3. Cannot Log On to the Remote Computer
        4. Session Ends with a Data-Encryption Error Message
      4. Additional Resources
    5. 9. Managing Devices
      1. Overview
      2. Device Manager
          1. Viewing Hidden Devices
      3. Plug and Play Device Detection
          1. Plug and Play Detection on ACPI Systems
          2. Plug and Play Detection on Non-ACPI x86-Based Systems
        1. Allocating System Resources
          1. Interrupt Request Lines
          2. Direct Memory Access Channels
          3. I/O Port Address and Reserved Memory
        2. Safe Removal of Plug and Play Devices
          1. Safely Remove Hardware Application
      4. Device Drivers
        1. Driver Signing
        2. Windows Update
        3. Enterprise-Wide Driver Update Using Windows Update
        4. Driver Ranking
        5. Windows Driver Protection
        6. Driver Search Policy
        7. Device Drivers in the Driver.cab File
      5. Supported Hardware
        1. Universal Serial Bus
          1. USB Topology
          2. USB Devices
          3. Data Transfer Types and Rates Supported by USB
          4. USB Support for Plug and Play
          5. User Interfaces for USB Device Properties
        2. IEEE 1394
          1. IEEE 1394 Bus Connector and Cable
          2. Data Transfer Rates Supported by IEEE 1394
          3. Support for Plug and Play and Other Devices
        3. Other Bus Support
          1. PCI Bus
          2. AGP Bus
          3. PC Card and CardBus
          4. SCSI Bus
          5. ISA Bus
          6. EISA Bus
        4. Other Hardware Support
          1. Bluetooth
          2. Network and Other Internal Adapters
          3. Modems
          4. Human Interface Devices
          5. DVD
          6. Digital Audio Devices
          7. Still Image Devices
          8. Video Capture
          9. Smart Cards
      6. Device Installation
        1. Installing a Device in Windows XP Professional
        2. Installing Drivers
        3. Setting Plug and Play BIOS Settings
      7. Configuring Device Settings
        1. Using Hardware Profiles for Alternate Configurations
        2. Changing Hardware Acceleration Settings for Digital Audio
        3. Configuring the Display
          1. Changing the Display Driver
          2. Changing Hardware Acceleration Settings for Graphics Hardware
          3. Configuring Display Resolution and Appearance
          4. Configuring Power Management for the Display
          5. Enabling Mode Pruning
          6. Using Digital Flat Panel Monitors
        4. Using Multiple Monitors
          1. POST vs. Primary Display Device
          2. Configuring Multiple Monitors
          3. Multiple Monitors and DirectX
          4. Using Multiple Monitors with Portable Computers
        5. Configuring Communications Resources
        6. Configuring Scanners and Cameras
          1. Ports
          2. Image Color Management
          3. IrTran-P
          4. Pushbutton Scanning
      8. Power Management
        1. Power Management Features
        2. Power Policy Overview
        3. Using the Power Management Interface
      9. Hardware Troubleshooting
        1. Troubleshooting Hardware by Using Device Manager
        2. Troubleshooting Network and Other Internal Adapters
        3. Troubleshooting Modems
        4. Troubleshooting Video Adapters
          1. Troubleshooting Multiple Monitors
        5. Troubleshooting a Universal Serial Bus Device
          1. USB Troubleshooting Checklist
          2. Installing Unsupported USB Devices
          3. USB User Interface Error Detection
        6. Troubleshooting IEEE 1394 Bus Devices
      10. Additional Resources
    6. 10. Managing Digital Media
      1. Overview
        1. DirectX 9.0
          1. Open Graphics Library 1.1
          2. DirectX Diagnostic Tool
          3. DirectX Software Development Kit
        2. DVD Formats and Devices
          1. DVD Formats
          2. DVD Architecture
        3. Windows Media Technologies
          1. Windows Media Player
          2. Windows Movie Maker
          3. Microsoft Producer
          4. Other Windows Media Tools and Features
        4. Accelerated Graphics Port
      2. Optimizing Workstations for Digital Media
        1. Configuring Sound Events and Sound Schemes
        2. Configuring Preferred Playback and Recording Devices
        3. Configuring Audio Performance Options
        4. Configuring CD and DVD Playback Options
        5. Configuring Animations, Sounds, and Videos in Internet Explorer
        6. Configuring Digital Media Devices
      3. Using Digital Media
        1. Playing Digital Media
          1. Playing CDs
          2. Playing Audio from MIDI Devices
        2. Creating Digital Media
          1. Recording, Mixing, and Editing Audio
          2. Recording CDs
          3. Creating Streaming Content for the Internet
          4. Creating Dynamic Web Pages
          5. Broadcasting Digital Media Presentations over Your Intranet
      4. Troubleshooting Digital Media
        1. Common Problems with Playing Digital Media
        2. Troubleshooting Playback of WAV Files
        3. Troubleshooting MIDI Files
        4. Troubleshooting DVD
        5. Troubleshooting an Audio CD
        6. Troubleshooting CD Recording
      5. Additional Resources
    7. 11. Enabling Printing and Faxing
      1. New to Enabling Printing and Faxing
      2. Using Active Directory to Find Printers
        1. Searching Active Directory Fields
        2. Searching Active Directory Locations
      3. Installing Printers
        1. Installing Network and Internet Printers
          1. Point and Print
          2. Add Printer Wizard
          3. Run Dialog Box
          4. Internet Printers
        2. Installing Local Printers
          1. Plug and Play Printers
          2. Automatic Detection and Installation
          3. Manual Detection and Installation
        3. Printer Installation Considerations
          1. Driver.cab File
          2. Windows Update
        4. Printing from Other Operating Systems
          1. NetWare Print Servers
          2. UNIX Print Servers
          3. IBM Host Printers
      4. Setting Printing Preferences
        1. Print Queue Security Options
        2. Scheduling Printing
          1. Printer Availability
          2. Printer Priority
          3. Print Job Priority
        3. Spooler Settings
      5. Creating and Sending Print Jobs
        1. Modifications to the Print Dialog Box
        2. Printer Drivers
          1. Universal Driver
          2. PostScript 5.0 Driver
        3. Image Color Management 2.0
        4. Methods of Sending Print Jobs
          1. Standard Port Monitor
          2. Internet Printing
          3. USB
          4. IrDA
          5. IEEE 1284.4 Protocol
      6. Monitoring and Managing Internet Print Jobs
      7. Printing Concepts
        1. Printer Pooling
        2. Printing Processes
          1. Client Processes
          2. Spooler Processes
          3. Printer Processes
        3. Printer Components
          1. Graphics Device Interface
          2. Printer Drivers
          3. Print Spooler
          4. Port Monitor
        4. Printing over the Internet
        5. Print Job Formats
      8. Troubleshooting Printing Problems
        1. Common Printing Problems
        2. Troubleshooting the Printing Process
        3. Troubleshooting Printing from an Operating System Other Than Windows
          1. UNIX
          2. NetWare
          3. IBM
        4. Troubleshooting Font-Related Printing Problems
      9. Faxing in Windows XP Professional
        1. Configuring Fax Service
          1. Configuring Fax Service Options
          2. Entering User Information for Faxing
          3. Setting Printing Preferences for Faxes
          4. Sending Faxes
      10. Additional Resources
    8. 12. Disk Management
      1. New in Disk Management
      2. Disk Management Overview
      3. Basic and Dynamic Disks and Volumes
        1. Basic Disks
        2. Basic Volumes
        3. Dynamic Disks
        4. Dynamic Volumes
          1. Simple Volumes
          2. Spanned Volume
          3. Striped Volumes
          4. Mirrored Volumes
          5. RAID-5 Volumes
        5. Converting Basic Disks to Dynamic Disks
          1. Before Converting Disks to Dynamic
        6. How to Convert a Basic Disk to Dynamic
          1. Disks That You Cannot Convert to Dynamic
      4. Managing Volumes During Windows XP Professional Setup
        1. Preparing Multidisk Volumes for Windows XP Professional
        2. Creating Volumes During Windows XP Professional Setup
        3. Installing Windows XP Professional on Dynamic Disks
      5. Adding, Moving, and Importing Disks
        1. Adding New Disks to a Computer
        2. Moving Disks
          1. Before You Move Disks
          2. How to Move Disks
          3. Removing Disks from the Dynamic Disk Database
        3. Importing Foreign Disks
          1. Importing Spanned or Striped Volumes
          2. Importing Mirrored or RAID-5 Volumes
          3. Drive Letter Assignments for Imported Dynamic Volumes
      6. Managing GPT Disks in 64-Bit Computers
        1. Required Partitions on GPT Disks
          1. Microsoft Reserved Partition
          2. Primary Partition
          3. LDM Data Partition
      7. Remote Disk and Command-Line Disk Management
        1. Managing Disks on Remote Computers
        2. Managing Disks from the Command Line by Using DiskPart
          1. Creating DiskPart Scripts
          2. When to Use DiskPart Scripting
        3. Managing Disks from the Command Line by Using Fsutil
      8. Guidelines for Maintaining Disks and Volumes
      9. Additional Resources
    9. 13. Working with File Systems
      1. New in File Systems
      2. Overview
      3. Advantages of Using NTFS
        1. When to Use FAT
        2. Cluster Size
        3. Size Limitations in NTFS and FAT File Systems
          1. Maximum Sizes on NTFS Volumes
          2. Maximum Sizes on FAT32 Volumes
          3. Maximum Sizes on FAT16 Volumes
        4. Formatting a Volume
      4. Using the NTFS File System
        1. Features Available on NTFS Systems
          1. File and Folder Permissions
          2. Encryption
          3. Disk Quotas
          4. Disk Quota States
          5. Warning Levels and Disk Quota Limits
          6. Increasing Quotas for Individual Users
          7. Disk Quotas and Administrators
          8. Exceeding Disk Quota Limits
          9. Deleting Quota Entries
          10. Local and Remote Implementations of Disk Quotas
          11. Auditing Disk Space Use
          12. Disk Quotas in Multiple-Boot Configurations
          13. Using WMI to Script Disk Quotas
          14. File Compression
          15. Mounted Drives
          16. Hard Links
          17. Distributed Link Tracking
          18. Sparse Files
          19. Multiple Data Streams
          20. POSIX Compliance
          21. NTFS Change Journal
          22. Indexing Service
        2. Converting Volumes to NTFS
          1. Converting NTFS Volumes Formatted by Using Windows 2000
          2. Converting NTFS Volumes Formatted by Using Windows NT 4.0 and Earlier
          3. NTFS Conversion Issues for FAT Volumes
          4. Using Convert.exe to Convert FAT Volumes to NTFS
          5. Converting Volumes in Use
          6. Using the /CVTAREA Parameter
          7. How Convert.exe Safeguards Data During the Conversion
        3. Defragmenting NTFS Volumes
        4. Optimizing NTFS Performance
          1. Determine Cluster Size
          2. Use Short File Names
          3. Determine Folder Structure
          4. Fragmentation
          5. Evaluate Antivirus Programs
          6. Evaluate Use of Compression
          7. Enable Indexing Service
          8. Check Last Access Time
        5. NTFS Compatibility with Windows NT 4.0
        6. Cleanup Operations on Windows NT Volumes
        7. NTFS Recoverability
          1. Recovering Data with NTFS
          2. Caching and Data Recovery
          3. Cluster Remapping
        8. NTFS Data Structures
          1. Master File Table and Metadata Files
          2. MFT Zone
          3. NTFS File Attributes
        9. MS-DOS-Readable File Names on NTFS Volumes
      5. Comparing FAT File Systems
        1. Comparing FAT File Systems
          1. Advantages of FAT16
          2. Disadvantages of FAT16
          3. Advantages of FAT32
          4. Disadvantages of FAT32
        2. FAT16 File System
        3. FAT32 File System
        4. File Names on FAT Volumes
      6. Compact Disc File System
      7. Universal Disk Format
      8. Using File System Tools
      9. File Naming in Windows XP Professional
          1. Long File Names at the Command Prompt
          2. Generating Short File Names
      10. Additional Resources
    10. 14. Backing Up and Restoring Data
      1. Overview
        1. Backup Types
        2. Storage and Media
          1. Storage Devices
          2. Media Types
        3. Security Considerations
          1. Backup and Restore Rights
          2. File Permissions
          3. Backup Media Storage
      2. Establishing a Backup Plan
        1. Stand-Alone Computer
          1. Stand-Alone Method One
          2. Stand-Alone Method Two
        2. LAN Workgroups
          1. Workgroup Method One
          2. Workgroup Method Two
          3. LAN Backup Schedule
        3. Documenting Backup-and-Restore Procedures
        4. Verify Operations
      3. Backing Up System State Data
        1. Boot and System Files
      4. Using the Backup Tool
        1. Files Skipped During Backup
          1. Files Skipped by Default
        2. Volume Shadow Copy Technology
        3. Automated System Recovery
          1. ASR Backup
          2. ASR Restore
      5. Removable Storage
        1. Basic Concepts
          1. Media Units
          2. Media Libraries
          3. Media Pools
          4. Application Pools
          5. Work Queue Items
          6. Operator Requests
        2. Available Backup Media
          1. Locked Files
        3. Encrypted Files
        4. Backing Up Files on Your Local Computer
        5. Backing Up Files on Remote Computers
      6. Restoring Data
        1. Restoring System State Data
        2. Files from Third-Party Backup Programs
        3. File Security Settings
      7. Additional Resources
          1. Related Information
    11. 15. Managing Software Updates
      1. Overview of Managing Software Updates
      2. The Need for Software Updates
      3. Designing a Software Update Solution
        1. Ensuring Success
        2. Choosing a Software Update Management Application
          1. Automatic Updates
          2. Windows Update and Microsoft Update
          3. Microsoft Software Update Services and Microsoft Windows Update Services
          4. Microsoft Systems Management Server
      4. Assess Phase
        1. Creating a Hardware and Software Inventory
          1. Documenting Network Topology and Usage Patterns
          2. Identifying Computers to Inventory
          3. Identifying Information to Collect
          4. Choosing Inventory Tools
        2. Prioritizing Computers
        3. Creating Baseline Configurations
      5. Identify Phase
        1. Finding New Updates
        2. Evaluating Software Updates
      6. Evaluate and Plan Phase
        1. Creating an Implementation Plan
        2. Testing Updates
          1. Creating a Test Lab
          2. Testing Updates on a Production Network
      7. Deploy Phase
        1. Communicating Deployment Plans
        2. Preparing for Deployment
        3. Deploying Software Updates Using SUS
          1. Manually Configuring Automatic Updates
          2. Configuring Automatic Updates via Group Policy
          3. Approving Updates
          4. Deploying Emergency Updates
          5. Stopping Deployments
        4. Checking for Missing Updates Using MBSA
          1. Using the MBSA Graphical Interface
          2. Using the MBSA Command-Line Interface
      8. Troubleshooting Failed Software Update Deployments
      9. Additional Resources
  7. III. Security
    1. 16. Understanding Logon and Authentication
      1. Overview
        1. New in Windows XP Professional
        2. New In Windows XP Service Pack 2
          1. Improved Network Protection
          2. Improved Memory Protection
          3. Improved E-Mail Security
          4. Improved Browser Security
        3. Credentials and Validation
        4. Security Principals
          1. About Services
          2. Security Identifiers
        5. Security Groups
        6. Types of Logon
          1. Interactive Logon Process
          2. Components Used in Interactive Logon
        7. Using RunAs to Start a Program
      2. Working with Authentication Protocols
        1. Protocol Selection
        2. NTLM
          1. Challenge/Response Authentication
          2. Interactive Logon with NTLM
        3. Kerberos V5 Authentication Protocol
          1. Interactive Logons Using Kerberos Authentication
          2. Kerberos Ticket Cache
          3. Kerberos Interoperability
      3. Managing Credentials
        1. Blank Password Restrictions
        2. Password Management
          1. Group Policy
          2. Stored User Names and Passwords
          3. Backing Up and Restoring Passwords
        3. Smart Cards
          1. Logging On by Using a Smart Card
        4. Automating Logon
          1. Disabling the Welcome Screen
      4. Setting Authentication Policy Options
        1. Account Policies
          1. Password Policy
          2. Account Lockout Policy
          3. Kerberos Policy
        2. Local Policies
          1. User Rights Assignment
          2. Security Options
      5. Auditing and Troubleshooting Logon and Authentication
        1. Security Options
        2. Audit Policy
        3. Security Event Messages
      6. Additional Resources
    2. 17. Managing Authorization and Access Control
      1. Overview
        1. Important Terms
        2. Key Concepts
          1. Rights and Permissions
          2. User-Based Authorization
          3. Security Descriptors
        3. Planning for Effective Access Control
      2. User Accounts and Security Groups
        1. User Account Creation
        2. Types of Security Groups
          1. Computer Local Security Groups
          2. About the Program Compatibility Wizard
          3. Domain Local Security Groups
          4. Built-In Security Principals
          5. Memberships Associated with Default Groups
        3. Managing Permissions by Nesting Groups
          1. Nesting Groups in Domain Environments
      3. Using Access Control Lists
          1. Viewing ACLs
        1. Access Control Entries
        2. How Access Control Is Applied to New Objects
          1. Modifying Inheritance of Permissions
          2. Managing Ownership Permissions
        3. Default Permissions
          1. Basic File and Folder Permissions
          2. Advanced File and Folder Permissions
          3. Applying Folder and Share Permissions at Setup
        4. Using CACLS
      4. Managing User Rights by Using Security Groups
        1. Security Group Upgrade from Windows NT 4.0
        2. Security Group Creation in a Clean Installation
        3. Managing Anonymous Logons
        4. Managing Network Authentication
          1. Sharing Files and Folders under the Guest-Only Option
      5. Using Security Policy
        1. Software Restriction Policies
          1. How Software Restriction Policies Work
          2. Using Software Restriction Policies
        2. Security Templates
          1. Compatible (Compatws.inf)
          2. Secure (Secure*.inf)
          3. High Secure (Hisec*.inf)
          4. Root Directory Permissions (Rootsec.inf)
          5. Setup Security (Setup security.inf)
          6. No Terminal Server SID (Notssid.inf)
        3. Working with Local Security Policy
          1. Viewing Local Security Policy Settings
          2. Modifying Local Security Policy Settings
          3. Using Security Templates
      6. Auditing and Analyzing Access Control
        1. Enabling Auditing Policies
          1. Auditing the Use of Privileges
          2. Auditing Account Management
        2. Using the Event Viewer
        3. Using the Security Configuration and Analysis Snap-In
          1. Creating and Analyzing a Security Configuration Database
        4. Configuring and Analyzing Operations by Using Secedit.exe
      7. Additional Resources
    3. 18. Using Encrypting File System
      1. Overview
        1. Benefits of EFS
        2. How EFS Works
        3. New for Windows XP Professional
          1. Configuring EFS for Your Environment
      2. Components of EFS
        1. EFS Service
        2. EFS Driver
        3. CryptoAPI
        4. Cryptographic Service Provider
        5. Data Protection API
        6. EFS FSRTL
        7. Win32 API
      3. Encrypting and Decrypting by Using EFS
        1. What Can Be Encrypted
        2. How Files Are Encrypted
          1. Structure of an Encrypted File
          2. The Encryption Process
          3. The Decryption Process
        3. Working with Encryption and Decryption
          1. To decrypt a file or folder by Using My Computer
          2. Encrypting and Decrypting Files and Folders by Using the Cipher Command
          3. Enabling EFS Options on the Shortcut Menu
          4. Encrypting Offline Files
          5. Determining Encryption Status by Using My Computer
          6. Determining Encryption Status Using the Cipher Command
      4. Remote EFS Operations on File Shares and Web Folders
        1. Remote EFS Operations in a File Share Environment
          1. Remote Encryption on File Shares
          2. Remote Decryption on File Shares
          3. Local and Remote File Operations in a File Share Environment
        2. Remote EFS Operations in a Web Folder Environment
          1. Creating a Web Folder
          2. Remote Encryption of Files on Web Folders
          3. Remote Decryption of Files on Web Folders
          4. File Copy from a Web Folder
      5. Delivering EFS Certificates to Users
        1. How EFS Uses Certificates
        2. Determining Whether an EFS Certificate Exists
        3. Obtaining an EFS Certificate in a Stand-Alone Environment
        4. Using Enterprise Certification Authorities to Issue Certificates
        5. Renewing Certificates and Keys
        6. Replacing Self-Signed Certificates with CA-Issued Certificates
      6. Authorizing Multiuser Access to Encrypted Files
        1. How Users Are Authorized for Access to Encrypted Files
        2. Considerations for Sharing Encrypted Files
        3. Sharing Encrypted Files
      7. Taking Recovery Precautions
        1. Data Recovery and Data Recovery Agents
          1. Data Recovery Implementation Considerations
          2. Data Recovery Agent Decryption Process
        2. Configuring Data Recovery Policy in a Stand-Alone Environment
          1. Designating a Data Recovery Agent in a Stand-Alone Environment
        3. Exporting and Importing EFS and DRA Certificates and Private Keys
          1. Exporting Certificates and Keys
          2. Importing Certificates
        4. Backing Up and Restoring Encrypted Files or Folders
        5. Recovering Encrypted Files
      8. Strengthening Key and File Security
        1. Certificate and Public Key Storage
        2. Private Key Storage
        3. Master Key Storage and Security
          1. Master Key Loss and Data Recovery
          2. Password Reset Disk Creation
        4. Enabling the Startup Key
        5. Enabling 3DES
        6. Increasing Security for Open Encrypted Files
          1. Disabling Hibernation Mode
          2. Clearing the Paging File at Shutdown
      9. Disabling EFS
        1. Disabling EFS for an Individual File
        2. Disabling EFS for a File Folder
        3. Disabling EFS for a Stand-Alone Computer
      10. Tips for Implementing EFS
      11. Troubleshooting EFS
        1. Unable to Encrypt Files
        2. Unable to Decrypt Remote Files
        3. Unable to Open Encrypted Files
          1. Determining Whether the Certificate Used to Encrypt a File Is Still Available for Decryption
          2. Determining Whether the Access Problem Is Related to the Availability of the Necessary Private Key
        4. Encrypted File Is Unencrypted When Copied or Moved
        5. Virus Check Program Cannot Check All Files
        6. Common Error Messages
      12. Additional Resources
    4. 19. Implementing TCP/IP Security
      1. Securing TCP/IP
        1. Understanding Internet Layer Protocols
          1. IP
          2. ARP
          3. ICMP
        2. Understanding Transport Layer Protocols
          1. How TCP Communication Works
          2. The Netstat.exe Command
        3. Common Threats to TCP/IP
          1. Port Scanning
          2. Spoofing and Hijacking
          3. Denial of Service
        4. Configuring TCP/IP Security in Windows Server 2003, Windows 2000, and Windows XP
          1. Implementing Basic TCP/IP Security
          2. Configuring Registry Settings
          3. Using TCP/IP Filtering
          4. Using Windows Firewall in Windows Server 2003 and Windows XP
      2. Using IPSec
        1. Securing Data Transmission with IPSec Protocols
          1. Using AH
          2. Using ESP
        2. Choosing Between IPSec Modes
          1. Using IPSec Transport Mode
          2. Using IPSec Tunnel Mode
        3. Selecting an IPSec Authentication Method
          1. Authenticating with Kerberos
          2. Authenticating with X.509 Certificates
          3. Authenticating with Preshared Key
        4. Creating IPSec Policies
          1. IP Filter List
          2. Tunnel Settings
          3. Filter Actions
          4. Authentication Methods
          5. Connection Types
        5. How IPSec Works
          1. Main Mode
          2. Quick Mode
        6. Monitoring IPSec
          1. Using IPSecmon in Windows 2000
          2. Using the IP Security Monitor MMC Snap-In
          3. Using IPSec Logs
      3. Best Practices
      4. Additional Information
    5. 20. Implementing Security for Mobile Computers
      1. Understanding Mobile Computers
        1. Increase in the Possibility of Being Lost or Stolen
        2. Difficulty in Applying Security Updates
        3. Exposure to Untrusted Networks
        4. Eavesdropping on Wireless Connectivity
      2. Implementing Additional Security for Laptop Computers
        1. Hardware Protection
        2. Boot Protection
        3. Data Protection
        4. User Education
      3. Securing Wireless Networking in Windows XP
        1. Using Wireless Zero Configuration in Windows XP
        2. Configuring Security for 802.11 Wireless Network Connectivity
          1. Configuring 802.11 Security with WEP
      4. Best Practices
      5. Additional Information
    6. 21. Wireless Networking
      1. Overview
      2. Understanding 802.11 Protocols
        1. 802.11
        2. 802.11b
        3. 802.11a
        4. 802.11g
        5. 802.11h
        6. 802.11i
        7. 802.11e
        8. 802.11n
      3. Wi-Fi
      4. Wireless Security
        1. Risk Assessment
          1. Density
          2. Isolation
          3. Profile
        2. Risk Tolerance
        3. Using Wired Equivalent Privacy
        4. Using Wi-Fi Protected Access
          1. Data Encryption
          2. Data Integrity
          3. User Authentication
        5. Using 802.1x for Authentication
      5. Configuring Wireless Networks
        1. Infrastructure Mode
        2. Ad Hoc Mode
        3. Wireless Network Adapter Support
          1. Service Pack 2 Enhancements
          2. Support for WPA
          3. Wireless Provisioning Service
          4. Wireless Network Setup Wizard
          5. Wireless Zero Configuration Service Logging
          6. Improved Repair Functionality for Wireless Connections
          7. Wireless Network Connection Dialog Box
      6. Connecting to Public Hotspots
        1. The WPS Infrastructure
        2. WPS Connection Sequence
        3. Non-WPS Hotspots
      7. Best Practices
      8. Troubleshooting Wireless Networking
        1. Authentication Issues
        2. Access Point Issues
        3. Client Issues
      9. Additional Resources
    7. 22. Implementing Windows Firewall
      1. Overview
      2. Boot-Time Security
      3. Enabling and Disabling Windows Firewall
      4. Configuring Exceptions
        1. Application Exceptions
          1. Windows Firewall Notification
          2. Global Application Exceptions
          3. Scope-Limited Application Exceptions
        2. Port Exceptions
          1. Scope-Limited Port Exceptions
      5. Local Subnet Exceptions
      6. Restore Defaults
      7. Using Logging
      8. ICMP
      9. Deploying Firewall Settings
        1. Deploying Settings with Group Policy
        2. Group Policy Settings for Windows Firewall
          1. Group Policy on a Mixed Network
        3. Deploying Settings without Group Policy
          1. Unattend.Txt File
          2. Netfw.inf File
        4. Netsh Command Syntax for Windows Firewall Settings
          1. add allowedprogram
          2. set allowedprogram
          3. delete allowedprogram
          4. set icmpsetting
          5. set multicastbroadcastresponse
          6. set notifications
          7. set logging
          8. set opmode
          9. add portopening
          10. set portopening
          11. delete portopening
          12. set service
          13. show commands
      10. Additional Resources
  8. IV. Networking
    1. 23. Connecting Clients to Windows Networks
      1. Microsoft Networking Overview
        1. New in Microsoft Networking
          1. Directory Service
          2. Account Authentication
          3. Policy Handling
        2. Fundamental Configuration Tasks
          1. Determining the Current Networking Environment
          2. Installing and Configuring TCP/IP or Another Network Protocol
          3. Connecting to the Right Network Environment
          4. Verifying a Successful Client Logon Attempt
          5. Troubleshooting a Failed Logon Attempt
      2. Microsoft Network Environments
        1. Peer-to-Peer Network Environment
        2. Windows Domain Environment
          1. Active Directory
          2. Windows NT 4.0 Compatibility
      3. Account Authentication
        1. Authentication Methods
        2. Logon Names
      4. TCP/IP and Other Network Protocols
        1. Benefits of TCP/IP
        2. Configuring the Protocol Binding Order
      5. Locating Resources by Publishing Objects
        1. Computer Browser and Browsing Roles
          1. Browser Elections
          2. Building the Browse List for Microsoft Networks
          3. Adding to and Removing from the Browse List
        2. Logon Scripts
      6. Group Policy and System Policy Settings
        1. System Policy and Group Policy Coexistence
        2. Checking Local and Domain Policy Compatibility
        3. Group Policy Settings for Network Connections
      7. Joining the Network Environment
        1. Network Identification Wizard
        2. Changing Windows Workgroup Membership
        3. Manually Joining a Windows Domain
      8. Confirming Domain and Workgroup Membership
        1. Testing a Workgroup User Account
        2. Testing a Domain User Account
        3. Establishing a Secure Channel
      9. Troubleshooting Microsoft Networking
        1. Tools for Troubleshooting
        2. Troubleshooting Joining Networks
        3. Troubleshooting Logon Problems
        4. Troubleshooting Group Policy and System Policy
        5. Troubleshooting My Network Places
      10. Additional Resources
    2. 24. Configuring IP Addressing and Name Resolution
      1. Overview of Addressing and Name Resolution
        1. Types of IP Addresses
          1. Public IP Addresses
          2. Authorized Private IP Addresses
          3. Unauthorized Private IP Addresses
        2. Types of IP Address Assignment
        3. Types of TCP/IP Name Resolution
      2. Enabling IP Address Assignment
        1. Choosing an IP Address Assignment Method
          1. Choosing DHCP
          2. Choosing APIPA
          3. Choosing Static IP Addressing
          4. Choosing Alternate IP Configuration
        2. Configuring DHCP
          1. DHCP Lease Process
          2. Restarting a DHCP Client
          3. DHCP Lease Renewals
          4. Configuring the Windows XP Professional DHCP Client
        3. Configuring APIPA
        4. Configuring an IP Address Manually
        5. Configuring Multiple IP Addresses on a Network Adapter
        6. Configuring an Alternate IP Address
      3. Configuring TCP/IP Name Resolution
        1. Choosing a Name Resolution Method
          1. Configuring DNS Settings
        2. Configuring DNS to Resolve Host Names and Domain Names
          1. DNS and NetBIOS Names
          2. DNS Naming Restrictions
          3. DNS Query Process
          4. Adding Suffixes to Queries
          5. Specifying DNS Servers
          6. Querying DNS Servers
          7. DNS Caching, Network Prioritization, and Security
        3. Configuring Dynamic Update
          1. Configuring Dynamic Update for DHCP Clients
          2. Statically Configured and Remote Access Clients
          3. Multihomed Clients
          4. Disabling Dynamic Update
        4. Editing Hosts Files
        5. Configuring NetBIOS Name Resolution
          1. NetBIOS Name-Resolution Basics
          2. Name Resolution Using WINS
          3. Configuring WINS
          4. B-Node Broadcasts and Lmhosts
          5. WINS Proxy
          6. Disabling NetBT
      4. Troubleshooting Name Resolution and Addressing
        1. Checking NetBIOS Name Resolution
          1. Resolving NetBios Error 53
          2. Checking the Lmhosts File
          3. Checking the WINS Configuration
        2. Checking Hosts Files and DNS Name Resolution
          1. Checking the Hosts File
          2. Checking Your DNS Configuration
          3. DNS Error Messages
        3. Troubleshooting IP Addressing
      5. Additional Resources
    3. 25. Connecting Remote Offices
      1. Overview
        1. Local Connections in a Remote Office
        2. Remote Connections to a Private Network
        3. Connecting to the Internet
        4. What's New
      2. Understanding Connection Types
        1. Remote Access Connection Types
          1. Dial-Up Modem
          2. ISDN
          3. X.25
          4. PPPoE
          5. Microsoft Ethernet PVC
        2. VPN Connection Types
          1. PPTP
          2. L2TP
        3. Local Connection Types
          1. Ethernet
          2. Token Ring
          3. FDDI
          4. LAN Emulation
          5. IP over ATM
          6. Home Phoneline Network Adapter (HPNA)
          7. 802.1x for Wireless LANs
        4. Direct Cable Connections
          1. USB
          2. Serial Cabling
          3. Direct Parallel Cabling
          4. IEEE 1394 (Firewire)
        5. Wide Area Network Connection Types
          1. T-Carrier Line
          2. Cable Modem
          3. DSL
          4. Frame Relay
        6. Incoming Connection Types
        7. Connection-Defined Connections
      3. Managing Outgoing Connections
        1. Using the New Connection Wizard to Choose Connection Types
          1. Internet Connection
          2. Connecting to the Network at My Workplace
          3. Advanced Connection
        2. What Can I Configure?
          1. Configuration Privileges
        3. Configuring Remote Connections
        4. Configuring Advanced Settings
          1. Operator-Assisted Dialing
          2. Dial-Up Preferences
          3. Dynamic Multiple Device Dialing
          4. Network Identification
          5. Advanced Settings
          6. Optional Networking Components
        5. Deploying Connection Manager
          1. CMAK
          2. CPS
        6. Accessing Network Resources
          1. File and Printer Sharing
          2. Group Policy
          3. Local Group Policy
      4. Managing Incoming Connections
      5. Configuring Home Networks
        1. Home Network Hardware Requirements
        2. Home Network Configuration Instructions
      6. Managing Home and Small Office Local Connections
        1. Clients, Services, and Protocols
        2. Local Area Connection Status
        3. WAN Adapters
        4. The Network Bridge
      7. Securing the Remote Network
        1. Authentication
          1. Interactive Logon Process
          2. Network Access Control
          3. Logging On Using Domain Credentials
        2. Authentication Protocols
          1. How the Remote Access Authentication Process Works
        3. Data Encryption
          1. MPPE
          2. IPSec
      8. Sharing an Internet Connection
        1. Using DHCP with ICS
        2. ICS Scenario: Connecting Your Branch Office's Intranet to the Internet
          1. Configuring the ICS Computer
      9. Using the Windows Firewall
      10. Troubleshooting Remote Network Connections
        1. Troubleshooting Tools
          1. PPP Logging
          2. Modem Logging
          3. Modem Diagnostics
          4. Device Manager
        2. Troubleshooting Common Local Area Configuration Problems
        3. Troubleshooting Common Remote Access Configuration Problems
          1. Modem not working
        4. Troubleshooting Common Internet Access Configuration Problems
      11. Additional Resources
    4. 26. Configuring Telephony and Conferencing
      1. Overview of Telephony and Conferencing
        1. Telephony Environments
          1. IP Telephony
          2. Client/Server Telephony
          3. Public Switched Telephone Network
          4. Integrated Services Digital Network
          5. Private Branch Exchange
        2. TAPI 3.1
          1. Service Providers
        3. Quality of Service
          1. Support for QoS in Windows XP Professional
          2. QoS Components for Windows XP Professional
      2. Setting Up Telephony and Conferencing
        1. Configuring Modems
          1. Defining a Location
          2. Setting Modem Properties
        2. Configuring ISDN Support
        3. Configuring Client/Server Telephony Support
        4. Configuring TAPI IP Telephony
          1. Specifying the H.323 Gateway
          2. Specifying the H.323 Proxy
          3. Specifying the H.323 Gatekeeper
          4. Using Windows Directory Service
      3. Troubleshooting Telephony and Conferencing
        1. Troubleshooting Modems
        2. Troubleshooting PSTN Telephony
        3. Troubleshooting Conferencing Applications
      4. Additional Resources
  9. V. System Troubleshooting
    1. 27. Understanding Troubleshooting
      1. Troubleshooting Overview
      2. Troubleshooting Concepts
        1. Identify Problem Symptoms
        2. Check Technical Information Resources
        3. Review Your System's History
          1. Compare System Settings and Configurations
        4. Check Firmware Versions
      3. Troubleshooting Strategies
        1. Isolate and Resolve Hardware Problems
        2. Isolate and Resolve Software Issues
        3. Avoid Common Pitfalls
          1. Not Identifying the Problem Adequately
          2. Not Observing the Effects of Diagnostic Changes
          3. Not Documenting Changes while Troubleshooting
          4. Not Restoring Previous Settings
          5. Troubleshooting Several Problems at One Time
          6. Using Incompatible or Untested Hardware
          7. Using Incompatible Software
        4. Document and Evaluate the Results
          1. Write an Action Plan
        5. Take Proactive Measures
          1. Improve the Computing Environment
          2. Monitor System and Application Logs
          3. Document Changes to Hardware and Software
          4. Plan for Hardware and Software Upgrades
      4. Establishing a Troubleshooting Checklist
      5. Additional Resources
    2. 28. Troubleshooting Disks and File Systems
      1. New in Troubleshooting Disks and File Systems
      2. Maintenance and Troubleshooting Tools
        1. Chkdsk
          1. Running Chkdsk to Repair File Systems
          2. The Chkdsk Process on NTFS Volumes
          3. Running Autochk When the Computer Restarts
          4. Using Chkntfs to Prevent Autochk from Running
          5. Reducing the Time Required to Run Chkdsk on NTFS Volumes
          6. Running Chkdsk on Mission-Critical Computers
          7. Determining How Long Chkdsk Will Run
          8. Recovering Lost Clusters on FAT Volumes
          9. Running Chkdsk from My Computer or Windows Explorer
        2. Disk Defragmenter
          1. Before Using the Disk Defragmentation Tools
          2. Running the Disk Defragmenter Snap-in
          3. Defragmenting Volumes by Using the Defrag Command
          4. Tips for Using the Disk Defragmentation Tools
          5. Optimizing Startup Times by Using Defragmentation Tools
          6. Files That You Cannot Defragment
        3. Recovery Console
        4. Automated System Recovery
        5. DiskProbe
        6. Dmdiag
      3. Disk and Volume Status Descriptions
        1. Disk Status Descriptions
          1. Foreign
          2. Missing
          3. Not Initialized
          4. Offline
          5. Online (Errors)
          6. Unreadable
        2. Volume Status Descriptions
          1. Failed
          2. Healthy (At Risk)
          3. Healthy (Unknown Partition)
          4. Unknown
      4. Viruses That Affect the MBR and Boot Sectors
        1. MBR Viruses
        2. Boot Sector Viruses
        3. How MBR and Boot Sector Viruses Affect Windows XP Professional
        4. Guidelines for Avoiding Viruses
        5. Treating an MBR or Boot Sector Virus Infection
          1. Avoid Using the Fdisk /mbr Command to Treat Viruses
          2. Avoid Using the Fixmbr Command to Treat Viruses
      5. Repairing Damaged MBRs and Boot Sectors in x86-Based Computers
        1. Restoring the MBR
          1. Using the Recovery Console to Replace the MBR
          2. Using DiskProbe to Replace the MBR and Partition Table
          3. Using a Third-Party Disk Editor to Replace the Partition Table
        2. Replacing the Boot Sector
          1. Using a Disk Editor to Replace the Boot Sector
      6. Stop Messages for Disks and File Systems
          1. Stop 0x00000024 or NTFS_FILE_SYSTEM
          2. Stop 0x00000050 or PAGE_FAULT_IN_NONPAGED_AREA
          3. Stop 0x00000077 or KERNEL_STACK_INPAGE_ERROR
          4. Stop 0x0000007A or KERNEL_DATA_INPAGE_ERROR
          5. Stop 0x0000007B or INACCESSIBLE_BOOT_DEVICE
      7. Other Disk Problems
          1. CMOS Problems
          2. Cables and Connectors
      8. Disk Sectors Critical to Startup
        1. Disk Sectors on MBR Disks
          1. Master Boot Record on Basic Disks
          2. Master Boot Record on Dynamic Disks
          3. Boot Sectors on MBR Disks
        2. Disk Sectors on GPT Disks
          1. Protective MBR
          2. GPT Partition Table Header
          3. GUID Partition Entry Array
      9. Additional Resources
    3. 29. Troubleshooting the Startup Process
      1. Understanding the Startup Process
        1. Startup Phases
          1. Power-On Self Test
          2. Initial Startup Phase
          3. Boot Loader Phase
          4. Detect and Configure Hardware Phase
          5. Kernel Loading Phase
          6. Session Manager
          7. Logon Phase
          8. Plug and Play Device Detection
      2. Following a Process for Startup and Recovery
        1. Restoring to the Last Known Good Configuration
        2. Starting in Safe Mode
        3. Rolling Back Drivers
        4. Using System Restore to Undo Changes
        5. Temporarily Disabling Applications and Processes
          1. Disabling Startup Programs by Using the System Configuration Utility
          2. Disabling Startup Programs by Using the SHIFT Key
          3. Disabling Startup Programs by Using the Group Policy Snap-In
          4. Disabling Startup Programs for Computers on a Network
          5. Manually Disabling Startup Programs
        6. Temporarily Disabling Services
          1. Using Service Tools to Diagnose and Resolve Startup Issues
          2. Disabling Services with the System Configuration Utility
          3. Disabling Services by Using the Services Snap-in
          4. Managing Services by Using Sc.exe
          5. Determining Service Dependencies
          6. Determining Which Services and Processes to Temporarily Disable
        7. Uninstalling Software
        8. Using Recovery Console
          1. Using Recovery Console to Disable Services
          2. Using Recovery Console to Restore the Registry Keys HKEY_LOCAL_MACHINE\SYSTEM and HKEY_LOCAL_MACHINE\SOFTWARE
          3. Recovery Console Alternatives
        9. Reviewing and Correcting Boot.ini Settings
        10. Performing a Parallel Windows XP Professional Installation
        11. Saving System Files and Settings by Using Automated System Recovery
      3. Recovering from Hardware-Related Problems
        1. Checking Your Hardware
        2. Simplifying Your Hardware Configuration
        3. Checking the Operating System Configuration
        4. Diagnosing Disk-Related Problems
        5. Resolving Shutdown Problems
        6. Resolving Power Management Problems
          1. Symptoms of Power Management Problems and Causes
          2. Recovering from a Failed Standby
          3. Recovering from a Failed Hibernation
      4. Additional Resources
  10. VI. Appendixes
    1. A. System Files Reference
      1. System Files
      2. Startup Files
      3. Folders on the Local Disk
      4. Windows Folder
      5. System32 Folder
      6. Extracting Files from the Operating System CD
        1. Using the Copy Command in Recovery Console
        2. Using the Expand Command in Recovery Console
      7. Additional Resources
    2. B. User Rights
      1. Logon Rights
      2. Privileges
    3. C. Tools for Troubleshooting
      1. Using This Appendix
      2. Installing and Running Troubleshooting Tools
        1. Installing Tools
        2. Tool Interface Types
          1. Starting GUI Tools
          2. Starting GUI Snap-In Tools
          3. Starting Command-Line Tools and Logging Output
        3. Help and Support Center
      3. Disaster Recovery Tools
        1. Last Known Good Configuration
        2. Using Safe Mode
          1. Safe Mode Enables Only Essential Drivers and Services
          2. Safe Mode Bypasses Startup Programs
        3. Device Driver Roll Back
        4. System Restore
          1. File Monitoring
          2. Restore Points and Restore Point Management
          3. Archiving and Purging of Restore Points
        5. Using System Restore
          1. Using Control Panel to Configure System Restore
          2. Using the Group Policy Snap-In to Configure System Restore
          3. Using the Registry Editor to Configure System Restore
          4. Using Custom Scripts to Configure System Restore
          5. How System Restore Works with Other Windows XP Professional Features
        6. Add or Remove Programs
        7. Recovery Console
          1. Installing and Using Recovery Console
          2. Customizing Recovery Console
          3. Using Recovery Console to Recover from Startup Problems
          4. Using Recovery Console Commands
        8. Backup
        9. Automated System Recovery
      4. Application and Service Tools
        1. Bootcfg
        2. Boot Logging
        3. Dependency Walker
        4. Device Manager
        5. DirectX Diagnostic Tool
          1. Testing DirectX Components
          2. Saving Information
        6. Dr. Watson
        7. Error Reporting
          1. User Mode Reporting
          2. Kernel Mode Reporting
        8. Event Query
        9. Event Triggers
        10. Event Viewer
        11. Global Flags Editor
        12. Group Policy Snap-In
        13. Group Policy Results
        14. Group Policy Update
        15. Kernel Debugger
        16. Memory Pool Monitor
        17. Online Crash Analysis Web Site
        18. OpenFiles
        19. Performance Snap-In
        20. Process and Thread Status
        21. Program Compatibility Wizard
        22. Registry Editor
          1. Before Using the Registry Editor
          2. Features of the Registry Editor
          3. Registry Subtrees
        23. Resultant Set of Policy
        24. RunAs (Command-Line Tool)
        25. RunAs (GUI Feature)
        26. SC
        27. Services Snap-In
        28. Shutdown Event Tracker
        29. System Configuration Utility
          1. General
          2. WIN.INI and SYSTEM.INI Tabs
          3. BOOT.INI Tab
          4. Services Tab
          5. Startup Tab
        30. Systeminfo
        31. System Information
        32. Task Kill
        33. Task List
        34. Task Manager
        35. Uninstall Windows XP Professional
      5. Remote Management Tools
        1. Computer Management Tool
        2. Remote Desktop
          1. Remote Desktop Restrictions
          2. Configuring and Using Remote Desktop
          3. Other Remote Desktop Features
        3. Remote Assistance
          1. Differences Between Remote Assistance and Remote Desktop
          2. Establishing Remote Assistance Connections
          3. Invitation Limitations
          4. Security Concerns
          5. Offer Remote Assistance
          6. Other Remote Assistance Features
        4. Telnet
      6. Disk and Maintenance Tools
        1. Chkdsk
        2. Disk Cleanup
        3. Disk Defragmenter
        4. Disk Management and DiskPart
        5. Fsutil.exe
        6. My Computer Information in Help and Support Center
        7. Windows Update
      7. System File Tools
        1. Driver Signing and Digital Signatures
          1. File Signature Verification
          2. Driver Signature Checking
          3. System Information
        2. Driver Query
          1. Device Manager
          2. DirectX Diagnostic Tool
          3. Windows Catalog
        3. Driver Query
        4. Windows File Protection
          1. Windows File Protection Service
          2. System File Checker
      8. Networking Tools
        1. GetMac
        2. IP Config
        3. IP Security Monitor
          1. NetBT Statistics
        4. Netsh
        5. Netstat
        6. Network Connectivity Tester
        7. Network Diagnostics
        8. Network Monitor Capture Utility
        9. NSLookup
        10. PathPing
      9. Additional Resources
    4. D. Differences with Windows XP Home Edition
      1. Windows XP Home Edition Overview
      2. Comparing Windows XP Home Edition and Windows XP Professional Feature Differences
        1. Corporate Management
        2. Corporate Security
        3. Networking Features
        4. File System Features
        5. User Interface Features
        6. Advanced or Power-User Features
      3. Additional Resources
    5. E. Differences with Windows XP Media Center Edition 2005
      1. Not Quite a Superset of Windows XP Professional
      2. Availability
      3. Language Support
      4. Hardware
      5. Applications
    6. F. Differences with Windows XP Tablet PC Edition 2005
      1. Superset of Windows XP Professional
      2. Availability
      3. Language Support
      4. Tablet Input Panel
      5. Applications
        1. Sticky Notes
        2. Windows Journal
      6. Office Integration
    7. G. Differences with Windows XP Professional x64 Edition
      1. Overview of Windows XP Professional x64 Edition
      2. Feature Parity in Windows XP Professional x64 Edition
      3. Windows XP Professional x64 Edition Requirements
        1. System Requirements
      4. Additional Resources
    8. H. Accessibility Tools
      1. Customizing for Accessibility
        1. Windows Installer
        2. Group Policy
        3. User Profiles
        4. Customizing the Desktop
        5. Utility Manager
      2. Configuring Accessibility Features
      3. Setting Accessibility Options by Type of Disability
        1. Options for Users with Vision Impairments
          1. Microsoft Narrator
          2. Keyboard Audio Cues
          3. Magnifier
          4. Customizing Fonts
          5. Size and Color Schemes
          6. Mouse Pointers
          7. Insertion Point Indicator Blink Rate
          8. Sound Schemes
        2. Options for Users with Mobility Impairments
          1. Keyboard Options
          2. Keyboard Shortcuts
          3. Mouse Options
          4. SerialKeys
        3. Options for Users with Hearing Impairments
          1. ShowSounds
          2. SoundSentry
          3. NetMeeting
        4. Options for Users with Cognitive Disabilities
          1. Keyboard Filters
          2. Keyboard Shortcuts
          3. SerialKeys
          4. Snap To
        5. Options for Users Who Experience Seizures
          1. Timing Patterns
          2. Cursor Blink-Rate Options
          3. Sound Schemes
          4. Color and Contrast Settings
      4. Adding Assistive Technology Products
        1. Add-On Assistive Technology
        2. Finding Compatible Hardware and Software
        3. Using SerialKeys for Add-On Hardware and Software
      5. Additional Resources
    9. I. Interoperability Solutions
      1. Overview of Microsoft Interoperability Solutions for Windows XP Professional
      2. Interoperability with UNIX and Linux
      3. Interoperability with Novell NetWare
      4. Interoperability with IBM Host Systems
        1. Microsoft Host Integration Server
        2. Host Integration Server Client Software Components
      5. Interoperability with Apple Macintosh Systems
        1. Windows Server 2003 Services for Macintosh
        2. Microsoft Office for Apple Macintosh Operating Systems
        3. Microsoft Internet Applications for Apple Macintosh Computers
  11. Glossary
  12. System Requirements
  13. About the Authors
  14. Copyright