You are previewing Windows® 7 Resource Kit.
O'Reilly logo
Windows® 7 Resource Kit

Book Description

In-depth and comprehensive, this official RESOURCE KIT delivers the information you need to administer Windows 7 in the enterprise. You get authoritative technical guidance from those who know the technology best—Microsoft Most Valuable Professionals (MVPs) and the Windows 7 Team—along with hundreds of scripts and other essential resources on CD.

Get expert guidance on how to:

  • Apply best practices for using Microsoft Deployment Toolk

  • Plan user-state migration; test application compatibility; manage update

  • Manage Group Policy Objects using Windows PowerShell

  • Administer Windows Firewall and Windows BitLocker

  • Implement Ipsec, IPv6, wireless, and VPN connectivity

  • Install and configure printers, devices, and services

  • Manage disks, file systems, storage, and data security

  • Administer search and indexing with Group Policy

  • Diagnose and resolve startup, hardware, and networking issue


  • CD FEATURES:

  • Nearly 200 Windows PowerShell scripts created specifically for this book—customize to administer your environment

  • Windows 7 Resource Kit PowerShell Pack—700 cmdlets and functions to extend Windows in-box functionality

  • Links to author Web sites

  • Sample chapters from Microsoft Press books

  • Fully searchable eBook

  • For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

    Table of Contents

    1. Windows® 7 Resource Kit
    2. A Note Regarding Supplemental Files
    3. Acknowledgments
    4. Introduction
      1. Overview of the Book
      2. Document Conventions
        1. Readeraids
        2. Sidebars
        3. Command-Line Examples
      3. On the Companion Media
      4. Using the Windows 7 Resource Kit PowerShell Pack
      5. Using the Sample Windows PowerShell Scripts
      6. Disclaimer Concerning Windows PowerShell CD Content
      7. Resource Kit Support Policy
    5. I. Overview
      1. 1. Overview of Windows 7 Improvements
        1. Windows 7 Improvements by Chapter
          1. User Interactions
            1. Taskbar
            2. Jump Lists
            3. Notification Area
            4. Mouse Gestures
            5. Improved Alt+Tab
            6. Keyboard Shortcuts
            7. Tablet PC Improvements
            8. Touch Interface
            9. Libraries
            10. Search Improvements
            11. Search Federation
            12. Action Center
            13. XML Paper Specification
            14. Windows Internet Explorer 8
          2. Performance
            1. ReadyBoost
            2. BranchCache
            3. Solid-State Drives
            4. RemoteApp and Desktop Connections
            5. New PowerCfg –energy Option
            6. Process Reflection
          3. Mobility
            1. Improved Battery Life
            2. Adaptive Display Brightness
            3. View Available Networks
            4. Smart Network Power
            5. VPN Reconnect
            6. DirectAccess
            7. Wake on Wireless LAN
          4. Reliability and Supportability
            1. Starter Group Policy Objects
            2. Group Policy Preferences
            3. URL-Based Quality of Service
            4. Resource Monitor
            5. Windows PowerShell 2.0
            6. Fault-Tolerant Heap
          5. Troubleshooting
            1. Windows Troubleshooting Platform
            2. Problem Steps Recorder
            3. Program Compatibility Troubleshooter
            4. Folder Redirection and Offline Files
            5. Roaming User Profiles
            6. System Restore
            7. Windows Recovery Environment
            8. Unified Tracing
          6. Deployment
            1. Microsoft Deployment Toolkit 2010
            2. Windows Automated Installation Kit 2.0
            3. Windows PE 3.0
            4. Deployment Image Servicing and Management Tool
            5. User State Migration Tool
            6. VHD Boot
            7. Dynamic Driver Provisioning
            8. Multicast Multiple Stream Transfer
        2. Windows 7 Editions
          1. Windows 7 Starter
          2. Windows 7 Home Basic
          3. Windows 7 Home Premium
          4. Windows 7 Professional
          5. Windows 7 Enterprise
          6. Windows 7 Ultimate
        3. Choosing Software and Hardware
          1. Windows 7 Software Logo
          2. Hardware Requirements
        4. Summary
        5. Additional Resources
          1. Related Information
          2. On the Companion Media
      2. 2. Security in Windows 7
        1. Addressing Specific Security Concerns
          1. Help Desk Calls Related to Malware
            1. Protecting Against Bundling and Social Engineering
            2. Protecting Against Browser Exploit Malware Installations
            3. Protecting Against Network Worms
          2. Data Theft
            1. Physical Theft of a Mobile Computer or a Hard Disk, or Recovering Data from a Recycled or Discarded Hard Disk
            2. Copying Confidential Files to Removable Media
            3. Accidentally Printing, Copying, or Forwarding Confidential Documents
        2. Security Features Previously Introduced in Windows Vista
          1. Windows Defender
          2. Windows Firewall
          3. Encrypting File System
          4. Credential Manager Enhancements
          5. Architectural and Internal Security Improvements
            1. Code Integrity
            2. Windows Resource Protection
            3. Kernel Patch Protection
            4. Required Driver Signing
            5. Windows Service Hardening
            6. Network Access Protection Client
            7. Web Services for Management
            8. Crypto Next Generation Services
            9. Data Execution Prevention
            10. Address Space Layout Randomization
            11. New Logon Architecture
            12. Rights Management Services
            13. Multiple Local Group Policy Objects
        3. New and Improved Security Features of Windows 7
          1. BitLocker and BitLocker To Go
          2. AppLocker
          3. Multiple Active Firewall Profiles
          4. User Account Control
            1. Admin Approval Mode
            2. Enabling Non-Administrators to Make Configuration Changes
            3. UAC Improvements in Windows 7
          5. Internet Explorer Security Features
          6. Auditing Enhancements
          7. Safe Unlinking in the Kernel Pool
          8. Windows Biometric Framework
          9. Smart Cards
          10. Service Accounts
        4. Summary
        5. Additional Resources
          1. Related Information
          2. On the Companion Media
    6. II. Deployment
      1. 3. Deployment Platform
        1. Tools Introduction
        2. Windows 7 Deployment Terminology
        3. Platform Components
          1. Windows Imaging
          2. Answer Files
          3. Windows SIM
          4. Windows Setup
          5. Sysprep
          6. Windows PE
          7. Deployment Image Servicing and Management
          8. Other Tools
          9. Windows Deployment Services
          10. ImageX
        4. Deployment Scenarios
          1. Upgrade Computer Scenario
          2. New Computer Scenario
          3. Refresh Computer Scenario
          4. Replace Computer Scenario
        5. Understanding Setup
          1. Preinstallation Phase
          2. Online Configuration Phase
          3. Windows Welcome Phase
        6. Basic Deployment Process
        7. Microsoft Deployment Toolkit Process
        8. Summary
        9. Additional Resources
          1. Related Information
          2. On the Companion Media
      2. 4. Planning Deployment
        1. Using the Microsoft Deployment Toolkit
          1. Documentation
            1. Technical Guides
            2. Reference Guides
            3. Quick Start Guides
          2. Solution Framework
        2. Planning High-Volume Deployment
          1. Envision
          2. Project Planning
          3. Build
          4. Stabilize
          5. Deploy
        3. Planning Low-Volume Deployment
          1. Scope and Objectives
          2. Current Environment
          3. Configuration Plan
          4. Testing and Piloting
          5. Rolling Out
        4. Windows 7 Requirements
          1. Hardware Requirements
          2. Upgrade Paths
        5. Preparing for Development
          1. Application Management
          2. Image Engineering
          3. Deployment
          4. Infrastructure Remediation
          5. Operations Readiness
          6. Security
          7. Migration
        6. Installing the Microsoft Deployment Toolkit
        7. Starting Deployment Workbench
        8. Updating Microsoft Deployment Toolkit Components
        9. Summary
        10. Additional Resources
      3. 5. Testing Application Compatibility
        1. Understanding Compatibility
          1. What Compatibility Means
          2. Why Applications Fail
        2. Choosing the Best Tool
          1. Program Compatibility Assistant
          2. Program Compatibility Troubleshooter
          3. Application Compatibility Toolkit
          4. Windows XP Mode
          5. Application Virtualization
        3. Understanding the ACT
          1. Support Topologies
          2. Compatibility Evaluators
        4. Planning for the ACT
          1. Targeting Deployment
          2. Choosing a Deployment Method
          3. Choosing a Log File Location
        5. Preparing for the ACT
          1. Sharing the Log Processing Folder
          2. Preparing for Microsoft Compatibility Exchange
          3. Installing the ACT 5.5
          4. Configuring the ACM
        6. Collecting Compatibility Data
        7. Analyzing Compatibility Data
          1. Creating and Assigning Categories
          2. Prioritizing Compatibility Data
          3. Assessing Application Compatibility
          4. Setting the Deployment Status
          5. Managing Compatibility Issues
          6. Filtering Compatibility Data
          7. Synchronizing with the Compatibility Exchange Service
        8. Rationalizing an Application Inventory
          1. Identifying the Missing Applications
          2. Selecting Specific Application Versions
        9. Testing and Mitigating Issues
          1. Building a Test Lab
          2. Modeling the Production Environment
          3. Using the Standard User Analyzer
          4. Using the Compatibility Administrator
            1. Creating a Custom Compatibility Database
            2. Creating a Compatibility Fix
            3. Creating a Compatibility Mode
            4. Creating AppHelp Messages
          5. Deploying Application Mitigation Packages
        10. Summary
        11. Additional Resources
      4. 6. Developing Disk Images
        1. Getting Started
          1. Prerequisite Skills
          2. Lab Requirements
            1. Lab Hardware
            2. Network Services
            3. Installation Media
        2. Capturing Images Using Microsoft Deployment Toolkit
        3. Creating and Configuring a Deployment Share
          1. Adding Operating Systems
          2. Adding Applications
            1. Specifying Application Dependencies
            2. Installation Reboots
          3. Adding Packages
            1. Adding Updates
            2. Adding Language Packs
          4. Adding Out-of-Box Drivers
        4. Creating Task Sequences
        5. Editing a Task Sequence
          1. Configuring Group and Task Properties
          2. Configuring the Options Tab
            1. Task Sequence Variables
            2. if Statements
            3. Operating System Versions
            4. WMI Queries
          3. Updating the Deployment Share
        6. Capturing a Disk Image for LTI
        7. Preparing Images Manually
        8. Customizing Microsoft Deployment Toolkit
        9. Summary
        10. Additional Resources
      5. 7. Migrating User State Data
        1. Evaluating Migration Technologies
          1. Windows Easy Transfer
          2. User State Migration Tool
          3. Microsoft IntelliMirror
        2. Using Windows Easy Transfer
          1. Refresh Computer
          2. Replace Computer
        3. Planning User State Migration Using USMT
          1. Choosing Subject Matter Experts
          2. Identifying User State Data
            1. Operating System Settings
            2. Application Data and Settings
            3. Users' Documents
          3. Prioritizing Migration Tasks
          4. Choosing a Data Store Location
            1. Local Data Stores
            2. Remote Data Stores
            3. Removable Storage
          5. Automating USMT
          6. Testing User State Migration
            1. Creating a Lab Environment
            2. Choosing Sample Data
            3. Running the Test
            4. Validating the Test Results
        4. Installing USMT
          1. Network Share
          2. Windows PE Media
          3. Microsoft Deployment Toolkit
          4. Configuration Manager
        5. Understanding USMT Components
          1. Scanstate.exe
          2. Loadstate.exe
          3. Migration Files
        6. Developing Migration Files
          1. Customizing USMT
          2. Control File Syntax
          3. Deploying Migration Files
        7. Using USMT in Microsoft Deployment Toolkit
          1. Specifying the Data Store Location
          2. Adding Custom Migration Files
        8. Summary
        9. Additional Resources
      6. 8. Deploying Applications
        1. Preparing the Lab
        2. Planning Deployment
          1. Priorities
          2. Categories
          3. Installation Methods
          4. Subject Matter Experts
          5. Configurations
        3. Choosing a Deployment Strategy
          1. Thick Images
          2. Thin Images
          3. Hybrid Images
        4. Automating Installation
          1. Windows Installer
          2. InstallShield
          3. Legacy InstallShield
          4. Legacy InstallShield PackageForTheWeb
          5. Legacy Wise Installation System
          6. Windows Script Host
        5. Repackaging Legacy Applications
          1. The Repackaging Process
          2. Repackaging Tools
        6. Injecting in a Disk Image
          1. Adding Applications
          2. Creating Dependencies
          3. Installing Applications
        7. Summary
        8. Additional Resources
          1. Related Information
          2. On the Companion Media
      7. 9. Preparing Windows PE
        1. Exploring Windows PE
          1. Capabilities
          2. Limitations
          3. New Features of Windows PE 3.0
        2. Setting Up the Environment
          1. Installing the Windows AIK 2.0
          2. Configuring the Build Environment
          3. Removing the Build Environment
        3. Working with Windows PE
          1. Mounting Windows PE
          2. Adding Packages
          3. Copying Applications
          4. Adding Device Drivers
          5. Installing Updates
          6. Committing the Changes
          7. Creating Bootable Media
            1. Staging a Boot Image
            2. Creating Bootable CD/DVD Media
            3. Creating Bootable UFD Media
            4. Booting from a Hard Disk Drive
          8. Customizing Windows PE
        4. Automating Windows PE
          1. Automating with Unattend.xml
          2. Adding Images to Windows Deployment Services
        5. Using Windows PE with Microsoft Deployment Toolkit
        6. Summary
        7. Additional Resources
      8. 10. Configuring Windows Deployment Services
        1. Introducing Windows Deployment Services
          1. Service Architecture
            1. Image Store
            2. PXE Services
            3. Management
            4. Client
          2. Operating Modes
            1. Legacy Mode
            2. Mixed Mode
            3. Native Mode
        2. Planning for Windows Deployment Services
          1. Choosing a Version of Windows Deployment Services
            1. Supported Operating Systems
            2. Supported Image Types
            3. Boot Environment
            4. New Features of Windows Deployment Services in Windows Server 2008 R2
          2. Server Requirements
          3. Client Computer Requirements
          4. DHCP Requirements
          5. Routing Requirements
          6. Capacity Requirements
        3. Installing Windows Deployment Services
          1. Windows Server 2003
          2. Windows Server 2008 R2
        4. Configuring Windows Deployment Services
        5. Preparing Discover Images
        6. Importing Images
          1. Importing Boot Images
          2. Importing Install Images
        7. Managing and Deploying Driver Packages
          1. Deploying Driver Packages to Clients
            1. Deploying Driver Packages to Clients Using Method 1
            2. Deploying Driver Packages to Clients Using Method 2
            3. Deploying Driver Packages to Clients Using Method 3
          2. Managing Driver Groups and Driver Packages
          3. Adding Driver Packages to Boot Images
        8. Managing Image Security
          1. Pre-staging Client Computers
          2. Configuring Administrator Approval
        9. Installing Windows 7
        10. Capturing Custom Images
        11. Creating Multicast Transmissions
          1. Multicast Prerequisites
          2. Transmission Types
          3. Performing Multicast Deployment
        12. Using Windows Deployment Services with Microsoft Deployment Toolkit
        13. Summary
        14. Additional Resources
          1. Related Information
          2. On the Companion Media
      9. 11. Using Volume Activation
        1. Introduction
        2. Activation Options
          1. Retail
          2. Original Equipment Manufacturer
          3. Volume Licensing
        3. Key Management Service
          1. Minimum Computer Requirements
            1. KMS Activation Thresholds
            2. Activation Count Cache
          2. How KMS Works
            1. KMS Activation Renewal
            2. Publication of the KMS
            3. Client Discovery of the KMS
          3. Planning a KMS Deployment
            1. Planning DNS Server Configuration
            2. Activating the First KMS Host
            3. Activating Subsequent KMS Hosts
            4. Upgrading Existing KMS Hosts
            5. Planning KMS Clients
            6. Activating as a Standard User
        4. Multiple Activation Key
          1. Volume Activation Management Tool
          2. MAK Architecture
        5. Volume Activation Scenarios
          1. Core Network
          2. Isolated Networks
            1. High-Security Zone
            2. Branch Office Locations
          3. Individual Disconnected Computers
          4. Test/Development Labs
        6. What If Systems Are Not Activated?
          1. Grace Period
          2. Grace Period Expiration
        7. Product Keys
        8. Summary
        9. Additional Resources
          1. Related Information
          2. On the Companion Media
      10. 12. Deploying with Microsoft Deployment Toolkit
        1. Introducing MDT 2010
          1. Deployment Scenarios
          2. Resource Access
        2. Using LTI with MDT 2010
          1. Replicating a Deployment Share
          2. Preparing Windows Deployment Services
          3. Configuring Resources
          4. Configuring CustomSettings.ini
          5. Automating the LTI Process
          6. Performing LTI Deployments
        3. Customizing MDT 2010
          1. Configuring Multiple Computers
            1. Selecting a Grouping Method
            2. Applying the Properties to the Groups
          2. Configuring Individual Computers
            1. Selecting an Identification Method
            2. Applying the Properties to Individual Computers
          3. Customizing CustomSettings.ini
          4. Customizing BootStrap.ini
          5. Using the MDT 2010 Database
            1. Creating the MDT 2010 Database
            2. Configuring the MDT 2010 Database
            3. Configuring the Database Access
        4. Summary
        5. Additional Resources
    7. III. Desktop Management
      1. 13. Overview of Management Tools
        1. Included Tools
          1. Group Policy
          2. Windows Management Instrumentation
          3. Windows PowerShell
          4. Windows Remote Management
          5. Command-Line Tools
          6. Remote Desktop
        2. Downloadable Tools
          1. Microsoft Network Monitor
          2. Microsoft Baseline Security Analyzer
          3. Microsoft IPsec Diagnostic Tool
          4. Windows NT Backup-Restore Utility
        3. Windows Sysinternals Suite
        4. Windows 7 Enterprise and the Microsoft Desktop Optimization Pack
          1. Microsoft Application Virtualization
          2. Microsoft Advanced Group Policy Management
          3. Microsoft Asset Inventory Service
          4. Microsoft Diagnostics and Recovery Toolset
          5. Microsoft Enterprise Desktop Virtualization
          6. Microsoft System Center Desktop Error Monitoring
        5. Microsoft System Center
          1. System Center Configuration Manager
          2. System Center Operations Manager
          3. System Center Data Protection Manager
          4. System Center Virtual Machine Manager
          5. System Center Essentials
        6. Introduction to Windows PowerShell Scripting
          1. Working with Windows PowerShell Cmdlets
          2. Using the Pipeline to Read Text Files
          3. Additional Pipeline Techniques
            1. Use the Pipeline to Avoid Positional Errors
            2. Use the Pipeline to Filter Results
            3. Use the Pipeline to Take Action
          4. Working with Cmdlets
            1. Filtering Cmdlet Output
            2. Understanding Cmdlet Output Objects
          5. Scripting Fundamentals
            1. Running Windows PowerShell Scripts
            2. Enabling Windows PowerShell Scripting Support
            3. Transitioning from the Command Line to Script
          6. Using the while Statement
            1. Constructing the while Statement
              1. UNDERSTANDING EXPANDING STRINGS
              2. UNDERSTANDING LITERAL STRINGS
            2. A Practical Example of Using the while Statement
            3. Using the Special Features of Windows PowerShell
          7. Using the do…while Statement
            1. Using the range Operator
            2. Operating over an Array
            3. Casting to ASCII Values
          8. Using the do…until Statement
            1. Comparing the VBScript Do…Until…Loop Statement
            2. Using the Windows PowerShell do…loop Statement
              1. The Do…While and Do…Until Statements Always Run Once
              2. THE WHILE STATEMENT IS USED TO PREVENT UNWANTED EXECUTION
          9. The for Statement
            1. Using the for Statement
            2. Using the foreach Statement
              1. USING THE FOREACH STATEMENT FROM THE WINDOWS POWERSHELL CONSOLE
            3. Exiting the foreach Statement Early
              1. USING THE BREAK STATEMENT
              2. USING THE EXIT STATEMENT
          10. The if Statement
            1. Using Assignment and Comparison Operators
            2. Evaluating Multiple Conditions
          11. The switch Statement
            1. Using the switch Statement
              1. DEFINING THE DEFAULT CONDITION
              2. UNDERSTANDING MATCHING
              3. EVALUATING AN ARRAY
            2. Controlling Matching Behavior
          12. Understanding Modules
          13. Including Functions
            1. Using Dot-Sourcing
            2. Using Dot-Sourced Functions
          14. Adding Help for Functions
            1. Using the here-string Technique for Help
            2. Using –help Function Tags to Produce Help
          15. Locate and Load Modules
            1. Listing Available Modules
            2. Loading Modules
          16. Install Modules
            1. Creating a Modules Folder
            2. Working with the $modulePath Variable
            3. Creating a Module Drive
        7. Summary
        8. Additional Resources
          1. Related Information
            1. Related Information on In-box Tools
            2. Related Information on Downloadable Tools
            3. Related Information on Windows Sysinternals Tools
            4. Related Information on MDOP for Software Assurance
            5. Related Information on Microsoft System Center
            6. Related Information on Learning Windows PowerShell
          2. On the Companion Media
      2. 14. Managing the Desktop Environment
        1. Understanding Group Policy in Windows 7
          1. Group Policy Before Windows Vista
          2. Group Policy in Windows Vista and Windows Server 2008
          3. New Group Policy Features in Windows 7 and Windows Server 2008 R2
          4. Group Policy Policy Settings in Windows 7
          5. Understanding ADMX Template Files
            1. Types of ADMX Template Files
            2. Local Storage of ADMX Template Files
            3. Domain Storage of ADMX Template Files
            4. Considerations When Working with ADMX Template Files
          6. Understanding Multiple Local Group Policy
            1. Types of MLGPOs
            2. MLGPOs and Group Policy Processing
        2. Managing Group Policy
          1. Configuring the Central Store
          2. Adding ADMX Templates to the Store
          3. Creating and Managing GPOs
            1. Obtaining the GPMC
            2. Using Starter GPOs
            3. Creating and Managing GPOs Using the GPMC
            4. Creating and Managing GPOs Using Windows PowerShell
          4. Editing GPOs
            1. Configuring Policy Settings
            2. Configuring Preference Items
          5. Managing MLGPOs
          6. Migrating ADM Templates to ADMX Format
            1. Converting ADM Template Files to ADMX Format
            2. Creating and Editing Custom ADMX Template Files
          7. Configuring Group Policy Processing
          8. Using Advanced Group Policy Management
        3. Troubleshooting Group Policy
          1. Using Event Viewer
          2. Enabling Debug Logging
          3. Using Group Policy Log View
          4. Using GPResult
        4. Summary
        5. Additional Resources
          1. Related Information
          2. On the Companion Media
      3. 15. Managing Users and User Data
        1. Understanding User Profiles in Windows 7
          1. Types of User Profiles
          2. User Profile Namespace
            1. User Profile Namespace in Windows XP
            2. User Profile Namespace in Windows Vista and Windows 7
            3. Application Compatibility Issues
            4. Disabling Known Folders
        2. Understanding Libraries
          1. Working with Libraries
            1. Including Indexed Folders in a Library
            2. Adding Nonindexed Remote Locations to a Library
            3. Creating Additional Libraries
            4. Customizing Libraries
            5. Viewing Libraries
          2. Managing Libraries
        3. Implementing Corporate Roaming
          1. Understanding Roaming User Profiles and Folder Redirection
            1. Understanding Roaming User Profiles in Earlier Versions of Windows
            2. Understanding Folder Redirection in Earlier Versions of Windows
            3. Enhancements to Roaming User Profiles and Folder Redirection Previously Introduced in Windows Vista
            4. Additional Enhancements to Roaming User Profiles and Folder Redirection Introduced in Windows 7
              1. BACKGROUND REGISTRY ROAMING
              2. IMPROVED FIRST LOGON PERFORMANCE WITH FOLDER REDIRECTION
          2. Implementing Folder Redirection
            1. Configuring the Redirection Method
            2. Configuring Target Folder Location
            3. Configuring Redirection Options
            4. Configuring Policy Removal Options
            5. Folder Redirection and Sync Center
            6. Considerations for Mixed Environments
            7. Additional Group Policy Settings for Folder Redirection
            8. Troubleshooting Folder Redirection
          3. Implementing Roaming User Profiles
            1. Creating a Default Network Profile
            2. Configuring a User Account to Use a Roaming Profile
            3. Implementing Mandatory Profiles
            4. Implementing Super-Mandatory Profiles
            5. Using Roaming User Profiles with Folder Redirection
            6. Considerations for Mixed Environments
            7. Managing User Profiles Using Group Policy
        4. Working with Offline Files
          1. Enhancements to Offline Files Introduced Previously in Windows Vista
          2. Additional Enhancements to Offline Files Introduced in Windows 7
          3. Understanding Offline File Sync
            1. Modes of Operation in Offline Files
          4. Managing Offline Files
            1. Managing Offline Files Using Windows Explorer
            2. Managing Offline Files Using the Offline Files Control Panel
            3. Managing Offline Files Using Sync Center
            4. Configuring Offline Files on the Server
            5. Managing Offline Files Using Group Policy
              1. OFFLINE FILES POLICY SETTINGS INTRODUCED IN WINDOWS VISTA
              2. ADDITIONAL OFFLINE FILES POLICY SETTINGS FOR WINDOWS 7
        5. Summary
        6. Additional Resources
          1. Related Information
          2. On the Companion Media
      4. 16. Managing Disks and File Systems
        1. Overview of Partitioning Disks
          1. How to Choose Between MBR or GPT
          2. Converting from MBR to GPT Disks
          3. GPT Partitions
          4. Choosing Basic or Dynamic Disks
        2. Working with Volumes
          1. How to Create a Simple Volume
          2. How to Create a Spanned Volume
          3. How to Create a Striped Volume
          4. How to Resize a Volume
          5. How to Delete a Volume
          6. How to Create and Use a Virtual Hard Disk
        3. File System Fragmentation
        4. Backup And Restore
          1. How File Backups Work
          2. File and Folder Backup Structure
          3. How System Image Backups Work
          4. How to Start a System Image Backup from the Command Line
          5. How to Restore a System Image Backup
          6. System Image Backup Structure
          7. Best Practices for Computer Backups
          8. How to Manage Backup Using Group Policy Settings
          9. Previous Versions and Shadow Copies
            1. How Volume Shadow Copy Works
            2. How to Manage Shadow Copies
            3. How to Restore a File with Previous Versions
            4. How to Configure Previous Versions with Group Policy Settings
        5. Windows ReadyBoost
        6. BitLocker Drive Encryption
          1. How BitLocker Encrypts Data
          2. How BitLocker Protects Data
            1. TPM (Use BitLocker Without Additional Keys)
            2. TPM with External Key (Require Startup USB Key At Every Startup)
            3. TPM with PIN (Require PIN At Every Startup)
            4. TPM with PIN and External Key
            5. External Key (Require Startup USB Key At Every Startup)
            6. Recovery Password
            7. Clear Key
          3. BitLocker To Go
          4. BitLocker Phases
          5. Requirements for Protecting the System Volume with BitLocker
          6. How to Enable the Use of BitLocker on the System Volume on Computers Without TPM
          7. How to Enable BitLocker Encryption on System Volumes
          8. How to Enable BitLocker Encryption on Data Volumes
          9. How to Manage BitLocker Keys on a Local Computer
          10. How to Manage BitLocker from the Command Line
          11. How to Recover Data Protected by BitLocker
          12. How to Disable or Remove BitLocker Drive Encryption
          13. How to Decommission a BitLocker Drive Permanently
          14. How to Prepare AD DS for BitLocker
          15. How to Configure a Data Recovery Agent
          16. How to Manage BitLocker with Group Policy
          17. The Costs of BitLocker
        7. Encrypting File System
          1. How to Export Personal Certificates
          2. How to Import Personal Certificates
          3. How to Grant Users Access to an Encrypted File
        8. Symbolic Links
          1. How to Create Symbolic Links
          2. How to Create Relative or Absolute Symbolic Links
          3. How to Create Symbolic Links to Shared Folders
          4. How to Use Hard Links
        9. Disk Quotas
          1. How to Configure Disk Quotas on a Single Computer
          2. How to Configure Disk Quotas from a Command Prompt
          3. How to Configure Disk Quotas by Using Group Policy Settings
        10. Disk Tools
          1. Disk Usage
          2. EFSDump
          3. SDelete
          4. Streams
          5. Sync
          6. MoveFile and PendMoves
        11. Summary
        12. Additional Resources
          1. Related Information
          2. On the Companion Media
      5. 17. Managing Devices and Services
        1. Understanding Device Installation and Management
          1. Device Enhancements in Windows 7
          2. Understanding Device Installation
            1. Driver Store and Driver Packaging
            2. Driver Staging vs. Installation
              1. DRIVER STAGING AND INSTALLATION PROCESS
              2. DETAILED INSTALLATION PROCESS
            3. Managing Driver Packages
              1. USING PNPUTIL.EXE
              2. USING DISM.EXE
            4. Driver Signing
            5. Driver Ranking
          3. Installing and Using Devices
            1. Enhancements to the Device Installation Experience in Windows 7
              1. SCENARIO 1: DRIVER FOUND IN DRIVER STORE
              2. SCENARIO 2: DRIVER FOUND ON WINDOWS UPDATE
              3. SCENARIO 3: DRIVER IN DRIVER STORE, BUT BETTER DRIVER ON WINDOWS UPDATE
              4. SCENARIO 4: DRIVER IS FOUND SOMEWHERE IN THE CONFIGURED DEVICE PATH
              5. SCENARIO 5: NO DRIVER CAN BE FOUND FOR THE DEVICE
              6. SCENARIO 6: VENDOR-SUPPLIED MEDIA IS AVAILABLE
              7. SCENARIO 7: ADDITIONAL DEVICE SOFTWARE IS AVAILABLE FOR DOWNLOAD FROM VENDOR
              8. CONFIGURING DEVICE INSTALLATION SETTINGS
            2. Using the Devices And Printers Folder
            3. Understanding Device Stage
            4. Understanding the Device Experience Architecture
              1. DEVICE CONTAINERS
              2. DEVICE DISPLAY OBJECT
              3. DEVICE METADATA SYSTEM
          4. Managing Device Installation Using Group Policy
            1. Managing Device Installation Behavior
            2. Managing Driver Installation Behavior
            3. Blocking Installation of Removable Devices
            4. Managing Device Redirection Behavior
          5. Troubleshooting Device Installation
            1. Using Event Logs
            2. Using WinSAT
            3. Using Windows Error Reporting
            4. Using the SetupAPI Log File
            5. Using Driver INF Files
            6. Using Device Manager Error Codes
            7. Using Driver Verifier
            8. Repairing Driver Store Corruption
            9. Repairing Index File Corruption
        2. Understanding Power Management
          1. Power Management Enhancements in Windows 7
          2. Configuring Power Management Settings
            1. Configuring Power Management Settings Using the Power Options Utility in Control Panel
            2. Configuring Power Management Settings Using Group Policy
            3. Configuring Power Management Settings Using the Powercfg Utility
            4. Configuring Power Management Settings Using the Power WMI Provider
        3. Understanding Services
          1. Service Enhancements in Windows 7
          2. Managing Services
            1. Managing Services Using the Services Snap-in
            2. Managing Services Using Task Manager
            3. Managing Services Using Group Policy
            4. Managing Services Using the Sc.exe Command
        4. Summary
        5. Additional Resources
          1. Related Information
          2. On the Companion Media
      6. 18. Managing Printing
        1. Enhancements to Printing in Windows 7
          1. Printing Enhancements Previously Introduced in Windows Vista
          2. Additional Printing Enhancements in Windows 7
        2. How Printing Works in Windows 7
          1. Understanding XPS
          2. Understanding the Windows Printing Subsystem
          3. Understanding Printer Driver Isolation
        3. Understanding the Print Management Console
          1. Enhancements to the Print Management Console in Windows 7
          2. The Print Management Console
          3. Adding and Removing Print Servers
          4. Configuring Default Security for Print Servers
          5. Adding Printers Using the Network Printer Installation Wizard
          6. Creating and Using Printer Filters
          7. Creating and Using Driver Filters
        4. Managing Printers Using Print Management
          1. Configuring Properties of Printers
          2. Publishing Printers in AD DS
          3. Managing Printer Drivers
          4. Configuring Printer Driver Isolation Mode
            1. Configuring Printer Driver Isolation Mode Using the Print Management Console
            2. Configuring Printer Driver Isolation Mode Using Group Policy
            3. Troubleshooting Driver Isolation
          5. Exporting and Importing Print Server Configurations
          6. Performing Bulk Actions Using Print Management
        5. Client-Side Management of Printers
          1. Installing Printers Using the Add Printers Wizard
          2. Searching for Printers
          3. Installing Printers Using Point and Print
          4. Using Devices And Printers
          5. Using Location-Aware Printing
          6. Using the Color Management CPL
        6. Managing Client-Side Printer Experience Using Group Policy
          1. Configuring the Add Printer Wizard
          2. Disable Client-Side Printer Rendering
          3. Configuring Package Point and Print Restrictions
          4. Extending Point and Print Using Windows Update
        7. Deploying Printers Using Group Policy
          1. Preparing to Deploy Printers
          2. Deploying a Printer Connection
          3. Limitations of Deploying Printers Using Group Policy
          4. Assigning Printers Based on Location
        8. Migrating Print Servers
          1. Migrate Print Servers Using Print Management
          2. Migrating Print Servers Using PrintBRM
        9. Monitoring and Troubleshooting Printers
          1. Configuring E-Mail Notifications
          2. Configuring Print Server Notifications
          3. Configuring Script Actions
          4. Configuring Detailed Event Logging
        10. Summary
        11. Additional Resources
          1. Related Information
          2. On the Companion Media
      7. 19. Managing Search
        1. Search and Indexing Enhancements
          1. Search in Windows XP
          2. Search in Windows Vista
          3. Search in Windows 7
          4. Understanding the Windows Search Versions
            1. Search Versions Included in Windows 7 and Windows Vista
            2. Search Versions Included in Windows Server 2008
            3. Search Versions Available for Earlier Versions of Windows
        2. How Windows Search Works
          1. Understanding Search Engine Terminology
          2. Windows Search Engine Processes
          3. Enabling the Indexing Service
          4. Windows Search Engine Architecture
          5. Understanding the Catalog
            1. Default System Exclusion Rules
            2. Default Indexing Scopes
            3. Initial Configuration
          6. Understanding the Indexing Process
            1. Types of Files Indexed
            2. Modifying IFilter Behavior
            3. How Indexing Works
              1. REBUILDING THE INDEX
              2. VIEWING INDEXING PROGRESS
          7. Understanding Remote Search
        3. Managing Indexing
          1. Configuring the Index
            1. Configuring the Index Location Using Control Panel
            2. Configuring the Index Location Using Group Policy
            3. Configuring Indexing Scopes Using Control Panel
            4. Configuring Indexing Scopes and Exclusions Using Group Policy
          2. Configuring Offline Files Indexing
            1. Configuring Offline Files Indexing Using Control Panel
            2. Configuring Offline Files Indexing Using Group Policy
          3. Configuring Indexing of Encrypted Files
            1. Configuring Indexing of Encrypted Files Using Control Panel
            2. Configuring Indexing of Encrypted Files Using Group Policy
          4. Configuring Indexing of Similar Words
            1. Configuring Indexing of Similar Words Using Control Panel
            2. Configuring Indexing of Similar Words Using Group Policy
          5. Configuring Indexing of Text in TIFF Image Documents
            1. Configuring Indexing of Text in TIFF Image Documents Using Control Panel
            2. Configuring Indexing of Text in TIFF Image Documents Using Group Policy
          6. Other Index Policy Settings
        4. Using Search
          1. Configuring Search Using Folder Options
            1. Configuring What to Search
            2. Configuring How To Search
            3. Configuring What Happens When Searching Nonindexed Locations
          2. Using Start Menu Search
          3. Searching Libraries
          4. Using Federated Search
            1. How Federated Search Works
            2. Deploying Search Connectors
        5. Troubleshooting Search and Indexing Using the Built-in Troubleshooter
        6. Summary
        7. Additional Resources
          1. Related Information
          2. On the Companion Media
      8. 20. Managing Windows Internet Explorer
        1. Internet Explorer 8 Improvements
          1. InPrivate Browsing
          2. InPrivate Filtering
          3. Compatibility View
          4. SmartScreen
          5. Domain Highlighting
          6. Tab Isolation
          7. Accelerators
        2. Improvements Previously Introduced in Internet Explorer 7
          1. User Interface Changes
          2. Tabbed Browsing
          3. Search Bar
            1. How to Create a Web Link to Add a Custom Search Provider
            2. How to Configure Custom Search Providers Using the Registry
            3. How to Configure Custom Search Providers Using Group Policy
            4. How to Use the Internet Explorer Administration Kit to Configure Custom Search Providers
          4. RSS Feeds
          5. Improved Standards Support
          6. Expanded Group Policy Settings
          7. Defending Against Malware
            1. Protected Mode
              1. HOW PROTECTED MODE IMPROVES SECURITY
              2. HOW THE PROTECTED MODE COMPATIBILITY LAYER WORKS
              3. HOW TO SOLVE PROTECTED MODE INCOMPATIBILITIES
            2. Windows Defender
            3. URL-Handling Protection
            4. Address Bar Visibility
            5. Cross-Domain Scripting Attack Protection
            6. Controlling Browser Add-ons
              1. INTERNET EXPLORER ADD-ONS DISABLED MODE
              2. ADD-ON MANAGER IMPROVEMENTS
              3. CONTROLLING ADD-ONS USING GROUP POLICY
          8. Protecting Against Data Theft
            1. Security Status Bar
            2. Phishing
              1. HOW THE SMARTSCREEN FILTER WORKS
              2. HOW TO CONFIGURE SMARTSCREEN OPTIONS
            3. Deleting Browsing History
            4. Blocking IDN Spoofing
          9. Security Zones
            1. Understanding Zones
            2. Configuring Zones on the Local Computer
            3. Configuring Zones Using Group Policy
            4. Network Protocol Lockdown
        3. Managing Internet Explorer Using Group Policy
          1. Group Policy Settings for Internet Explorer 7 and Internet Explorer 8
          2. New Group Policy Settings for Internet Explorer 8
        4. Using the Internet Explorer Administration Kit
        5. Troubleshooting Internet Explorer Problems
          1. Internet Explorer Does Not Start
          2. An Add-on Does Not Work Properly
          3. Some Web Pages Do Not Display Properly
          4. Preventing Unwanted Toolbars
          5. The Home Page or Other Settings Have Changed
        6. Summary
        7. Additional Resources
          1. Related Information
          2. On the Companion Media
    8. IV. Desktop Maintenance
      1. 21. Maintaining Desktop Health
        1. Performance Monitoring
          1. Improvements to Performance Monitoring in Windows 7
          2. Using Performance Monitor
            1. Real-Time Performance Monitoring
            2. Performance Monitor Logging
            3. Creating a Data Collector Set
            4. Configuring a Data Collector Set
            5. Using Data Manager to View Performance Data
            6. Starting and Stopping Data Logging
            7. Viewing Performance Data
            8. Comparing Performance Monitor Logs
            9. Performance Monitor User Rights
            10. Remote Data Collection
            11. Managing Performance Logs and Event Trace Sessions with Logman
            12. Using Windows PowerShell for Performance Monitoring
        2. Resource Monitor
          1. Overview Tab
          2. CPU Tab
          3. Memory Tab
          4. Disk Tab
          5. Network Tab
        3. Reliability Monitor
          1. How Reliability Monitor Works
        4. Windows Performance Tools Kit
        5. Event Monitoring
          1. Understanding the Windows Event Architecture
          2. Channels
          3. Improvements to Event Monitoring in Windows 7
          4. Using Event Viewer
            1. Understanding Views
            2. Viewing Event Logs
            3. Saving Event Logs
            4. Configuring Event Subscriptions
              1. CONSIDERATIONS FOR WORKGROUP ENVIRONMENTS
              2. CREATING A NEW SUBSCRIPTION
          5. Using the Windows Events Command-Line Utility for Event Monitoring
          6. Using Windows PowerShell for Event Monitoring
        6. Using Task Scheduler
          1. Improvements to Task Scheduler in Windows 7
          2. Understanding Tasks
          3. Understanding the Task Scheduler Architecture
          4. Understanding Task Scheduler Security
            1. Credentials Management
            2. User Security
            3. Security Concepts
            4. Securing Running Tasks
            5. Registration Permissions Matrix
          5. Understanding AT and Task Scheduler v1.0 Compatibility Modes
          6. Understanding the Task Scheduler Snap-in
          7. Understanding Default Tasks
          8. Creating Tasks
            1. Defining Triggers
              1. ON A SCHEDULE TRIGGER
              2. AT LOG ON TRIGGER
              3. AT STARTUP TRIGGER
              4. ON IDLE TRIGGER
              5. ON AN EVENT TRIGGER
              6. AT TASK CREATION/MODIFICATION TRIGGER
              7. ON CONNECTION TO AND DISCONNECT FROM USER SESSION TRIGGERS
              8. ON WORKSTATION LOCK AND UNLOCK TRIGGERS
            2. Defining Actions
            3. Defining Conditions
            4. Defining Settings
          9. Managing Tasks
            1. Displaying Running Tasks
            2. Viewing History
            3. Exporting Tasks
            4. Importing Tasks
          10. Using SchTasks.exe for Creating and Managing Tasks
            1. Command Syntax
            2. Command Parameters
            3. Creating Tasks
            4. Deleting Tasks
            5. Running Tasks
            6. Ending Tasks
            7. Querying Tasks
            8. Changing Tasks
          11. Task Scheduler Events
            1. Task Registration
            2. Task Launch
            3. Task Execution
            4. Task Completion
          12. Troubleshooting Task Scheduler
            1. Tasks Won't Run If the Service Is Not Started
            2. The Task Did Not Run at the Expected Time
            3. The Task Will Run Only If All Conditions Are Met
            4. The Task Will Run Only When a Certain User Is Logged On
            5. The Task Executed a Program But the Program Did Not Run Correctly
            6. The Task Failed to Start
            7. The Task Action Failed to Execute
            8. The Program Specified in the Task Requires Elevated Privileges
          13. Interpreting Result and Return Codes
        7. Understanding the Windows System Assessment Tool
          1. Understanding WinSAT Assessment Tests
          2. Examining the WinSAT Features Assessment
          3. Running WinSAT from the Command Line
          4. Understanding WinSAT Command Exit Values
          5. Running WinSAT Using Performance Information and Tools
            1. System Capabilities Section
            2. OEM Upsell And Help Section
            3. Accessing Advanced Performance Tools
        8. Understanding Windows Error Reporting
          1. Overview of Windows Error Reporting
          2. How WER Works
            1. Report Processor
            2. Data Collection Module
            3. Transport System
            4. Store Management System
              1. USER STORE
              2. COMPUTER STORE
              3. REPORTQUEUE FOLDER
              4. REPORTARCHIVE FOLDER
              5. QUEUE REPORTING
              6. STORE MAINTENANCE
              7. QUEUE TRIGGERS
            5. WER Service
          3. Understanding the Error Reporting Cycle
            1. Reporting
            2. Categorization
            3. Investigation
            4. Resolution
            5. Response
          4. Understanding WER Data
            1. First-Level Data
            2. Second-Level Data
          5. Configuring WER Using Group Policy
          6. Configuring WER Using the Action Center
        9. Summary
        10. Additional Resources
          1. Related Information
          2. On the Companion Media
      2. 22. Supporting Users with Remote Assistance
        1. Understanding Remote Assistance
          1. Improvements to Remote Assistance in Windows 7
          2. How Remote Assistance Works
            1. Remote Assistance Operational States
            2. User vs. Helper Functionality
            3. Remote Assistance and NAT Traversal
            4. Remote Assistance and IP Ports Used
            5. Remote Assistance and Windows Firewall
            6. Remote Assistance and the Secure Desktop
            7. Remote Assistance Logging
              1. PURPOSE OF REMOTE ASSISTANCE SESSION LOGGING
              2. SESSION LOG PATH AND NAMING CONVENTION
          3. Using Remote Assistance in the Enterprise
            1. Using Remote Assistance in the Corporate Help Desk Environment
            2. Other Possible Remote Assistance Usage Scenarios
          4. Interoperability with Remote Assistance in Windows Vista
          5. Interoperability with Remote Assistance in Windows XP
        2. Implementing and Managing Remote Assistance
          1. Initiating Remote Assistance Sessions
            1. Initiating Remote Assistance from the GUI
            2. Initiating Remote Assistance from the Command Line
          2. Scenario 1: Soliciting Remote Assistance Using Easy Connect
          3. Scenario 2: Soliciting Remote Assistance by Creating Remote Assistance Tickets and Saving Them on Monitored Network Shares
          4. Scenario 3: Offering Remote Assistance Using DCOM
          5. Managing Remote Assistance Using Group Policy
          6. Configuring Remote Assistance in Unmanaged Environments
          7. Additional Registry Settings for Configuring Remote Assistance
        3. Summary
        4. Additional Resources
          1. Related Information
          2. On the Companion Media
      3. 23. Managing Software Updates
        1. Methods for Deploying Updates
          1. Windows Update Client
          2. Windows Server Update Services
          3. System Center Configuration Manager 2007 R2
        2. Manually Installing, Scripting, and Removing Updates
          1. Overview of Windows 7 Update Files
          2. How to Script Update Installations
          3. How to Remove Updates
          4. Deploying Updates to New Computers
        3. Managing BITS
          1. BITS Behavior
          2. BITS Group Policy Settings
          3. Managing BITS with Windows PowerShell
        4. Windows Update Group Policy Settings
        5. Configuring Windows Update to Use a Proxy Server
        6. Tools for Auditing Software Updates
          1. The MBSA Console
          2. MBSACLI
        7. Troubleshooting the Windows Update Client
        8. The Process of Updating Network Software
          1. Assembling the Update Team
          2. Inventorying Software
          3. Creating an Update Process
            1. Discovering Updates
            2. Evaluating Updates
            3. Retrieving Updates
            4. Testing Updates
            5. Installing Updates
            6. Removing Updates
            7. Auditing Updates
        9. How Microsoft Distributes Updates
          1. Security Updates
          2. Update Rollups
          3. Service Packs
          4. Microsoft Product Life Cycles
        10. Summary
        11. Additional Resources
          1. Related Information
          2. On the Companion Media
      4. 24. Managing Client Protection
        1. Understanding the Risk of Malware
        2. User Account Control
          1. UAC for Standard Users
          2. UAC for Administrators
          3. UAC User Interface
          4. How Windows Determines Whether an Application Needs Administrative Privileges
            1. How to Control UAC Using Application Properties
            2. How UAC Examines the Application Manifest
            3. UAC Heuristics
          5. UAC Virtualization
          6. UAC and Startup Programs
          7. Compatibility Problems with UAC
          8. How to Configure UAC
            1. Group Policy Settings
            2. Control Panel
            3. Msconfig.exe
          9. How to Configure Auditing for Privilege Elevation
          10. Other UAC Event Logs
          11. Best Practices for Using UAC
        3. AppLocker
          1. AppLocker Rule Types
          2. Auditing AppLocker Rules
          3. DLL Rules
          4. Custom Error Messages
          5. Using AppLocker with Windows PowerShell
        4. Using Windows Defender
          1. Understanding Windows Defender
            1. Automatic Scanning
            2. Real-Time Protection
          2. Windows Defender Alert Levels
          3. Understanding Microsoft SpyNet
          4. Configuring Windows Defender Group Policy
          5. Configuring Windows Defender on a Single Computer
          6. How to Determine Whether a Computer Is Infected with Spyware
          7. Best Practices for Using Windows Defender
          8. How to Troubleshoot Problems with Unwanted Software
        5. Network Access Protection
        6. Forefront
        7. Summary
        8. Additional Resources
          1. On the Companion Media
    9. V. Networking
      1. 25. Configuring Windows Networking
        1. Usability Improvements
          1. Network And Sharing Center
          2. Network Explorer
            1. How Windows Finds Network Resources
            2. How Windows Publishes Network Resources
            3. How Windows Creates the Network Map
          3. Network Map
          4. Set Up A Connection Or Network Wizard
        2. Manageability Improvements
          1. Network Location Types
          2. Policy-Based QoS
            1. Selecting DSCP Values
            2. Planning Traffic Throttling
            3. Configuring QoS Policies
            4. Configuring System-Wide QoS Settings
            5. Configuring Advanced QoS Settings
            6. Testing QoS
          3. Windows Firewall and IPsec
          4. Windows Connect Now
        3. Core Networking Improvements
          1. BranchCache
            1. BranchCache Architectures
            2. How Hosted Cache Works
            3. How Distributed Cache Works
            4. Configuring BranchCache
            5. BranchCache Protocols
            6. File Sharing Using SMB
            7. Web Browsing with HTTP (Including HTTPS)
          2. DNSsec
          3. GreenIT
          4. Efficient Networking
          5. Scalable Networking
          6. Improved Reliability
          7. IPv6 Support
          8. 802.1X Network Authentication
          9. Server Message Block (SMB) 2.0
          10. Strong Host Model
          11. Wireless Networking
        4. Improved APIs
          1. Network Awareness
          2. Improved Peer Networking
            1. Services Used by Peer-to-Peer Networking
            2. Managing Peer-to-Peer Networking
          3. EAPHost Architecture
          4. Layered Service Provider (LSP)
          5. Windows Sockets Direct Path for System Area Networks
        5. How to Configure Wireless Settings
          1. Configuring Wireless Settings Manually
          2. Using Group Policy to Configure Wireless Settings
          3. Configuring Wireless Settings from the Command Line or a Script
        6. How to Configure TCP/IP
          1. DHCP
          2. Configuring IP Addresses Manually
          3. Command Line and Scripts
        7. How to Connect to AD DS Domains
          1. How to Connect to a Domain When 802.1X Authentication Is Not Enabled
          2. How to Connect to a Domain When 802.1X Authentication Is Enabled
        8. Summary
        9. Additional Resources
          1. Related Information
          2. On the Companion Media
      2. 26. Configuring Windows Firewall and IPsec
        1. Understanding Windows Firewall with Advanced Security
          1. Improvements to Windows Firewall Introduced Previously in Windows Vista
          2. Additional Improvements to Windows Firewall in Windows 7
          3. Understanding the Windows Filtering Platform
            1. Windows Firewall and the Startup Process
          4. Understanding Windows Service Hardening
            1. Understanding Service SIDs
            2. Windows Firewall and WSH
            3. Windows Firewall and Service Triggers
          5. Understanding Multiple Active Firewall Profiles
          6. Understanding Rules
            1. Understanding Firewall Rules
              1. INBOUND VS. OUTBOUND RULES
              2. ALLOW VS. BLOCK RULES
              3. ALLOW IF SECURE RULES
              4. AUTHENTICATED BYPASS RULES
              5. Filtering Conditions for Firewall Rules
            2. Understanding Connection Security Rules
              1. TYPES OF CONNECTION SECURITY RULES
              2. SUPPORTED IPSEC SETTINGS FOR CONNECTION SECURITY RULES
              3. DEFAULT IPSEC SETTINGS FOR CONNECTION SECURITY RULES
            3. Understanding Default Rules
            4. Understanding WSH Rules
            5. Understanding Rules Processing
        2. Managing Windows Firewall with Advanced Security
          1. Tools for Managing Windows Firewall with Advanced Security
            1. Managing Windows Firewall Using Control Panel
            2. Managing Windows Firewall Using the Windows Firewall with Advanced Security Snap-in
            3. Managing Windows Firewall Using Group Policy
              1. CONSIDERATIONS WHEN MANAGING WINDOWS FIREWALL USING GROUP POLICY
            4. Managing Windows Firewall Using the Netsh Command
          2. Common Management Tasks
            1. Enabling or Disabling Windows Firewall
            2. Configuring Firewall Profiles and IPsec Settings by Using Group Policy
            3. Creating and Configuring Firewall Rules
            4. Creating and Configuring Connection Security Rules
            5. Monitoring Windows Firewall
            6. Troubleshooting Windows Firewall
              1. TROUBLESHOOTING WINDOWS FIREWALL USING FIREWALL LOGS
              2. TROUBLESHOOTING WINDOWS FIREWALL USING EVENT LOGS
              3. TROUBLESHOOTING WINDOWS FIREWALL USING AUDITING
              4. TROUBLESHOOTING IPSEC ISSUES USING NETSH WFP
              5. TROUBLESHOOTING WINDOWS FILTERING PLATFORM AND IPSEC ISSUES USING NETSH TRACE
        3. Summary
        4. Additional Resources
          1. Related Information
          2. On the Companion Media
      3. 27. Connecting Remote Users and Networks
        1. Enhancements for Connecting Remote Users and Networks in Windows 7
          1. Understanding IKEv2
          2. Understanding MOBIKE
          3. Understanding VPN Reconnect
            1. Protocols and Features of VPN Reconnect
            2. How VPN Reconnect Works
          4. Understanding DirectAccess
            1. Benefits of DirectAccess
            2. How DirectAccess Works
              1. ACTIVE DIRECTORY DOMAIN SERVICES
              2. WINDOWS 7 AND WINDOWS SERVER 2008 R2
              3. IPv6
              4. IPSEC
              5. PUBLIC KEY INFRASTRUCTURE
              6. PERIMETER FIREWALL EXCEPTIONS
              7. SMART CARDS
            3. Implementing DirectAccess
          5. Understanding BranchCache
            1. Benefits of BranchCache
            2. How BranchCache Works
            3. Protocols Supported by BranchCache
            4. Implementing BranchCache
        2. Supported Connection Types
          1. Outgoing Connection Types
          2. Incoming Connection Types
          3. Deprecated Connection Types
        3. Configuring VPN Connections
          1. Supported Tunneling Protocols
          2. Comparing the Different Tunneling Protocols
          3. Understanding Cryptographic Enhancements
            1. Support for AES
            2. Weak Cryptography Removal from PPTP/L2TP
            3. Supported Authentication Protocols
          4. Understanding the VPN Connection Negotiation Process
          5. Creating and Configuring VPN Connections
            1. Creating a VPN Connection
            2. Initiating a Connection
            3. Terminating a Connection
            4. Viewing Connection Details
            5. Configuring a VPN Connection
            6. Configuring Security Settings for a VPN Connection
              1. CONFIGURING THE TUNNELING PROTOCOL(S) USED
              2. CONFIGURING ADVANCED CONNECTION SETTINGS
              3. CONFIGURING THE DATA ENCRYPTION LEVEL
              4. CONFIGURING THE AUTHENTICATION METHOD USED
              5. CONFIGURING AUTHENTICATION FOR IKEV2 CONNECTIONS
              6. CONFIGURING MOBILITY FOR IKEV2 CONNECTIONS
        4. Configuring Dial-Up Connections
          1. Creating a Dial-Up Connection
          2. Configuring a Dial-Up Connection
          3. Advanced Connection Settings
          4. Configuring Incoming Connections
        5. Managing Connections Using Group Policy
        6. Using Remote Desktop
          1. Understanding Remote Desktop
            1. Understanding Remote Desktop Protocol
              1. VERSIONS OF RDP
              2. RDP 6.1 FEATURES AND ENHANCEMENTS
              3. RDP 7.0 NEW FEATURES AND ENHANCEMENTS
              4. REMOTEAPP AND DESKTOP CONNECTION
            2. Understanding RDC
            3. Understanding Remote Desktop Services Terminology
          2. Configuring and Using Remote Desktop
            1. Enabling Remote Desktop and Authorizing Users on a Single Computer
            2. Enabling Remote Desktop Using Group Policy
            3. Configuring and Deploying Remote Desktop Connection
            4. Configuring Remote Desktop Connection from the Command Line
            5. Configuring Remote Desktop Connection Using Notepad
            6. Configuring Remote Desktop Using Group Policy
            7. Establishing a Remote Desktop Session
            8. Improving Remote Desktop Performance
            9. Troubleshooting Remote Desktop Sessions
          3. Configuring and Using RemoteApp and Desktop Connection
        7. Summary
        8. Additional Resources
          1. Related Information
          2. On the Companion Media
      4. 28. Deploying IPv6
        1. Understanding IPv6
          1. Understanding IPv6 Terminology
          2. Understanding IPv6 Addressing
            1. Understanding IPv6 Prefixes
            2. Understanding IPv6 Address Types
            3. Understanding Unicast Addresses
            4. Identifying IPv6 Address Types
            5. Understanding Interface Identifiers
            6. Comparing IPv6 with IPv4
          3. Understanding IPv6 Routing
            1. How IPv6 Routing Works
            2. IPv6 Route Determination Process
            3. IPv6 Routing Table Structure
          4. Understanding ICMPv6 Messages
          5. Understanding Neighbor Discovery
          6. Understanding Address Autoconfiguration
          7. Understanding Name Resolution
            1. Understanding Name Queries
            2. Understanding Name Registration
        2. IPv6 Enhancements in Windows 7
          1. Summary of IPv6 Enhancements in Windows 7
        3. Configuring and Troubleshooting IPv6 in Windows 7
          1. Displaying IPv6 Address Settings
          2. Configuring IPv6 in Windows 7 Using the User Interface
          3. Configuring IPv6 in Windows 7 Using Netsh
          4. Other IPv6 Configuration Tasks
            1. Enabling or Disabling IPv6
            2. Disabling Random Interface IDs
            3. Resetting IPv6 Configuration
            4. Displaying Teredo Client Status
          5. Troubleshooting IPv6 Connectivity
        4. Planning for IPv6 Migration
          1. Understanding ISATAP
          2. Migrating an Intranet to IPv6
            1. Step 1: Upgrading Your Applications and Services
            2. Step 2: Preparing Your DNS Infrastructure
            3. Step 3: Upgrading Your Hosts
            4. Step 4: Migrating from IPv4-only to ISATAP
            5. Step 5: Upgrading Your Routing Infrastructure
            6. Step 6: Upgrading Your DHCP Infrastructure
            7. Step 7: Migrating from ISATAP to Native IPv6
        5. Summary
        6. Additional Resources
          1. Related Information
          2. On the Companion Media
    10. VI. Troubleshooting
      1. 29. Configuring Startup and Troubleshooting Startup Issues
        1. What's New with Windows Startup
          1. Boot Configuration Data
          2. System Recovery
          3. Windows Boot Performance Diagnostics
        2. Understanding the Startup Process
          1. Power-on Self Test Phase
          2. Initial Startup Phase
            1. Initial Startup Phase for BIOS Computers
            2. Initial Startup Phase for EFI Computers
          3. Windows Boot Manager Phase
          4. Windows Boot Loader Phase
          5. Kernel Loading Phase
            1. Control Sets
            2. Session Manager
          6. Logon Phase
        3. Important Startup Files
        4. How to Configure Startup Settings
          1. How to Use the Startup And Recovery Dialog Box
          2. How to Use the System Configuration Tool
          3. How to Use BCDEdit
            1. How to Interpret BCDEdit Output
            2. How to Back Up and Restore Settings
            3. How to Change the Default Operating System Entry
            4. How to Change the Boot Menu Time-Out
            5. How to Change the Order of Boot Manager Menu Items
            6. How to Create an Entry for Another Operating System
            7. How to Remove a Boot Entry
            8. How to View and Update Global Debugger Settings
          4. How to Remove the Windows 7 Boot Loader
          5. How to Configure a User Account to Automatically Log On
          6. How to Disable the Windows Startup Sound
          7. How to Speed Up the Startup Process
        5. The Process of Troubleshooting Startup
          1. Startup Troubleshooting Before the Starting Windows Logo Appears
            1. How to Run Startup Repair
              1. HOW TO START THE SYSTEM RECOVERY TOOLS
              2. HOW TO RUN STARTUP REPAIR
            2. How to Use BootRec.exe
            3. How to Diagnose Hardware Problems
            4. How to Use System Restore
            5. How to Manually Repair the Boot Sector
            6. How to Manually Update the BCD Registry File
            7. How to Manually Replace Files
            8. How to Reinstall Windows
          2. Startup Troubleshooting After the Starting Windows Logo Appears
            1. How to Run Startup Repair
            2. How to Restore the Last Known Good Configuration
            3. How to Use System Restore
            4. How to Enable Boot Logging
            5. How to Start in Safe Mode
            6. How to Identify Failing Drivers and Services
              1. HOW TO ANALYZE STARTUP PROBLEMS IN SAFE MODE
              2. HOW TO USE DEVICE MANAGER TO VIEW OR CHANGE RESOURCES
              3. HOW TO ANALYZE BOOT LOGS
            7. How to Roll Back Drivers
            8. How to Temporarily Disable a Service
          3. Troubleshooting Startup Problems After Logon
            1. How to Temporarily Disable Startup Applications and Processes
              1. HOW TO DISABLE STARTUP APPLICATIONS USING THE SHIFT KEY
              2. HOW TO DISABLE STARTUP PROGRAMS USING THE SYSTEM CONFIGURATION UTILITY
              3. HOW TO DISABLE STARTUP APPLICATIONS CONFIGURED USING GROUP POLICY OR LOGON SCRIPTS
            2. How to Permanently Disable Startup Applications and Processes
              1. UNINSTALL THE APPLICATION
              2. MANUALLY REMOVE THE ENTRY
        6. Summary
        7. Additional Resources
          1. Related Information
          2. On the Companion Media
      2. 30. Troubleshooting Hardware, Driver, and Disk Issues
        1. Windows 7 Improvements for Hardware and Driver Troubleshooting
          1. Windows Troubleshooting Platform
            1. Built-in Troubleshooting Packs
            2. Windows Troubleshooting Platform Components
            3. Creating Custom Troubleshooting Packs
            4. Running Troubleshooting Packs Remotely
          2. Reliability Monitor
          3. Resource Monitor
          4. Windows Memory Diagnostics
          5. Disk Failure Diagnostics
          6. Self-Healing NTFS
          7. Improved Driver Reliability
          8. Improved Error Reporting
        2. The Process of Troubleshooting Hardware Issues
          1. How to Troubleshoot Problems That Prevent Windows from Starting
          2. How to Troubleshoot Problems Installing New Hardware
          3. How to Troubleshoot Problems with Existing Hardware
          4. How to Troubleshoot Unpredictable Symptoms
        3. How to Diagnose Hardware Problems
          1. How to Use Device Manager to Identify Failed Devices
          2. How to Check the Physical Setup of Your Computer
          3. How to Check the Configuration of Your Hardware
          4. How to Verify That System Firmware and Peripheral Firmware Are Up to Date
          5. How to Test Your Hardware by Running Diagnostic Tools
            1. How to Simplify Your Hardware Configuration
          6. How to Diagnose Disk-Related Problems
        4. How to Use Built-In Diagnostics
          1. How to Use Reliability Monitor
          2. How to Use Event Viewer
          3. How to Use Data Collector Sets
          4. How to Use Windows Memory Diagnostics
            1. How Windows Automatically Detects Memory Problems
            2. How to Schedule Windows Memory Diagnostics
            3. How to Start Windows Memory Diagnostics When Windows Is Installed
            4. How to Start Windows Memory Diagnostics from the Windows DVD
            5. How to Configure Windows Memory Diagnostics
        5. How to Troubleshoot Disk Problems
          1. How to Prepare for Disk Failures
          2. How to Use ChkDsk
            1. ChkDsk Examples
            2. ChkDsk Syntax
            3. How to Use the Graphical ChkDsk Interface
            4. How to Determine Whether ChkDsk Is Scheduled to Run
            5. ChkDsk Process on NTFS Volumes
          3. How to Use the Disk Cleanup Wizard
          4. How to Disable Nonvolatile Caching
        6. How to Troubleshoot Driver Problems
          1. How to Find Updated Drivers
          2. How to Roll Back Drivers
          3. How to Use Driver Verifier
          4. How to Use the File Signature Verification
          5. How to Use Device Manager to View and Change Resource Usage
        7. How to Use System Restore
        8. How to Troubleshoot USB Problems
          1. How to Solve USB Driver and Hardware Problems
          2. Understanding USB Limitations
          3. How to Identify USB Problems Using Performance Monitor
          4. How to Examine USB Hubs
        9. How to Troubleshoot Bluetooth Problems
        10. Troubleshooting Tools
          1. DiskView
          2. Handle
          3. Process Monitor
        11. Summary
        12. Additional Resources
          1. Related Information
          2. On the Companion Media
      3. 31. Troubleshooting Network Issues
        1. Tools for Troubleshooting
          1. Arp
            1. How to Identify a Problem with the ARP Cache
            2. How to Clear the ARP Cache
            3. Event Viewer
          2. IPConfig
          3. Nblookup
          4. Nbtstat
          5. Net
            1. How to View Shared Folders on the Local Computer
            2. How to View Shared Folders on Another Computer
          6. Netstat
          7. Network Monitor
          8. Nslookup
            1. Verifying that the Default DNS Server Resolves Correctly
            2. Verifying that a Specific DNS Server Resolves Correctly
            3. Verifying Specific Types of Addresses
          9. PathPing
            1. PathPing Output
            2. Routing Loops
            3. Performance Problems
            4. Possible Connectivity Issues
            5. No Connectivity Issues
          10. Performance Monitor
          11. Data Collector Sets
          12. Resource Monitor
          13. Ping
          14. PortQry
            1. Identifying the TCP Port for a Service
            2. Testing Service Connectivity
            3. Determining Available Remote Management Protocols
          15. Route
          16. Task Manager
          17. TCPView
          18. Telnet Client
          19. Testing Service Connectivity
          20. Test TCP
          21. Windows Network Diagnostics
        2. The Process of Troubleshooting Network Problems
          1. How to Troubleshoot Network Connectivity Problems
          2. How to Troubleshoot Application Connectivity Problems
          3. How to Troubleshoot Name Resolution Problems
            1. How to Verify Connectivity to a DNS Server
            2. How to Use the Hosts File
          4. How to Troubleshoot Performance Problems and Intermittent Connectivity Issues
          5. How to Troubleshoot Joining or Logging on to a Domain
            1. How to Analyze the NetSetup.Log file
            2. How to Verify Requirements for Joining a Domain
          6. How to Troubleshoot Network Discovery
          7. How to Troubleshoot File and Printer Sharing
            1. How to Troubleshoot File and Printer Sharing from the Client
            2. How to Troubleshoot File and Printer Sharing from the Server
          8. How to Troubleshoot Wireless Networks
          9. How to Troubleshoot Firewall Problems
        3. Summary
        4. Additional Resources
          1. Related Information
          2. On the Companion Media
      4. 32. Troubleshooting Stop Messages
        1. Stop Message Overview
          1. Identifying the Stop Error
          2. Finding Troubleshooting Information
          3. Stop Messages
            1. Bugcheck Information
            2. Recommended User Action
            3. Technical Information
            4. Driver Information
            5. Debug Port and Dump Status Information
          4. Types of Stop Errors
        2. Memory Dump Files
          1. Configuring Small Memory Dump Files
          2. Configuring Kernel Memory Dump Files
          3. Configuring Complete Memory Dump Files
          4. How to Manually Initiate a Stop Error and Create a Dump File
          5. Using Memory Dump Files to Analyze Stop Errors
            1. Using Windows Error Reporting
            2. Using Symbol Files and Debuggers
        3. Being Prepared for Stop Errors
          1. Prevent System Restarts After a Stop Error
          2. Record and Save Stop Message Information
          3. Check Software Disk Space Requirements
          4. Install a Kernel Debugger and Symbol Files
        4. Common Stop Messages
          1. Stop 0xA or IRQL_NOT_LESS_OR_EQUAL
            1. Interpreting the Message
            2. Resolving the Problem
          2. Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED
            1. Interpreting the Message
            2. Resolving the Problem
          3. Stop 0x24 or NTFS_FILE_SYSTEM
            1. Interpreting the Message
            2. Resolving the Problem
          4. Stop 0x2E or DATA_BUS_ERROR
            1. Interpreting the Message
            2. Resolving the Problem
          5. Stop 0x3B or SYSTEM_SERVICE_EXCEPTION
            1. Interpreting the Message
            2. Resolving the Problem
          6. Stop 0x3F or NO_MORE_SYSTEM_PTES
            1. Interpreting the Message
            2. Resolving the Problem
          7. Stop 0x50 or PAGE_FAULT_IN_NONPAGED_AREA
            1. Interpreting the Message
            2. Resolving the Problem
          8. Stop 0x77 or KERNEL_STACK_INPAGE_ERROR
            1. Interpreting the Message
            2. Resolving the Problem
          9. Stop 0x7A or KERNEL_DATA_INPAGE_ERROR
            1. Interpreting the Message
            2. Resolving the Problem
          10. Stop 0x7B or INACCESSIBLE_BOOT_DEVICE
            1. Interpreting the Message
            2. Resolving the Problem
          11. Stop 0x7F or UNEXPECTED_KERNEL_MODE_TRAP
            1. Interpreting the Message
            2. Resolving the Problem
          12. Stop 0x9F or DRIVER_POWER_STATE_FAILURE
            1. Interpreting the Message
            2. Resolving the Problem
          13. Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY
            1. Interpreting the Message
            2. Resolving the Problem
          14. Stop 0xC2 or BAD_POOL_CALLER
            1. Interpreting the Message
            2. Resolving the Problem
          15. Stop 0xCE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS
            1. Interpreting the Message
            2. Resolving the Problem
          16. Stop 0xD1 or IRQL_NOT_LESS_OR_EQUAL
            1. Interpreting the Message
            2. Resolving the Problem
          17. Stop 0xD8 or DRIVER_USED_EXCESSIVE_PTES
            1. Interpreting the Message
            2. Resolving the Problem
          18. Stop 0xEA or THREAD_STUCK_IN_DEVICE_DRIVER
            1. Interpreting the Message
            2. Resolving the Problem
          19. Stop 0xED or UNMOUNTABLE_BOOT_VOLUME
            1. Interpreting the Message
            2. Resolving the Problem
          20. Stop 0xFE or BUGCODE_USB_DRIVER
            1. Interpreting the Message
            2. Resolving the Problem
          21. Stop 0x00000124
            1. Resolving the Problem
          22. Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED
            1. Interpreting the Message
            2. Resolving the Problem
          23. Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH
            1. Interpreting the Message
            2. Resolving the Problem
        5. Hardware Malfunction Messages
        6. Stop Message Checklist
          1. Check Your Software
            1. Check Software Disk Space Requirements
            2. Use the Last Known Good Configuration
            3. Use Disaster Recovery Features
            4. Restart the System in Safe Mode
            5. Use Startup Repair
            6. Check Event Viewer Logs
            7. Check Application and Driver Compatibility
            8. Install Compatible Antivirus Tools
            9. Check for and Install Service Pack Updates
            10. Report Your Errors
            11. Install Operating System and Driver Updates
            12. Check Information Sources
            13. Install and Use a Kernel Debugger
          2. Check Your Hardware
            1. Restore a Previous Configuration
            2. Check for Nondefault Firmware Settings
            3. Check for Non-Default Hardware Clock Speeds
            4. Check for Hardware-Related Updates
            5. Check by Running Hardware Diagnostic Tools
            6. Check ATA Disk and Controller Settings
            7. Check for SCSI Disk and Controller Settings
            8. Check for Proper Hardware Installation and Connections
            9. Check Memory Compatibility
            10. Check by Temporarily Removing Devices
            11. Check by Replacing a Device
            12. Check Information Sources
            13. Contact Technical Support
        7. Summary
        8. Additional Resources
          1. Related Information
          2. On the Companion Media
    11. A. Accessibility in Windows 7
      1. Ease of Access Center
        1. Additional Accessibility Features
        2. Using the Ease of Access Center
        3. Using Magnifier
        4. Using Narrator
        5. Using the On-Screen Keyboard
        6. Ease of Access Keyboard Shortcuts
      2. Windows Speech Recognition
      3. Assistive Technology Products
      4. Microsoft Accessibility Resource Centers
      5. Additional Resources
    12. Glossary
    13. Index
    14. B. About the Authors
    15. C. System Requirements
    16. About the Authors
    17. Copyright