Windows Vista® Resource Kit, Second Edition

Book description

Get the definitive reference for deploying, configuring, and supporting Windows Vista with expert insights from Microsoft Most Valuable Professionals (MVPs) and the Windows Vista Team at Microsoft. With additions and updates for SP1, this official Microsoft RESOURCE KIT provides more than 1,700 pages of in-depth technical guidance on automating deployment; implementing security enhancements, including Windows® Firewall and Windows Defender; administering Group Policy, files, folders, programs, and devices; using Windows Internet Explorer® 7; configuring network connections; and troubleshooting. You also get more than 170 timesaving scripts to help automate administrative tasks, additional job aids, and an eBook of the entire RESOURCE KIT with bonus chapters on a companion DVD.
Key Book Benefits

Provides the information that every Windows administrator needs about troubleshooting, security enhancements, group policy, and automating administration from the experts who know the technology best Includes new coverage and updates related to SP1 Features Direct from the Source sidebar contributions from more than 100 members of the Windows Vista team CD includes 170+ scripts, tools, and job aids, and a fully searchable version of the entire RESOURCE KIT book

Table of contents

  1. Windows Vista® Resource Kit, Second Edition
  2. A Note Regarding Supplemental Files
  3. Foreword to the Second Edition
  4. Acknowledgments
  5. Introduction
    1. Overview of Book
    2. Document Conventions
      1. Reader Aids
      2. Sidebars
      3. Command-Line Examples
    3. Companion CD
    4. Using the VBScript Scripts
    5. Using the Windows PowerShell Scripts
    6. Disclaimer Concerning Scripts
    7. Resource Kit Support Policy
  6. I. Overview
    1. 1. Overview of Windows Vista Improvements
      1. What’s New
        1. User Interactions
          1. Start Menu
          2. New Explorers
          3. ClearType
          4. User Interfaces
          5. Windows Sidebar and Gadgets
          6. Internet Explorer
          7. Speech Recognition
          8. Help and Support
          9. Media Sharing
          10. XPS
        2. Performance
          1. ReadyBoost
          2. ReadyDrive
          3. Networking
          4. SuperFetch
          5. Automatic Disk Defragmentation
          6. Windows Experience Index
          7. Low-Priority I/O
        3. Mobility
          1. Windows Mobility Center
          2. Sleep
          3. Improved Battery Meter
          4. Presentation Settings
          5. Network Projection
          6. Sync Center
          7. Windows SideShow
          8. Offline Files
        4. Tablet PC
          1. Pen Improvements
          2. Improvements to Tablet PC Input Panel
          3. Handwriting Recognition Improvements
        5. Deployment
        6. Reliability and Supportability
          1. Backups
          2. Disk Partitioning
          3. Reduced Restarts
          4. Improved Driver Reliability
          5. System File and Registry Protection
          6. Supportability
          7. Roaming Profiles and Folder Redirection
        7. Troubleshooting
          1. Repairing Unbootable Computers
          2. Built-in Diagnostics
          3. Recovering from Service Crashes
          4. Reliability Analysis Component
        8. Architecture Improvements
      2. Windows Vista Service Pack 1 Improvements
      3. Windows Vista Editions
        1. Windows Vista Starter
        2. Windows Vista Home Basic
        3. Windows Vista Home Premium
        4. Windows Vista Business
        5. Windows Vista Enterprise
        6. Windows Vista Ultimate
      4. Choosing Hardware
        1. Windows Vista Logos
        2. Hardware Requirements
      5. Summary
      6. Additional Resources
        1. Related Information
        2. On the Companion CD
    2. 2. Security in Windows Vista
      1. Addressing Specific Security Concerns with Windows Vista
        1. Wireless Networks
        2. Help Desk Calls Related to Malware
          1. Protecting Against Bundling and Social Engineering
          2. Protecting Against Browser Exploit Malware Installations
          3. Protecting Against Network Worms
        3. Data Theft
          1. Physical Theft of a Mobile Computer or a Hard Disk, or Recovering Data from a Recycled or Discarded Hard Disk
          2. Copying Confidential Files to Removable Media
          3. Accidentally Printing, Copying, or Forwarding Confidential Documents
      2. New and Improved Windows Vista Security Features
        1. User Account Control (UAC)
          1. Admin Approval Mode
          2. Enabling Non-Administrators to Make Configuration Changes
        2. Windows Defender
        3. Windows Firewall
        4. Internet Explorer Security Features
        5. BitLocker
        6. Encrypting File System (EFS)
        7. Auditing Enhancements
        8. Smart Card Improvements
        9. Credential Manager Enhancements
      3. Architectural and Internal Windows Vista Security Improvements
        1. Code Integrity (CI)
        2. Windows Resource Protection (WRP)
        3. Kernel Patch Protection
        4. Required Driver Signing
        5. Windows Service Hardening
        6. Authorization Manager
        7. Network Access Protection Client
        8. Web Services for Management
        9. Crypto Next Generation (CNG) Services
        10. Data Execution Prevention (DEP)
        11. Address Space Layout Randomization (ASLR)
        12. New Logon Architecture
        13. Rights Management Services (RMS)
        14. Multiple Local Group Policy Objects
      4. Summary
      5. Additional Resources
        1. Related Information
        2. On the Companion CD
  7. II. Deployment
    1. 3. Deployment Platform
      1. Tools Introduction
      2. Windows Vista Deployment Terminology
      3. Platform Components
        1. Windows Imaging
        2. Answer Files
        3. Windows SIM
        4. Windows Setup
        5. Sysprep
        6. Windows PE
        7. Other Tools
        8. Windows DS
        9. ImageX
      4. Deployment Scenarios
        1. Upgrade Computer Scenario
        2. New Computer Scenario
        3. Replace Computer Scenario
      5. Understanding Setup
        1. Preinstallation Phase
        2. Online Configuration Phase
        3. Windows Welcome Phase
      6. Basic Deployment Process
      7. Microsoft Deployment Toolkit Process
      8. Summary
      9. Additional Resources
        1. Related Information
        2. On the Companion CD
    2. 4. Planning Deployment
      1. Using Microsoft Deployment Toolkit for Planning
        1. Planning Guide
          1. Envisioning
          2. Planning
          3. Developing
          4. Stabilizing
          5. Deploying
        2. Feature Team Guides
        3. Solution Framework
        4. Job Aids
      2. Planning Low-Volume Deployment
        1. Scope and Objectives
        2. Current Environment
        3. Configuration Plan
        4. Testing and Piloting
        5. Rolling Out
      3. Windows Vista Requirements
        1. Hardware Requirements
        2. Upgrade Paths
      4. Preparing for Development
        1. Application Management
        2. Image Engineering
        3. Deployment
        4. Infrastructure Remediation
        5. Operations Readiness
        6. Security
        7. Migration
      5. Installing Microsoft Deployment Toolkit
      6. Starting Deployment Workbench
      7. Updating Microsoft Deployment Toolkit Components
      8. Summary
      9. Additional Resources
        1. Related Information
    3. 5. Testing Application Compatibility
      1. Understanding Compatibility
        1. What Compatibility Means
        2. Why Applications Fail
      2. Choosing the Best Tool
        1. Program Compatibility Assistant
        2. Program Compatibility Wizard
        3. Application Compatibility Toolkit
        4. Application Virtualization
      3. Understanding the ACT
        1. Support Topologies
        2. Compatibility Evaluators
      4. Planning for ACT
        1. Targeting Deployment
        2. Choosing a Deployment Method
        3. Choosing a Log File Location
      5. Preparing for the ACT
        1. Sharing the Log Processing Folder
        2. Preparing for Microsoft Compatibility Exchange
        3. Installing the ACT 5.0
        4. Configuring the ACM
      6. Collecting Compatibility Data
      7. Analyzing Compatibility Data
        1. Creating and Assigning Categories
        2. Prioritizing Compatibility Data
        3. Assessing Application Compatibility
        4. Setting the Deployment Status
        5. Managing Compatibility Issues
        6. Filtering Compatibility Data
        7. Synchronizing with the Compatibility Exchange Service
      8. Rationalizing an Application Inventory
        1. Identifying the Missing Applications
        2. Selecting Specific Application Versions
      9. Testing and Mitigating Issues
        1. Building a Test Lab
        2. Modeling the Production Environment
        3. Using the Standard User Analyzer
        4. Using the Compatibility Administrator
          1. Creating a Custom Compatibility Database
          2. Creating a Compatibility Fix
          3. Creating a Compatibility Mode
          4. Creating AppHelp Messages
        5. Deploying Application Mitigation Packages
      10. Summary
      11. Additional Resources
        1. Related Information
    4. 6. Developing Disk Images
      1. Getting Started
        1. Prerequisite Skills
        2. Lab Requirements
          1. Lab Hardware
          2. Network Services
          3. Installation Media
      2. Capturing Images with Microsoft Deployment Toolkit
      3. Navigating Deployment Workbench
      4. Creating a Distribution Share
      5. Configuring the Distribution Share
        1. Adding Windows Vista
        2. Adding Applications
          1. Specifying Application Dependencies
          2. Installation Reboots
        3. Adding Packages
          1. Adding Updates
          2. Adding Language Packs
        4. Adding Out-of-Box Drivers
      6. Creating Task Sequences
      7. Editing a Task Sequence
        1. Configuring Group and Task Properties
        2. Configuring the Options Tab
          1. Task Sequence Variables
          2. If Statements
          3. Operating System Versions
          4. WMI Queries
      8. Creating the Lab Deployment Point
        1. Configuring the Deployment Point
        2. Updating the Deployment Point
      9. Capturing a Disk Image for LTI
      10. Capturing a Disk Image for ZTI
        1. Creating an Image Capture CD
        2. Preparing the Image for Capture
        3. Capturing the Image
      11. Manually Preparing Images
      12. Customizing Microsoft Deployment Toolkit
      13. Summary
      14. Additional Resources
        1. Related Information
        2. On the Companion CD
    5. 7. Migrating User State Data
      1. Evaluating Migration Technologies
        1. Windows Easy Transfer
        2. User State Migration Tool
        3. Microsoft IntelliMirror
      2. Using Windows Easy Transfer
        1. Refresh Computer
        2. Replace Computer
      3. Planning User State Migration Using USMT
        1. Choosing Subject Matter Experts
        2. Identifying User State Data
          1. Operating System Settings
          2. Application Data and Settings
          3. Users’ Documents
        3. Prioritizing Migration Tasks
        4. Choosing a Data Store Location
          1. Local Data Stores
          2. Networked Data Stores
          3. Removable Storage
        5. Automating USMT
        6. Testing User State Migration
          1. Creating a Lab Environment
          2. Choosing Sample Data
          3. Running the Test
          4. Validating the Test Results
      4. Installing USMT
        1. Local Installation
        2. Network Staging
        3. Microsoft Deployment Toolkit
        4. System Center Configuration Manager 2007
      5. Understanding USMT Components
        1. Scanstate.exe
        2. Loadstate.exe
        3. XML Migration Files
      6. Developing Migration Files
        1. Customizing USMT
        2. Control File Syntax
        3. Deploying Migration Files
      7. Using USMT in Microsoft Deployment Toolkit
        1. Downloading USMT Components
        2. Specifying the Data Store Location
        3. Adding Custom Migration Files
      8. Summary
      9. Additional Resources
        1. Related Information
        2. On the Companion CD
    6. 8. Deploying Applications
      1. Preparing the Lab
      2. Planning Deployment
        1. Priorities
        2. Categories
        3. Installation Methods
        4. Subject Matter Experts
        5. Configurations
      3. Choosing a Deployment Strategy
        1. Thick Images
        2. Thin Images
        3. Hybrid Images
      4. Automating Installation
        1. Windows Installer
        2. InstallShield
        3. Legacy InstallShield
        4. Legacy InstallShield PackageForTheWeb
        5. Legacy Wise Installation System
        6. Windows Script Host
      5. Repackaging Legacy Applications
        1. The Repackaging Process
        2. Repackaging Tools
      6. Injecting in a Disk Image
        1. Adding Applications
        2. Creating Dependencies
        3. Installing Applications
      7. Summary
      8. Additional Resources
        1. Related Information
        2. On the Companion CD
    7. 9. Preparing Windows PE
      1. Exploring Windows PE
        1. Capabilities
        2. Limitations
        3. New Features
      2. Setting up the Environment
        1. Installing the Windows AIK
        2. Configuring the Build Environment
        3. Removing the Build Environment
      3. Working with Windows PE
        1. Applying Windows PE
        2. Adding Optional Components
        3. Copying Applications
        4. Adding Device Drivers
        5. Installing Updates
        6. Prepping the Image
        7. Capturing the Image
        8. Creating Bootable Media
          1. Staging a Boot Image
          2. Creating Bootable CD/DVD Media
          3. Creating Bootable UFD Media
          4. Booting from a Hard Disk Drive
        9. Customizing Windows PE
      4. Automating Windows PE
        1. Automating with Unattend.xml
        2. Adding Images to Windows DS
      5. Using Windows PE with Microsoft Deployment Toolkit
      6. Summary
      7. Additional Resources
        1. Related Information
        2. On the Companion CD
    8. 10. Configuring Windows DS
      1. Introducing Windows DS
        1. Service Architecture
          1. Image Store
          2. PXE Services
          3. Management
          4. Client
        2. Operating Modes
          1. Legacy Mode
          2. Mixed Mode
          3. Native Mode
      2. Planning for Windows DS
        1. Server Requirements
        2. Client Requirements
        3. DHCP Requirements
        4. Routing Requirements
        5. Capacity Requirements
      3. Installing Windows DS
        1. Windows Server 2003
        2. Windows Server 2008
      4. Configuring Windows DS
      5. Preparing Discover Images
      6. Importing Images
        1. Importing Boot Images
        2. Importing Install Images
      7. Managing Image Security
        1. Pre-staging Client Computers
        2. Configuring Administrator Approval
      8. Installing Windows Vista
      9. Capturing Custom Images
      10. Creating Multicast Transmissions
        1. Multicast Prerequisites
        2. Transmission Types
      11. Using Windows DS with Microsoft Deployment Toolkit
      12. Summary
      13. Additional Resources
        1. Related Information
        2. On the Companion CD
    9. 11. Using Volume Activation
      1. Introduction
        1. Volume Activation
        2. Activation Options
          1. Original Equipment Manufacturer
          2. Multiple Activation Key
          3. Key Management Service
        3. Activation Terminology
      2. Planning an Activation Infrastructure
        1. Analyzing Activation Options
          1. Network Connectivity
          2. Computer Connection Patterns
          3. Other Activation Questions
        2. Mapping Computers to Activation Options
      3. Implementing OEM Activation
        1. Installing Volume-Licensed Images on OEM Systems
        2. OEM Imaging of Volume Editions
      4. Implementing MAK Activation
        1. Obtaining MAKs
        2. Managing MAKs
        3. Obtaining Additional MAK Activations
        4. Assigning MAKs to Windows Vista Systems
          1. Manually Assigning MAKs
          2. Automating MAK Assignment
          3. MAK Integration with the Deployment Workbench
        5. Volume Activation Management Tool
      5. Implementing KMS Activation
        1. Installing a KMS Computer
          1. Required Resources
          2. KMS Infrastructure
          3. DNS Registration (KMS Autodiscovery)
        2. Installing KMS Client Computers
          1. Computer Imaging
          2. KMS Client Activation
          3. Enabling Standard User Activation
        3. KMS Integration with the Deployment Workbench
        4. KMS Reporting
          1. KMS Event Log Entries
          2. MOM Pack for KMS Activation
      6. Configuring KMS Activation
        1. Using Slmgr.vbs to Configure KMS
          1. KMS Computer Configuration
          2. KMS Client Configuration
        2. Using Registry Entries to Configure KMS
        3. KMS Computer Configuration
        4. KMS Client Configuration
        5. Using WMI to Configure KMS
          1. KMS Computer Configuration
          2. KMS Client Configuration
      7. Activation in Microsoft Deployment Toolkit 2008
        1. Using the Windows Deployment Wizard
        2. Automating the Windows Deployment Wizard
      8. Troubleshooting Volume Activation
        1. Common Problems
        2. Event Log Entries
        3. Resolving Activation Issues
          1. Activating Non-Genuine Systems
          2. Resetting the Activation Grace Period
          3. Allowing Standard Users to Activate Windows Vista
      9. Summary
      10. Additional Resources
        1. Related Information
    10. 12. Deploying with Microsoft Deployment Toolkit
      1. Introducing MDT 2008
        1. Deployment Scenarios
        2. Comparing LTI and ZTI
        3. Deployment Points
        4. Resource Access
      2. Using LTI with MDT 2008
        1. Creating Deployment Points
        2. Preparing Windows DS
        3. Configuring Resources
        4. Configuring CustomSettings.ini
          1. CustomSettings.ini Modified by Deployment Workbench
        5. Automating the LTI Process
          1. CustomSettings.ini File for a Refresh Computer Scenario
        6. Performing LTI Deployments
      3. Using ZTI with SMS 2003
        1. Creating an OSD Deployment Point
        2. Preparing Windows PE for SMS 2003
          1. Customizing Windows PE
            1. Adding Required Operating Systems
            2. Configuring the Windows PE 2004/2005 Tab
            3. Updating the Deployment Point
          2. Providing Access to Windows PE Image
          3. Importing Windows PE into SMS 2003 OSD
          4. Creating the SMS 2003 OSD Image Installation CD
        3. Preparing Windows DS
        4. Configuring Resources
        5. Configuring ZTI Package Selection
          1. Sample Ripinfo.ini
        6. Configuring SMS 2003
          1. Configuring the Operating System Image
          2. Creating a ZTI User State Migration Package
        7. Configuring CustomSettings.ini
          1. CustomSettings.ini file Customized for Target Computer Settings
        8. Performing ZTI Deployments
      4. Using ZTI with System Center Configuration Manager 2007
        1. Enabling System Center Configuration Manager 2007 Console Integration
        2. Configuring Resource Access
          1. Configure the Network Access Account
          2. Create Additional Shared Folders
        3. Configuring System Center Configuration Manager 2007 to Respond to PXE Boot Requests
        4. Defining Computers in System Center Configuration Manager 2007
          1. Boot Media
          2. PXE Boot
        5. Required Packages and Templates
        6. Advertising a Task Sequence
      5. Customizing MDT 2008
        1. Configuring Multiple Computers
          1. Selecting a Grouping Method
            1. Grouping with [DefaultGateway]
          2. Applying the Properties to the Groups
        2. Configuring Individual Computers
          1. Selecting an Identification Method
          2. Applying the Properties to the Individual Computers
        3. Customizing CustomSettings.ini
          1. CustomSettings.ini for ZTI
        4. Customizing BootStrap.ini
        5. Using the MDT 2008 Database
          1. Creating the MDT 2008 Database
          2. Configuring the MDT 2008 Database
          3. Configuring the Database Access
      6. Summary
      7. Additional Resources
        1. Related Information
  8. III. Desktop Management
    1. 13. Managing the Desktop Environment
      1. Understanding Group Policy in Windows Vista Service Pack 1
        1. Group Policy Issues on Earlier Versions of Windows
        2. New Group Policy Features in Windows Vista SP1 with Remote Server Administration Tools (RSAT)
        3. New Group Policy Settings in Windows Vista
        4. Understanding ADMX Template Files
          1. Types of ADMX Template Files
          2. Local Storage of ADMX Template Files
          3. Domain Storage of ADMX Template Files
          4. Considerations When Working with ADMX Template Files
        5. Understanding Multiple Local Group Policy
          1. Types of MLGPOs
          2. MLGPOs and Group Policy Processing
      2. Managing Windows Vista Computers Using Group Policy
        1. Configuring the Central Store
          1. Adding ADMX Template Files to the Central Store
        2. Creating and Editing GPOs
          1. Editing Multiple Local Group Policy
        3. Using ADMX Migrator
          1. Converting ADM Template Files to ADMX Format
          2. Creating and Editing Custom ADMX Template Files
        4. Configuring Group Policy Processing
        5. Using Advanced Group Policy Management
      3. Troubleshooting Group Policy
        1. Using Event Viewer
        2. Enabling Debug Logging
        3. Using GPLogView
        4. Using GPResult
      4. Summary
      5. Additional Resources
        1. Related Information
        2. On the Companion CD
    2. 14. Managing Users and User Data
      1. Understanding User Profiles in Windows Vista
        1. Types of User Profiles
        2. User Profile Namespace
          1. User Profile Namespace in Windows XP
          2. User Profile Namespace in Windows Vista
        3. Application Compatibility Issues
      2. Implementing Corporate Roaming
        1. Understanding Roaming User Profiles and Folder Redirection
        2. Implementing Folder Redirection
          1. Configuring Redirection Method
          2. Configuring Target Folder Location
          3. Configuring Redirection Options
          4. Configuring Policy-Removal Options
          5. Folder Redirection and Sync Center
          6. Considerations for Mixed Environments
          7. Additional Group Policy Settings for Folder Redirection
          8. Troubleshooting Folder Redirection
        3. Implementing Roaming User Profiles
          1. Creating a Default Network Profile
          2. Configuring a User Account to Use a Roaming Profile
          3. Implementing Mandatory Profiles
          4. Implementing Super Mandatory Profiles
          5. Using Roaming User Profiles Together with Folder Redirection
          6. Considerations for Mixed Environments
          7. Managing User Profiles Using Group Policy
      3. Working with Offline Files
        1. Enhancements to Offline Files in Windows Vista
        2. How Offline Files Works
          1. Understanding Modes of Operation
        3. Managing Offline Files
          1. Managing Offline Files Using Windows Explorer
          2. Managing Offline Files Using the Offline Files Control Panel
          3. Managing Offline Files Using Sync Center
          4. Configuring Offline Files on the Server
          5. Managing Offline Files Using Group Policy
      4. Summary
      5. Additional Resources
        1. Related Information
        2. On the Companion CD
    3. 15. Managing Disks and File Systems
      1. Overview of Partitioning Disks
        1. How to Choose Between MBR or GPT
        2. Converting from MBR to GPT Disks
        3. GPT Partitions
        4. Choosing Basic or Dynamic Disks
      2. Working with Volumes
        1. How to Create a Simple Volume
        2. How to Create a Spanned Volume
        3. How to Create a Striped Volume
        4. How to Resize a Volume
        5. How to Delete a Volume
      3. File System Fragmentation
      4. Backup and Restore
        1. How File Backups Work
        2. File and Folder Backup Structure
        3. How Complete PC Backups Work
        4. How to Start a Complete PC Backup from the Command Line
        5. How to Restore a Complete PC Backup
        6. Complete PC Backup Structure
        7. Best Practices for Computer Backups
        8. How to Manage Backup Using Group Policy Settings
        9. Previous Versions and Shadow Copies
          1. How Volume Shadow Copy Works
          2. How to Manage Shadow Copies
          3. How to Restore a File with Previous Versions
          4. How to Configure Previous Versions with Group Policy Settings
      5. Windows ReadyBoost
      6. BitLocker Drive Encryption
        1. How BitLocker Encrypts Data
        2. How BitLocker Protects Data
          1. TPM (Use BitLocker Without Additional Keys)
          2. TPM with External Key (Require Startup USB Key At Every Startup)
          3. TPM with PIN (Require PIN At Every Startup)
          4. TPM with PIN and External Key
          5. External Key (Require Startup USB Key At Every Startup)
          6. Recovery Password
          7. Clear Key
        3. BitLocker Phases
        4. BitLocker Requirements
        5. How to Configure BitLocker Partitions
        6. How to Enable the Use of BitLocker on Computers Without TPM
        7. How to Enable BitLocker Encryption
        8. How to Manage BitLocker Keys on a Local Computer
        9. How to Manage BitLocker from the Command Line
        10. How to Recover Data Protected by BitLocker
        11. How to Disable or Remove BitLocker Drive Encryption
        12. How to Permanently Decommission a BitLocker Drive
        13. How to Prepare Active Directory for BitLocker
        14. How to Manage BitLocker with Group Policy
        15. The Costs of BitLocker
      7. Encrypting File System
        1. How to Export Personal Certificates
        2. How to Import Personal Certificates
        3. How to Grant Users Access to an Encrypted File
      8. Symbolic Links
        1. How to Create Symbolic Links
        2. How to Create Relative or Absolute Symbolic Links
        3. How to Create Symbolic Links to Shared Folders
        4. How to Use Hard Links
      9. Disk Quotas
        1. How to Configure Disk Quotas on a Single Computer
        2. How to Configure Disk Quotas from a Command Prompt
        3. How to Configure Disk Quotas by Using Group Policy Settings
      10. Disk Tools
        1. Disk Usage
        2. EFSDump
        3. SDelete
        4. Streams
        5. Sync
        6. MoveFile and PendMoves
      11. Summary
      12. Additional Resources
        1. Related Information
        2. On the Companion CD
    4. 16. Managing Devices and Services
      1. Managing Devices
        1. Changes to Device Management in Windows Vista
        2. Understanding Device Installation in Windows Vista
          1. Driver Store and Driver Packaging
          2. Driver Staging vs. Installation
            1. Driver Staging and Installation Process
            2. Detailed Installation Process
          3. Managing Driver Packages
            1. Using PnPutil.exe
            2. Other Staging Tools
          4. Driver Signing
          5. Driver Ranking
        3. Managing Devices Using Group Policy
          1. Managing Device Installation Behavior
          2. Managing Driver Installation Behavior
          3. Managing Driver Installation Behavior for Standard Users
          4. Blocking Installation of Removable Devices
          5. Windows Resource Protection and Device Drivers
        4. Troubleshooting Device Installation
          1. Using Event Logs
          2. Using WinSAT
          3. Using Windows Error Reporting
          4. Using the SetupAPI Log File
          5. Using Driver INF Files
          6. Using Device Manager Error Codes
          7. Repairing Driver Store Corruption
          8. Repairing Index File Corruption
        5. Troubleshooting Device Issues
          1. Troubleshooting Input Device Issues
          2. Troubleshooting Display and Monitor Issues
          3. Troubleshooting USB Device Issues
          4. Troubleshooting IEEE 1394a Device Issues
          5. Troubleshooting Memory Issues
          6. Troubleshooting Processor Issues
          7. Troubleshooting Networking Issues
          8. Troubleshooting Power Management Issues
          9. Troubleshooting Sleep and Hibernation Issues
          10. Additional Troubleshooting Tips
      2. Understanding Power Management
        1. Configuring Power Management Settings
          1. Using the Power Options CPL
          2. Using Group Policy
          3. Using the Powercfg Utility
      3. Understanding Services
        1. Changes to Services in Windows Vista
        2. Managing Services
          1. Using the Services Snap-in
          2. Using Task Manager
          3. Using Group Policy
          4. Using the sc.exe Command
      4. Summary
      5. Additional Resources
        1. Related Information
        2. On the Companion CD
    5. 17. Managing Sharing
      1. Managing File Sharing
        1. Understanding Local Sharing
          1. Local Sharing in Windows XP
          2. Local Sharing in Windows Vista
          3. Understanding the Public Folder
          4. Using the Public Folder
        2. Understanding Network Sharing
          1. Network Sharing in Windows XP
          2. Simple File Sharing in Windows XP
          3. Network Sharing in Windows Vista
          4. Enabling Network Sharing
          5. Windows Firewall and Network Sharing
        3. Implementing File Sharing
          1. Sharing a File or Folder Using the File Sharing Wizard
          2. Sharing a Folder Using the Advanced Sharing Interface
          3. Using the Public Folder to Share Files
          4. Determining Which Files and Folders Are Being Shared
          5. Controlling Share Visibility with Access-Based Enumeration
          6. Accessing Shared Files and Folders
          7. Publishing Shares in Active Directory
        4. Managing File Sharing Using Group Policy
        5. Creating and Managing Shares Using the Net Commands
        6. Creating and Managing Shares Using Scripts
          1. Script for Creating Multiple Shared Folders
            1. Example Usage
            2. Using Cscript.exe
            3. Further Remarks
          2. Script for Configuring Windows Firewall to Allow Remote Scripting
          3. Additional Scripts
        7. Troubleshooting File Sharing
          1. Troubleshooting Sharing on the Client Side
          2. Troubleshooting Sharing on the Server Side
        8. Best Practices for Implementing File Sharing in a Workgroup Environment
        9. Best Practices for Implementing File Sharing in a Domain Environment
      2. Managing Media Sharing
        1. Media Sharing and Windows Firewall
        2. Media Sharing and Windows Firewall in Windows XP
          1. Limitations of Media Sharing
        3. Media Sharing and Network Categories
        4. Using Media Sharing
          1. Finding and Sharing Media
          2. Media Sharing and Network Traffic
        5. Managing Media Sharing with Group Policy
        6. Troubleshooting Media Sharing
        7. Best Practices for Media Sharing
      3. Summary
      4. Additional Resources
        1. Related Information
        2. On the Companion CD
    6. 18. Managing Windows Meeting Space
      1. Understanding How Meeting Space Works
        1. Meeting Space and Microsoft P2P Collaboration Services
        2. Meeting Space and IPv6
        3. Meeting Space and the Peer Name Resolution Protocol (PNRP)
        4. Meeting Space and People Near Me
        5. Meeting Space Services
        6. Meeting Space and Windows Firewall
        7. Meeting Space and Security
        8. How a Meeting Works
        9. Limitations of Meeting Space
      2. Deploying and Managing Meeting Space
        1. Managing Meeting Space in a Workgroup Environment
        2. Managing Meeting Space in a Domain Environment
          1. Additional Group Policy Settings for Meeting Space
        3. Managing Meeting Space in an Ad Hoc Wireless Environment
      3. Using Meeting Space
        1. Setting Up Meeting Space
          1. Manually Setting Up Meeting Space
          2. Remotely Setting Up Meeting Space
        2. Configuring People Near Me
        3. Starting a New Meeting
        4. Joining a Meeting
        5. Inviting Others to Your Meeting
        6. Collaborating Within a Meeting
      4. Troubleshooting Meeting Space
      5. Summary
      6. Additional Resources
        1. Related Information
        2. On the Companion CD
    7. 19. Managing Printing
      1. Enhancements to Printing in Windows Vista
      2. Understanding Printing in Windows Vista
        1. Understanding the XML Paper Specification
        2. Understanding the Windows Vista Print Subsystem
      3. Understanding Print Management
        1. Enhancements to Print Management in Windows Vista
        2. The Print Management Console
        3. Adding and Removing Print Servers
        4. Adding Printers Using the Network Printer Installation Wizard
        5. Creating and Using Printer Filters
      4. Managing Printers Using Print Management
        1. Configuring Properties of Printers
        2. Publishing Printers in Active Directory
        3. Managing Printer Drivers
        4. Exporting and Importing Print Server Configurations
        5. Performing Bulk Actions Using Print Management
      5. Client-Side Management of Printers
        1. Installing Printers Using the Printers CPL
        2. Searching for Printers
        3. Installing Printers Using Point and Print
        4. Using Printers Explorer
        5. Using the Color Management CPL
      6. Managing Client-Side Printer Experience Using Group Policy
        1. Configuring the Add Printer Wizard
        2. Disable Client-Side Printer Rendering
        3. Configuring Package Point and Print Restrictions
      7. Deploying Printers Using Group Policy
        1. Preparing to Deploy Printers
        2. Deploying a Printer Connection
        3. Limitations of Deploying Printers Using Group Policy
        4. Assigning Printers Based on Location
      8. Migrating Print Servers
        1. Migrate Print Servers Using Print Management
        2. Migrating Print Servers Using Printbrm.exe
      9. Monitoring and Troubleshooting Printers
        1. Configuring E-Mail Notifications
        2. Configuring Print Server Notifications
        3. Configuring Script Actions
        4. Configuring Detailed Event Logging
      10. Summary
      11. Additional Resources
        1. Related Information
        2. On the Companion CD
    8. 20. Managing Search
      1. Search and Indexing Enhancements in Windows Vista
        1. Issues in Previous Windows Platforms
        2. Design Goals and New Features
      2. How Search and Indexing Works in Windows Vista
        1. Understanding Search Engine Terminology
        2. Windows Search Engine Processes
        3. Windows Search Engine Architecture
        4. Understanding the Catalog
          1. Default System Exclusion Rules
          2. Default Start Addresses
          3. Initial Configuration
        5. Understanding the Indexing Process
          1. Types of Files Indexed
          2. Modifying IFilter Behavior
          3. How Indexing Works
        6. Understanding Remote Search
      3. Managing Indexing
        1. Configuring the Catalog
          1. Configuring the Catalog Using Control Panel
          2. Configuring the Catalog Using Group Policy
        2. Configuring Offline Files Indexing
          1. Configuring Offline Files Indexing Using Control Panel
          2. Configuring Offline Files Indexing Using Group Policy
        3. Configuring Indexing of Encrypted Files
          1. Configuring Indexing of Encrypted Files Using Control Panel
          2. Configuring Indexing of Encrypted Files Using Group Policy
        4. Configuring Indexing of Similar Words
          1. Configuring Indexing of Similar Words Using Control Panel
          2. Configuring Indexing of Similar Words Using Group Policy
        5. Other Configuration Options
      4. Using Search
        1. Configuring Search Using Folder Options
          1. Configuring What to Search
          2. Configuring How to Search
          3. Configuring What Happens When Searching Nonindexed Locations
        2. Search Integration in Windows Explorer
        3. Using Instant Search
          1. Searching for Programs
          2. Searching for Settings
          3. Searching for Files
        4. Using the Search Explorer
          1. Using Advanced Search
          2. Using Saved Searches
        5. Other Search and Organization Features
      5. Troubleshooting Search
      6. Summary
      7. Additional Resources
        1. Related Information
        2. On the Companion CD
    9. 21. Managing Internet Explorer
      1. Non-Security Internet Explorer Improvements
        1. User Interface Changes
        2. Tabbed Browsing
        3. Search Bar
          1. How to Create a Web Link to Add a Custom Search Provider
          2. How to Configure Custom Search Providers Using the Registry
          3. How to Configure Custom Search Providers Using Group Policy
          4. How to Use the Internet Explorer Administration Kit to Configure Custom Search Providers
        4. RSS Feeds
        5. Improved Standards Support
        6. Expanded Group Policy Settings
      2. Internet Explorer 7 Security Features
        1. Defending Against Malware
          1. Protected Mode
            1. How Protected Mode Improves Security
            2. How the Protected Mode Compatibility Layer Works
            3. How to Solve Protected Mode Incompatibilities
          2. Windows Defender
          3. URL-Handling Protection
          4. Address Bar Visibility
          5. Cross-Domain Scripting Attack Protection
          6. Controlling Browser Add-ons
            1. Internet Explorer Add-ons Disabled Mode
            2. Add-on Manager Improvements
            3. Controlling Add-ons Using Group Policy
        2. Protecting Against Data Theft
          1. Security Status Bar
          2. Phishing
            1. How the Phishing Filter Works
            2. How to Configure Phishing Filter Options
          3. Deleting Browsing History
          4. Blocking IDN Spoofing
        3. Security Zones
          1. Understanding Zones
          2. Configuring Zones on the Local Computer
          3. Configuring Zones Using Group Policy
          4. Network Protocol Lockdown
      3. Managing Internet Explorer with Group Policy
      4. Using the Internet Explorer Administration Kit
      5. Troubleshooting Internet Explorer Problems
        1. Internet Explorer Does Not Start
        2. An Add-on Does Not Work Properly
        3. Some Web Pages Do Not Display Properly
        4. An Unwanted Toolbar Appears
        5. The Home Page or Other Settings Have Changed
      6. Summary
      7. Additional Resources
        1. Related Information
        2. On the Companion CD
  9. IV. Desktop Maintenance
    1. 22. Maintaining Desktop Health
      1. Monitoring Reliability and Performance
        1. Component Binaries
        2. Opening the Reliability And Performance Monitor
        3. Using Resource Overview
          1. CPU Graph
          2. Disk Graph
          3. Network Graph
          4. Memory Graph
        4. Using Performance Monitor
          1. New Features in Performance Monitor
            1. New Classes for Individual Data Sources
            2. Time-Based Algorithms
            3. Scale to Fit
            4. Drag and Drop
            5. Time Range Control
            6. Tool Tips
            7. Zoom
            8. New Legend Control
            9. Add Counters Dialog Box
            10. Transportable Configuration Files
            11. End of File Command
            12. Compare Feature
          2. Working with Performance Monitor
            1. Real-Time Performance Monitoring
            2. Performance Monitor Logging
            3. Creating a Data Collector Set
            4. Configuring a Data Collector Set
            5. Using Data Manager to View Performance Data
            6. Starting and Stopping Data Logging
            7. Viewing Performance Data
            8. Comparing Performance Monitor Logs
            9. Performance Monitor User Rights
            10. Remote Data Collection
            11. Managing Performance Logs and Event Trace Sessions with Logman
        5. Using Reliability Monitor
          1. Reliability Monitor Features
            1. Automatic Data Collection and Processing
            2. System Stability Chart
            3. Stability Index
            4. System Stability Report
              1. Software (Un)installs
              2. Application Failures
              3. Hardware Failures
              4. Windows Failures
              5. System Clock Changes
              6. Miscellaneous Failures
          2. Reliability Monitor Data Files
      2. Understanding Windows Eventing
        1. Overview of Windows Eventing
        2. Windows Eventing Capabilities
          1. Channels
            1. Publishing Properties
            2. Logging Properties
            3. Channel Types
          2. Event Log Files
          3. Naming Providers and Channels
          4. Event Level
          5. Event Logs
          6. Event Attributes
          7. Event Messages
        3. Event Viewer User Interface
          1. Accessing Event Viewer
          2. Overview And Summary View
          3. Custom Views
            1. Create a View Manually
          4. Windows Logs
          5. Applications and Services Logs
          6. Saving and Opening Event Logs
            1. Save Events As
            2. Open Saved Log
          7. Subscriptions
            1. Additional Considerations
            2. Creating a New Subscription
          8. Actions Pane
      3. Understanding the Windows System Assessment Tool
        1. Overview of WinSAT
          1. Assessment Names
          2. Examining the Features Assessment
          3. Command-Line Usage
          4. Binary Components
          5. Exit Values
          6. Registry Locations
        2. How Desktop Window Manager Performs Composition
          1. Desktop Window Manager Components
            1. Desktop Window Manager Session Manager Service
            2. Windows Presentation Foundation
          2. WinSAT and the Desktop Windows Manager
        3. Troubleshooting Aero Glass
        4. Overriding Windows Vista Automatic Detection Mechanisms
          1. Forcing WinSAT to Reassess the Computer
          2. Examining Desktop Window Manager Performance
      4. Using Performance Information And Tools
        1. Accessing Performance Information And Tools
        2. Configuring Performance Information And Tools Using Group Policy
        3. Understanding Each Section of the Tool
          1. Performance Issues
          2. System Capabilities
          3. OEM Upsell And Help
      5. Understanding Windows Error Reporting
        1. Overview of Windows Error Reporting
        2. Error Reporting Cycle
          1. Reporting
          2. Categorization
          3. Investigation
          4. Resolution
          5. Response
        3. Report Data Overview
          1. First-Level Data
          2. Second-Level Data
        4. Conceptual Components
          1. Report Processor
          2. Data Collection Module
          3. Transport System
          4. Store Management System
            1. User Store
            2. Computer Store
            3. ReportQueue Folder
            4. ReportArchive Folder
            5. Queue Reporting
            6. Store Maintenance
            7. Queue Triggers
        5. Architecture of Windows Error Reporting
          1. Wer.dll
          2. WerMgr.exe
          3. Problem Reports And Solutions Control Panel
          4. Problem Reports And Solutions Control Panel Support Service
          5. Windows Error Reporting Service
          6. Store.lock
        6. Configuring Windows Error Reporting
          1. Per-Computer Registry Settings
          2. Per-User Registry Settings
          3. Group Policy Registry Settings
            1. Per-Computer Group Policy Settings
            2. Per-User Group Policy Settings
          4. WER Registry Values
        7. Using the Problem Reports And Solutions Control Panel
          1. Check For New Solutions
            1. Low-Priority Response
            2. Medium-Priority Response
            3. High-Priority Response
            4. Response Notification
            5. No New Solution Found
          2. See Problems To Check
            1. View Problem History
            2. Change Settings
            3. Advanced Settings
      6. Using Task Scheduler
        1. Task Scheduler Enhancements and Improvements
          1. User Interface Improvements
          2. Scheduling Improvements
          3. Security Improvements
          4. Administrative Improvements
          5. Platform and Manageability Improvements
          6. Default Tasks
        2. Operational Overview
          1. Task Triggers
          2. Task Settings
          3. Task Actions
          4. User Interface
        3. Task Scheduler Architecture
        4. Task Scheduler Security
          1. Credentials Management
          2. User Security
          3. Security Concepts
          4. Securing Running Tasks
          5. Registration Permissions Matrix
        5. AT and Task Scheduler v1.0 Compatibility Modes
        6. Task Scheduler User Interface
        7. Creating New Tasks
          1. Defining Triggers
            1. On A Schedule Trigger
            2. At Log On Trigger
            3. At Startup Trigger
            4. On Idle Trigger
            5. On An Event Trigger
            6. At Task Creation/Modification Trigger
            7. On Connection To or Disconnect From User Session Triggers
            8. On Workstation Lock or Unlock Triggers
          2. Defining Actions
          3. Defining Conditions
          4. Defining Settings
        8. Managing Tasks
          1. Display Running Tasks
          2. Viewing History
          3. Exporting Tasks
          4. Importing Tasks
        9. Using the SchTasks.exe Command
          1. Command Syntax
          2. Command Parameters
          3. Creating Tasks
          4. Deleting Tasks
          5. Running Tasks
          6. Ending Tasks
          7. Querying Tasks
          8. Changing Tasks
        10. Scheduled Tasks Events
          1. Task Registration
          2. Task Launch
          3. Task Execution
          4. Task Completion
        11. Troubleshooting Task Scheduler
          1. Tasks Won’t Run If the Service Is Not Started
          2. The Task Did Not Run at the Expected Time
          3. The Task Will Run Only If All Conditions Are Met
          4. The Task Will Only Run When a Certain User Is Logged On
          5. The Task Executed a Program But the Program Did Not Run Correctly
          6. The Task Failed to Start
          7. The Task Action Failed to Execute
          8. The Program Specified in the Task Requires Elevated Privileges
        12. Interpreting Result and Return Codes
      7. Summary
      8. Additional Resources
        1. Related Information
        2. On the Companion CD
    2. 23. Supporting Users Using Remote Assistance
      1. Understanding Remote Assistance
        1. Improvements to Remote Assistance in Windows Vista
        2. How Remote Assistance Works
          1. Remote Assistance Operational States
          2. User vs. Helper Functionality
          3. Remote Assistance and NAT Traversal
          4. Remote Assistance and IP Ports Used
          5. Remote Assistance and Windows Firewall
          6. Remote Assistance and the Secure Desktop
          7. Remote Assistance Logging
            1. Purpose of RA Session Logging
            2. Session Log Path and Naming Convention
        3. Using Remote Assistance in the Enterprise
          1. Using Remote Assistance in the Corporate Help Desk Environment
          2. Other Possible Remote Assistance Usage Scenarios
        4. Interoperability with Remote Assistance in Windows XP
      2. Implementing and Managing Remote Assistance
        1. Initiating Remote Assistance Sessions
          1. Initiating Remote Assistance From the GUI
          2. Initiating Remote Assistance from the Command Line
        2. Scenario 1: Offering Remote Assistance Using DCOM
        3. Scenario 2: Soliciting Remote Assistance by Creating RA Tickets and Saving Them on Monitored Network Shares
        4. Managing Remote Assistance Using Group Policy
        5. Configuring Remote Assistance in Unmanaged Environments
        6. Additional Registry Settings for Configuring Remote Assistance
      3. Summary
      4. Additional Resources
        1. Related Information
    3. 24. Managing Software Updates
      1. Update Improvements to Windows Vista
      2. Methods for Deploying Updates
        1. Windows Update Client
        2. Windows Server Update Services
        3. Systems Management Server
        4. Systems Center Configuration Manager 2007
      3. Manually Installing, Scripting, and Removing Updates
        1. Overview of Windows Vista Update Files
        2. How to Script Update Installations
        3. How to Remove Updates
        4. Deploying Updates to New Computers
      4. Managing BITS
        1. BITS Behavior
        2. BITS Group Policy Settings
        3. The BITSAdmin.exe Tool
      5. Windows Update Group Policy Settings
      6. Configuring Windows Update to Use a Proxy Server
      7. Tools for Auditing Software Updates
        1. The MBSA Console
        2. MBSACLI
        3. SMS
      8. Troubleshooting the Windows Update Client
      9. The Process of Updating Network Software
        1. Assembling the Update Team
        2. Inventorying Software
        3. Creating an Update Process
          1. Discovering Updates
          2. Evaluating Updates
          3. Retrieving Updates
          4. Testing Updates
          5. Installing Updates
          6. Removing Updates
          7. Auditing Updates
      10. How Microsoft Distributes Updates
        1. Security Updates
        2. Update Rollups
        3. Service Packs
        4. Microsoft Product Life Cycles
      11. Summary
      12. Additional Resources
        1. Related Information
        2. On the Companion CD
    4. 25. Managing Client Protection
      1. Understanding the Risk of Malware
      2. User Account Control
        1. UAC for Standard Users
        2. UAC for Administrators
        3. UAC User Interface
        4. How Windows Vista Determines If an Application Needs Administrative Privileges
          1. How to Control UAC Using Application Properties
          2. How UAC Examines the Application Manifest
          3. UAC Heuristics
        5. UAC Virtualization
        6. UAC and Startup Programs
        7. Compatibility Problems with UAC
        8. How to Configure User Account Control
          1. Group Policy Settings
          2. Control Panel
          3. Msconfig.exe
          4. Registry
        9. How to Configure Auditing for Privilege Elevation
        10. Other UAC Event Logs
        11. Best Practices for Using UAC
      3. Managing Client Certificates
      4. Using Windows Defender
        1. Understanding Windows Defender
          1. Automatic Scanning
          2. Real-Time Protection
        2. Windows Defender Alert Levels
        3. Understanding Microsoft SpyNet
        4. Configuring Windows Defender Group Policy
        5. Configuring Windows Defender on a Single Computer
        6. Windows Defender Tools
          1. How to Determine If a Computer Is Infected with Spyware
        7. Requiring Windows Defender Using Network Access Protection
        8. Best Practices for Using Windows Defender
        9. How to Troubleshoot Problems with Unwanted Software
      5. Network Access Protection
      6. Microsoft Forefront Client Security
      7. Summary
      8. Additional Resources
        1. Related Information
  10. V. Networking
    1. 26. Configuring Windows Networking
      1. Usability Improvements
        1. Network And Sharing Center
        2. Network Explorer
          1. How Windows Vista Finds Network Resources
          2. How Windows Vista Publishes Network Resources
          3. How Windows Vista Creates the Network Map
        3. Network Map
        4. Networking Icons in the System Tray
        5. The Set Up A Connection Or Network Wizard
      2. Manageability Improvements
        1. Network Location Types
        2. Policy-Based QoS
          1. Selecting DSCP Values
          2. Planning Traffic Throttling
          3. Configuring QoS Policies
          4. Configuring System-Wide QoS Settings
          5. Configuring Advanced QoS Settings
        3. Windows Firewall and IPsec
        4. Windows Connect Now
      3. Core Networking Improvements
        1. Efficient Networking
        2. Scalable Networking
        3. Improved Reliability
        4. IPv6 Support
        5. 802.1X Network Authentication
        6. Server Message Block (SMB) 2.0
        7. Strong Host Model
        8. Wireless Networking
      4. Improved APIs
        1. Network Awareness
        2. Improved Peer Networking
          1. Services Used by Peer-to-Peer Networking
          2. Managing Peer-to-Peer Networking
        3. EAPHost Architecture
        4. Layered Service Provider (LSP)
        5. Windows Sockets Direct Path for System Area Networks
      5. How to Configure Wireless Settings
        1. Manually Configuring Wireless Settings
        2. Using Group Policy to Configure Wireless Settings
        3. Configuring Wireless Settings from the Command Line or a Script
      6. How to Configure TCP/IP
        1. DHCP
        2. Manually Configuring IP Addresses
        3. Command Line and Scripts
      7. How to Connect to Active Directory Domains
        1. How to Connect to a Domain When 802.1X Authentication Is Not Enabled
        2. How to Connect to a Domain When 802.1X Authentication Is Enabled
      8. Summary
      9. Additional Resources
        1. Related Information
        2. On the Companion CD
    2. 27. Configuring Windows Firewall and IPsec
      1. Understanding Windows Firewall
        1. Understanding the Windows Filtering Platform
        2. Understanding Windows Service Hardening
          1. Understanding Service SIDs
          2. Windows Firewall and Windows Service Hardening
        3. Understanding Windows Firewall Profiles
        4. Understanding Windows Firewall Policy Storage and Rule Merge Logic
        5. Understanding Windows Firewall Rules
          1. Rules and Conditions
          2. Examples of Rules
          3. Rules Processing
          4. Rule Groups
          5. Rule Groups Enabled By Default
          6. Core Networking Rules
          7. Windows Firewall and the Startup Process
          8. Upgrading Windows Firewall
        6. Understanding IPsec Integration
          1. New IPsec Features in Windows Vista
          2. New Cryptographic Algorithms for IPsec Key Exchange, Data Integrity, and Encryption
          3. New Credential Types for IPsec Authentication
          4. Understanding AuthIP
          5. Understanding Negotiation Discovery
          6. Understanding Connection Security Rules
          7. Types of Connection Security Rules
          8. Implementing IPsec Protection Strategies
            1. Server and Domain Isolation
            2. Network Access Protection
        7. Understanding Windows Firewall Logging and Auditing
      2. Managing Windows Firewall
        1. Managing Windows Firewall Using the Windows Firewall With Advanced Security Snap-in
        2. Managing Windows Firewall Using Group Policy
        3. Managing Windows Firewall Using netsh
        4. Managing Windows Firewall Using Scripts
        5. Common Management Tasks
          1. Restore OOB Defaults
          2. Copy Configuration To Another Computer
          3. Enable/Disable a Rule Group
          4. Create a New Firewall Rule
          5. Create a New Connection Security Rule
          6. Turn Off Windows Firewall
      3. Summary
      4. Additional Resources
        1. Related Information
        2. On the Companion CD
    3. 28. Connecting Remote Users and Networks
      1. Understanding Connection Types
        1. Outgoing Connection Types
        2. Incoming Connection Types
        3. Deprecated Connection Types
      2. Configuring Virtual Private Network Connections
        1. Supported Tunneling Protocols
        2. Enhancements to VPN Security in Windows Vista
          1. Support for Advanced Encryption Standard
          2. Weak Cryptography Removal from PPTP/L2TP
          3. Supported Authentication Protocols
        3. VPN Connection Negotiation Process
        4. Creating and Configuring VPN Connections
          1. Creating a VPN Connection
          2. Initiating a Connection
          3. Terminating a Connection
          4. Viewing Connection Details
          5. Configuring a VPN Connection
          6. Configuring Connection Security Settings
          7. Configuring Network Access Protection Settings
          8. Reducing Connection Time
      3. Configuring Dial-Up Connections
        1. Creating a Dial-Up Connection
        2. Configuring a Dial-Up Connection
        3. Advanced Connection Settings
        4. Configuring Incoming Connections
      4. Managing Connections Using Group Policy
      5. Using Remote Desktop
        1. Understanding Remote Desktop
          1. Remote Desktop Protocol
          2. Remote Desktop Connection
          3. Terminal Services Web Access
        2. Steps for Using Remote Desktop
        3. Enabling Remote Desktop and Authorizing Users on a Single Computer
        4. Enabling Remote Desktop Using Group Policy
        5. Configuring and Deploying Remote Desktop Connection
          1. Configuring Remote Desktop Connection from the Command Line
          2. Configuring Remote Desktop Connection Using Notepad
          3. Configuring Remote Desktop Using Group Policy
        6. Establishing a Remote Desktop Session
        7. Improving Remote Desktop Performance
        8. Troubleshooting Remote Desktop
      6. Summary
      7. Additional Resources
        1. Related Information
        2. On the Companion CD
    4. 29. Deploying IPv6
      1. Understanding IPv6
        1. Understanding IPv6 Terminology
        2. Understanding IPv6 Addressing
          1. Understanding IPv6 Prefixes
          2. Understanding IPv6 Address Types
          3. Understanding Unicast Addresses
          4. Identifying IPv6 Address Types
          5. Understanding Interface Identifiers
          6. Comparing IPv6 with IPv4
        3. Understanding ICMPv6 Messages
        4. Understanding Neighbor Discovery
        5. Understanding Address Autoconfiguration
        6. Understanding Name Resolution
          1. Understanding Name Queries
          2. Understanding Name Registration
      2. IPv6 Enhancements in Windows Vista
        1. Summary of IPv6 Enhancements in Windows Vista
      3. Configuring and Troubleshooting IPv6 in Windows Vista
        1. Displaying IPv6 Address Settings
        2. Configuring IPv6 in Windows Vista Using the User Interface
        3. Configuring IPv6 in Windows Vista Using Netsh
        4. Other IPv6 Configuration Tasks
          1. Enabling or Disabling IPv6
          2. Disabling Random Interface IDs
          3. Resetting IPv6 Configuration
          4. Displaying Teredo Client Status
        5. Troubleshooting IPv6 Connectivity
      4. Planning for IPv6 Migration
        1. Understanding ISATAP
        2. Migrating an Intranet to IPv6
          1. Step 1: Upgrading Your Applications and Services
          2. Step 2: Preparing Your DNS Infrastructure
          3. Step 3: Upgrading Your Hosts
          4. Step 4: Migrating from IPv4-only to ISATAP
          5. Step 5: Upgrading Your Routing Infrastructure
          6. Step 6: Upgrading Your DHCP Infrastructure
          7. Step 7: Migrating from ISATAP to Native IPv6
      5. Summary
      6. Additional Resources
        1. Related Information
        2. On the Companion CD
  11. VI. Troubleshooting
    1. 30. Configuring Startup and Troubleshooting Startup Issues
      1. What’s New with Windows Vista Startup
        1. Boot Configuration Data
        2. System Recovery
        3. Windows Boot Performance Diagnostics
      2. Understanding the Startup Process
        1. Power-on Self Test Phase
        2. Initial Startup Phase
          1. Initial Startup Phase for BIOS computers
          2. Initial Startup Phase for EFI Computers
        3. Windows Boot Manager Phase
        4. Windows Boot Loader Phase
        5. Kernel Loading Phase
          1. Control Sets
          2. Session Manager
        6. Logon Phase
      3. Important Startup Files
      4. How to Configure Startup Settings
        1. How to Use the Startup And Recovery Dialog Box
        2. How to Use the System Configuration Tool
        3. How to Use BCDEdit
          1. How to Interpret BCDEdit Output
          2. How to Back Up and Restore Settings
          3. How to Change the Default Operating System Entry
          4. How to Change the Boot Menu Time-Out
          5. How to Change the Order of Boot Manager Menu Items
          6. How to Create an Entry for Another Operating System
          7. How to Remove a Boot Entry
          8. How to View and Update Global Debugger Settings
        4. How to Remove the Windows Vista Boot Loader
        5. How to Configure a User Account to Automatically Log On
        6. How to Disable the Windows Vista Startup Sound
        7. How to Speed Up the Startup Process
      5. The Process of Troubleshooting Startup
        1. Startup Troubleshooting Before the Progress Bar Appears
          1. How to Run Startup Repair
            1. How to Start the System Recovery Tools
            2. How to Run Startup Repair
          2. How to Use BootRec.exe
          3. How to Diagnose Hardware Problems
          4. How to Use System Restore
          5. How to Manually Repair the Boot Sector
          6. How to Manually Update the BCD Registry File
          7. How to Manually Replace Files
          8. How to Reinstall Windows
        2. Startup Troubleshooting After the Progress Bar Appears
          1. How to Run Startup Repair
          2. How to Restore the Last Known Good Configuration
          3. How to Use System Restore
          4. How to Enable Boot Logging
          5. How to Start in Safe Mode
          6. How to Identify Failing Drivers and Services
            1. How to Analyze Startup Problems in Safe Mode
              1. Event Viewer (Eventvwr.msc)
              2. System Information
              3. Error Reporting Service
            2. How to Use Device Manager to View or Change Resources
            3. How to Analyze Boot Logs
          7. How to Roll Back Drivers
          8. How to Temporarily Disable a Service
        3. Troubleshooting Startup Problems After Logon
          1. How to Temporarily Disable Startup Applications and Processes
            1. How to Disable Startup Applications Using the Shift Key
            2. How to Disable Startup Programs Using the System Configuration Utility
            3. How to Disable Startup Applications Configured Using Group Policy or Logon Scripts
          2. How to Permanently Disable Startup Applications and Processes
            1. Uninstall the Application
            2. Manually Remove the Entry
            3. Automatically Remove an Entry Using Windows Defender
      6. Summary
      7. Additional Resources
        1. Related Information
        2. On the Companion CD
    2. 31. Troubleshooting Hardware, Driver, and Disk Issues
      1. Windows Vista Improvements for Hardware and Driver Troubleshooting
        1. Windows Memory Diagnostics
        2. Disk Failure Diagnostics
        3. Self-Healing NTFS
        4. Reliability Monitor
        5. Improved Driver Reliability
        6. Improved Error Reporting
      2. The Process of Troubleshooting Hardware Issues
        1. How to Troubleshoot Problems That Prevent Windows from Starting
        2. How to Troubleshoot Problems Installing New Hardware
        3. How to Troubleshoot Problems with Existing Hardware
        4. How to Troubleshoot Unpredictable Symptoms
      3. How to Diagnose Hardware Problems
        1. How to Use Device Manager to Identify Failed Devices
        2. How to Check the Physical Setup of Your Computer
        3. How to Check the Configuration of Your Hardware
        4. How to Verify That System Firmware and Peripheral Firmware Are Up to Date
        5. How to Test Your Hardware by Running Diagnostic Tools
          1. How to Simplify Your Hardware Configuration
        6. How to Diagnose Disk-Related Problems
      4. How to Use Built-In Diagnostics
        1. How to Use Problem Reports And Solutions
        2. How to Use Reliability Monitor
        3. How to Use Event Viewer
        4. How to Use Data Collector Sets
        5. How to Use Windows Memory Diagnostics
          1. How Windows Vista Automatically Detects Memory Problems
          2. How to Schedule Windows Memory Diagnostics
          3. How to Start Windows Memory Diagnostics When Windows Vista is Installed
          4. How to Start Windows Memory Diagnostics from the Windows Vista DVD
          5. How to Configure Windows Memory Diagnostics
      5. How to Troubleshoot Disk Problems
        1. How to Prepare for Disk Failures
        2. How to Use Chkdsk
          1. Chkdsk Examples
          2. Chkdsk Syntax
          3. How to Use the Graphical Chkdsk Interface
          4. How to Determine if Chkdsk Is Scheduled to Run
          5. Chkdsk Process on NTFS Volumes
        3. How to Use the Disk Cleanup Wizard
        4. How to Disable Nonvolatile Caching
      6. How to Troubleshoot Driver Problems
        1. How to Find Updated Drivers
        2. How to Roll Back Drivers
        3. How to Use Driver Verifier
        4. How to Use the File Signature Verification
        5. How to Use Device Manager to View and Change Resource Usage
      7. How to Use System Restore
      8. How to Troubleshoot USB Problems
        1. How to Solve USB Driver and Hardware Problems
        2. Understanding USB Limitations
        3. How to Identify USB Problems Using Performance Monitor
        4. How to Examine USB Hubs
      9. How to Troubleshoot Bluetooth Problems
      10. Troubleshooting Tools
        1. DiskView
        2. Handle
        3. Process Monitor
      11. Summary
      12. Additional Resources
        1. Related Information
        2. On the Companion CD
    3. 32. Troubleshooting Network Issues
      1. Tools for Troubleshooting
        1. Arp
          1. How to Identify a Problem with the ARP Cache
          2. How to Clear the ARP Cache
        2. Event Viewer
        3. Ipconfig
        4. IPsec Diagnostic Tool
        5. Nblookup
        6. Nbtstat
        7. Net
          1. How to View Shared Folders on the Local Computer
          2. How to View Shared Folders on Another Computer
        8. Netstat
        9. Network Monitor
        10. Nslookup
          1. Verifying the Default DNS Server Resolves Correctly
          2. Verifying a Specific DNS Server Resolves Correctly
          3. Verifying Specific Types of Addresses
        11. PathPing
          1. PathPing Output
          2. Routing Loops
          3. Performance Problems
          4. Possible Connectivity Issues
          5. No Connectivity Issues
        12. Performance Monitor
        13. Ping
        14. Portqry
          1. Identifying the TCP Port for a Service
          2. Testing Service Connectivity
          3. Determining Available Remote Management Protocols
        15. Reliability and Performance
        16. Resource Monitor
        17. Route
        18. Task Manager
        19. TCPView
        20. Telnet Client
        21. Testing Service Connectivity
        22. Test TCP
        23. Windows Network Diagnostics
      2. The Process of Troubleshooting Network Problems
        1. How to Troubleshoot Network Connectivity Problems
        2. How to Troubleshoot Application Connectivity Problems
        3. How to Troubleshoot Name-Resolution Problems
          1. How to Verify Connectivity to a DNS Server
          2. How to Use the Hosts File
        4. How to Troubleshoot Performance Problems and Intermittent Connectivity Issues
        5. How to Troubleshoot Joining or Logging on to a Domain
          1. How to Analyze the NetSetup.Log file
          2. How to Verify Requirements for Joining a Domain
        6. How to Troubleshoot Network Discovery
        7. How to Troubleshoot File and Printer Sharing
          1. How to Troubleshoot File and Printer Sharing from the Client Computer
          2. How to Troubleshoot File and Printer Sharing from the Server Computer
        8. How to Troubleshoot Wireless Networks
        9. How to Troubleshoot Firewall Problems
      3. Summary
      4. Additional Resources
        1. Related Information
        2. On the Companion CD
    4. 33. Troubleshooting Stop Messages
      1. Stop Message Overview
        1. Identifying the Stop Error
        2. Finding Troubleshooting Information
        3. Stop Messages
          1. Bugcheck Information
          2. Recommended User Action
          3. Technical Information
          4. Driver Information
          5. Debug Port and Dump Status Information
        4. Types of Stop Errors
      2. Memory Dump Files
        1. Configuring Small Memory Dump Files
        2. Configuring Kernel Memory Dump Files
        3. Configuring Complete Memory Dump Files
        4. How to Manually Initiate a Stop Error and Create a Dump File
        5. Using Memory Dump Files to Analyze Stop Errors
          1. Using Problem Reports And Solutions
          2. Using Symbol Files and Debuggers
      3. Being Prepared for Stop Errors
        1. Prevent System Restarts After a Stop Error
        2. Record and Save Stop Message Information
        3. Check Software Disk Space Requirements
        4. Install a Kernel Debugger and Symbol Files
      4. Common Stop Messages
        1. Stop 0xA or IRQL_NOT_LESS_OR_EQUAL
          1. Interpreting the Message
          2. Resolving the Problem
        2. Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED
          1. Interpreting the Message
          2. Resolving the Problem
        3. Stop 0x24 or NTFS_FILE_SYSTEM
          1. Interpreting the Message
          2. Resolving the Problem
        4. Stop 0x2E or DATA_BUS_ERROR
          1. Interpreting the Message
          2. Resolving the Problem
        5. Stop 0x3F or NO_MORE_SYSTEM_PTES
          1. Interpreting the Message
          2. Resolving the Problem
        6. Stop 0x50 or PAGE_FAULT_IN_NONPAGED_AREA
          1. Interpreting the Message
          2. Resolving the Problem
        7. Stop 0x77 or KERNEL_STACK_INPAGE_ERROR
          1. Interpreting the Message
          2. Resolving the Problem
        8. Stop 0x7A or KERNEL_DATA_INPAGE_ERROR
          1. Interpreting the Message
          2. Resolving the Problem
        9. Stop 0x7B or INACCESSIBLE_BOOT_DEVICE
          1. Interpreting the Message
          2. Resolving the Problem
        10. Stop 0x7F or UNEXPECTED_KERNEL_MODE_TRAP
          1. Interpreting the Message
          2. Resolving the Problem
        11. Stop 0x9F or DRIVER_POWER_STATE_FAILURE
          1. Interpreting the Message
          2. Resolving the Problem
        12. Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY
          1. Interpreting the Message
          2. Resolving the Problem
        13. Stop 0xC2 or BAD_POOL_CALLER
          1. Interpreting the Message
          2. Resolving the Problem
        14. Stop 0xCE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS
          1. Interpreting the Message
          2. Resolving the Problem
        15. Stop 0xD1 or DRIVER_IRQL_NOT_LESS_OR_EQUAL
          1. Interpreting the Message
          2. Resolving the Problem
        16. Stop 0xD8 or DRIVER_USED_EXCESSIVE_PTES
          1. Interpreting the Message
          2. Resolving the Problem
        17. Stop 0xEA or THREAD_STUCK_IN_DEVICE_DRIVER
          1. Interpreting the Message
          2. Resolving the Problem
        18. Stop 0xED or UNMOUNTABLE_BOOT_VOLUME
          1. Interpreting the Message
          2. Resolving the Problem
        19. Stop 0xFE or BUGCODE_USB_DRIVER
          1. Interpreting the Message
          2. Resolving the Problem
        20. Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED
          1. Interpreting the Message
          2. Resolving the Problem
        21. Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH
          1. Interpreting the Message
          2. Resolving the Problem
      5. Hardware Malfunction Messages
      6. Stop Message Checklist
        1. Check Your Software
          1. Check Software Disk Space Requirements
          2. Use the Last Known Good Configuration
          3. Use Disaster Recovery Features
          4. Restart the System in Safe Mode
          5. Use Startup Repair
          6. Check Event Viewer Logs
          7. Check Application and Driver Compatibility
          8. Install Compatible Antivirus Tools
          9. Check for and Install Service Pack Updates
          10. Report Your Errors
          11. Install Operating System and Driver Updates
          12. Check Information Sources
          13. Install and Use a Kernel Debugger
        2. Check Your Hardware
          1. Restore a Previous Configuration
          2. Check for Nondefault Firmware Settings
          3. Check for Nondefault Hardware Clock Speeds
          4. Check for Hardware-Related Updates
          5. Check by Running Hardware Diagnostic Tools
          6. Check ATA Disk and Controller Settings
          7. Check for SCSI Disk and Controller Settings
          8. Check for Proper Hardware Installation and Connections
          9. Check Memory Compatibility
          10. Check by Temporarily Removing Devices
          11. Check by Replacing a Device
          12. Check Information Sources
          13. Contact Technical Support
      7. Summary
      8. Additional Resources
        1. Related Information
        2. On the Companion CD
  12. VII. Appendices
    1. A. System Files Reference
      1. System Files
      2. Startup Files
      3. Important Folders
      4. Windows Folders
      5. System32 Folder
      6. Additional Resources
        1. Related Information
    2. B. User Rights Reference
      1. Logon Rights
      2. Privileges
      3. Additional Resources
        1. Related Information
    3. C. Accessibility
      1. Ease of Access Center
        1. Additional Accessibility Features
        2. Using the Ease of Access Center
        3. Using Magnifier
        4. Using Narrator
        5. Using the On-Screen Keyboard
        6. Ease of Access Keyboard Shortcuts
      2. Windows Speech Recognition
      3. Assistive Technology Products
      4. Microsoft Accessibility Resource Centers
      5. Additional Resources
        1. Related Information
  13. Glossary
  14. D. About the Authors
  15. E. System Requirements
  16. F. More Great Resources for IT Professionals from Microsoft Press
    1. Administrator’s Pocket Consultant
    2. Administrator’s Companion
    3. Resource Kit
    4. Self-Paced Training Kit
  17. Index
  18. About the Authors
  19. Copyright

Product information

  • Title: Windows Vista® Resource Kit, Second Edition
  • Author(s): Jerry Honeycutt, Mitch Tulloch, Tony Northrup
  • Release date: July 2008
  • Publisher(s): Microsoft Press
  • ISBN: 9780735625969