Book description
Get the definitive reference for deploying, configuring, and
supporting Windows Vista with expert insights from Microsoft Most
Valuable Professionals (MVPs) and the Windows Vista Team at
Microsoft. With additions and updates for SP1, this official
Microsoft RESOURCE KIT provides more than 1,700 pages of in-depth
technical guidance on automating deployment; implementing security
enhancements, including Windows® Firewall and Windows
Defender; administering Group Policy, files, folders, programs, and
devices; using Windows Internet Explorer® 7; configuring
network connections; and troubleshooting. You also get more than
170 timesaving scripts to help automate administrative tasks,
additional job aids, and an eBook of the entire RESOURCE KIT with
bonus chapters on a companion DVD.
Key Book Benefits
Provides the information that every Windows administrator needs about troubleshooting, security enhancements, group policy, and automating administration from the experts who know the technology best Includes new coverage and updates related to SP1 Features Direct from the Source sidebar contributions from more than 100 members of the Windows Vista team CD includes 170+ scripts, tools, and job aids, and a fully searchable version of the entire RESOURCE KIT book
Table of contents
- Windows Vista® Resource Kit, Second Edition
- A Note Regarding Supplemental Files
- Foreword to the Second Edition
- Acknowledgments
- Introduction
-
I. Overview
- 1. Overview of Windows Vista Improvements
-
2. Security in Windows Vista
- Addressing Specific Security Concerns with Windows Vista
- New and Improved Windows Vista Security Features
-
Architectural and Internal Windows Vista Security Improvements
- Code Integrity (CI)
- Windows Resource Protection (WRP)
- Kernel Patch Protection
- Required Driver Signing
- Windows Service Hardening
- Authorization Manager
- Network Access Protection Client
- Web Services for Management
- Crypto Next Generation (CNG) Services
- Data Execution Prevention (DEP)
- Address Space Layout Randomization (ASLR)
- New Logon Architecture
- Rights Management Services (RMS)
- Multiple Local Group Policy Objects
- Summary
- Additional Resources
-
II. Deployment
- 3. Deployment Platform
- 4. Planning Deployment
- 5. Testing Application Compatibility
-
6. Developing Disk Images
- Getting Started
- Capturing Images with Microsoft Deployment Toolkit
- Navigating Deployment Workbench
- Creating a Distribution Share
- Configuring the Distribution Share
- Creating Task Sequences
- Editing a Task Sequence
- Creating the Lab Deployment Point
- Capturing a Disk Image for LTI
- Capturing a Disk Image for ZTI
- Manually Preparing Images
- Customizing Microsoft Deployment Toolkit
- Summary
- Additional Resources
-
7. Migrating User State Data
- Evaluating Migration Technologies
- Using Windows Easy Transfer
- Planning User State Migration Using USMT
- Installing USMT
- Understanding USMT Components
- Developing Migration Files
- Using USMT in Microsoft Deployment Toolkit
- Summary
- Additional Resources
- 8. Deploying Applications
-
9. Preparing Windows PE
- Exploring Windows PE
- Setting up the Environment
- Working with Windows PE
- Automating Windows PE
- Using Windows PE with Microsoft Deployment Toolkit
- Summary
- Additional Resources
-
10. Configuring Windows DS
- Introducing Windows DS
- Planning for Windows DS
- Installing Windows DS
- Configuring Windows DS
- Preparing Discover Images
- Importing Images
- Managing Image Security
- Installing Windows Vista
- Capturing Custom Images
- Creating Multicast Transmissions
- Using Windows DS with Microsoft Deployment Toolkit
- Summary
- Additional Resources
-
11. Using Volume Activation
- Introduction
- Planning an Activation Infrastructure
- Implementing OEM Activation
- Implementing MAK Activation
- Implementing KMS Activation
- Configuring KMS Activation
- Activation in Microsoft Deployment Toolkit 2008
- Troubleshooting Volume Activation
- Summary
- Additional Resources
-
12. Deploying with Microsoft Deployment Toolkit
- Introducing MDT 2008
- Using LTI with MDT 2008
- Using ZTI with SMS 2003
-
Using ZTI with System Center Configuration Manager 2007
- Enabling System Center Configuration Manager 2007 Console Integration
- Configuring Resource Access
- Configuring System Center Configuration Manager 2007 to Respond to PXE Boot Requests
- Defining Computers in System Center Configuration Manager 2007
- Required Packages and Templates
- Advertising a Task Sequence
- Customizing MDT 2008
- Summary
- Additional Resources
-
III. Desktop Management
-
13. Managing the Desktop Environment
- Understanding Group Policy in Windows Vista Service Pack 1
- Managing Windows Vista Computers Using Group Policy
- Troubleshooting Group Policy
- Summary
- Additional Resources
-
14. Managing Users and User Data
- Understanding User Profiles in Windows Vista
- Implementing Corporate Roaming
- Working with Offline Files
- Summary
- Additional Resources
-
15. Managing Disks and File Systems
- Overview of Partitioning Disks
- Working with Volumes
- File System Fragmentation
-
Backup and Restore
- How File Backups Work
- File and Folder Backup Structure
- How Complete PC Backups Work
- How to Start a Complete PC Backup from the Command Line
- How to Restore a Complete PC Backup
- Complete PC Backup Structure
- Best Practices for Computer Backups
- How to Manage Backup Using Group Policy Settings
- Previous Versions and Shadow Copies
- Windows ReadyBoost
-
BitLocker Drive Encryption
- How BitLocker Encrypts Data
- How BitLocker Protects Data
- BitLocker Phases
- BitLocker Requirements
- How to Configure BitLocker Partitions
- How to Enable the Use of BitLocker on Computers Without TPM
- How to Enable BitLocker Encryption
- How to Manage BitLocker Keys on a Local Computer
- How to Manage BitLocker from the Command Line
- How to Recover Data Protected by BitLocker
- How to Disable or Remove BitLocker Drive Encryption
- How to Permanently Decommission a BitLocker Drive
- How to Prepare Active Directory for BitLocker
- How to Manage BitLocker with Group Policy
- The Costs of BitLocker
- Encrypting File System
- Symbolic Links
- Disk Quotas
- Disk Tools
- Summary
- Additional Resources
-
16. Managing Devices and Services
-
Managing Devices
- Changes to Device Management in Windows Vista
- Understanding Device Installation in Windows Vista
- Managing Devices Using Group Policy
- Troubleshooting Device Installation
-
Troubleshooting Device Issues
- Troubleshooting Input Device Issues
- Troubleshooting Display and Monitor Issues
- Troubleshooting USB Device Issues
- Troubleshooting IEEE 1394a Device Issues
- Troubleshooting Memory Issues
- Troubleshooting Processor Issues
- Troubleshooting Networking Issues
- Troubleshooting Power Management Issues
- Troubleshooting Sleep and Hibernation Issues
- Additional Troubleshooting Tips
- Understanding Power Management
- Understanding Services
- Summary
- Additional Resources
-
Managing Devices
-
17. Managing Sharing
-
Managing File Sharing
- Understanding Local Sharing
- Understanding Network Sharing
-
Implementing File Sharing
- Sharing a File or Folder Using the File Sharing Wizard
- Sharing a Folder Using the Advanced Sharing Interface
- Using the Public Folder to Share Files
- Determining Which Files and Folders Are Being Shared
- Controlling Share Visibility with Access-Based Enumeration
- Accessing Shared Files and Folders
- Publishing Shares in Active Directory
- Managing File Sharing Using Group Policy
- Creating and Managing Shares Using the Net Commands
- Creating and Managing Shares Using Scripts
- Troubleshooting File Sharing
- Best Practices for Implementing File Sharing in a Workgroup Environment
- Best Practices for Implementing File Sharing in a Domain Environment
- Managing Media Sharing
- Summary
- Additional Resources
-
Managing File Sharing
-
18. Managing Windows Meeting Space
-
Understanding How Meeting Space Works
- Meeting Space and Microsoft P2P Collaboration Services
- Meeting Space and IPv6
- Meeting Space and the Peer Name Resolution Protocol (PNRP)
- Meeting Space and People Near Me
- Meeting Space Services
- Meeting Space and Windows Firewall
- Meeting Space and Security
- How a Meeting Works
- Limitations of Meeting Space
- Deploying and Managing Meeting Space
- Using Meeting Space
- Troubleshooting Meeting Space
- Summary
- Additional Resources
-
Understanding How Meeting Space Works
-
19. Managing Printing
- Enhancements to Printing in Windows Vista
- Understanding Printing in Windows Vista
- Understanding Print Management
- Managing Printers Using Print Management
- Client-Side Management of Printers
- Managing Client-Side Printer Experience Using Group Policy
- Deploying Printers Using Group Policy
- Migrating Print Servers
- Monitoring and Troubleshooting Printers
- Summary
- Additional Resources
-
20. Managing Search
- Search and Indexing Enhancements in Windows Vista
- How Search and Indexing Works in Windows Vista
- Managing Indexing
- Using Search
- Troubleshooting Search
- Summary
- Additional Resources
-
21. Managing Internet Explorer
- Non-Security Internet Explorer Improvements
- Internet Explorer 7 Security Features
- Managing Internet Explorer with Group Policy
- Using the Internet Explorer Administration Kit
- Troubleshooting Internet Explorer Problems
- Summary
- Additional Resources
-
13. Managing the Desktop Environment
-
IV. Desktop Maintenance
-
22. Maintaining Desktop Health
-
Monitoring Reliability and Performance
- Component Binaries
- Opening the Reliability And Performance Monitor
- Using Resource Overview
-
Using Performance Monitor
- New Features in Performance Monitor
-
Working with Performance Monitor
- Real-Time Performance Monitoring
- Performance Monitor Logging
- Creating a Data Collector Set
- Configuring a Data Collector Set
- Using Data Manager to View Performance Data
- Starting and Stopping Data Logging
- Viewing Performance Data
- Comparing Performance Monitor Logs
- Performance Monitor User Rights
- Remote Data Collection
- Managing Performance Logs and Event Trace Sessions with Logman
- Using Reliability Monitor
- Understanding Windows Eventing
- Understanding the Windows System Assessment Tool
- Using Performance Information And Tools
- Understanding Windows Error Reporting
-
Using Task Scheduler
- Task Scheduler Enhancements and Improvements
- Operational Overview
- Task Scheduler Architecture
- Task Scheduler Security
- AT and Task Scheduler v1.0 Compatibility Modes
- Task Scheduler User Interface
- Creating New Tasks
- Managing Tasks
- Using the SchTasks.exe Command
- Scheduled Tasks Events
-
Troubleshooting Task Scheduler
- Tasks Won’t Run If the Service Is Not Started
- The Task Did Not Run at the Expected Time
- The Task Will Run Only If All Conditions Are Met
- The Task Will Only Run When a Certain User Is Logged On
- The Task Executed a Program But the Program Did Not Run Correctly
- The Task Failed to Start
- The Task Action Failed to Execute
- The Program Specified in the Task Requires Elevated Privileges
- Interpreting Result and Return Codes
- Summary
- Additional Resources
-
Monitoring Reliability and Performance
-
23. Supporting Users Using Remote Assistance
-
Understanding Remote Assistance
- Improvements to Remote Assistance in Windows Vista
- How Remote Assistance Works
- Using Remote Assistance in the Enterprise
- Interoperability with Remote Assistance in Windows XP
-
Implementing and Managing Remote Assistance
- Initiating Remote Assistance Sessions
- Scenario 1: Offering Remote Assistance Using DCOM
- Scenario 2: Soliciting Remote Assistance by Creating RA Tickets and Saving Them on Monitored Network Shares
- Managing Remote Assistance Using Group Policy
- Configuring Remote Assistance in Unmanaged Environments
- Additional Registry Settings for Configuring Remote Assistance
- Summary
- Additional Resources
-
Understanding Remote Assistance
-
24. Managing Software Updates
- Update Improvements to Windows Vista
- Methods for Deploying Updates
- Manually Installing, Scripting, and Removing Updates
- Managing BITS
- Windows Update Group Policy Settings
- Configuring Windows Update to Use a Proxy Server
- Tools for Auditing Software Updates
- Troubleshooting the Windows Update Client
- The Process of Updating Network Software
- How Microsoft Distributes Updates
- Summary
- Additional Resources
-
25. Managing Client Protection
- Understanding the Risk of Malware
-
User Account Control
- UAC for Standard Users
- UAC for Administrators
- UAC User Interface
- How Windows Vista Determines If an Application Needs Administrative Privileges
- UAC Virtualization
- UAC and Startup Programs
- Compatibility Problems with UAC
- How to Configure User Account Control
- How to Configure Auditing for Privilege Elevation
- Other UAC Event Logs
- Best Practices for Using UAC
- Managing Client Certificates
-
Using Windows Defender
- Understanding Windows Defender
- Windows Defender Alert Levels
- Understanding Microsoft SpyNet
- Configuring Windows Defender Group Policy
- Configuring Windows Defender on a Single Computer
- Windows Defender Tools
- Requiring Windows Defender Using Network Access Protection
- Best Practices for Using Windows Defender
- How to Troubleshoot Problems with Unwanted Software
- Network Access Protection
- Microsoft Forefront Client Security
- Summary
- Additional Resources
-
22. Maintaining Desktop Health
-
V. Networking
- 26. Configuring Windows Networking
-
27. Configuring Windows Firewall and IPsec
-
Understanding Windows Firewall
- Understanding the Windows Filtering Platform
- Understanding Windows Service Hardening
- Understanding Windows Firewall Profiles
- Understanding Windows Firewall Policy Storage and Rule Merge Logic
- Understanding Windows Firewall Rules
-
Understanding IPsec Integration
- New IPsec Features in Windows Vista
- New Cryptographic Algorithms for IPsec Key Exchange, Data Integrity, and Encryption
- New Credential Types for IPsec Authentication
- Understanding AuthIP
- Understanding Negotiation Discovery
- Understanding Connection Security Rules
- Types of Connection Security Rules
- Implementing IPsec Protection Strategies
- Understanding Windows Firewall Logging and Auditing
- Managing Windows Firewall
- Summary
- Additional Resources
-
Understanding Windows Firewall
-
28. Connecting Remote Users and Networks
- Understanding Connection Types
- Configuring Virtual Private Network Connections
- Configuring Dial-Up Connections
- Managing Connections Using Group Policy
-
Using Remote Desktop
- Understanding Remote Desktop
- Steps for Using Remote Desktop
- Enabling Remote Desktop and Authorizing Users on a Single Computer
- Enabling Remote Desktop Using Group Policy
- Configuring and Deploying Remote Desktop Connection
- Establishing a Remote Desktop Session
- Improving Remote Desktop Performance
- Troubleshooting Remote Desktop
- Summary
- Additional Resources
-
29. Deploying IPv6
- Understanding IPv6
- IPv6 Enhancements in Windows Vista
- Configuring and Troubleshooting IPv6 in Windows Vista
- Planning for IPv6 Migration
- Summary
- Additional Resources
-
VI. Troubleshooting
-
30. Configuring Startup and Troubleshooting Startup Issues
- What’s New with Windows Vista Startup
- Understanding the Startup Process
- Important Startup Files
-
How to Configure Startup Settings
- How to Use the Startup And Recovery Dialog Box
- How to Use the System Configuration Tool
-
How to Use BCDEdit
- How to Interpret BCDEdit Output
- How to Back Up and Restore Settings
- How to Change the Default Operating System Entry
- How to Change the Boot Menu Time-Out
- How to Change the Order of Boot Manager Menu Items
- How to Create an Entry for Another Operating System
- How to Remove a Boot Entry
- How to View and Update Global Debugger Settings
- How to Remove the Windows Vista Boot Loader
- How to Configure a User Account to Automatically Log On
- How to Disable the Windows Vista Startup Sound
- How to Speed Up the Startup Process
-
The Process of Troubleshooting Startup
- Startup Troubleshooting Before the Progress Bar Appears
- Startup Troubleshooting After the Progress Bar Appears
- Troubleshooting Startup Problems After Logon
- Summary
- Additional Resources
-
31. Troubleshooting Hardware, Driver, and Disk Issues
- Windows Vista Improvements for Hardware and Driver Troubleshooting
- The Process of Troubleshooting Hardware Issues
-
How to Diagnose Hardware Problems
- How to Use Device Manager to Identify Failed Devices
- How to Check the Physical Setup of Your Computer
- How to Check the Configuration of Your Hardware
- How to Verify That System Firmware and Peripheral Firmware Are Up to Date
- How to Test Your Hardware by Running Diagnostic Tools
- How to Diagnose Disk-Related Problems
- How to Use Built-In Diagnostics
- How to Troubleshoot Disk Problems
- How to Troubleshoot Driver Problems
- How to Use System Restore
- How to Troubleshoot USB Problems
- How to Troubleshoot Bluetooth Problems
- Troubleshooting Tools
- Summary
- Additional Resources
-
32. Troubleshooting Network Issues
- Tools for Troubleshooting
-
The Process of Troubleshooting Network Problems
- How to Troubleshoot Network Connectivity Problems
- How to Troubleshoot Application Connectivity Problems
- How to Troubleshoot Name-Resolution Problems
- How to Troubleshoot Performance Problems and Intermittent Connectivity Issues
- How to Troubleshoot Joining or Logging on to a Domain
- How to Troubleshoot Network Discovery
- How to Troubleshoot File and Printer Sharing
- How to Troubleshoot Wireless Networks
- How to Troubleshoot Firewall Problems
- Summary
- Additional Resources
-
33. Troubleshooting Stop Messages
- Stop Message Overview
- Memory Dump Files
- Being Prepared for Stop Errors
-
Common Stop Messages
- Stop 0xA or IRQL_NOT_LESS_OR_EQUAL
- Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED
- Stop 0x24 or NTFS_FILE_SYSTEM
- Stop 0x2E or DATA_BUS_ERROR
- Stop 0x3F or NO_MORE_SYSTEM_PTES
- Stop 0x50 or PAGE_FAULT_IN_NONPAGED_AREA
- Stop 0x77 or KERNEL_STACK_INPAGE_ERROR
- Stop 0x7A or KERNEL_DATA_INPAGE_ERROR
- Stop 0x7B or INACCESSIBLE_BOOT_DEVICE
- Stop 0x7F or UNEXPECTED_KERNEL_MODE_TRAP
- Stop 0x9F or DRIVER_POWER_STATE_FAILURE
- Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY
- Stop 0xC2 or BAD_POOL_CALLER
- Stop 0xCE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS
- Stop 0xD1 or DRIVER_IRQL_NOT_LESS_OR_EQUAL
- Stop 0xD8 or DRIVER_USED_EXCESSIVE_PTES
- Stop 0xEA or THREAD_STUCK_IN_DEVICE_DRIVER
- Stop 0xED or UNMOUNTABLE_BOOT_VOLUME
- Stop 0xFE or BUGCODE_USB_DRIVER
- Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED
- Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH
- Hardware Malfunction Messages
-
Stop Message Checklist
-
Check Your Software
- Check Software Disk Space Requirements
- Use the Last Known Good Configuration
- Use Disaster Recovery Features
- Restart the System in Safe Mode
- Use Startup Repair
- Check Event Viewer Logs
- Check Application and Driver Compatibility
- Install Compatible Antivirus Tools
- Check for and Install Service Pack Updates
- Report Your Errors
- Install Operating System and Driver Updates
- Check Information Sources
- Install and Use a Kernel Debugger
-
Check Your Hardware
- Restore a Previous Configuration
- Check for Nondefault Firmware Settings
- Check for Nondefault Hardware Clock Speeds
- Check for Hardware-Related Updates
- Check by Running Hardware Diagnostic Tools
- Check ATA Disk and Controller Settings
- Check for SCSI Disk and Controller Settings
- Check for Proper Hardware Installation and Connections
- Check Memory Compatibility
- Check by Temporarily Removing Devices
- Check by Replacing a Device
- Check Information Sources
- Contact Technical Support
-
Check Your Software
- Summary
- Additional Resources
-
30. Configuring Startup and Troubleshooting Startup Issues
- VII. Appendices
- Glossary
- D. About the Authors
- E. System Requirements
- F. More Great Resources for IT Professionals from Microsoft Press
- Index
- About the Authors
- Copyright
Product information
- Title: Windows Vista® Resource Kit, Second Edition
- Author(s):
- Release date: July 2008
- Publisher(s): Microsoft Press
- ISBN: 9780735625969
You might also like
book
Windows Server® 2008 Security Resource Kit
Visit the catalog page for Microsoft® Windows Server 2008™ Security Resource KitVisit the errata page for …
book
Microsoft® Windows® Security Resource Kit, Second Edition
Fully updated and revised, this official MICROSOFT RESOURCE KIT delivers the in-depth information and tools you …
book
Windows® 7 Resource Kit
In-depth and comprehensive, this official RESOURCE KIT delivers the information you need to administer Windows 7 …
book
Windows Server® 2012 Unleashed
This is the most comprehensive and realistic guide to Windows Server 2012 planning, design, prototyping, implementation, …