by MS
Index
U
Unattended installation answer file, 17
Uninstalling, 96, 169-170
Unsecured passwords, 417
Unsigned device drivers, 89-90
Updating, 91-94, 240-242
Upgrading to Windows Vista, 3, 5-6
URLs (universal resource locators), 437-441
Usability improvement, 32
USB (universal serial bus) devices, 275, 277, 426
USB (universal serial bus) ports, 16, 82, 84, 270
User Account Control (UAC), 13-14
application installation and, 161, 163, 168
enabling and disabling, 196
in managing Windows Vista, 32-36
for security, 9, 25
User and group accounts, 187-215
adding and removing members of, 207-208
changing types of, 195
controlling logon to, 199-201
creating local, 205-206
creating workgroup local, 193-194
deleting, 209-210
domain versus local logon to, 192-193
essentials of, 187-192
existing domain accounts and, 194-195
passwords for
creating, 196-197
key ring entries as, 201-204
recovering, 198-199
remote access to, 210-215
removing, 201
renaming, 209
secure guest, 208-209
for workstations, 206-207
User environment variables, 64-66
User interface, 441-446. See also Browser
User profiles, 58
Users, local, 37
User's Files folder, 142
Users' group, 192
Index
V
Versions, previous, of software, 69-71
Video settings, 154-159
View computer details option, 8
Virtualization of applications, 162-163, 168
Virtual memory, in system properties, 60-63
Volumes, disk, 269-270
active, 283
boot, 283
crash dump, 284
deleting, 300-301
formatting, 297-298
label of, 299-300
NTFS conversion of, 301-302
page file, 283
settings for, 218
shrinking or extending, 295-297
spanned and striped, 293-295, 303
spanned or striped, 287
system, 283
VPN (Virtual Private Network) connections, 33, 398, 406-407, 424-425
Index
W-Z
Welcome Center, 7-10
Welcome screens, 199-201
Wi-Fi Certified, 426
Wi-Fi connection, 230
Wi-Fi Protected Access (WPA), 428
Wi-Fi Protected Access Version 2 (WPA2), 428
Windows Aero, 4, 26
Windows Anytime Upgrade, 3
Windows Classic, 3
Windows Easy Transfer wizard, 8
Windows Experience Index, 40
Windows Explorer, 339-345
configuring offline files in, 347, 349
drive access in, 343-344
file type associations in, 344-345
Group Policy for, 340-343
sharing files in, 329-330
viewing permissions in, 319, 326
Windows Features, 178, 185-186
Windows Hardware Quality Lab, 89
Windows Imaging Format (WIM), 16-17, 19, 25
Windows Management Instrumentation (WMI), 38, 43-46
Windows Mobility Center, 217-218
Windows ReadyBoost, 275-277
Windows ReadyDrive, 278
Windows Resource Exhaustion Detection and Resolution, 81
Windows Search service, 28
Windows Shutdown Performance Diagnostics, 81
Windows Standard, 4
Windows StandbyResume Performance Diagnostics, 80-81
Windows SuperFetch, 278-280
Windows System Responsiveness Performance Diagnostics, 81
Windows Vista, 1-24
activating, 7-10
architectural changes in, 16-24
modularization and Windows imaging as, 16-18
pre-boot environment as, 20-24
preinstallation environment as, 18-20
getting started with, 2-4
installing, 4-7
turning off and shutting down, 15-16
in workgroups and domains, 10-15
See also Managing Windows Vista
Windows Vista Basic, 3-4
Winsock Service Providers, 182-183
WINS resolution, 383-385
Wired Equivalent Privacy (WEP) protocol, 33
Wireless connections, 426-435
adapter for, 429-430
connecting to, 433-435
devices and technologies for, 368, 426-427
networks through, 218, 220
security for, 427-429
working with, 430-433
Wireless Equivalency Protection (WEP), 428
Wizards
Add a Wireless Device to The Network, 368
Add Hardware, 97
Add Printer, 368
Found New Hardware, 85
Map Network Drive, 271
Network Projector, 234
Program Compatibility, 175-176
Windows Easy Transfer, 8
Workgroups
Internet time in, 115-116
local user and group accounts of, 193-194
Windows Vista in, 10-15
Workstations, user and group accounts for, 206-207
List of Figures
Chapter 1: Introduction to Windows Vista Administration
Figure 1-1: The Welcome Center window.
Figure 1-2: Changing the product key.
Figure 1-3: Prompting for administrator privileges.
Figure 1-4: Prompting for confirmation to continue.
Figure 1-5: The Startup And Recovery dialog box.
Figure 1-6: The System Configuration utility.
Chapter 2: Managing Windows Vista Systems
Figure 2-1: The taskbar.
Figure 2-2: The Start menu.
Figure 2-3: Control Panel.
Figure 2-4: The Local Security Policy console.
Figure 2-5: Use the Computer Management console to manage network computers and resources.
Figure 2-6: Use the System console to view and manage system properties.
Figure 2-7: Use the Performance Rating And Tools console to rate or view a computer's performance.
Figure 2-8: Windows Vista offers solutions that may help you resolve performance issues.
Figure 2-9: Advanced System Information can help you troubleshoot system configuration problems.
Figure 2-10: WMI Control is used to manage the configuration of the WMI service.
Figure 2-11: Use Disk Cleanup to help you find files that can be deleted.
Figure 2-12: Use the System Configuration utility's General tab to control system startup.
Figure 2-13: The Boot tab controls the boot partition, boot method, and boot options used by the operating system.
Figure 2-14: To troubleshoot problems with startup applications, use the options on the Startup tab.
Figure 2-15: To troubleshoot problems with Windows services, use the options on the Services tab.
Figure 2-16: Use the Computer Name tab to display and configure system identification.
Figure 2-17: The Advanced tab lets you configure advanced features, including performance options, environment variables, and startup and recovery.
Figure 2-18: Virtual memory extends the amount of physical memory (RAM) on a system.
Figure 2-19: The Environment Variables dialog box lets you configure system and user environment variables.
Figure 2-20: The Startup And Recovery dialog box lets you configure system startup and recovery procedures.
Figur
e 2-21: System Restore manages restore points on a per-drive basis.
Chapter 3: Configuring Systems, Hardware Devices, and Drivers
Figure 3-1: Check for known problems using the Problem Reports And Solutions dialog box.
Figure 3-2: Use the Services view to manage services on Windows Vista.
Figure 3-3: Select the update to install.
Figure 3-4: Start the installation by clicking Locate And Install Driver Software (Recommended).
Figure 3-5: Use Device Manager to work with hardware devices.
Figure 3-6: The Driver File Details dialog box displays information on the driver file locations, the provider, and the file versions.
Figure 3-7: Choose whether to install automatically or manually.
Figure 3-8: Select the appropriate device driver for the device you're adding.
Figure 3-9: Use Sound to configure audio recording and playback devices.
Figure 3-10: Use the Volume Control panel options to manage the master volume and individual controls to set the volume of individual audio devices.
Chapter 4: Customizing the Desktop and the Interface
Figure 4-1: Customize the Classic Start menu using this dialog box.
Figure 4-2: Set options for the simple Start menu using the Customize Start Menu dialog box.
Figure 4-3: The Windows taskbar can have multiple active toolbars.
Figure 4-4: Configure application and system icons for the notification area using the options provided.
Figure 4-5: Specify the notification behavior for background applications in the Customize Icons dialog box.
Figure 4-6: Use the Personalization console to access dialog boxes for configuring themes, display settings, and more.
Figure 4-7: In the Theme Settings dialog box, select which theme to use.
Figure 4-8: Select which desktop background to use.
Figure 4-9: Use the Desktop Icon Settings dialog box to select the desktop icons to display and set their appearance.
Figure 4-10: Use the Windows Sidebar Properties dialog box to configure whether Windows Sidebar starts automatically and set other features as necessary.
Figure 4-11: Double-click gadgets to add them to the sidebar.
Figure 4-12: Set a screen saver with password protection for user and organization security.
Figure 4-13: Advanced screen savers have settings that you can use to reduce resource usage.
Figure 4-14: Configure the visual appearance of the display using the options from the Change Your Color Scheme page.
Figure 4-15: If you're having display problems, check the monitor and video driver being used.
Chapter 5: Installing and Maintaining Programs
Figure 5-1: Configure an application to run as an administrator.
Figure 5-2: Configure an application to run with different credentials.
Figure 5-3: Decide how you want to locate the program.
Figure 5-4: Select the operating system for which the program was originally designed.
Figure 5-5: You can also configure compatibility directly.
Figure 5-6: Use Software Explorer to determine startup programs.
Figure 5-7: Use Task Manager to work with running processes.
Figure 5-8: Choose a global default configuration.
Figure 5-9: Set autoplay options for CDs, DVDs, and portable devices.
Figure 5-10: Add or remove operating system components.
Chapter 6: Managing User Access and Security
Figure 6-1: In a workgroup, use the Manage Accounts page in Control Panel to add or remove local user accounts.
Figure 6-2: Use the User Accounts dialog box to manage local user accounts.
Figure 6-3: Create a password with a password hint.
Figure 6-4: Enable the Always Use Classic Logon setting to use the Logon screen rather than the Welcome screen.
Figure 6-5: Create the key ring entry by setting the necessary logon information.
Figure 6-6: Configure new workstation accounts using the New User dialog box in Local Users And Groups.
Figure 6-7: The New Group dialog box enables you to add a new local group to a Windows Vista workstation.
Figure 6-8: Use the Remote tab options to configure remote access to the computer.
Figure 6-9: The Remote Assistance Settings dialog box is used to set limits for Remote Assistance.
Figure 6-10: Specify the additional users allowed to make Remote Desktop connections.
Figure 6-11: In the Remote Desktop Connection dialog box, type the name of the computer to which you want to connect and then click Connect.
Chapter 7: Managing Laptops and Traveling Users
Figure 7-1: Windows Mobility Center provides quick access to the most commonly used mobile PC settings.
Figure 7-2: Choose a power plan.
Figure 7-3: Configure power plan settings.
Figure 7-4: Use the Power Options dialog box to configure advanced power options.
Figure 7-5: Create a power plan.
Figure 7-6: Set the power button and password protection on wake behavior.
Figure 7-7: To use DHCP, configure the computer to obtain an IP address automatically.
Figure 7-8: Use the Alternate Configuration tab to configure private IP addresses for the computer.
Chapter 8: Configuring User and Computer Policies
Figure 8-1: Group Policy options depend on the type of policy you're creating and the add-ons installed.
Figure 8-2: Set user and computer policies through administrative templates.
Figure 8-3: Use the Add/Remove Templates dialog box to add more templates or remove existing ones.
Figure 8-4: Use the Default Quota Limit And Warning Level Properties dialog box to establish disk quota values.
Figure 8-5: Use the Show Contents dialog box to specify resources according to their UNC path.
Figure 8-6: Set a default cache size for offline files in the Default Cache Size Properties dialog box.
Figure 8-7: Set a time expiration limit for Remote Assistance invitations.
Figure 8-8: Set the maximum wait time for scripts.
Figure 8-9: Manage computer startup scripts using the Startup Properties dialog box.
Figure 8-10: Manage user logon scripts using the Logon Properties dialog box.
Chapter 9: Managing Disk Drives and File Systems
Figure 9-1: The Computer console provides easy access to a computer's storage devices.
Figure 9-2: Use Disk Management to manage disk configurations.
Figure 9-3: Examine detailed information for a drive using its Properties dialog box.
Figure 9-4: Select the Speed Up My System Using Windows ReadyBoost option.
Figure 9-5: Select the basic disk to convert.
Figure 9-6: Set the size of the volume.
Figure 9-7: Assign the drive designator or choose to wait until later.
Figure 9-8: Set the formatting options for the partition.
Figure 9-9: Specify the amount of space to use for each volume.
Figure 9-10: Specify the amount of space to shrink from the volume.
Figure 9-11: Use the Format dialog box to format a partition or a volume by specifying its file system type and volume label.
Figure 9-12: Use this dialog box to change or remove the drive letter and path assignment.
Chapter 10: Managing File Security and Resource Sharing
Figure 10-1: Use Group Policy to configure file sharing from within user profiles.
Figure 10-2: The Security tab shows the currently assigned basic permissions.
Figure 10-3: Use Select Users, Computers, or Groups to specify the groups whose permissions you want to configure.
Figure 10-4: Use the Advanced Security Settings dialog box to configure special permissions.
Figure 10-5: Configure the special permissions that should be allowed or denied.
Figure 10-6: Use the Owner tab to take ownership of a file or a folder.
/>
Figure 10-7: Copy or remove the inherited permissions.
Figure 10-8: Click Yes to confirm that you want to replace the existing permissions.
Figure 10-9: Any checked permissions have been granted to the specified user or group.
Figure 10-10: Use the File Sharing dialog box to configure sharing of the selected file or folder.
Figure 10-11: All available shared folders on the computer are listed on the Shares node.
Figure 10-12: Map the share you want to use to a network drive.
Figure 10-13: Use the Network File And Printer Sharing page to configure public folder sharing.
Chapter 11: Configuring Advanced Windows Explorer Options, Offline Files, and Disk Quotas
Figure 11-1: Configure Windows Explorer options by enabling or disabling the related policies.
Figure 11-2: View and change file type associations using the Set Associations dialog box.
Figure 11-3: Configure caching options for offline files in the Offline Settings dialog box.
Figure 11-4: Use Sync Center to view and manage synchronization.
Figure 11-5: Create a sync schedule.
Figure 11-6: Sync based on events and actions.
Figure 11-7: Conflicts are listed according to document name, file type, time, partnership, and conflict type.
Figure 11-8: Use the Resolve Conflict dialog box to resolve synchronization conflicts.
Figure 11-9: Once you enable quota management, you can configure a quota limit and quota warning for all users.
Figure 11-10: Disk quota entries show current disk space usage on a particular volume as well as applicable quota limits and warning levels.
Chapter 12: Configuring and Troubleshooting TCP/IP Networking
Figure 12-1: Use Network Explorer to allow network discovery and to browse resources as permitted by the current configuration.
Figure 12-2: Use Network And Sharing Center to view the network status and details.
Figure 12-3: Use Network Map to get an expanded view of the network.
Figure 12-4: Use the Local Area Connection Properties dialog box to install and configure TCP/IP.
Figure 12-5: Use the Advanced TCP/IP Settings dialog box to configure multiple IP addresses and gateways.
Figure 12-6: Use the DNS tab of the Advanced TCP/IP Settings dialog box to configure advanced DNS settings.
Figure 12-7: Use the WINS tab of the Advanced TCP/IP Settings dialog box to configure WINS resolution for NetBIOS computer names.
Figure 12-8: The General tab of the Local Area Connection Status dialog box provides access to summary information regarding connections, properties, and support.