MCTS 70-620 Microsoft Windows Vista™, Configuring ®
Donald Poulton
MCTS 70-620 Exam Prep: Microsoft® Windows Vista™, Configuring Copyright © 2008 by Que Publishing All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. ISBN-13: 978-0-7897-3687-1 ISBN-10: 0-7897-3687-x Library of Congress Cataloging-in-Publication Data Poulton, Don. MCTS 70-620 exam prep : Microsoft Windows Vista client, configuring / Donald Poulton. — 1st ed. p. cm. ISBN 978-0-7897-3687-1 (pbk. w/cd) 1. Electronic data processing personnel—Certification. 2. Microsoft software—Examinations— Study guides. 3. Microsoft Windows (Computer file) I. Title. QA76.3.P665 2008 005.4’46—dc22 2007035980 Printed in the United States of America First Printing: October 2007
Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Que Publishing cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Microsoft is a registered trademark of Microsoft Corporation. Windows Vista is a trademark of Microsoft Corporation.
Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it.
Bulk Sales Que Publishing offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales. For more information, please contact U.S. Corporate and Government Sales 1-800-382-3419
[email protected] For sales outside the United States, please contact International Sales
[email protected]
Publisher Paul Boger Associate Publisher David Dusthimer Acquisitions Editor Betsy Brown Development Editor Dayna Isley Managing Editor Patrick Kanouse Senior Project Editor Tonya Simpson Copy Editor Language Logistics, LLC Indexer JBIndexing Proofreader Paula Lowell Technical Editor Chris Crayton Publishing Coordinator Vanessa Evans Book Designer Gary Adair
Contents at a Glance Introduction
1
Objectives Quick Reference
5
Study and Exam Preparation Tips
7
Part I: Exam Preparation CHAPTER 1 Introducing Windows Vista
29
CHAPTER 2 Installing Windows Vista
55
CHAPTER 3 Upgrading to Windows Vista
127
CHAPTER 4 Configuring and Troubleshooting Post-Installation System Settings
155
CHAPTER 5 Configuring Windows Security Features
225
CHAPTER 6 Configuring Network Connectivity
301
CHAPTER 7 Configuring Applications Included with Windows Vista
385
CHAPTER 8 Maintaining and Optimizing Systems That Run Windows Vista
465
CHAPTER 9 Configuring and Troubleshooting Mobile Computing
541
Part II: Final Review Fast Facts
601
Practice Exam
651
Practice Exam Answers
677
Part III: Appendixes What’s on the CD-ROM
691
Glossary
695
Index
715
Table of Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 How This Book Helps You . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Instructional Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Extensive Practice Test Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Final Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Microsoft 70-620 Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 TS: Microsoft Windows Vista Client, Configuring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Exam Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Study and Exam Preparation Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Learning Styles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Study Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Study Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Pretesting Yourself. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Exam Prep Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 MCP Exam Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Exam Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Question Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Putting It All Together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Final Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Part I: Exam Preparation CHAPTER 1
Introducing Windows Vista. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 About Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 The History of Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Windows Vista Editions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
A Quick Tour of Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Patches, Hotfixes, and Service Packs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Suggested Readings and Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 CHAPTER 2
Installing Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Identifying Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Hardware Compatibility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Software Compatibility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Network Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 File System Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Product Activation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Performing a Clean Installation of Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Performing an Attended Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Performing an Unattended Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Installing Windows Vista by Using the System Preparation Tool (Sysprep) . . . 85 Deploying an Image with Sysprep . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Installing Windows Vista by Using Windows Deployment Services (WDS) . . . 90 Troubleshooting Windows Vista Installation Issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Troubleshooting Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Troubleshooting an Attended Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Troubleshooting an Unattended Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Troubleshooting Failed Installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Installing and Configuring Windows Vista Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Managing and Troubleshooting Drivers and Driver Signing . . . . . . . . . . . . . . . 111 Using Windows Vista Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Apply Your Knowledge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Answers to Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Suggested Readings and Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
vi
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring CHAPTER 3
Upgrading to Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Upgrading to Windows Vista from a Previous Version of Windows . . . . . . . . . . . . . 130 Preparing a Computer to Meet Upgrade Requirements . . . . . . . . . . . . . . . . . . . 131 Upgrading the Computer to Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Dual-Booting Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Upgrading from One Edition of Windows Vista to Another . . . . . . . . . . . . . . . . . . . . 140 Windows Anytime Upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Upgrading Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Performing Post-Installation Updates and Product Activation . . . . . . . . . . . . . . . . . . 143 Installing Updates and Hotfixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Managing Automatic Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Apply Your Knowledge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Answers to Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Suggested Readings and Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 CHAPTER 4
Configuring and Troubleshooting Post-Installation System Settings . . . . . . . . . . . . . . . . . . . . . 155 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Troubleshooting Post-Installation Configuration Issues . . . . . . . . . . . . . . . . . . . . . . . . 158 Troubleshooting Startup Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Using Alternative Startup Strategies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Troubleshooting Hardware Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Configuring Application Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Windows Easy Transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Configuring and Troubleshooting Windows Aero . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Understanding Windows Presentation Foundation . . . . . . . . . . . . . . . . . . . . . . . 186 Understanding Hardware Requirements for Running Aero . . . . . . . . . . . . . . . . 186 Configuring Desktop Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Troubleshooting Aero . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 Configuring Windows Vista Start Menu and Taskbar . . . . . . . . . . . . . . . . . . . . . 191
vii
Contents
Configuring and Troubleshooting Parental Controls . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Configuring Various Types of Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 Configuring Activity Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Configuring Windows Internet Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Configuring Tabbed Browsing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Blocking Pop-ups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Customizing Internet Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Apply Your Knowledge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Answers to Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Suggested Readings and Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 CHAPTER 5
Configuring Windows Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Local User and Group Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Managing User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Managing Local Group Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Belonging to a Windows Server Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Configuring and Troubleshooting User Account Control . . . . . . . . . . . . . . . . . . . . . . 238 Features of User Account Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Configuring User Account Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 User Account Control Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 Configuring Windows Defender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Scanning for Malicious Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Configuring Dynamic Security for Internet Explorer 7 . . . . . . . . . . . . . . . . . . . . . . . . 259 Configuring Internet Explorer Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Configuring Protected Mode in Internet Explorer . . . . . . . . . . . . . . . . . . . . . . . 261 Configuring Content Advisor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 Configuring the Phishing Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Understanding Advanced Security Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
viii
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
Configuring Security Settings in Windows Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Configuring Windows Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Configuring Group Policy and Windows Firewall. . . . . . . . . . . . . . . . . . . . . . . . 282 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 Apply Your Knowledge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Answers to Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Suggested Readings and Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 CHAPTER 6
Configuring Network Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Understanding the TCP/IP Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Features of TCP/IP Version 4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 Features of TCP/IP Version 6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Configuring Networking by Using the Network and Sharing Center . . . . . . . . . . . . 316 Using the Network and Sharing Center to Configure TCP/IP. . . . . . . . . . . . . 317 Using the Network and Sharing Center to Configure File Sharing . . . . . . . . . 325 Managing Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Configuring and Troubleshooting Internet Connection Sharing . . . . . . . . . . . 340 Troubleshooting Connectivity Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Troubleshooting LAN Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Using TCP/IP Utilities to Troubleshoot TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . 345 Troubleshooting Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 Troubleshooting Hardware and Modem Problems . . . . . . . . . . . . . . . . . . . . . . . 351 Configuring Remote Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 Understanding Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 Using a VPN Connection to Connect to Computers . . . . . . . . . . . . . . . . . . . . . 359 Connecting to the Internet by Using Dial-Up Networking . . . . . . . . . . . . . . . 361 Remote Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
ix
Contents
Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368 Apply Your Knowledge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 Answers to Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 Answers to Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 Suggested Readings and Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382 CHAPTER 7
Configuring Applications Included with Windows Vista. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 Configuring and Troubleshooting Media Applications . . . . . . . . . . . . . . . . . . . . . . . . . 389 Windows Media Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 Windows Media Player. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 Windows Photo Gallery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408 Windows Movie Maker and Windows DVD Maker . . . . . . . . . . . . . . . . . . . . . . 412 Configuring Windows Mail. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414 Configuring Mail Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 Managing Email Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 Configuring Mail Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 Configuring Mail Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Configuring Windows Meeting Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430 Setting Up Windows Meeting Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 Running Meetings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433 Sharing Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435 Configuring Windows Calendar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437 Navigating Windows Calendar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 Managing Tasks and Appointments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Using Multiple Calendars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441 Sharing Calendars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443 Configuring Windows Fax and Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444 Fax Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445 Sending and Receiving Faxes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446 Scanning Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448 Configuring Windows Sidebar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448 Windows Sidebar Gadgets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
x
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452 Apply Your Knowledge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453 Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457 Answers to Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 Answers to Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462 Suggested Readings and Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464 CHAPTER 8
Maintaining and Optimizing Systems That Run Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . 465 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468 Troubleshooting Performance Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468 Reliability and Performance Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468 Command-Line Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485 New Vista Technologies for Enhancing System Performance . . . . . . . . . . . . . . 486 Troubleshooting Reliability Issues by Using Built-in Diagnostic Tools . . . . . . . . . . . 489 System Configuration Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489 Task Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492 Event Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496 Configuring Windows Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501 Working with Windows Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502 Using a WSUS Server with Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504 Windows Update Group Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504 Configuring Data Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507 Using Windows Backup to Protect Your Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 508 Data Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515 BitLocker Drive Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528 Apply Your Knowledge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529 Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530 Answers to Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536 Suggested Readings and Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
xi
Contents CHAPTER 9
Configuring and Troubleshooting Mobile Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544 Configuring Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544 Mobile PC Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544 Windows Mobility Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545 Networking with Mobile Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 Configuring Infrared Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555 Configuring Mobile Display Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556 Presentation Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556 Using a Networked Projector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558 External Monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560 Windows SideShow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561 Configuring Tablet PC Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564 Tablet PC Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565 Tablet PC Input Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567 The Snipping Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575 Touch Screen Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575 Configuring Power Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576 Power Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577 Battery Meter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581 Power Management and Group Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586 Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587 Apply Your Knowledge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588 Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 590 Answers to Exam Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594 Suggested Readings and Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596 Part II: Final Review Fast Facts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601 Introducing Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602 Installing Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604 Upgrading to Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608 Configuring and Troubleshooting Post-Installation System Settings . . . . . . . . . . . . . 610
xii
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
Configuring Windows Security Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618 Configuring Network Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625 Configuring Applications Included with Windows Vista . . . . . . . . . . . . . . . . . . . . . . . 635 Monitoring and Optimizing System Performance and Reliability. . . . . . . . . . . . . . . . 641 Configuring and Troubleshooting Mobile Computing . . . . . . . . . . . . . . . . . . . . . . . . . 648 Practice Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651 Answers to Practice Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677 Part III: Appendixes What’s on the CD-ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691 Multiple Test Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691 Study Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691 Certification Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691 Custom Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692 Attention to Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692 Installing the CD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692 Creating a Shortcut to the MeasureUp Practice Tests. . . . . . . . . . . . . . . . . . . . . . . . . . 693 Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694 Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
About the Author Don Poulton (A+, Network+, Security+, MCSA, MCSE) is an independent consultant who has been involved with computers since the days of 80-column punch cards. After a career of more than 20 years in environmental science, Don switched careers and trained as a Windows NT 4.0 MCSE. He has been involved in consulting with a couple of small training providers as a technical writer, during which time he wrote training and exam prep materials for Windows NT 4.0, Windows 2000, and Windows XP. Don has written or contributed to several titles, including Security+ Lab Manual (Que, 2004), MCSA/MCSE 70-299 Exam Cram 2: Implementing and Administering Security in a Windows 2003 Network (Exam Cram 2) (Que, 2004), and MCSE 70-294 Exam Prep: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure (Que, 2006). In addition, he has worked on programming projects, both in his days as an environmental scientist and, more recently, with Visual Basic to update an older statistical package used for multivariate analysis of sediment contaminants. When not working on computers, Don is an avid amateur photographer who has had his photos displayed in international competitions and published in magazines such as Michigan Natural Resources Magazine and National Geographic Traveler. Don also enjoys traveling and keeping fit. Don lives in Burlington, Ontario, with his wife Terry.
About the Technical Reviewer Chris Crayton is a technical consultant, security consultant, and trainer. Formerly he worked as a networking instructor at Keiser College and as a network administrator for Protocol, an electronic customer relationship management (eCRM) company. Chris has authored several print and online books, including Microsoft Windows Vista 70-620 Exam Guide Short Cut (O’Reilly, 2007), CompTIA A+ Essentials 220-601 Exam Guide Short Cut (O’Reilly, 2007), A+ Adaptive Exams (Charles River Media, 2002), and The Security+ Exam Guide (Charles River Media, 2003). He holds MCSE, MCP+I, A+ and Network+ certifications.
Dedication I would like to dedicate this work to my grandson, Nolan, whose great smile and “always-happy” disposition will carry him far in his life’s journeys. —Don Poulton
Acknowledgments I would like to thank the staff at Que Publishing, in particular, Betsy Brown, who guided me throughout the progress of the work, Dayna Isley, who provided many helpful suggestions for improving the manuscript, and Tonya Simpson, who guided the manuscript through the production process. I am also indebted to Chris Crayton for his technical comments, which proved very helpful in completing this project. I would also like to thank my wife, Terry, for standing by me during the hours I had to devote to completing this work.
We Want to Hear from You! As the reader of this book, you are our most important critic and commentator. We value your opinion and want to know what we’re doing right, what we could do better, what areas you’d like to see us publish in, and any other words of wisdom you’re willing to pass our way. As an acquisitions editor for Que Publishing, I welcome your comments. You can email or write me directly to let me know what you did or didn’t like about this book—as well as what we can do to make our books better. Please note that I cannot help you with technical problems related to the topic of this book. We do have a User Services group, however, where I will forward specific technical questions related to the book. When you write, please be sure to include this book’s title and author as well as your name, email address, and phone number. I will carefully review your comments and share them with the author and editors who worked on the book. Email:
[email protected] Mail:
Betsy Brown Acquisitions Editor Que Publishing 800 East 96th Street Indianapolis, IN 46240 USA
Reader Services Visit our website and register this book at www.examcram.com/title/9780789736871 for convenient access to any updates, downloads, or errata that might be available for this book.
This page intentionally left blank
Introduction MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring is designed for network administrators, network engineers, and consultants who are pursuing the Microsoft Certified Technology Specialist (MCTS) or Microsoft Certified IT Professional (MCITP) certifications for Windows Vista. This book covers the “TS: Microsoft Windows Vista, Configuring” exam (70-620), which earns you the Microsoft Certified Technology Specialist: Windows Vista, Configuration certification. The exam is designed to measure your skill and ability to implement, administer, and troubleshoot computers running all editions of Windows Vista. Microsoft not only tests you on your knowledge of the desktop operating system, but it has purposefully developed questions on the exam to force you to problem-solve in the same way that you would when presented with a real-life error. Passing this exam demonstrates your competency in administration. This book covers all the objectives that Microsoft has established for exam 70-620. It doesn’t offer end-to-end coverage of the Windows Vista system; instead, it helps you develop the specific core competencies that you need to master as a desktop support specialist. You should be able to pass the exam by learning the material in this book, without taking a class.
How This Book Helps You When anyone embarks on a certification track, the first thought is to get certified, put some letters after your name, strengthen your resume, and move on to the next step. Selecting a method of study for that certification often is a choice between a hands-on laboratory class of a few days or a self-study method pieced together with books and your own lab environment that is not bound by any time limits. Your choice depends on how you study best and what type of reference material you want available to you after you have passed the exam. This book gives you a self-guided tour of all the areas that are covered by the “TS: Microsoft Windows Vista, Configuring” exam. The goal is to teach you the specific skills you need to achieve your MCTS certification. You’ll also find helpful hints, tips, examples, exercises, and references to additional study materials.
Organization This book is organized around the individual objectives from Microsoft’s preparation guide for the “TS: Microsoft Windows Vista, Configuring” exam. Every objective is covered in this book. The objectives are not covered in exactly the same order in which you’ll find them in
2
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
the official preparation guide (which you can download from www.microsoft.com/ learning/exams/70-620.asp), but they are reorganized for more logical teaching. We have also tried to make the information more accessible in several ways: . This introduction includes the full list of exam topics and objectives. . The “Study and Exam Preparation Tips” section helps you develop study strategies. It
also provides you with valuable exam-day tips and information. You should read it early on. . Each chapter starts with a list of objectives that are covered in that chapter. . Each chapter also begins with an outline that provides an overview of the material for
that chapter as well as the page numbers where specific topics can be found. . Each objective is repeated in the text, where it is covered in detail.
Instructional Features This book is designed to provide you with multiple ways to learn and reinforce the exam material. Here are some of the instructional features you’ll find inside: . Objective explanations—As mentioned previously, each chapter begins with a list of the
objectives covered in the chapter. In addition, immediately following each objective is a detailed explanation that puts the objective in the context of the product. . Study strategies—Each chapter offers a selected list of study strategies: exercises to try
or additional material to read that will help you learn and retain the material in the chapter. . Exam alerts—Exam alerts appear in the chapters and provide specific exam-related
advice. Exam alerts address what material is likely to be covered (or not covered) on the exam, how to remember it, or particular exam quirks. . Review breaks and chapter summaries—Crucial information is summarized at various
points in the book, in lists of key points you need to remember. Each chapter ends with an overall summary of the material covered in that chapter as well. . Challenge exercises—Challenge exercises offer additional opportunities to practice the
material within a chapter and to learn additional facets of the topic at hand. . Key terms—A list of key terms appears at the end of each chapter. . Step by Steps—These are hands-on, tutorial instructions that lead you through a partic-
ular task or function related to the exam objectives.
3
Introduction . Exercises—Found at the end of each chapter in the “Apply Your Knowledge” section,
the exercises include additional tutorial material and more chances to practice the skills that you learned in the chapter.
Extensive Practice Test Options The book provides numerous opportunities for you to assess your knowledge and practice for the exam. The practice options include the following: . Exam questions—These questions appear in the “Apply Your Knowledge” section. They
reflect the kinds of multiple-choice questions that appear on the Microsoft exams. You should use them to practice for the exam and to help determine what you know and what you might need to review or study further. Answers and explanations are provided later in the section. . Practice Exam—The “Final Review” section includes a complete exam that you can use
to practice for the real thing. The “Final Review” and the Practice Exam are discussed in more detail in the next section. . MeasureUp—The MeasureUp software included on the CD-ROM provides additional
practice questions.
Final Review The “Final Review” section of the book provides two valuable tools for preparing for the exam: . Fast Facts—This condensed version of the information contained in the book is
extremely useful for last-minute review. . Practice Exam—A full practice test for the exam is included in this book. Questions are
written in the style and format used on the actual exams. You should use the Practice Exam to assess your readiness for the real thing. Appendix A includes details about the content of the CD-ROM, and a glossary defines terms used throughout the book. These and all the other book features mentioned previously will provide you with thorough preparation for the exam.
4
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
For more information about the exam or the certification process, you should contact Microsoft directly: By email:
[email protected] By regular mail, telephone, or fax, contact the Microsoft Regional Service Center (RSC) nearest you. You can find lists of RSCs at www.microsoft.com/learning/support/northamerica.asp (for North America) and www.microsoft.com/learning/support/worldsites.mspx (worldwide). On the Internet: www.microsoft.com/learning/default.asp
TIP There’s no substitute for experience The single best study tip that anyone can give you is to actually work with the product that you’re learning! Even if you could become a “paper MCSE” simply by reading books, you wouldn’t get the real-world skills that you need to experience success with Windows Vista.
Microsoft 70-620 Exam Objectives TS: Microsoft Windows Vista, Configuring Exam Number: 70-620 Associated Certifications: MCTS: Windows Vista, Configuration Length: 50 questions, including simulations
Exam Description The TS: Microsoft Windows Vista, Configuring exam is designed to measure your skill in supporting all editions of Windows Vista on home and enterprise networks. Each top-level exam objective is related to a job skill that the candidate is expected to have and demonstrate.
Exam Objectives Exam 70-620 consists of the following seven objectives, each with several subobjectives.
NOTE The exam objectives are taken verbatim from the Microsoft Web page titled “Preparation Guide for Exam 70-620,” at http://www.microsoft.com/learning/exams/70-620.asp.
Installing and Upgrading Windows Vista
Troubleshoot Windows Vista installation
Identify hardware requirements.
Install and configure Windows Vista drivers.
Perform a clean installation.
Configuring and Troubleshooting Post-Installation System Settings
Upgrade to Windows Vista from previous versions of Windows. Upgrade from one edition of Windows Vista to another edition.
issues.
Troubleshoot post-installation configuration issues. Configure and troubleshoot Windows Aero.
Continues on Following Page
Exam Objectives Continued
Configure and troubleshoot parental controls. Configure Windows Internet Explorer.
Maintaining and Optimizing Systems That Run Windows Vista
Configuring Windows Security Features
Troubleshoot performance issues.
Configure and troubleshoot User Account
in diagnostic tools.
Control.
Configure Windows Update.
Configure Windows Defender.
Configure Data Protection.
Configure Dynamic Security for Internet Explorer 7.
Configuring and Troubleshooting Mobile Computing
Configure security settings in Windows
Configure Mobile Display Settings.
Firewall.
Configuring Network Connectivity Configuring networking by using the Network and Sharing Center. Troubleshoot connectivity issues. Configure Remote Access.
Configuring Applications Included with Windows Vista Configure and troubleshoot media applications. Configure Windows Mail. Configure Windows Meeting Space. Configure Windows Calendar. Configure Windows Fax and Scan. Configure Windows Sidebar.
Troubleshoot reliability issues by using built-
Configure Mobile Devices. Configure Tablet PC. Configure Power Options.
Study and Exam Preparation Tips It’s a rush of adrenaline during the final day before an exam. If you’ve scheduled the exam on a workday, or following a workday, you will find yourself cursing the tasks you normally cheerfully perform because the back of your mind is telling you to read just a bit more, study another scenario, practice another skill so that you will be able to get this exam out of the way successfully. The way that Microsoft has designed its tests lately does not help. I remember taking Microsoft exams many years ago and thoroughly understanding the term “paper certified.” Nowadays, you can’t get through a Microsoft exam without knowing the material so well that when confronted with a problem, whether a scenario or real-life situation, you can handle the challenge. Instead of trying to show the world how many MCSEs are out there, Microsoft is trying to prove how difficult it is to achieve a certification, including the newly created Microsoft Certified Technology Specialist (MCTS) and Microsoft Certified IT Professional (MCITP) as well as the MCSE and MCSA, thereby making those who are certified more valuable to their organizations. This element of the book provides you with some general guidelines for preparing for any certification exam, including Exam 70-620, TS: Microsoft Windows Vista, Configuring. It is organized into four sections. The first section addresses learning styles and how they affect preparation for the exam. The second section covers exam-preparation activities and general study tips. This is followed by an extended look at the Microsoft certification exams, including a number of specific tips that apply to the various Microsoft exam formats and question types. Finally, changes in Microsoft’s testing policies and how they might affect you are discussed.
8
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
Learning Styles To best understand the nature of preparation for the test, it is important to understand learning as a process. You are probably aware of how you best learn new material. You might find that outlining works best for you, or as a visual learner, you might need to “see” things. Or as a person who studies kinesthetically, the hands-on approach might serve you best. Whether you need models or examples or just like exploring the interface, or whatever your learning style, solid test preparation works best when it takes place over time. Obviously, you shouldn’t start studying for a certification exam the night before you take it; it is very important to understand that learning is a developmental process. Understanding learning as a process helps you focus on what you know and what you have yet to learn. People study in a combination of different ways—by doing, by seeing, and by hearing and writing. This book’s design fulfills all three of these study methods. For the kinesthetic, there are hands-on study strategies listed at the beginning of each chapter. You will also discover “Challenge” exercises and “Step by Step” instructions that walk you through the skills you need to master in Windows Vista. The visual learner can find plenty of screen shots explaining the concepts described in the text. The auditory learner can reinforce skills by reading out loud and copying down key concepts and exam tips scattered throughout the book. Finally, the Fast Facts section enables everyone to brush up on the essentials and be wholly prepared when walking into the test center to take the exam. While reading this book, you will realize that it stands the test of time. You will be able to turn to it over and over again. Thinking about how you learn should help you recognize that learning takes place when you are able to match new information to old. You have some previous experience with computers and networking. Now you are preparing for this certification exam. Using this book, software, and supplementary materials will not just add incrementally to what you know; as you study, the organization of your knowledge actually restructures as you integrate new information into your existing knowledge base. This leads you to a more comprehensive understanding of the tasks and concepts outlined in the objectives and of computing in general. Again, this happens as a result of a repetitive process rather than a singular event. If you keep this model of learning in mind as you prepare for the exam, you will make better decisions concerning what to study and how much more studying you need to do.
Study Tips There are many ways to approach studying, just as there are many different types of material to study. However, the tips that follow should work well for the type of material covered on Microsoft certification exams.
9
Study and Exam Preparation Tips
Study Strategies Although individuals vary in the ways they learn information, some basic principles of learning apply to everyone. You should adopt some study strategies that take advantage of these principles. One of these principles is that learning can be broken into various depths. Recognition (of terms, for example) exemplifies a rather surface level of learning in which you rely on a prompt of some sort to elicit recall. Comprehension or understanding (of the concepts behind the terms, for example) represents a deeper level of learning than recognition. The ability to analyze a concept and apply your understanding of it in a new way represents further depth of learning. Your learning strategy should enable you to know the material at a level or two deeper than mere recognition. This will help you perform well on the exams. You will know the material so thoroughly that you can go beyond the recognition-level types of questions commonly used in fact-based multiple-choice testing. You will be able to apply your knowledge to solve new problems.
Macro and Micro Study Strategies One strategy that can lead to deep learning includes preparing an outline that covers all the objectives and subobjectives for the particular exam you are planning to take. You should delve a bit further into the material and include a level or two of detail beyond the stated objectives and subobjectives for the exam. Then you should expand the outline by coming up with a statement of definition or a summary for each point in the outline. An outline provides two approaches to studying. First, you can study the outline by focusing on the organization of the material. You can work your way through the points and subpoints of your outline, with the goal of learning how they relate to one another. For example, you should be sure you understand how each of the main objective areas for Exam 70-620 is similar to and different from another. Then you should do the same thing with the subobjectives; you should be sure you know which subobjectives pertain to each objective area and how they relate to one another. Next, you can work through the outline, focusing on learning the details. You should memorize and understand terms and their definitions, facts, rules and tactics, advantages and disadvantages, and so on. In this pass through the outline, you should attempt to learn detail rather than the big picture (the organizational information that you worked on in the first pass through the outline). Research has shown that attempting to assimilate both types of information at the same time interferes with the overall learning process. If you separate your studying into these two approaches, you will perform better on the exam.
10
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
Active Study Strategies The process of writing down and defining objectives, subobjectives, terms, facts, and definitions promotes a more active learning strategy than merely reading the material does. In human information-processing terms, writing forces you to engage in more active encoding of the information. Simply reading over the information leads to more passive processing. Using this study strategy, you should focus on writing down the items that are highlighted in the book—bulleted or numbered lists, exam tips, notes, warnings, and review sections, for example. You need to determine whether you can apply the information you have learned by attempting to create examples and scenarios on your own. You should think about how or where you could apply the concepts you are learning. Again, you should write down this information to process the facts and concepts in an active fashion. The hands-on nature of the exercises at the end of each chapter provides further active learning opportunities that will reinforce concepts as well.
Common-Sense Strategies You should follow common-sense practices when studying: You should study when you are alert, reduce or eliminate distractions, and take breaks when you become fatigued.
Pretesting Yourself Pretesting allows you to assess how well you are learning. One of the most important aspects of learning is what has been called meta-learning. Meta-learning has to do with realizing when you know something well or when you need to study some more. In other words, you recognize how well or how poorly you have learned the material you are studying. For most people, this can be difficult to assess. Challenge exercises, practice questions, and practice tests are useful in that they reveal objectively what you have learned and what you have not learned. You should use this information to guide review and further studying. Developmental learning takes place as you cycle through studying, assessing how well you have learned, reviewing, and assessing again until you feel you are ready to take the exam. You might have noticed the practice exam included in this book. You should use it as part of the learning process. The MeasureUp test-simulation software included on this book’s CDROM also provides you with an excellent opportunity to assess your knowledge. You should set a goal for your pretesting. A reasonable goal would be to score consistently in the 90% range. See the element “What’s on the CD-ROM” near the back of the book for further explanation of the test-simulation software.
11
Study and Exam Preparation Tips
Exam Prep Tips After you have mastered the subject matter, the final preparatory step is to understand how the exam will be presented. Make no mistake: A Microsoft Certified Technology Specialist (MCTS) exam challenges both your knowledge and your test-taking skills. The following sections describe the basics of exam design and the exam formats, as well as provide hints targeted to each of the exam formats. Preparing for the 70-620 exam is a bit different than preparing for those old Microsoft exams, too. The following is a list of things that you should consider doing: . Combine your skill sets into solutions—In the past, exams would test whether you knew to
select the correct letter of a multiple choice answer. Today, you need to know how to resolve a problem that can involve different aspects of the material covered. For example, on exam 70-620 you could be presented with a problem that requires you to understand how to incorporate drivers in an unattended installation, as well as what errors you might see if you installed a computer that used a device driver incompatible with Windows Vista. The skills themselves are simple. Being able to zero in on what caused the problem and then to resolve it for a specific situation is what you need to demonstrate. In fact, you should not only be able to select one answer, but also multiple parts of a total solution. . Delve into excruciating details—The exam questions incorporate a great deal of informa-
tion in the scenarios. Some of the information is ancillary—it will help you rule out possible issues but not necessarily resolve the answer. Some of the information simply provides you with a greater picture, like you would have in real life. Some information is key to your solution. For example, you might be presented with a question that lists a computer’s hard disk size, memory size, and detailed hardware configuration. When you delve further into the question, you realize that the hardware configuration is the problem. Other times, you will find that the hardware configuration simply eliminates one or more of the answers that you could select. For example, a portable laptop does not support dynamic disks, so if the hardware configuration is a portable laptop and one of the answers is a dynamic disk configuration, you can eliminate it. If you don’t pay attention to what you can eliminate, the answer can elude you completely. And other times, the hardware configuration simply lets you know that the hardware is adequate. . TCP/IP troubleshooting is built right in—Because TCP/IP is a core technology to the
Windows Vista operating system, you are expected to know how to configure the operating system, how to recognize IP conflicts, and how to use the TCP/IP tools to troubleshoot the problem. Furthermore, Microsoft expects you to know how to work with the new version 6 of TCP/IP along with the traditional version 4 that has been used
12
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
for many years. You should also be able to discern between an IP problem and something wrong with the OS or hardware, or even some combination that involves IP along with some other element. . It’s a GUI test—Microsoft has expanded its testing criteria into interface recognition.
You should be able to recognize each dialog box, properties sheet, option, and default. You will be tested on how to navigate the new interface—for example, the new Aero and Aero Glass desktop themes used by Windows Vista and the Category View shown in Control Panel. If you have reverted your Windows Vista desktop to the Windows Classic theme and you have not yet learned the new interface, you might end up selecting answers that are deliberately placed to confuse a person used to the old Windows desktop. Of course, if you know the difference between the two, you’ll be able to spot the old ones and avoid them. . Practice with a time limit—The tests have always been time restricted, but it takes more
time to read and understand the scenarios now, and time is a whole lot tighter. To get used to the time limits, test yourself with a timer. Know how long it takes you to read scenarios and select answers.
MCP Exam Design Every MCP/MCTS/MCITP exam is released in one of three basic formats. What’s being called “exam format” here is really little more than a combination of the overall exam structure and the presentation method for exam questions. Understanding the exam formats is key to good preparation because they determine the number of questions presented, the difficulty of those questions, and the amount of time allowed to complete the exam. All the exam formats use many of the same types of questions. These types or styles of questions include several types of traditional multiple-choice questions, multiple-rating (or scenariobased) questions, and simulation-based questions. Some exams include other types of questions that ask you to drag and drop objects onscreen, reorder a list, or categorize things. Still other exams ask you to answer various types of questions in response to case studies you have read. It’s important that you understand the types of questions you will be asked and the actions required to answer them properly. The following sections address the exam formats and the question types. Understanding these will help you feel much more comfortable when you take the exam.
13
Study and Exam Preparation Tips
Exam Formats As mentioned previously, there are two basic formats for the MCP exams: the traditional fixedform exam and the case study exam. As its name implies, the fixed-form exam presents a fixed set of questions during the exam session. The case study exam includes case studies organized into testlets that serve as the basis for answering the questions. Most MCP exams these days utilize the fixed-form approach, with the case study approach running second. Another test format previously used was the adaptive exam; however, Microsoft no longer employs adaptive algorithms in its exams. The adaptive exam uses only a subset of questions drawn from a larger pool during any given exam session. It might present each test-taker with a different number of questions, depending on how the person answers the initial questions.
Fixed-Form Exams A fixed-form computerized exam is based on a fixed set of exam questions. The individual questions are presented in random order during a test session. If you take the same exam more than once, you won’t necessarily see exactly the same questions. This is because two or three final forms are typically assembled for every fixed-form exam Microsoft releases. These are usually labeled Forms A, B, and C. The final forms of a fixed-form exam are identical in terms of content coverage, number of questions, and allotted time, but the questions for each are different. However, some of the same questions are shared among different final forms. When questions are shared among multiple final forms of an exam, the percentage of sharing is generally small. Many final forms share no questions, but some older exams may have a 10%–15% duplication of exam questions on the final exam forms. Fixed-form exams also have fixed time limits in which you must complete them. The score you achieve on a fixed-form exam, which is always calculated for MCP exams on a scale of 0 to 1,000, is based on the number of questions you answer correctly. For several years early in this decade, Microsoft no longer reported the actual score to you; however, more recently, Microsoft has again provided your exam score. In addition, most recent exams have standardized on a passing score of 700. In all cases, the score is calculated in this fashion. The typical design of a fixed-form exam is as follows: . The exam contains 50–60 questions. . You are allowed 75–90 minutes of testing time. . Question review is allowed, including the opportunity to change your answers.
14
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring . Candidates must correctly answer 70% or more of the questions to pass. . Candidates’ answers are scored according to their correct answers: . No points are deducted for incorrect answers—there is only zero credit for those
questions. . Partial credit may be granted for some questions where multiple answers are
expected for a complete solution and only a subset of the answers has been selected. . Full credit may be granted for some questions where multiple solutions are correct
in their entirety and only one of the answers has been selected.
Case Study Exams The case study–based format for Microsoft exams first appeared with the advent of the 70-100 exam (the original “Solution Architectures” exam) and then appeared in the MCSE sequence in the Design exams. The questions in the case study format are not the independent entities that they are in the fixed-format exams. Instead, questions are tied to a case study, a long scenario-like description of an information technology situation. As the test-taker, your job is to extract from the case study the information that needs to be integrated with your understanding of Microsoft technology. The idea is that a case study will provide you with a situation that is even more like a real-life problem than the other formats provide. The case studies are presented as testlets. A testlet is a section within the exam in which you read the case study and then answer 10–20 questions that apply to the case study. When you finish that section, you move on to another testlet with another case study and its associated questions. Typically, three to five of these testlets compose the overall exam. You are given more time to complete such an exam than to complete the other types because it takes time to read through the cases and analyze them. You might have as much as three hours to complete a case study exam—and you might need all of it. The case studies are always available through a linking button while you are in a testlet. However, when you leave a testlet, you cannot come back to it. Figure 1 provides an illustration of part of such a case study.
Question Types A variety of question types can appear on MCP exams. We have attempted to cover all the types that are available at the time of this writing. Most of the question types discussed in the following sections can appear in each of the two exam formats.
15
Study and Exam Preparation Tips
FIGURE 1 An example of a case study.
A typical MCP exam question is based on the idea of measuring skills or the ability to complete tasks. Therefore, most of the questions are written so as to present you with a situation that includes a role (such as a system administrator or technician), a technology environment (for example, 100 computers running Windows Vista Business on a Windows Server 2003 network), and a problem to be solved (for example, the user can connect to services on the LAN but not on the intranet). The answers indicate actions you might take to solve the problem or create setups or environments that would function correctly from the start. You should keep this in mind as you read the questions on the exam. You might encounter some questions that just call for you to regurgitate facts, but these will be relatively few and far between. The following sections look at the different question types.
Multiple-Choice Questions Despite the variety of question types that now appear in various MCP exams, the multiplechoice question is still the basic building block of the exams, and it comes in three varieties: . Regular multiple-choice question—Also referred to as an alphabetic question, a regular
multiple-choice question asks you to choose one answer as correct. A circle is displayed to the left of each answer. You click the circle to select your answer. If you change your mind, you can select another answer by clicking it, and your former selection is cleared. . Multiple-answer, multiple-choice question—Also referred to as a multi-alphabetic question,
this version of a multiple-choice question requires you to choose two or more answers as correct. In most cases, you are told precisely the number of correct answers to
16
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
choose. A box is displayed to the left of each optional answer. You can click each box to select multiple answers. In some cases, the exam software prompts you to let you know that you have attempted to select more answers than the number required for the question. . Enhanced multiple-choice question—This is simply a regular or multiple-answer question
that includes a graphic or table to which you must refer to answer the question correctly. Examples of multiple-choice questions appear at the end of each chapter in this book.
Simulation Questions Simulation-based questions reproduce the look and feel of key Microsoft product features for the purpose of testing. The simulation software used in MCP exams has been designed to look and act, as much as possible, just like the actual product. Consequently, answering simulation questions in an MCP exam entails completing one or more tasks just as if you were using the product itself. A typical Microsoft simulation question consists of a brief scenario or problem statement, along with one or more tasks that you must complete to solve the problem. It sounds obvious, but your first step when you encounter a simulation question is to carefully read the question (see Figure 2). You should not go straight to the simulation application! You must assess the problem that’s presented and identify the conditions that make up the problem scenario. You should note the tasks that must be performed or outcomes that must be achieved to answer the question, and then you should review any instructions you’re given on how to proceed.
FIGURE 2
A typical MCP exam simulation with
directions.
The next step is to launch the simulator by using the button provided. After you click the Show Simulation button, you see a feature of the product, as shown in the dialog box in Figure 3. The simulation application partially obscures the question text on many test center machines. You should feel free to reposition the simulator and move between the question text
17
Study and Exam Preparation Tips
screen and the simulator by using hotkeys or point-and-click navigation—or even by clicking the simulator’s launch button again.
FIGURE 3 Launching the simulation application.
It is important for you to understand that your answer to the simulation question is not recorded until you move on to the next exam question. This gives you the added capability of closing and reopening the simulation application (by using the launch button) on the same question without losing any partial answer you might have made. The third step is to use the simulator as you would the actual product to solve the problem or perform the defined tasks. Again, the simulation software is designed to function—within reason—just as the product does. But you shouldn’t expect the simulator to reproduce product behavior perfectly. Most importantly, you should not allow yourself to become flustered if the simulator does not look or act exactly like the product. Figure 4 shows the solution to the sample simulation problem. Two final points will help you tackle simulation questions. First, you should respond only to what is being asked in the question; you should not solve problems that you are not asked to solve. Second, you should accept what is being asked of you. You might not entirely agree with conditions in the problem statement, the quality of the desired solution, or the sufficiency of defined tasks to adequately solve the problem. However, you should remember that you are being tested on your ability to solve the problem as it is presented. The solution to the simulation problem shown in Figure 4 perfectly illustrates both those points. As you’ll recall from the question scenario (refer to Figure 2), you were asked to assign appropriate permissions to a new user, FridaE. You were not instructed to make any other changes in permissions. Therefore, if you were to modify or remove the administrator’s permissions, this item would be scored wrong on an MCP exam.
18
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
FIGURE 4
The solution to the simulation
example.
Hot-Area Question Hot-area questions call for you to click a graphic or diagram to complete some task. You are asked a question that is similar to any other, but rather than click an option button or check box next to an answer, you click the relevant item in a screenshot or on a part of a diagram. An example of such an item is shown in Figure 5.
FIGURE 5 A typical hotarea question.
19
Study and Exam Preparation Tips
Drag-and-Drop Questions Microsoft has utilized two different types of drag-and-drop questions in exams: select-andplace questions and drop-and-connect questions. Both are covered in the following sections. Select-and-Place Questions Select-and-place questions typically require you to drag and drop labels on images in a diagram so as to correctly label or identify some portion of a network. Figure 6 shows you the actual question portion of a select-and-place item.
FIGURE 6 A select-andplace question.
Figure 7 shows the window you would see after you clicked Select and Place. It contains the actual diagram in which you would select and drag the various server roles and match them up with the appropriate computers. Drop-and-Connect Questions Drop-and-connect questions provide a different spin on drag-and-drop questions. This type of question provides you with the opportunity to create boxes that you can label, as well as connectors of various types with which to link them. In essence, you create a model or diagram to answer a drop-and-connect question. You might have to create a network diagram or a data model for a database system. Figure 8 illustrates the idea of a drop-and-connect question.
20
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
FIGURE 7 The window containing the select-andplace diagram.
FIGURE 8 A drop-andconnect question.
Microsoft seems to be getting away from this type of question, perhaps because of the complexity involved. You might see the same sort of concepts tested with a more traditional question utilizing multiple exhibits, each of which shows a diagram; in this type of question, you must choose which exhibit correctly portrays the solution to the problem posed in the question.
21
Study and Exam Preparation Tips
Ordered-List Questions Ordered-list questions require you to consider a list of items and place them in the proper order. You select items and then use a button or drag and drop to add them to a new list in the correct order. You can use another button to remove the items in the new order in case you change your mind and want to reorder things. Figure 9 shows an ordered-list question.
FIGURE 9
An ordered-list
question.
Tree Questions Tree questions require you to think hierarchically and categorically. You are asked to place items from a list into categories that are displayed as nodes in a tree structure. Such questions might ask you to identify parent-child relationships in processes or the structure of keys in a database. You might also be required to show order within the categories, much as you would in an ordered-list question. Figure 10 shows an example of a tree question.
Putting It All Together As you can see, Microsoft is making an effort to utilize question types that go beyond asking you to simply memorize facts. These question types force you to know how to accomplish tasks and understand concepts and relationships. You should study so that you can answer these types of questions rather than those that simply ask you to recall facts. Given all the different pieces of information presented so far, the following sections present a set of tips that will help you successfully tackle the exam.
22
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
FIGURE 10
A tree
question.
More Exam-Preparation Tips Generic exam-preparation advice is always useful. Tips include the following: . Become familiar with the product. Hands-on experience is one of the keys to success
on any MCP exam. Review the exercises and the Step by Steps in the book. . Review the current exam-preparation guide on the Microsoft Training & Events web-
site. The documentation Microsoft makes available on the Web identifies the skills every exam is intended to test. . Memorize foundational technical detail but remember that MCP exams are generally
heavier on problem solving and application of knowledge than on questions that require only rote memorization. . Take any of the available practice tests. We recommend the one included in this book
and the ones you can create by using the MeasureUp software on this book’s CDROM. As a supplement to the material bound with this book, try the free practice tests available on the Microsoft MCP website. . Look on the Microsoft Training & Events website for samples and demonstration
items (as of this writing, check http://www.microsoft.com/learning/default.mspx, but you might have to look around for the samples because the URL might have changed). These tend to be particularly valuable for one significant reason: They help you become familiar with new testing technologies before you encounter them on MCP exams.
23
Study and Exam Preparation Tips
Tips for Success During the Exam Session The following generic exam-taking advice that you’ve heard for years applies when you’re taking an MCP exam: . To keep yourself sharp on the day of the exam, read over the items in the “Fast Facts”
section of this book and get a good night’s sleep the night before the exam. . On the day of the exam, make sure that you take the necessary number of forms of
identification that correctly identify you as the candidate. Arrive at least 20 minutes before the scheduled start of the exam. If you are sick and unable to take the exam, obtain a doctor’s certificate signed on the day the exam was scheduled to take the exam at a later date. . Take a deep breath and try to relax when you first sit down for your exam session. It is
very important that you control the pressure you might (naturally) feel when taking exams. . You will be provided scratch paper. Take a moment to write down any factual informa-
tion and technical detail that you have committed to short-term memory. . Carefully read all information and instruction screens. These displays have been put
together to give you information relevant to the exam you are taking. . Accept the nondisclosure agreement and preliminary survey as part of the examination
process. Complete them accurately and quickly move on. . Read the exam questions carefully. Reread each question to identify all relevant detail. . Look for key words in multiple choice (MC) questions such as “all” or “any.” The
word “all” indicates that you should look for one or more correct answers. The word “any” indicates that there may be one or more correct answers or that the option indicating that there is no correct solution might be correct. . You don’t lose any marks for guessing wrong answers, but you don’t gain any either! If
you can’t decide which solution is correct, you have nothing to lose by guessing. . In fixed-form exams, tackle the questions in the order in which they are presented.
Skipping around won’t build your confidence; the clock is always counting down. . Don’t rush, but also don’t linger on difficult questions. The questions vary in degree of
difficulty. Don’t let yourself be flustered by a particularly difficult or wordy question. Besides considering the basic preparation and test-taking advice presented so far, you also need to consider the challenges presented by the different exam designs, as described in the following sections.
24
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
Tips for Fixed-Form Exams Because a fixed-form exam is composed of a fixed, finite set of questions, you should add these tips to your strategy for taking a fixed-form exam: . Note the time allotted and the number of questions on the exam you are taking. Make
a rough calculation of how many minutes you can spend on each question and use this figure to pace yourself through the exam. . Take advantage of the fact that you can return to and review skipped or previously
answered questions. Record the questions you can’t answer confidently on the scratch paper provided, noting the relative difficulty of each question. When you reach the end of the exam, return to the more difficult questions. . If you have session time remaining after you complete all the questions (and if you
aren’t too fatigued!), review your answers. Pay particular attention to questions that seem to have a lot of detail or that require graphics. . As for changing your answers, the general rule of thumb here is don’t! If you read the
question carefully and completely and you felt like you knew the right answer, you probably did. Don’t second-guess yourself. If, as you check your answers, one clearly stands out as incorrect, however, of course you should change it. But if you are at all unsure, go with your first impression.
Tips for Case Study Exams The case study exam format calls for unique study and exam-taking strategies: . Remember that you have more time than in a typical exam. Take your time and read
the case study thoroughly. . Use the scrap paper or whatever medium is provided to you to take notes, diagram
processes, and determine the important information. You might find that writing your thoughts, diagramming the information described in the question or the case study provided, and eliminating the obviously wrong answers in your scrap notes shortens the time you spend on each question. . Work through each testlet as if each were an independent exam. Remember that you
cannot go back after you have left a testlet. . Refer to the case study as often as you need to but do not use that as a substitute for
reading it carefully initially and taking notes.
25
Study and Exam Preparation Tips
Final Considerations Finally, a number of changes in the MCP program affect how frequently you can repeat an exam and what you will see when you do: . Microsoft has an exam retake policy. The rule is “two and two, then one and two.”
That is, you can attempt any exam twice with no restrictions on the time between attempts. But after the second attempt, you must wait two weeks before you can attempt that exam again. After that, you are required to wait two weeks between subsequent attempts. Plan to pass the exam in two attempts or plan to increase your time horizon for receiving the MCTS credential. . New questions are always being seeded into the MCP exams. After performance data is
gathered on new questions, the examiners replace older questions on all exam forms. This means that the questions appearing on exams change regularly. These changes mean that the brute-force strategies for passing MCP exams have lost their viability. So if you don’t pass an exam on the first or second attempt, it is possible that the exam’s form could change significantly by the next time you take it. It could be updated from fixedform to a case-study format, or even more likely, it could have a different set of questions or question types. Microsoft’s intention is not to make the exams more difficult by introducing unwanted change but to create and maintain valid measures of the technical skills and knowledge associated with the different MCP credentials. Preparing for an MCP exam has always involved not only studying the subject matter but also planning for the testing experience itself. With the continuing changes, this is now truer than ever.
This page intentionally left blank
PART I
Exam Preparation Chapter 1 Introducing Windows Vista Chapter 2 Installing Windows Vista Chapter 3 Upgrading to Windows Vista Chapter 4 Configuring and Troubleshooting Post-Installation System Settings Chapter 5 Configuring Windows Security Features Chapter 6 Configuring Network Connectivity Chapter 7 Configuring Applications Included with Windows Vista Chapter 8 Maintaining and Optimizing Systems That Run Windows Vista Chapter 9 Configuring and Troubleshooting Mobile Computing
This page intentionally left blank
1
CHAPTER ONE
Introducing Windows Vista In the years since it was first released, Windows XP has become nearly ubiquitous throughout the homes and offices of PC users worldwide. Although it’s a very stable, easily used operating system, it has become plagued with security problems in recent years. Service Pack 2 (SP2) certainly helped overcome these problems, but a new upgrade to the operating system, which has been in the works for several years, was sorely needed to overcome security problems and provide an enhanced productivity environment for home and business users alike. This study guide begins by looking at what Windows Vista is and explaining its features and concepts in a manner that sets the stage for the coming chapters. This chapter does not contain any formal Microsoft exam objectives, but you should become familiar with the terms introduced here. This information guides you as you study how to configure and secure Windows Vista in the many situations that arise in the world of everyday desktop support.
Outline Introduction
31
About Windows Vista
31
The History of Windows
31
Windows Vista Editions
33
Features
35
Productivity Improvements
35
Security Improvements
36
Improved Programs and Tools Included with Windows Vista
37
A Quick Tour of Windows Vista Welcome Center
39 39
Start Menu
42
Control Panel
43
Patches, Hotfixes, and Service Packs Summary
52 53
Key Terms
53
Suggested Readings and Resources
53
31
About Windows Vista
Introduction Windows Vista represents the first upgrade in more than five years to the flagship Microsoft Windows operating system. More than four years in the making, Windows Vista includes versions intended for business use as well as use on home computers of various types of configuration. The Microsoft 70-620 Exam assesses your ability to install, configure, administer, and troubleshoot Windows Vista and focuses on how to do so in a business environment. Before discussing the exam topics in detail, this chapter presents an overview of the new features of Vista and sets the stage for the chapters to come.
About Windows Vista Microsoft designed Windows Vista for both home and business users. Vista provides a 32-bit operating system based on the Windows NT (and later, Windows 2000 and Windows XP) kernel, including new desktop graphics, easy-to-follow menus, and enhanced personalization options. Also included are enhanced networking features that enable simplified connection to wired and wireless networks, enhanced user management, and improved security policies.
The History of Windows The PC has transformed over the past quarter century from a standalone computer that performed little more than word processing and spreadsheet functions to a portable multimedia machine supporting a diverse set of applications. Microsoft has been at the forefront of this development, providing the most ubiquitous operating system to power PC applications— Windows. Microsoft first announced its new graphical operating environment named Windows 1.0 on November 10, 1983, and then released it in 1985. Windows 2.0 followed in 1987. Those early versions of Windows were hardly memorable; however, most people remember Windows 3.0 (released in 1990) because of its wide popularity. Microsoft began integrating peer-to-peer and domain networking support in Windows for Workgroups 3.11, released in 1993. At that time, Microsoft was working with IBM to build a new industrial-strength networking system based on IBM’s popular OS/2 operating system. Plans were made to create a new operating system to be called OS/2 NT. Microsoft wanted to build on its accomplishments with Windows 3.x, but IBM wanted to continue with OS/2. Thus the partnership broke up, and Microsoft retained the rights to further Windows developments. Consequently, Microsoft introduced 32-bit networking in the form of Windows NT 3.1. NT stands for “New Technology,” and 3.1 referred to the fact that the interface resembled Windows 3.0.
32
Chapter 1: Introducing Windows Vista
From the point that Windows NT was introduced, Microsoft split its operating systems into three basic groups: home user versions, corporate user versions, and server versions. The home user versions grew from Windows 3.x to Windows 95 (released in August 1995) to Windows 98 and Windows Millennium Edition (Me). At this point, Microsoft brought the home and corporate user versions together under the Windows NT kernel. The home user version became Windows XP Home Edition. The corporate user versions were Windows NT 3.1; Windows NT Workstation 3.5 (released in 1994); Windows NT Workstation 3.51 (released in 1994); Windows NT Workstation 4.0 (released in 1996), which had the new interface matching Windows 95; Windows 2000 Professional; and Windows XP Professional. Microsoft also added a complete entertainment software package to Windows XP Professional, including support for watching and recording TV shows and working with digital music and videos, to create the Windows XP Media Center Edition. Almost as soon as Microsoft introduced Windows XP, it publicly announced initial plans for the next release of Windows, which it code-named “Longhorn” and originally planned to release in 2003. Within months, this date was pushed back to at least 2004. Around this time, Microsoft was putting together SP2 for Windows XP with its new security initiatives. This push for enhanced security resulted in a significant slowdown on the development of Longhorn until the completion of XP SP2. Consequently, in 2004 Microsoft announced that it was targeting Longhorn’s release for 2006 and revealed that Longhorn would incorporate major security enhancements beyond that of XP SP2, including technologies that would improve the resistance to such attack vectors as viruses, spyware, and other forms of malicious software. And in July 2005, Microsoft announced that the client version of Longhorn would be named “Vista,” and this set the stage for the final push to completion. But yet again, in 2006, Microsoft pushed the final release of Vista back into 2007, announcing that corporate versions would be available in November 2006, and the final public release was set for January 30, 2007. With the development of the new Windows operating system, Microsoft introduced two home versions—Windows Vista Home Basic and Windows Vista Home Premium. Windows Vista Business and Windows Vista Enterprise are the successors to Windows XP Professional, and Windows Vista Ultimate combines the features of both Windows Vista Enterprise and Windows Vista Home Premium into one operating system. The server versions all were based on the 32-bit Windows NT kernel and released at roughly the same times as the workstation versions—Windows NT 3.5 Server, Windows NT 4.0 Server, and Windows 2000 Server. Windows Server 2003 was introduced roughly one and a half years after Windows XP made its debut. Each server release also had additional server versions that provided additional services and/or hardware support for high-end corporate uses. Microsoft is currently working on a new version of its server, which will be known as Windows Server 2008 and will be released in early 2008.
33
About Windows Vista
Today’s Windows Vista represents more than 50 million lines of code and more than 20 years of research and development since the earliest versions of Windows.
Windows Vista Editions Microsoft designed five major editions of Windows Vista, each suited for a different segment of the general population: Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, and Windows Vista Ultimate. Table 1.1 compares the editions of Windows Vista and compares the basic features available with each. TABLE 1.1
Windows Vista Editions
Edition
Designed for
Notable Features
Home Basic
Home users who need only basic computing capabilities
Fundamental security capabilities such as Internet Explorer 7 and Windows Defender, as well as Windows Mail and parental controls
Home Premium
Enhanced home usage capability, including music, photo, and video usage
3D Aero desktop, photo and video handling and basic editing, DVD authoring, Mobility Center, and Windows Media Center
Business
Business users who need only basic computing capabilities
Windows Meeting Space, domain membership, advanced backup capabilities including shadow copy, business networking capabilities, and Remote Desktop
Enterprise
Business users who need advanced computing and security functions
BitLocker drive encryption and MultiLanguage User Interface (MUI)
Ultimate
Home and business users who desire the complete experience
All features included with Vista Home Premium and Vista Enterprise
In addition, Microsoft includes a Starter Edition that provides only very fundamental computing capabilities and is designed only for selected markets in developing overseas countries. This edition was created to address the issue of software piracy that has been rampant in these markets, as well as their financial and emerging market concerns. To meet the regulatory concerns of the European Union, Microsoft also includes “N” versions of these editions, which include all features except media-related capabilities. Table 1.2 provides additional detail on the components included in the various editions of Windows Vista. Many of these features are introduced in the following sections.
34
Chapter 1: Introducing Windows Vista
TABLE 1.2
Components Included in Vista Editions
Component
Home Basic
Home Premium
Business
Enterprise
Ultimate
Internet Explorer 7
x
x
x
x
x
Instant Search
x
x
x
x
x
Windows Mail
x
x
x
x
x
Windows Defender
x
x
x
x
x
Windows Firewall and Security Center
x
x
x
x
x
Parental Controls
x
x
x
x
x
Windows Media Player
x
x
x
x
x
Windows Aero and Aero Glass
x
x
x
x
Windows Media Center/ Movie Maker/DVD Maker
x
Windows Collaboration
x
x
x
x
Advanced networking capabilities
x
x
x
x
Windows Mobility Center/Tablet PC support
x
x
x
x
Scheduled backups
x
x
x
x
Domain support
x
x
x
Complete PC Backup and Restore
x
x
x
File encryption using Encrypting File System (EFS)
x
x
x
Remote Desktop
x
x
x
Windows Web Server
x
x
x
BitLocker drive encryption
x
x
Multilanguage User Interface (MUI)
x
x
Subsystem for UNIXbased applications
x
x
Secure Startup
x
x
x
35
About Windows Vista
Features As can be expected from the more than five-year interval between the introduction of Windows XP and Windows Vista, there are a large number of new features included with Windows Vista. Every edition of Windows Vista includes the same basic features. Additional features appear in some editions of Vista but not in others. The lists that follow are not designed to be exhaustive; they merely introduce the most important new features included with Windows Vista.
Productivity Improvements Windows Vista includes a number of new features and enhancements that are designed to improve the way users interact with the computer. The basic productivity enhancements included with every edition of Vista include the following: . Improved user interface and Start menu—The new look to the user interface includes
translucent window borders and a new Windows Sidebar on the right side of the desktop. While similar to the Windows XP Start menu, the Vista Start menu includes a new instant search assistant that directs you to any program or file on your computer (including multiple locations such as email, the Windows Calendar, HTML pages from the browser cache, and so on), network, or the Internet. You learn about the Start menu in more detail later in this chapter. . Aero Glass—Available on all Vista editions except Home Basic, this is the new desktop
appearance featuring translucent title bars that reveal objects hidden beneath them. You can also hover your mouse pointer over taskbar buttons to reveal live thumbnails of the document or program to which the button relates. Pressing the Windows+Tab key combination reveals live windows of each open document in sequence, facilitating your selection of the correct one. You can configure all these features from the Display applet in Control Panel. . Windows Mail—This standard email application replaces Outlook Express and includes
a new search capability. It also includes a junk mail filter patterned after the one in Outlook, as well as a phishing filter that alerts you when an email is attempting to send you to a bogus website that intends to extract personal information such as bank account or credit card numbers. . Improved startup capabilities—Microsoft has improved the startup code so that initializa-
tion scripts and applications can complete their tasks in the background and the user is able to begin work much sooner. . Sleep mode—Combining features of Windows XP’s Standby and Hibernation modes,
Sleep mode enables you to preserve open documents and programs on shutdown, enabling you to resume work rapidly from where you left off.
36
Chapter 1: Introducing Windows Vista . Restart Manager—Facilitates the installation of updates and patches by keeping track of
running processes and shutting down only the essential processes during patching. This reduces the need for rebooting your computer after installing updates and patches. . Windows Experience Index—This is a performance scoring metric that assesses the capa-
bility of several hardware and software components on your computer. It includes such components as the processor, memory, graphics card, and hard disk and displays a base score that relates to the weakest performing component on your computer. Thus it suggests which component you should upgrade to improve your computer’s overall performance. . Improved stability factors—Vista adds features such as input/output (I/O) cancellation,
which detects when a program is unable to receive input from an unavailable resource and cancels the invalid request. Service recovery policies enable Vista to restart failed essential services and reset dependent services, thereby reducing the need for reboots following service failures. A startup repair tool automatically diagnoses and repairs many startup problems. . Improved hardware diagnostics—Vista includes improved diagnostic tools that monitor
crashes caused by problems such as disk or memory failures. Network diagnostics monitor network connections and either fix problems or inform the user of ways she can remedy the problem. The Windows Diagnostic Console improves upon the Windows XP Performance Console to provide enhanced performance statistics. . Support for document metadata—Vista can search for documents, pictures, and so on
with the aid of metadata included with many file types—that is, data about data. The Search service indexes many types of metadata and enables you to filter search results to view data that contains specific property values. For example, you can filter images to display only those taken with a specific camera within a specified block of time. Later chapters of this book discuss specific details about many of these features. For additional information, consult the references provided in the “Suggested Readings and Resources” section at the end of this chapter.
Security Improvements As you know, Windows XP and other Windows versions have been subjected to a neverending flow of new vulnerabilities. Microsoft has introduced several new features designed to improve the security of computing in Vista: . Secure Startup—This feature prevents unauthorized users from accessing sensitive data
during startup by encrypting the system drive. It utilizes a hardware module called the Trusted Platform Module (TPM), which is found on many recently manufactured computers.
37
About Windows Vista . User Account Control—All users, even administrators, operate in a limited mode that
prevents actions that may be detrimental to system security. When users need to perform potentially risky tasks, Vista presents a dialog box requesting permission or credentials to perform the task. This feature helps to prevent actions attempted by malicious users or software. . Improvements to Windows Firewall—Windows Firewall now blocks both incoming and
outgoing traffic unless specifically configured to pass. This can block actions by malicious programs such as Trojan horses that attempt to send data to an unauthorized location. . Windows Defender—Introduced in Windows XP as Windows AntiSpyware, Windows
Defender monitors your computer for signs of spyware infection and blocks actions of malicious programs, such as their installation. . Spam and Phishing Filters—Windows Mail includes an antispam filter that scans incom-
ing messages for features prevalent in spam messages. A phishing filter alerts you when a message attempts to extract personal information. . Network Access Protection—This is a service that checks the security status of a computer
and compares the results to a set of network guidelines installed on a server that supports the feature. If the computer is not completely up-to-date with respect to security features such as patches or virus signatures, it is restricted to a protected area of the network from which it can download and install the required products. . Parental controls—These controls enable parents to set limits on their children’s activi-
ties by blocking access to specific types of websites or folders, specific content categories such as pornography, and file downloads; setting time limits; restricting games; and so on. . Windows Service Hardening—Vista limits the damage that can be caused by a compro-
mised service. It runs services at a lower privilege level and provides only the permissions required by the service to perform its functions. Services are restricted so that they can only perform their intended activities. Chapter 4, “Configuring and Troubleshooting Post-Installation System Settings” and Chapter 5, “Configuring Windows Security Features,” provide details of most of these features.
Improved Programs and Tools Included with Windows Vista Microsoft has packaged a basic set of programs and tools with every edition of Windows Vista. The following items highlight the most significant new programs and tools: . Welcome Center—This application starts automatically when you first start your com-
puter and log on. It displays your Vista edition and activation status and provides links to basic tasks such as adding printers, personalizing your experience, adding users, and
38
Chapter 1: Introducing Windows Vista
installing devices. You can also access the Control Panel and view your hardware and Windows settings. You learn more about the Welcome Center later in this chapter in the section, “A Quick Tour of Windows Vista.” . Windows Easy Transfer—This is an update to the Files and Settings Transfer Wizard that
was introduced in Windows XP. It supports additional media types such as flash drives. . Internet Explorer 7—Microsoft has added tabbed browsing, in which you can have mul-
tiple open pages available in their own tabs within a single Internet Explorer window. Internet Explorer 7 also features a new Manage Add-ons dialog box, which enables you to enable or disable add-ons and delete unwanted ActiveX controls, as well as an improved browsing history deletion feature and support for Real Simple Syndication (RSS) feeds. . Windows Mail—We have already mentioned this successor to Outlook Express. This
application also includes a preconfigured account for Microsoft’s newsgroup server, msnews.microsoft.com, which includes help groups designed to provide the best computing experience for Vista users. . Windows Calendar—This application enables you to track appointments, provide
reminders, schedule tasks, and view appointments by the day, week, or month. You can also set up multiple calendars for different users or purposes. . Windows Media Player 11—This major update includes several new features, such as a
cleaner interface that can include downloaded album art. It allows several views based on media metadata, an advanced metadata editor, an improved Search box, a capability for synching with compatible media devices, easier ripping of audio CD tracks, additional options for burning to media discs, DVD playback, and several other features. . Media Center—Included with Vista Home Premium and Vista Ultimate, the Media
Center comes with an improved interface and menu structure. . Windows Photo Gallery—This application facilitates the downloading of images and
videos from cameras, scanners, and network or Internet sources. You can view images, edit their metadata, and apply simple fixes to photos. . DVD Burning—Vista enables you to burn DVDs from several places such as Windows
Media Player, Media Center, and Windows Photo Gallery. This eliminates the need for third-party applications, as was the case in Windows XP. . Windows Mobility Center—On laptops and other mobile computers, you can view and
configure features such as battery status, wireless network connections, offline file synchronization, screen brightness, and so on. On a Tablet PC you can also control screen orientation. . Network Center and Network Map—Enables you to configure your network connection
and displays network components to which your computer is connected.
39
About Windows Vista . Windows Collaboration—This is an update to the NetMeeting program in Windows XP.
It enables you to show data to multiple users and collaborate on documents. You can invite people from various sources and do presentations. . Control Panel improvements—Microsoft has added new categories and modified existing
ones compared to those provided with Windows XP. Each category provides links to specific features, and some applets are cross-referenced to more than one category. Links to recent tasks are also included. Chapter 6, “Configuring Network Connectivity,” and Chapter 7, “Configuring Applications Included with Windows Vista,” discuss these programs and features in detail.
A Quick Tour of Windows Vista Windows Vista builds on the visual experiences introduced with Windows XP to offer you a whole new computing experience. This section introduces many of the new features you will become familiar with as you begin to work with Microsoft’s latest operating system.
Welcome Center When you first log on to a new installation of Vista, the Welcome Center shown in Figure 1.1 automatically starts and provides insight into many of the new features of Vista as well as several features updated from your Windows XP versions.
FIGURE 1.1 When you first log on to Vista, the Welcome Center introduces you to many new Vista features.
40
Chapter 1: Introducing Windows Vista
The Welcome Center automatically starts each time you log on until you clear the check box labeled Run at Startup, found at the bottom of the screen. If you want to run the Welcome Center later, go to the System and Maintenance category in Control Panel. Note that the items available from the Welcome Center may depend on the edition of Vista you are running. The following is an introduction to several items accessed from the Welcome Center: . View Computer Details—Provides a summary of information related to your computer,
including the hardware configuration, computer name, workgroup or domain information, and activation status (see Figure 1.2). You can also access this information by clicking Start, right-clicking Computer, and choosing Properties from the context menu.
FIGURE 1.2 You can view summary information about your computer by selecting View Computer Details from the Welcome Center.
. Transfer Files and Settings—Starts the Windows Easy Transfer Wizard, which is an
upgrade to the Windows XP Files and Settings Transfer Wizard. This wizard enables you to easily transfer applications, documents, and settings from an old computer running Windows 2000 or later to a new Windows Vista computer. . Add New Users—Opens the Control Panel User Accounts applet, which enables you to
create new user accounts or change the properties of existing user accounts. You can also configure the new Parental Controls feature from this location. . Connect to the Internet—Starts the Connect to the Internet Wizard, which assists you in
setting up new Internet connections.
41
About Windows Vista . Windows Ultimate Extras—Connects to Windows Update to locate optional updates for
your computer as well as extras available only to users of the Ultimate Edition of Windows Vista. . What’s New in Windows Vista—Provides details on new features included with Vista. . Personalize Windows—Starts the Control Panel Personalization applet, which enables
you to customize features such as your desktop wallpaper, screen saver, sounds, and fonts. . Register Windows online—Access a Microsoft Registration website that enables you to
perform an optional registration. This process enables you to receive tips, ideas, hints, and other information that improve your experience in working with Vista. Do not confuse this optional registration with the required Windows activation. . Windows Media Center—Enables you to set up Media Center for enjoyment of various
media types including music, television, photos, and digital videos. . Back Up and Restore Center—Enables you to perform automatic backup copies of files
and folders on your computer, thereby protecting them against system or disk failure. You can also create a Windows Complete PC Backup and Restore image of your computer. This assists you in recovering from a hardware failure. The same application enables you to restore files, folders, or your entire computer from previous backups. . Windows Basics and Windows Vista Demos—Provide instructions and video demos of
Vista features suitable for users with little or no computing background. . Offers from Microsoft—Enables you to receive additional Microsoft services, including
the following: . Windows Live services—a series of enhanced information services . Windows Live One Care—a complete antivirus and antispyware application . Windows Marketplace—an online software store that enables you to try out and pur-
chase software . Windows Live Mail desktop—enhancements to Windows Mail that assist you in pro-
tecting you from viruses, spam, and other undesirable items, as well as the capability for managing multiple email accounts and other enhancements . Windows Live Messenger—enables you to chat online with friends and coworkers
including video connections . A link for receiving online technical support
42
Chapter 1: Introducing Windows Vista
Start Menu Figure 1.3 shows the new Windows Start Menu, which follows the same basic design first seen in Windows XP but includes several enhancements, as follows: . Recently Used Programs—The left side of the Start menu contains links to recently used
programs, similar to that of Windows XP. However, some of the defaults have been moved to the right side of the menu. . Start Search—At the bottom of the Start menu, this feature enables you to perform
instant searches for programs, files, email, and other items on your computer, as well as search the Internet for anything you can imagine. Simply type the name of the item you want to locate, and Vista will display matches for your search in the left pane of the Start menu within a few seconds. If you type the name of a program on your computer and press Enter, Search will locate and open that program. You can also perform instant searches from any folder window. . All Programs—When you select this feature, the list on the left side of the Start menu
changes to display a menu of all available programs, many of which are categorized into folders. You can simply click through this menu to locate any program on your computer. . Links—The right side of the Start menu has been updated, with some of the Windows
XP features renamed. Notably, Vista does not use the “My” terminology and instead provides links with names such as Documents, Pictures, Computer, Network, and so on.
FIGURE 1.3 The Windows Vista Start menu offers several
enhancements from the Start menu included with Windows XP.
43
About Windows Vista
As in Windows XP, you can customize the items that appear on the Start menu by rightclicking Start and choosing Properties. You learn more about this in Chapter 4.
Control Panel Microsoft has continued the idea of categories that first appeared in Windows XP and has introduced new categories and additional links that assist you in locating any Control Panel application (or applet). See Figure 1.4.
FIGURE 1.4 The Windows Vista Control Panel offers new categories and links to frequently used applets.
This section provides an introduction to the Control Panel features. You learn about many of these features in detail in subsequent chapters of this book. System and Maintenance Shown in Figure 1.5, the System and Maintenance category includes several tasks that enable you to configure performance options and obtain information about your computer. Note that the left-hand side of the window includes links to other Control Panel categories. This feature assists you in navigating among categories and is displayed for all Control Panel categories.
44
Chapter 1: Introducing Windows Vista
FIGURE 1.5 The System and Maintenance category includes basic systemrelated configuration tasks.
The task options available through the System and Maintenance category include the following: . Welcome Center—Opens the Welcome Center, as already introduced. . Backup and Restore Center—Enables you to perform backups of files, folders, or your
entire computer, as already introduced. . System—Provides the same summary of computer information as obtained from the
View Computer Details link in the Welcome Center. . Windows Update—Enables your computer to download various updates, including
patches and hotfixes, from the Microsoft Windows Update website. You can view and download available updates and Windows Ultimate Extras from this location, and you can also configure settings that control the downloading and installation of updates. . Power Options—Enables you to select a power plan to conserve energy by turning off
items such as your display or hard disks after a period of inactivity or maximize performance of your computer. You can also customize a power plan to suit your needs. . Indexing Options—New to Windows Vista, this applet enables you to configure several
options that affect the speed and comprehensiveness of the Windows indexing service. . Problem Reports and Solutions—Also new to Windows Vista, enables you to search online
for solutions to problems you may be having with your computer. You can download and install solutions to problems, view problem history, and configure several related settings.
45
About Windows Vista . Performance Information and Tools—Enables you to test your computer’s performance.
You can calculate a Windows Experience Index, which as already discussed, rates your computer according to the lowest performing hardware component. You can also adjust several components to optimize your computer’s performance. . Device Manager—Enables you to view information on hardware devices on your com-
puter. You can enable or disable devices; identify resources used by each device; identify, update, and roll back device drivers; and so on. . Administrative Tools—Provides access to the entire suite of computer administrative
tools. Most of these tools are discussed in later chapters of this book.
Security Shown in Figure 1.6, the Security category includes several tasks that enable you to configure a large range of security-related topics.
FIGURE 1.6 The Security category includes a large range of system-related configuration applets.
Security category tasks include the following: . Security Center—Enables you to configure all security-related options on your computer. . Windows Firewall—Builds upon the firewall first introduced in Windows XP SP2 that
protects your computer against both incoming and outgoing threats. You can configure which programs are permitted to send or receive data across the firewall.
46
Chapter 1: Introducing Windows Vista . Windows Update—Enables you to receive automatic updates as Microsoft releases them.
You can configure the time at which updates are downloaded and check for new updates. . Windows Defender—Enables you to scan your computer for malicious software such as
spyware that can be downloaded to your computer without your knowledge. . Internet Options—Enables you to configure the properties of Internet Explorer 7. You
can specify your home page, delete your browsing history, modify tabbed browsing, configure security and privacy options, and many more actions. We look at these options in Chapters 4 and 5. . Parental Controls—Enables you to configure limits on computer use by any user and
view reports outlining user activity. . BitLocker Drive Encryption—Enables you to encrypt your entire hard disk in a single
action using BitLocker. From this applet, you can manage and secure the required encryption keys.
Network and Internet Shown in Figure 1.7, the Network and Internet category includes several tasks that enable you to configure connections to your local area network (LAN) or the Internet, as well as several other network-related tasks.
FIGURE 1.7 The Network and Internet category enables you to perform network-related tasks.
47
About Windows Vista
The task options provided by the Network and Internet category include the following: . Network and Sharing Center—Enables you to establish and configure options related to
networks accessible to your computer. It provides a local view of the network to which your computer is attached and enables you to perform several tasks related to sharing of items such as files, folders, printers, and media. You can view the current status of your network connections, enable or disable network connections, and diagnose connectivity problems. . Internet Options and Windows Firewall—Same as accessed through the Security category. . Offline Files—Enables you to cache copies of files located on servers or other network
computers so that you can access them and work with them even if you are not connected to the network. You can determine how your copies of these files are synchronized with the network location and how any modifications you make are treated when you reconnect to network locations. . People Near Me—New to Windows Vista, this enables you to provide information
about yourself to others on your network. This is a component of the new Windows Peer-to-Peer Networking platform that enables the discovery of people connected to the local network and set up collaborative activities across the network by issuing invitations and handling invitations received from others. You can sign in and out of People Near Me and send invitations for programs such as Windows Meeting Space. . Sync Center—Enables your computer to synchronize with other network devices
including mobile computers, handheld devices, smart phones, and so on.
Hardware and Sound Shown in Figure 1.8, the Hardware and Sound category includes applets that enable you to configure all your computer’s hardware components. The Hardware and Sound category includes the following applets: . Printers—Enables you to add printers and fax devices and configure properties of these
devices. You can view and manage print queues, configure printer permissions, modify settings related to a specific printer type, and troubleshoot problems related to printers and faxes. . Auto Play—Enables you to configure default actions that take place when you insert
media of a given type such as audio CDs, DVDs, blank discs, and so on. . Sound—Enables you to configure the settings associated with audio recording and play-
back devices. You can create and modify sound schemes that include the sounds that are associated with Windows and program events.
48
Chapter 1: Introducing Windows Vista
FIGURE 1.8 The Hardware and Sound category enables you to manage a diverse range of hardware components.
. Mouse—Enables you to configure mouse properties such as button settings, pointer
appearance, scroll wheel actions, and so on. . Power Options—Same as accessed through the System and Maintenance category. . Personalization—Enables you to configure a large range of mostly display-related
options such as color and appearance of windows, desktop background, screen saver, windows themes, display resolution and refresh, and so on. You can also configure sounds and mouse options from here. . Scanners and Cameras—Enables you to add, configure, troubleshoot, or remove scan-
ners, cameras, or other USB devices on your computer. . Keyboard—Enables you to configure keyboard properties such as character repeat and
cursor blink behavior. . Device Manager—Same as accessed through other categories. . Phone and Modem Options—Enables you to configure the properties of outbound tele-
phone connections. . Game Controllers and Pen and Input Devices—Enables you to add, configure, and remove
these types of devices. . Windows SideShow—New to Windows Vista, a SideShow–compatible device is an
additional display from which you can access information such as your calendar, email
49
About Windows Vista
messages, and news stories. You can access these information types even when your computer is off. . Color Management—Enables you to configure advanced color management settings for
devices such as monitors, printers, and scanners. . Tablet PC Settings—Enables you to configure settings specific to Tablet PC hardware.
You can configure settings for right- and left-handed users, handwriting recognition, display orientation, and pen and input device settings.
Programs Shown in Figure 1.9, the Programs category includes applets that enable you to configure features related to applications installed on your computer, including programs that run by default at startup as well as locating, downloading, installing, and removing of applications.
FIGURE 1.9 The Programs category helps you manage applications on your computer.
Applets provided by the Programs category include the following: . Programs and Features—This is a complete reworking of the Add or Remove Programs
applet in older Windows versions and enables you to uninstall, change, or repair applications installed on your computer. . Windows Defender—Enables you to view the latest Windows Defender antispyware
scan results.
50
Chapter 1: Introducing Windows Vista . Default Programs—Enables you to configure which applications Windows uses by
default for opening files of specific type. You can also control access to various types of applications and configure AutoPlay settings. . Windows SideShow—Same as accessed in the Hardware and Sound category. . Windows Sidebar Properties—Enables you to configure the appearance of the new
Windows Sidebar and configure which gadgets appear on the Sidebar. . Get Programs Online—Enables you to access the Windows Marketplace, from which
you can purchase, download, install, and test new software applications.
User Accounts and Family Safety The User Accounts and Family Safety category enables you to access the same User Accounts and Parental Controls applets that are available on the Welcome Center. You can also access Windows CardSpace, from which you can configure information used when logging on to online network services. You can keep track of memberships at online services and websites and modify personal information sent to these sites. Appearance and Personalization Shown in Figure 1.10, the Appearance and Personalization category enables you to configure properties of your computer related to how items appear on the display.
The Appearance and Personalization category enables you to configure appearance-related options.
FIGURE 1.10
51
About Windows Vista
The Appearance and Personalization category includes . Personalization—Same as accessed through the Hardware and Sound category. . Taskbar and Start Menu—Same as accessed from the Windows Vista Welcome Center. . Ease of Access Center—Contains several accessibility options that enable vision- and
mobility-challenged users to use the computer. You can access a wizard that helps you select the appropriate options for individuals with different requirements. . Folder Options—Enables you to modify how folder windows display their contents. You
can configure whether files open with a single- or double-click, show hidden files and folders, and so on. . Fonts—Enables you to manage fonts stored on your computer. You can add or remove
fonts and display samples of fonts installed on your computer. . Windows Sidebar Properties—Same as accessed through the Programs category.
TIP Displaying file extensions As in previous Windows versions, Vista does not display extensions for common types by default. To display file extensions, access the Folder Options applet and clear the check box labeled Hide Extensions for Known File Types. This helps you distinguish between files with otherwise similar names. It also helps guard against undesirable files with double extensions; for example, data.txt.exe would appear as data.txt and could hide a malicious executable if you have not cleared this check box.
Clock, Language, and Region The Clock, Language, and Region category contains two applets that enable you to configure the time and date displayed on your computers; configure your time zone; and select how your computer displays items such as dates, times, numbers, and currency according to the country in which you live. You can also add or remove display languages, set which language is displayed by default, and adapt your keyboard for specific languages. Ease of Access The Ease of Access category provides access to the Ease of Access Center, which is also included in the Appearance and Personalization category. It also includes the Speech Recognition applet, which enables you to configure microphones and train your computer to understand your voice. You can take a tutorial that shows you how to use speech on your computer and view or print a list of speech-related commands. Additional Options If you have installed software applications that add applets not directly related to one of the other categories in Control Panel, they appear here. This category does not include any default items.
52
Chapter 1: Introducing Windows Vista
Patches, Hotfixes, and Service Packs With millions of lines of code in any application, you can imagine that there will be some error that was not caught in testing, especially considering how many different uses that millions of people will find. This is something that users have expressed concerns about since the early days of computing—no program has ever worked perfectly under every circumstance, and the frustration of not being able to get work done because of some bug in the software generated complaints. Microsoft’s solution to bugs was to create bug fixes, also called “hotfixes.” More recently, Microsoft created security fixes known as “patches” and began to release these on the second Tuesday of every month, which has become known in Microsoft circles as “Patch Tuesday.” After a certain amount of time, people had to install so many patches and hotfixes that Microsoft packaged them into a single installation called a “service pack,” or SP for short. Of course, hotfixes created after the first service pack required Microsoft to incorporate all those fixes into another service pack. Service packs gave the developers an opportunity to release additional features. For example, SP2 for Windows XP added Windows Firewall, Windows Security Center, and a popup blocker for Internet Explorer. Each service pack is cumulative, so when you install a service pack, you need to install only the latest one released to gain all the fixes and features in previous SPs.
NOTE Service packs are not necessarily the best thing since sliced bread Each service pack usually causes a few unexpected errors with a variety of applications and/or hardware devices. As an administrator, you should install service packs with the same amount of caution that you would use to deploy the operating system itself, by first testing it in your own environment with your own applications and hardware and then running a pilot test of the update on a group of (forgiving, you hope) users. After you are sure that the service pack will cause fewer errors than the ones that it fixes, you should roll it out to your users.
You can expect that Microsoft will continue the tradition of introducing service packs from time to time with Windows Vista. In fact, Microsoft has already announced the intention of releasing SP1 for Vista before the end of 2007.
53
Summary
Summary Windows Vista comes in five editions designed for different types of users: Vista Home Basic, Vista Home Premium, Vista Business, Vista Enterprise, and Vista Ultimate. Vista has incorporated numerous improvements over its predecessor, Windows XP, particularly in the fields of user productivity and security. This chapter introduced you to the most significant improvements incorporated into Windows Vista. You looked at the new applications and tools included with Windows Vista, and toured the Windows Welcome Center and the various categories of the Control Panel.
Key Terms . Control Panel . hotfix . patch . service pack . Windows Vista Home Basic . Windows Vista Home Premium . Windows Vista Business . Windows Vista Enterprise . Windows Vista Ultimate . Welcome Center
Suggested Readings and Resources The following recommended readings introduce you to Microsoft Windows Vista: 1. Books . McFedries, Paul. Microsoft Windows Vista Unveiled. Indianapolis, IN: Sams
Publishing. 2006. . Stanek, William R. Introducing Microsoft Windows Vista. Redmond, WA: Microsoft
Press. 2006.
54
Chapter 1: Introducing Windows Vista 2. Websites . Windows IT Pro. Road to Gold: The Long Road to Windows Vista. http://www.
winsupersite.com/showcase/winvista_roadtogold_01.asp . Microsoft. Windows Vista: Choose an Edition. http://www.microsoft.com/windows/
products/windowsvista/editions/default.mspx . Microsoft. Windows Vista Features. http://www.microsoft.com/windows/products/
windowsvista/features/default.mspx . Microsoft TechNet. Windows Vista Reliability and Performance Features and
Improvements. http://technet.microsoft.com/en-us/windowsvista/aa905071.aspx
2
CHAPTER TWO
Installing Windows Vista Objectives This chapter helps you to prepare for the exam by covering the following Microsoft objectives for the Installing and Upgrading Windows Vista section of Exam 70-620: TS: Microsoft Windows Vista, Configuring.
Identify hardware requirements. . Hardware requirements include a “minimum” level that enables Windows Vista to run in a basic manner and a “preferred” level that enables Windows Vista to perform adequately and use the new Aero graphics interface to its fullest capacity. It is important that you know the hardware requirements so that you can plan the appropriate hardware configurations that support the various editions of Windows Vista and their capabilities.
Perform a clean installation. . Microsoft includes this objective to ensure that you know how to manually install Windows Vista. It is important to know how to perform a complete manual installation so that you understand what’s happening behind the scenes when performing automatic, unattended installations.
Troubleshoot Windows Vista installation issues. . Troubleshooting various types of installation require you to understand the steps that occur during installation and what can go wrong at each step. Troubleshooting failed installations is an objective referring to the error logs and troubleshooting procedures that are generated when Windows Vista fails during the Setup process. You are required to know which error log applies to which failure, as well as how to follow through in correcting the problem.
Install and configure Windows Vista drivers. . Drivers are software interfaces that enable devices such as pointing devices, scanners, printers, keyboards, cameras, modems, network adapters, and so on to perform under the Windows Vista operating system. An administrator must be able to physically connect a device and implement, upgrade, and roll back its device driver.
Outline Introduction
58
Defining a Solution
94
Preparing for Installation
58
Testing and Implementing the Solution
94
Documenting the Results
95
Identifying Hardware Requirements
60
Troubleshooting an Attended Installation
95
Hardware Compatibility
61
Software Compatibility
62
Network Requirements
64
Domain Membership
65
Workgroup Membership
67
File System Considerations
69
Product Activation
70
Media Problems
96
Insufficient Hard Drive Space
96
Unrecognizable DVD-ROM Drive
97
Unavailable Network
97
Advanced Startup
102
Refer to Compatibility
102
Troubleshooting an Unattended Installation
104
71
Problems with Answer Files
104
Performing an Attended Installation
72
Performing an Unattended Installation
78
Problems with Sysprep Installations
106
Understanding Vista Deployment Technologies
79
Performing a Clean Installation of Windows Vista
Using Windows System Image Manager to Create Unattended Answer Files
79
Creating an Answer File
80
Using the Answer Files to Perform an Unattended Installation
85
Installing Windows Vista by Using the System Preparation Tool (Sysprep)
85
Understanding the System Preparation Tool
85
Creating an Image with Sysprep
86
Deploying an Image with Sysprep
Understanding WDS
90
Requirements to Use WDS
91
Troubleshooting Process Identifying the Point of Failure
108
Stop Errors or Blue Screen of Death (BSOD)
109
Startup Repair
110
Stopped Installation
110
Installing and Configuring Windows Vista Drivers
111
Managing and Troubleshooting Drivers and Driver Signing
111
Using Windows Vista Rollback
114
Summary
115
Key Terms
116
Apply Your Knowledge
116
87
Installing Windows Vista by Using Windows Deployment Services (WDS) 90
Troubleshooting Windows Vista Installation Issues
Troubleshooting Failed Installations
92 93 94
Discovering the Cause of the Failure 94
Exercises
117
Exam Questions
118
Answers to Exam Questions
122
Suggested Readings and Resources
125
Study Strategies This chapter is devoted to preparing to install and installing Windows Vista. This chapter addresses several methods you can use to perform unattended installations of Windows Vista. Practical experience in this field is vital to understanding how these methods work and which situations are best suited for each. . If possible, have two or three computers available that do not contain any data of value for practicing the various exercises. Another strategy is to download and install the free version of Microsoft Virtual PC 2007 so that you can install multiple copies of Windows Vista as guest machines on a single host computer. . Practice manually installing Windows Vista. . Practice installing Windows Vista using each of the three automated deployment methods discussed in this chapter: Use Setup.exe along with answer files, Sysprep.exe install, and Windows Deployment Services. . Spend some time looking through the error logs on a Windows Vista computer. You should look at the specific logs and look at Event Viewer immediately after the Windows Vista operating system has been installed. . Review the “Troubleshooting an Attended Installation” section and become familiar with the various problems you can encounter, including their symptoms and causes. . Device drivers are often provided directly from original equipment manufacturers (OEMs). To familiarize yourself with how these device drivers function, obtain new device drivers for existing hardware on a test computer. Update the driver and review the changes that appear under Control Panel and in Device Manager. Roll back the device driver and then review any further changes. Run Performance Monitor (Perfmon) to see the performance differences between the drivers.
58
Chapter 2: Installing Windows Vista
Introduction The Microsoft 70-620 exam assesses your ability to install, configure, and administer Windows Vista and focuses on how to do so in a business environment. Basic to any installation type is the manual, clean installation of Vista on a new computer. Manual installation of Windows Vista is fine when you have only a few computers that need to be installed, but what would you do if you had several hundred (or thousand!) computers on which you needed to install Windows Vista? This chapter introduces you to automated deployment of Windows Vista using Windows Deployment Services (WDS) and the System Preparation Tool (Sysprep.exe, or Sysprep for short). As an adjunct to Murphy’s Law, what can go wrong during an operating system installation does go wrong, and then the situation needs troubleshooting. Windows Vista is no exception. Whether the installation is attended or whether the operating system is automatically installed through the use of WDS, Sysprep, or answer files, problems can and do occur. Knowing how to handle the unexpected error makes all the difference to a network administrator or engineer.
Preparing for Installation When you manually install a Windows Vista system, you may just think it’s a matter of getting your hands on a DVD and popping it into a computer. However, when you deploy Windows Vista throughout an entire organization, even if you decide to do so manually, you can reduce errors and delays by following a carefully planned deployment. Most projects involve five principal stages—Define, Design, Develop, Test, and Implement. You should follow them when deploying Windows Vista, as well. There are many different project methodologies, and some are quite complex. If you boil them down to their essential elements, they fall into the following five stages: . Stage 1: Define—Defining the project scope and objectives. You have to set limits to
your project so that you don’t end up with a task that will never end because it has no stopping point. Besides, who wants to be at the mercy of users who ask, “Can’t you just add this one little thing to the project?” You also have to set objectives to ensure that your project actually meets the goals of your organization. It would be senseless to spend hours to test and implement wireless networking within Windows Vista if your network has no wireless access points and has a security policy that objects to wireless networking altogether. However, it would be just as senseless to ignore testing and implementing multimedia support if you are conducting a project for a graphics company. With the scope and objectives of your project in hand, you can then begin planning the project by identifying tasks and phases, specifying the people and groups affected by it, and determining the timeframe for those tasks.
59
Preparing for Installation . Stage 2: Design—Designing your Windows Vista configuration. This stage involves cre-
ating the ideal desktop to deploy to your end users. (If you are fully networked with Windows 2000/2003/2008 Active Directory, you can also use Group Policy to make user-specific or group-specific configuration specifications rather than incorporating them into the installation itself.) Your design should incorporate the fundamental framework of the preferred Windows Vista configuration for your network. This phase might also involve a lab test of your preferred build to see what the logical design would look like. You can also design the implementation method—whether to implement manually, use WDS, use Sysprep, or refer to third-party implementation tools for unattended installations. . Stage 3: Develop—Developing the final configuration. During the development phase,
you will likely make changes to your original design. Mainly this phase is to gather or create all the resources necessary to conduct your deployment. For example, if you were to design a standard desktop configuration that included most of the Windows Vista features and planned to deploy it through WDS, then the development phase would include creating the unattended installation files for WDS, assembling the WDS server(s) required, along with providing for any network requirements to enable WDS across wide area networks (WANs), if that was a consideration on your network. . Stage 4: Test—Involves the following components: . Testing the final design of the desktop to ensure that it meets users’ needs . Analyzing hardware compatibility with the devices on your network . Testing application compatibility with the applications that your users must have to
be productive . Examining the implementation method to ensure that it will function properly
when the project is rolled out . Developing and testing a rollback method so that you can restore the computer to
its former state just in case a severe problem takes place During the testing stage, you should prioritize your tests to ensure that critical applications and uses of the operating system will receive the greatest focus. Giving minor problems a lower priority will help you avoid delays in the project. In fact, the testing phase is simply the process of trying to break your designed configuration of Windows Vista and then fixing anything that does break during testing before it gets in the hands of end users. This phase should involve a pilot test where you place your final configuration into a production environment with a small control group of users. These users can then conduct business and report back to you any problems that they run into while using your configuration. Users always find something that you might not have thought to test for while in the lab, mainly because they
60
Chapter 2: Installing Windows Vista
utilize features of applications in different ways than you might try in a lab environment. . Stage 5: Implement—Deploying the operating system throughout your organization as
defined in the scope of the project. This final stage should include . Notifying the affected users and groups of the deployment with some advance
notice . Installing any distribution servers if needed . Training the users on the new interface and features of Windows Vista . Backing up data on the users’ computers, if applicable . Upgrading or replacing incompatible hardware . Conducting any additional preparation tasks such as running system checks or
defragmenting the hard drives . Installing the operating system itself . Migrating user-specific data back to the newly installed PC . Conducting a quality analysis of the computers to ensure that they will boot up
and run critical applications
Identifying Hardware Requirements Objective:
Identify hardware requirements. Microsoft has defined two levels of hardware requirements for computers running Windows Vista. The minimum supported hardware requirements represent the bare minimum required to run the core features of Windows Vista and provide a basic user experience. Computers meeting these requirements are considered to be “Windows Vista-Capable” computers. The premium ready hardware requirements represent the hardware required to run all features of Vista with satisfactory performance. Table 2.1 lists the base hardware requirements for Windows Vista. Although these are the minimum hardware requirements for supporting the operating system, they are not necessarily adequate to support additional applications or for reasonable performance. When designing the hardware requirements for installation, you should allow for extra RAM and hard disk space and probably a faster processor for applications.
61
Identifying Hardware Requirements
TABLE 2.1
Hardware Requirements for Windows Vista
Device
Minimum Supported
Premium Ready
Processor
Intel Pentium/Celeron running at 800MHz or higher
Intel Pentium II/Celeron running at 1GHz or higher, or 64-bit (x64) processor
RAM
512MB
1GB
Graphics processor
DirectX 9-capable
DirectX 9-capabile with at least 128MB graphics memory
Hard disk
20GB with at least 15GB free space
40GB with at least 15GB free space
Monitor
SVGA (800×600)
1024×768 or higher resolution
Disk drives (for CD installations)
CD-ROM or DVD drive
CD-ROM or DVD drive at 12x or faster speeds
Other
Standard keyboard and mouse or other pointing device
Standard keyboard and mouse or other pointing device and audio output and Internet access capabilities
If you want to access a network, you should have a network adapter installed that is compatible with the network infrastructure. For Internet access, at a minimum you need a 14.4-Kbps modem or higher to dial up to an Internet service provider (ISP). Video conferencing, voice, fax, and other multimedia applications generally require 56-Kbps modems, microphone, sound card, and speakers or headset. Video conferencing itself requires a video conferencing camera.
Hardware Compatibility Microsoft makes it easy to check your hardware’s compatibility by providing a list of supported hardware. Microsoft designed the Windows Logo Program for Hardware with the aim of assisting users to identify hardware components that are compatible with Windows Vista and the next Windows Server release. This program replaces the Hardware Compatibility List and Windows Catalog that were previously used with older Windows versions. It consists of two tiers: . A “basic” logo that identifies all compatible products. . A “premium” logo that identifies products that present advanced experiences with
Windows Vista. Components that carry the premium logo are certified to perform with the Media Center. For more information on the Windows Logo program, refer to FAQ for Windows Logo Program in the “Suggested Readings and Resources” section at the end of this chapter.
62
Chapter 2: Installing Windows Vista
The Windows Logo program is not comprehensive. You can check hardware compatibility by contacting the manufacturer of the device if you cannot find it on the Microsoft website. An issue that can interrupt the installation process is the use of incompatible critical device drivers. If a compatible driver is not available, Setup stops until updated drivers are found. Operating system upgrades will not migrate incompatible Windows XP drivers. The only way to ensure a smooth installation is to make certain you have all the drivers available at the start of the installation process. Do not be concerned about unattended installations because there is a folder in which you can place any additional or updated drivers for hardware that is not included in the base Windows Vista files. Before you deploy Windows Vista on any system, you should ensure that the hardware and BIOS are compatible with the operating system. Older hardware may not have a compatible BIOS even though the devices within the PC itself are all listed in the Windows Logo program. The original equipment manufacturer (OEM) should have an updated BIOS available that can be downloaded from the OEM’s website. If you have an Internet connection, you can use the Dynamic Update feature to connect to the Windows Update website during setup. Windows Vista automatically downloads and installs updated drivers during the setup process from the Windows Update website.
Software Compatibility One of the more difficult parts of the development and testing phase of an operating system deployment project is to handle software compatibility, or rather, software incompatibility. The operating system that you deploy is important because it provides the basic functionality for the computer, but productivity usually depends on business applications that are installed, which makes applications more important to the organization. If an application is not compatible with the operating system, you have the following options: . Upgrade the application to a compatible version. . Replace the application with a similar type of application that is compatible with
Windows Vista. . Retire the application.
Before you are faced with these decisions, your first task in determining software compatibility is to identify all the applications that are used and that will be installed in your deployment project. You should develop a matrix of applications that is organized according to priority of business productivity and by number of users that use the application. For example, if you determine that 100% of all your users use APP A, but that it does not directly contribute to business productivity (such as an antivirus application), you would place it in the high use, low productivity quadrant. If you determine that 10% of your users use APP B, and it contributes
63
Identifying Hardware Requirements
highly to business productivity, you would place it in the low use, high productivity quadrant. If 5% of users use APP C and it has no impact on business productivity, you would place that in the low use, low productivity quadrant. The applications in that low use, low productivity quadrant are the ones that you should analyze for potentially retiring. If you find that 90% of all users use APP D and it is considered business-critical, you would put APP D in the high use, high productivity quadrant. All applications in this quadrant should receive priority during the project. Figure 2.1 attempts to place these applications into this perspective.
high
APP A
APP D (mission-critical)
APP C
APP B
Usage
low
low
Productivity
high
FIGURE 2.1 You should prioritize all applications used in your company according to their usage and productivity.
You might decide to include additional criteria to your matrix to better pinpoint the applications that will require more of your time during the project. For example, you could identify which applications are developed for Windows Vista and which are developed specifically for older Windows operating systems, as well as which have been developed in-house. Applications that have been developed for Windows 2000 or Windows XP might not run properly on Windows Vista. Those applications that were developed for older versions of Windows, such as Windows 9x/NT, are more likely to be incompatible with Windows Vista. Antivirus applications are typically incompatible if they were developed for older Windows versions. After you have an inventory of your current software, you should then build a test lab and test the applications with Windows Vista. With each application that has compatibility problems, you should decide whether the application is important enough to fix. If it is important, you should then determine the fixes you need to undertake to make it compatible. You can then package the fixes using the Microsoft Application Compatibility Toolkit. Finally, you should test the deployment and perform a quality assurance check on the test PCs to see whether the applications install and run properly. For more information on the Microsoft Application Compatibility Toolkit, refer to Inside the New Microsoft Application Compatibility Toolkit in the “Suggested Readings and Resources” section at the end of this chapter.
64
Chapter 2: Installing Windows Vista
Network Requirements In a Windows Vista deployment, you must be able to identify which network protocols and network hardware are used on your network. Network protocols affect how you configure the computer, especially if there is some problem with addressing. When you install Windows Vista, it will not connect to the network properly if it does not use a compatible protocol or does not have a correct address. The network hardware you use on the network affects the options you have available for deployment. For example, if you have no servers on your network and/or no peers with enough hard disk space to hold the installation files, you will be unable to install Windows Vista over the network—attended or unattended. If you have servers, but they do not run Windows 2000 or Windows 2003, you will not be able to use WDS. If you do not have sufficient bandwidth, you will not be able to run the installation across the network either. To assess your network, collect the following information: . Network protocols . Addressing format and address resolution . Naming conventions and name resolution . Network servers including server operating system, names, IP addresses, domain mem-
bership, file and print services, directory services, and authentication . Network sites and available bandwidth between the sites . Routers, hubs, switches, printers, bridges, other peripherals, firewalls, and proxy
servers A thorough network assessment includes physical and logical diagrams of all sites, documenting each physical link, its speed, IP address and available bandwidth, and the location of each piece of equipment. The logical portion should show server roles, Domain Name System (DNS) servers, Windows Internet Naming Service (WINS) servers, Dynamic Host Configuration Protocol (DHCP) servers, trust relationships, and your domain architecture. When the Windows Vista computer is a network client, you need to determine how to connect that client to the network. Keep in mind that large networks tend to be hybrids, having a mixture of network media. If one client is intended to connect to a token ring network, whereas another is intended to connect to a wireless network, you need to plan for the appropriate network adapter, drivers, and installation method. The standard network protocol for Windows Vista is Transmission Control Protocol/Internet Protocol (TCP/IP). If you intend to connect to a network that has NetWare servers that do
65
Identifying Hardware Requirements
not use TCP/IP, you also need to configure the NWLink protocol, which is Microsoft’s equivalent to the Internetwork Packet eXchange/Sequenced Packet eXchange (IPX/SPX) protocol. On the other hand, you should not install any additional protocols if they are unnecessary because they will generate additional network traffic. DHCP servers automatically provide IP addresses to each DHCP client on the network from a pool of addresses. When a network device releases its IP address, the address can be reused for another DHCP client. This averts IP address conflicts and helps distribute IP addresses efficiently, along with extended information such as DNS server data. Even if your network uses DHCP services, you should be aware of IP addresses used on each network link. This helps if you have to troubleshoot a problem with connectivity. If your network uses static IP addresses, you need to have an IP address for each network client you install.
Domain Membership Windows Vista computers can participate in an Active Directory domain by becoming members of the domain. Keep in mind that Windows Vista Home Basic or Home Premium cannot participate in a domain as a member but can access data on a domain server. Domain membership in an Active Directory domain requires the TCP/IP protocol and proper DNS server identification.
Challenge You are a network administrator who is preparing to install Windows Vista on a large number of computers that will be part of a domain. To test whether you can join a domain, you should first be able to communicate with a domain controller. You should be able to perform this process on your own based on what you have learned so far. If you have trouble with the process, you can determine whether the computer is able to join a domain by performing the following steps: 1. Click Start, right-click Computer on the Start menu, and select Properties. 2. On the dialog box that appears, click Change Settings under the Computer name, domain, and workgroup settings section. 3. If User Account Control is enabled, the message shown in Figure 2.2 informs you that Windows needs your permission to proceed. Click Continue. 4. On the System Properties dialog box, click the Computer Name tab. 5. Ensure that the name of the workgroup is the same as the name of the domain that you intend to join. 6. Apply the changes and restart the computer when requested. 7. Click Start and double-click Network. (continues)
66
Chapter 2: Installing Windows Vista (continued)
FIGURE 2.2 When you initiate an action in Vista that requires administrative credentials, you receive the User Account Control dialog box.
8. Locate the domain controller and double-click it. 9. Make certain that you can browse network resources. 10. Log off the computer and log on again to disconnect completely from the domain controller. 11. Now you can join the domain. Repeat steps 1 to 4 to access the Computer Name tab of the System Properties dialog box. 12. Click Change. 13. On the Computer Name/Domain Changes dialog box that appears, select Domain and type the name of the domain in the text box provided (see Figure 2.3). Then click OK.
FIGURE 2.3
Joining an Active Directory domain.
14. Type the user name, password, and domain name. This must be the name of a user who has the authority to join the domain. Click Next. (continues)
67
Identifying Hardware Requirements (continued)
15. When you receive the message Welcome to the domainname domain, you have successfully joined the domain. 16. Exit the Computer properties and you are prompted to restart the computer. 17. A new logon screen appears, where you need to press Ctrl+Alt+Delete to log on to the domain.
Workgroup Membership When you install a peer-to-peer network of Windows Vista and other Windows computers, you need to ensure that each computer is connected and that they are all running the same protocol with correct addressing. You also need to ensure that each computer within the peerto-peer network is a member of the same workgroup. Because the Windows Vista computer is a peer on the network, it not only needs to access other files and printers, but it needs to share its own files and printers. To do this, you should install File and Printer Sharing if it is not installed already on the computer. To install File and Printer Sharing, follow these steps: 1. Click Start and double-click Network. 2. You should see a message bar informing you that file sharing is turned off. Click this
message, and then click the Turn on Network Discovery and File Sharing option that appears. 3. A User Account Control message informs you that Windows needs your permission
(refer to Figure 2.2 shown previously). Click Continue to begin sharing files. With File and Printer Sharing installed, you still cannot share files and printers until you specify which should be shared. To share a file or printer, follow these steps: 1. Locate the resource to be shared and right-click it. 2. Select Share from the shortcut menu. 3. In the File Sharing dialog box, type the username of a user with whom you want to
share the folder (see Figure 2.4), click Add, and then click Share. 4. In the User Account Control dialog box that appears, click Continue. 5. The File Sharing dialog box informs you that the folder has been shared and that you
may email the links to inform users that the folders are shared or copy the links so that you can paste them into programs or documents. Click Done.
68
Chapter 2: Installing Windows Vista
FIGURE 2.4
Sharing a folder.
NOTE The Public folder Vista provides a folder located at c:\Users\Public that contains subfolders named Public Documents, Public Download, Public Music, Public Pictures, Public Videos, and Recorded TV. Although this folder is designed for sharing files and folders, it is not shared by default. You will need to share this folder using a procedure similar to that described in the preceding steps.
The file-sharing capabilities in Windows Vista are simplified such that all users have identical rights to files based on how you originally share the resource. This means that either all users can read the files, or all users can change the files. You can control which users are permitted to do by configuring the access control list (ACL) for the appropriate files and folders, provided you are using the New Technology file system (NTFS) for the file system. Right-click the file or folder and choose Properties and then select the Security tab of the dialog box that appears. Users and permissions are discussed further in Chapter 5, “Configuring Windows Security Features.”
NOTE Checking the access control list If you are using NTFS for the file system, you can check the access control list of a folder with the cacls command. Click Start, All Programs, Accessories, Command Prompt. At the prompt type the following: CACLS C:\FOLDER
69
Identifying Hardware Requirements
File System Considerations Windows Vista supports three file systems: . File Allocation Table 16 (FAT16) . File Allocation Table 32 (FAT32) . NT File System (NTFS)
FAT16 is a 16-bit file system, whereas FAT32 is a 32-bit file system, both of which have grown out of the Windows 95/98/Me family. NTFS is the 32-bit file system that has come from Windows NT. For more information on Vista file systems, refer to “Comparing NTFS and FAT file systems” in Vista Help and Support Center. In a corporate environment or in any peer-to-peer network, you should consider NTFS to be the optimum file system to use. It has the basic functionality that FAT16 and FAT32 provide, plus it supports improved security, file encryption, file compression, and larger partitions and files. For scalability, NTFS can ensure your file system will support the larger hard disks and will not degrade in performance. Fault-tolerant features are incorporated in NTFS. The file system automatically repairs disk errors without displaying error messages. When Windows Vista writes files to the NTFS partition, it saves a copy of the file in memory. It then compares the file on the disk to see whether it is the same as the copy in memory. If the two copies aren’t equivalent, Windows Vista marks that section of the disk as bad and rewrites the file to another disk location. NTFS also allows you to perform several operations related to file and folder security. The security within NTFS allows you to set permissions on folders and individual files. FAT16 and FAT32 do not. Furthermore, to use the Encrypting File System (EFS), you must have NTFS as your file system. EFS allows you to protect your files and folders from unauthorized access on the local hard drive through the use of public key security. In addition, you can set disk quotas. When multiple people use the same computer, you can control the amount of disk space each person can use on that computer. When you have configured disk quotas, a user looking at the available disk space will see only the amount of space available for that user’s disk quota. If users attempt to exceed their allotment, they are given the message that the disk is full. Native NTFS file compression enables users to select individual files or folders to compress. Because the file system takes care of the compression algorithm, any Windows application can read or write a compressed file without having to manually decompress the file beforehand. File compression is supported only when NTFS has a cluster size of 4KB or smaller.
70
Chapter 2: Installing Windows Vista
NOTE Upgrading considerations If you are upgrading an existing Windows system that already uses NTFS, you should keep NTFS. If you are upgrading Windows systems that use FAT16 or FAT32, your partition is automatically converted to NTFS during the setup process.
Dual-boot systems also require you to think through the file system choice. Although you may use both an NTFS and a FAT partition on the same computer, a Windows 9x operating system cannot access files in the NTFS partition. However, Windows Vista (as well as Windows NT, Windows 2000, and Windows XP) can access both partitions.
Product Activation The highly controversial Windows Product Activation (WPA) was first introduced by Microsoft in Windows XP and Office XP to deter piracy. The premise is that each computer installed should have a unique identifier associated with the software with which it was installed. The WPA addition, however, does cause some planning issues for a large deployment. In a simple installation of a single Windows Vista system, WPA is just a matter of contacting Microsoft via the Internet (the easiest method) or phone and obtaining the unique identifier. In a large deployment, Microsoft has introduced an update to WPA called Volume Activation, which enables straightforward activation of multiple computers. How WPA works is straightforward: It generates a unique identifier for your computer by combining your hardware ID with the product key. This ID is sent to Microsoft, which then checks to see whether that product key has been used for more than the number of systems that the End User License Agreement (EULA) allows, which is simply one system. If this check passes, your computer receives a confirmation code that activates Windows Vista, and the issue of WPA goes away. If the check fails, your system is not activated and will operate in reduced functionality mode after the 30-day activation period is over. If you have a computer that is not connected to the Internet and does not have a modem available for connection purposes, you are required to manually activate it. To do so, you run through the WPA process when prompted to activate the computer, and you will obtain an installation ID number. Then you call the Microsoft Activation Call Center to obtain a confirmation ID. Finally, you input the confirmation ID number in WPA. When you use WPA, regardless of the method, the information in the ID submitted to Microsoft indicates the following: . System volume serial number . Network adapter Media Access Control (MAC) address . CD-ROM or DVD-ROM ID
71
Performing a Clean Installation of Windows Vista . Display adapter ID . CPU ID and the CPU serial number . Hard drive ID . IDE controller ID
You can perform Volume Activation by using either of the following two types of licensing keys: . Multiple Activation Keys—These keys activate computers by either the Internet or tele-
phone in a manner similar to that already described for Product Activation. . Key Management Service—You can set up this service on a computer running Windows
Vista or the new Windows Server operating system to activate Vista computers automatically without the need to contact Microsoft. You must have a minimum of 25 Vista computers to utilize this service.
Performing a Clean Installation of Windows Vista Objective:
Perform a clean installation. In an attended installation, someone is required to interact with the computer while it executes the installation process. This is a process that IT professionals should be familiar with but one the average user will rarely, if ever, need to perform. With OEMs releasing new computers with the operating system pre-installed, and with organizations ensuring that only IT staff installs and configures computers, it’s likely that the only non-IT professionals who will run fully attended installations are those who purchase Windows Vista off the shelf and install it on their existing home computers. As an IT professional, you should run through at least one or two attended installations even if you are planning to deploy only unattended installations of Windows Vista throughout your organization. By going through the process, you can see each stage of installation and relate it to sections within the answer files and with the unattended process later on. If you need to troubleshoot an unattended installation, you will be better able to identify the point at which the installation failed if you have already become familiar with the attended installation process.
72
Chapter 2: Installing Windows Vista
Performing an Attended Installation You can run an attended installation process for either an upgrade or a clean installation of Windows Vista. Upgrading to Windows Vista is covered in Chapter 3, “Upgrading to Windows Vista,” so we will be walking through a clean installation process in this section. Before you begin, check to make certain that you have gathered all the information you need and are prepared to install. You should have the following: . A computer that meets the minimum hardware requirements listed in the Windows
Logo Program for Hardware. . Windows Vista drivers from the manufacturer for any hardware that does not appear in
the Windows Logo Program. It’s imperative that you have the hard disk drivers, especially if they are RAID or SCSI devices. . Windows Vista DVD or installation files available across a network. . BIOS that meets the minimum requirements for Windows Vista compatibility.
CAUTION BIOS support for ACPI Windows Vista requires Advanced Configuration and Power Interface (ACPI) capability in the BIOS; you cannot use older power management systems such as Advanced Power Management. Ensure that you have the latest BIOS available before beginning Vista installation.
. Product code, which should be listed on the CD package or provided to you from the
network administrator. . If across a network, a boot disk that can access network shares and appropriate net-
work adapters. . Internet connection for Automatic Updates and access to updated drivers and WPA. . A backup of all your existing data and the drivers for the backup device so that you can
restore the data. When you have all the preceding items in hand, you’re ready to install Windows Vista. Your first step in the installation is to boot up the computer into the setup process. This means that you will boot to the network and run Setup from a network share, boot from the CD, or create a set of Setup startup disks that will boot the computer and find the CD. If your CD-ROM drive is not bootable, consider that to be a red flag that your system might have compatibility problems. Installing across a network is covered in Exercise 2.1 in the “Apply Your Knowledge” section later in this chapter.
73
Performing a Clean Installation of Windows Vista
Step by Step 2.1 outlines the process for installing Vista using a bootable DVD-ROM rather than startup disks or a network installation.
STEP BY STEP 2.1 Manually Installing Windows Vista Via DVD-ROM 1. Insert the Windows Vista installation DVD and boot the computer. If you receive a message that the DVD has been auto-detected and a prompt to Press any key to boot from CD or DVD, press the spacebar or any other key within five seconds or the computer will attempt to boot from the hard disk. 2. A message stating that Windows is loading files appears. After a minute or so, the Install Windows dialog box shown in Figure 2.5 appears. If you need to change the language, time and currency, or keyboard or input method settings, do so. Otherwise, click Next to proceed.
FIGURE 2.5 The Install Windows dialog box offers options for language, time and currency, and keyboard or input method.
3. Another Install Windows dialog box appears. If you need further information, click the What to Know Before Installing Windows link. Click Install now to install Vista. 4. After a few seconds, you receive a Type Your Product Key for Activation dialog box (see Figure 2.6). Type the product key included with the installation DVD and then click Next.
TIP Installing Vista without a product key Unlike previous versions of Windows, you can leave the product key blank. If you do so, you will receive a warning message and will be prompted to select the edition of Vista you want to install. You will have 14 days to activate Windows, at which time you must supply a valid product key. You can use this feature to preview any edition of Vista and select the most appropriate edition for your requirements.
74
Chapter 2: Installing Windows Vista
FIGURE 2.6 Type your product key when prompted by this dialog box.
5. The EULA screen appears. You must select the I Accept the License Terms check box to accept the licensing agreement as indicated at the bottom of the screen. 6. The next screen offers you a choice of upgrade or clean installation. The Upgrade option will be disabled (grayed out) unless you are running the installation on a computer running a compatible copy of Windows XP with sufficient free disk space to accommodate the upgrade. Select the Custom (advanced) option to continue. 7. The next screen shows the available partitions and unpartitioned disk space where you can install Windows Vista. Make certain you select a partition that has enough available disk space, preferably 40GB but at least 20GB. If unpartitioned space is available, you can select the unpartitioned space and create a new partition for the operating system at this point. Click Next. 8. The next window tracks the progress of installing Windows Vista and informs you that your computer will restart several times, as shown in Figure 2.7. Take a coffee break.
FIGURE 2.7 Tracking the progress of Windows Vista installation.
75
Performing a Clean Installation of Windows Vista 9. After the final reboot, Setup displays the Choose a User Name and Picture dialog box shown in Figure 2.8. Type a username and password in the text boxes provided. The password you provide is for a local user account on the computer running Windows Vista. You do not need to make this password the same as the one for the domain administrator, and you can leave the password blank. Be careful when assigning different passwords for the Administrator account on different computers during a large deployment because you will have problems if you lose the local Administrator’s password.
FIGURE 2.8 Setup asks you to provide a username and password.
10. On the next screen, accept the computer name provided or type one of your choosing. If you intend to join a domain, enter a computer name that meets your organization’s naming conventions and that has a computer account on the domain. The computer name must be unique on the network for both DNS naming and WINS naming. Also choose a desktop background and then click Next. 11. On the next screen, select the Use Recommended Settings option to provide the highest security level (see Figure 2.9). 12. On the next screen, set the current date, time, and time zone. If this computer connects to the Internet, you can simply select the correct time zone and later make certain that Windows Vista automatically synchronizes with an Internet time provider. (If you have a local time provider computer, you can also type in that computer’s address in the appropriate location.) Figure 2.10 shows the dialog box for customizing time synchronization. You can access this dialog box by right-clicking the time on the right end of the Windows Vista taskbar, selecting Adjust Date and Time, and then clicking the Internet Time tab.
76
Chapter 2: Installing Windows Vista
FIGURE 2.9 The Help Protect Windows Automatically screen enables you to choose the appropriate security level. You should always select the Use Recommended Settings option.
You can synchronize your computer time across the Internet.
FIGURE 2.10
13. On the next screen, select the location that best describes your computer’s current location (see Figure 2.11). 14. Setup displays a Thank you message. Click Start to begin working with Vista. At this first logon, Windows informs you that it is checking your computer’s performance. After a minute or two, Vista displays a Welcome screen and a message that it is configuring your desktop.
77
Performing a Clean Installation of Windows Vista
Vista provides three options that govern how network settings are applied.
FIGURE 2.11
15. After another minute or two, the Windows Vista desktop and then the Welcome Center (which was introduced in Chapter 1) appears. The computer attempts to access the Internet to download and install updates from the Microsoft website, and a message at the bottom of the desktop informs you of the update progress. Click any of the options displayed to learn more about Vista.
CAUTION Activation period The period of time before you absolutely have to activate Vista is 30 days. If you do not activate Vista on time, it enters a “reduced functionality mode” in which you can only perform certain actions. Refer to The behavior of reduced functionality mode in Windows Vista in the “Suggested Readings and Resources” section for more information.
You have just completed a full, manual installation of Windows Vista from scratch. In a typical installation, you would next join a workgroup or domain, install additional applications, restore data from backup, and customize the desktop to meet your needs.
REVIEW BREAK You have conducted a manual, clean install of Windows Vista on a computer without a previous operating system. Keep in mind the following facts: . Windows Vista comes in the following editions: Home Basic, Home Premium,
Business, Enterprise, and Ultimate. A Starter Edition is also available for selected third-world countries.
78
Chapter 2: Installing Windows Vista . You can perform the initial installation of Vista without entering a product key; howev-
er, you must enter a product key to activate Vista before the 30-day grace period expires. . Ensure that the computer on which you are installing Vista meets at least the minimum
hardware requirements. This computer should preferably meet the Premium Ready hardware requirements for best performance. . You use the Setup.exe program on the Vista DVD-ROM to install Vista. The winnt.exe and winnt32.exe programs used with previous Windows versions no
longer exist.
Performing an Unattended Installation The procedure outlined in Step by Step 2.1 is fine when you have only a few computers that need to be installed. But what would you do if you had several hundred (or thousand!) computers on which you needed to install Windows Vista? This section describes several methods of unattended installation (also referred to as automated deployment), which enables you to deploy Windows Vista to a large number of computers with little or no intervention needed from end users. Unattended installation provides great time savings for administrators who need to install Windows Vista on even a modest number of computers. In addition, it provides a reliable method of creating a series of computers with consistent configurations and reduced chance of error during installation. Original equipment manufacturers (OEMs) use similar methods to install Windows Vista onto large numbers of new computers. Unattended installation also provides an efficient, rapid means of installing the operating system and core applications should a computer fail and a user needs to be provided with a new computer. Should you need to replace the hard drive containing the operating system files, unattended installation generally provides the fastest means of getting a user productive again. Several methods of automated deployment of Windows Vista are available. This section discusses the following methods: . Setup Manager—Enables you to create answer files, which are text files that provide
answers to questions asked by the installation program. You can use these answer files to script the installation of Windows Vista. . Sysprep—Used in conjunction with a third-party replication tool such as Norton Ghost,
Sysprep automates the installation of Windows Vista from answer files onto a series of computers. . WDS—Uses a server configured with image files of Windows Vista to automatically
install computers across the network.
79
Performing a Clean Installation of Windows Vista . Third-party disk duplication programs—Uses additional tools, such as Microsoft Systems
Management Server, to distribute copies of Windows Vista. This method is not covered on the exam and is not discussed in this book.
Understanding Vista Deployment Technologies Microsoft has modified the technology for automated setup in Vista considerably from the technologies previously used in Windows 2000/XP/Server 2003. Table 2.2 introduces the new and modified components and technologies used with Vista. TABLE 2.2
Deployment Tools and Technologies
Component
Description
Answer file
An XML-based file (Unattend.xml) that contains the operating system settings that you want to specify for the unattended installation. This file replaces the Unattend.txt and Udf files used in Windows XP and Windows Server 2003 setup.
System Image Manager (SIM)
The application used to automate the process of creating an answer file to your specifications. Replaces the Setup Manager program previously used in Windows XP and Windows Server 2003.
Catalog
A binary file containing the configuration of settings and packages within a Windows image.
Windows Preinstallation Environment (Windows PE)
A minimal 32-bit operating system based on the Vista kernel, used in the preinstallation and deployment of Vista.
ImageX
A command-line tool that collects, modifies, and applies Vista installation images.
Windows Setup
The application that installs the Vista operating system.
System Preparation Tool (Sysprep)
The application that processes images for deployment to multiple computers.
Windows image
A compressed file in the new Windows Imaging (.wim) format that contains all the folders and files required to complete a Vista installation, either attended or unattended.
Using Windows System Image Manager to Create Unattended Answer Files Windows System Image Manager (SIM) enables you to create answer files from information included in a Windows image (.wim) file and a catalog (.clg) file. You can also include component settings and software packages to be installed on the computers with Windows Vista. The following are several actions you can accomplish using SIM:
80
Chapter 2: Installing Windows Vista . Create new answer files and edit existing ones . Validate the information in an answer file against a .wim file . View and modify the component configurations in a .wim file . Include additional drivers, applications, updates, or component packages in the
answer file You can use SIM to create unattended answer files. You should have two computers, as follows: . A computer from which you install SIM and create the answer files. Microsoft refers to
this computer as the “technician computer.” . A computer without an operating system but equipped with a DVD-ROM drive, net-
work card, and a floppy drive, or USB support.
CAUTION Take care when editing answer files When using Notepad to edit the answer file or UDF file, you must ensure that you follow the rules of syntax exactly; otherwise, unattended installations will either fail or prompt the user for additional information.
Creating an Answer File To use SIM to create the files required for performing unattended installations, you first need to download and install the Windows Automated Installation Kit (AIK) from Microsoft and copy the appropriate files from the Windows Vista DVD-ROM. You should perform these steps on a computer running Windows XP Service Pack 2 or later, Windows Server 2003 Service Pack 1 or later, or Windows Vista. Microsoft refers to this computer as the “technician computer.” Follow Step by Step 2.2 to download and install the AIK.
STEP BY STEP 2.2 Downloading and Installing the AIK 1. Open Internet Explorer, navigate to http://www.microsoft.com/downloads/details.aspx?FamilyID= c7d4bc6d-15f3-4284-9123-679830d629f2&DisplayLang=en, and follow the instructions provided to save the Windows AIK image file to an appropriate location on your hard drive. You can also search for “automated installation kit” from Microsoft Live Search.
CAUTION AIK is a large download If you do not have a high-speed Internet connection, be prepared for an overnight download.
81
Performing a Clean Installation of Windows Vista 2. Use third-party DVD burning software or the native software included with Vista to burn the image file to a blank DVD-ROM disc. 3. Insert the DVD-ROM disc into the technician computer. The AutoRun program should execute and display a User Account Control dialog box. If not, navigate to the DVD-ROM folder and double-click the StartCD.exe file. 4. Click Continue to display the Welcome screen shown in Figure 2.12.
Installing the Windows Automated Installation Kit.
FIGURE 2.12
5. Select Windows AIK Setup from the list of options on the left side of this window. 6. The Windows Automated Installation Kit Setup Wizard starts with a Welcome page. Click Next. 7. On the License Agreement page, click I Agree and then click Next. 8. On the Select Installation Folder page, accept the folder provided or type the path to an appropriate folder, and then click Next. 9. On the Confirm Installation page, click Next and wait while the AIK is installed. This process takes several minutes. 10. When the completion page appears, click Close.
After you have installed the AIK, a folder is present on your computer, from which you can create answer files. Step by Step 2.3 shows you how.
82
Chapter 2: Installing Windows Vista
STEP BY STEP 2.3 Creating an Answer File 1. Insert the Windows Vista DVD-ROM and cancel the Install Windows window that appears. 2. Open a Computer (or My Computer on a Windows XP or Windows Server 2003 computer) window, navigate to the Vista DVD-ROM, right-click, and select Open. 3. Open the Sources folder, navigate to the install.wim file, right-click, and then choose Copy. 4. In the Computer (or My Computer) window, navigate to a suitable location and create a folder to hold the installation files, for example, c:\Vista_Install. 5. Open this folder and use Ctrl+V to paste the install.wim file into it. This will take about one hour. 6. Click Start, All Programs. In the program list that appears, click Microsoft Windows AIK and then click Windows System Image Manager. 7. In Windows System Image Manager shown in Figure 2.13, select File, Select Windows Image.
You need to select a Windows image file to create an answer file.
FIGURE 2.13
8. In the Select a Windows Image dialog box shown in Figure 2.14, navigate to the folder you copied the install.wim file to, select this file, and then click Open.
NOTE If you receive an error informing you that SIM was unable to load the wimgapi.dll file or that it could not be found, open a Computer window, navigate to c:\Program Files\Windows AIK\Tools\x86, and copy this file to c:\Windows\System32. You will need to supply administrative credentials. Wimgapi.dll
83
Performing a Clean Installation of Windows Vista
FIGURE 2.14
Selecting the install.wim file.
9. On the Select an Image dialog box shown in Figure 2.15, select the edition of Windows Vista that you want to create an answer file for.
FIGURE 2.15
Selecting a Windows Vista image.
10. SIM asks you to create a catalog file. Click Yes and then click Allow in the User Account Control dialog box that appears. A Generating Catalog File message box appears as the files are processed and the catalog file is created. This takes several minutes. 11. When the process of generating a catalog file is complete, click OK. You are returned to Windows SIM. 12. In the Windows Image pane, expand the Component node to display the available components. 13. Right-click each of the following components in turn and add them to the indicated configuration pass: . Microsoft-Windows-Setup\DiskConfiguration\Disk\CreatePartitions\ Create Partition; add to 1 Windows PE configuration pass. . Microsoft-Windows-Setup\DiskConfiguration\Disk\ModifyPartitions\ Modify Partition; add to 1 Windows PE configuration pass. . Microsoft-Windows-Setup\ImageInstall\OSImage\InstallTo; add to 1 Windows PE configuration pass.
84
Chapter 2: Installing Windows Vista . Microsoft-Windows-Setup\UserData; add to 1 Windows PE configuration pass. . Microsoft-Windows-Shell-Setup\OOBE; add to 7 oobeSystem configuration pass. 14. The Answer File pane should display all the settings you have added. To complete the creation of an answer file for a basic Vista installation, select and configure the settings contained in Table 2.3.
TABLE 2.3
Windows Settings for a Basic Answer File
Component
Value
Microsoft-Windows-Setup\DiskConfiguration
WillShowUI = OnError
Microsoft-Windows-Setup\DiskConfiguration\Disk
DiskID = 0 WillWipeDisk = True
Microsoft-Windows-Setup\DiskConfiguration\Disk\ CreatePartitions\CreatePartition
Extend = False Order = 1 Size = 40,000 (creates a 40GB partition) Type = Primary
Microsoft-Windows-Setup\DiskConfiguration\Disk\ ModifyPartitions\ModifyPartition
Active = True Extend = False Format = NTFS Label = OS_Install Letter = C Order = 1 PartitionID = 1
Microsoft-Windows-Setup\ImageInstall\OSImage\
WillShowUI = OnError
Microsoft-Windows-Setup\ImageInstall\OSImage\InstallTo
DiskID = 0 PartitionID = 1
Microsoft-Windows-Setup\UserData
AcceptEula = True
Microsoft-Windows-Setup\UserData\ProductKey
Key = <product_key> WillShowUI = OnError
Microsoft-Windows-Shell-Setup\OOBE
HideEULAPage = True ProtectYourPC = 3 SkipMachineOOBE = True SkipUserOOBE = True
15. Validate the settings you have configured by selecting Validate Answer File from the Tools menu. 16. If you receive an error message, double-click the message in the Messages pane, correct the error, and then repeat step 15. 17. When all errors have been corrected, click File, Save Answer File. Save the answer file as Autounattend.xml and then copy this file to a removable flash drive or floppy disk.
85
Performing a Clean Installation of Windows Vista
Using the Answer Files to Perform an Unattended Installation Having created the answer files as described in Step by Step 2.3, it is easy to run the automated installation of Windows Vista on a new computer without an operating system. Step by Step 2.4 shows you how.
STEP BY STEP 2.4 Performing an Unattended Installation of Windows Vista 1. Start the target computer and insert the Vista DVD-ROM and the flash drive or floppy disk you created in Step by Step 2.3. 2. To run Setup.exe, press Ctrl+Alt+Delete. The computer restarts and searches the flash drive or floppy disk for the Autounattend.xml file. 3. Setup should proceed automatically and install Vista with all customizations you have previously configured.
NOTE Don’t forget to remove the floppy disk If you start the computer from a floppy, do not forget to remove it before the first restart; otherwise, you will receive an error message. If an error message appears, remove the disk and press Ctrl+Alt+Delete.
Installing Windows Vista by Using the System Preparation Tool (Sysprep) The procedure outlined in Step by Step 2.4 is adequate if you are installing Vista on just a few computers. If you need to install Vista on a large number of computers, you can use the System Preparation Tool (Sysprep) together with a means of disk imaging. Unlike the situation in Windows XP, the Vista DVD already contains an image suitable for deployment to any computer. You can either deploy this image as-is or prepare an image of the computer you installed in Step by Step 2.4 for deployment to the destination computers. Such a procedure can save considerable time when you are performing a large rollout. In addition, should you encounter problems with a computer at a later time, you can re-image the computer from the disk image that you originally created to return the computer to a baseline configuration.
Understanding the System Preparation Tool Unlike the situation in Windows XP, Sysprep is automatically installed into the Windows\System32\Sysprep folder when you install Vista. To use Sysprep, you begin with a
86
Chapter 2: Installing Windows Vista
reference computer on which you have installed Windows Vista together with any applications and updates that you want to deploy to the destination computers. Certain situations are not supported for the use of Sysprep. In these instances, you might be able to use WDS if your network meets the requirements for using WDS: . Upgrades—You cannot use Sysprep for upgrading computers running older versions of
Windows to Windows Vista. . Production environment—Use of Sysprep for creating an image of a computer that has
been used in a production environment is not recommended. In other words, you should use a freshly installed version of Vista when preparing the computer to be imaged. . OEM installation image—Microsoft does not support the use of Sysprep for imaging a
computer that was originally set up from original equipment manufacturer (OEM) installation images or media. . Default user profile has been overwritten—You should not use Sysprep if you have copied
another user profile over the default user profile. Several optional switches are provided with Sysprep: . /audit—Runs Sysprep.exe in audit mode, which verifies hardware and software
installation after you have run Sysprep.exe in factory floor mode. This enables the computer to reboot to verify proper hardware and software installation. . /quiet—Runs Sysprep.exe without user interaction. . /generalize—Removes system-specific information such as the security identifier
(SID) and product activation information so that these items become unique on each newly installed computer. . /oobe—Runs Windows Welcome and the oobeSystem configuration pass on the next
reboot. . /reboot—Forces the computer to reboot after completion of disk imaging. . /unattend:
—Specifies the name of an answer file. . /shutdown—Forces a shutdown rather than powering off the computer.
Creating an Image with Sysprep Creation of the image for Sysprep deployment involves preparation of the computer and running the Sysprep.exe utility, followed by shutting down the system and running the disk imaging program. You must be logged on as an administrator to perform these steps. Follow the steps outlined in Step by Step 2.5 to prepare and image the reference computer.
87
Performing a Clean Installation of Windows Vista
STEP BY STEP 2.5 Creating a Sysprep Image 1. On the computer you installed Vista on in Step by Step 2.4, run the following command: C:\Windows\System32\Sysprep.exe /oobe /generalize /shutdown
2. Sysprep cleans up the disk image by removing various user and machine settings and then shuts the computer down. Reboot the computer with a floppy and run the disk-cloning program to create the image that you will deploy to the target computers.
You can store the image created by this procedure on a CD-ROM or a shared folder that is accessible to the target computers. It is also good practice to perform a test deployment and ensure that the operating system and all applications are properly installed and configured before deploying the image to production computers. Should any problems occur, you can reconfigure the source computer and re-create the image.
Deploying an Image with Sysprep Microsoft includes Windows PE, which is a minimal version of a 32-bit operating system designed to facilitate the deployment of a Windows Vista image to multiple computers. To use Windows PE, you first need to create a CD that enables you to capture an image of the master computer to be stored on a shared folder accessible to the target computers. The process involves creating a CD from which you can start Windows PE, using this CD to start Windows PE, using ImageX to capture the installation image, and copying this image to a network share. Follow Step by Step 2.6 to complete these tasks.
STEP BY STEP 2.6 Creating a Windows Vista Image 1. At the technician computer, run the following commands to create a local Windows PE build directory: cd \Program Files\Windows AIK\Tools\PETools Copype.cmd <arch> <destination>
Where <arch> refers to x86, amd64, or ia64, and <destination> is the path to a local folder; for example: Copype.cmd x86 c:\WinPE_x86
88
Chapter 2: Installing Windows Vista 2. Copy additional tools as required to the local folder, for example: Copy “C:\Program files\Windows AIK\Tools\x86\imagex.exe “ C:\WinPE_x86\iso\ <subfolder>
Where <subfolder> refers to whatever subfolder structure is required for supporting the tools. 3. Use Notepad or another text editor to create a configuration file named wimscript.ini, which instructs ImageX to exclude specific files during the capture procedure. This file contains the following statements: [ExclusionList] ntfs.log hiberfil.sys pagefile.sys “System Volume Information” RECYCLER Windows\CSC [CompressionExclusionList] *.mp3 *.zip *.cab \WINDOWS\inf\*.pnf
4. Save this file to the same location specified in step 2. This enables ImageX to detect this file automatically. 5. Use the Oscdimg.exe tool to create an ISO image file, for example: cd \Program Files\Windows AIK\Tools\PETools Oscdimg –n –bc:\winpe_x86\etfsboot.com c:\winpe_x86\ISO c:\winpe_x86\winpex86.iso
6. Use the Windows CD-writing wizard or a third-party CD burning application to burn the ISO image file to a blank CD-ROM.
Having created the Windows PE CD-ROM, you can now start the master computer and copy its image to a network share for deployment. Step by Step 2.7 shows you how.
STEP BY STEP 2.7 Capturing the Vista Installation 1. At the master computer, insert the Windows PE CD-ROM and restart the computer. 2. Windows PE opens a command prompt. To capture an image of the master installation, type the following: D:\Tools\Imagex.exe /compress fast /capture C: C:\Myimage.wim “my Vista Install” /verify
89
Performing a Clean Installation of Windows Vista 3. On the network server, create and share a folder to hold the image, for example \\Server1\Vista_ installation\Images. 4. At the master computer, type the following to copy the image to the share: net use z: \\Server1\Vista_installation\Images copy c:\Myimage.wim z:
The image is now ready to deploy to any number of destination computers. Follow Step by Step 2.8 to deploy the image.
STEP BY STEP 2.8 Deploying the Vista Image 1. At the target computer, insert the Windows PE CD-ROM and restart the computer. 2. At the Windows PE command prompt, use the diskpart command to create the appropriate disk configuration; for example: diskpart select disk 0 clean create partition primary size=40000 select partition 1 active format exit
3. Type the following commands to copy the installation image to the local hard drive: net use z: \\Server1\Vista_installation\Images copy z:\Myimage.wim c:
4. Type the following command to use ImageX from the Windows PE media to apply the image to the local hard drive: D:\Tools\Imagex.exe /apply C:\Myimage.wim c:
This deploys the Vista image to the destination computer, ready for delivery to the end user.
NOTE Redeploying the image to the master computer If you want to redeploy the image to the computer you imaged in the previous steps, override the default boot order to boot the computer from the CD-ROM drive, using the appropriate function key to access the BIOS program.
90
Chapter 2: Installing Windows Vista
Installing Windows Vista by Using Windows Deployment Services (WDS) WDS is the replacement for Remote Installation Services (RIS), which was first introduced with Windows 2000 to provide a means of performing on-demand, image-based installation of operating systems across a network connection from a server running RIS to the computer on which the operating system is to be installed. You can install WDS on a server running either Windows Server 2003 or Windows Server 2008 and use it to install Windows Vista or Windows Server 2008 on destination computers.
Understanding WDS WDS provides several advantages to the administrator who needs to install Windows Vista/2008 on a large number of computers, including the following: . WDS enables you to install Windows Vista on computers at a remote location across a
wide area network (WAN). . WDS provides native support for Windows PE and the WIM file format. . WDS reduces the complexity associated with large deployments, thereby reducing
total cost of ownership (TCO). . WDS simplifies the duties associated with management of an installation server. . WDS simplifies the procedures required to recover an installation from system failures
that occur during installation. WDS provides backwards compatibility with RIS by enabling the following operational modes: . Legacy mode—Functionally equivalent to RIS, this mode enables the installation of
Windows 2000/XP/Server 2003 computers only. . Mixed mode—Enables the actions of both RIS and WDS to deploy any Windows
2000/XP/Server 2003/Vista/Server 2008 computers. . Native mode—Deploys only Windows PE boot images to install remote copies of
Windows Vista and Windows Server 2008. You can create installation images of Windows Vista or Windows Server 2008 that include complete computer configurations, including such items as applications and desktop settings, and use WDS to push these images out to client computers on the network. The capabilities of WDS include the following:
91
Performing a Clean Installation of Windows Vista . Enable users to install an operating system on demand. On starting a client computer
that is equipped with the PreBoot eXecution Environment (PXE), the computer connects to a WDS server, which then installs the operating system across the network without the need for a CD. . Provide images of the operating system that are complete with specific settings and
applications such as those required by a corporate workstation policy. You can designate the group of users that is provided with a certain image or series of images. . Create images that enable the automated installation of Windows Vista or Windows
Server 2008.
Requirements to Use WDS You can install WDS on a server running Windows Server 2003 or Windows Server 2008 from the Windows AIK by using the Windows_deployment_services_update.exe program included in the AIK. In addition, the following server components must be available on the WDS server or on another server available to the WDS server: . Dynamic Host Configuration Protocol (DHCP)—Provides TCP/IP configuration parame-
ters that enable the client computer to create its own network connection. . Domain Name System (DNS)—Provides name resolution services so that the client com-
puter can locate the WDS server by name. . Active Directory—WDS operates only in an Active Directory–enabled domain environ-
ment. You cannot use WDS in a workgroup environment. In addition, you must have the Windows AIK media available either on the WDS server or at an accessible location, as well as a separate partition on the WDS server that is formatted with the NTFS file system. You must be using a domain account with membership in the local Administrators group on the WDS server.
EXAM ALERT Be sure you know these requirements for using WDS You might encounter a question on the exam where you are asked to troubleshoot why WDS isn’t working, when the reason is that one of these services is missing. Also remember that DNS is required for Active Directory.
Client computers must meet the proper design specification to be installed with RIS. This includes the capability for remote booting, which is usually accomplished by adding a network interface card (NIC) that is equipped with a PXE ROM-enabled chip, along with support in the BIOS for booting the computer from this NIC. In addition, the client computer can have
92
Chapter 2: Installing Windows Vista
only a single disk partition. (Any additional partitions are destroyed when the operating system is installed, and the entire disk is formatted as a single NTFS partition.) Use of WDS to deploy multiple images of Vista is beyond the scope of the 70-620 exam and will not be discussed further. For additional details, refer to Windows Deployment Services Update Step-by-Step Guide in the “Suggested Readings and Resources” section.
REVIEW BREAK You have looked at the Windows System Image Manager, Sysprep, and the use of WDS for unattended installation of Windows Vista. You should be aware of the following major points: . You can use Windows System Image Manager to create answer files that supply
answers to questions asked by the Windows Vista setup program. . The answer file is an XML file that contains the information necessary to install Vista
without answering additional questions at the target computer. You can place this file on a floppy disk or USB key for use at the target computer. . Windows PE is a minimal 32-bit operating system based on the Vista kernel, used in
the preinstallation and deployment of Vista. . Sysprep enables you to deploy images of Vista to remote computers after you have cre-
ated a reference computer containing Vista together with any required configurations and applications. . WDS enables users to connect to a remote installation server and download an image
of Windows Vista, complete with service packs and applications. . You must have DHCP, DNS, and Active Directory operating on the network to use
WDS.
Troubleshooting Windows Vista Installation Issues Objective:
Troubleshoot Windows Vista installation issues. At some point, before a computer can be used, an operating system must be installed. Problems often occur during an operating system installation, which requires troubleshooting. Windows Vista is no exception. Whether the installation is attended or the operating system
93
Troubleshooting Windows Vista Installation Issues
is automatically installed through the use of answer files, Sysprep, or WDS, problems can occur. Network administrators and engineers need to know how to handle unexpected errors. In this section you review the common problems that can occur during attended installations. You also discover how to troubleshoot problems with the various types of unattended installations and the troubleshooting methods to follow when faced with a failed installation of Windows Vista.
Troubleshooting Process When you troubleshoot any problem, whether it is during installation or otherwise, there is a simple cyclical methodology that can help you achieve a solution. This is shown in Figure 2.16. As you can see, it consists of five phases: 1. Identify the point of failure. 2. Discover the cause of the failure. 3. Define a solution. 4. Test and implement the solution. 5. Document the results.
This is not a straightforward linear process because all troubleshooting is based on theory. Your job is to come up with a theory about why the computer is failing and then test your theory. If your test proves the theory to be wrong, you need to return to the original phase—identifying the point of failure. Discover Cause
Identify Failure
Define Solution
Test and Implement
Problem Resolved
Document Results
FIGURE 2.16
tion is found.
The troubleshooting methodology is circular until a solu-
94
Chapter 2: Installing Windows Vista
Identifying the Point of Failure The first phase of troubleshooting is determining what the problem is. Given that some symptoms can be caused by a variety of different failures, you need to remain open to any possibility. Let’s take for example that Windows Vista Setup does not boot from the DVD-ROM. The point of failure is limited to . DVD-ROM drive . DVD-ROM device drivers . BIOS . Installation media . Lack of power (computer is not plugged in)
Given that any one of these items could be the failure, you should look closely at the clues that your computer has given you. If, for example, you can see that the BIOS has started, the light on your keyboard is on, and the monitor is displaying data, you can discard the last item as a point of failure. You should select one of the most likely points of failure and then move on to the next phase.
Discovering the Cause of the Failure The difference between the point of failure and the cause of failure is the same as the what and why. A point of failure can be the DVD-ROM. The cause of the failure could be that the DVDROM drive is not plugged into the power cable, the DVD-ROM drive is not a bootable drive, or the DVD-ROM drive electronics failed. During this second phase, you should select the most probable cause of failure. Ask yourself, “If the problem is the what, then why did it fail?” and consider your answer to be the next part of your theory that you need to test.
Defining a Solution The third troubleshooting phase is to define a solution. This is the answer to the question “How do you fix it?” For example, if you have decided that the DVD-ROM drive is the problem and that it failed because it is not a bootable drive, your solution might be to install the operating system over the network from another computer’s shared DVD-ROM drive.
Testing and Implementing the Solution Testing and implementation are often the same phase when it comes to troubleshooting because your test is usually to carry out the solution you just defined. If the solution worked, it was implemented. Otherwise, you simply tested a possible solution with negative results.
95
Troubleshooting Windows Vista Installation Issues
If your test produces a negative result, you should return to the first phase—identifying the point of failure. For example, if you test the solution by trying to install Windows Vista from another computer’s shared DVD-ROM drive and you are unable to gain access to the media, you can theorize that the installation media is the point of failure. From there, you can theorize that the DVD is damaged. Your solution might be to replace the DVD. You can then test again and move through the cycle as needed until you succeed.
Documenting the Results Always document your results when you are troubleshooting. Not only is documentation generally considered a good practice, but it is a key to making sure you don’t make the same mistakes twice.
Troubleshooting an Attended Installation When you are sitting in front of a computer, watching it go through the various installation phases, it’s easier to troubleshoot a problem as it occurs than to resolve a failed installation after the event. The Vista Setup process is so streamlined that you usually do not encounter problems during installation. However, when a problem does occur, it’s frequently related to lack of preparation. This basic problem manifests itself in the following symptoms: . The Basic Input/Output System (BIOS) is not compatible with Windows Vista. . The hardware is not compatible with Windows Vista. . There is not enough space on the hard drive to install the operating system. . The drivers for the hard disk, network adapter, or other devices are incorrect or
incompatible. . The computer cannot connect to the network because the name or IP address conflicts
with another computer on the network. Typically, fixing a problem or running the installation again takes much longer than gathering the tools and information you need before you start the installation. As it happens, an ounce of preparation is equal to a pound of troubleshooting.
EXAM ALERT Have the latest BIOS One or two exam questions look for a combination of answers, with one being the need for the latest BIOS. Compatibility with Windows Vista is not just related to hardware or software; it includes firmware.
96
Chapter 2: Installing Windows Vista
This section reviews specific problems that you might encounter during installation. These consist of media errors, insufficient hard disk space, unrecognized CD-ROM, a network that can’t be accessed, and problems that require an advanced startup.
EXAM ALERT Be prepared to draw conclusions from stated symptoms Often, exam questions simply describe the symptoms of a problem. You need to draw conclusions from the exam question and then create a solution. To succeed on these questions, you should be thoroughly familiar with the most common problems that can occur during installation.
Media Problems Windows Vista can be installed directly from a bootable DVD-ROM drive. If the disc does not boot, check to see whether the drive can be configured as a boot drive and whether this is set in the computer’s BIOS. If you are installing from a bootable DVD-ROM and your computer has difficulty reading from the disc, the quickest way to resolve the problem may be to simply use a different Windows Vista Setup DVD-ROM. Even though a DVD-ROM has worked in the past for other installations, it might have become scratched or otherwise damaged. If you inspect the data side of the disc and discover fingerprints, a simple cleaning may fix the problem. To determine whether the problem is with the DVD-ROM or with the DVD-ROM drive, test the disc on another computer. If you have the same or similar errors reading the disc, you should contact Microsoft for a replacement. If you boot from a DVD-ROM and the Setup process begins but is unable to copy files to the computer, you might have an unsupported DVD-ROM drive. In addition, make sure you have a DVD-ROM drive and not a CD-ROM drive; the latter cannot read the Vista DVD-ROM disc. Try to install Windows Vista from another location—either from another DVD-ROM drive or across the network. Another option is to copy the Setup files to a local hard drive before beginning Setup. For network installations, you can boot to the network from either the computer’s existing operating system or a Setup floppy boot disk. If you have problems with the boot disk, test it on an alternate computer to see whether the disk needs to be re-created.
Insufficient Hard Drive Space The minimum hardware requirements for installing Windows Vista state that you should have 15GB of available drive space for the operating system on a drive of at least 20GB. If your hard drive is smaller than 20GB, you should add a new hard drive or replace the drive.
97
Troubleshooting Windows Vista Installation Issues
EXAM ALERT Reality bytes Although theoretically (and on the exam) you can install Windows Vista with only 15GB of free space, the reality is you need well over 20GB. On an exam question that suggests installing Windows Vista on a disk with less than 20GB total of space, select the answer to add another disk or replace the disk.
Unrecognizable DVD-ROM Drive If the Setup program doesn’t recognize the DVD-ROM drive, check whether the DVD-ROM drive is compatible with Windows Vista. If it is, you might be able to load updated drivers from the manufacturer. A much easier solution is to install across a network or to copy the files to a local drive before running Setup.
Unavailable Network Network connectivity can be a problem caused by simple errors, such as the following: . The password is incorrectly typed. Check to make sure that the Caps Lock key
isn’t on. . The wrong domain name is used. Check to make sure that the domain name has been
entered correctly. . The network cable is not connected. . The IP address is incorrect. . A name conflict exists, the name is too long, or the name contains illegal characters. . The computer was unable to obtain an IP address from the DHCP server. . The network adapter drivers are incorrect or malfunctioning. . The DNS server or domain controller is not online. . There is no computer account created in the domain. . The IP address of the default gateway is incorrect.
For each of these problems, there is generally an easy solution. To determine which of the errors specifically applies to you or if there is another error preventing network connectivity, you can use the IP utilities listed in Table 2.4.
98
Chapter 2: Installing Windows Vista
TABLE 2.4
IP Utilities
Utility
Command
Usage
Packet InterNet Groper (Ping)
ping
Uses an echo command to establish whether packets can be routed at the Network layer on a network.
File Transfer Protocol
ftp
Uploads/downloads files on a network. The ftp command helps you determine whether Application layer functions can work on the network.
Telnet
telnet
Establishes a character-based session with a Telnet server across a network. The telnet command helps you determine whether Session layer functions can work on a network.
Line printer daemon
lpr
Executes a print job on a network printer.
Ipconfig
ipconfig
Shows the IP configuration of network adapters installed in a computer. From the results of this command, you can determine whether you have incorrectly addressed the adapter or the default gateway or whether the adapter was unable to obtain an address from the DHCP server.
Name Server Lookup
nslookup
Checks DNS entries.
Netstat
netstat
Displays Transmission Control Protocol/Internet Protocol (TCP/IP) connections and protocol statistics. To find all the applicable switches, type netstat /? at the command prompt, as shown in Figure 2.17.
Nbtstat
nbtstat
Similar to netstat, except that it resolves NetBIOS names to IP addresses. To find all applicable command switches, type nbtstat /? at a command prompt.
Trace Route
tracert
Shows all the routing hops that a packet takes to reach a destination on a network.
FIGURE 2.17 The netstat command with switches is used for troubleshooting network connectivity.
99
Troubleshooting Windows Vista Installation Issues
If everything physically checks out with your computer and you are able to install and boot the computer but cannot connect to the network, you should determine whether the adapter is working and then review your network adapter configuration settings. Step by Step 2.9 shows you how to determine whether the adapter is functioning.
STEP BY STEP 2.9 Checking Network Adapter Settings 1. Click Start, right-click Computer, and select Properties. 2. On the Computer Name, Domain, and Workgroup Settings section of the System applet shown in Figure 2.18, make certain that the name is unique for the network and that the workgroup or domain name is spelled correctly.
The System applet enables you to verify computer name, domain, and workgroup settings.
FIGURE 2.18
3. On the left side of the applet under Tasks, select Device Manager. 4. On the User Account Control message box that appears, click Continue. 5. Expand the Network Adapters section, as shown in Figure 2.19. 6. Right-click the network adapter and select Properties. The Properties dialog box is shown in Figure 2.20. 7. Ensure that the General tab states that This Device Is Working Properly. 8. Click the Advanced tab to check the adapter’s configuration.
100
Chapter 2: Installing Windows Vista
FIGURE 2.19
Device Manager displays the network
adapter.
The network adapter’s Properties dialog box provides device information.
FIGURE 2.20
9. Click the Driver tab to determine whether you are using the current/latest driver for the adapter. You can also use the Update Driver button to install a newer driver or the Roll Back Driver button to revert to an older driver version. 10. On the Driver tab, ensure that the second command button from the bottom reads Disable. If it reads Enable, as shown in Figure 2.21, the adapter is disabled; click this button to enable it.
101
Troubleshooting Windows Vista Installation Issues
The Driver tab informs you whether the adapter is disabled.
FIGURE 2.21
11. Click the Resources tab to see whether there are any hardware conflicts to resolve. 12. Click the Power Management tab, if available, to see whether Power Management has been configured to turn the device off. 13. Close the Properties dialog box and Device Manager. 14. Click Start, right-click Network, and select Properties to display the Network and Sharing Center. If the network adapter is not functioning, the diagram at the top of this page displays a disconnected symbol in the form of a red “X”. 15. On the left side of the Network and Sharing Center, click Manage Network Connections. This brings up the Network Connections dialog box showing your local area connection. 16. Right-click the connection and select Properties and then click Continue in the User Account Control message box that appears. You should see a driver in the Connect Using text box. You should also see the following protocols listed in the This Connection Uses the Following Items list: . Client for Microsoft Networks or alternate client if connecting to a different type of network . Internet Protocol Version 4 (TCP/IP) . Internet Protocol Version 6 (TCP/IP) . Other network protocols 17. If you have determined that there is a TCP/IP problem from the results of running an ipconfig command, select the Internet Protocol Version 4 (TCP/IP) option and then click the Properties button. The Internet Protocol Version 4 (TCP/IPv4) Properties dialog box opens, as shown in Figure 2.22. You can configure the IP address, subnet mask, and default gateway.
102
Chapter 2: Installing Windows Vista
FIGURE 2.22
The Internet Protocol (TCP/IP) Properties dialog box shows how the network adapter’s IP address
is configured.
Advanced Startup Sometimes you can install the Windows Vista operating system but cannot get the computer to boot normally. You can use options in the Advanced Boot Options Menu by pressing F8 during the initial boot sequence. Use the Safe Mode option to load the minimum necessary operating system drivers and then continue to troubleshoot the problem by making configuration changes as appropriate. You can also select Safe Mode with Networking to access network or Internet resources. Another useful option is Enable Boot Logging. Boot logging stores information about drivers that initialize upon startup in the %systemroot% directory in a file named Ntbtlog.txt. You can identify incorrect, missing, or possibly corrupted drivers and replace them as necessary. Chapter 4, “Configuring and Troubleshooting Post-Installation System Settings,” discusses advanced startup and recovery options in more detail.
Refer to Compatibility The previous sections referred several times to checking the compatibility of your hardware, BIOS, and drivers. This is probably the main issue that affects a new installation of Windows Vista. Compatibility with Windows Vista means that Microsoft supports the driver or the device. If you have hardware that is not listed in the Windows Logo Program for Hardware, even if Windows Vista installs and appears to work correctly, Microsoft will not provide any technical support in the event of an error.
103
Troubleshooting Windows Vista Installation Issues
TIP Check your hardware first When you have an installation failure, check hardware compatibility first.
Application compatibility is another significant concern. Because many unattended installations of Windows Vista automatically incorporate applications, you can encounter errors that are caused by the applications rather than the operating system. To reduce application errors significantly, you should prepare in advance as follows: . Inventory the applications on the network. . Investigate the compatibility of the applications with Microsoft and the manufacturers. . Test the applications. . Resolve application compatibility issues and incorporate the resolutions in the installa-
tion process. . Test hotfixes, service packs, and application updates. . Incorporate hotfixes, service packs, and application updates into the installation
process. . Create standard software images so that all users have identical application
installations.
Strip the PC Back when we first became involved with computers, having a hard drive larger than 10MB was a big deal. The hardware for a standard PC was limited to a VGA monitor, simple CPU, hard drive, 5-1/4" floppy disk drive, keyboard, and mouse. Installing the operating system software on one of those babies was a matter of knowing each device’s resources and manually setting pins on adapters that you added before you started feeding installation floppy disks into the computer for a two-hour stretch, while manually selecting or inputting the device drivers for your computer into the Setup program. If you encountered an error, you checked your resources and pin settings and then started over again because there was no such thing as advanced startup or repair options. How times have changed! With today’s hardware automatically detected by Plug and Play, there is much less hardware tweaking needed. You’d think that would make installation easier, but, unfortunately, that’s not always the case. There are currently hundreds of different types of devices that can be attached to various brands of computers. Thousands of different configurations and millions of lines of operating system code are supposed to recognize every possible hardware combination and make it all work together seamlessly with whichever version of device driver it happens to have available to it. (continues)
104
Chapter 2: Installing Windows Vista (continued)
The fact is that errors abound, and the methods of resolving or working around them to have a functioning PC are convoluted at best. So the best way to resolve a problem with the operating system installation is to strip the PC. Remove every unnecessary hardware component, including detaching the printer, and take out any extra network adapters. This can greatly help you successfully install Windows Vista on a PC. After you have Vista installed and running, you can then add each component back to the computer, one at a time, rebooting and testing the computer between each device installation. If the first hardware component checks out okay, add a second, retest, and then go on to the third. Continue this for all devices. At some point, you will either discover the errant component or be able to attribute the error to a conflict that no longer exists.
Troubleshooting an Unattended Installation An unattended installation is one in which a computer installs Windows Vista without a person sitting at the console watching the progress, as covered earlier in this chapter. As already discussed, this process uses an answer file and can be automated to large numbers of computers using Sysprep, WDS, or third-party imaging solutions. A standard image of Windows Vista reduces implementation and maintenance costs. The implementation savings are obvious because you do not need to have a network administrator watch each installation and input information, which takes a lot of time. Ongoing maintenance costs of a standard configuration are less expensive because network administrators are thoroughly familiar with the configuration of the computer they are helping an end-user troubleshoot, saving time and effort. Because the method of setup for an unattended installation is different from an attended installation, you can expect that some of the problems you encounter are also different. You can encounter many of the same problems that you may have had in an attended installation, but you will also have unique problems associated with an unattended method of installation.
Problems with Answer Files You can use answer files to automate a Windows Vista installation, whether the computer is installed from a DVD or across a network. Nearly always, answer files are used with network installations. The fact that you can use an answer file with a DVD installation can help you troubleshoot a computer that has difficulty connecting to the network.
EXAM ALERT Answer files The exam might refer to answer files as a script, a text file, an answer file, or simply unattend.xml. Read the question and understand the context to be sure that the file being described is the same as you expected.
105
Troubleshooting Windows Vista Installation Issues
Boot Disks Because answer files are mainly used with network installations, the first dilemma usually stumbled into is booting to the network and accessing the distribution server files. You can use floppy boot disks, or you can execute the installation from a command line on a computer while it is running a different operating system. The only requirement you have of any existing operating system is that it has access to the network and that you are logged in with a user ID that has permissions to read the i386 folder structure on the distribution server. If you use a boot disk to access the network, you need to have the correct network interface card (NIC) driver for the computer already installed on the floppy disk. When you try to boot a computer with a boot disk that has drivers for one type of NIC while the computer has a different NIC, you will not be able to access the network. Depending on the computer’s configuration, you might not even see an error on the screen. Preparation When you are conducting a clean installation of Windows Vista, you are likely to have better results if you use a boot disk because you can automate preparation tasks such as creating a disk partition and formatting it. If you are upgrading a computer, you should execute the installation only from within the existing operating system. Chapter 3 discusses upgrades. Switches The Setup.exe program used for installing Vista utilizes a variety of switches to control how the Setup program runs. Table 2.5 displays the syntax used for Setup.exe switches. An incorrectly used switch can cause some of the errors you can encounter during an unattended installation. For example, you might need to specify an answer file for unattended installation. If you do not supply the proper path to the answer file, Setup will be unable to locate it and will ask for information otherwise included in the answer file. TABLE 2.5
Syntax for Setup.exe
Switch
Results
/1394debug:
Enables kernel debugging across an IEEE 1394 port.
/debug<port> [/baudrate:]
Enables kernel debugging across a COM port.
/emsport:[<port>| usebiossettings | off |[/emsbaudrate:]
Enables or disables Emergency Management Services (EMS) and specifies the baud rate to use while transferring data. Used for x86 systems only.
/noreboot
Tells Setup.exe not to reboot after copying files. Subsequent reboots are not suppressed.
/m:
Tells Setup.exe where to find replacement files to be copied. (continues)
106
Chapter 2: Installing Windows Vista
TABLE 2.5 Continued Switch
Results
/tempdrive:
Tells Setup.exe to put temporary Setup files on the root of the specified drive.
/unattend:[]
Specifies the answer file for the unattended installation.
/usbdebug:[]
Enables kernel debugging across a USB 2.0 port.
Answer File Specifications The answer file that you use is an XML file that’s structured considerably differently from those used with previous Windows installations. Like its predecessors, it contains headings, parameters, and values. If you don’t include a heading, a parameter, and a value for a specific item that you want to install a certain way, Windows Vista uses the default installation values for that item. While the SIM program creates valid XML coding, it is possible to edit the answer file using a text editor such as Notepad. Typos, incorrect headings, incorrect parameter names, or incorrect values cause errors or unexpected results during installation. Spelling counts! A spelling error in an answer file usually does not cause a Windows Vista installation to fail unless the error is specifically related to a driver. Most people use SIM to create an answer file. When SIM creates the file, it does not always customize the features that you want to customize. Therefore, you likely must edit the file directly. The best way to troubleshoot your answer file is to make certain that you save your original answer file created by SIM and save each subsequent version of the answer file. By doing this and by testing the answer file with each individual customization as you make them, you will be able to pinpoint the specific problem with the file.
Problems with Sysprep Installations The System Preparation Tool, or Sysprep, creates a snapshot of a Windows Vista workstation and strips out the unique information for that workstation so that the image can be stamped on another. Sysprep not only can prepare an image of Windows Vista, but it can include unusual settings, applications, special application configurations, and even additional files. After preparing the image with Sysprep, you can then use a third-party utility to transfer the image to a target computer. The process is quick and easy to repeat. This is called cloning and can be either the best thing since sliced bread to your company or its worst nightmare. The problem with cloning is that software image information is often intertwined with hardware information in odd places. When you attempt to clone a source computer onto a target computer that is not identical to the source, the image might function perfectly well, but it also might have results in a few configuration errors or even fail to start. It depends on what is different between the source and target computers and whether Sysprep strips out that particular information or the target computer has true Plug and Play devices.
107
Troubleshooting Windows Vista Installation Issues
EXAM ALERT Cloning The exam includes some questions about cloning to point out the need to generate cloned images for each different type of computer on the network.
Another issue you might experience with Sysprep is the version of the tool that you are using. Microsoft has been known in the past to include updated deployment tools with service packs and will likely continue to do so with Windows Vista and Windows Server 2008. When you create a source location that incorporates a service pack, you should also use the version of Sysprep that comes with that same service pack.
NOTE Sysprep and domains Sysprep does not work on a computer that is a member of a domain. It works only on a computer that is a member of a workgroup. If you run Sysprep on a computer that has already joined a domain, Sysprep removes it from the domain before preparing the image.
If you try to copy encrypted files using the Encrypting File System (EFS) on an NTFSformatted partition as part of your Sysprep image, you will fail because the Sysprep process makes encrypted files unreadable. The only way to encrypt the files is to execute the encrypting command after the image has been transferred to the target computer. Whenever you use Sysprep, you should ensure that the computer functions properly. Step by Step 2.10 leads you through some basic computer functions.
STEP BY STEP 2.10 Checking the Functionality of a Computer After Using Sysprep 1. Boot the computer and log on as a user. 2. Access the local hard drive and open a file. 3. Open all critical applications. 4. Run chkdsk C: /r to verify that the hard drive has no errors. 5. Click Start, Network, and view other machines located on the network. 6. Print a file to a network printer. 7. Send an e-mail. 8. Look through Event Viewer logs for errors. 9. Review the Setup Error log.
108
Chapter 2: Installing Windows Vista
Use cloning when you have hundreds of computers that have identical hardware and need identical software and operating system configurations. If you have a large number of different hardware configurations and/or software and operating system configurations, you should consider using answer files instead.
Troubleshooting Failed Installations A network administrator’s best friend in a crisis is an error log file. This is also true for Windows Vista installation failures. While installing, Windows Vista Setup generates log files that point you in the right direction when you need to troubleshoot. The Action log (Setupact.log) reports which actions Setup performed in chronological order. This log indicates which files were copied and which were deleted. It records whether any external programs are run and shows where errors have occurred. Setup creates an Error log (Setuperr.log) to record only the errors. Given that the Action log is extremely large, this log makes it easier to review errors and their severity levels. Although you might see some errors in the Action log, you probably won’t see them in the Error log unless they are fairly severe. For example, the Action log reports an error if Setup cannot delete a file because the file was already moved or deleted, but that error does not appear in the Error log. Other logs created during Setup include . %systemroot%\DtcInstall.log—Records errors generated by the Microsoft
Distributed Transaction Coordinator (MSDTC). . %systemroot%\setupact.log—Records modifications performed on the system dur-
ing Setup. . %systemroot%\setupapi.log—Records data for each time an INF file is called and
implemented. Check this file for device driver installation information. . %systemroot%\setuperr.log—Records errors generated by hardware or driver issues
during Windows installation. . %systemroot%\WindowsUpdate.log—Records information about transactions per-
formed by Windows Update, including updates downloaded during installation. . %systemroot%\debug\netsetup.log—Reports the results of a computer attempting to
join a workgroup or domain. Check this file if you have trouble joining a domain. . %systemroot%\security\logs\scesetup.log—Logs the security settings for the
computer.
109
Troubleshooting Windows Vista Installation Issues
Stop Errors or Blue Screen of Death (BSOD) If you receive a Stop error that appears on the Microsoft blue screen (commonly known as the Blue Screen of Death), you have encountered a serious error with the installation. Stop errors have some instructions to follow on the screen. Not only should you follow the instructions, but also you should check the compatibility of the hardware before attempting to install again. Step by Step 2.11 shows you how to resolve a Stop error.
TIP Stop codes The code and text associated with a Stop error are a great help in troubleshooting. For example, an error could be STOP 0X00000D1 (DRIVER IRQL NOT LESS OR EQUAL). You can search for this code number and text on Microsoft’s website for an explanation of the cause and possible ways to fix the problem.
STEP BY STEP 2.11 Resolving a BSOD 1. Shut down the computer. 2. Remove all new hardware devices. 3. Start up the computer and remove the associated drivers. Shut down. 4. Install one of the removed hardware devices. Boot the computer and install the appropriate driver. Reboot. If no BSOD occurs, continue adding devices, one at a time. 5. Open Device Manager and look for devices with a yellow exclamation point or red X. Run hardware diagnostic software. 6. Check for hardware compatibility and BIOS compatibility. Check to see whether you have the latest available version of the BIOS. 7. Check the System log in Event Viewer for error messages. These may lead to a driver that is causing the Stop error. 8. Visit http://www.microsoft.com and perform a search on the Microsoft Knowledge Base for the Stop error number (for example, Stop: 0x0000000A). Follow the instructions given in the Knowledge Base article(s) for diagnosing and repairing the error. 9. Disable BIOS options such as caching or shadowing memory. 10. If the Stop error specifies a particular driver, disable the driver and then download and update the driver to the latest version available from the manufacturer.
110
Chapter 2: Installing Windows Vista 11. Video drivers are commonly the cause of a BSOD. Therefore, switch to the Windows Vista Lowresolution video (640x480) driver (available from the Advanced Startup Options menu) and then contact the manufacturer for updated video drivers. 12. If using a Small Computer System Interface (SCSI) adapter and device, ensure that the SCSI chain is properly terminated and that there are no conflicts with the SCSI IDs.
Startup Repair If Vista fails to start and either hangs or displays the BSOD, the Vista installation DVD-ROM provides a Startup Repair option that can assist you in repairing the problem. This tool is a diagnostics-based troubleshooting utility that walks you through recovery options when your computer cannot boot normally. It performs several diagnostics tests, including looking at the log files, to determine the cause of the startup failure, and it then attempts to repair the problem. The following are several types of problems Startup Repair can attempt to correct: . Incompatible drivers—Startup Repair can use Device Driver Rollback or System Restore
to restore the drivers to a previous condition. . Missing or corrupted boot configuration—Startup Repair can rebuild the computer’s boot
configuration including all operating systems it finds on the machine. It then prompts the user to select the operating system he wants to start. . Corrupted disk metadata—Startup Repair can repair problems such as a corrupted mas-
ter boot record (MBR), problems in the boot sector, or a corrupted partition table. . Manual repair tools—Tools are available to assist the user in manually troubleshooting
startup problems. After Startup Repair has corrected the problem, it reboots the computer normally and notifies the user of the problem it has repaired. It includes an event in the event log that describes the repairs it has performed. In addition, you can install repair tools on your computer so that the computer will automatically fail over into Startup Repair should it become unbootable at a later date. For additional information on Startup Repair, refer to the Vista Help and Support Center.
Stopped Installation Windows Vista might stop in the middle of an installation. This can happen because of a hardware conflict, incompatibility, or unsuitable configuration. To resolve the conflict, you should follow the usual procedure of removing all unnecessary devices from the computer and attempting installation again. After Windows Vista is installed, you can add one device at a
111
Installing and Configuring Windows Vista Drivers
time back to the computer, load the latest manufacturer’s drivers, and boot to see whether the computer functions properly. It is important that you add only one device at a time so that you can discover which device (or devices) might have been the cause of the problem.
Installing and Configuring Windows Vista Drivers Objective:
Install and configure Windows Vista drivers. Drivers are software utilities that enable hardware components to communicate with the operating system. All components that you see in Device Manager, including disk drives, display adapters, network interface cards, removable media (floppy, CD-ROM, DVD-ROM, and so on) drives, keyboards, mice, sound cards, USB controllers, and so on, utilize drivers for this purpose. External components such as printers, scanners, and so on, also utilize drivers. With each new version of the operating system, it becomes necessary for hardware manufacturers to produce new drivers. Drivers written for older operating systems such as Windows 2000 and Windows XP might work with Vista but can result in reduced device functionality; or they might not work at all. You need to be able to install, configure, and troubleshoot drivers for various components for the 70-620 exam and for real-world computer support tasks.
Managing and Troubleshooting Drivers and Driver Signing Driver signing is a process that Microsoft follows to validate files that a third-party manufacturer creates for use in a Windows Vista computer. A manufacturer submits its drivers to Microsoft, and after Microsoft completes a thorough quality assurance testing process, Microsoft signs the files digitally. Driver signing is an extra assurance of the quality of the software installed on the PC. Microsoft has initiated the following new driver signing requirements for Windows Vista: . Standard (non-administrative) users can install only drivers that have been signed by
either a Windows publisher or trusted publisher. . Standard users cannot install unsigned drivers or drivers that have been signed by an
untrusted publisher; you cannot modify this policy in Vista.
112
Chapter 2: Installing Windows Vista . Administrative users can install drivers that have been signed by an untrusted publisher,
and they can also add the publisher’s certificate to the trusted certificates store, thereby enabling standard users to install drivers signed by this publisher. . If drivers are unsigned or have been altered, administrators are warned. They can pro-
ceed in a manner similar to how they would if the drivers were from an untrusted publisher. If you install a device, Windows Vista looks for the driver signature as a part of System File Protection. When it fails to find one, Vista notifies you that the drivers are not signed and prompts you to continue or stop the installation, provided you have administrative privileges. Otherwise, the installation attempt fails. If you continue with the installation, Vista automatically creates a restore point, which facilitates returning to the previous configuration. Restore points are discussed in more depth in Chapter 8, “Maintaining and Optimizing Systems That Run Windows Vista.” Dynamic-link libraries (DLLs) and other files are often shared by programs. Sometimes a program overwrites files that were originally installed by a digitally signed driver. If a device behaves oddly, you might want to verify that its driver still has the signature. You can check to validate the driver by looking in Device Manager. Double-click the device and click the Driver tab. You should see the statement: Digital Signer: Microsoft Windows Publisher. You can check individual files further by clicking the Driver Details button. Files that are signed have an icon of a box with a green check mark, which appears to the left of the name (see Figure 2.23). Files that have not been digitally signed do not have a green check mark icon next to the filename.
Each digitally signed file is displayed with an icon for easy identification. Unsigned files are indicated as such.
FIGURE 2.23
113
Installing and Configuring Windows Vista Drivers
If you want to verify device drivers throughout the system, you can run the sigverif application. To do so, click Start, Run. Type sigverif in the Open text box and press Enter. The File Signature Verification program starts. Click the Advanced button and verify that sigverif will log the results and save them to a file. Click OK and then click Start. After the program has completed its check, the program displays any files that were not signed in a window, plus you can see the results in the Sigverif.txt file. If the program does not detect any unsigned files, it displays a message box with the message, “Your files have been scanned and verified as digitally signed.”
TIP Enabling the Run command In Vista, the Run command does not appear on the Start menu by default. To enable this command, right-click the Start button and choose Properties. On the Taskbar and Start Menu Properties dialog box that appears, ensure that Start menu is selected and click Customize. On the Customize Start Menu dialog box, scroll down and select the Run command check box. Then click OK twice to close the dialog boxes.
Another method of viewing which drivers are signed is to open the System Information utility by clicking Start, Run, typing msinfo32, and pressing Enter. On the left side of the System Information dialog box, expand the Software Environment node. Click to select Signed Drivers. This displays a comprehensive list of all drivers, their signed status, date, manufacturer, and more. Unsigned drivers might not cause a problem. If you are having problems with a device that has an unsigned driver, you should disable the driver. If you are having unspecified problems, such as the computer does not go into Sleep mode, you should determine which devices have unsigned drivers, disable them one at a time, and test to see whether the problem is resolved. To disable an unsigned driver that has already been installed, you should disable the device that uses the driver, uninstall the driver, or rename the driver files.
TIP When in doubt, check the system files The System File Checker, which is executed from the command line with sfc.exe, can check the digital signature of system protected files. With other uses, such as repopulating the DLLCACHE folder and replacing system files that are missing or incorrect, sfc.exe can be executed from a batch program or script. This program has several options; run sfc.exe /? to view information on them. Note that in Vista, you must run this command as an administrator; right-click the Command Prompt option, select Run as administrator, and then click Continue in the User Account Control dialog box.
114
Chapter 2: Installing Windows Vista
Using Windows Vista Rollback If you update an existing driver to a new version and then you experience system problems, you should roll back the driver to the previous version. In versions of Windows prior to Windows XP, this was almost impossible to do. As was the case in Windows XP, Windows Vista maintains a copy of the previous driver each time a new one is updated. If, at any time, you want to restore the previous version, you simply need to roll back the driver. To do this, open Device Manager and double-click the device to open its Properties dialog box. Click the Driver tab and then click the Rollback Driver button. When prompted with the question Are You Sure You Would Like to Roll Back to the Previous Driver?, click Yes. After the previous version is restored, click the Close button. You can roll back all device drivers except for printers. You will receive a User Account Control dialog box before either updating a driver or rolling it back to a previous version.
115
Summary
Summary Microsoft has published two levels of hardware requirements that determine whether an existing computer can run Vista: minimum supported requirements that determine whether the computer can run Vista at all and premium-ready requirements that determine whether the computer is able to run Vista with a complete user experience. You took a look at software, network, and domain considerations that come into play before you install Windows Vista. In this chapter, you proceeded through a clean, manual installation of Windows Vista on a computer without a previous operating system. You then took a look at the use of Windows SIM to create an answer file, which supplies answers to the questions asked during a manual installation so that the installation can proceed in an unattended fashion. Sysprep allows you to prepare an image of a Windows Vista computer that is configured with applications, service packs, and settings. You can use a third-party imaging application to clone the image to new computers. You can also use WDS to deploy images of Windows Vista to multiple computers in a domain environment. After you completed installations of Windows Vista, you looked at some procedures you can utilize to troubleshoot installation problems. Troubleshooting a Windows Vista installation requires you to understand the process that installation follows. By pinpointing the failure’s cause, you can then define a solution and carry it out. The common problems that take place include . Media errors . Insufficient hard disk space . An unrecognized or failed DVD-ROM drive . Network access errors . Hardware incompatibility
Unattended installations can fail because of problems with the switches used with Setup.exe, as well as issues within answer files. Sysprep can experience problems if source and target computers vary significantly. Microsoft applies a digital signature to third-party manufacturers’ drivers when those manufacturers submit drivers that pass a rigorous quality assurance testing process. Standard users can install only those drivers that have been signed by either Microsoft or a trusted publisher; administrators are warned if they attempt to install an unsigned driver. Administrators can roll back a driver to a previous version in the device’s Properties dialog box Driver tab.
116
Chapter 2: Installing Windows Vista
Key Terms . application compatibility . deployment . Windows Logo Program . Setup.exe . answer file . Windows Deployment Services (WDS) . System Image Manager (SIM) . Windows Preinstallation Environment (Windows PE) . System Preparation Tool (Sysprep) . Basic Input/Output System (BIOS) . cloning . device driver . driver signing . Sigverif.exe . Stop error . Transmission Control Protocol/Internet Protocol (TCP/IP)
Apply Your Knowledge You have seen several methods you can use to install Windows Vista on a computer with no previous operating system. You need to be familiar with different types of installation so that you can select the most appropriate method. In addition, you need to be familiar with the installation process so that you can troubleshoot installation problems. You can be better prepared to handle errors when they occur by installing the operating system on as many different hardware combinations as you can find. You can practice unattended installations with just a single server and a single computer client. To perform these exercises, you should have two or three computers available. You should not have any valuable data stored on any of these computers.
117
Apply Your Knowledge
Exercises 2.1 Manually Installing Windows Vista Across a Network This exercise is intended to familiarize you with the process of installing Windows Vista. Because unattended installations are typically installed across a network, this will familiarize you with the processes you may need to use if you must manually troubleshoot a failed installation. Estimated time: 90 minutes, depending on the speed and capabilities of your computer’s hardware 1. On an available server, create a share named VISTASETUP. 2. Copy the files from the Windows Vista DVD-ROM into the newly created share. 3. Create a boot disk that is capable of accessing the network. 4. Use the boot disk to start the computer on which you will be installing Windows Vista. 5. Connect to the VISTASETUP share (for example, type net use z: \\server\vistasetup). 6. Type setup.exe at the z: prompt and press Enter. 7. Follow through the installation as described in the “Performing an Attended Installation” section of this chapter. The challenge with many networks is the centralization of servers and the increasingly lengthy distances between clients and their servers. What would happen if you were limited in bandwidth between your client computer and the server that contained the Vista Setup files? What installation process would you recommend for a site that connected to the rest of the corporate network through a virtual private network (VPN) connection across the Internet?
2.2 Deploying Windows Vista in a Heterogeneous Lab Environment Because failed installations cannot be guaranteed, you can perform the following exercise without using computers. However, if you have the opportunity to install Windows Vista on a computer that has a device that is not listed in the Windows Logo Program, or a non-compliant BIOS, you may be able to recreate a Stop error and troubleshoot it. As a network engineer, you have been hired to create and execute a Windows Vista deployment nationwide. You have a lab environment with examples of all the hardware that you will be installing. There are five different brands of computers and seven types of printers and scanners that may be connected to them. Two of the locations use a wireless LAN, one location uses Token Ring, and the rest use Ethernet 100. You have tested the following installation methods and results for the 11 test computer combinations: . Attended—Executed 11 trials; successful on 10 computers and failed on 1. . Answer files—Required a minimum of 11 answer files; successful installation on 10 computers and failed on 1.
118
Chapter 2: Installing Windows Vista . Sysprep—Required a minimum of seven images; successful on eight computers and failed on three. . WDS—Used existing Windows Server 2003 computer with WDS installed. Required a minimum of 7 images; successful on 0 computers and failed on 11. Estimated Time: 15 minutes. 1. Determine which installation method should be used. 2. The project sponsor has requested that you implement WDS. What might be the problem causing the test results? Answers: 1. Given this information, you should probably use the answer file unattended installation process. It had the same type of failure rate as attended installations, and it will save a great deal of time over an attended installation. 2. Although the information given in this exercise question does not provide much to go on, the fact that there were no successful WDS installations leads you to think that the test results were caused by a problem with the WDS server. It is possible that the Windows Server 2003 computer does not have Release 2 (R2) or Service Pack 2 (SP2) installed, and this might have interfered with performing a successful installation of Windows Vista.
Exam Questions 1. You are the network administrator for a large telecommunications company. You have been asked to deploy Windows Vista throughout the organization. You have seven domains and a NetWare network. To meet the corporate security policy, you must have all computers join a domain and authenticate to Active Directory services. Your boss has asked you to deploy Windows Vista Home Basic to save on the cost of licensing. He also has asked that all computers be installed unattended from a currently unused NetWare server. Given only the listed options, how do you proceed?
❍ A. Manually install Windows Vista Home Basic throughout the organization. ❍ B. Manually install Windows Vista Business throughout the organization. ❍ C. Use WDS to install Windows Vista Home Basic throughout the organization. ❍ D. Use Sysprep to install Windows Vista Home Basic throughout the organization.
119
Apply Your Knowledge 2. You are the network administrator for Boxes Corp., a box manufacturer. The network consists of 4,000 Windows 2000 and Windows XP computers scattered across several sites, each with its own Windows Server 2003 domain controller. The Active Directory is a single domain in a single forest. You have been tasked with deploying Windows Vista Business to a shipment of new computers that will replace the older Windows 2000 computers. To test the process, you have decided to install a new computer by running the Windows Vista Business installation process across the network. Put the steps you should follow in the correct order.
❍ A. Run Setup.exe. ❍ B. Boot the computer with a network boot disk. ❍ C. Check the client computer’s hardware and BIOS for compatibility. ❍ D. Create a network share and copy the Vista Business Setup files to it. ❍
E. Install Windows Vista Business.
❍
F. Install a server.
❍ G. Connect to the server’s network share containing the Vista Business Setup files. 3. You are installing a stand-alone computer in a highly secure facility. This computer is not allowed to be connected to a network or to a modem to meet the organization’s security policy. You are given only off-the-shelf media to install Windows Vista. How do you handle WPA?
❍ A. You install Windows Vista Home Basic because WPA can be avoided in the off-theshelf media.
❍ B. You install Windows Vista Business because WPA can be avoided in the off-the-shelf media.
❍ C. You manually call the Microsoft Product Activation Center. ❍ D. You cannot install the computer because WPA is unavoidable with off-the-shelf media. 4. Judy has run System Image Manager to create an answer file that she intends to distribute to users on a floppy disk that will be used for installing Windows Vista Business from a CD-ROM. She needs to ensure that the answer file has been given the proper name. Which name should this file have?
❍ A.
Unattend.txt
❍ B.
Unattend.xml
❍ C.
Winnt.sif
❍ D.
Reminst.sif
120
Chapter 2: Installing Windows Vista 5. Harry is the network administrator for a company that operates an Active Directory domain named examcram.com. Besides the domain, there is a workgroup to which computers used by developers belong. Harry receives five new computers to be used by developers and uses an answer file to install Windows Vista Business on these computers. Because of an error in the answer file, the new computers were joined to the domain rather than the workgroup. How can Harry correct this error with the least amount of administrative effort?
❍ A. Create a startup script that specifies the name of the workgroup. At each computer, configure a local Group Policy object (GPO) that applies this script. Then restart each computer to apply the GPO.
❍ B. Place all the computers in an organizational unit (OU) and configure a GPO that joins the computers to the workgroup. Then restart each computer to apply the GPO.
❍ C. Correct the error in the answer file and reinstall Windows Vista Business on each computer.
❍ D. Manually reconfigure each computer to join the workgroup. 6. You are the network administrator for a 30-user network. All your computers use the same hardware. You choose to implement Sysprep and clone the computers with Windows Vista Ultimate. You test the process on a computer, and you receive a Stop error. Which of the following should you do next?
❍ A. Upgrade the Sysprep server with the latest service pack. ❍ B. Use Notepad to add hardware information to the unattend.xml file. ❍ C. Review the hardware compatibility with Windows Vista Ultimate. ❍ D. Replace the network adapter. 7. Which of the following logs should you use to troubleshoot a computer that won’t join a domain?
❍ A.
Setupapi.log
❍ B.
Setuperr.log
❍ C.
Scesetup.log
❍ D.
Setupact.log
❍
E. Netsetup.log
121
Apply Your Knowledge 8. Mark is the network administrator for his company. He has been tasked with rolling out Windows Vista to the 40 laptops for the sales team. After the operating system installs, one of the computers cannot join the domain. Which of the following should Mark do to begin troubleshooting the problem? (Choose all that apply.)
❍ A. Reboot Windows Vista into Safe mode and view the device settings. ❍ B. Open the setupapi.log file to see whether there are any errors applicable to networking.
❍ C. Check the network adapter to see whether it is functioning. ❍ D. Open a command prompt and enter ipconfig /all. 9. Nancy uses a computer with Windows 2000 Professional, and decides to install Windows Vista Business on a separate partition. She performs a clean installation and reboots her computer. The computer displays a Stop error, and the computer stops responding. She receives the same result when she attempts to start the computer in Safe mode. What should she do?
❍ A. Run Msconfig and select the Selective Startup option. Then clear the Load Startup Items check box, click OK, and reboot.
❍ B. Use the Vista DVD to reboot the computer and then run the Check Compatibility Online tool.
❍ C. Uninstall Windows Vista and upgrade Windows 2000 Professional to Windows XP Professional.
❍ D. Use the Vista DVD to reboot the computer and then run the Startup Repair tool.
122
Chapter 2: Installing Windows Vista 10. You are the network administrator for GLAM Corp. Several graphic designers have reported problems with their computers. The graphics design department had recently added pen tablet pointing devices to each of their computers so that the graphic designers can input designs directly into a collaborative application that can function over the wide area network. You want to find out whether the device driver for PEN is signed. How do you discover this information? (Choose all that apply.)
❍ A. Click Start, Run, type msinfo32 signed PEN, and press Enter. ❍ B. Click Start, Run, type msconfig signed, and press Enter. ❍ C. Click Start, Run, type msinfo32, and press Enter. Open the Signed Drivers node below Software Environment and look for the drivers for the pen tablet.
❍ D. Click Start, Run, type msconfig, and press Enter. Click the Services tab. Navigate to the location for the pen tablet drivers.
❍
E. From the System and Maintenance category view in Control Panel, select System. From the left pane of the System applet, select the Device Manager link. Double-click the pen tablet device icon below the Mouse category. Click the Driver tab.
❍
F. From the System and Maintenance category view in Control Panel, select View hardware and devices under the Device Manager heading. Double-click the pen tablet device icon below the Mouse category. Click the Driver tab.
❍ G. From the Hardware and Sound category in Control Panel, select Scanners and Cameras. Click the Hardware tab. Select the pen tablet. Click the Troubleshoot button. 11. What should you do if you discover that you are using a device with an unsigned driver after experiencing intermittent computer problems?
❍ A. Obtain a new device driver from the manufacturer and on the Driver tab of the device’s Properties dialog box in Device Manager, click Driver Details.
❍ B. Obtain a new device driver from the manufacturer and on the Driver tab of the device’s Properties dialog box in Device Manager, click Update Driver.
❍ C. Obtain a new device driver from the manufacturer and on the Driver tab of the device’s Properties dialog box in Device Manager, click Roll Back Driver.
❍ D. Obtain a new device driver from the manufacturer and on the Driver tab of the device’s Properties dialog box in Device Manager, click Uninstall Driver.
Answers to Exam Questions 1. B. Windows Vista Business is the only version that can authenticate to Active Directory and join a domain. Given the information supplied in this question, you cannot proceed as your boss has asked, and you should inform her that you need to install Windows Vista Business. Even though this is a manual installation, it is the only one that will meet the organization’s security policy.
123
Apply Your Knowledge Answers A, C, and D are incorrect because Windows Vista Home Basic cannot join a domain. Also Windows Vista Home Basic or Vista Home Premium cannot be installed with either WDS or Sysprep. For more information, see the section, “Domain Membership.” 2. The installation steps should be taken in the following order: F. Install a server. D. Create a network share and copy the Vista Business Setup files to it. C. Check the client computer’s hardware and BIOS for compatibility. B. Boot the computer with a network boot disk. G. Connect to the server’s network share containing the Vista Business Setup files. A. Run Setup.exe. E. Install Windows Vista Business. For more information, see the section “Performing an Attended Installation.” 3. C. You will call the Microsoft Product Activation Center and manually enter the product ID code given to you by the center. Answers A, B, and D are incorrect because all off-the-shelf media require WPA, but you can activate the product by calling the product activation center and typing in the correct ID. For more information, see the section, “Product Activation.” 4. B. When you create an answer file that will be included on a floppy disk for users that are installing Windows Vista from a DVD-ROM, you should name the file Unattend.xml. The user should insert this floppy disk after the computer starts to boot from the DVD-ROM. The other files mentioned were used for deploying Windows XP but are no longer used with Vista, so answers A, C, and D are incorrect. For more information, see the section, “Performing an Unattended Installation.” 5. D. Harry needs to manually reconfigure each computer to join the workgroup. He can do this from the Computer Name tab of the System Properties dialog box. It is not possible to configure a GPO, local or otherwise, that removes computers from a domain and joins them to a workgroup, so answers A and B are incorrect. He could correct the error in the answer file and reinstall Windows Vista Business on each computer. However, this takes far more administrative effort, so answer C is incorrect. For more information, see the section, “Performing an Unattended Installation.” 6. C. You should review the hardware compatibility of your PCs with Windows Vista. Stop errors are usually caused by a device or device driver problem. Answer A is incorrect because there is no need for a Sysprep server. Answer B is incorrect because editing the Unattend.xml file is unlikely to resolve the Stop error; furthermore, you can create additional problems by introducing syntax errors into this file. Answer D is incorrect because there was no reason to suspect a problem with the network adapter. For more information, see the section, “Problems with Sysprep Installations.”
124
Chapter 2: Installing Windows Vista 7. E. You would use the Netsetup.log error log to see whether a computer was able to join a domain. Answer A is incorrect because Setupapi.log provides data about INF files that are called during setup. Answer B is incorrect because Setuperr.log shows errors related to hardware or driver issues that occur during setup. Answer C is incorrect because Scesetup.log shows security-related error information. Answer D is incorrect because Setupact.log displays all the actions that Setup performs during installation. For more information, see the section, “Troubleshooting Failed Installations.” 8. C and D. The problem exhibited by the one computer indicates a networking problem. You should check the physical network adapter and the TCP/IP configuration. Answers A and B are incorrect because the device settings are not the problem, and the setupapi.log file is applicable to device driver installation, not networking. For more information, see the section, “Unavailable Network.” 9. D. Nancy should reboot her computer using the Vista DVD-ROM and select the Startup Repair tool. She can reach this option by selecting Install Windows Now, entering the product code (or bypassing it), accepting the license terms, selecting the Custom (Advanced) option, selecting the partition on which she installed Vista, and then selecting Startup Repair. She cannot use Msconfig because she was unable to reach the Vista desktop, so answer A is incorrect. The Check Compatibility Online option checks her computer for the ability to install Vista. It does not repair a problematic installation, so answer B is incorrect. She cannot simply uninstall Vista to revert to Windows 2000 Professional; at any rate, upgrading Windows 2000 Professional to Windows XP Professional does not enable her to repair the Vista installation, so answer C is incorrect. For more information, see the section, “Troubleshooting Failed Installations.” 10. C, E, and F. You can find whether the pen tablet device driver is signed by looking at the pen tablet’s Properties dialog box from within Device Manager. Click the Driver tab to view the current version. You can access Device Manager from the System applet in the System and Maintenance category in Control Panel, or you can also access Device Manager directly from the System and Maintenance category. You can also find whether a particular driver is signed by viewing the System Information utility, which you can start in the Run box by typing msinfo32. Answer A is incorrect because it uses an incorrect command switch. Answers B and D are incorrect because msconfig is the wrong command. Answer G is incorrect because pen tablet point-and-click input devices are not located in the Scanners and Cameras applet. For more information, see the section, “Managing and Troubleshooting Drivers and Driver Signing.” 11. B. If you are using an unsigned driver and experience problems, you can update the driver with a new one from the manufacturer. This is done by opening Device Manager, double-clicking the device icon to open its Properties dialog box, selecting the Driver tab, and then clicking the Update Driver button. When prompted for a location for the new driver, you should click Have Disk. Answer A is incorrect because it does not install the new driver. Answer C is incorrect because it rolls the current driver back to a previous version, if any. Answer D is incorrect because it removes the current driver version rather than install the new one. For more information, see the section, “Managing and Troubleshooting Drivers and Driver Signing.”
125
Suggested Readings and Resources
Suggested Readings and Resources The following are some recommended readings on the subject of Windows Vista installation: 1. Books . McLean, Ian and Orin Thomas. MCTS Self-Paced Training Kit (Exam 70-620):
Configuring Windows Vista Client. Redmond, WA: Microsoft Press. 2007. 2. Course . Microsoft Official Curriculum course 5115, Installing and Configuring the
Windows Vista Operating System. Module 1, Installing Windows Vista. Information available at http://www.microsoft.com/learning/syllabi/en-us/5115aprelim.mspx. 3. Websites . Microsoft. FAQ for Windows Logo Program V. 3.0. http://www.microsoft.com/whdc/
winlogo/VistaLogoFAQ.mspx. . Microsoft. Windows Deployment Services Update Step-by-Step Guide for Windows
Server 2003. http://technet2.microsoft.com/WindowsVista/en/library/9e1971356711-4c20-bfad-fc80fc2151301033.mspx?mfr=true . Microsoft TechNet. Windows Vista Deployment Step-by-Step Guide. http://
technet2.microsoft.com/WindowsVista/en/library/88f80cb7-d44f-47f7-a10de23dd53bc3fa1033.mspx?mfr=true. . Microsoft. Windows Preinstallation Environment Overview. http://www.
microsoft.com/whdc/system/winpreinst/WindowsPE_over.mspx. . Microsoft TechNet. Comparing Windows XP and Windows Vista Deployment
Technologies. http://technet2.microsoft.com/WindowsVista/en/library/2957d7c402c7-4205-afb5-f03434d8f37d1033.mspx. . Microsoft TechNet. Deploying Windows Vista. http://technet.microsoft.com/en-us/
windowsvista/aa905061.aspx. . Microsoft. Driver Signing Requirements for Windows. http://www.microsoft.com/
taiwan/whdc/winlogo/drvsign/drvsign.mspx. . Microsoft. How to install Windows Vista. http://support.microsoft.com/kb/918884. . Microsoft. A Stop error occurs, or the computer stops responding when you try to start
Windows Vista. http://support.microsoft.com/?kbid=925810.
126
Chapter 2: Installing Windows Vista . Microsoft. System Requirements for Windows Vista. http://support.microsoft.com/
?kbid=919183. . Microsoft TechNet. Windows Vista Enterprise Hardware Planning Guidance.
http://technet.microsoft.com/en-us/windowsvista/aa905075.aspx. . Microsoft. Using System Configuration. http://windowshelp.microsoft.com/
Windows/en-US/Help/bd9e1cb6-a66a-47a8-a4b6-ef7ea672ae4b1033.mspx. . Microsoft. The behavior of reduced functionality mode in Windows Vista. http://
support.microsoft.com/kb/925582 . Microsoft TechNet. Windows Vista Reliability and Performance Features and
Improvements. http://technet.microsoft.com/en-us/windowsvista/aa905071.aspx. . Microsoft TechNet. Inside the New Microsoft Application Compatibility Toolkit.
http://www.microsoft.com/technet/technetmag/issues/2006/11/ApplicationCompat ibility/default.aspx.
3
CHAPTER THREE
Upgrading to Windows Vista Objectives This chapter helps you to prepare for the exam by covering the following Microsoft-specified objectives for the Installing and Upgrading Windows Vista section of the TS: Microsoft Windows Vista, Configuring exam:
Upgrade to Windows Vista from a previous version of Windows. . Microsoft provides several upgrade paths for computers running versions of Windows XP. This objective is included to ensure that you know how and when to upgrade Windows XP to Windows Vista.
Upgrade from one edition of Windows Vista to another. . Several paths are available for upgrading from one edition of Windows Vista to another edition. This objective is included to ensure that you know how and when to upgrade from one edition of Vista to a higher edition.
Outline Introduction
130
Upgrading to Windows Vista from a Previous Version of Windows
130
Preparing a Computer to Meet Upgrade Requirements
131
Vista Upgrade Advisor
131
Additional Preparatory Tasks
134
Upgrading the Computer to Windows Vista
135
Dual-Booting Windows Vista
138
Upgrading from One Edition of Windows Vista to Another
140
Windows Anytime Upgrade
141
Upgrading Windows Vista
141
Performing Post-Installation Updates and Product Activation
143
Installing Updates and Hotfixes
145
Managing Automatic Updates
146
Summary
148
Key Terms
148
Apply Your Knowledge
148
Exercises
149
Exam Questions
150
Answers to Exam Questions
152
Suggested Readings and Resources
153
Study Strategies This chapter focuses on processes related to upgrading to Windows Vista. When studying the contents of this chapter, be sure to follow these strategies: . Pay attention to the various methods of upgrading older Windows computers to Windows Vista and of upgrading one edition of Vista to a higher one. . Practice the various procedures several times, including updates from various older Windows operating systems and upgrades between editions of Vista. . Be sure you know when you can upgrade directly to Windows Vista and between which editions of Vista you can upgrade.
130
Chapter 3: Upgrading to Windows Vista
Introduction As Microsoft introduces new versions of its Windows operating system, many users around the world want to take advantage of the features included in the new version without purchasing new computers. Consequently, Microsoft has made available upgrade paths that enable users to upgrade older versions of Windows. By upgrading earlier versions of Windows to Windows Vista, you can retain registry settings and account information contained in the older operating system. Many users are attracted by the features available in higher editions of Vista, such as Vista Ultimate, but may have purchased a computer on which a lower edition of Vista such as Home Basic has been pre-installed. Consequently, Microsoft has made upgrade paths available that enable these users to upgrade to a higher version of Vista. As with the upgrade of an earlier version of Windows, these upgrade paths enable users to retain registry settings and account information from the lower version of Vista.
Upgrading to Windows Vista from a Previous Version of Windows Objective:
Upgrade to Windows Vista from a previous version of Windows. Upgrade paths from previous Windows versions depend on the operating system version currently installed. Table 3.1 lists the available upgrade paths for older operating systems. TABLE 3.1
Upgrading Older Operating Systems to Windows Vista
Operating System
Upgrade Path
Windows XP Home Edition
Can be upgraded directly to Windows Vista Home Basic, Vista Home Premium, Vista Business, or Vista Ultimate.
Windows XP Professional
Can be upgraded directly to Windows Vista Business or Vista Ultimate.
Windows XP Media Center
Can be upgraded directly to Windows Vista Ultimate.
Windows 9x/ME Windows NT 4.0 Workstation Windows 2000 Professional
Cannot be upgraded. You need to perform a clean installation of Windows Vista
Non-Windows operating systems (Unix, Linux, OS/2)
Cannot be upgraded. You need to perform a clean installation of Windows Vista.
131
Upgrading to Windows Vista from a Previous Version of Windows
NOTE Upgrading Windows 2000 and older computers Theoretically, you can upgrade Windows 98/Me/NT 4.0/2000 computers to Windows XP and then upgrade to Vista. However, the licensing costs for such an upgrade would be higher than that of purchasing a clean copy of Vista; besides, such older computers probably would not meet Vista’s hardware requirements.
Preparing a Computer to Meet Upgrade Requirements In addition to running one of the supported versions of Windows mentioned here, a computer to be upgraded to Windows Vista must meet the hardware requirements outlined in Chapter 2, “Installing Windows Vista.” In addition, all hardware components should be found in the Windows Logo Program for Hardware. Older software applications also may not be compatible with Windows Vista. Such applications might need to be upgraded or replaced to work properly after you have upgraded your operating system. Review the information provided in Chapter 2 when preparing your computers for upgrading to Windows Vista.
Vista Upgrade Advisor Microsoft includes a compatibility tool on the Windows Vista DVD-ROM that generates reports describing hardware and software components that might not be compatible with Windows Vista. This report identifies any hardware or software problems associated with the computer to be upgraded. Step by Step 3.1 shows you how to obtain a system compatibility report from the computer to be upgraded.
STEP BY STEP 3.1 Installing and Running the Vista Upgrade Advisor 1. Insert the Windows Vista DVD-ROM. 2. When the Windows Vista welcome screen appears, select Check Compatibility Online. 3. Internet Explorer connects to the Microsoft Windows Vista Upgrade Advisor website, which contains upgrade information plus a link to download the Upgrade Advisor, as shown in Figure 3.1. Select this link. 4. On the Security Warning that appears, click Run to begin the download. 5. After a minute or so, an Internet Explorer Security Warning message box appears. Click Run to install the Upgrade Advisor.
132
Chapter 3: Upgrading to Windows Vista
FIGURE 3.1 If you are connected to the Internet, you should choose to download the updated files before preparing your compatibility report.
6. If prompted to install a recent version of MSXML, select the Download and Install option and follow the instructions that appear. These instructions install the MSXML 6.0 Parser, which is needed to run the Upgrade Advisor. When this installation completes, click Back on your browser window to return to the Upgrade Advisor installation. 7. If prompted to install the .NET Framework, select the Download and Install option and follow the instructions that appear. These instructions install the Microsoft .NET Framework 2.0. 8. The Windows Vista Upgrade Advisor Setup Wizard starts with a Welcome screen. Click Next. 9. On the License Agreement page, click I Agree, and then click Next. 10. On the Select Installation Folder page, accept the location provided or type an alternative path. Then click Next. 11. On the Confirm Installation page, click Next to proceed. The installation takes a few minutes. 12. When the Installation Complete page appears, ensure that the Launch Windows Vista Upgrade Advisor check box is selected, and then click Close. 13. The Windows Vista Upgrade Advisor checks for updates and then displays a Welcome page (see Figure 3.2). Click Start Scan. 14. While the scan is taking place, the Upgrade Advisor displays a comparison chart of features for several Vista editions. Select the command buttons at the bottom to learn more about the various editions. 15. When the scan completes, the Upgrade Advisor displays a Scan complete page. Click See Details to view the results of the scan.
133
Upgrading to Windows Vista from a Previous Version of Windows
FIGURE 3.2 Click Start Scan to test the upgradeability of your computer.
16. As shown in Figure 3.3, the Upgrade Advisor informs you of the edition of Vista most suited to your computer and of any issues that could cause problems during upgrade. For additional information, scroll down this window to click the See Details buttons under System Requirements, Devices, and Programs.
FIGURE 3.3 The Upgrade Advisor informs you of the Vista edition most suited to your computer.
134
Chapter 3: Upgrading to Windows Vista 17. As shown in Figure 3.4, the Report Details page reviews any issues regarding system, devices, or programs that might not work properly with Vista.
FIGURE 3.4 The Report Details page provides information on issues related to system, devices, and programs.
18. On the Report Details page, click the Task List tab to obtain a list of tasks you should perform before upgrading your computer to Vista. 19. Click Save Report to save a copy of the Vista Upgrade Advisor report to a location on your hard disk.
Additional Preparatory Tasks Before you upgrade a Windows XP computer to Windows Vista, you should perform several additional tasks, as follows: . Check the BIOS manufacturer’s website for any available BIOS upgrades, and upgrade
the computer’s BIOS to the latest available functional version if necessary. You should perform this step before a clean install or an upgrade to Windows Vista. . Scan and eliminate any viruses from the computer, using an antivirus program that has
been updated with the latest antivirus signatures. You should then remove or disable the antivirus program because it may interfere with the upgrade process. In addition, you should use a third-party program to scan for and remove malicious software (malware).
135
Upgrading to Windows Vista from a Previous Version of Windows . Install any upgrade packs that may be required to render older software applications
compatible with Windows Vista. Consult software manufacturers for details. . Install the latest service pack for Windows XP (SP2 at the time of writing), plus any
other updates that Microsoft has published.
EXAM ALERT Vista requires the NTFS file system Whether you are performing a clean installation or upgrading a Windows XP installation to Vista, remember that the partition on which you install Vista must be formatted with the NTFS file system. An exam question could specify that you are upgrading a computer containing an installation of Windows XP on a FAT or FAT32 partition. In such a case, you must execute the convert c: /fs:ntfs command from XP before beginning the upgrade.
Upgrading the Computer to Windows Vista After you have checked system compatibility and performed all tasks required to prepare your computer for upgrading, you are ready to proceed. The upgrade takes place in a similar fashion to a new installation, except that answers to some questions asked by the setup wizard are taken from the current installation. Step by Step 3.2 shows you how to upgrade a Windows XP Professional computer to Windows Vista Ultimate.
STEP BY STEP 3.2 Upgrading to Windows Vista 1. If it is not in the drive from the compatibility check process, insert the Windows Vista DVD-ROM. 2. When the Windows Vista screen appears, select Install Windows. 3. The Get Important Updates for Installation page appears. If you are connected to the Internet, select the Go Online to Get the Latest Updates for Installations option. Otherwise select the Do Not Get the Latest Updates for Installation option. 4. On the Type Your Product Key for Activation page, type the product key and then click Next. 5. Accept the license agreement and then click Next. 6. On the Which Type of Installation Do You Want? page shown in Figure 3.5, select Upgrade. 7. The Compatibility Report page displays information about any applications or drivers that are not supported in Windows Vista (see Figure 3.6). Note the information provided, and then click Next.
136
Chapter 3: Upgrading to Windows Vista
FIGURE 3.5 The Which Type of Installation Do You Want? page offers you a choice between upgrading and performing a clean installation.
FIGURE 3.6 The Compatibility Report screen describes items that might be incompatible with the upgrade to Windows Vista.
8. The Vista upgrade proceeds in a fashion similar to that of a clean installation. It only asks for any information it cannot retrieve from the previous Windows installation. 9. After installation has completed and the computer has rebooted, the Set Up Windows dialog box appears (see Figure 3.7). Make any required settings, and then click Next.
137
Upgrading to Windows Vista from a Previous Version of Windows
FIGURE 3.7 The Set Up Windows dialog box enables you to select your country or region, time and currency, and keyboard layout.
10. On the Help Protect Windows Automatically page, select Use recommended settings. 11. Ensure that the time and date are set properly and then click Finish. Windows configures your personalized settings and then displays the Vista desktop.
EXAM ALERT Uninstalling Windows Vista If you should decide that you must revert your computer to Windows XP after upgrading to Vista, you must back up all data, reformat your system disk, and reinstall XP from scratch. Unlike Windows XP, which offered an uninstall option in Control Panel Add or Remove Programs after upgrading from Windows 98/Me, no such uninstall option is available in Vista. You might encounter an exam question asking you how to remove Vista after an upgrade.
Challenge You are a consultant who is responsible for upgrading all workstation computers in your client’s office to Windows Vista Business. You have available the installation media for Windows Vista as well as the older operating systems currently in use on these computers. In addition, all servers have already been upgraded to Windows Server 2003. (continues)
138
Chapter 3: Upgrading to Windows Vista (continued)
The following table describes the computers in your client’s office: Operating System
Number of Computers
Windows 98
50
Windows NT 4.0 Workstation
25
Windows 2000 Professional
75
Windows XP Professional Windows Vista Home Basic
100 30
Your task is to upgrade all these computers to Windows Vista Business by performing as few steps as possible. If possible, you must not remove any user settings, data, or applications from any of these computers. Draw up a plan for upgrading these computers while adhering to these specifications. Try to complete this exercise on your own, listing your conclusions on a sheet of paper. After you have completed the exercise, compare your results to those given here: 1. You can upgrade all computers running Windows XP Professional directly to Windows Vista Business. This involves a total of 100 computers. 2. You must install Windows Vista Business as a clean installation on the computers running Vista Home Basic. Microsoft does not support an upgrade of either home version to Vista Business, only to Vista Ultimate. This involves a total of 30 computers. 3. You must install Windows Vista Business as a clean installation on the computers running Windows 98, Windows NT 4.0, or Windows 2000. Microsoft does not support an upgrade of computers running versions of Windows prior to Windows XP to any edition of Vista. This involves a total of 150 computers. Alternatively, you can upgrade computers running Windows 98, Windows NT 4.0, or Windows 2000 Professional to Windows XP Professional and then to Windows Vista Business. This upgrade path enables you to maintain user settings, data, and applications on these computers but takes more time to accomplish and requires licensed Windows XP media.
Dual-Booting Windows Vista As in previous versions of Windows, you can install Windows Vista alongside a different version of Windows in a dual-boot configuration. By selecting Custom (Advanced) instead of Upgrade in step 6 of Step by Step 3.2, you can select a different partition on which to install Windows Vista. This retains all applications and settings you have configured in the previous version of Windows and creates a clean installation of Vista on the partition you have specified. You can even create multi-boot systems with more than two different operating systems,
139
Upgrading to Windows Vista from a Previous Version of Windows
including different editions of Vista, on the same computer. Dual-booting or multi-booting has the following advantages: . You can test various editions of Vista without destroying your current operating
system. . If you are running applications that are not compatible with Vista, you can boot into an
older operating system to run these applications. . Developers can test their work on different Windows versions without needing more
than one computer. Windows Vista introduces several new boot management programs, which replace the older programs used with Windows NT/2000/XP/Server 2003. These include the following: . Bootmgr.exe—Controls boot activities and displays a boot manager menu on a dual-
boot or multi-boot computer. . Bcdedit.exe—An editing application that enables you to edit boot configuration data
on Vista. This is the only program that offers boot management editing capabilities for Vista. . Winload.exe—The operating system loader, included with each instance of Windows
Vista or Windows Server 2008 installed on any one computer. Winload.exe loads the operating system, its kernel, hardware abstraction layer (HAL), and drivers on startup. . Winresume.exe—Included with each instance of Windows Vista or Windows Server
2008 installed on any one computer, this program resumes the operating system from hibernation. For additional details on multi-booting Windows Vista with other operating systems, refer to “Boot Configuration Data in Windows Vista” in the Suggested Readings and Resources section at the end of this chapter.
EXAM ALERT When multi-booting, install the oldest operating system first If you are setting up a dual-boot or other multi-boot system, install the oldest operating system first. For example, you would install Windows 2000, then Windows XP, and then Windows Vista in that order if you wanted a triple-boot configuration with these three operating systems. If you fail to do so, the newer operating system will be unable to start after you have installed an older operating system. An exam question could give you several choices of the sequence in which you might install multiple operating systems.
140
Chapter 3: Upgrading to Windows Vista
CAUTION Remember disk file system issues If you need to dual-boot Windows Vista with operating systems earlier than Windows 2000, remember that these older operating systems only support certain file systems. Windows 98/Me support FAT and FAT32 file systems, and Windows NT 4.0 supports FAT and NTFS file systems. If you need Vista plus one of these operating systems to read the same data, ensure that your data is located on a partition formatted with one of these file systems. Also ensure that Windows NT 4.0 has at least Service Pack 5 (SP5) installed. However, remember that the partition on which you install Vista must be formatted with the NTFS file system.
Upgrading from One Edition of Windows Vista to Another Objective
Upgrade from one edition of Windows Vista to another edition. Chapter 1, “Introducing Windows Vista,” introduced you to the editions Microsoft has produced for Windows Vista. Just as you can upgrade Windows XP to Vista, you can also upgrade a lower edition of Vista to a higher one. Table 3.2 summarizes the available upgrade paths. TABLE 3.2
Upgrading One Edition of Vista to a Higher One
Windows Edition You Are Upgrading
You Can Upgrade to This Edition
Vista Home Basic
Vista Home Premium Vista Ultimate
Vista Home Premium
Vista Ultimate
Vista Business
Vista Ultimate
Vista Enterprise
Vista Ultimate
Vista Ultimate
Cannot be upgraded further
NOTE Vista Enterprise is available only to volume users Microsoft makes the Enterprise version of Windows Vista available only to Enterprise Agreement (EA) or Software Assurance (SA) customers, who must purchase a minimum of 250 Vista licenses. You can only install Vista Enterprise as a clean installation. Smaller businesses should deploy Vista Ultimate if they need the enhanced features available to Vista Enterprise.
141
Upgrading from One Edition of Windows Vista to Another
Windows Anytime Upgrade The Windows Vista DVD-ROM contains the code for all editions of Vista. When you enter the license key, this tells Setup which edition of Vista you are installing. As mentioned in Chapter 2, you can also install Vista without entering a license key and then select the desired edition. Doing so enables you to preview the capabilities of a given edition before making a purchase decision. Microsoft recommends that you perform several procedures before installing Vista, regardless of the method used for installation.
Upgrading Windows Vista Follow Step by Step 3.3 to upgrade Windows Vista Home Basic to Vista Ultimate. Other possible upgrades (as outlined previously in Table 3.2) are performed in much the same fashion.
STEP BY STEP 3.3 Upgrading to Vista Ultimate 1. Click Start, Control Panel, System and Maintenance, Windows Anytime Upgrade. 2. As shown in Figure 3.8, Windows Anytime Upgrade enables you to compare the available editions of Vista or upgrade to available editions.
FIGURE 3.8 Windows Anytime Upgrade enables you to upgrade your edition of Vista.
142
Chapter 3: Upgrading to Windows Vista 3. If you want to review a summary of available features in different editions, click the Compare the Editions of Windows Vista link. When you are finished, click the Back button. 4. To upgrade to Windows Vista Ultimate, click its link. This takes you to the window shown in Figure 3.9.
FIGURE 3.9 This window provides instructions on how to upgrade your Vista installation.
5. If you have not yet activated Vista, this page displays an entry labeled Activate Windows before upgrading. Select the Activate Windows Now link and follow the instructions that appear. 6. Select the link labeled First, Purchase the Windows Vista Upgrade Online. This takes you to a secure Microsoft website from which you can purchase the required license. 7. Follow the instructions provided on this website to purchase and download the license. 8. Insert your Windows Vista DVD-ROM and click the Begin Upgrade Process Command button. 9. Click Continue on the User Account Control message box that appears. 10. When the Microsoft Windows Vista window appears, click Install Windows Now. 11. The Get Important Updates for Installation page appears. If you have an active Internet connection, select the Go Online to Get the Latest Updates for Installation link. Otherwise, select the Do Not Get the Latest Updates for Installation link. 12. The computer locates and downloads any available updates. When this is complete, type your product key in the space provided. Ensure that the Automatically Activate Windows When I’m Online check box is selected, and then click Next. 13. On the licensing page, ensure that the I Accept the License Terms check box is selected, and then click Next. 14. On the Which Type of Installation Do You Want? page shown in Figure 3.10, select the Upgrade option.
143
Performing Post-Installation Updates and Product Activation
When the computer meets the requirements for upgrading Vista, the Upgrade option is available.
FIGURE 3.10
15. The Vista upgrade takes place automatically, taking the required settings from the current installation. This can take up to an hour depending on the speed of your hardware. 16. After the final reboot, the Vista logon screen appears with the user name(s) you specified while running the previous edition of Vista. Select an appropriate username. 17. You are logged on and receive the Welcome Center, similar to that shown during the initial installation.
EXAM ALERT The Windows.OLD folder When you upgrade a previous version of Windows to Vista, Setup.exe stores copies of the previous operating system subfolders and files in the Windows.OLD folder, so that they are available in case you need them. This also happens if you perform an in-place upgrade or reinstallation of a Windows Vista system. You might encounter an exam question that asks you what happens to these files.
Performing Post-Installation Updates and Product Activation Chapter 2 introduced the concept of product activation, and it explained how Microsoft uses activation to combat software piracy. Even though you activated your computer running Windows XP, you are required to activate your product again after upgrading to Vista. You should note that product activation (which is required) is not the same as registration (which is optional). Windows operates at reduced functionality after the grace period unless you activate the product. Registering your copy of Windows Vista allows you to receive updates and
144
Chapter 3: Upgrading to Windows Vista
other offers from Microsoft and provides ready information to Microsoft tech support personnel should you ever need their services. If you entered your product key during installation or upgrading, Vista is automatically activated three days later. You can activate Vista sooner if you desire. Follow Step by Step 3.4 to complete product activation.
STEP BY STEP 3.4 Performing Product Activation 1. Click Start, right-click Computer, and choose Properties. The Windows activation section of the dialog box that appears informs you of the number of days left before you must activate Windows. Click Activate Windows now. 2. If you receive a User Account Control message box, click Continue. 3. On the Windows Activation dialog box shown in Figure 3.11, select Activate Windows Online Now.
You can activate Windows now or be reminded later from the Windows Activation dialog box.
FIGURE 3.11
4. If you have not previously typed your product key for activation, type the product key when requested and then click Next. 5. You are informed of the process of activating Windows. When finished, you receive an Activation Was Successful message, as shown in Figure 3.12. Click Close.
145
Performing Post-Installation Updates and Product Activation
FIGURE 3.12
Windows informs you when you have successfully activated it.
If you are not connected to the Internet, you can telephone a customer support representative at Microsoft. Select the option to generate an installation ID that you can give to the support representative, who will provide you with a confirmation ID that you type into the activation wizard to complete the procedure.
Installing Updates and Hotfixes Updates, hotfixes, and patches are designed to repair specific problems that are uncovered from time to time after the release of a new operating system or major update such as a service pack. Their purpose is to correct security-related or performance-related problems and maintain the operating system in an up-to-date condition at all times. Microsoft operates the Windows Update website that analyzes your computer and determines which updates are required to keep your computer up-to-date and downloads and installs these updates automatically. These updates take place in the background while you are working on other projects and inform you if a restart is needed. If this is so, you can schedule the restart so that it does not interfere with completion of your work. When you install or upgrade to Windows Vista and select the option to download updates at the time of installation, your operating system is up-to-date with all patches and hotfixes at that time. Microsoft releases additional updates on a periodic basis (generally monthly on the second Tuesday of each month). Automatic Updates is turned on by default at installation time so that you will receive these updates as they are made available. However, this feature provides several settings that enable you to manage how you receive and install these updates.
146
Chapter 3: Upgrading to Windows Vista
Managing Automatic Updates The Automatic Updates feature in Windows Vista enables computers to automatically connect to the Microsoft Windows Update website and download the latest updates, hotfixes, and patches. You can specify how and when your computers are updated, and updates can be downloaded and installed in the background while you are working. To configure options for automatically receiving updates, follow the procedure outlined in Step by Step 3.5.
STEP BY STEP 3.5 Configuring Automatic Updates 1. Click Start, Control Panel, Security, Windows Update. 2. On the left pane of the Windows Update applet, select Change Settings. 3. As shown in Figure 3.13, the Choose How Windows Can Install Updates page provides the following four options for configuring automatic updates: . Install Updates Automatically (Recommended)—Automatically downloads and installs updates at the day and time specified in the drop-down list boxes provided. You should ensure that your computer is on and connected to the Internet at the time you specify. This is the default setting. . Download Updates but Let Me Choose Whether to Install Them—Downloads updates when they are available and informs you by means of an icon in the notification area. You can select which updates should be installed by clicking this icon and choosing Install. . Check for Updates but Let Me Choose Whether to Download and Install Them—Provides an icon in the notification area to inform you that updates are available from the Windows Update website. You can download these updates by clicking this icon and choosing Start Download. After the updates are installed, you can select Install to install them. . Never Check for Updates (Not Recommended)—You are not informed of any available updates and need to access the Windows Update website regularly to check for updates. You can do this by means of the link provided. 4. Make your selection. If you keep the default setting, select a convenient option for the day and time. Then click OK.
147
Performing Post-Installation Updates and Product Activation
The Choose How Windows Can Install Updates dialog box provides four options for configuring automatic updates.
FIGURE 3.13
Administrators can configure Automatic Updates for all computers in an Active Directory domain or organizational unit (OU) by means of Group Policy, which offers the same options as outlined here. In this way, you can ensure that all computers automatically receive the required updates. In addition, you can specify that the client computers download their updates from a server running Windows Server Update Services (WSUS) on your network. By doing so, you can reduce the Internet bandwidth required for downloading updates, and you can test updates in a lab environment to ensure that they do not cause problems with services or applications on the client computers.
TIP Visit the Windows Update website regularly, even if you have configured Automatic Updates The Windows Update website downloads only high-priority and recommended updates in an automatic manner. This site also contains optional software and hardware updates, which can help improve your computer’s performance. Always test the updates on one or more computers that are representative of your production computers in a lab environment before rolling out the updates.
148
Chapter 3: Upgrading to Windows Vista
Summary In this chapter, you learned how to upgrade previous versions of Windows to Windows Vista and how to upgrade from one edition of Vista to a higher one. You learned about the requirements for upgrading previous versions and the tasks that you should perform before you upgrade a computer. You can upgrade computers running Windows XP to editions of Windows Vista, and you can upgrade certain editions of Vista to higher ones. You cannot upgrade computers running Windows 2000 or older to Vista and must perform a clean installation if you wish to perform such an upgrade. You also reviewed the method of performing product activation and looked briefly at how to keep your computer up-to-date with Windows Update.
Key Terms . dual-boot . product activation . Windows Anytime Upgrade . Windows Upgrade Advisor
Apply Your Knowledge You have seen the conditions under which older Windows operating systems can be upgraded to Windows Vista. Here you upgrade a computer running Windows Vista Business to Vista Ultimate without first having entered a product key for Vista Business. To perform this exercise you should have a computer on which you have installed Vista Business using methods outlined in Chapter 2 but without entering a Vista Business product key.
149
Apply Your Knowledge
Exercises 3.1 Upgrading Vista Business to Vista Ultimate As mentioned in Chapter 2, you can install Vista without a product key if you want to evaluate the features of a given edition of Vista. You can then upgrade to another supported edition by entering the product key of the upgraded edition. This procedure is also useful in learning situations and when preparing for Microsoft exams. Estimated Time: 45–90 minutes, depending on the speed of your hardware. 1. Insert the Vista DVD-ROM. 2. If the Install Windows screen does not appear, open Computer, navigate to the DVD-ROM drive, and double-click Setup.exe. 3. On the Install Windows screen, select Install Now. 4. If you are connected to the Internet, select Go Online to Get the Latest Updates for Installation. Otherwise, select Do Not Get the Latest Updates for Installation. 5. Type the product key for Vista Ultimate and then click Next. 6. Accept the license terms and then click Next. 7. On the Which Type of Installation Do You Want? page, select Upgrade. 8. Setup checks compatibility and displays a report outlining any applications or drivers that are not supported. Make a note of the items displayed and then click Next. 9. The Windows upgrade proceeds without interaction from the user, and the computer reboots. After the final reboot, the Set Up Windows screen appears. Modify the selections if required and then click Next. 10. On the Help Protect Windows Automatically page, select Use Recommended Settings. 11. On the Review Your Time and Date Settings page, ensure that the settings are correct, modify them if necessary, and then click Finish.
150
Chapter 3: Upgrading to Windows Vista
Exam Questions 1. You are responsible for upgrading the operating system on a large number of computers running various versions of Windows in your office, and you decide to upgrade all the computers to Windows Vista Business. Which of the following operating systems can you upgrade to Windows Vista Business? (Choose all that apply.)
❍ A. Windows 98 ❍ B. Windows NT 4.0 ❍ C. Windows 2000 Professional ❍ D. Windows XP Professional ❍
E. Windows XP Home Edition
❍
F. Windows Vista Home Basic
2. Ellen uses a computer running Windows XP Professional and wants to upgrade this computer to Windows Vista Business without reinstalling any of her applications. She inserts the Vista DVDROM and runs Setup.exe. However, she receives a message that informs her Setup has been disabled. What should Ellen do first to troubleshoot this problem?
❍ A. Perform a clean installation of Windows Vista Business. ❍ B. Check her hardware for compatibility with Vista. ❍ C. Upgrade her computer to Vista Ultimate instead. ❍ D. Disable her Windows XP antivirus program, and then rerun Setup.exe. 3. Peter wants to upgrade his computer from Windows XP Professional to Windows Vista Business. He is concerned that his computer’s hardware might be somewhat outdated and will not support the upgrade. Which of the following can he do to determine whether the computer will support Windows Vista Business?
❍ A. Run the setup /checkupgradeonly command from the Vista DVD-ROM. ❍ B. Run the winnt32 /checkupgradeonly command from the Vista DVD-ROM. ❍ C. Download and run the Windows Vista Upgrade Advisor. ❍ D. Simply install Windows Vista and hope that everything is compatible.
151
Apply Your Knowledge 4. Kristin is a developer who needs to work with more than one operating system to assess how her applications behave in different conditions. Her computer has a 100GB hard disk containing three partitions formatted with the FAT32 file system. Windows XP Professional is installed on the first partition. She wants to install Windows Vista Ultimate in a dual-boot configuration. What should she do?
❍ A. While running Windows XP, insert the Vista DVD-ROM and follow the prompts provided. When she receives the option to select the type of installation, select Custom (advanced). Then select the second partition to install Vista and format this partition with the NTFS file system.
❍ B. While running Windows XP, insert the Vista DVD-ROM and follow the prompts provided. When she receives the option to select the type of installation, select Upgrade. Then select the second partition to install Vista and format this partition with the NTFS file system.
❍ C. Do not reformat any partition. While running Windows XP, insert the Vista DVD-ROM and follow the prompts provided. When she receives the option to select the type of installation, select Custom (advanced). Then select the second partition to install Vista.
❍ D. Do not reformat any partition. While running Windows XP, insert the Vista DVD-ROM and follow the prompts provided. When she receives the option to select the type of installation, select Upgrade. Then select the second partition to install Vista. 5. You are using a computer running Windows XP Home Edition that has an old network interface card (NIC) and sound card that might not be compatible with Vista. You want to upgrade your computer to Windows Vista Home Premium. What should you do first?
❍ A. Purchase and install a new NIC and sound card. ❍ B. Run the Easy Transfer Wizard. ❍ C. Access the websites of the NIC and sound card manufacturers and download new drivers for these components.
❍ D. Run the Windows Vista Upgrade Advisor. 6. Tom is upgrading a computer from Windows XP Professional to Windows Vista Ultimate. The computer is a 2.8GHz Pentium IV and has 768MB of RAM and an 80GB hard disk. After the first restart, Tom is informed that the computer is infected with a master boot record virus. What should he do before continuing with the installation?
❍ A. Reboot the computer to Windows XP Professional and scan for and remove all viruses. ❍ B. Remove or disable any antivirus software installed in Windows XP. ❍ C. Run the Check Compatibility Online option and follow any recommendations provided. ❍ D. Run fixmbr.exe from the Windows Vista DVD-ROM. ❍
E. Upgrade the computer to 1GB of RAM.
152
Chapter 3: Upgrading to Windows Vista 7. You are installing Windows Vista Business on a computer running Windows XP Professional. The hard disk has three partitions: C, D, and E. Windows XP Professional is installed on partition C. When Setup gives you a choice of partition on which to install Windows Vista Business, you choose partition D. What happens?
❍ A. You create a dual-boot system. ❍ B. You upgrade Windows XP Professional to Windows Vista Business. ❍ C. The Windows Vista Business installation fails. ❍ D. You wipe out Windows XP Professional.
Answers to Exam Questions 1. D and E. You can upgrade Windows XP Home Edition or Windows XP Professional to Windows Vista Business. Microsoft does not support upgrades of older operating systems or of Windows Vista Home Basic or Home Premium to Vista Business, so answers A, B, C, and F are all incorrect. For more information, see the sections, “Upgrading to Windows Vista from a Previous Version of Windows,” and, “Upgrading from One Edition of Windows Vista to Another.” 2. B. Ellen should check her hardware for compatibility. The Windows Vista Upgrade Advisor utility will do this for her and will produce a report of any hardware or software issues that may interfere with her ability to upgrade to Vista. If she performs a clean installation of Windows Vista Business, she will not retain her applications or settings, so answer A is incorrect. She should not upgrade her computer to Windows Vista Ultimate because this upgrade will also fail; moreover, upgrading to Vista Business is a supported upgrade option. Therefore answer C is incorrect. While she should disable her antivirus software before upgrading to Vista, she will not receive this error if she hasn’t done so; therefore, answer D is incorrect. For more information, see the section, “Vista Upgrade Advisor.” 3. C. Peter should run the Windows Vista Upgrade Advisor. He can download this application by selecting the Check Compatibility Online option from the Install Windows screen that appears when he inserts the Vista DVD-ROM. The winnt32 /checkupgradeonly command was used with Windows XP to produce a compatibility report for upgrading older versions of Windows to this operating system. However, it is not used with Vista, so answer A is incorrect. The setup command used for installing Vista does not include the /checkupgradeonly switch, so answer B is incorrect. Because Peter can download and run the Vista Upgrade Advisor to produce a comprehensive report of potential issues, he should not simply install Windows Vista and hope that everything is compatible. Therefore answer D is incorrect. For more information, see the section, “Preparing a Computer to Meet Upgrade Requirements.” 4. A. Kristin should select the Custom (advanced) installation option to install Vista on the second partition and format this partition with the NTFS file system. If she selects the Upgrade option, she upgrades her installation of Windows XP to Windows Vista, so answers B and D are incorrect. If she does not format the partition with the NTFS file system, the installation will fail, so answer C is incorrect. For more information, see the section “Dual-Booting Windows Vista.”
153
Apply Your Knowledge 5. D. The Windows Vista Upgrade Advisor analyzes the hardware and software components of the computer for compatibility issues. You should run this utility before attempting to upgrade your computer to Vista. You should not purchase new hardware or download new drivers before you have run the Upgrade Advisor because it is always possible that these components are compatible with Vista. Therefore answers A and C are incorrect. The Easy Transfer Wizard is used to transfer files and settings from an older computer to a new Windows Vista computer. It does not check hardware compatibility, so answer B is incorrect. For more information, see the section, “Vista Upgrade Advisor.” 6. B. Antivirus (AV) software is known to cause problems during installation of or upgrading of Windows operating systems. On the first reboot, these programs may falsely report that the installation files contain a virus and halt the installation. You should uninstall the AV software and disable any AV checking in the computer’s BIOS before installing or upgrading to Vista. You can always re-enable or reinstall antivirus software after you have completed the upgrade. The computer is not actually infected with a virus, so Tom does not need to reboot to Windows XP or scan for viruses, so answer A is incorrect. The Check Compatibility Online option is used to check a computer for software or hardware incompatibility before upgrading to Windows Vista. These problems do not cause the false reporting of a virus, so answer C is incorrect. Fixmbr.exe is used to recover corrupted master boot records on existing Windows installations. You cannot use it in this scenario when the Windows installation is incomplete, so answer D is incorrect. Tom does not need to upgrade the RAM to 1GB, so answer E is incorrect. For more information, see the section, “Additional Preparatory Tasks.” 7. A. On a computer that is running Windows XP Professional, you can either upgrade the current Windows installation by installing Windows Vista on the same partition holding the current Windows operating files or create a dual-boot system by installing Windows Vista on a different partition. You do not upgrade Windows XP in this scenario because you installed to a different partition, so answer B is incorrect. This type of installation does not wipe another instance of Windows out, nor does it fail for this particular reason, so answers C and D are incorrect. For more information, see the section, “Upgrading to Windows Vista from a Previous Version of Windows.”
Suggested Readings and Resources The following are some recommended readings on the subject of upgrading to Windows Vista: 1. Books . McLean, Ian and Orin Thomas. MCTS Self-Paced Training Kit (Exam 70-620):
Configuring Windows Vista Client. Redmond, WA: Microsoft Press. 2007.
154
Chapter 3: Upgrading to Windows Vista 2. Course . Microsoft Official Curriculum course 5115, Installing and Configuring the
Windows Vista Operating System. Module 2, Upgrading and Migrating to Windows Vista Ultimate Edition. Information available at http://www.microsoft.com/ learning/syllabi/en-us/5115aprelim.mspx. 3. Websites . Microsoft. Boot Configuration Data in Windows Vista. http://www.microsoft.com/
whdc/system/platform/firmware/bcd.mspx . Microsoft. Log Files that are Created When You Upgrade to Windows Vista from an
Earlier Version of Windows. http://support.microsoft.com/kb/928901 . Microsoft. Windows Vista Upgrade Advisor. http://www.microsoft.com/
windowsvista/getready/upgradeadvisor/default.mspx . Microsoft. Upgrade Paths from Previous Versions. http://www.microsoft.com/
windowsvista/getready/upgradeinfo.mspx . Microsoft. System Requirements for Windows Vista. http://support.microsoft.com/
kb/919183 . Microsoft TechNet. Boot Configuration Data Editor Frequently Asked Questions.
http://technet2.microsoft.com/WindowsVista/en/library/85cd5efe-c349-427cb035-c2719d4af7781033.mspx?mfr=true . TechRepublic. Running the Windows Vista Upgrade Advisor on a New Computer by
Greg Shultz. http://articles.techrepublic.com.com/5100-10877_116152876.html?tag=nl.e132.
4
CHAPTER FOUR
Configuring and Troubleshooting PostInstallation System Settings Objectives This chapter helps you to prepare for the exam by covering the following Microsoft-specified objectives for the Installing and Upgrading Windows Vista section of the TS: Microsoft Windows Vista, Configuring exam:
Troubleshoot post-installation configuration issues. . After you have installed Vista, you might encounter configuration problems that lead to startup problems. You must know how to perform startup repair and to start your computer in alternate modes. Furthermore, you can encounter various hardware difficulties. This objective ensures that you are able to troubleshoot startup and hardware configuration problems.
Configure and troubleshoot Windows Aero. . Windows Vista presents a new Aero desktop interface, which can operate at several levels of functionality depending on the edition of Vista you are running as well as the computer’s hardware configuration. You can modify the default configuration to optimize the user’s experience or improve overall computer performance. This objective ensures that you can configure these options and troubleshoot them when problems occur.
Configure and troubleshoot Parental Controls. . Vista contains several options that are designed to limit a child’s exposure to questionable content on the local computer, network, and the Internet. A technician who services home-based computers needs to be familiar with these options and capable of instructing parents in their proper operation.
Configure Windows Internet Explorer. . Users are likely to rely on Internet Explorer for their Internet experience. However, users might also need to connect to other resources and prefer using Internet Explorer as a common interface. You therefore are expected to also know how to connect to files, shared folders, Web folders, and other network elements.
Outline Introduction Troubleshooting Post-Installation Configuration Issues
158
Configuring Windows Vista Start Menu and Taskbar Start Menu Properties
191 191
158
Taskbar Properties
191
Troubleshooting Startup Issues
158
Notification Area
193
Using Alternative Startup Strategies
162
Toolbars
194
Last Known Good Configuration
162
Safe Mode
163
System Restore
164
Boot Logging
166
Low Resolution Video (640×480)
166
Debugging Mode
166
Disable Automatic Restart on System Failure
167
Disable Driver Signature Enforcement
167
Troubleshooting Hardware Devices Using Device Manager to Troubleshoot Hardware Devices
167 168
Installing, Configuring, and Managing DVD and CD-ROM Devices
171
Monitoring and Configuring Disks
173
Configuring Application Compatibility
178
Windows Easy Transfer
180
Configuring and Troubleshooting Windows Aero
Configuring and Troubleshooting Parental Controls
194
Configuring Various Types of Restrictions
195
Creating User Accounts
195
Configuring Parental Restrictions Configuring Activity Reports
196 199
Configuring Windows Internet Explorer 200 Configuring Tabbed Browsing
201
Blocking Pop-ups
204
Customizing Internet Explorer
206
Customizing Search Providers
206
Customizing the Toolbars
207
Printing Web Pages
209
Managing Add-Ons
209
Configuring Really Simple Syndication (RSS) Feeds
211
Configuring AutoComplete Settings
212
184
Understanding Windows Presentation Foundation 186
Summary
213
Understanding Hardware Requirements for Running Aero
Key Terms
213
Apply Your Knowledge
214
186
Configuring Desktop Schemes
187
Troubleshooting Aero
188
Window Borders Are Not Translucent
188
Aero Glass Is Not Running
189
Exercises
214
Exam Questions
217
Answers to Exam Questions
220
Suggested Readings and Resources
223
Study Strategies This chapter is devoted to post-installation configuration of Windows Vista and looks at the Vista desktop including the Aero interface, the Start menu, and the taskbar. It also discusses Internet Explorer and the new Parental Controls feature. Practical experience in this field is vital to understanding how these methods work and which situations are best suited for each. . Experiment with the advanced startup options and the Startup Repair Tool until you are familiar with the function of each component and how to recover from various types of hardware failure. . Become familiar with Device Manager and its options. . Configure Windows Aero on computers with varying hardware capabilities and learn to recognize the differences between Aero and Aero Glass and when you are able to enable each of these new desktop schemes. . Examine the various options available in the Parental Controls feature. Create a couple of users and configure Parental Controls for these users. Then log on as each of the users and attempt to perform actions you have disallowed. Note the errors produced. Finally, return to your administrative user and view the activity reports that have been created. . Experiment with the various configuration options available in Internet Explorer. Set up a series of tabs and save these as favorites. Note what happens when you disable add-ons. Locate a website that hosts RSS feeds and experiment with the options available for displaying and managing these feeds.
158
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
Introduction Now that you have installed Windows Vista, you have a basic system that is reasonably well configured. You also have a large range of configuration options available to you, many of which are new or changed since the days of Windows XP. This chapter looks at several of these configurations and their problems, including startup issues, hardware devices, Windows Easy Transfer, the new Aero desktop interface, Parental Controls, and the updated Internet Explorer 7.
Troubleshooting Post-Installation Configuration Issues Objective:
Troubleshoot post-installation configuration issues. When users receive new Windows Vista computers, support technicians must confront a myriad of issues ranging from what to do if a user’s computer doesn’t start to how to get documents, applications, and settings from the old Windows XP computer to the new computer. Several of the issues this section explores include the following: . Startup issues—You need to know how to assist a user whose Windows Vista computer
does not start up properly or won’t let him log on to the network. . Hardware issues—Vista supports all the hardware types previously supported by
Windows XP and adds support for the latest high-tech gadgets. . Transferring documents and settings—Windows Vista provides the Easy Transfer Wizard,
which improves on Windows XP’s Files and Settings Transfer Wizard.
Troubleshooting Startup Issues Microsoft has improved the robustness of Vista beyond the capabilities present in previous versions of Windows. For example, if you attempt to rename or delete a vital driver from the Windows\System32\Drivers folder, you receive an administrative prompt asking for permissions beyond the capabilities of a normal administrative account. Just the same, startup problems can occur. When your computer is unable to boot properly or won’t let you log on, it can be very frustrating when you have pressing work deadlines. In a corporate environment, startup problems can result in many calls to the help desk. Microsoft has designed Vista to reduce the number of startup problems and automate their recovery as much as possible.
159
Troubleshooting Post-Installation Configuration Issues
New to Vista is the Startup Repair Tool (SRT), which attempts to automatically recover a computer that will not start normally. The following are some of the problems that the SRT can attempt to repair: . Missing, corrupted, or incompatible device drivers . Missing or corrupted system files or boot configuration settings . Improper or corrupted Registry keys or data . Corrupted disk metadata, such as the master boot table, boot sector, or partition table
SRT provides a diagnostics-based, step-by-step troubleshooting tool that enables end users and tech support personnel to rapidly diagnose and repair problems that are preventing a computer from starting normally. When SRT determines the problem that is preventing normal startup, it attempts to repair this problem automatically. If it is unable to do so, it provides support personnel with diagnostic information and suggests additional recovery options. Step by Step 4.1 demonstrates the action of SRT.
STEP BY STEP 4.1 Using the Startup Repair Tool 1. Start your computer with the Vista DVD-ROM in the drive. 2. Press the spacebar when instructed to press any key to boot from the CD or DVD. 3. When the Install Windows screen appears, confirm the settings displayed and then click Next. 4. On the Install Windows screen shown in Figure 4.1, select Repair Your Computer.
FIGURE 4.1 The Install Windows screen provides an option for repairing an unbootable computer.
160
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings 5. On the System Recovery Options dialog box, you should see Microsoft Windows Vista, as shown in Figure 4.2. Ensure that it is highlighted, and then click Next.
FIGURE 4.2 The System Recovery Options dialog box enables you to repair one or more instances of Vista on your computer.
6. On the System Recovery Options dialog box shown in Figure 4.3, click Startup Repair.
FIGURE 4.3 The System Recovery Options dialog box provides five options for repairing an unbootable computer.
7. Startup Repair runs and displays the message shown in Figure 4.4. 8. If SRT detects and repairs a problem, it displays a message such as the one in Figure 4.5, informing you that it repaired the problem successfully. To see details of its actions, click the link provided. If it is unable to repair the problem, it offers additional information and links (see Figure 4.6).
161
Troubleshooting Post-Installation Configuration Issues
FIGURE 4.4
SRT attempts to repair an unbootable com-
puter.
FIGURE 4.5 When the SRT repairs a problem, it informs you of its actions.
FIGURE 4.6 When the SRT is unable to repair the problem, it provides links to additional details and log files.
9. When you are finished, click Finish, and then click Restart to restart your computer normally.
162
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
Using Alternative Startup Strategies Windows Vista provides several tools that help you recover from computer failures that prevent you from starting Windows normally. This section looks at several of these tools, including the Last Known Good Configuration, Safe mode, and System Restore.
NOTE Recovery Console The Recovery Console, which was used in Windows 2000/XP/Server 2003 to perform command line–based recovery procedures, has been replaced by the command prompt option in Startup Repair (refer to Figure 4.3 shown previously). For additional information on the actions you can perform using this option, refer to “Command-line reference for IT Pros” in the Windows Vista Help and Support Center.
Last Known Good Configuration Every time a user logs on successfully, Windows Vista makes a recording of the current Registry settings known as a control set. These settings are stored under HKEY_LOCAL_ MACHINE\SYSTEM\CurrentControlSet and are made available so that they can be used if the computer is unable to boot because of configuration changes such as installation of new device drivers or inappropriate modification of settings. For example, if configuration changes result in a computer displaying the Blue Screen of Death (BSOD) or modified display settings render the screen unreadable, you can revert to the previous settings by using the Last Known Good Configuration. Follow Step by Step 4.2 to use this configuration.
STEP BY STEP 4.2 Using the Last Known Good Configuration 1. Restart the computer (use the reset button if necessary). 2. Press F8 as the boot sequence begins to display the Windows Advanced Options menu, as shown in Figure 4.7. 3. Use the arrow keys to select Last Known Good Configuration and then press Enter. The computer proceeds to start from this configuration. 4. When the logon screen appears, log on as usual.
163
Troubleshooting Post-Installation Configuration Issues
FIGURE 4.7
Windows Vista provides several advanced startup options that you can use when unable to start
normally.
EXAM ALERT Know when you can and cannot use the Last Known Good Configuration Using the Last Known Good Configuration is the easiest way to correct changes when you are unable to log on as a result of various problems. If you have logged on successfully and then encounter a problem caused by a previous configuration change, you are unable to use the Last Known Good Configuration because this configuration is overwritten at the successful logon. Under these circumstances you must select a different startup option.
Safe Mode Safe mode starts your computer with a minimal set of drivers (mouse, VGA, and keyboard) so that you can start your computer when problems with drivers or other software are preventing normal startup. The following are several problems with which you can use Safe mode for recovering your computer: . The computer stops responding or runs very slowly—You can start in Safe mode and use
various tools for diagnosing and correcting the problem. You can also uninstall software, roll back device drivers, or use System Restore to roll back the computer to an earlier point in time. . The computer display is blank or distorted—After starting in Safe mode, you can use the
Control Panel Display applet to select appropriate display settings.
164
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings . The computer fails to respond after new hardware or software is installed—Use Safe mode to
uninstall software, disable hardware devices in Device Manager, roll back drivers, or restore the computer using System Restore. To enter Safe mode, follow the procedure outlined in Step by Step 4.2 and select Safe mode from the options displayed previously in Figure 4.7. You can also select either of the following options: . Safe mode with Command Prompt—Starts the computer to a command prompt. This can
be useful if you cannot obtain a normal GUI. . Safe mode with Networking—Starts network drivers as well as the other basic drivers.
This is useful if you need to copy files from a network location.
CAUTION Safe mode has its limitations Safe mode does not repair problems caused by lost or corrupted system files or problems with basic drivers. In these cases, you may be able to use the Recovery Console.
System Restore First introduced with Windows XP, System Restore enables you to recover from system problems such as those caused by improper system settings, faulty drivers, and incompatible applications. It restores your computer to a previous condition without damaging any data files such as documents and email. System Restore is useful when problems persist after you have uninstalled incompatible software or device drivers, after downloading problematic content from a website, or when you are having problems that you cannot diagnose but that have started recently. During normal operation, System Restore creates snapshots of the system at each startup and before major configuration changes are started. It stores these snapshots and manages them in a special location on your hard drive. It also copies monitored files to this location before any installation program or Windows itself overwrites these files during application or device installation. You can run System Restore from the System and Maintenance category of Control Panel. Step by Step 4.3 shows you how.
STEP BY STEP 4.3 Using System Restore to Restore Your Computer 1. Click Start, Control Panel, System and Maintenance, System (or right-click Computer and choose Properties).
165
Troubleshooting Post-Installation Configuration Issues 2. On the left pane of the System applet, select System Protection. 3. In the User Account Control message box that appears, click Continue. This opens the System Protection tab of the System Properties dialog box, as shown in Figure 4.8.
FIGURE 4.8 The System Protection tab of the System Properties dialog box includes a System Restore option.
4. Click System Restore to open the System Restore dialog box, as shown in Figure 4.9.
FIGURE 4.9 The System Restore dialog box enables you to perform a System Restore.
5. Click Next to display the Choose a Restore Point page. 6. Select a date and time to which you want to restore your computer, and then click Next.
166
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings 7. In the Confirm Your Restore Point dialog box, note the warning to save open files and then click Finish to perform the restore. 8. You receive a message box informing you that System Restore might not be interrupted and cannot be undone. Click Yes to proceed. The computer performs the restore, and then shuts down and restarts. 9. Log back on as an administrator. You receive a System Restore message box informing you that the restore completed successfully. Click Close.
TIP System Restore also enables you to create restore points If you are planning to install or download applications or other material that could be problematic, you can manually create a restore point first. Simply select the Create option shown in Figure 4.8 and follow the instructions provided.
NOTE You can use Safe mode and System Restore together to correct problems If you are unable to start your computer properly but are able to start in Safe mode, you can perform a System Restore from Safe mode to restore your computer to a functional state.
Boot Logging The boot logging option, selected from the options displayed previously in Figure 4.7, starts Vista normally while creating the \windows\ntbtlog.txt file, which lists all drivers that load or fail to load during startup. From the contents of this file, you can look for drivers and services that are conflicting or otherwise not functioning. After using this mode, reboot to Safe mode to read the ntbtlog.txt file and identify the problematic driver.
Low Resolution Video (640×480) The low-resolution video option starts Vista at the lowest video resolution with 16 colors. This is useful if you have selected a display resolution and refresh rate that is not supported by your monitor and video card or if you have installed a driver that is incompatible with your video card. You can go to the Display Properties dialog box, select an appropriate video option, and then reboot to Normal mode.
Debugging Mode Debugging mode provides advanced troubleshooting options for experienced developers and administrators. It sends kernel debug information to another computer via a serial cable.
167
Troubleshooting Post-Installation Configuration Issues
Disable Automatic Restart on System Failure The Disable Automatic Restart on System Failure option prevents Vista from automatically restarting if a problem is causing your computer to enter an endless loop of failure, restart attempt, and failure again.
Disable Driver Signature Enforcement The Disable Driver Signature Enforcement option permits you to install unsigned drivers or drivers that are improperly signed. After you reboot normally, driver signatures are again enforced but the unsigned driver is still used.
Troubleshooting Hardware Devices Microsoft has improved the technologies for implementing, configuring, and troubleshooting hardware devices with every upgrade of Windows. Windows Vista is no exception, and support for a large range of devices is present in Vista. You can manage many types of hardware devices in Windows Vista using the Computer Management tool, shown in Figure 4.10. You can open Computer Management by using any of the following procedures: . Click Start, right-click Computer, and select Manage. . Click Start and type Computer Management into the Search pane. After a few seconds,
Computer Management appears at the top of the Programs list. Select this entry. . Click Start, Control Panel, System and Maintenance, Administrative Tools. Select
Computer Management from the top of the list that appears. You can also select individual activities from the Administrative Tools entry under System and Maintenance. Computer Management offers the following tools and utilities: . Task Scheduler—Used for scheduling programs or actions to run at predetermined times
in the future . Event Viewer—Used for troubleshooting errors . Shared Folders—Used for creating and managing shares that are visible to users across
the network . Reliability and Performance—Used for troubleshooting errors as well as optimizing
performance . Device Manager—Used for configuring devices, updating or uninstalling device drivers,
rolling back device drivers, enabling and disabling devices, scanning for hardware changes, and troubleshooting
168
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings . Disk Management—Used for viewing and managing volume and disk configuration as
well as defragmenting hard disks . Services—Used for starting and stopping services related to a device . WMI Control—Used for turning error logging on or off or backing up the Windows
Management Instrumentation (WMI) repository (in most cases, you will not use this tool)
The Computer Management tool enables you to perform a large range of administrative and troubleshooting tasks.
FIGURE 4.10
Another place to check devices is in the System Information console. You can open it by clicking Start, Run, typing msinfo32, and then pressing Enter. Expand the Hardware Resources category to obtain information.
Using Device Manager to Troubleshoot Hardware Devices The majority of the work involving device implementation, management, and troubleshooting for many types of hardware devices is found in the Device Manager utility. Every device has its own Properties dialog box, specific to its device type and sometimes specific to the manufacturer and model, depending on the installed driver. The following standard tabs are found in any device Properties dialog box: . General—Displays the device’s description and status. . Driver—Displays the current device driver’s information. Includes buttons to display
the files that make up the driver (Device Details), to install a new device driver (Update Driver), to roll back the driver to an older version (Roll Back Driver), to enable or disable the device (Disable), and to uninstall the driver (Uninstall).
169
Troubleshooting Post-Installation Configuration Issues . Details—Displays the device’s specifications. You can choose from a long list of device
properties. . Resources—Displays the system resources being consumed, including interrupt requests
(IRQs), direct memory access (DMA) channels, and the I/O memory range. Displays whether these resources are in conflict with any others being used in the system. You can access Device Manager from the Computer Management console. You can also access it by right-clicking Computer, selecting Properties, and selecting the Device Manager link or from the Hardware and Sound category in Control Panel. After you determine that a hardware device is installed correctly and is listed in the Windows Logo Program for Hardware, you should check to see whether the device is detected by Windows Vista and is functioning by checking Device Manager for its listing. If a device is not functioning, an icon with a red “X” appears over the device icon. If a device is functioning but experiencing problems, a yellow question mark icon appears next to the device icon. When you right-click a device, a shortcut menu similar to the one displayed in Figure 4.11 appears. You can select to update the driver or uninstall or disable the device. You can also scan the device for hardware changes or access the device’s properties. When you open the device’s Properties dialog box, you can put a variety of configurations into effect, as well as disable or enable the device.
The rightclick menu in Device Manager provides several configuration options.
FIGURE 4.11
You can use Device Manager to determine whether an I/O conflict exists by changing the view. In Computer Management, right-click Device Manager in the left pane, select View, and
170
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
then select Resources by Type. In the right pane, click the plus (+) sign next to Input/Output (IO). Each device is listed in the order of the I/O resources it uses, as shown in Figure 4.12.
Device Manager provides an organized view of devices by the I/O resources they consume.
FIGURE 4.12
Device Manager offers other views that assist in monitoring. When you select Devices by Type, you see the devices organized by the kind of hardware each device is. If you have multiple monitors, for example, you see each of the monitors displayed below the Monitor node. This is the default view. The Devices by Connection view groups each device by the way it is connected in the computer. For example, all the disk drives and CD or DVD drives connected to the IDE controller are displayed under the IDE connection node. The Resources by Connection view shows the status of the I/O ports, as well as DMA channels, IRQs, and memory addresses, listed by the connection type. To expand the views to show non–Plug and Play devices, select Show Hidden Devices from the View menu.
TIP The Problem Reports and Solutions applet Another place to look when you are experiencing hardware or software problems with your Vista computer is the new Problem Reports and Solutions Control Panel applet, found in the System and Maintenance category. Vista identifies problems that have occurred on your computer and automatically checks online for solutions to these problems. Click the problems displayed to obtain additional information.
171
Troubleshooting Post-Installation Configuration Issues
Installing, Configuring, and Managing DVD and CD-ROM Devices Virtually all computers sold nowadays come with DVD+RW or DVD-RW drives, which allow you to burn all types of information to 4.7GB DVD discs, while maintaining backwards compatibility with CDs. Considering that some drives are not included within the Windows Logo Program for Hardware, there are bound to be some problems. To troubleshoot a problem with your CD or DVD device, you can use the following process: . If the CD/DVD or the IDE/SCSI controller is not listed in the Windows Logo
Program for Hardware, the next course of action is to contact the original equipment manufacturer (OEM) for a compatible device driver. . If the Windows Logo Program for Hardware shows that both the CD/DVD and the
IDE/SCSI controller are listed, you need to physically inspect the devices to ensure that they have been installed correctly. If using SCSI, also ensure that the SCSI ID of the device does not conflict with any other SCSI IDs, the SCSI ID of the controller is set to 7, and the SCSI bus has been terminated correctly. If using IDE, ensure that you are using the correct IDE controller. If you suspect the problem is confined to the CD or DVD media that you are currently using, you can check the volume for the disc by selecting the Volumes tab in the device’s Properties dialog box while the CD or DVD is in the drive. If the CD or DVD were able to mount, you see a description of the volumes contained on the disk. To investigate the configuration, you can click the Details tab in the Properties dialog box. Click the arrow on the drop-down box and select the various items from the list. Although this dialog box does not allow you to make configuration changes, it displays whether power is being provided to the device, the hardware ID, and more. For DVD drives, an additional configuration tab is available in the Properties dialog box—the DVD Region tab. DVD discs are encoded for a specific geographical location, called a region, in which they are intended to be used. A DVD drive reads only the DVDs that match the region for which it has been configured. A problem presents itself when a user travels internationally or for some other reason requires access to DVDs from more than one region. You are allowed to change regions a limited number of times. If a user needs to read DVDs from two different regions on a frequent basis, you should purchase a second DVD drive for that user. For a short-term change to another region, you can configure the new region in the DVD Region tab. Simply select the country where the DVD originated or a country whose region matches the region indicated by the error message that was received when the DVD was inserted and click OK to change the region. The Driver tab in the device’s Properties dialog box allows you to uninstall or update the device driver, roll the driver back to an older version, or simply view the driver details. Drivers are often the source of problems with all types of devices.
172
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
You can use the Properties tab to troubleshoot an array of challenging problems. Table 4.1 displays common problems and the responses that you can use to troubleshoot them. TABLE 4.1
Troubleshooting CD or DVD Errors
Device
Problem or Process
Utility/Solution
Response
CD-ROM drive
Can’t play audio CD, can read data CD
Control Panel, Hardware and Sound utility, Sound tab
Verify CD drive is listed. Verify audio codecs.
CD or DVD drive
Disc reading problem
Physically inspect the disc
Verify that CD has no defects or scratches. Clean CD.
CD or DVD drive
Can’t play DVD
Device Manager, device Properties, General tab
Verify device type is DVD drive, not CD-ROM drive.
CD or DVD drive
Disc reading problem
Alternate CD or DVD drive
Test disc in alternative drive.
CD or DVD drive
Error reading multiple discs
Special CD or DVD drive cleaning disc
Clean drive.
CD or DVD drive
Computer stops responding while reading disc
Task Manager (press Ctrl+Shift+Esc), Performance tab
View performance. Exit unnecessary applications.
CD or DVD drive
Computer stops responding while reading disc
Perform a clean boot
Ensure that no unnecessary applications are running. Test the disc in the drive again.
DVD drive
Cannot play a DVD movie disc
Device Manager, display adapter Properties, Driver tab, Update Driver button
Update the video driver.
DVD drive
Analog copy protection error
Physical presence of video output cables or older device driver does not support copyright protection on disc. Device Manager, display adapter Properties, Driver tab, Update Driver button
Remove video output cables from video adapter or DVD drive. Update video adapter driver.
DVD drive
Low video memory
Device Manager, display adapter Properties, Driver tab, Update Driver button
Update the video driver.
173
Troubleshooting Post-Installation Configuration Issues
TABLE 4.1 Continued Device
Problem or Process
Utility/Solution
Response
DVD drive
Low video memory/poor resolution
Control Panel, Display utility, Settings tab, Advanced button, Monitor tab
Lower the refresh rate.
DVD drive
Does not play DVD discs
Firmware version and DVD decoder software version—validate compatibility
Update the firmware version; uninstall the DVD decoder software. Install a version that is compatible with Windows Vista. This can happen when a computer was upgraded from an older version of Windows.
The computer might also stop responding and does not eject the CD when there is an error reading the disc in the CD drive. Such a problem generally requires you to reboot your computer to eject the CD. Other types of audio problems can also occur when attempting to read a CD or DVD. For further information, refer to Troubleshoot Audio Problems in Windows Media Center in the “Suggested Readings and Resources” section at the end of this chapter.
TIP Know how to perform a clean boot Know when to perform a clean boot and understand the process to do so. You can customize how Windows Vista starts up by clicking Start, Run, typing msconfig in the Open text box, and pressing Enter. Select Diagnostic Startup, and then reboot. You might want to simply disable a selection of applications and services, in which case you can use the Selective Startup option and disable the items you want in the resulting dialog box. You can keep this configuration for several reboots if you need to. After your final reboot, you can restart Windows Vista normally by returning to the System Configuration utility (Msconfig.exe), selecting the Normal Startup option, and then rebooting a final time.
Monitoring and Configuring Disks Disk Management, which can be found in Computer Management as shown in Figure 4.13, displays the disks installed on your computer as well as the volumes configured for the disks.
174
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
Disk Management enables you to perform a large range of management and troubleshooting activities on disks and volumes.
FIGURE 4.13
The following list summarizes the major actions you can perform from the Disk Management snap-in: . Create dynamic disks—Disks can be either basic (the default) or dynamic. You can con-
vert a basic disk to a dynamic disk but you cannot change back. Your only avenue to reverting to a basic disk is by deleting the dynamic disk, losing the data, creating a new basic volume, and restoring the data from a backup. . Create volumes—You can create several types of volumes on a dynamic disk. Microsoft
provides a wizard to assist you in creating these volumes: . Simple volumes—A single region of free space on a single disk. You can create sim-
ple volumes on either basic or dynamic disks. . Spanned volumes—Two or more regions of free space on 2 to 32 disks linked into a
single volume on a dynamic disk. . Striped volumes—Multiple regions of free space from two or more disks. Data is
evenly interleaved across the disks, in stripes. Can be created on dynamic disks only. . Extend volumes—You can add additional unallocated space on a disk to an existing vol-
ume. Vista provides the Extend Volume Wizard to assist you in this action. . Shrink volumes—You can reduce the size of a volume to generate unallocated space for
creating or extending a different volume.
175
Troubleshooting Post-Installation Configuration Issues . Display properties of disks and volumes—For disks, you can obtain the same information
as provided by Device Manager. For volumes, you can obtain information about free space and device properties. This feature also lets you defragment the volume, share the volume, configure an access control list (ACL), back up all files on the volume, and create shadow copies of files and folders within the volume.
NOTE Shadow copies The shadow copy feature, first introduced with Windows XP and Windows Server 2003, is available in the Business, Enterprise, and Ultimate editions of Windows Vista. This feature creates copies of files in real time as you work on them. It enables you to revert to a previous version of a file should you accidentally delete a file or save unsuitable modifications. In addition, this feature works with Windows Backup to enable the back up of all files, including those that an application might have open currently. Versions of Windows prior to Windows XP skipped any open files, thereby risking incomplete backups.
The Disk Management utility is fairly comprehensive, but it is not the only tool available in Windows Vista to configure or manage disks. Some of these tools hearken back to the days of DOS and Windows 3.x, yet they are still very useful, especially if there is a problem accessing the graphical user interface (GUI): . Chkdsk.exe—A command-line utility that verifies and repairs FAT- or NTFS-formatted
volumes. (For NTFS drives, use the CHKDSK C: /R command to automatically check and repair disk problems.) . Cleanmgr.exe—Also known as Disk Cleanup, a GUI utility that deletes unused files. . Defrag.exe—Also known as Disk Defragmenter, a command-line utility that
rearranges files contiguously, recapturing and reorganizing free space in the volume. Optimizes performance. . Diskpart.exe—A command-line utility that can run a script to perform disk-related
functions. Diskpart’s nearest GUI counterpart is the Disk Management utility. . Fsutil.exe—A command-line utility that displays information about the file system
and can perform disk-related functions. An administrator should understand how to handle the errors that can plague a hard disk. Common problems are listed in Table 4.2.
176
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
TABLE 4.2
Troubleshooting Disk Errors
Error
Problem or Process
Possible Repairs
Non-system disk
Computer is trying to boot from a disk without a boot volume.
Remove any non-system disks from the floppy or CD-ROM drives. Repair the boot volume using Windows Recovery Console.
There is not enough memory or disk space to complete the operation.
Disk is full.
Free up space on the hard disk by deleting files, removing applications, or compressing files. Add another disk and extend the volume to span both disks.
Missing Operating System
No active partition is defined.
Check the BIOS settings and configure if they incorrectly identify the boot disk. Boot up with a floppy. Use Diskpart.exe to mark the boot volume as active. Use Windows Vista Startup Repair Tool. Reinstall Windows Vista.
Non-System Disk or Disk Error
Basic Input Output System (BIOS) generates this error when the master boot record (MBR) or boot sector is damaged or when a different device is configured as the boot device in the BIOS.
Check the BIOS and reconfigure if necessary. Remove any non-bootable floppy disks from the PC. Repair the boot volume with the Windows Vista Startup Repair Tool. Reinstall Windows Vista. Replace the hard disk.
Invalid Media Type
Boot sector is damaged.
Repair the boot volume with Windows Vista Startup Repair Tool. Reinstall Windows Vista. Replace the hard disk.
Hard disk controller failure
BIOS’s disk controller configuration is invalid, or the hard disk controller has failed.
Check the BIOS and reconfigure controller. Replace the hard disk controller.
The volume properties of a disk in the Disk Management snap-in provides you with a status display, which can help you in troubleshooting disk problems. The following statuses can appear: . Healthy—This status is normal and means that the volume is accessible and operating
properly. . Failed—This status means that the operating system could not start the volume nor-
mally. Failed usually means that the data is lost because the disk is damaged or the file system is corrupted. To repair a failed volume, physically inspect the computer to see
177
Troubleshooting Post-Installation Configuration Issues
whether the physical disk is operating. Ensure that the underlying disk(s) has an Online status in Disk Management. . Formatting—This status is temporary, appearing only while the volume is being for-
matted. . Unknown—This status means that you’ve installed a new disk and have not created a
disk signature or that the boot sector for the volume is corrupt, possibly because of a virus. You can attempt to repair this error by initializing the underlying disk by rightclicking the disk and selecting Initialize from the shortcut menu. . Data Incomplete—This status appears when a disk has been moved into or out of a
multi-disk volume. Data is destroyed unless all the disks are moved and imported on the new computer. . Healthy (At Risk)—This status indicates I/O errors have been detected on an underly-
ing disk of the volume but that data can still be accessed. The underlying disk probably shows a status of Online (Errors) and must be brought back online for the volume to be corrected. When you see a status other than Healthy for your volumes or other than Online for your disks, you can attempt to repair by selecting the Rescan Disks option from the Action menu in Disk Management.
Challenge You have been tasked with installing a Windows Vista Ultimate computer with two identical SCSI 200GB hard disks, a 250GB hard disk, and a 300GB hard disk. The computer is to be used by an engineer in charge of computer-assisted design (CAD) operations. You are to configure a volume on the new disks that will hold data files. The data volume should feature the highest possible level of performance plus the largest available quantity of storage because the CAD operations will require the rapid processing of extremely large quantities of data. Your task is to convert a basic disk to a dynamic disk, using Diskpart.exe, and then use the Diskpart.exe tool to create a striped volume. Try to work through the required steps on your own, referring to the Help files for Diskpart.exe as required. If you have difficulty, refer to the following steps: 1. Install the hardware on the computer and start the computer. 2. Click Start, Run, type cmd, and press Enter. 3. At the prompt, type diskpart and press Enter. (continues)
178
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings (continued)
4. Type list disk and press Enter. The screen displays the disks in the computer along with the information about each. Look for the disks that you have just installed. Note that each of the new disks is, by default, a basic disk. 5. Type select disk n, where n is the number of the disk that you will be converting to a dynamic disk. The select disk n command moves the focus to the new disk. (This is similar to typing D:\ when you are at a C:\ prompt.) If you already have a single disk in the computer, Windows Vista automatically numbers the existing disk as disk 0 and the new disks sequentially; therefore, the disks will be numbered 1, 2, 3, and 4. 6. Type convert dynamic and press Enter. 7. Repeat steps 5 and 6 until all disks have been converted. 8. If requested, reboot the computer to complete the conversion. 9. To create a volume that exhibits the highest level of performance with the largest available quantity of disk space, you will create a striped volume. You can create a striped volume with 800GB of space, using 200GB from the two smallest disks and 200GB each from the larger disks. The unpartitioned space will be 50GB on one disk and 100GB on the largest disk. The benefit of the striped volume is that data is read from or written to all members of the volume simultaneously in 64KB blocks, thereby achieving the highest possible level of data throughput. Note that this volume is not fault-tolerant. You would require a computer running Windows 2000 Server, Windows Server 2003, or Windows Server 2008 to create a fault-tolerant volume. The striped volume meets the business objectives because it occupies the largest available amount of disk space while enabling the rapid processing of extremely large quantities of data. 10. Type create volume stripe size=200000 disk=1,2,3,4. The size parameter is the amount of space that the striped volume will occupy on each disk in megabytes. You can leave this parameter blank if you intend to use the maximum space available on the disks that can participate in the striped volume.
Configuring Application Compatibility Programs written for earlier versions of Windows might not work properly or stop responding (hang). At times, such programs might exhibit a compatibility issue with Windows Vista. Windows Vista provides a Compatibility mode that emulates the environment found on several previous versions of Windows. Follow Step by Step 4.4 to run an application in Compatibility mode.
179
Troubleshooting Post-Installation Configuration Issues
STEP BY STEP 4.4 Running an Application in Compatibility Mode 1. Right-click the executable or its shortcut and choose Properties. 2. On the Compatibility tab of the Properties dialog box, select Run This Program in Compatibility Mode For and choose one of the options shown in Figure 4.14. 3. Select additional options under Display Settings and Input Settings as required, and then click OK.
FIGURE 4.14
You can run a program in Compatibility mode if it does not run properly under Windows Vista.
TIP You can also use the Program Compatibility Wizard to run a program in Compatibility mode The Program Compatibility Wizard provides the same options available from the Compatibility tab described in Step by Step 4.4. Click Start, Control Panel, Programs and Features. In this category of Control Panel, select the Use an Older Program with this Version of Windows. Follow the instructions provided in the Program Compatibility Wizard.
180
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
Windows Easy Transfer When a user moves to a new computer, one of the most challenging activities that she faces is the migration of files and settings from the old computer to the new one. Microsoft provides the Windows Easy Transfer tool to assist users in this daunting task. An update to the Windows XP Files and Settings Transfer Wizard, the Windows Easy Transfer tool enables you to transfer files, folders, and settings belonging to a user from an old computer running Windows 2000 or later to a new computer or an existing computer on which a clean installation of Windows Vista exists. It is a simple means of transferring these settings when only a few computers are involved or when users are individually responsible for migrating information to a new computer. It is automatically installed on Windows Vista computers during operating system installation. Windows Easy Transfer migrates the following components to the new computer: . User accounts . Folders and their files, including pictures, music, and videos . Application data and settings (but not the applications themselves) . Email data, including messages, settings, and contacts . Windows and Internet settings
This wizard operates by creating a shared folder on the new computer, using this share to prepare data on the old computer for transfer, and then transferring it to the new computer. To perform this procedure, the following items must be available: . Removable media such as CD-R disks, a flash drive, or a removable hard drive to store
the migrated information. You can also use a shared folder on a server or a USB Easy Transfer cable to connect the two computers directly. . The username and password of the user whose information is being migrated.
To use Windows Easy Transfer, start the wizard on the new computer and create the shared folder, which contains a copy of the Easy Transfer application. Then go to the old computer, connect to the shared folder, and migrate the data to removable media or a shared folder. Finally, return to the new computer and import the migrated data. Step by Step 4.5 provides a detailed procedure.
181
Troubleshooting Post-Installation Configuration Issues
STEP BY STEP 4.5 Using Windows Easy Transfer and a Shared Folder to Transfer Data to a New Computer 1. Create and share a folder on the new computer, for example, C:\EasyTransfer. 2. At this computer, click Start, All Programs, Accessories, System Tools, Windows Easy Transfer. 3. Click Continue on the User Account Control message box that appears. 4. The Windows Easy Transfer Wizard displays the welcome screen shown in Figure 4.15 that describes its actions. Click Next.
The Windows Easy Transfer Wizard provides information on transferring files and settings from the old computer to the new one.
FIGURE 4.15
5. The wizard asks whether you want to start a new transfer or continue one in progress. Click Start a New Transfer. 6. The wizard asks whether you are at the new computer or the old one. Ensure that the My New Computer option is selected, and then click Next. 7. The wizard asks whether you have an Easy Transfer Cable. Select the No option to display the options shown in Figure 4.16 for accessing the old computer. 8. To install Windows Easy Transfer on the old computer, select the No, I Need to Install It Now option. 9. The wizard presents the options shown in Figure 4.17 for installing Windows Easy Transfer on the old computer. Select the External Hard Disk or Shared Network Folder option.
182
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
The Windows Easy Transfer Wizard provides three options for accessing the old computer.
FIGURE 4.16
Windows Easy Transfer presents four options for installation on the source computer.
FIGURE 4.17
10. Type the path to the shared folder that you created in step 1, and then click Next. The wizard copies the Windows Easy Transfer software to a subfolder named MigWiz in the shared folder and then asks whether the computers are connected to a network. 11. To transfer files and settings across the network, select the Yes option. 12. The wizard asks whether you have a Windows Easy Transfer key, which acts like a password for security purposes. Select No, I Need a Key, and write down the alphanumeric key that appears. Then click Next.
183
Troubleshooting Post-Installation Configuration Issues 13. Go to the old computer, click Start, Run, and type the path to the shared folder. If you are asked to provide credentials, type the username and password of the user on the new computer. 14. When the shared folder opens, select the MigWiz subfolder, open it, and then double-click MigWiz.exe. 15. Windows Easy Transfer opens and asks you how you want to transfer files and settings to the new computer. To use the shared folder, select the Transfer Directly, Using a Network Connection option. 16. To transfer files directly from the old computer to the new one, select the Use a Network Connection option. 17. Click Yes, I Have a Key, type the Windows Easy Transfer key that you received in step 12, and then click Next. 18. The wizard displays a Connecting to the Network message as it connects to the other computer and then asks what you want to transfer to the new computer. Select either All User Accounts, Files, and Settings or My User Account, Files, and Settings Only as Required. If you need to choose only selected users or settings, select the Advanced Options option. 19. As shown in Figure 4.18, the wizard displays a list of files and settings to be transferred. If you need to modify this list, click Customize and follow the instructions provided. Otherwise, click Transfer.
The wizard displays a list of items to be transferred.
FIGURE 4.18
20. Select a user account on the new computer or type a username to create a new user account. Then click Next. 21. The wizard collects the information to be transferred. This can take several minutes. When data collection is complete, it asks you to go back to the new computer. 22. At the new computer, select a user account and then click Next. 23. Review the list of selected files and settings, and then click Transfer to begin the transfer.
184
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings 24. The wizard displays a progress bar as the transfer takes place. You are informed when the transfer is complete. 25. Click Close, and then click Yes to log off and apply the settings.
NOTE User State Migration Tool Microsoft also provides the User State Migration Tool (USMT), which is useful if you need to migrate large numbers of users to new computers running Windows Vista. USMT is a command line-based tool that is easily scripted and provides comprehensive migration capabilities for enterprise deployments. Refer to Migrating to Windows Vista Through the User State Migration Tool in the “Suggested Readings and Resources” section for further information.
REVIEW BREAK You have looked at various alternative startup strategies that you can employ when Windows Vista does not start normally. You have also looked at several hardware device troubleshooting strategies. . Windows Vista provides the Startup Repair Tool, which attempts to perform an auto-
matic repair of problems that prevent Windows from starting normally. . You can also start Vista in alternative modes, such as Last Known Good and Safe
mode, to repair startup problems. . You can use Device Manager to manage and troubleshoot hardware devices and their
drivers. . Vista provides the Program Compatibility mode, which can enable you to run older
applications that are not fully compatible with Vista. . You can use Windows Easy Transfer to transfer data and settings from an old comput-
er to a new Windows Vista computer.
Configuring and Troubleshooting Windows Aero Objective:
Configure and Troubleshoot Windows Aero. With Windows Vista, Microsoft introduces a new desktop scheme known as Aero. Any computer with a high-quality display adapter card can utilize all the power inherent in the display
185
Configuring and Troubleshooting Windows Aero
card to produce the top-level Aero Glass display appearance. Available on all editions except Home Basic, Aero Glass enables enhanced display features such as the following: . Translucent title bars—As shown in Figure 4.19, window title bars and other interface
elements show a view of any windows or the desktop hidden beneath them. This feature can assist you in tracking actions taking place in the background or locating hidden items. You can customize the color and transparency from the Control Panel Display applet. . Windows Flip—In Windows Vista, the familiar Alt+Tab brings up live thumbnail views
of each task running on the computer rather than generic icons, assisting you in locating the correct folder, Word document, and so on. . Windows Flip 3D—Pressing the Windows key+Tab brings up a stacked view of each
task window, showing live actions currently taking place and simplifying the task of choosing the application you want. You can even see live action of a task such as a movie playing in Windows Media Player. You can also scroll through the tasks by using the scroll wheel on your mouse. . Improved taskbar—You can obtain thumbnail views of tasks running on the computer by
hovering your mouse over a taskbar button. . More smoothly performing desktop—Aero has done away with previous redraw artifacts
such as “tearing” that frequently were observed in older Windows versions. Graphics driver-related lockups and crashes have also been reduced.
The Aero Glass desktop includes translucent interface elements.
FIGURE 4.19
186
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
Understanding Windows Presentation Foundation Known as Avalon during the beta phase of Vista, the Windows Presentation Foundation (WPF) presents an enhanced platform that supports media-rich applications that provide complete fidelity to systems such as the Xbox 360 Media Center Extender. Microsoft has backported WPF to Windows XP to provide support for these applications; however, this does not include the Aero interface. WPF provides the following improvements to graphics in Windows Vista: . Window “tearing” is eliminated—Under previous graphics subsystems, windows that
were dragged rapidly across the desktop appeared to tear. WPF routes graphics through the hardware-accelerated graphics processor, enabling smooth graphics movements under all conditions. . Improved animations—Animation effects such as blurred motion are possible.
Developers can create effects such as fade-ins and fade-outs, enhanced user interface elements, and impressive screen transitions. . Vector-based scaling—This improvement allows you to rescale images to larger size with-
out their appearing blurred or pixilated—in other words, no more jagged edges when you upscale an item such as an icon. . Transparency—WPF enables transparency without a high level of overhead because
everything is rendered in the hardware-accelerated graphics processor. . Enhanced video capabilities—WPF treats video in much the same manner as any other
graphical object. The hardware-accelerated graphics processor handles video without dropping frames (as happened in older Windows systems) or taxing the CPU. These capabilities also enable the Flip and Flip 3D actions already introduced.
Understanding Hardware Requirements for Running Aero A computer that runs Aero properly should meet the Premium Ready hardware requirements already introduced in Chapter 1, “Introducing Windows Vista.” Being a processor- and memoryintensive subsystem, Aero Glass imposes additional graphics card requirements on computers capable of running it:
187
Configuring and Troubleshooting Windows Aero . Video memory—You must have a high-performance video card with at least 128MB of
memory on the card to use Aero Glass. If using a resolution higher than 1920×1200 or a dual-monitor setup above 1280×1024, you need at least 256MB graphics memory. . Graphics processor—Aero requires a DirectX 9 graphics processor with Pixel Shader 2,
32 bits per pixel, and Windows Display Driver Model (WDDM) support. A further advantage of WDDM is that it provides a high level of graphics stability, thereby reducing crashes resulting from graphics driver problems. . Graphics memory bandwidth—You must have a bandwidth of at least 1800MB for a desk-
top computer running at a 1280×1024 pixel resolution. Computers whose graphics hardware do not meet Aero Glass requirements may still be able to function in the standard Aero capability. A computer that is not Aero-capable will provide a desktop graphics experience similar to that of Windows XP.
Configuring Desktop Schemes If the hardware requirements for Aero or Aero Glass are met, Vista automatically enables the highest display capabilities. You can enable or disable Aero or choose from other available schemes from the Appearance Settings dialog box. Step by Step 4.6 shows you how.
STEP BY STEP 4.6 Enabling or Disabling Windows Aero 1. Click Start, Control Panel, Appearance and Personalization, Personalization. You can also right-click a blank area of the display and choose Personalize. 2. Select Windows Color and Appearance. 3. On the Window Color and Appearance dialog box, click Open Classic Appearance Properties for More Color Options. 4. On the Appearance Settings dialog box shown in Figure 4.20, open the Color Scheme drop-down list and select Windows Aero. Then click OK or Apply.
188
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
FIGURE 4.20
You can choose from several color schemes from the Appearance Settings dialog box.
From this dialog box, you can also choose Windows Standard, which is similar to the display properties of Windows 2000, or Windows Classic, which is similar to Windows 98. Several high contrast schemes, which enhance visibility for vision-challenged users, are also available from this location.
Troubleshooting Aero This section describes some of the more common problems you might encounter with Aero and how you might solve those problems, either on the 70-620 exam or in the real world.
Window Borders Are Not Translucent Your computer can be running Aero Glass but might not be set for translucent window borders. To test whether your computer is running Aero Glass, press Windows+Tab. If you observe the Flip 3D task view, your computer is running Aero Glass. If so, follow Step by Step 4.7 to configure translucency.
189
Configuring and Troubleshooting Windows Aero
STEP BY STEP 4.7 Configuring Translucency 1. Click Start, Control Panel, Appearance and Personalization, Personalization. You can also right-click a blank area of the display and choose Personalize. 2. Select Window Color and Appearance. 3. As shown in Figure 4.21, select the Enable Transparency check box. You can also choose a color and a level of transparency from the options and sliders available on this dialog box. 4. When finished, click OK.
The Window Color and Appearance dialog box enables you to configure the transparency and color of windows in Aero Glass. FIGURE 4.21
Aero Glass Is Not Running If pressing Windows+Tab does not reveal Flip 3D actions, your computer is running the Vista Basic desktop scheme. Follow the procedure of Step by Step 4.6 to enable Aero Glass. If Aero Glass is not available from the Color Scheme drop-down list, your computer is not capable of running Aero Glass. Even if your video card is Aero Glass–capable, it might not have the appropriate drivers. Follow Step by Step 4.8 to check your video drivers.
190
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
STEP BY STEP 4.8 Checking Video Drivers 1. Click Start, right-click Computer, and click Properties. 2. Select Device Manager from the list on the left side of the System Properties applet. 3. Double-click Display Adapters, and then double-click your display adapter. 4. The Adapter Type string should contain a WDDM entry (see Figure 4.22). If it doesn’t, visit the display adapter manufacturer’s website to see whether they have a newer WDDM-compliant driver. 5. If you can obtain a WDDM-compliant driver, select the Update Driver command button to install it and reboot your computer.
FIGURE 4.22
You need to have a WDDM-compliant display adapter to run Aero Glass.
Additional features may inhibit the appearance of Aero Glass visual elements, as follows: . Glass or transparency might have been disabled in the Performance Options dialog box—In
Control Panel, open System and Maintenance, select Performance Information and Tools, and then select Adjust Visual Effects. From the Visual Effects tab of the Performance Options dialog box, ensure that the Adjust for Best Appearance radio button is selected. If the Adjust for Best Performance radio button is selected, Glass
191
Configuring and Troubleshooting Windows Aero
effects are automatically disabled. You can also select Custom, and then select the check boxes labeled Enable Desktop Composition and Enable Transparent Glass. . Incorrect theme setting—Ensure that Windows Vista is selected in the Theme Setting
dialog box. See Step by Step 4.6 discussed previously. . Color depth may be insufficient—You cannot run Aero Glass if the color depth is set to
less than 32 bits per pixel. Access the Display Settings dialog box and ensure that Color quality is set to Highest (32-bit). If this setting is not available, your display adapter is incapable of running Aero. . An application may be disabling Glass—Application compatibility settings for older appli-
cations may disable the Aero Glass desktop. You looked at application compatibility earlier in this chapter. For additional troubleshooting hints, refer to Windows Vista Rules for Enabling Windows Aero in the “Suggested Readings and Resources” section at the end of this chapter.
Configuring Windows Vista Start Menu and Taskbar Vista provides several options for configuring the properties of the Start menu and the Taskbar. Right-click Start and choose Properties to bring up the Taskbar and Start Menu Properties dialog box, which enables you to configure properties related to the taskbar, Start menu, notification area, and toolbars.
Start Menu Properties As shown in Figure 4.23, you can configure the following properties of the Start menu: . Start Menu Customize button—Select this button to ring up the Customize Start Menu
dialog box (see Figure 4.24). You can choose which options appear on the Start menu. In particular, you can enable the Run dialog box, which is not enabled by default in Windows Vista. . Classic Start Menu—Select this option to use a Start menu similar in appearance to that
of Windows 2000 and older operating systems. Click Customize to specify which items appear on this Start menu. . Privacy—If additional users are accessing your computer and you do not want them to
know which files and programs you have recently accessed, clear either or both of the check boxes in this section.
192
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
The Start Menu tab of the Taskbar and Start Menu Properties dialog box enables you to configure several options for the Start menu.
FIGURE 4.23
You can configure which items appear on the Start menu from the Customize Start Menu dialog box.
FIGURE 4.24
Taskbar Properties Selecting the Taskbar tab of the Taskbar and Start Menu Properties enables you to configure the following items shown in Figure 4.25. Except for the Show Window Previews option, these properties function as they did in Windows XP:
193
Configuring and Troubleshooting Windows Aero . Lock the taskbar—Determines whether the taskbar is always visible at the bottom of the
display. . Auto-hide the taskbar—Determines whether the taskbar disappears automatically after a
program is started. . Keep the taskbar on top of other windows—Prevents windows from hiding the taskbar. . Group similar taskbar buttons—When selected, taskbar buttons for similar functions
(such as multiple Word documents or multiple Explorer windows) are grouped into single buttons to prevent taskbar buttons from shrinking to a very small size. . Show Quick Launch—Enables the quick launch section of the taskbar, from which you
can start frequently used programs with a single mouse click. . Show window previews (thumbnails)—Enables the display of Flip view thumbnails.
The Taskbar tab enables you to configure several taskbar properties.
FIGURE 4.25
Notification Area Select the Notification Area tab to configure the items that appear in the notification area (formerly known as the System Tray), as shown in Figure 4.26. . Hide inactive icons—Clears the notification area of icons for programs that have not
recently been used. Click Customize to change the behavior of certain icon types. . System icons—Enables the display of the clock, as well as icons for speaker volume, net-
work connection, and on portable computers, the power setting.
194
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
The Notification Area tab enables display of icons in the notification area.
FIGURE 4.26
Toolbars You can configure the taskbar to display toolbars for Address, Windows Media Player, Links, Tablet PC Input Panel, Desktop, and the Quick Launch section of the taskbar. Only Quick Launch is enabled by default.
Configuring and Troubleshooting Parental Controls Objective:
Configure and Troubleshoot Parental Controls. A common problem in home-based computers is that children have free access to the computer at times when their parents are busy doing other tasks or are not at home. This allows access to questionable websites that include topics such as violence, pornography, drug making, and so on. Furthermore, children may be accessing games or other content at times when they should be using the computer for homework projects. Microsoft has incorporated the new Parental Controls feature into Windows Vista Home Basic, Home Premium, and Ultimate to enable parents to limit children’s computer usage and provide reports on what children actually are doing.
195
Configuring and Troubleshooting Parental Controls
Configuring Various Types of Restrictions The Parental Controls feature enables parents to specify the following types of restrictions: . Website restrictions—The Web Content Filter included with Windows Vista examines
the content of web pages and enables parents to configure restrictions on the type of content accessed by children. Parents can choose from several preconfigured restriction levels or modify them as needed. Besides Internet Explorer, this filter works with other major browsers such as Firefox. . Usage time limits—Parents might want to prevent children from using the computer for
hours on end. They can select the times of day and days of the week during which a child can use the computer. The child is logged off at the end of his allowed time, but his session remains active in the background so he can resume it during the next allowed time interval. . Application limits—Parents can choose which applications their child is permitted to
access, thereby preventing him from running programs such as the parents’ financial planner. The child can ask a parent for approval to run a specific application if required, for example, to complete a school assignment, and the parent can enter her user credentials to approve the application. . Game limits—Parents can choose which types of games children are permitted to play
according to age limits set by major game rating boards. They can also choose to permit or block specific games.
Creating User Accounts Every user of your computer (yourself included) should have his or her own user account, and these accounts should have passwords to help protect them from unauthorized use. Follow Step by Step 4.9 to create a user account.
STEP BY STEP 4.9 Creating User Accounts 1. Click Start, Control Panel, User Accounts and Family Safety, Add or Remove User Accounts. 2. Click Continue in the User Account Control message box that appears. 3. Click Create a New Account to display the dialog box shown in Figure 4.27. 4. Type a name for the user account. Choose an option as explained on the dialog box (you would normally choose the Standard User option) and then click Create Account.
196
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
The Create New Account dialog box enables you to create new user accounts.
FIGURE 4.27
5. To create a password, select Create a Password. Type a password in the Password and Confirm Password text boxes, and then click Create Password. You might also want to type a hint in the Type a Password Hint text box in case the user forgets the password.
Configuring Parental Restrictions After you have created user accounts for each child, it is simple to set up Parental Controls. Step by Step 4.10 shows you how.
STEP BY STEP 4.10 Configuring Parental Controls 1. Click Start, Control Panel, User Accounts and Family Safety, Set Up Parental Controls for Any User. Or simply type parental in the Search box in the Start menu and press Enter.
NOTE Another way to access Parental Controls You can also access Parental Controls from the Content tab of the Internet Properties dialog box. Click Start, right-click Internet, and choose Internet Properties. Or choose Tools, Internet Options from the command bar in Internet Explorer. Internet Explorer is discussed later in this chapter.
2. Click Continue in the User Account Control message box that appears. 3. Choose the user for which you want to configure Parental Controls. 4. On the Parental Controls dialog box shown in Figure 4.28, click On, Enforce Current Settings under the Parental Controls heading.
197
Configuring and Troubleshooting Parental Controls
The Parental Controls dialog box enables you to configure any of the four types of controls.
FIGURE 4.28
5. To configure website restrictions, click Windows Vista Web Filter. This brings up the screen shown in Figure 4.29, which enables you to configure the following items: . Block Some Websites or Content—Enables Web restrictions. Select this option to enable the remaining options. . Allow and Block Specific Websites—Brings up a dialog box in which you can enter specific websites that you want to either allow or block. . Block Web Content Automatically—Enables you to select a restriction level from High (blocks all sites except those approved for children), Medium (blocks unratable sites and those containing pornography, drugs, hate speech, and weapons), None (does not automatically block sites), or Custom (enables you to select categories to be blocked; you receive a list of 11 categories that you can selectively block). . Block File Downloads—Prevents the child from downloading potentially harmful material. 6. Choose the options you want from this list, and then click OK. 7. To specify time limits, click Time Limits to display the window shown in Figure 4.30. Click and drag to outline the blocked times in blue, and then click OK. 8. To specify game limits, click Games. From the Game Controls dialog box you can block or allow specific games on your computer or prevent the child from playing any games. Click Set Game Ratings to select a maximum allowed rating as shown in Figure 4.31. You can also choose to block specific content types even if a game has an allowed rating. Click OK twice.
198
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
You have several options for specifying what types of Web content should be blocked.
FIGURE 4.29
You can specify which hours of the day and days of the week your child is permitted to use the computer.
FIGURE 4.30
199
Configuring and Troubleshooting Parental Controls
You can select from a series of game ratings or block specific content types.
FIGURE 4.31
9. To specify program limits, click Allow and Block Specific Programs. Select the (Username) Can Only Use the Programs I Allow option and select the programs to be permitted. Then click OK. 10. When you are finished, click OK to confirm your settings and return to the User Controls dialog box.
TIP Other game rating systems are available You can select other game rating systems from the initial parental control window where you select the user you want to control. A series of rating systems including several Pan European Game Information systems is available, together with links to their websites. You must use the same ratings system for all users.
Configuring Activity Reports The Parental Controls feature enables you to view a report of what your child has done at the computer. This report is useful in case you need to modify the parental control settings. The report includes the following items: . Web Browsing—Shows the top 10 websites visited and the 10 most recent websites that
the child attempted to visit but was blocked by the filter. This also shows any Web overrides, files successfully downloaded, and files blocked from downloading. . System—Shows the recent times the child was logged on and the times he was blocked
from logging on. . Applications—Shows the programs the child ran or was prevented from running.
200
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings . Gaming—Shows the games the child played or was prevented from playing. . Email and Instant Messaging—Summarizes the email and instant messages that the child
sent or received. . Media—Summarizes media player (songs, videos played, and so on) activity.
To enable activity reporting, select the radio button labeled On, Collect Information About Computer Usage in the main Parental Controls window shown previously in Figure 4.28. There are no other configurable options for activity reporting.
REVIEW BREAK You have looked at the desktop interface and Parental Controls feature included with Windows Vista. You should be aware of the following major points: . Windows Vista provides the new Aero and Aero Glass desktop interfaces. These inter-
faces have strong hardware requirements that may prevent them from running properly on some older computers. . The Appearance and Personalization category in Control Panel enables you to config-
ure Aero and its various options. You have also looked at several problems that can prevent Aero from displaying properly and several ways you can troubleshoot them. . The Parental Controls feature in Windows Vista enables you to place restrictions on a
child’s browsing the Web, logon times, available programs, and games.
Configuring Windows Internet Explorer Objective:
Configure Windows Internet Explorer. Browsers are fast becoming a ubiquitous interface to every type of resource—from Hypertext Markup Language (HTML) files, eXtensible Markup Language (XML) data, and FTP files, to network shares, network and local printers, local files and folders, and more. For the 70-620 exam, you are expected to have the skills to configure and troubleshoot various aspects of Internet Explorer 7, including tabbed browsing, pop-ups, add-ons, and Really Simple Syndication (RSS) feeds, and access a variety of network resources using Internet Explorer. Table 4.3 lists the methods you should know.
201
Configuring Windows Internet Explorer
TABLE 4.3
Accessing Resources Via a Browser
Command
Sample URL
Usage
http://
http://www.microsoft.com
Downloads HTML files from Internet Web servers and displays the file within the browser.
https://
https://www.microsoft.com
Downloads HTML files using Secure Socket Layer (SSL) so that the information exchanged is secured.
ftp://
ftp://ftp.microsoft.com
Downloads a file from an FTP server.
File://
File://server/share/folder/file
Opens the file specified from a network server.
http://
http://printserver/printers
Displays a list of the printers that are being shared by a computer configured with IIS for sharing printers.
http://
http://PrintServer/Printer
Opens the printer page for the printer.
EXAM ALERT Handling passwords with a URL How to type a URL correctly is a favorite exam question. When you open a file using FTP, for example, you might need a password. Because Internet Explorer doesn’t support password prompting, you must supply that password within your URL. In this example, the correct syntax is ftp://user:password@ftpserver/url-path.
Internet Explorer 7 improves upon its predecessor, Internet Explorer 6, in many ways. You can keep a series of websites open using tabbed browsing, search for information directly from the address bar, disable use of pop-up windows, use RSS feeds, modify the appearance of the browser window to suit your own preferences, and so on. You can type search phrases into the Search text box to the right of the main address bar (note “Live Search” in Figure 4.32 referenced in the following section). Internet Explorer 7 also improves browsing security greatly over the problem-plagued Internet Explorer 6. Chapter 5, “Configuring Windows Security Features,” discusses configuring Internet Explorer 7’s security settings.
Configuring Tabbed Browsing Users familiar with tabbed browsing in other browsers such as Firefox have come to realize the convenience of having multiple browser sessions open in the same window. To open a new tab in Internet Explorer, just click the small blank tab visible to the right of the active tabs. As shown in Figure 4.32, a new tab initially displays a page that summarizes the advantages of tabbed browsing.
202
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
Tabbed browsing in Internet Explorer enables you to have multiple websites open in a single browser window.
FIGURE 4.32
The following sections outline several activities you can perform using tabbed browsing: . Open, close, and refresh tabs—Right-clicking an active tab enables you to perform the
activities shown in Figure 4.33. You can close the current tab, close all tabs except the current tab, refresh the current tab or all tabs, or create a new tab.
Each tab has a right-click menu that enables you to perform several activities.
FIGURE 4.33
203
Configuring Windows Internet Explorer . View thumbnails of tabs—Click the small tab at the left end of the tabs (circled in Figure
4.34) to display all open tabs as thumbnail images. This feature is known as Quick Tabs. To view any of the tabs in full-screen view, simply click its thumbnail.
The Quick Tabs feature enables you to view multiple tabs as thumbnails.
FIGURE 4.34
. Save a set of tabs to reopen later—When you close Internet Explorer with more than one
tab open, a dialog box appears, asking you if you want to close all tabs. Click Show Options to display the options shown in Figure 4.35. To open the same tabs later, select the Open These the Next Time I Use Internet Explorer check box.
You can open the same set of tabs later in Internet Explorer.
FIGURE 4.35
204
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings . Save a group of tabs as a favorite—Access the Favorites Center by clicking the yellow star
with the green “+” (circled in Figure 4.36). On the pop-up menu that appears, select Add Tab Group to Favorites. Type a name for the tab group, select a subfolder within Favorites if desired, and then click Add. You can access this group later simply by selecting the group name from the Favorites list, accessed from the yellow star at the far left end of the tabs bar.
You can create favorite groups of tabs for later use.
FIGURE 4.36
. Disable tabbed browsing completely—From the Tools menu, select Internet Options. On
the General tab, in the Tabs section, click Settings and then clear the check box labeled Enable Tabbed Browsing (see Figure 4.37). Then close and restart Internet Explorer.
Blocking Pop-ups Initially included with Internet Explorer 6 on Windows XP with SP2, the Pop-up Blocker eases the frustrations of many Internet users. You can configure how the Pop-up Blocker feature functions by opening the Tools menu, selecting the Pop-up Blocker submenu, and then clicking Pop-up Blocker Settings. The Pop-up Blocker Settings dialog box opens, as shown in Figure 4.38. (This option is not available if the Pop-up Blocker is off.) The other option in this submenu is to Turn Off the Pop-up Blocker (if it is turned on) or Turn On the Pop-up Blocker (if it is turned off).
205
Configuring Windows Internet Explorer
The Tabbed Browsing Settings dialog box enables you to configure additional options related to tabbed browsing or disable tabbed browsing entirely.
FIGURE 4.37
You can allow pop-ups from certain websites by editing the Pop-up Blocker Settings.
FIGURE 4.38
To allow pop-ups from a certain website, type the URL in the Address of Website to Allow text box, and then click the Add button. You can select whether to display the information bar and play a sound when a website’s pop-up is blocked. The Filter Level list box enables you to select whether to block all pop-ups (High), most pop-ups (Medium), or just the pop-ups that are from non-secure sites (Low).
206
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
When Internet Explorer blocks a pop-up, it displays an information message bar beneath the line of tabs. You can click this bar to temporarily allow pop-ups, always allow pop-ups from this site, or configure additional pop-up settings including suppressing the information bar.
Customizing Internet Explorer Internet Explorer contains a large range of features that you can configure to customize your browsing experience. We look at customizing search providers, managing add-ons, and configuring RSS feeds in this section.
Customizing Search Providers By default, Internet Explorer uses Microsoft Live Search as its search provider when you first open it (note “Live Search” in Figures 4.32 to 4.33). You can change the default search provider or add additional search providers to this box. Step by Step 4.11 shows you how.
STEP BY STEP 4.11 Configuring Search Providers 1. In Internet Explorer 7, click the small drop-down triangle immediately to the right of the Search field. From the pop-up menu that appears, select Find More Providers. 2. Internet Explorer opens a new tab displaying the Add Search Providers to Internet Explorer 7 web page. Click the desired search provider. 3. The Add Search Provider dialog box shown in Figure 4.39 appears. If you want to use this provider as your default, select the check box provided. Then click Add Provider.
The Add Search Provider dialog box enables you to add search providers and set a default provider.
FIGURE 4.39
4. To change or remove search providers, select Change Search Defaults from the pop-up menu. In the Change Search Defaults dialog box shown in Figure 4.40, select the desired search provider and click Set Default to make it the default search provider. Click Remove to remove this provider from the list.
207
Configuring Windows Internet Explorer
You can change your default search provider or remove search providers from the Change Search Defaults dialog box.
FIGURE 4.40
After you have added search providers, it is simple to perform a search with an alternate provider. Simply click the same small drop-down triangle and select the desired search provider. This procedure enables you to change the search provider temporarily without changing the default provider.
Customizing the Toolbars Microsoft has changed the default appearance of the toolbars at the top of the Internet Explorer window. However, you can customize Internet Explorer by selecting options from the Tools menu, as shown in Figure 4.41: . Delete Browsing History—Opens the Delete Browsing History dialog box, which enables
you to delete temporary Internet files, cookies, history, form data, or passwords that are stored on your computer. Click Delete All to delete all these items from your computer. . Pop-up Blocker—Enables you to manage the pop-up blocking feature, as already
discussed. . Phishing Filter—Warns you about fake websites that attempt to hijack your personal
information such as credit card numbers, social security numbers, and so on, which is a practice known as phishing. You can check the current website, report it if it appears to be suspicious, modify filter settings, or turn off the filter completely. . Manage Add-ons—Enables you to manage additional components added to Internet
Explorer. This feature is discussed in the section, “Managing Add-Ons.”
208
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings . Work Offline—Saves copies of websites so that you can access information when offline.
This feature helps to save costs when you are using a provider that charges according to connect time. . Windows Update—Connects to the Microsoft Windows Update website. This was dis-
cussed in Chapter 3, “Upgrading to Windows Vista.” . Menu Bar—Displays the menu bar, which is hidden by default.
TIP Temporarily displaying the menu bar You can choose to temporarily display the menu bar by pressing the Alt key after opening Internet Explorer. Press this key a second time to hide the toolbar. If you use this option to display the menu bar, it is in effect only for the current browser session.
. Toolbars—Enables you to display additional toolbars, including favorites, history, feeds,
links, and status bar. Only the status bar is displayed by default. . Internet Options—Brings up the Internet Properties dialog box, components of which
are discussed elsewhere in this chapter and Chapter 5.
Click Tools to obtain a series of customizing options.
FIGURE 4.41
TIP Another way to access these options You can also access several of the options discussed here by right-clicking a blank area on the toolbar. The pop-up menu displayed also enables you to customize the icons appearing on the command bar by displaying all text labels selective text (the default) or icons only. You can also add or remove commands from this area.
209
Configuring Windows Internet Explorer
Printing Web Pages One of the most annoying features in previous versions of Internet Explorer was the fact that some web pages printed incompletely, with text on the right side of the page being clipped off. Internet Explorer has improved printing by introducing several new items, accessible from the Print icon and the Page icon on the command bar. Click the small triangle to the right of the printer icon to access a pop-up menu that enables you to preview the printed page or modify page setup options. You can specify the paper size, source, orientation (portrait or landscape), and margin size. You can suppress display of the headers and/or footers by clearing the text in the respective text boxes. You also can access printer properties by clicking the Printer button. New to Internet Explorer 7 in Vista is the XPS Document Writer. This appears as a printer option on the Print dialog box and enables you to create an XML Paper Specification (XPS) document, which is a portable file type that you can view on any computer with an XPS viewer installed. This feature enables you to display a web page or other document online exactly as it appears on your monitor. Such documents can be shared, sent to others, or published so that they do not display differently when printed or on computers with different monitors. When you select this printing option, you receive a Save As dialog box that enables you to save the web page to a folder of your choice.
Managing Add-Ons Add-ons are optional additional features that you can install in Internet Explorer to provide additional functionality. They generally come from sources on the Internet and are sometimes installed without your knowledge. At other times, the Internet source will ask you for permission to install an add-on before proceeding. However, if you deny this permission, the web page may not display as intended by their creators.
TIP Running Internet Explorer without any add-ons You can run Internet Explorer without any add-ons by clicking Start, All Programs, Accessories, System Tools, Internet Explorer (No Add-ons). Internet Explorer opens and displays a page that informs you that all add-ons are turned off.
Internet Explorer enables you to manage add-ons in several ways. Follow Step by Step 4.12 to manage add-ons.
STEP BY STEP 4.12 Managing Internet Explorer Add-Ons 1. In Internet Explorer 7, click Tools, Manage Add-ons, Enable or Disable Add-ons. The Manage Add-Ons dialog box shown in Figure 4.42 opens.
210
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
You can view and manage Internet Explorer add-ons from the Manage Add-Ons dialog box.
FIGURE 4.42
2. Select one of the following options from the Show drop-down list: . Add-ons that have been used by Internet Explorer—Lists all add-ons that have been downloaded to Internet Explorer at any time since you installed Windows plus those that were pre-approved by Microsoft or your computer manufacturer. . Add-ons currently loaded in Internet Explorer—Displays only those add-ons used by a currently or recently viewed web page. This list appears by default when you first open the Manage Add-ons dialog box. . Add-ons that run without requiring permission—Displays all add-ons that were pre-approved by Microsoft, your computer manufacturer, or your Internet service provider (ISP). These add-ons have generally been digitally signed and run without displaying any permissions message box. Any unsigned add-ons carry the message (Not verified) in the Publisher column. . Downloaded ActiveX Controls (32-bit)—Displays 32-bit ActiveX controls only. While these controls add functionality to Internet Explorer, malicious software writers often use them for undesirable purposes. 3. If an add-on appears to be causing problems or preventing a web page from displaying properly, select it and click Disable. 4. To delete an ActiveX control, select it and click Delete. Note that you cannot delete pre-installed ActiveX controls or other types of add-ons; you can only disable them. 5. To locate additional add-ons for Internet Explorer, click Tools, Manage Add-ons, Find More Add-Ons. Follow the instructions and links on the Add-Ons for Internet Explorer web page that appears.
211
Configuring Windows Internet Explorer
NOTE Deleting downloaded add-ons When you download and install an add-on, it is included in the program list found in Control Panel Add or Remove Programs. You can uninstall these add-ons from this location. You cannot delete any other types of add-ons other than ActiveX controls as explained here.
Configuring Really Simple Syndication (RSS) Feeds RSS presents a simple means in which you can receive up-to-date information on the Internet at times that are convenient to you. Internet Explorer 7 automatically detects when websites are offering RSS feeds and displays a toolbar icon. Click this icon to view the feed and obtain information about subscribing to it. You can subscribe to feeds from various websites and bring headlines from different sources together in one common list from which you can browse content without the need to access each site. When the Feeds toolbar icon turns orange, you are on a site that offers RSS feeds. Click this icon to view current headlines and subscribe to the feed. You can also specify that a sound be played when a feed is received. When you subscribe to feeds, Internet Explorer adds them to the Feeds section of the Favorites list. To review the feeds to which you are subscribed, click the star icon at the topleft corner of Internet Explorer and then click Feeds. Follow Step by Step 4.13 to configure how RSS feeds are downloaded and displayed.
STEP BY STEP 4.13 Managing RSS Feeds 1. In Internet Explorer 7, click Tools, Internet Options. 2. Select the Content tab, and then click Settings under Feeds at the bottom of the dialog box. The Feed Settings dialog box shown in Figure 4.43 opens.
You can manage RSS feeds from the Feed Settings dialog box.
FIGURE 4.43
212
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings 3. Configure the following items as required: . Automatically Check Feeds for Updates—You can enable Internet Explorer to download feeds automatically at the interval selected from the drop-down list. Available intervals range from 15 minutes to one week. . Advanced options—You can choose to automatically mark feeds as read, play a sound when feeds arrive, or modify the view in which a feed is displayed. 4. Click OK when you are finished, and then click OK to close the Internet Properties dialog box (or click Apply to apply the settings and keep the Internet Properties dialog box open).
TIP Viewing feeds in HTML format The Turn On Feed Reading View option shown in Figure 4.43 controls whether feeds display in XML or HTML format. By default, Internet Explorer displays these feeds in XML. By clearing this check box, you can configure Internet Explorer to display feeds in HTML format.
Configuring AutoComplete Settings The Content tab of the Internet Properties dialog box also enables you to configure properties related to the AutoComplete feature. This feature remembers entries you have typed before on web page addresses, forms, usernames, and passwords. To configure the types of settings that are remembered, click Settings in the AutoComplete section. The AutoComplete Settings dialog box shown in Figure 4.44 opens. Simply select the types of items for which you want to use AutoComplete, and clear the settings to prevent new items from being stored.
You can specify which types of entries are completed from the AutoComplete Settings dialog box.
FIGURE 4.44
213
Key Terms
Summary After you have installed Windows Vista, you can configure many settings to improve the functionality of the operating system and troubleshoot issues that might arise. Various problems can cause Vista to fail to start or to display a Blue Screen of Death (BSOD) on startup. Vista provides the Startup Repair Tool (SRT) that helps you diagnose and correct startup problems automatically. You can also start Vista in several advanced options including the Last Known Good Configuration and Safe mode. You can invoke the System Restore feature to take your system back to a previous stable configuration and undo a harmful setup. Microsoft has provided the new Aero and Aero Glass interface with Vista to enable an enhanced desktop experience. The Aero Glass interface possesses enhanced hardware requirements, and is not available with Vista Home Basic. You saw how to enable Aero and Aero Glass, as well as to revert to a desktop similar to that of previous Windows operating systems, and we discussed several options that you can follow when a user’s desktop does not display as expected. The new Parental Controls feature enables parents to control a child’s computer capabilities to protect the child from undesirable actions. You can control the types of websites visited, limit logon hours, restrict the types of games that can be played, and limit the applications that will run. You can also view a report on the child’s computer activities. Internet Explorer 7 introduces new browsing capabilities. You saw how to configure tabbed browsing, control the appearance of pop-up windows, customize search providers and toolbars, manage add-ons, and control Really Simple Syndication (RSS) feeds.
Key Terms . activity reports . add-ons . Aero . Aero Glass . Blue Screen of Death (BSOD) . Computer Management console . Device Manager . Last Known Good Configuration . Parental controls . pop-up windows
214
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings . Really Simple Syndication (RSS) . Safe mode . Start menu . Startup Repair Tool (SRT) . System Restore . tabbed browsing . taskbar . Windows Easy Transfer
Apply Your Knowledge The 70-620 exam expects you to be able to troubleshoot startup and hardware configuration problems, configure and troubleshoot the Aero and Aero Glass interfaces, configure Parental Controls, and customize Internet Explorer. You can supplement the exercises and questions with hands-on practice of configuring the various options for connecting to the Internet and displaying Web content and RSS feeds. You need at least two computers, together with an Internet connection, to perform these exercises.
Exercises 4.1 Creating a Restore Point In this exercise, you create a restore point that is needed by the SRT to perform a successful driver restore. You should have a dual-boot computer that can be running two instances of Windows Vista or one of Vista and one of either Windows 2000 or Windows XP to perform Exercises 4.1 and 4.2. Estimated time: 15 minutes (not including operating system installations). 1. Boot the computer to Windows Vista. 2. Click Start, All Programs, Accessories, System Tools, System Restore. 3. Click Continue on the User Account Control message box that appears. 4. On the System Restore dialog box that appears, select the System Protection link near the bottom of the dialog box.
215
Apply Your Knowledge 5. The System Protection tab of the System Properties dialog box opens. You should see two disks listed under Available Disks. Ensure that the check boxes for both disks are selected and then click Create. 6. Type a simple description for the restore point, and then click Create. 7. When you are informed that the restore point was created successfully, click OK and then close the System Properties and System Restore dialog boxes.
4.2 Startup Repair Tool In this exercise, you work with the SRT by setting up a dual-boot system and renaming an essential driver to observe the functioning of the SRT. You need to first modify the permissions on the Vista Windows folder so that the exercise runs properly, because Microsoft has created a new account identified only by its security identifier (SID) of S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464. This involves changing the owner of the Windows\System32\Drivers folder and modifying its default permissions. You are performing this exercise strictly to observe how the SRT works; the computer on which you perform this exercise should not contain any important data unless you have backed up this data previously. Perform this exercise on the same computer used for Exercise 4.1. Estimated time: 30 minutes. 1. Boot the computer to the Windows 2000/XP operating system and log on as an administrator. 2. In My Computer, navigate to the \Windows\System32 folder, where refers to the partition on which you installed Vista. Be very careful that you are in the correct partition. 3. To modify Vista filenames, even outside of Vista, you must change some file attributes. Start by right-clicking the Drivers folder and choosing Properties. 4. Select the Security tab and then click Advanced. 5. On the Owner tab of the Advanced Security Settings dialog box, note that the owner is given as the SID mentioned at the start of this exercise. Change the owner to the Administrators group, select the check box labeled Replace Owner on Subcontainers and Objects, and then click OK. 6. Back in the Security tab of the Drivers Properties dialog box, add Full Control to the allowed permissions, and then click Apply. 7. Select the General tab. If the Read Only attribute is selected, clear this check box, click OK, and then select the option to apply the changes to this folder, subfolders, and files. 8. Double-click the Drivers folder to open it. 9. Locate partmgr.sys and rename this file to partmgr.xxx. This is an essential disk driver file. 10. Restart the computer and boot to Vista. 11. Windows Boot Manager will display the error shown in Figure 4.45. It identifies the problematic file: \Windows\System32\drivers\partmgr.sys.
216
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings
When an essential startup file is corrupted, Windows Boot Manager displays an error similar to this one.
FIGURE 4.45
12. Insert the Vista DVD-ROM, and then press the Reset button. 13. Press the spacebar when instructed to boot from the Vista DVD. 14. Press Enter to start Windows Setup. 15. After a few minutes, the Install Windows dialog box appears. Choose the proper language settings, and then click Next. 16. Click Repair Your Computer. 17. On the System Recovery Options dialog box, ensure that Microsoft Windows Vista appears, and then click Next. If Vista is not listed, click Load Drivers. 18. Click Startup Repair. Startup Repair displays a dialog box as it attempts to repair the problem. 19. After a few minutes, you should receive a Startup Repair message box instructing you to restart your computer to complete the repair. Click Finish to restart the computer. 20. Your computer should restart into Vista. If not, reboot to Windows XP and rename \Windows\ System32\drivers\partmgr.xxx back to partmgr.sys.
217
Apply Your Knowledge
Exam Questions 1. You are working as a network consultant at Joe’s Garage. Joe has entrusted his personal computer to you to have a new wireless network adapter driver installed. He tells you that he has extremely important data on the drive and asks that you be very careful to not lose it. After reassuring Joe, you install the new driver. After you reboot, Joe’s computer gives you a Blue Screen of Death error before you reach the logon screen. You attempt another reboot and are stopped again. How can you resolve the error and keep your promise to Joe?
❍ A. Restart the computer in Safe mode and use the Rollback feature in Device Manager to revert to the previous driver.
❍ B. Restart the computer using the Last Known Good Configuration option. ❍ C. Restart the computer with the Windows Vista DVD-ROM. When the Install Windows screen appears, select Repair Your Computer. When the System Recovery Options screen appears, select Startup Repair.
❍ D. Restart the computer with the Windows Vista DVD-ROM. When the Install Windows screen appears, select Repair Your Computer. When the System Recovery Options screen appears, select System Restore and then select yesterday’s restore point. 2. You have copied a useful legacy program from your old computer running Windows 98 to your new Windows Vista computer. However, the program does not run properly when you attempt to start it. What should you do to run this program on Vista? (Each correct answer is a complete solution. Choose two.)
❍ A. Right-click the program and choose Properties. On the dialog box that appears, select the Previous Versions tab and select the option to run the program in Compatibility mode for Microsoft Windows 98/Windows Me.
❍ B. Right-click the program and choose Properties. On the dialog box that appears, click the Compatibility tab and select the option to run the program in Compatibility mode for Microsoft Windows 98/Windows Me.
❍ C. In the Programs and Features section of Control Panel, select Use an Older Program with this Version of Windows. On the Program Compatibility Wizard, select the Microsoft Windows 98/Windows Me mode.
❍ D. In the Appearance and Personalization section of Control Panel, select Change the Theme. Then choose the Windows Classic theme and click Apply.
218
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings 3. Peter uses a computer that runs Windows 2000 Professional. The computer has a 200GB hard drive that is configured with three partitions. Peter wants to explore the possibility of using Windows Vista Ultimate, so he installs this operating system on the second partition as a clean install. When he attempts to access the Internet from Vista by means of the computer’s PCI network adapter, he is unable to reach any websites. He reboots the computer to Windows 2000 and is able to access the Internet. After rebooting the computer to Vista he accesses Device Manager and notices a yellow exclamation mark on the network adapter. What should he do?
❍ A. Right-click the network adapter and select Update Driver Software. ❍ B. Right-click the network adapter and select Enable. ❍ C. Right-click the network adapter and select Scan For Hardware Changes. ❍ D. Open Control Panel Windows Update and select the Check for Updates option. 4. You are a desktop support technician for a major company that is in the process of rolling out Windows Vista computers to their employees. An employee named Diane has a computer on which she would like to run Windows Vista Business. The computer currently runs Windows XP Professional and is equipped with 1GB RAM, a 75GB hard drive, a 2.4-GHz processor, and a video card with 64MB video RAM. You upgrade this computer from Windows XP Professional to Windows Vista Business. Diane reports that nothing happens when she attempts to switch tasks using the Windows+Tab key combination. She would like to use the Flip 3D feature that she has read so much about, so she returns to you and asks you what she should do. What do you suggest?
❍ A. Go to the Display Properties applet and select the Aero Glass theme. ❍ B. Go to Device Manager and install an updated driver for the video card. ❍ C. Replace the video card with a new one that has 128MB video RAM. ❍ D. Tell her to use the Alt+Tab key combination instead. ❍
E. Tell her to upgrade the computer to Windows Vista Ultimate.
5. You are the network administrator for JAMS, Inc., a graphics and advertising firm. The graphics department has just purchased new monitors and video adapters for their computers. One ambitious fellow, George, has already installed the adapter and connected the monitor. George logs on to the computer and finds that the display is distorted. He is calling you for help. George thinks that the monitor and adapter he is using is the problem and wants to replace it. You first want to troubleshoot the video adapter, but you cannot see the screen well enough to read the text. What can you do to fix George’s problem? (Choose all that apply.)
❍ A. Restart the computer and select the Last Known Good Configuration. ❍ B. Restart the computer and select Enable Low-Resolution Video. ❍ C. In Device Manager, uninstall the existing video adapter driver. ❍ D. In Device Manager, click the Action menu and select Scan for Hardware Changes.
219
Apply Your Knowledge 6. You have configured Parental Controls on your Windows Vista Home Premium computer that your middle school–age daughter, Erin, uses for school projects. You have set the computer up to run only a limited number of programs she uses and have also configured Internet usage and games limits. Erin complains that she needs to use a program on a disk that her teacher has distributed to complete an assignment and that the assignment will not run. You need to enable this program without compromising the limits you have set on her access to the computer. What should you do to accomplish this objective with the least amount of administrative effort?
❍ A. Enter your username and password on the error message dialog box that Erin receives when she attempts to run the program.
❍ B. Right-click the program, select Run As, and enter your username and password. ❍ C. Enable the Erin Can Use All Programs option. ❍ D. Install the program and then select it in the program list that appears on the Application Restrictions page. 7. You are assembling a handout of information for members of your workgroup and are printing material from various websites to include in your handout. You do not want the printed material to display the website name and path in the header and footer areas. What should you do?
❍ A. From the Page Setup dialog box, delete the information that appears in the Header and Footer text boxes.
❍ B. From the Print dialog box, select Microsoft XPS Document Writer. ❍ C. From the Tools menu, select Menu Bar. Then open the View menu and clear the Header and Footer options.
❍ D. Copy the material to a Word document and then manually delete the header and footer. 8. You are working with several applications on your computer, which runs Windows Vista Business. You use the Flip 3D feature to navigate among the various windows open on the computer and find this feature highly useful. After opening an older application that used to work properly on your old Windows XP Professional computer, you observe that the Flip 3D feature is no longer working. You would like to ensure that Flip 3D always works. What should you do?
❍ A. Reconfigure the application compatibility settings. ❍ B. Open the theme settings in the Display applet and select Windows Vista. ❍ C. Update the drivers for the video card. ❍ D. Add additional RAM to the computer.
220
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings 9. In Internet Explorer, you browse to an interesting website that offers a new add-on for download. So you download and install this add-on, and then restart Internet Explorer. However, you are unable to access any websites even though Internet Explorer starts properly. What should you do?
❍ A. Reset Internet Explorer to default settings. ❍ B. Run Internet Explorer using the No Add-Ons option. ❍ C. Uninstall the add-on from the Manage Add-Ons dialog box. ❍ D. Uninstall the add-on from Control Panel Programs and Features. 10. For several years, you have been subscribing to RSS feeds on a Windows 2000 Professional computer that has been running Internet Explorer 6. You have recently purchased a new Windows Vista Business computer and transferred all your files and settings to this computer. On viewing the RSS feeds in Internet Explorer 7 on your new computer, you notice that they are displaying in a fixed style sheet in XML format. You would prefer to view the feeds in the HTML format you are used to seeing on your old computer. What should you do to ensure that the feeds always appear in this format?
❍ A. Disable the Turn On Feed Reading View option. ❍ B. Reset Internet Explorer to default settings. ❍ C. Disable the XML DOM Document add-on. ❍ D. Search for a suitable add-on. Download, install, and enable this add-on. ❍
E. Click the title of the feed.
Answers to Exam Questions 1. B. Because you never actually logged on to the computer, you could restart the computer and use the Last Known Good Configuration. If you were able to log on and then received a stop error, you would probably need to use the Device Driver Rollback feature, but it isn’t necessary in this case. Answers A, C, and D are incorrect because they are measures you might take if you were unable to use the Last Known Good Configuration method, for whatever reason. For more information, see the section, “Using Alternative Startup Strategies.” 2. B and C. You can right-click the program and choose Properties. On the dialog box that appears, select the Compatibility tab and select the option to run this program in Compatibility mode for Microsoft Windows 98/Windows Me. Alternately, you can run the Program Compatibility Wizard and select the same option from this location. An application’s Properties dialog box does not have a Previous Versions tab; this tab is found on files and folders that have been modified. This feature enables you to go back to an older version of a file. It does not enable you to run a program in compatibility mode, so answer A is incorrect. Enabling the Windows Classic theme emulates the
221
Apply Your Knowledge desktop appearance of older Windows versions but does not enable a program to run in Compatibility mode; therefore, answer D is incorrect. For more information, see the section, “Configuring Application Compatibility.” 3. A. Peter should right-click the network adapter and select Update Driver Software. The yellow exclamation point indicates that the network adapter does not have drivers installed. Selecting Update Driver Software starts the Hardware Update Wizard and initiates a search for the appropriate driver. He might need to reboot to Windows 2000 to access the network adapter manufacturer’s website to download a suitable driver before he runs this wizard. Peter would receive the Enable option only if the network adapter were disabled; in this case it would be displayed with a red “X” icon, so answer B is incorrect. The Scan for Hardware Changes option does not install new drivers, so answer C is incorrect. Windows Update provides updates for Windows Vista and other Microsoft software products. It does not provide Windows Vista-compliant drivers, so answer D is incorrect. For more information, see the section, “Troubleshooting Hardware Devices.” 4. C. Diane needs to replace the video card with a new one that has 128MB video RAM. To run the Aero Glass theme, which includes the Flip 3D feature, she needs to have a video card that has at least this amount of memory. She cannot simply go to the display properties and select Aero Glass; this theme is not present in the available options unless her computer has the proper video card, so answer A is incorrect. Installing an updated driver for the video card will not help because the video card has insufficient RAM, so answer B is incorrect. The Alt+Tab key combination does not invoke Flip 3D, so answer D is incorrect. Diane does not need Vista Ultimate to use Aero Glass; Vista Business is adequate, so answer E is incorrect. For more information, see the section, “Understanding Hardware Requirements for Running Aero.” 5. B, C, and D. The process you need to go through is to first get to a point where you can see the screen. You can do this by rebooting the computer and selecting the Enable Low-Resolution Video (640×480) option. This uses a basic video driver to operate the display adapter. After you can see what you are doing, you then need to uninstall the video adapter driver that George replaced in the Device Manager. After the video adapter driver has been uninstalled, you can scan for new hardware changes, which will begin the installation of the video adapter driver. The only incorrect answer was A, which was to use the Last Known Good Configuration. However, you cannot use the Last Known Good Configuration because George had already successfully logged on to the computer. For more information, see the sections, “Using Alternative Startup Strategies,” and, “Using Device Manager to Troubleshoot Hardware Devices.” 6. D. You should install the program, and then select it in the program list that appears on the Application Restrictions page. This list specifies all programs installed on the computer and enables you to select which ones your child is permitted to run. If she attempts to run a program that is not approved, she receives an error message. While this error message contains text boxes that permit you to enter your credentials, you would need to do this each time she needs to run the program. Therefore, this method takes more administrative effort, and answer A is incorrect. Likewise, using the Run As option takes more administrative effort, so answer B is incorrect. Enabling the Erin Can Use All Programs option would permit her to run other programs that you do not want her to access, so answer C is incorrect. For more information, see the section, “Configuring Parental Restrictions.”
222
Chapter 4: Configuring and Troubleshooting Post-Installation System Settings 7. A. You should delete the information that appears in the header and footer text boxes in the Page Setup dialog box. This prevents these items from being printed. The Microsoft XPS Document Writer produces an exact copy of the document and facilitates its printing in the exact form it appears in on the web page. This option would include the header and footer information, so answer B is incorrect. Unlike Microsoft Office products, the View menu does not include options for turning off headers and footers, so answer C is incorrect. Copying the page to a Microsoft Word document would allow you to delete the header and footer. However, doing this might render the information in a different format than desired and present problems for reformatting it; therefore, answer D is incorrect. For more information, see the section, “Printing Web Pages.” 8. A. You should reconfigure the application compatibility settings. Application compatibility settings for older applications may disable the Aero Glass desktop. If this step does not work, you might need to contact the application’s vendor for an upgrade. The Windows Vista theme setting must already have been selected, or you would not have seen the Flip 3D feature before opening the application, so answer B is incorrect. The current video drivers and RAM on your computer must be adequate for enabling Flip 3D because you have been able to use this feature, so answers C and D are incorrect. For more information, see the section, “Aero Glass is Not Running.” 9. D. You should uninstall the add-on from Control Panel Programs and Features. While you cannot uninstall add-ons that were pre-installed on your computer, you can uninstall add-ons that you have downloaded. Click Start, Control Panel, and in the Programs category, select the Uninstall a Program option. This starts the Programs and Features applet with a page labeled Uninstall or Change a Program. Resetting Internet Explorer to default settings will not undo the effect of the problematic add-on, so answer A is incorrect. While you could run Internet Explorer with the No Add-ons option by selecting this option from the Start, All Programs, Accessories menu, many websites would be unable to display properly; therefore, answer B is incorrect. It is not possible to uninstall an add-on from the Manage Add-Ons dialog box; you can uninstall ActiveX controls only from this location. Therefore, answer C is incorrect. For more information, see the section, “Managing Add-Ons.” 10. A. To ensure that RSS feeds always appear in the HTML format, you should disable the Turn On Feed Reading View option. This option is found on the Feed Settings dialog box, which is accessed from the Feeds section of the Internet Properties dialog box, Content tab. The default settings are to view feeds in the XML format, so resetting Internet Explorer to default settings does not work; therefore, answer B is incorrect. Disabling the XML DOM Document add-on does not change the format of RSS feeds, so answer C is incorrect. You do not need to search for an additional add-on, so answer D is incorrect. Clicking the title of the feed only changes the feed to HTML format on a temporary basis, so answer E is incorrect. For more information, see the section, “Configuring Really Simple Syndication (RSS) Feeds.”
223
Apply Your Knowledge
Suggested Readings and Resources The following are some recommended readings on the subject of post-installation configuring and troubleshooting of desktop settings, Parental Controls, and Internet Explorer in Microsoft Windows Vista: 1. Course . Microsoft Official Curriculum course 5115, Installing and Configuring the
Windows Vista Operating System. Module 3, Configuring Post-Installation System Settings and Module 8, Configuring Internet Explorer 7.0. Information available at http://www.microsoft.com/learning/syllabi/en-us/5115aprelim.mspx 2. Websites . Microsoft. System requirements for Windows Vista. http://support.microsoft.com/
kb/919183 . Microsoft. Windows Vista Rules for Enabling Windows Aero. http://
www.microsoft.com/whdc/device/display/aero_rules.mspx . Microsoft. Troubleshoot audio problems in Windows Media Center. http://
windowshelp.microsoft.com/Windows/en-US/Help/e7b016f9-915c-47e6-b101c4c6deb4b7af1033.mspx . Microsoft. Stay up to date with Microsoft RSS feeds. http://www.microsoft.com/
windows/rss/default.mspx . Hardmeier, S. RSS—A Whole New Way to Communicate. http://www.microsoft.com/
windows/ie/community/columns/rss_communicate.mspx . Microsoft. Migrating to Windows Vista Through the User State Migration Tool.
http://technet.microsoft.com/en-us/windowsvista/aa905115.aspx . Microsoft. Learn About the Features. http://www.microsoft.com/windows/
products/windowsvista/features/safer.mspx. (includes Parental Controls and Internet Explorer 7)
This page intentionally left blank
5
CHAPTER FIVE
Configuring Windows Security Features Objectives This chapter helps you to prepare for the exam by covering the following Microsoft-specified objectives for the Installing and Upgrading Windows Vista section of Exam 70-620, TS: Microsoft Windows Vista, Configuring:
Configure and troubleshoot User Account Control. . User Account Control improves on security by enabling users to run without administrative privileges and provides a prompt when a user performs an action such as installing an application that requires administrative privileges. Microsoft expects you to know how to configure several policies related to User Account Control and troubleshoot problems that can arise.
Configure Windows Defender. . Windows Defender helps keep your computer secure by preventing installation of spyware, adware, and other unwanted software that unscrupulous websites can attempt to install. Support staff and administrators must ensure that users’ computers remain secure from these types of threats.
Configure Dynamic Security for Internet Explorer 7. . Users who access Web resources through Internet Explorer can inadvertently expose their computer to security problems. Ranging from hackers to malware, the exposure on the Internet can cause serious problems to a computer. Not only does an administrator need to protect the computer, but also the privacy of the user’s personal information.
Configure security settings in Windows Firewall. . You can configure the types of communication that are allowed to pass in either direction across Windows Firewall. In the 70-620 exam, Microsoft tests your ability to limit communications to only those that are desired, as well as troubleshoot communication problems that can occur across the firewall.
Outline Introduction
228
Configuring Security Settings in Windows Firewall
273
229
Configuring Windows Firewall
274
Managing User Accounts
230
Managing Local Group Accounts
234
Basic Windows Firewall Configuration
274
236
Using the Windows Firewall Snap-in
279
Configuring Multiple Firewall Profiles
280
Local User and Group Accounts
Belonging to a Windows Server Domain
Configuring and Troubleshooting User Account Control 238 Features of User Account Control Application Prompts
239 242
Configuring User Account Control
244
User Account Control Policies
246
Configuring Windows Defender
250
Scanning for Malicious Software
251
Configuring Windows Defender Actions
253
Updating Windows Defender
256
Using Software Explorer
257
Configuring Dynamic Security for Internet Explorer 7
259
Configuring Internet Explorer Zones
259
Configuring Protected Mode in Internet Explorer
261
Configuring Content Advisor
262
Configuring the Phishing Filter
266
Understanding Advanced Security Options
268
Privacy Tab Settings
268
Content Tab Settings
270
Advanced Tab Settings
271
Configuring Group Policy and Windows Firewall
282
Summary
284
Key Terms
284
Apply Your Knowledge
285
Exercises
285
Exam Questions
288
Answers to Exam Questions
295
Suggested Readings and Resources
298
Study Strategies You should practice configuring and implementing each of the security features discussed in this chapter. Perform the Step by Step and end-of-chapter exercises and experiment further with the settings to observe what they do so that you know when you should implement each of these features. . Attempt to perform actions that display UAC prompts from a nonadministrative user account. Then configure Group Policy for UAC to automatically deny elevation requests for standard users. Log back on as a non-administrative user and attempt to perform these actions again. . Configure a program to always run with elevated privileges, and then configure another program to request elevated privileges. Then run these programs from an administrative account and from a non-administrative account. . Experiment with the options in Windows Defender. Turn off Windows Defender and note the messages that you receive. . Internet Explorer security options affect how the computer treats a Web resource. Use a Windows Vista computer connected to the Internet. Connect to any website. Add the website to the Restricted Sites category. Close the browser, open again, and attempt to connect to the website. Configure the various security and content options and attempt to connect to the website again. Attempt to connect to websites offering material that is blocked by the various content categories. . Configure Windows Firewall to block all incoming connections and then attempt to connect to network and Internet resources. Configure the various exceptions, repeat your attempts, and observe what happens. Become familiar with the most important exceptions and the circumstances in which you should allow these exceptions.
228
Chapter 5: Configuring Windows Security Features
Introduction Whether a computer is used as a standalone, a portable laptop, a member of a workgroup, or a member of a domain, it can be subject to security breaches. All it takes is a person who can physically or remotely access the computer and gain rights to view or change its files. The risk can range from theft of proprietary information, to a breach of personal privacy, to malicious attacks on the computer’s operating system. The following is a brief summary of popular attack methods used by hackers and crackers in recent years (for additional information, see any recent book dedicated to computer security, including those listed in the “Suggested Readings and Resources” section of this chapter): . Denial of service (DoS)—This includes any type of attack that disrupts access to services
and resources that a user should be able to reach. In its usual form, a computer is so overwhelmed by such a large number of data packets that it is unable to perform normal activities. A distributed denial of service (DDoS) attack is similar except that the attacker uses a series of computers to attack and overwhelm the target. . Spoofing—This attack impersonates a legitimate user or website to make you believe
that data being sent is genuine. Phishing, or the attempt to deceive you into sending confidential information such as bank account or credit card numbers to attackers, is a type of spoofing. . Man-in-the-middle—An attacker intercepts traffic by entering the mid-point of a legiti-
mate communication and attempts to deceive the parties at both ends into believing that they are communicating with each other, when they are actually communicating with the attacker. TCP/IP hijacking is a type of this attack, in which the attacker uses source-routed IP packets to take over a TCP session between two legitimate computers. . Password guessing—Programs exist that attempt to sniff passwords being transmitted
across a network, either by searching dictionaries for commonly used passwords or utilizing a brute force method to try all possible combinations of letters, numerals, and special characters until a password is found. . Social engineering—An attacker can take advantage of the kind nature of individuals by
masquerading as a user such as a manager who has forgotten her password or other authentication information. . Malicious software—A malicious or compromised website or email message can distrib-
ute software programs that are intended to cause harm to any user accessing the website or message. Viruses, worms, and Trojan horses were the earliest types of malicious software (malware) employed by attackers. In recent years, more insidious forms of malware have arisen, including back doors, keystroke loggers, logic bombs, adware, spyware, and rootkits.
229
Local User and Group Accounts
Windows Vista incorporates a number of security technologies to protect it from these and other types of attacks. First introduced in Windows XP SP2, the Windows Security Center shown in Figure 5.1 enables you to configure many of these features.
FIGURE 5.1 You can configure many security options from the Windows Security Center.
This chapter looks at how you configure and troubleshoot User Account Control, Windows Defender, Internet Explorer security options, and Windows Firewall.
Local User and Group Accounts Although Microsoft did not include configuration of user and group accounts in its Exam 70620 objectives, an introductory knowledge of how these accounts operate is important in understanding security configuration and how features such as User Account Control operate. For this reason, this section includes an introduction to this topic.
NOTE Principle of Least Privilege In developing Windows Vista, Microsoft stressed the Principle of Least Privilege, which in its simplest form states that programs and services should run in a user account that is granted the minimum privileges required to run properly. Microsoft has simplified the processes behind running a computer with a standard user account by granting such accounts the privileges to do tasks such as modifying time and power settings while limiting actions that malicious software can perform. Internet Explorer 7 runs in Protected mode by default, and Windows services operate under a profile that enables only the minimum privileges required to run properly. Furthermore, most drivers run in user mode, which grants them fewer privileges than they formerly received by running in kernel mode. For more information on the Principle of Least Privileges, refer to Applying the Principle of Least Privilege to Windows Vista in the “Suggested Readings and Resources” section at the end of this chapter.
230
Chapter 5: Configuring Windows Security Features
Managing User Accounts Every person who logs on to Windows Vista must do so with a user account. If the user account has been granted greater rights and permissions, the user can access resources on that computer that otherwise would be inaccessible. Problems arise in productivity when users are not able to access the resources that they need to conduct their jobs. One alternative is to allow users to have unrestricted rights to the computers and resources. However, this can result in an even greater loss of productivity because a user could unintentionally render the computer inoperable in any number of ways. The trick to effective management is to create a balance between rights granted to users and those denied. One of the top concerns regarding user rights is file and folder access, especially the rights configured for shared folders or on computers that are shared by multiple users. Because multiple people potentially can access a file at any time on shared folders and shared computers, a misapplied right can compromise a file containing private data. Best practices dictate that users should never be granted rights individually. Instead, you should create a group to be granted that permission even if only one user needs the access to the resource. This practice makes it easier to duplicate the types of rights and permissions that users require to perform certain functions. For example, if you are managing a workgroup for a tax accounting business, you can expect that seasonally the work will increase. With extra work, additional tax preparers will require the same access as a current tax preparer. To make certain that all the additional tax preparers have the same rights to the shared folders, you can add them to the group (or combination of groups) that includes the current tax preparers. This method certainly beats trying to re-create the same rights for each file, folder, and other resources that a user account was granted individually. Any person who owns an object can grant or deny permissions to other users or groups. If permission is not specifically and explicitly granted to a user or the groups to which the user belongs, then the permission is implicitly denied. For example, if you create a group called SALES that has Read privileges to the Sales Literature folder and Full Control privileges to the Sales Database folder and its contents, a user who is not a member of the SALES group (and has not been granted any other rights explicitly or through other group membership) is not allowed to read the files in the Sales Literature folder or access the Sales Database folder contents.
CAUTION Denial wins out When permission is explicitly denied to a user or group, even if the user is a member of another group where the same permission is explicitly granted, the Deny permission overrides all others, and the user will not be allowed access.
231
Local User and Group Accounts
Permissions are stored as access control entries (ACE) in a discretionary access control list (DACL). (ACEs can be placed in the object’s system access control list [SACL], which determines what will trigger an audit event.) Whenever a user requests authorization to use a prohibited object or resource, the user sees an Access Is Denied message. When a local user account attempts to use a domain-based network resource, the user is disallowed unless the resource has been configured to allow Anonymous access. To enable anonymous access, you can select ANONYMOUS LOGON, which is a built-in special group, from the Select Users or Groups dialog box, which is displayed in Figure 5.2.
FIGURE 5.2 ANONYMOUS LOGON enables any user to have the authorization to use the resource.
Best Practices to Lock Down Windows Vista To ensure you have the greatest amount of security applied to your computers, you can follow these best practices: . Install the latest updates and service packs. You can download these from http://windowsupdate. microsoft.com. . Turn on Automatic Updates, as discussed in Chapter 3, “Upgrading to Windows Vista.” Step by Step 3.5 showed you how to configure this feature. . Turn on Windows Firewall for all Internet connections unless you connect to a private network that then connects to the Internet and contains its own firewall. You learn about this feature later in this chapter in the section, “Configuring Security Settings in Windows Firewall.” . Ensure that Pop-up Blocker is turned on, as discussed in Chapter 4, “Configuring and Troubleshooting Post-Installation System Settings.” (continues)
232
Chapter 5: Configuring Windows Security Features (continued)
. When a member of a domain, use domain user accounts only. . Rename the Administrator account. Open Local Security Policy applet in Control Panel. Edit the Local Policy \ Security Options policy for Accounts: Rename Administrator Account. . Disable the Guest account by opening Control Panel User Accounts Category and selecting Change an Account. Click Guest and select the option to turn off the Guest account. . If using a domain, disable File and Printer sharing for workstations. If already installed, right-click each of the network connections in the Network and Sharing Center and select Properties. Remove File and Printer Sharing for Microsoft Networks. Also configure Group Policies User Configuration node, Administrative templates, Network, Network Connections node to enable the policy Prohibit Adding or Removing Components for a LAN or Remote Access Connection. Chapter 6, “Configuring Network Connectivity,” discusses the Network and Sharing Center. . In a domain environment, you should utilize a consistent permissions management scheme. Microsoft recommends that you place Accounts Global groups, then place these groups in Domain Local groups. Finally you can grant or deny Permissions (AGDLP) to the Domain Local Groups. The section, “Belonging to a Windows Server Domain” later in this chapter briefly introduces domain groups. . Implement a certification authority (CA). . Require smart cards for logon and force logoff when the card is removed. . Use BitLocker drive encryption on all portable computers. Chapter 9, “Configuring and Troubleshooting Mobile Computing,” discusses security on portable computers. . For kiosks and publicly available computers, limit the GUI to include required applications; disable Control Panel, the Command prompt, and the Run command; and restrict all unnecessary software. . Restrict software from running from any website in the Internet Zone. . Use virus scanning software and update the virus data files daily. . Implement a password policy to require complexity. Set a maximum password duration of 30 days and a minimum password duration of 10 days. . Implement Account Lockout policy for a three-password threshold, to remember the invalid password attempts for one hour and to reset the counter after one hour. . Disable user accounts when users go on extended leave or leave the company, rather than delete them. This enables you to retain the users’ configuration settings, rights and permissions, group memberships, and so on. In addition, retaining the account ensures that any encrypted files can be recovered if a data recovery agent was never configured. . Never grant rights to the Anonymous Logon, Guests, Everyone, Interactive, Dialup, or Network groups. Instead, grant rights to the Authenticated Users group, which requires the user to provide valid credentials before being granted access to computer resources. Alternatively, create a special group and grant explicit rights to the group, which will be passed on to users specifically placed in that group.
233
Local User and Group Accounts
You can use User Accounts and Family Safety in Control Panel to create new local user accounts. Chapter 4 demonstrates the use of this feature. To create and configure both user and group accounts, you should use the Computer Management console, shown in Figure 5.3, which you can open by clicking Start, right-clicking Computer, and selecting Manage from the shortcut menu. You will need to provide administrative permission to use this feature.
FIGURE 5.3 Computer Management provides administration options for both local user accounts and local groups.
NOTE Password never expires When you create or edit a user account, you are provided with an option to configure for Password Never Expires. This setting overrides any password settings in Group Policy or Local Security Policy. You should use this option only for user accounts that are used for applications that must interact as a user with the operating system.
Local users receive their rights to access resources by being explicitly granted permissions or by being members of local groups that have been granted permissions. You cannot add local users to domain global groups—you can add domain users only to global groups in a domain. However, you can always add a domain global group as a member of a local group if Windows Vista Business, Enterprise, or Ultimate is a member of the domain.
TIP Using whoami to troubleshoot user rights You can troubleshoot user rights using whoami, a commandline utility that is installed by default in Windows Vista. To see the rights that the current user has, type whoami at the command prompt. You can see everything in verbose mode by typing whoami /all. This utility displays all groups, even the built-in groups that do not appear under Member Of property sheets, which you can use to track down a misconfigured right.
234
Chapter 5: Configuring Windows Security Features
Managing Local Group Accounts Windows Vista provides a number of default local groups. Table 5.1 lists the more commonly accessed default local groups. The Authenticated Users and Interactive groups are special built-in groups described later in Table 5.2. Their inclusion in the Users group allows any user who has submitted correct credentials to be considered a member of the Users group. Removing the Authenticated Users and Interactive groups from the Users group will cause problems and potentially prevent access to the computer from applications such as Remote Assistance. TABLE 5.1
Default Local Groups in Windows Vista
Local Group
Default Access
Default Members Locally
Administrators
Unrestricted access to the computer
Administrator
Backup Operators
Access to run Windows Backup and sufficient access rights that override other rights when performing a backup
N/A
Guests
Limited only to explicitly granted rights and restricted usage of computer
Guest
Network Configuration Operators
Access to manage the network configuration of the computer, such as TCP/IP properties
N/A
Power Users
Not used directly with Vista; included only for backwards compatibility with previous Windows versions
N/A
Remote Desktop Users
Limited to accessing the computer via a remote desktop connection plus any explicitly granted rights and restricted usage of computer
N/A
Users
Limited to use of the computer, personal files and folders, and explicitly granted rights
All newly created users. NT Authority\Authenticated Users special built-in group NT Authority\ Interactive special built-in group
Best practices state that you should never change the default rights and members of a default local group or built-in group. Instead, you should create your own specific groups, provide them with explanatory names and descriptions, and then grant or deny those groups the necessary rights. To create a group, open the Local Users and Groups console (by accessing it in Computer Management, or typing lusrmgr.msc in the Run dialog box and pressing Enter, or adding the Local Users and Groups snap-in in the Microsoft Management Console [MMC]).
235
Local User and Group Accounts
Right-click Groups and select New Group from the shortcut menu. The New Group dialog box opens, as shown in Figure 5.4.
FIGURE 5.4 The New Group dialog box enables you to name, describe, and add members to a group.
When you name the group, you will be restricted from using special characters (\ / “ [ ] : | < > + = ; , ? * @), the same as you would when creating a new user. To add new members to the group after it is created, you can right-click the group and select Add to Group from the shortcut menu. When you delete a local group, you delete the group and its permissions but not any users who are members of the group. You are not allowed to modify the built-in system groups directly in the Local Users and Groups console because their membership is not based on who the user is, but on how the user was able to access the computer. A user is dynamically included in these groups after satisfying the authentication required by the group. You are able to add or deny rights and permissions to built-in special groups. To prevent severe problems when granting rights, never deny nor increase rights to these groups—create your own special group and deny or grant the rights to that group and then add the users to whom these rights should be given. Table 5.2 discusses several of the more common built-in special groups. TABLE 5.2
Built-in Special Groups in Windows Vista
Built-in Group
Default Access
Default Members Locally
Anonymous Logon
Not provided any default access rights
User accounts that Windows Vista cannot authenticate locally
Authenticated Users
Not given any default access rights
All users with valid local user accounts on this computer (continues)
236
Chapter 5: Configuring Windows Security Features
TABLE 5.2 Continued Built-in Group
Default Access
Default Members Locally
Creator Owner
Designated full control over resources created or taken over by a member of the Administrators group
Administrators group
Dialup
No specific rights; this group is not shown on systems without configured modems and dial-up connections
All users who have connected to the computer with a dial-up connection
Everyone
Full control is the default permission granted for all files and folders on NTFS volumes; you must remove this permission to implicitly deny access
All users who access the computer
Interactive
No specific rights
All users who have logged on locally to the computer
Network
No specific rights
All users who have established a connection to this computer’s shared resource from a remote network computer
Belonging to a Windows Server Domain As outlined in Chapter 1, “Introducing Windows Vista,” you can join computers running the Business, Enterprise, or Ultimate editions of Windows Vista to an Active Directory domain hosted on domain controllers running Windows 2000 Server, Windows Server 2003, or Windows Server 2008. To do so, ensure that you are connected to the network hosting the domain controllers. Then follow Step by Step 5.1.
STEP BY STEP 5.1 Joining a Windows Server domain 1. Access the System Properties dialog box and click Change Settings in the Computer Name, Domain, and Workgroup Settings section of this dialog box. 2. Click Continue on the User Account Control prompt that appears. 3. In the System Properties dialog box, click Change to access the Computer Name/Domain Changes dialog box. 4. Under Member of, select Domain and type the name of the domain to be joined and then click OK, as shown in Figure 5.5.
237
Local User and Group Accounts
FIGURE 5.5 The Computer Name/Domain Changes dialog box enables you to join an Active Directory domain.
5. When requested, supply the credentials of an account with Domain Administrator privileges in the selected domain. 6. You will have to restart the computer to complete this action.
After you have joined the domain, you should use only domain user accounts to log on to your computer, as already mentioned. In addition, you can use domain-based user and group accounts to configure security on your Windows Vista computer. This enables you to utilize domain groups with the following group scopes: . Global—You can use these groups to contain users, computers, and other global groups
from the same domain. They are generally employed to organize users who have similar functions and therefore similar needs on the network. For example, you might include all help desk staff in one global group, all accounting staff in another global group, and so on. . Domain local—You can use these groups to contain users, computers, and groups from
any domain in the Active Directory forest. Note that a forest is a group of domains that share a common trust relationship, schema, and configuration. They are most often used for granting permissions for resources and as such may be employed to grant access to any resource in the domain in which they are created. Therefore, it is logical for a domain local group to include global groups that contain all users who have a common need for a given resource. . Universal—Similar to the way you use domain local groups, you can employ these groups
to grant permissions to resources. However, this group scope enables you to grant access to any resource in the Active Directory forest, rather than just a single domain. A universal group can include users, computers, and global groups from any domain.
238
Chapter 5: Configuring Windows Security Features
You can add any of these domain groups directly to local groups on your Windows Vista computer to grant access to files and folders on your computer. In addition, the following default domain groups are automatically added to local groups when you join your computer to a domain: . The Domain Admins global group is added to the Administrators local group. . The Domain Guests global group is added to the Guests local group. . The Domain Users global group is added to the Users local group. . All domain user accounts in the computer’s domain or any trusted domain are added to
the Authenticated Users special built-in group. For more information on Active Directory domains, user accounts, and group accounts, refer to MCSE Exam 70-294 Exam Prep: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure in the “Suggested Readings and Resources” section.
TIP Permissions applied to domain users When you grant permissions to domain users, the best practice is to use the AGDLP method. This means that you place Accounts in Global groups. Then you place the Global groups into Domain Local groups, to which you grant (or deny) Permissions.
Configuring and Troubleshooting User Account Control Objective:
Configure and troubleshoot User Account Control. In previous versions of Windows, many users became frustrated with the inability to perform many common tasks and therefore ran their computers with an administrative user account, often the default Administrator account created when Windows was installed. These users received total system privileges as required for installing and configuring applications, modifying system configuration, running background system tasks, installing device drivers, and performing other system configuration actions. Such a practice left the computers open to many types of attack by malware programs such as those mentioned at the start of this chapter.
239
Configuring and Troubleshooting User Account Control
Administrators and technical support personnel in a corporate environment were often left in a dilemma. They could grant users administrative privileges, which can result in users changing settings, either accidentally or deliberately, that disrupted computer or network performance or compromised security. Or they could limit user privileges, which often limited productivity because users were unable to perform basic tasks such as connecting to a wireless network or installing a printer driver. Windows Vista addresses this problem by introducing a new feature called User Account Control (UAC). Simply put, UAC requires users performing high-level tasks to confirm that they actually initiated the task. Members of the Administrators group are logged on with only normal user privileges and must approve administrative actions before such actions will run. Nonadministrative users must provide an administrative password. Providing administrative approval to run such tasks places the computer into Admin Approval mode.
Features of User Account Control UAC requests approval before running administrative tasks on the computer. UAC redefines what a standard user is permitted to do: Such a user can perform many basic functions that pose no security risk but previously required administrative privileges. In addition, it facilitates the act of providing administrative credentials when users needed to perform a higher-level task such as installing an application or configuring system settings. Furthermore, UAC makes administrative accounts safer by limiting tasks that can be performed without providing additional consent and requesting such consent for performing tasks such as system tasks that require higher privileges. Under UAC, all users (administrative or not) can perform tasks such as the following without supplying administrative credentials: . Viewing the system clock and calendar and configuring the time zone (but not chang-
ing the system time) . Modifying power management settings . Installing printers and hardware devices that an administrator has allowed using Group
Policy . Using Wired Equivalent Privacy (WEP) to connect to an approved wireless network . Creating and configuring an approved virtual private network (VPN) connection . Installing ActiveX controls from sites that an administrator has approved . Installing critical updates from Windows Update
240
Chapter 5: Configuring Windows Security Features
EXAM ALERT The Power Users group The tasks summarized here are similar to those granted to members of the Power Users group in previous Windows versions. Vista includes the Power Users group solely for backwards compatibility purposes. You do not need to add users to this group to perform these functions. Only add users to this group if required for running non-certified or legacy applications. To grant this group all the privileges provided in Windows XP, you must apply a default security template that modifies default permissions on system folders and the Registry. An exam choice that suggests adding a user to the Power Users group in Vista is most likely incorrect in all instances.
When authenticating a member of the Administrators group, Vista issues two access tokens: a full administrator token and a standard user token. The standard token is used for all actions that do not require administrative privileges, while the administrator token is used only when administrative privileges are required. Windows Vista informs you when a task requires elevated (administrative) privileges by displaying a shield icon such as those that appear in the Tasks column of the System applet shown in Figure 5.6. When you select one of these tasks, the screen dims and you receive a UAC prompt (also known as an elevation prompt), as shown in Figure 5.7. When you click Continue, the administrative access token grants you elevated privileges, enabling you to perform the task you have selected.
FIGURE 5.6 Vista uses a shield icon to inform you when a task requires administrative privileges.
The dimmed screen indicates that the UAC prompt is running in secure desktop mode (such as when the Ctrl+Alt+Delete prompt appears when logging on to a domain-based computer). This means that you must either approve or cancel the UAC prompt before you can continue performing any other task on the computer.
241
Configuring and Troubleshooting User Account Control
FIGURE 5.7 User Account Control displays this prompt to ask for approval of an administrative task.
A user who is not a member of the Administrators group receives only the standard user token when her access is authenticated. Such a user receives the UAC prompt shown in Figure 5.8, which requires that a password for an Administrator user account be entered.
FIGURE 5.8 User Account Control requests that an administrative user password be entered when displayed from a non-administrative user account.
CAUTION Protecting your computer Always ensure that the action that launches a UAC prompt is the one you want to perform. This is especially true if a UAC prompt appears unexpectedly, which could indicate a malware program is attempting to run. Should this happen, click Cancel, and the program cannot run. You should then scan your computer with one or more malware detection programs.
242
Chapter 5: Configuring Windows Security Features
If a background application that is minimized to the taskbar requires elevated privileges, the UAC prompt appears on the taskbar and blinks to draw attention. An example of where this would happen is in the downloading of an application from the Internet. When the download completes and approval for installation is required, the user can click the prompt and approve it. This enables the user to continue performing other tasks such as reading email without being interrupted by the UAC prompt.
NOTE UAC and Parental Controls In a family setting, UAC supplements the functions that a parent can control with the Parental Controls feature introduced in Chapter 4. Parents can give each child a user account with ordinary privileges. When a child needs to perform a task such as installing a program, the child receives a UAC dialog box asking for administrative approval and can ask a parent to enter administrative credentials. This enables the parent to approve programs a child wants to use as required.
Application Prompts UAC causes some third-party applications to display prompts when you attempt to run them. This helps to secure your computer because the prompt informs you of the program that is attempting to run so that you can verify that this is a program you really want to run. Click Continue to run the program or Cancel to exit. When running with an administrative account, a program with a legitimate digital signature that includes its name and publisher will display the prompt appearing in Figure 5.9.
FIGURE 5.9 User Account Control displays a prompt similar to this when you start a third-party program with a legitimate digital signature.
A non-administrative user running a similar program will receive the prompt appearing in Figure 5.10. If the third-party program does not have a digital signature that includes its name and publisher, the prompt that appears is stronger. It uses a yellow title bar and yellow shield, as shown in Figure 5.11. If a prompt with a strange program name appears, click Cancel to prevent it from running. When a non-administrative user runs a program without a digital signature, UAC asks for an administrative user password, as shown in Figure 5.12.
243
Configuring and Troubleshooting User Account Control
When run from a non-administrative user account, a third-party program with a legitimate digital signature displays this prompt.
FIGURE 5.10
When a program that does not have a digital signature attempts to run, UAC displays this prompt to an administrative user.
FIGURE 5.11
When a program that does not have a digital signature attempts to run, UAC displays this prompt to a non-administrative user.
FIGURE 5.12
244
Chapter 5: Configuring Windows Security Features
Configuring User Account Control Microsoft has provided several means of configuring applications and tasks to run with elevated privileges. Follow Step by Step 5.2 to perform a task with elevated privileges.
STEP BY STEP 5.2 Using Elevated Privileges to Perform a Task 1. Start the program or task that is displayed with a shield icon. The display dims, and the UAC prompt appears, as previously shown in Figure 5.7. 2. Verify that the UAC prompt is requesting privileges for the proper task. If desired, click Details for more information on the task. 3. Click Continue to start the task or application.
You can also mark an application to always run with elevated privileges. This situation may occur if the application developer has coded the program to access protected folders such as the %ProgramFiles% or %Systemroot% folders, or requires access to the Registry. Follow Step by Step 5.3 to mark an application to always run with elevated privileges.
STEP BY STEP 5.3 Configuring an Application to Always Run with Elevated Privileges 1. Ensure that you are logged on to the computer as a member of the local Administrators group. 2. Right-click the desired application and choose Properties. 3. On the Compatibility tab of the application’s Properties dialog box, select Run This Program as an Administrator, as shown in Figure 5.13. Then click OK.
CAUTION Default Administrator account If you are logged on using the default Administrator account created when you install Windows Vista, you do not receive any UAC prompts. Do not use this account except under emergency conditions. Best practices recommend that this account be disabled.
245
Configuring and Troubleshooting User Account Control
You can configure a program to run as an administrator from the Compatibility tab of its Properties dialog box.
FIGURE 5.13
You can also configure a program to request administrative privileges from its shortcut properties. When you do this, the program always displays a UAC prompt when started from its shortcut. Follow Step by Step 5.4 to do so.
STEP BY STEP 5.4 Configuring an Application to Request Elevated Privileges 1. Ensure that you are logged on to the computer as a member of the local Administrators group. 2. If necessary, drag a shortcut to the desktop. 3. Right-click the shortcut and choose Properties. 4. On the Shortcut tab, click the Advanced button. 5. On the Advanced Properties dialog box shown in Figure 5.14, select the Run as Administrator check box, and then click OK. 6. Click OK to close the shortcut Properties dialog box.
246
Chapter 5: Configuring Windows Security Features
FIGURE 5.14
The Advanced Properties dialog box for a shortcut enables you to always run the program as an
administrator.
NOTE Windows programs and shortcuts You cannot configure Windows components to always run in elevated privileges. For these programs, the options on the Compatibility tab shown previously in Figure 5.13 are unavailable (dimmed). For these components, you must perform the procedure outlined in Step by Step 5.3 so that the program displays a UAC prompt when started from the shortcut. Also note that if you start the program that you have configured in Step by Step 5.3 from the Start, All Programs menu, it does not display a UAC prompt and runs in normal mode.
User Account Control Policies Microsoft has provided a series of policies in Vista Group Policy that govern the behavior of UAC. These policies are available from the Group Policy Object Editor snap-in (available by typing gpedit.msc from the Run dialog box) or from the Local Security Policy snap-in. Follow Step by Step 5.5 to configure UAC policies.
STEP BY STEP 5.5 Using Local Security Policy to Configure UAC 1. Click Start, Control Panel, System and Maintenance, Administrative Tools, Local Security Policy. You can also click Start, Run, type gpedit.msc, and then press Enter. 2. Click Continue on the UAC prompt that appears. 3. On the Local Security Policy console, navigate to the Security Settings\Local Policies\Security Options node. 4. Scroll to the bottom of the policy list to view and configure the available policies, as shown in Figure 5.15.
247
Configuring and Troubleshooting User Account Control
Group Policy provides a series of policies that govern UAC behavior.
FIGURE 5.15
5. To configure a policy, right-click it and choose Properties. Choose Enabled or Disabled as required, and click OK. Two of the policies offer options from a drop-down list, as shown in Figure 5.16. You can also click the Explain tab for further information on each policy.
You can configure each policy or obtain more information from its Properties dialog box.
FIGURE 5.16
6. When finished, click OK.
Group Policy makes the following UAC policies available: . Admin Approval Mode for the Built-in Administrator—Governs the behavior of the built-
in Administrator account. When enabled, this account displays the UAC prompt for all actions requiring elevated privileges. When disabled, this account runs all actions with full administrative privileges. Disabled by default.
248
Chapter 5: Configuring Windows Security Features . Behavior of the Elevation Prompt for Administrators in Admin Approval Mode—Determines
the behavior of the UAC prompt for administrative users. This policy has the following options: . Prompt for Consent—Enables an administrator to select either Permit or Deny
when an action runs that requires elevated privileges. Select Permit to run the action with the highest possible privileges. This is the default. . Prompt for Credentials—Prompts for an administrative username and password
when an action requires administrative privileges. When selected, administrative users receive the prompt previously shown in Figure 5.8 for non-administrative users. . Elevate without Prompting—Enables the administrator to perform the action with-
out consent or credentials. In other words, the administrator receives Admin Approval mode automatically. This setting is not recommended for normal environments. . Behavior of the Elevation Prompt for Standard Users—Determines the behavior of the
UAC prompt for non-administrative users. This policy has the following options: . Prompt for Credentials—Displays a prompt to enter an administrative username and
password when a standard user attempts to run an action that requires elevated privileges. This is the default. . Automatically Deny Elevation Requests—Displays an Access is Denied message simi-
lar to that shown in Figure 5.17 when a standard user attempts to run an action that requires elevated privileges.
Non-administrative users receive an error when they attempt to run a program requiring administrative credentials when you have configured the policy to automatically deny elevation requests.
FIGURE 5.17
. Detect Application Installations and Prompt for Elevation—When enabled, displays a UAC
prompt when a user installs an application package that requires elevated privileges. When disabled, domain-based Group Policy or other enterprise-level technologies
249
Configuring and Troubleshooting User Account Control
govern application installation behavior. Enabled by default in an enterprise setting and disabled by default in a home setting. . Only Elevate Executables that are Signed and Validated—When enabled, performs public
key infrastructure (PKI) signature checks on executable programs that require elevated privileges before they are permitted to run. When disabled, no PKI checks are performed. Disabled by default. . Only Elevate UIAccess Applications that are Installed in Secure Locations—When enabled,
runs applications only with UIAccess integrity if situated in a secure location within the file system such as %ProgramFiles% or %Windir%. When disabled, the application will run with UIAccess integrity regardless of its location in the file system. Note that UI (User Interface) Access-application programs and accessibility tools used by developers to push input to higher desktop windows require the uiAccess flag to be equal to true; that is, uiAccess=true. Also the application program that wishes to receive the uiAccess privilege must reside on the hard drive in a trusted location and be digitally signed. Disabled by default. . Run All Administrators in Admin Approval Mode—When enabled, enforces Admin
Approval mode and other UAC policies. When disabled, all UAC policies are disabled, and no UAC prompts will be displayed. In addition, the Windows Security Center will notify the user when disabled and offer the option to enable UAC. Enabled by default. . Switch to the Secure Desktop When Prompting for Elevation—When enabled, displays the
secure desktop when a UAC prompt appears. When disabled, the UAC prompt remains on the interactive user’s desktop. Enabled by default. . Virtualize File and Registry Write Failures to Per User Locations—When enabled, redirects
application write failures for pre-Vista applications to defined locations in the Registry and the file system, such as %ProgramFiles%, %Windir%, or %Systemroot%. When disabled, applications that write to protected locations fail as was the case in previous Windows versions. Enabled by default.
CAUTION Don’t disable UAC completely If you disable the Run All Administrators in Admin Approval mode policy setting, you disable UAC completely, and no prompts will appear for actions requiring elevated privileges. This leaves your computer wide open for attack by malicious software. Do not disable this setting at any time! Note that the Windows Security Center will display a message from the notification area if you have disabled this setting.
250
Chapter 5: Configuring Windows Security Features
REVIEW BREAK You have looked at user and group accounts and the new UAC feature in Windows Vista and how these help to improve your computer’s security. . You can create local user and group accounts on a Windows Vista computer and assign
permissions to resources to these accounts. . Vista provides a series of built-in group accounts that carry a set of preconfigured priv-
ileges with them. . User Account Control (UAC) is a new security feature in Windows Vista that requires
users to provide administrative approval before performing tasks that operate in Admin Approval mode. . Non-administrative users attempting to perform administrative tasks receive a UAC
prompt that requires them to enter the username and password of an administrative account. . Group Policy enables you to control the behavior of User Account Control or turn it
off completely.
Configuring Windows Defender Objective:
Configure Windows Defender. First available in Windows XP as Windows AntiSpyware beta, Windows Defender is a program that protects your computer against the damaging effects of spyware. Spyware is malicious software that hides on your computer and performs nefarious activities such as the following: . Logging your Internet browsing habits and sending pop-up advertisements that reflect
these habits . Modifying your default Internet Explorer start page and search engine . Adding unwanted, difficult to remove toolbars to Internet Explorer and Windows
Explorer . Logging keystrokes that capture confidential information such as passwords
251
Configuring Windows Defender . Sending personal data such as credit card or Social Security numbers to unauthorized
parties . Taking control of your computer for purposes such as storing pirated data or sending
spam . Causing a general slowdown of computer performance with more frequent program or
system crashes Although you might think that Windows Firewall would block spyware downloads or UAC would display prompts when spyware attempts to install or run, most spyware programs piggyback onto otherwise legitimate programs that users download from the Internet. These problems are great enough that Microsoft decided to integrate Windows Defender into Vista as an important component of the operating system. Windows Defender provides an additional layer of protection against these types of malware. Windows Defender monitors your computer for telltale signs of spyware activity. When it finds problems, it attempts to block the actions of spyware and remove it from your computer. It displays alerts in the event that a serious problem requiring your immediate action should occur. In addition, it collects and sends information about the spyware infection to a Microsoft online community called SpyNet, which assists other users in detecting and combating spyware attacks.
TIP Using third-party anti-spyware programs Windows Defender can cooperate with third-party antispyware programs to provide an enhanced level of protection from malware. Other programs may have spyware definitions or scan techniques not yet built into Windows Defender. Spyware is pervasive and uses a large number of methods to infect computers, so it is always worthwhile to have more than one anti-spyware program running at the same time.
Scanning for Malicious Software Windows Defender automatically and continuously monitors your computer for signs of unwanted applications, concentrating on often-abused locations such as Registry keys and the Startup folder. By default, it also performs a quick scan of the most vulnerable locations of your computer daily at 2:00 AM. An application attempting to perform a modification in such a location will cause Windows Defender to display a prompt, asking the user either to allow or reject the modification. Follow Step by Step 5.5 to perform scans using Windows Defender.
252
Chapter 5: Configuring Windows Security Features
STEP BY STEP 5.5 Performing Windows Defender Scans 1. Start the Windows Defender configuration screen, which is shown in Figure 5.18, using one of the following procedures: . Click Start and type defender in the Search box. Then click Windows Defender in the program list. . Click Start, Control Panel, Security, Windows Defender. . Click Start, All Programs, Windows Defender.
You can configure Windows Defender options from the main Windows Defender dialog box.
FIGURE 5.18
2. To perform an immediate quick scan, click Scan. Windows Defender scans the most vulnerable locations of your computer and displays the results. 3. To perform a full or custom scan, click the triangle next to Scan. This displays a pop-up menu from which you can choose a full scan (scans all computer locations) or a custom scan (enables you to select the drives and folders to be scanned). 4. To display a history of recent Windows Defender activities, click History. The History panel shown in Figure 5.19 displays recent actions and provides links to items that are either permitted or restricted from executing. 5. When you are finished, close Windows Defender. It continues to monitor your computer in the background.
253
Configuring Windows Defender
FIGURE 5.19
The Windows Defender History screen enables you to view recent Windows Defender actions.
If Windows Defender finds software that it thinks is spyware on your computer, it displays an alert and offers you the following options: . Quarantine—Places the software in a restricted location on your computer from which
it cannot run. You can choose later to delete the software or move it back to a location from which it can run. Use this option if you are unsure whether the program is spyware. . Remove—Deletes the software permanently from your computer. . Ignore—Ignores the threat this time only. Windows Defender will detect the threat
again the next time it runs. . Always Allow—Enables the software to run and adds it to the Windows Defender
allowed list.
Configuring Windows Defender Actions Windows Defender comes with a complete set of configurable actions that govern how it monitors your computer. Follow Step by Step 5.6 to configure actions performed by Windows Defender.
254
Chapter 5: Configuring Windows Security Features
STEP BY STEP 5.6 Configuring How Windows Defender Works 1. Start the Windows Defender configuration screen using one of the methods described in Step by Step 5.5. 2. Click Tools, and then click Options to display the Options screen shown in Figure 5.20.
The Options screen enables you to configure how Windows Defender scans your computer.
FIGURE 5.20
3. From this screen, configure the following items as required: . Automatically Scan My Computer (recommended)—Enables you to configure the frequency, time, and type of scan (quick scan or full system scan) . Check for Updated Definitions Before Scanning—Ensures that Windows Defender always has the most recent spyware definitions from Microsoft. This check box is selected by default. . Apply Default Actions to Items Detected During a Scan—Automatically removes spyware or other types of malware at the conclusion of a scan. This check box is selected by default. . Default Actions—Enables you to select the type of action to be applied when items of high, medium, or low alert value are detected. . Real-Time Protection Options—Enables you to select from a list of security agents to be run. These options are all selected by default. See Table 5.3 for a description of the available security agents. . Advanced Options—Enables you to scan archived files and folders, use heuristics to detect potentially harmful or undesired behavior, or create a restore point before applying actions to detected items. These three actions are all selected by default. You can also use the Add button to specify
255
Configuring Windows Defender files or locations that Windows Defender should not scan or the Remove button to reenable files and locations for scanning. . Administrator Options—Enables you to choose whether to use Windows Defender at all (you should never deselect this option) and to allow all non-administrative users to use Windows Defender. 4. After you have configured these options, click Save and then click Continue in the UAC prompt to apply the configured actions. This returns you to the Tools display, where you can select additional options. 5. To manage the list of quarantined items, click Quarantined Items from the Tools display. If you have inadvertently quarantined an item that should be allowed, select it, click Remove, and click Continue in the UAC prompt that appears. 6. To manage the list of allowed items, click Allowed Items from the Tools display. If you have inadvertently allowed an item that should be prevented from running, select it, click Remove from List, and click Continue in the UAC prompt that appears.
TABLE 5.3
Available Security Agents in Windows Defender
Agent
What each agent monitors
Auto Start
Applications that execute automatically on Vista startup, either from the Registry hives or the various Startup folders. Spyware can add itself to these locations to execute without the user’s knowledge.
System Configuration (Settings) Security-related Windows settings. Spyware can modify these settings to allow it to run undetected. Internet Explorer Add-ons
Add-ons that run automatically from Internet Explorer. Spyware can masquerade as these add-ons. See Chapter 4 for more information.
Internet Explorer Configuration (Settings)
Browser security settings. Spyware can modify these settings without your knowledge.
Internet Explorer Downloads
Downloaded applications that provide functionality to Internet Explorer, such as ActiveX controls and software installation programs. Spyware is often included with these downloads.
Services and Drivers
Services and drivers interacting with applications and the Windows operating system itself. Spyware can masquerade as services or drivers to perform its actions.
Application Execution
Programs as they start up and execute on the computer. Spyware can attach itself to these programs and run in the background.
Application Registration
Files and other locations in the operating system in which applications including spyware can be inserted to execute.
Windows Add-ons
Software utilities integrated with Windows. Such utilities can collect information about the user and transmit it to unauthorized parties.
256
Chapter 5: Configuring Windows Security Features
NOTE Windows Defender is also available for older operating systems Microsoft makes Windows Defender available as a free download. It can work with computers running Windows 2000/XP/Server 2003 in much the same manner as described here for Vista.
Updating Windows Defender Microsoft publishes updates to spyware definition signatures on a regular basis. You might be informed of an available update by receiving a message Windows Defender Definitions haven’t been updated on starting Windows Defender. Follow Step by Step 5.6 to check for updates to Windows Defender.
STEP BY STEP 5.6 Checking for Updates to Windows Defender 1. Start the Windows Defender configuration screen using one of the methods described in Step by Step 5.5. 2. Click the triangle next to the Help (blue question mark) icon. From the pop-up menu that appears (see Figure 5.21), select Check for Updates and then click Continue on the UAC prompt that appears. 3. You receive a message in the notification area as Windows Defender checks for and installs any available updates. In a few minutes, you receive a message that either the updates were installed successfully or that no updates were available.
FIGURE 5.21
Windows Defender enables you to check for available updates.
257
Configuring Windows Defender
If you receive this message but are informed that no updates are available after following Step by Step 5.6, your computer may not be up-to-date from Windows Update. You might also need to uninstall the most recent definition file. For more information, refer to How to troubleshoot definition update issues for Windows Defender in the “Suggested Readings and Resources” section of this chapter.
Using Software Explorer Windows Defender also includes a program called Software Explorer, which enables you to view information about software programs and system state on your computer. It includes categories for startup programs, currently running programs, network connected programs, and Winsock service providers. Software Explorer provides the following information: . Auto Start—Specifies programs that are configured to start automatically on Windows
startup. . Startup Type—Specifies the location where automatically starting programs are regis-
tered; for example, a user’s or All Users Startup folder or various Registry hives. . Ships with Operating System—Indicates programs that were installed as Windows
components. . Classification—Specifies whether the program has been tested for risks to computer
security or personal privacy. . Digitally Signed By—Specifies whether the program has been signed and the name of
the publisher that signed it. You should locate additional details about unsigned software before deciding whether you trust such programs. Using Software Explorer you can perform actions such as either temporarily or permanently disabling a program from running at startup. Follow Step by Step 5.7 to run Software Explorer.
STEP BY STEP 5.7 Using Software Explorer 1. Start the Windows Defender configuration screen using one of the methods described in Step by Step 5.5. 2. Click Tools and then click Software Explorer. Software Explorer opens to the Startup Programs category as shown in Figure 5.22. 3. The list on the left side displays programs configured to start from various locations, including the User Profile, All Users, and the Current User and Local Machine hives of the Registry. To view information on a startup program, select it from the list. Information appears on the right side of Software Explorer.
258
Chapter 5: Configuring Windows Security Features
Software Explorer enables you to manage software on your computer.
FIGURE 5.22
4. To prevent a program from starting once only, select it and click Disable. Click Yes on the prompt that asks you whether you are sure you want to disable this program. 5. To remove it permanently from the Startup folder, click Remove and then click Yes on the confirmation prompt. 6. To view a list of programs currently running on the computer, select Currently Running Programs from the Category drop-down list. To shut a program down, select it and click End Process. To open Task Manager, which offers additional options for managing applications running on the computer, click Task Manager. Chapter 8, “Maintaining and Optimizing Systems That Run Windows Vista,” discusses Task Manager in more detail. 7. To view programs running from a network location, select Network Connected Programs from the Category drop-down list. You receive the same options available for other programs. 8. To view Winsock service providers, select it from the Category drop-down list. These are programs that perform fundamental networking and communication services for Windows and its running programs. This option does not have any configurable controls.
259
Configuring Dynamic Security for Internet Explorer 7
Configuring Dynamic Security for Internet Explorer 7 Objective:
Configure Dynamic Security for Internet Explorer. In Chapter 4 you learned about the new features of Internet Explorer 7 and how to perform basic configurations, including tabbed browsing, pop-up windows, interface customizations, add-ons, and Really Simple Syndication (RSS) feeds. Here, the discussion of Internet Explorer continues by showing you how to configure and troubleshoot Internet Explorer’s security settings. The term “dynamic security” refers to the multiple, interrelated security features that defend your computer against multiple attacks, including those introduced at the start of this chapter. Also included are technologies that protect users against malicious websites that attempt to steal users’ personal data using tactics such as phishing. You can configure your Internet Explorer’s security settings from the Internet Properties dialog box, which you can access by any of the following methods: . Click Start, right-click Internet Explorer, and then select Internet Properties. . Click Start, Control Panel, Security, and then select Internet Options. . Open the Security Center and select Internet Options from the list on the left side. . In Internet Explorer, select Tools, Internet Options.
Configuring Internet Explorer Zones The Security tab of the Internet Properties dialog box displays a list of website types called Internet zones, as shown in Figure 5.23. By default, all websites are included in the Internet zone. To move a website to another zone, select the desired zone and click Sites. On the dialog box that appears, type or copy the URL to the text box provided, click Add, and then click Close. You can return a site to the Internet zone by selecting it and clicking Remove. You can also limit the Local intranet and Trusted sites zones to secured sites whose URL starts with https: by selecting the check box labeled Require Server Verification (https:) for All Sites in This Zone.
260
Chapter 5: Configuring Windows Security Features
You can establish security settings separately to each type of website location.
FIGURE 5.23
CAUTION Trusted Sites zone The default security for the Trusted Sites zone is considerably lower than that for any of the other zones. Be absolutely certain that you trust a website implicitly before adding the site to this zone. If you are uncertain, you should leave the site in the Internet zone until you have investigated it thoroughly.
To configure the security settings for an Internet zone, click the zone to select it and then click the Custom Level button. The Security Settings dialog box opens, as shown in Figure 5.24, where you can select each individual security setting or set an Internet zone to a predefined group of security settings including Low, Medium-Low, Medium, Medium-High, and High. Unlike previous versions of Internet Explorer, the default Internet zone does not include the Low and Medium-Low options. The default security setting for this zone is Medium-High. To establish the privacy settings, click the Privacy tab. Here you can select a preset level for handling cookies. If you click the Sites button, you can block or allow privacy information to be exchanged with specific websites. To establish a different method for handling cookies in the Internet zone, click the Advanced button and select your preferred settings.
261
Configuring Dynamic Security for Internet Explorer 7
Individual security settings apply to an Internet zone for a custom security definition.
FIGURE 5.24
For security settings that govern specific behaviors in Internet Explorer, click the Advanced tab and scroll down the window to the Security category. Here, you can set options such as reducing problems caused by software downloaded and run from the Internet (do this by clearing the Allow Software to Run or Install Even if the Signature Is Invalid check box). One of the ways that you can secure Internet Explorer is to ensure that it is updated with the latest patches and service packs available. Microsoft is constantly providing new security updates. To look for these updates, open Internet Explorer, click the Tools menu and select Windows Update. This will take you to windowsupdate.microsoft.com, where you can download and install all types of updates for Windows Vista.
Configuring Protected Mode in Internet Explorer Internet Explorer 7 in Windows Vista introduces the concept of Protected mode, which provides enhanced levels of security and protection from malware. Protected mode prevents websites from modifying user or system files and settings unless you provide your consent. It displays a prompt similar to those discussed with UAC, asking you to confirm any action that attempts to download something to your computer or launch a program. The user can ensure that these actions are desired and prevent any action that would perform an activity such as installing undesired software. You can stop any such type of action and confirm the trustworthiness of the website before proceeding. Protected mode also prevents Internet Explorer from writing
262
Chapter 5: Configuring Windows Security Features
data to any location except the Temporary Internet Files folder unless you provide consent (such as during a desired download). Protected mode is enabled by default on all Internet zones except the Trusted Sites zone, and Internet Explorer confirms this fact by displaying a message Protected Mode: On in the status bar. If this message does not appear, you can turn Protected mode on by selecting the check box labeled Enable Protected Mode on the Security tab shown previously in Figure 5.23 and then restarting Internet Explorer. Internet Explorer might also display an information bar informing you that Protected mode is turned off in this instance.
EXAM ALERT Internet Explorer Protected Mode Protected mode prevents hackers from hijacking your browser for nefarious purposes such as installing malicious software, modifying startup routines, or redirecting your home page. Internet Explorer runs in Protected mode by default and informs you of this fact with a message in the status bar at the bottom of the browser window (see the figures referenced in the previous section). You should not turn this mode off; if it is turned off by mistake, you can reenable it by resetting Internet Explorer to default settings. An exam question might include a situation in which you must check the Protected mode setting.
Configuring Content Advisor Content Advisor enables you to control the Internet content that users can view on the computer. You can specify ratings that filter websites according to their content as established by various rating boards. By default, Internet Explorer 7 uses rules formulated by the Recreational Software Advisory Council (RSAC). You can also add content rules set out by other Internet content ratings bureaus that utilize rules formatted according the World Wide Web Platform for Internet Content Selection (PICS). Follow Step by Step 5.8 to enable and configure Content Advisor ratings.
STEP BY STEP 5.8 Enabling and Configuring Content Advisor 1. Access the Content tab of the Internet Properties dialog box using any of the methods described earlier in this section. 2. Under Content Advisor, click Enable, and then click Continue on the UAC prompt. The Content Advisor dialog box opens, as shown in Figure 5.25.
263
Configuring Dynamic Security for Internet Explorer 7
Content Advisor enables you to restrict Web browsing to sites rated at a level you approve.
FIGURE 5.25
3. To configure ratings levels, select a category from the list provided. You can select from the following categories: . Content that creates fear, intimidation, etc.—Provides three levels for limiting this content from no content to unlimited: None, which prevents any content of this type from appearing; Limited, which limits this content to situations of artistic, medical, educational, sports, or news; or Unrestricted, which removes all limits of this nature. . Content that sets a bad example for young children—Limits the extent of content that would encourage young children to perform harmful acts or dangerous behavior. . Depiction of alcohol use, depiction of drug use, depiction of gambling, depiction of tobacco use, depiction of weapon use, and incitement/depiction of discrimination or harm—Provides three levels for each of these categories similar to the fear and intimidation category. . Language—Limits the extent of vulgar language, profanity, and swearing. . Nudity—Limits the extent of nudity. . Sexual material—Limits the extent of sexual acts, including obscured or implied acts, kissing, and so on. . User-generated Content—Limits the appearance of content from sources such as chat rooms and message boards, including moderated locations. . Violence—Limits various types of violent acts. 4. To configure any of these ratings, drag the slider to the desired position.
264
Chapter 5: Configuring Windows Security Features 5. To specify websites that are always or never approved for viewing, select the Approved Sites tab. Type or copy the URL into the Allow This Web Site text box and then select Always or Never as required. 6. To configure user options, click the General tab and select the following check boxes as required (see Figure 5.26): . Users Can See Websites That Have No Rating—Enables users to access any Web pages that are not rated. Otherwise, users cannot access these pages. . Supervisor Can Type a Password to Allow Users to View Restricted Content—Enables users to view restricted content after you type the supervisor password for the Content Advisor. Click Create Password to provide a password that protects unauthorized users from modifying these settings or enables users to view restricted content.
The General tab of the Content Advisor dialog box enables you to configure several user options.
FIGURE 5.26
7. To view or modify systems used to rate Web pages, click Rating Systems to display the Rating Systems dialog box. Select from the listed rating systems, and then click OK. 8. To add a rating system, click Find Rating Systems to connect to a Web page containing links to additional rating systems. Then download the desired rating system to your computer and add it from the Rating Systems dialog box by clicking the Add button on this dialog box. 9. To add rules set out by PICS, click the Advanced tab. Type the name of the ratings bureau offering these rules, and then click Import under the PICS Rules section (see Figure 5.27). 10. When you are finished configuring content rules, click OK. If you haven’t entered a password from the General tab, the Create Supervisor Password dialog box appears. Type and confirm a password, and then provide an optional hint. This hint should help you remember the password without providing a clue to others who use the computer.
265
Configuring Dynamic Security for Internet Explorer 7
The Advanced tab of the Content Advisor dialog box enables you to specify additional ratings bureaus and import PICS rules.
FIGURE 5.27
After you have configured Content Advisor for the first time, the Enable button changes to Disable. If you need to modify the settings in Content Advisor, follow Step by Step 5.9.
STEP BY STEP 5.9 Modifying Content Advisor Settings 1. Access the Content tab of the Internet Properties dialog box using any of the methods described earlier in this section. 2. Under Content Advisor, click Settings and then click Continue on the UAC prompt. 3. In the Supervisor Password Required dialog box, type the password you entered when you first enabled Content Advisor, and then click OK. 4. In the Content Advisor dialog box, configure the required settings as described in Step by Step 5.8. Click OK when finished.
After you have enabled Content Advisor, any Web page that does not conform to the rules you have configured will display a message box similar to that shown in Figure 5.28, informing you of the rule or rules that were violated. To view the website, select one of the options shown, type the supervisor password you configured when you first enabled Content Advisor, and then click OK. You might want to use Step by Step 5.9 to modify content rules.
266
Chapter 5: Configuring Windows Security Features
You receive this message box if you attempt to view a Web page that does not conform to the content rules.
FIGURE 5.28
Configuring the Phishing Filter The practice of phishing refers to the creation of a fake website that closely mimics a real website and contains a similar looking URL, intending to scam users into sending confidential personal information such as credit card or bank account numbers, dates of birth, Social Security numbers, and so on. The attacker sends email messages that appear to originate from the company whose website was spoofed, so that users connect to the fake website and provide this type of information. The attacker can use this information for identity theft and other nefarious purposes. Microsoft built the phishing filter into Internet Explorer 7 to check websites for phishing activity using the following methods: . Comparing website addresses visited by users with lists of reported legitimate sites
saved on your computer . Analyzing website addresses against characteristics (such as misspelled words) used by
phishing sites. . Comparing website addresses with those in an online service that Microsoft operates
for immediate checking against a list of reported phishing sites. This list is updated several times each hour using material gathered by Microsoft or other industries or reported by users. Other global databases of known phishing sites are also used. If the phishing filter detects a known phishing site, Internet Explorer displays the address bar in red and replaces the website with a message informing you of the risks. You receive options
267
Configuring Dynamic Security for Internet Explorer 7
to close the website or continue to it. If the site is not a known phishing site but behaves in a similar manner to a phishing site, the address bar appears in yellow and a warning message appears. The user can report the site to the Microsoft Phishing Filter list or gather further information to report a false positive if the site turns out to be legitimate. If you suspect that a website you are visiting is a phishing site (whether the address bar has turned yellow or not), you can check the following items: . The URL appearing in the address bar—A spoofed domain name will appear similar to
the authentic one but contain misspelled or additional words. . URLs associated with page links—Although some of these might point to the authentic
site, others might point to the phisher’s site. Check the address that appears in the lower-left corner of the status bar when you hover your mouse over the link. . Advertisements or other content not associated with the legitimate site—Many phishers use
free Web hosting services that might add advertising or other content to the fake site. . Failure to use a secure (https) connection—Legitimate sites use secure connections for
transmitting all sensitive data. Internet Explorer displays a lock icon in the status bar for all https connections. If this icon does not appear, you are most likely dealing with a phishing site. . Addresses used for submitting forms—In general, the phisher site will contain a form that
you are asked to fill out with your personal information and click a button that says Submit or something similar. To check this address, select View, Source, and locate the value of the