Chapter 17
Working with Windows Vista

THE FOLLOWING COMPTIA A+ 220-902 EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

  • ✓ 1.1: Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista).
    • Features: 32-bit vs. 64-bit
    • Aero, gadgets, user account control, bit-locker, shadow copy, system restore, ready boost, sidebar, compatibility mode, administrative tools, defender, Windows firewall, security center
  • ✓ 1.2: Given a scenario, install Windows PC operating systems using appropriate methods.
    • Types of installations: Upgrade, Clean install, Image deployment
  • ✓ 1.4: Given a scenario, use appropriate Microsoft operating system features and tools.
    • Administrative: Local Users and groups, Local security policy, System configuration, Component services, Data sources, Print management, Windows memory diagnostics, Windows firewall, Advanced security
    • Other: User State Migration Tool (USMT), Windows Easy Transfer
  • ✓ 1.5: Given a scenario, use Windows Control Panel utilities.
    • Devices and Printers
  • ✓ 1.6: Given a scenario, install and configure Windows networking on a client/desktop.
    • HomeGroup vs. Workgroup
    • Home vs. Work vs. Public network settings
    • Firewall settings: Exceptions, Configuration, Enabling/disabling Windows firewall
    • Configuring an alternate IP address in Windows:
    • IP addressing, Subnet mask, DNS, Gateway
    • Network card properties:
    • Half duplex/full duplex/auto, Speed, Wake-on-LAN, QoS, BIOS (on-board NIC)

Whereas previous chapters examined the unique Windows 8/8.1 and Windows 7 operating system features worth noting, this one does the same for Windows Vista. In many ways, Windows Vista was a vast departure from Windows XP, and it failed to live up to the expectations set for it. Although it was not widely adopted, you must be familiar with it for the CompTIA A+ 220-902 certification exam.

Some of the tools covered in this chapter have been addressed in the previous chapters for Windows 8/8.1, Windows 7, and operating systems in general (Chapter 13, “Operating System Basics,” and Chapter 14, “Operating System Administration”), but you must know how they operate differently in Windows Vista.

Windows Vista Editions

Windows Vista was released in six different editions, four of which were made available in the retail channel: Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, and Windows Vista Ultimate. In addition to these, there is also Windows Vista Enterprise (offering more features than Business but fewer than Ultimate) and Windows Vista Starter (not marketed in countries such as the United States or the European Union, in which technology is more developed than in other places).

Table 17.1 offers a snapshot view of the five editions of Windows Vista made available domestically and some of the key features of each.

Table 17.1 Windows Vista editions and features

Edition Maximum RAM Supported (in 64-bit Versions) Maximum Physical CPUs Supported (Multiple Cores) Notes
Home Basic 8GB 1 Lacks support for Aero, cannot join a Windows Server domain, does not support Shadow copies
Home Premium 16GB 1 Includes support for HDTV, cannot join a Windows Server domain, does not support Shadow copies
Business 128GB 2 Does not support parental controls, premium games disabled by default
Enterprise 128GB 2 Includes BitLocker, not available in retail or OEM channels (volume licensing only), premium games disabled by default
Ultimate 128GB 2 Includes BitLocker, available in retail and OEM channels

There are 32-bit and 64-bit versions available for each of the editions listed here. Table 17.2 lists a number of features associated with the Windows Vista operating system that you should know about for the exam, along with a brief description of each.

Table 17.2 Windows Vista features

Feature Description
Aero The Aero interface was new with Windows Vista. The main difference between it and the previous Windows interface is the glass design that offers translucent windows.
Gadgets These are mini-programs that can be placed on the Desktop, which allows them to run quickly and allows the user to personalize the PC. Commonly used gadgets are the Calendar, Clock, and news/weather feeds.
Sidebar Gadgets can be placed on a bar known as the Sidebar that appears on the Desktop (Windows 7 kept the gadgets but did away with the Sidebar). The main selling point for using the Sidebar is that it can provide one location for common gadgets and be configured to be always visible.
User Account Control (UAC) New to Vista, UAC is intended to prevent unintentional/unauthorized changes to the computer, either by prompting for permission or requiring the administrator password.
BitLocker Referenced by CompTIA as “Bit-Locker,” Microsoft calls it BitLocker, and it allows you to use drive encryption to protect files, including those needed for startup and logon.
Shadow Copy The Volume Shadow Copy Service is used to create the copies that you can use should a file be accidentally deleted or overwritten.
ReadyBoost This feature allows you to use free space on a removable drive (usually USB) as virtual memory and speed up a system. For the option even to be possible, at least 256MB of space must be available on the removable media. ReadyBoost is configured from the ReadyBoost tab of the Properties dialog box for the removable media device.
Compatibility Mode The Program Compatibility Wizard was included with Vista to configure programs to believe that they are running with Windows XP or earlier versions of Windows: Choose Start ➢ Control Panel ➢ Programs, and then click Use An Older Program With This Version Of Windows.
Windows Defender While available for other operating systems, Windows Vista was the first to ship with the Windows Defender antispyware program.
Windows Firewall Windows Vista incorporates Windows Firewall, which can be used to stop incoming and outgoing traffic. There are three basic settings: On, Off, and Block All Incoming Connections.
Security Center Windows Security Center provides a single interface for firewall settings, automatic updating, malware protection, and other security settings.

Installing Windows Vista

As of this writing, it is pretty unlikely that you’ll choose to install Windows Vista today since it is a fairly old operating system by technology standards. There are some situations in which you may have to do so: for example, if it needs to be reinstalled on a machine or used as an upgrade over an even older operating system. Regardless of any hypothetical situations, CompTIA wants you to know about it for the exam, starting with installing Windows Vista on a machine as a clean install or upgrading the existing operating system to Vista.

Clean Install

There are two methods of running a clean installation. Installing Vista over a previous operating system results in the user’s data being moved to a folder called WINDOWS.OLD. The first option is to start the computer with the bootable Windows Vista DVD (CDs were available if you needed them) and begin the installation.

The second method—the one Microsoft recommends—is to run Setup from the DVD within your current Windows version. Once the DVD is inserted, the Setup program should automatically begin. If it does not, setup.exe can be manually run from the root folder and the menu will appear. On the menu, choose Install Now and then select Custom (Advanced) when the Which Type Of Installation Do You Want? screen appears. Answer the prompts to work through the steps and complete the installation.

If booting from the DVD, you will get the message Press any key to boot from CD or DVD upon startup, and at this point, you simply press a key and then begin the installation.

Upgrading to Windows Vista

Whereas installation can typically be done over any existing OS, upgrading can only be done from an OS that is generally compatible with the one to which you’re upgrading. In other words, the current operating system you are using determines the version of Windows Vista to which you can upgrade, if any. Table 17.3 lists the upgrade paths for each Windows Vista 32-bit version based on the existing operating system. Those listed as “No” must be clean installations.

Table 17.3 Windows Vista upgrade options

Existing Operating System Vista Home Basic Vista Home Premium Vista Business Vista Ultimate
Windows XP Home Yes Yes Yes Yes
Windows XP Professional No No Yes Yes
Windows XP Professional x64 No No No No
Windows XP Media Center 2004/2005 No Yes No Yes
Windows XP Tablet PC No No Yes Yes
Windows Vista Home Basic N/A Yes No Yes
Windows Vista Home Premium No N/A No Yes
Windows Vista Business No No N/A Yes
Windows Vista Ultimate No No No N/A

Note that Windows Vista Enterprise does not appear in the table because it is typically installed as a clean install. It can only be installed as an “upgrade” to Windows Vista Business. Also note that where N/A appears in the table, an upgrade is not possible, but a repair installation or clean installation can still be performed.

To begin the upgrade, insert the DVD. The Setup program should automatically begin (if it does not, run setup.exe from the root folder) and a menu will appear. On the menu, choose Install Now and then select Upgrade when the Which Type Of Installation Do You Want? screen appears. Answer the prompts to step through the upgrade. On a standard, default installation; the oot directory holds the boot file configuration for Windows Vista.

Booting from the DVD is also possible, but it is recommended only if the method just described does not work. When you boot, you will get a Press any key to boot from CD or DVD message upon startup, and at this point, you simply press a key and begin the upgrade.

Transferring to Windows Vista

The User State Migration Tool (USMT) can be downloaded from Microsoft. It is intended to be used by administrators, and it requires a client computer connected to a Windows Server–based domain controller. It allows you to migrate user file settings related to applications, desktop configuration, and accounts for USMT 2.6. (USMT 3.0 does not require domain controller access except to transfer domain accounts.) More information on USMT can be found at the following location: http://technet.microsoft.com/en-us/library/cc722032(WS.10).aspx.

Windows Easy Transfer (WET) is also available for transferring items to Windows Vista (Start ➢ All Programs ➢ Accessories ➢ System Tools ➢ Windows Easy Transfer). This tool is intended for the one-time transfer of user settings, as well as applications and files, to Vista, whereas USMT is meant for wide-scale migrations. A key difference is that USMT allows transfers to be scripted whereas WET uses a GUI that requires user interaction.

As was discussed with other operating systems, you want to make certain that you use the latest driver software and Windows updates that are applicable for the operating system you are running. This can solve a great many problems with security holes as well as solve compatibility issues. Make certain, as well, that the boot drive is properly formatted and partitions are correct for your desired setup. Remember that a recovery partition, factory or otherwise, can be used to recover the operating system in the event of a failure.

The Windows Vista Boot Sequences

Both for the exam and for practical application, you should know how to recognize common problems with the OS and be able to make certain that it is booting correctly. The sections that follow look at a number of topics related to keeping your OS booting and running properly.

Key Boot Files

Windows Vista requires only a few files, each of which performs specific tasks. These files differ from the files for all previous Windows operating systems. These are discussed next in the order in which they load:

BOOTMGR The Windows Boot Manager (BOOTMGR) bootstraps the system. In other words, this file starts the loading of an OS on the computer. It replaces NTLDR (used in previous operating systems) and is responsible for switching from real to protected mode during the boot process. The latter mode provides memory protection, multitasking, and other features that you expect from the operating system.

BCD The Boot Configuration Data (BCD) file holds information about OSs installed on the computer, such as the location of the OS files.

WINLOAD.EXE The program used to boot Windows Vista. It loads the operating system kernel (NTOSKRNL.EXE).

WINRESUME.EXE If the system is not starting fresh but resuming a previous session, then WINRESUME.EXE is called by the BOOTMGR.

NTOSKRNL.EXE The Windows OS kernel. The solution to a corrupted NTOSKRNL.EXE file is to boot from a startup disk and replace the file from the setup disks or CD.

System files In addition to the previously listed files, Windows needs a number of files from its system directories (for example, SYSTEM and SYSTEM32), such as the hardware abstraction layer (HAL.DLL), session manager (SMSS.EXE), user session (WINLOGON.EXE), and security subsystem (LSASS.EXE).

We’ll now look at the Windows Vista boot process from start to finish:

  1. The system self-checks and enumerates hardware resources. The BIOS looks for the Master Boot Record.
  2. The Master Boot Record (MBR) loads and finds the volume boot sector. The MBR finds the bootable partition and searches it for the NT boot sector of that partition.
  3. The MBR determines the file system and loads BOOTMGR. Information in the boot sector allows the system to locate the system partition and to find and load the file located there into memory.
  4. BOOTMGR checks to see if WINRESUME.EXE is needed.
  5. BOOTMGR processes BCD.
  6. BOOTMGR loads and runs WINLOAD.EXE.
  7. WINLOAD.EXE loads NTOSKRNL.EXE and HAL.DLL. NTOSKRNL.EXE holds the OS kernel and also what’s known as the executive subsystems. Executive subsystems are software components that parse the Registry for configuration information and start the needed services and drivers. HAL.DLL enables communication between the OS and the installed hardware.
  8. The HKEY_LOCAL_MACHINESYSTEM Registry hive and device drivers are loaded, and control is transferred to NTOSKRNL.EXE to complete the boot process. It calls the WIN32K.SYS subsystem and the session manager SMSS.EXE.
  9. WINLOGON.EXE loads. At this point, you are presented with the Logon screen. After you enter a username and password, you’re taken to the Windows Desktop.

Windows Vista Features

There are a number of features that make Windows Vista an operating system worth noting. In the following sections, we will look first at some of the tools; we’ll focus on the ones that you need to know for the A+ exam. By default, Vista displays a user-friendly screen for the Control Panel; clicking Classic View will show all of the available Control Panel items discussed in the following descriptions.

Tools in Windows Vista

The tools that stand out in Windows Vista include System Restore, Windows Defender, Windows Firewall, and Security Center. They are discussed in the sections that follow.

System Restore

System Restore, which was discussed in previous chapters, is arguably the most powerful tool in Windows Vista. It allows you to restore the system to a previous point in time. This feature is accessed from Start ➢ All Programs ➢ Accessories ➢ System Tools ➢ System Restore, and it can be used to roll back to as well as create a restore point. Figure 17.1 shows the opening screen of the System Restore dialog box.

Image described by surrounding text.

Figure 17.1 System Restore in Windows Vista

With Windows Vista, manually creating the restore point must be accomplished from the System Protection tab of System Properties (Start ➢ Control Panel ➢ System). Depending on the view that you are using, you may need to select System and Maintenance before you see the System option, as shown in Figure 17.2.

Screenshot shows system properties on title bar, system protection selected in menu bar, a table for most recent restore points of available disks, buttons for system restore and restore point creation.

Figure 17.2 The option for creating a restore point in Windows Vista

Windows Defender

Windows Defender can identify spyware and unwanted software, and it is native to all versions of Vista (Start ➢ Control Panel ➢ Windows Defender). Depending on the view you are using, you may need to select Security to access the Windows Defender option. As with similar programs, in order for Windows Defender to function properly, you need to keep the definition files current and scan the system on a regular basis.

Windows Firewall

Windows Firewall (Start ➢ Control Panel ➢ Windows Firewall) is used to block access from the network (be it internal or the Internet). While host-based firewalls are not as secure as other types of firewalls, this was a great move in the right direction.

Figure 17.3 shows the opening screen of Windows Firewall in Windows Vista. Windows Firewall is turned on by default, and it is also included in the Security Center (discussed in the next section).

Image described by surrounding text.

Figure 17.3 Windows Firewall can block unwanted traffic.

By default, Windows Firewall blocks incoming traffic. Clicking the Change Settings link opens the Windows Firewall Settings screen, which has three tabs: General, Exceptions, and Advanced. Using the Exceptions tab, you can configure what incoming traffic you want to allow through.

Security Center

Security Center (Start ➢ Control Panel ➢ Security Center) provides a single interface where you can administer Windows Firewall, Automatic Updates, Malware Protection, and other security settings. Figure 17.4 shows the opening screen.

Image described by surrounding text.

Figure 17.4 Windows Security Center in Windows Vista

You can expand any of the four main categories to offer information on what is installed and make configuration changes. For example, as shown in Figure 17.5, if you expand Malware Protection and click Show Me The Antispyware Programs On This Computer, you can see that on this particular machine, there are three tools, and one of them—Windows Defender—is not turned on.

Image described by surrounding text.

Figure 17.5 Antispyware programs on a sample machine

Windows Vista Administrative Tools

There are a number of system tools included with Windows Vista that you need to know about for the exam. These administrative tools, discussed in the order in which they appear in the objectives, also include Windows Firewall and Advanced Security, which was covered earlier in this chapter.

Users and Groups

As an administrator, you can configure the users and groups on a system in the Microsoft Management Console (MMC).

Start by clicking Start, typing MMC in the Search box, and pressing Enter. If Local Users And Groups is not visible in the left pane, choose File, then Add/Remove Snap-In, and then select Local Users And Groups from the list of possible snap-ins. You can choose to manage the local computer or another computer (which requires you to provide its address).

Local Users And Groups is not available for Windows Vista in any edition other than Windows Vista Business, Windows Vista Ultimate, and Windows Vista Enterprise. In all other editions, you must manage user accounts using the User Accounts applet in Control Panel, and you cannot create or manage groups.

Local Security Policy

To access the Local Security Policy tool, choose Start and then enter secpol.msc (or you can choose Control Panel ➢ Administrative Tools ➢ Local Security Policy). Local Security Policy allows you to set the default security settings for the system. This feature is not available for Windows Vista in any edition other than Windows Vista Business, Windows Vista Ultimate, and Windows Vista Enterprise.

The following sections examine some of the Security Settings options.

Account Policies

Account Policies further divides into Password Policy and Account Lockout Policy.

Password Policy

The following choices are available under Password Policy:

Enforce Password History This allows you to require unique passwords for a certain number of iterations. The default number is 0, but it can go as high as 24.

Maximum Password Age This variable defines the maximum number of days a password can be used. The default is 42 days, but values range from 0 to 999.

Minimum Password Age This variable defines the minimum number of days that a password must be used between password changes. The default is 0 days, but values range from 0 to 999.

Minimum Password Length This variable defines the least number of characters that must be used in a password. The default is 0 characters (meaning no passwords are required), but you can specify a number up to 14.

Password Must Meet Complexity Requirements This setting is disabled by default. When it is turned on, the password must include at least three of the following criteria: uppercase characters, lowercase characters, numerical characters, nonalphanumeric characters, and/or Unicode characters.

Store Password Using Reversible Encryption For All Users In The Domain This setting is disabled by default. When it’s enabled, it provides support for applications that require knowledge of the password.

Because the likelihood of laptops being stolen always exists, it’s strongly encouraged that you implement strong password policies. Here’s an example:

  • Enforce Password History: 8 passwords remembered
  • Maximum Password Age: 42 days
  • Minimum Password Age: 3 days
  • Minimum Password Length: 6 to 8 characters

Leave the other two settings disabled. Accepted practice is to insist that complexity requirements be enabled (and this is the default for domain machines).

Account Lockout Policy

The Account Lockout Policy setting is divided into the following three values:

Account Lockout Threshold This is the number of invalid attempts before lockout occurs. The default is 0 (meaning that the feature is turned off). Invalid attempt settings range from 1 to 999. A number greater than 0 changes the values of the following two options to 30 minutes; otherwise, they are “not defined.”

Account Lockout Duration This is a number of minutes an account lockout lasts, ranging from 1 to 99999. A value of 0 is also allowed here and signifies that the account never unlocks itself; that is, administrator interaction is always required. When the number is greater than 0, the user must wait that many minutes before being allowed to try to log in again.

Reset Account Lockout Counter After This is a number of minutes, ranging from 1 to 99999, that each failed login attempt remains on the counter. For example, if the value is set at 5, then after 5 minutes, one of the failed attempts is removed from the counter.

When you’re working with a mobile workforce, you must weigh the choice of users calling you in the middle of the night when they’ve forgotten their password against keeping the system from being entered if the wrong user picks up the laptop. A good recommendation is to use a lockout after five attempts for a period of time between 30 and 60 minutes.

Local Policies

The Local Policies section is divided into three subsections: Audit Policy, User Rights Assignment, and Security Options. The Audit Policy section contains nine settings; the default value for each is No Auditing. When auditing is enabled, log entries are created for interactions with the item specified by the setting. Valid options are Success and Failure. The Audit Account Logon Events entry is the one that you should consider turning on for mobile users to see how often they log in and out of their machines.

When auditing is turned on for an event, the entries are logged in the Security log file.

The User Rights Assignment subsection of Local Policies is where the meat of what was once called System Policies comes into play. User Rights Assignment has many options, most of which are self-explanatory. Part of what is shown in the list of user rights are the defaults for who can perform each action; a value of Not Defined indicates that no one is specified for the corresponding operation.

The Security Options section includes a great many options which, for the most part, are representative of various Registry keys. The default for each is usually Not Defined.

System Configuration

The System Configuration tool (msconfig.exe) in Windows Vista is used to control the way the system behaves at startup, and it includes a number of tabs and options, as shown in Figure 17.6.

Screenshot shows system configuration in title bar, general, boot, services, startup, and tools tabs in menu bar, of which general is selected, radio buttons for normal, selective, and diagnostic startups.

Figure 17.6 The System Configuration tool in Windows Vista

By clicking the Boot tab, you can see the configuration options for the BCD and make some minor changes, as shown in Figure 17.7. The Advanced Options button allows you to configure the number of processors, maximum memory, and global debug settings.

Image described by surrounding text.

Figure 17.7 Options available on the Boot tab

Component Services

Component Services is an MMC snap-in in Windows Vista that allows you to administer and deploy component services. It can be used to configure various settings, such as security settings. With this tool, it is possible for administrators to manage components while developers configure routine component and application behavior (object pooling, for example). Figure 17.8 shows an example of the interface.

Image described by caption.

Figure 17.8 Component Services

Data Sources

ODBC Data Source Administrator, accessed via Start ➢ Control Panel ➢ Administrative Tools ➢ Data Sources (ODBC), allows you to interact with database management systems. Figure 17.9 shows an example of the screen.

Screenshot shows ODBC data source administrator on title bar, user DSN is selected from menu bar that include user data sources that can be add, remove or configure and statement about ODBC data source on bottom.

Figure 17.9 Data Sources in Vista

Database drivers that are added to the system will show up here and can be shared between applications.

Print Management

New to Windows Vista, Print Management (Start ➢ Control Panel ➢ Administrative Tools ➢ Print Management) allows you to manage multiple printers and print servers from a single interface. Print Management is not available for Windows Vista in any edition other than Windows Vista Business, Windows Vista Ultimate, and Windows Vista Enterprise. In all other editions, you must manage individual printers using the Printers applet in Control Panel, and you are very limited in what you can manage.

Windows Memory Diagnostics

The Windows Memory Diagnostics tool (Start ➢ Control Panel ➢ Administrative Tools ➢ Memory Diagnostics Tool) can be used to check a system for memory problems. For the tool to work, the system must be restarted. The two options that it offers are to restart the computer now and check for problems or to wait and check for problems on the next restart.

Upon reboot, the test will take several minutes and the display screen will show the number of the pass being run and the overall status of the test (percent complete). When the memory test concludes, the system will restart again and nothing related to it having run is apparent until you log in. If the test is without error, you’ll see a message that no errors were found (see Figure 17.10). If any issues have been detected, the results will be displayed.

Image described by surrounding text.

Figure 17.10 Memory test results

Distinctive Utilities

There are a number of Control Panel applets in Windows Vista of which you should be aware. These include Tablet PC Settings, Pen And Input Devices, Offline files, Problem Reports And Solutions, and Printers.

Tablet PC Settings

The Tablet PC Settings applet (Start ➢ Control Panel ➢ Tablet PC Settings) in Windows Vista can be used, as the name implies, to configure the device on which the operating system is installed to function as a true tablet. You can tweak handwriting recognition, handedness (left versus right), and other tablet-relevant settings.

Figure 17.11 shows the interface when Tablet PC Settings is first opened.

Diagram shows general, handwriting recognition, display, and other tabs in menu bar, of which general is selected, radio buttons for selecting right or left handedness, list box for orientation, and button for calibration.

Figure 17.11 Tablet PC Settings

The Home Basic edition of Windows Vista does not support a tablet PC input panel, but all other editions of the operating system do.

Pen and Input Devices

The Pen And Input Devices applet (Start ➢ Control Panel ➢ Pen And Input Devices) in Windows Vista is used in conjunction with the Tablet PC Settings applet. It is used to configure the pen and pointer options, as shown in Figure 17.12.

Screenshot show pen options, pointer options, and flicks in menu bar, from which pen options is selected. It shows equivalent mouse action of 4 different pen actions, two check boxes for pen buttons, and ok and cancel buttons at bottom.

Figure 17.12 Pen And Input Devices settings

The Home Basic edition of Windows Vista does not support a tablet PC or have this applet, but all other editions of the operating system do.

Offline Files

Only some editions of Windows Vista (Business Ultimate and Enterprise) support offline files. Beginning with Windows 2000, Windows-based operating systems added the capability to work with resources that are “online” (accessed through the network or other connection) and “offline” (replicated copies of the resource stored locally). The key is to keep the files synchronized so that multiple copies of the same file stored in different locations match each other.

Windows Vista includes a Sync Center (Start ➢ Control Panel, then click Sync Center), as shown in Figure 17.13.

Screenshot shows sync center window in control panel, view and set up sync partnership tasks on side bar, title keep your information in sync, and icons for conflicts, results, and sync setup.

Figure 17.13 The Sync Center in Windows Vista is the primary interface for configuring synchronization.

Sync partnerships can be set up with a large number of devices, ranging from a flash drive (as shown in Figure 17.14) to handheld devices. It is worth noting again that you cannot sync with network folders if you are using Windows Vista Starter, Home Basic, or Home Premium editions.

Image described by surrounding text.

Figure 17.14 Establish a partnership with the device with which you want to sync in Sync Center.

Problem Reports and Solutions

Building on the error reporting features offered in earlier versions of Windows, the Problem Reports And Solutions applet in Windows Vista (Start ➢ Control Panel ➢ Problem Reports And Solutions) can help solve problems on a particular machine (see Figure 17.15).

Screenshot shows title solve problems on your computer and description, subtitles solutions to install and information about other problems that include recommended updates, problem report, and solution found.

Figure 17.15 Problem Reports And Solutions in Windows Vista

To configure (or disable) the feature, choose Change Settings and then Advanced Settings. On the Advanced Settings For Problem Reporting screen, click Change Setting to open a window similar to the one shown in Figure 17.16.

Screenshot shows problem reports and solutions on title bar and content with title advanced settings for problem solving and buttons for change settings and a message box for choosing settings for problem reporting.

Figure 17.16 Windows error reporting options in Windows Vista

Your two major choices are to disable or enable error reporting. If you choose to disable it, you can still be notified when errors occur. Windows Vista offers the third choice of allowing each user to choose their settings. After choosing to enable error reporting, you can choose to report Windows operating system and/or program errors. By clicking a program’s button, you can configure it to report errors. By default, all program errors from all programs are reported, but you can configure the reporting of errors on a program-by-program basis.

Printers

The Printers applet in Windows Vista (Start ➢ Control Panel ➢ Printers) provides a simple interface for adding a new printer or managing existing ones. Figure 17.17 shows an example.

Image described by surrounding text.

Figure 17.17 The Printers applet in Windows Vista

By right-clicking on any printer shown in the interface, you can choose to make it the default printer from the options menu that appears (in Figure 17.17, the check mark on the Epson NX510 indicates that it is the default printer). Clicking Add A Printer will start the Add Printer Wizard and allow you to add a network, wireless, or Bluetooth printer as well as one that is locally connected.

Networking and Windows Vista

There are a number of things CompTIA expects you to know when it comes to the topic of networking and Windows Vista. Most of the networking topics are covered in the chapters dedicated to that and thus the discussion here is limited to only those topics specifically tied to Windows Vista.

HomeGroups is a feature in Windows 7 and not Windows Vista, but you can easily configure almost any other type of network you want with Vista. By choosing the Network And Sharing Center (Start ➢ Control Panel ➢ Network And Sharing Center), you can choose to connect to an existing network, see (and manage) your current connections, and set up a new network. Choosing to set up a new network offers the choices shown in Figure 17.18.

Image described by surrounding text.

Figure 17.18 Creating a new network connection in Windows Vista

The choices that are available are elaborated on in Table 17.4.

Table 17.4 Network connection options

Option Purpose
Connect To The Internet Use for connecting to a proxy server or other device intended to provide Internet access. This includes wireless, broadband, and dial-up.
Set Up A Wireless Router Or Access Point If the wireless device will be connected to this machine, this is the option to use.
Manually Connect To A Wireless Network If you have a wireless network already in place and the device (router, and so on) is not directly connected to this machine, then use this option.
Set Up A Wireless Ad Hoc (Computer-To-Computer) Network This is meant for peer-to-peer resource sharing and is typically a temporary connection.
Set Up A Dial-Up Connection If the way to access a network is by using a dial-up modem, then this is the option to select.
Connect To A Workplace If you need to dial in to a virtual private network (VPN) from a remote location, this is the option to use.

Regardless of which option you choose, you will need to fill out the appropriate fields for the device to be able to communicate on the network. With TCP/IP, the only required values needed are an IP address for the host and a subnet mask to function. At the bare minimum, though, an address for the gateway and DNS information is recommended to be able to access other networks or the Internet.

You also need to specify one of the types of locations for this network: Home, Work, or Public. If you choose one of the first two, network discovery is on by default, allowing you to see other computers and other computers to see you. If you choose Public, network discovery is turned off. Exercise 17.1 walks you through the process of changing a network location type.

Network card properties that may be required include the speed at which the card will communicate and whether it is half-duplex (data going one direction at a time), full-duplex (data going both directions at the same time), or automatic. There may be extra features to configure, including Wake on LAN (WoL), an Ethernet standard implemented via a card that allows a “sleeping” machine to awaken when it receives a wakeup signal. Quality of Service (QoS), another extra feature, implements packet scheduling to control the flow of traffic and help with network transmission speeds. Figure 17.19 shows the QoS packet scheduler installed on a card. No properties can be configured for the service itself.

Screenshot shows local area connection properties on title bar, networking and sharing tabs in menu bar from which networking is selected, selection box to choose connection configuration, and description of QoS.

Figure 17.19 QoS scheduling on a network card in Windows Vista

A network adapter built on the motherboard and integrated with it is known as an on-board NIC and is controlled by the BIOS. The BIOS is typically configured to look for and establish a connection automatically but that may not always be what you want. Given a scenario, you may want to disable the on-board NIC if it is experiencing problems or if it is slower than what can be obtained by adding another NIC to the machine. When this is the case, you can check manufacturer’s documentation but typically it involves nothing more than disabling the NIC in the BIOS settings.

Vista System Performance and Optimization

Windows Vista introduced a number of features administrators should be aware of to understand how better to optimize a system. Some of these were mentioned at the beginning of the chapter, but only in passing. These include the Aero interface, the User Account Control feature, indexing, and Sidebar.

Aero

An acronym for Authentic, Energetic, Reflective, and Open, Aero differs from previous GUIs in that its windows are translucent and it provides the ability to create a 3D stack of open windows and cycle through them (known as Flip 3D); while Flip 3D is nice, it relies on a more important feature of Aero that provides live thumbnails of each window, as demonstrated in Windows Flip (the standard task window) and on the Taskbar. To configure Aero, right-click on the Desktop and choose Personalize from the context menu, and then choose Window Color And Appearance, as shown in Figure 17.20.

Screenshot shows window color and appearance option that include default, graphite, blue, teal, red, orange, pink, and frost screens and scroll bar to change color intensity level and color mixer button.

Figure 17.20 Configuring Aero

Here you can turn off the transparency as well as change the colors used for windows. Aero can be turned off altogether by clicking Open Classic Appearance Properties For More Color Options. This brings up the Appearance Settings dialog box shown in Figure 17.21, from which you can choose to use Windows Standard, Windows Classic, or another interface (choosing anything but the default of Windows Aero turns Aero off).

Image described by surrounding text.

Figure 17.21 Choosing an interface besides Aero

User Account Control

The User Account Control (UAC) feature was mentioned earlier in this chapter and has the sole purpose of keeping the user from running programs that could potentially pose a threat by requiring escalating privileges for many actions. While turning UAC off is an option, it is not a recommended option. If you have a program that you regularly run and do not want to be prompted about each time, you can right-click the icon for that program and then click Properties. Choose the Compatibility tab and then select the Run This Program As An Administrator check box. This will prevent the prompt from occurring each time you use the program.

Indexing

Indexing services have existed since the early versions of Windows, and they allow the operating system to find files quickly by looking through a database of entries rather than having to start from scratch each time. The primary interface for configuring indexing is the Indexing Options applet in Control Panel. Figure 17.22 shows this interface for Windows Vista, and it differs from previous OS versions simply in the addition of the Pause button.

Screenshot shows indexing options with the number of items indexed, a table of included and excluded locations of index, buttons for modify, advanced, and pause options.

Figure 17.22 Configuring Indexing

The Advanced button takes you to the heart of the configuration. From here, you can choose whether to include encrypted files and what types of files to include in the index. Most meaningful is the ability to choose whether the index should include properties only (the default) or also include file contents. While choosing to include contents in the index greatly decreases search time, it can also slow the system down on a regular basis as it builds the index.

Sidebar

The Sidebar is a feature that allows easy access to gadgets. To configure the Sidebar, right-click on an area of it and choose Properties (if the Sidebar is not visible, click Start ➢ All Programs ➢ Accessories ➢ Windows Sidebar). This will bring up the dialog box shown in Figure 17.23.

Screenshot shows windows sidebar properties that include options to start sidebar when windows start, vertical and horizontal arrangement of sidebar, display sidebar on monitor, and view list of running gadgets.

Figure 17.23 Configuring the Sidebar

In addition to choosing Properties from the context menu, you can choose Close Sidebar, Bring Gadgets To Front, and Add Gadgets. To remove a gadget, right-click it and choose Close Gadget. You can also drag any gadget from the Sidebar directly onto the Desktop and drag them from the Desktop into the Sidebar as you wish.

Summary

This chapter focused on Windows Vista. Even though it is now an older Windows operating system, CompTIA expects you to be familiar with it and to be able to answer questions on everything from installing it to managing it.

We looked at the various features of Windows Vista, some that exist in other versions of Windows and some that are distinctive to this operating system. The latter category includes Tablet PC Settings, Pen And Input Devices, Offline Files, Problem Reports And Solutions, and Printers.

Exam Essentials

Know what types of installations are possible with Windows Vista. You should know which operating systems can be upgraded to Windows Vista and which require a clean installation.

Understand upgrading. You should know that a clean install does not preserve installed applications and will push old data files and settings into WINDOWS.OLD, while an in-place upgrade will preserve installed applications and settings.

Understand the Windows Vista boot process and order. Know the purpose and role of BOOTMGR and BCD and how the boot process in Windows Vista differs from that of earlier versions of Windows.

Know what Control Panel utilities are notable in Windows Vista. The Control Panel applets that stand out with Windows Vista are Tablet PC Settings, Pen And Input Devices, Offline Files, Problem Reports And Solutions, and Printers. You should be familiar with the purpose and options of each.

Understand what each of the following utilities are used for: System Restore, Windows Firewall, and Security Center. System Restore is used to create, and revert back to, restore points. Windows Firewall limits traffic coming from the network to the host. Security Center provides a simple interface with which you may interact with virus scanners and other installed security software.

Review Questions

The answers to the chapter review questions can be found in Appendix A.

  1. Which version of Windows Vista does not include offline folder capabilities?

    1. Business
    2. Enterprise
    3. Home Premium
    4. Ultimate
  2. What is the first file used in the boot process of Windows Vista?

    1. NTOSKRNL.EXE
    2. CONFIG.SYS
    3. AUTOEXEC.BAT
    4. BOOTMGR
  3. What is the maximum amount of RAM supported in the 64-bit Home Premium edition of Windows Vista?

    1. 8GB
    2. 16GB
    3. 128GB
    4. 256GB
  4. Which of the following is an Ethernet standard implemented via a card that allows a “sleeping” machine to awaken when it receives a wakeup signal?

    1. Sleep timer
    2. WEP
    3. Wake on LAN
    4. WPA
  5. Which editions of Windows Vista include BitLocker support? (Choose two.)

    1. Business
    2. Enterprise
    3. Home Premium
    4. Ultimate
  6. Which Windows Vista feature allows you to recover from an accidental deletion or overwrite?

    1. BitLocker
    2. User Account Control
    3. Security Center
    4. Shadow Copy
  7. You are migrating one stand-alone machine from Windows XP to Window Vista. Which of the following tools should you consider for transferring user state data and application files?

    1. Windows State Mover
    2. UDMT
    3. Windows Easy Transfer
    4. USMT
  8. In Windows Vista, which of the following utilities can be used to see the edition and service pack installed on a system?

    1. info
    2. spm
    3. winver
    4. msall
  9. Which utility is shown in Figure 17.24?

    Image described by caption.

    Figure 17.24 A Windows Vista utility

    1. Windows Memory Diagnostics
    2. Print Management
    3. Data Sources
    4. Component Services
  10. Which of the following files is at the end of the boot process and presents the user with the Logon screen?

    1. SMSS
    2. WINLOGON
    3. HAL
    4. SIR
  11. Where is the Windows Memory Diagnostics utility found in Windows Vista?

    1. In the Accessories folder
    2. In the System folder, beneath Accessories
    3. Beneath Administrative Tools
    4. Not available in Windows Vista
  12. Which editions of Windows Vista support Local Security Policy (secpol.msc)? (Choose three.)

    1. Windows Vista Home Basic
    2. Windows Vista Home Premium
    3. Windows Vista Business
    4. Windows Vista Enterprise
    5. Windows Vista Ultimate
  13. After installation of the Windows Vista operating system, what is required in order to curb software piracy?

    1. Certification
    2. Confirmation
    3. Activation
    4. Substantiation
  14. What is the maximum number of physical CPUs supported by Windows Vista Business edition?

    1. One
    2. Two
    3. Three
    4. Four
  15. Which utility is the System Configuration tool in Windows Vista?

    1. msinfo32.exe
    2. msconfig.exe
    3. sysconfig.cpl
    4. config.cpl
  16. Which feature allows you to use free space on a removable drive (usually USB) to speed up a system?

    1. USB Speed
    2. Shadow Copy
    3. ReadyBoost
    4. Screamer
  17. Spencer has dug out from the closet a legacy machine that is running Windows XP Professional. Since it is no longer supported, he wants to upgrade it to Windows Vista. Which of the following upgrades are possible? (Choose two.)

    1. Windows Vista Business
    2. Windows Vista Enterprise
    3. Windows Vista Home Premium
    4. Windows Vista Ultimate
  18. Which of the following network locations disables network discovery in Windows Vista?

    1. Home
    2. Work
    3. Public
    4. Personal
  19. Which directory on a standard Windows Vista installation holds the boot file configuration?

    1. oot
    2. start
    3. system32
    4. windows
  20. What is the maximum amount of RAM supported in the 64-bit Ultimate edition of Windows Vista?

    1. 8GB
    2. 16GB
    3. 128GB
    4. 256GB

Performance-Based Question

You will encounter performance-based questions on the A+ exams. The questions on the exam require you to perform a specific task, and you will be graded on whether or not you were able to complete the task. The following requires you to think creatively in order to measure how well you understand this chapter’s topics. You may or may not see similar questions on the actual A+ exams. To see how your answers compare to the authors’, refer to Appendix B.

You are trying to troubleshoot a Windows Vista machine and think that memory may be an issue. How do you run the Windows Memory Diagnostics tool?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.110.32