Appendix . Fast Facts

The facts, methods, and skills you need to master have been covered in the preceding chapters in this book. You should have read the study materials presented in each chapter, worked through the exercises, and practiced using the study suggestions. When you have tackled all this material and applied your knowledge in a lab or in your workplace, you should be ready to take the exam.

Exam days tend to be stressful, which can be compounded by procrastinating your studies and then cramming all the facts you can into your head at the last minute. Success usually isn’t the result of one big action that you perform a single time. Success is the culmination of consistent small actions. To successfully pass a certification exam, the best approach is to spend a minimum of 15 minutes every day studying. If you study longer, that’s great. However, the key is to never skip a day and to study for no less than 15 minutes each day.

After you finish studying Chapters 1 through 9, you should be ready to sign up for the exam. A few days prior to and up until the day of the exam, you can brush up on your facts and skills by reading this chapter.

This book was organized to bracket together the skills that Microsoft Exam 70-620 tests in the same groups Microsoft uses. These Fast Facts highlight the most essential points for you to recognize and process while you are taking the exam. They are by no means a substitute for the rest of this book, but they do provide excellent review material.

Introducing Windows Vista

  • Microsoft initially developed two versions of desktop operating systems—Windows 9x and Windows NT. Microsoft merged these two lines of operating systems in Windows XP, and Windows Vista represents the latest upgrade of the flagship Windows operating system.

  • Windows Vista is available in five editions, each suited for a different segment of the general population: Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, and Windows Vista Ultimate. Table 1 summarizes the basic features available with each Vista edition.

    Table 1. Editions of Windows Vista

    Edition

    Designed for

    Notable Features

    Home Basic

    Home users who need only basic computing capabilities

    Fundamental security capabilities such as Internet Explorer 7 and Windows Defender, as well as Windows Mail and Parental Controls

    Home Premium

    Enhanced home usage capability, including music, photo, and video usage

    3D Aero desktop, photo and video handling and basic editing, DVD authoring, Mobility Center, and Windows Media Center

    Business

    Business users who need only basic computing capabilities

    Windows Meeting Space, domain membership, advanced backup capabilities including shadow copy, business networking capabilities, and Remote Desktop

    Enterprise

    Business users who need advanced computing and security functions

    BitLocker drive encryption and Multi-Language User Interface (MUI)

    Ultimate

    Home and business users who want the complete experience

    All features included with Vista Home Premium and Vista Enterprise

  • Microsoft also includes a Starter Edition that provides only very fundamental computing capabilities, and designed only for selected third-world overseas markets.

  • Vista provides numerous productivity enhancements including an improved user interface and Start menu, new integrated search features, improved startup capabilities including the Restart Manager, Sleep mode, Windows Experience Index, improved stability features, improved hardware diagnostics, support for document metadata, and so on.

  • Security enhancements in Windows Vista include Secure Startup, User Account Control, an improved Windows Firewall, Windows Defender, Spam and Phishing Filters, Network Access Protection, Parental Controls, and Windows Service Hardening.

  • When you first log on to a new Windows Vista installation, the Welcome Center runs and introduces you to many of the new and updated Vista features.

  • Microsoft has continued the category divisions in Control Panel and introduced many new and enhanced features. The functions of the Control Panel categories are as follows:

    • System and Maintenance—Enables you to configure performance options and obtain information about your computer

    • Security—Includes applets such as the Security Center, Windows Firewall, Windows Update, Windows Defender, Internet Options, Parental Controls, and BitLocker Drive Encryption

    • Network and Internet—Includes the Network and Sharing Center as well as other applets that enable you to configure options related to networking and the Internet

    • Hardware and Sound—Includes applets that enable you to configure all your computer’s hardware components

    • Programs—Enables you to configure program-related actions such as programs that execute at startup and the downloading, installation, and removal of programs

    • User Accounts and Family Safety—Includes the User Accounts, Windows CardSpace, and Parental Controls features

    • Appearance and Personalization—Enables you to configure properties of your computer related to how items appear on the display

    • Clock, Language, and Region—Enables you to configure time, date, time zone, display languages, and country-specific formatting

    • Ease of Access—Includes the Ease of Access Center and the Speech Recognition applet, which enables you to configure microphones and train your computer to understand your voice

  • Service packs are a software bundle of patches and hotfixes plus additional features.

Installing Windows Vista

  • The minimum supported and recommended hardware requirements for Windows Vista are listed in Table 2. Minimum hardware will exhibit poor performance.

    Table 2. Hardware Requirements for Windows Vista

    Device

    Minimum Supported

    Premium Ready

    Processor

    Intel Pentium/Celeron running at 800MHz or higher

    Intel Pentium II/Celeron running at 1GHz or higher, or 64-bit (x64) processor

    RAM

    512MB

    1GB

    Graphics processor

    DirectX 9-capable

    DirectX 9–capable with at least 128MB graphics memory

    Hard disk

    20GB with at least 15GB free space

    40GB with at least 15GB free space

    Monitor

    SVGA (800×600)

    1024×768 or higher resolution

    Disk drives (for CD installations)

    CD-ROM or DVD drive

    CD-ROM or DVD drive at 12x or faster speeds

    Other

    Standard keyboard and mouse or other pointing device

    Standard keyboard and mouse or other pointing device and audio output and Internet access capabilities

  • Always check hardware for compatibility at Microsoft’s Windows Logo Program for Hardware website before installing.

  • Ensure that software is compatible with Vista prior to installation. If an application is not compatible, you should upgrade or replace it. Microsoft provides the Windows Application Compatibility Toolkit to assist you.

  • You can configure computers running Vista Business, Enterprise, or Ultimate to belong to either a workgroup or an Active Directory domain. Computers running Vista Home Basic or Home Premium can belong to a workgroup only.

  • Ensure that network hardware and protocols are compatible with Vista.

  • Transmission Control Protocol/Internet Protocol (TCP/IP) is the standard (default) network protocol in Windows Vista. The default configuration is as a Dynamic Host Configuration Protocol (DHCP) client.

  • To join a domain, open the System applet in Control Panel, click the Computer Name tab, and then click the Network ID button to use the wizard or click the Change button.

  • A computer that is not joined to a domain is a member of a workgroup. If other computers are members of the workgroup, they act as a peer-to-peer network. Each computer can be configured to share printers and files, and each computer maintains a separate list of users and groups—unlike domains, which provide centralized management of users and network resources.

  • To interact with other computers on a network as a server, you can install File and Printer Sharing, using the Network Connections applet in Control Panel.

  • File systems supported by Windows Vista are FAT16, FAT32, and NTFS. However, Vista supports only the NTFS file system for its system and boot volumes.

  • The NTFS file system is required for access control permissions on files and folders.

  • As was the case in Windows XP, you are required to activate Vista by means of Windows Product Activation within 30 days of installation. If you do not activate Vista within 30 days, it enters a “reduced functionality mode” in which you can only perform certain actions. Microsoft provides two systems for performing Volume Activation of large numbers of Vista installations: Multiple Activation Keys and Key Management Service.

  • Always check the BIOS compatibility with Windows Vista prior to installation. You should upgrade the BIOS to the latest functional and compatible version.

  • Windows Vista requires Advanced Configuration and Power Interface (ACPI) capability in the BIOS; you cannot use older power management systems such as Advanced Power Management.

  • It is simple to install Windows Vista by booting your computer from the Vista DVD-ROM and following the instructions provided.

  • Unlike previous Windows versions, you can install Vista without providing a product key. You can try out various editions of Vista for up to 14 days, after which you must supply a valid product key.

  • Unattended installations provide greater consistency compared to performing multiple attended installations and reduce errors upon deployment.

  • Methods you can use for unattended installation are scripting through answer files, using Windows Deployment Services (WDS), and cloning with Sysprep along with a third-party cloning tool.

  • Windows System Image Manager (SIM) enables you to create answer files from information included in a Windows image (.wim) file and a catalog (.clg) file.

  • Sysprep is a utility that automates installation.

  • Microsoft includes Windows PE, which is a minimal version of a 32-bit operating system designed to facilitate the deployment of a Windows Vista image to multiple computers.

  • WDS is a server-based system for remotely installing Windows Vista or Windows Server 2008 on computers. It replaces Remote Installation Services (RIS), which was formerly used with Windows 2000/XP/Server 2003.

  • WDS requires a network that includes Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), and Active Directory. You must have a server running Windows Server 2003 or 2008 on which WDS has been installed, as well as the Windows Automated Installation Kit (AIK) media either on the WDS server or an accessible network location.

  • You can zero in on the cause of an installation problem if you know at which stage an error occurred.

  • Common problems encountered during installation of Windows Vista and their solutions are listed in Table 3.

    Table 3. Windows Vista Setup Process

    Phase

    Prompted Actions

    Possible Problems

    Boot into DOS mode

    Load storage device drivers

    Hardware incompatibility with the storage device; incompatible device driver; wrong device driver; no built-in device drivers; Windows Vista Setup does not detect the storage device, such as a SCSI hard disk.

    Install Windows

    Select Install Now, Repair Your Computer, or Quit

    Accidental selection of Repair Your Computer or quitting Setup (F3).

    EULA agreement

    Accept the EULA

    Not accepting the EULA.

    Create partitions

    Select or create a partition

    Not creating or selecting a partition.

    File system

    Select a file system to format the drive

    Disk errors prevent formatting the drive; formatting a partition that contains information; not using NTFS for the Windows partition.

    File copy

    Computer reboots after files are copied

    Disk errors prevent files from copying; not enough space on the designated drive for files to be copied; source drive for file copy (network) does not contain all the necessary files/drivers for following installation phases.

    Graphical mode

    Setup detects and installs drivers

    Source drive for file copy (network) does not contain the correct drivers.

    Regional and language settings

    Select the language to use

    User installed from an incorrect language version of Windows Vista.

    Name and organization

    Enter a user’s name and company name

    Information is later used by some applications, but this screen is not related to installation problems.

    Product key

    Input the product key

    Not entering a product key can cause activation problems later.

    Computer name

    Enter a computer name

    A duplicate computer name causes network conflicts. NetBIOS requires each computer name to have less than 15 characters, which cannot use special characters such as ; : “ < > * + = | ?,

    Dialup info

    Enter modem and time zone information

    Incorrect time zone information might cause application errors later, but this screen is not usually related to installation problems.

    Network settings

    Accept typical settings or choose custom settings

    Computer cannot connect to the domain; computer has a network address conflict; computer cannot connect to some/all network devices; computer cannot share files or printers; network adapter drivers are incorrect; computer cannot obtain an IP address.

    File copy

    Setup completes file copying and cleans up temporary files

    Hardware device drivers are loaded after Windows Vista restarts; an error after this point might be a hardware device driver error.

  • The most common errors are caused by lack of compatibility with the hardware, the BIOS, or drivers. In addition, lack of disk space, network errors, and name or IP address conflicts can cause a failure during setup.

  • When the installation DVD cannot be read, try it in a different drive.

  • When an indeterminate hardware-related error occurs during setup, remove all nonessential adapters and peripherals. Install Windows Vista, and then add each adapter and peripheral back onto the computer one at a time, verifying that the computer functions until all are installed or the problem-causing device is discovered.

  • Understand the logs that are created during setup and what types of information or errors they will contain:

    • DtcInstall.logErrors generated by the Microsoft Distributed Transaction Coordinator (MSDTC)

    • Setupact.logChronological set of actions performed by Setup

    • Setupapi.logAll .inf device driver installation

    • Setuperr.logAll errors occurring during setup

    • WindowsUpdate.logCOM+ component installation information

    • Netsetup.logResults of the computer joining a workgroup or domain

    • scesetup.logComputer security settings

  • The System log displayed in Event Viewer displays errors that might have caused a Blue Screen of Death (BSOD).

  • Driver signing is a process that Microsoft follows to validate files that a third-party manufacturer creates for use in a Windows Vista computer.

  • Non-administrative users can install only drivers that have been signed by either a Windows publisher or trusted publisher; they cannot install unsigned drivers.

  • Administrators can add the publisher’s certificate to the trusted certificates store, thereby enabling standard users to install drivers signed by this publisher.

  • You can use sigverif to verify signatures on system device drivers.

  • The System Information utility, which can be opened by typing msinfo32 in the Run dialog box or from the command line, provides a quick view of any resource conflicts. When you are in the utility, click Hardware Resources and then click Conflicts/Sharing.

  • In Device Manager, you can click the Driver tab to update the driver, roll back the driver to a prior version, remove the driver, and troubleshoot the device.

  • If a driver causes a problem, you can use the Rollback feature in Device Manager to roll back the driver to a previous version.

Upgrading to Windows Vista

  • The only version of Windows that can be upgraded to Windows Vista Home Basic or Home Premium is Windows XP Home Edition.

  • Versions of Windows that can be upgraded to Windows Vista Business or Ultimate are Windows XP Home Edition and Windows XP Professional. Any older desktop version of Windows cannot be upgraded without first being upgraded to one of these versions.

  • Server versions of Windows cannot be upgraded to Windows Vista.

  • Other operating systems cannot be upgraded to Windows Vista. You can perform only a clean installation.

  • The Vista Upgrade Advisor produces a report that identifies any hardware or software problems associated with the computer to be upgraded.

  • Applications to remove before upgrading are antivirus applications, disk compression software, and known incompatible legacy software.

  • Before upgrading, install the latest service pack for Windows XP (SP2 at the time of writing), plus any other updates that Microsoft has published.

  • File systems supported by Windows Vista are FAT16, FAT32, and NTFS.

  • If you are upgrading an installation of Windows XP on a FAT16 or FAT32 partition to Vista, convert the file system to NTFS before upgrading.

  • The command to convert a FAT partition to NTFS is convert c: /fs:ntfs, where c: is the drive letter for the disk partition that you are converting. You cannot convert an NTFS volume back to FAT.

  • All upgrades to Vista are permanent. Unlike Windows XP, you cannot revert to the previous version of Windows in any circumstance.

  • As in previous versions of Windows, you can install Windows Vista alongside a different version of Windows in a dual-boot configuration.

  • For dual-boot computers, both operating systems must support the file system to share the partition.

  • When installing a computer to dual-boot between two operating systems, you should install the older OS before installing Windows Vista.

  • Windows Vista introduces several new boot management programs, which replace the older programs used with previous Windows versions. These include

    • Bootmgr.exeControls boot activities and displays a boot manager menu on a dual-boot or multi-boot computer.

    • Bcdedit.exeAn editing application that enables you to edit boot configuration data on Vista.

    • Winload.exeThe operating system loader, included with each instance of Windows Vista or Windows Server 2008 installed on any one computer.

    • Winresume.exeResumes the operating system from hibernation.

  • Microsoft provides several paths for upgrading one Vista edition to a higher one. You can upgrade Vista Home Basic to either Vista Home Premium or Vista Ultimate, and you can upgrade Vista Home Premium, Vista Business, or Vista Enterprise to Vista Ultimate.

  • Windows Anytime Upgrade facilitates the process of upgrading one edition of Vista to a higher one.

  • If you entered your product key during installation or upgrading, Vista is automatically activated three days later. You can also activate Vista manually if desired.

  • The Windows Update website analyzes your computer and determines which updates are required to keep your computer up-to-date and downloads and installs these updates automatically.

  • You have four options for determining how updates are downloaded to and installed on your computer:

    • Download and install all updates automatically.

    • Download updates and inform you so that you can select which updates you want to install.

    • Inform you that updates are available so that you can select which updates to download and install.

    • Do not to check for updates at all.

Configuring and Troubleshooting Post-Installation System Settings

  • Vista provides the Startup Repair Tool (SRT), which attempts to automatically recover a computer that will not start normally. It attempts to recover from problems such as missing or corrupted device drivers, boot configuration settings, Registry keys or data, or corrupted disk metadata such as the master boot table, boot sector, or partition table.

  • You can access the SRT by booting your computer from the Vista DVD-ROM. It provides a troubleshooting wizard that walks you through a series of steps to attempt a repair of your computer.

  • Every time a user logs on successfully, Windows Vista makes a recording of the current Registry settings, known as a control set. These settings are stored under HKEY_LOCAL_MACHINESYSTEMCurrentControlSet. This is made available as the Last Known Good Configuration the next time the computer is booted.

  • Whenever you log on successfully after having made a damaging change to the computer, you cannot use the Last Known Good Configuration.

  • Safe mode starts your computer with a minimal set of drivers (mouse, VGA, and keyboard) so that you can start your computer when problems with drivers or other software are preventing normal startup.

  • Safe mode with Command Prompt starts the computer to a command prompt. This can be useful if you cannot obtain a normal GUI.

  • Safe mode with Networking starts network drivers as well as the other basic drivers. This is useful if you need to copy files from a network location.

  • You can use System Restore to restore your computer to a previous condition without damaging any data files such as documents and email. It is useful if you are experiencing problems related to faulty device drivers, improper system settings, or incompatible applications.

  • Other available startup options include boot logging, low resolution video, debugging mode, disabling automatic restart on system failure, and disabling device driver signing enforcement.

  • The tools within the Computer Management console include Task Scheduler, Event Viewer, Shared Folders, Reliability and Performance, Device Manager, Disk Management, Services, and WMI Control.

  • The System Information utility, which can be opened by typing msinfo32 in the Run dialog box or from the command line, provides a quick view of any resource conflicts. When you are in the utility, click Hardware Resources and then click Conflicts/Sharing.

  • In Device Manager, you can click the Driver tab to update the driver, roll back the driver to a prior version, remove the driver, and troubleshoot the device.

  • Table 4 describes common problems encountered when installing or using CD/DVD drives and the appropriate solutions.

    Table 4. Troubleshooting CD or DVD Errors

    Device

    Problem or Process

    Utility/Solution

    Response

    Proprietary non-SCSI interface

    Installing

    Windows Vista Setup, Options menu, Add/Remove SCSI Adapters

    Verify/install correct device driver.

    CD-ROM drive

    Can’t play audio CD; can read data CD

    Device Manager, Sound, video, and game controllers category

    Verify device is listed. Verify audio codecs.

    CD or DVD drive

    Disc reading problem

    Physically inspect the disc

    Verify that disc has no defects or scratches. Clean disc.

    DVD drive

    Can’t play DVD

    Device Manager, device Properties, General tab

    Verify device type is DVD drive, not CD-ROM drive.

    CD or DVD drive

    Disc reading problem

    Alternate CD or DVD drive

    Test disc in alternate drive.

    CD or DVD drive

    Error reading multiple discs

    Special CD or DVD drive cleaning disc

    Clean drive.

    CD or DVD drive

    Computer stops responding while reading disc

    Task Manager (press Ctrl+Alt+Del), Performance tab

    View performance. Exit unnecessary applications.

    CD or DVD drive

    Computer stops responding while reading disc

    Perform a clean boot. Test the disc in the drive again

    Ensure that no unnecessary applications are running.

    DVD drive

    Cannot play a DVD movie disc

    Device Manager, display adapter Properties, Driver tab, Update Driver button

    Update the video driver. Install a DVD software decoder.

    DVD drive

    Analog copy protection error

    Physical presence of video output cables or older device driver does not support copyright protection on disc. Device Manager, display adapter Properties, Driver tab, Update Driver button

    Remove video output cables from video adapter or DVD drive. Update video adapter.

    DVD drive

    Low video memory

    Device Manager, display adapter Properties, Driver tab, Update Driver button

    Update the video driver.

    DVD drive

    Low video memory/poor resolution

    Control Panel, Personalization, Display Settings utility, Advanced Settings button, Monitor tab

    Lower the refresh rate.

    DVD drive

    Does not play DVD discs

    Firmware version and DVD decoder software version—validate compatibility

    Update the firmware version. Uninstall the DVD decoder software. Install a version that is compatible with Windows Vista. This can happen when a computer was upgraded from an older version of Windows.

  • Watch out for questions on the exam that require you to know when to perform a clean boot (press F8 on bootup), as well as the process to do so. You can customize how Windows Vista starts up by clicking Start, Run, typing msconfig in the Open text box, and pressing Enter.

  • There are several utilities that can help manage the disk partitions. You should be logged in as an administrator-level user to make disk or volume configuration changes, such as when using Fsutil.exe or Disk Management.

    • Chkdsk.exeCommand-line utility that verifies and repairs FAT- or NTFS-formatted volumes.

    • Cleanmgr.exeAlso known as Disk Cleanup, a GUI utility that deletes unused files.

    • Defrag.exeAlso known as Disk Defragmenter, a command-line utility that rearranges files contiguously, recapturing and reorganizing free space in the volume. Optimizes performance.

    • Dfrg.mscAlso known as Disk Defragmenter, a GUI utility that performs the same actions as DEFRAG.EXE.

    • Diskpart.exeA command-line utility that can run a script to perform disk-related functions. DISKPART’s nearest GUI counterpart is the Disk Management utility.

    • Fsutil.exeA command-line utility that displays information about the file system and can perform disk-related functions.

  • You can access the Disk Management graphical tool by right-clicking Computer and selecting Manage or running Dskmgmt.msc.

  • Disk Management enables you to change from basic to dynamic disks, format a partition, manage volumes, change drive letters, and create striped or extended volumes.

  • Table 5 describes common disk errors and how to resolve them.

    Table 5. Troubleshooting Disk Errors

    Error

    Problem or Process

    Possible Repairs

    Non-system disk

    Computer is trying to boot from a disk without a boot volume.

    Remove any non-system disks from the floppy or CD-ROM drives. Repair the boot volume using Windows Recovery Console.

    There is not enough memory or disk space to complete the operation

    Disk is full.

    Free up space on the hard disk by deleting files, removing applications, or compressing files. Add another disk and extend the volume to span both disks.

    Missing Operating System

    No active partition is defined.

    Check the BIOS settings and configure if they incorrectly identify the boot disk. Boot up with a floppy. Use Diskpart.exe to mark the boot volume as active. Use Windows Vista Startup Repair Tool. Reinstall Windows Vista.

    Non-System Disk or Disk Error

    Basic Input Output System (BIOS) generates this error when the master boot record (MBR) or boot sector is damaged or when a different device is configured as the boot device in the BIOS.

    Check the BIOS and reconfigure if necessary. Remove any non-bootable floppy disks from the PC. Repair the boot volume with Windows Vista Startup Repair Tool. Reinstall Windows Vista. Replace the hard disk.

    Invalid Media Type

    Boot sector is damaged.

    Repair the boot volume with Windows Vista Startup Repair Tool. Reinstall Windows Vista. Replace the hard disk.

    Hard disk controller failure

    BIOS’s disk controller configuration is invalid, or the hard disk controller has failed.

    Check the BIOS and reconfigure controller. Replace the hard disk controller.

  • When an application doesn’t function properly in Windows Vista, you can run it in Compatibility mode by selecting the Compatibility tab of the application’s Properties dialog box and selecting one of the compatibility modes.

  • The Windows Easy Transfer tool assists you in migrating settings from an old computer to your Windows Vista computer. It provides a wizard that facilitates transferring user accounts, folders and their files, application data and settings, email data, and Windows and Internet settings from a computer running Windows 2000 or later to the Vista computer.

  • The desktop scheme known as Aero is new to Vista.

  • Aero Glass, the enhanced version of Aero, is available on all editions of Vista except Home Basic and requires a video card with at least 128MB of onboard RAM, a high-quality graphics processor, and a bandwidth of at least 1800MB. It provides the following features:

    • Translucent title bars, which show a view of any windows or the desktop hidden beneath them

    • Windows Flip, which provides thumbnail views of tasks running on the computer when you press Alt+Tab

    • Windows Flip 3D, which provides a stacked view of tasks running on the computer when you press the Windows key+Tab combination

    • An improved taskbar, which provides thumbnail views of tasks running on the computer when you hover your mouse over a taskbar button

    • A more smoothly performing desktop, with redraw artifacts such as “tearing” and reduction of graphics driver-related crashes.

  • The Windows Presentation Foundation (WPF) presents an enhanced platform that supports media-rich applications that provide complete fidelity to systems such as the Xbox 360 Media Center Extender.

  • You can enable or disable Aero from the Appearance Settings dialog box, which is accessible by selecting Window Color and Appearance from the Control Panel Personalization category. This dialog box also enables you to select a variety of desktop schemes including one that is similar to the classic Windows 2000 appearance.

  • Table 6 describes common problems with Windows Aero and how to resolve them.

    Table 6. Troubleshooting Windows Aero

    Problem

    Cause and Possible Solution

    Window borders are not translucent.

    Press Windows+Tab. If you do not observe the Flip 3D view, your computer is not running Aero Glass.

    If you do observe the Flip 3D view, open the Window Color and Appearance dialog box and select the Enable Transparency option.

    Aero Glass is not running.

    Enable Windows Aero from the Color Scheme drop-down list in the Appearance Settings dialog box.

    Aero Glass is unavailable.

    Check your display adapter properties in Device Manager. Update the driver to a Windows Display Driver Model (WDDM)-compliant one if available.

    Glass or transparency might have been disabled in the Performance Options dialog box.

    In Control Panel, open System and Maintenance, select Performance Information and Tools, and then select Adjust Visual Effects. In the Performance Options dialog box, select Adjust for Best Appearance.

    Color depth might be insufficient.

    In the Display Settings dialog box, ensure that the color quality is set to Highest (32-bit).

    An application might be disabling Glass.

    Application compatibility settings for older applications might disable the Aero Glass desktop.

  • The Taskbar and Start Menu Properties dialog box enables you to configure properties related to the taskbar, Start menu, notification area, and toolbars.

  • The new Parental Controls feature enables you to restrict children’s access to items such as questionable websites, games, and so on. This feature is available in the Home Basic, Home Premium, and Ultimate editions and enables you to configure the following:

    • Filter web pages according to the type of content displayed. Content types such as pornography, nudity, drugs, hate speech, and weapons are supported. You can also allow or block specific websites and block file downloads.

    • Limit the days and times that children are permitted to use the computer.

    • Choose which applications children are permitted to access, thereby preventing them from running programs such as your financial planner.

    • Choose which types of games children are permitted to play according to age limits set by major game rating boards. You can also choose to permit or block specific games.

  • To enable Parental Controls on a child’s usage of the computer, each user must have his own user account with a password. You can create user accounts from the Control Panel User Accounts and Family Safety applet. Select Add or Remove User Accounts.

  • You can configure Parental Controls from the User Accounts and Family Safety applet. Select Set Up Parental Controls For Any User.

  • The Parental Controls feature enables you to view a report of what your child has done at the computer. You can view which websites the child has visited, the times the child was logged on, programs and games the child accessed or attempted to access, email and instant messages the child sent or received, and media player activity.

  • Internet Explorer 7 introduces new features such as tabbed browsing, Live Search capabilities, pop-up blocking add-on capabilities, and Really Simple Syndication (RSS) feeds. Table 7 lists the methods you should know for accessing Internet resources.

    Table 7. Accessing Resources Via a Browser

    Command

    Sample URL

    Usage

    http://

    http://www.microsoft.com

    Downloads HTML files from Internet web servers and displays the file within the browser.

    https://

    https://www.microsoft.com

    Downloads HTML files using Secure Sockets Layer (SSL) so that the information exchanged is secured.

    ftp://

    ftp://ftp.microsoft.com

    Downloads a file from an FTP server.

    File://

    File://server/share/folder/file

    Opens the file specified from a network server.

    http://

    http://printserver/printers

    Displays a list of the printers that are being shared by a computer configured with IIS for sharing printers.

    http://

    http://PrintServer/Printer

    Opens the printer page for the printer.

  • Tabbed browsing enables you to have more than one web page open simultaneously in the same Internet Explorer window. You can open, close, and refresh tabs by means of a right-click action, view thumbnails of tabs, save a set of tabs to reopen later, save a group of tabs as a favorite, or disable the use of tabbed browsing entirely.

  • By default, Internet Explorer 7 runs in Protected mode. This mode prevents hackers from hijacking your browser for nefarious purposes such as installing malicious software, modifying startup routines, or redirecting your home page.

  • You can configure the Pop-up blocker from the Tools menu of Internet Explorer. Click Pop-up Blocker Settings to open the Pop-up Blocker Settings dialog box. From this dialog box you can specify websites that are allowed to open pop-ups and whether to display the information bar and play a sound when a pop-up is blocked. You can also choose from three levels of pop-up blocking action.

  • You can change the default search provider used by Internet Explorer (Microsoft Live Search) or add additional search providers.

  • The Tools menu in Internet Explorer contains a series of options that enables you to customize the appearance of the browser window.

  • Add-ons are optional additional features that can be installed in Internet Explorer and provide additional functionality. These are sometimes installed without your knowledge. The Manage Add-Ons dialog box, accessed from the Tools menu, enables you to view add-ons that have been used or are currently in use, add-ons that run without requiring permission, and downloaded 32-bit ActiveX controls. You can disable add-ons or ActiveX controls that are causing problems, and you can delete ActiveX controls that were not preinstalled with Windows or your ISP.

  • You can run Internet Explorer without any add-ons by clicking Start, All Programs, Accessories, System Tools, Internet Explorer (No Add-ons).

  • RSS presents a simple means by which you can receive up-to-date information on the Internet at times that are convenient to you. Internet Explorer informs you that RSS feeds are available by displaying an orange toolbar icon. Click this icon to view and subscribe to feeds.

  • The Feed Settings dialog box enables you to specify how frequently feeds are downloaded. You can also choose to automatically mark feeds as read, play a sound when feeds arrive, or modify the view in which a feed is displayed.

Configuring Windows Security Features

  • Every person who logs on to Windows Vista must do so with a user account. Rights and permissions granted to each user account determine the resources that the user can access on the computer.

  • When you grant rights to domain users, the best practice is to use the AGDLP method. This means that you place Accounts in Global groups. Then you place the Global groups into Domain Local groups, to which you grant (or deny) Permissions.

  • When a permission is explicitly denied to a user or group, even if the user is a member of another group where the same permission is explicitly granted, the Deny permission overrides all others, and the user is not allowed access.

  • Whenever a user requests authorization to use a prohibited object or resource, the user sees an Access Is Denied message.

  • The Computer Management console enables you to create and manage user and group accounts.

  • Table 8 lists the more commonly accessed default local groups.

    Table 8. Default Local Groups in Windows Vista

    Local Group

    Default Access

    Default Members Locally

    Administrators

    Unrestricted access to the computer

    Administrator

    Backup Operators

    Access to run Windows Backup and sufficient access rights that override other rights when performing a backup

    N/A

    Guests

    Limited only to explicitly granted rights and restricted usage of computer

    Guest

    Network Configuration Operators

    Access to manage the network configuration of the computer, such as TCP/IP properties

    N/A

    Power Users

    Not used directly with Vista; included only for backwards compatibility with previous Windows versions

    N/A

    Remote Desktop Users

    Limited to accessing the computer via a remote desktop connection plus any explicitly granted rights and restricted usage of computer

    N/A

    Users

    Limited to use of the computer, personal files and folders, and explicitly granted rights

    All newly created users; NT AuthorityAuthenticated Users special built-in group; NT AuthorityInteractive special built-in group

  • Table 9 lists Windows Vista built-in special groups and includes their default access and default local membership.

    Table 9. Built-in Special Groups in Windows Vista

    Built-in Group

    Default Access

    Default Members Locally

    Anonymous Logon

    Not provided any default access rights.

    User accounts that Windows Vista cannot authenticate locally

    Authenticated Users

    Not given any default access rights.

    All users with valid local user accounts on this computer

    Creator Owner

    Designated full control over resources created or taken over by a member of the Administrators group.

    Administrators group

    Dialup

    No specific rights; this group is not shown on systems without configured modems and dial-up connections.

    All users who have connected to the computer with a dial-up connection

    Everyone

    Full control is the default permission granted for all files and folders on NTFS volumes; you must remove this permission to implicitly deny access.

    All users who access the computer

    Interactive

    No specific rights.

    All users who have logged on locally to the computer

    Network

    No specific rights.

    All users who have established a connection to this computer’s shared resource from a remote network computer

  • You can join your Windows Vista Business, Enterprise, or Ultimate computer to an Active Directory domain from the Computer Name, Domain, and Workgroup Settings section of the System Properties dialog box.

  • After you have joined a domain, you should use only domain user accounts to log on to your computer. You can also use the following domain groups:

    • Global—These groups are used to contain users, computers, and other global groups from the same domain. They are generally employed to organize users who have similar functions and therefore similar needs on the network.

    • Domain local—These groups can contain users, computers, and groups from any domain in the forest. They are most often used for granting permissions for resources, and as such might be employed to grant access to any resource in the domain in which they are created.

    • Universal—These groups can contain users, computers, and global groups from any domain in the Active Directory forest. You can employ these groups to grant permissions to any resource in the forest.

  • User Account Control (UAC) is a new feature in Windows Vista that requests approval before running administrative tasks on the computer. It limits tasks that can be performed without providing additional consent and requesting such consent for performing tasks such as system tasks that require higher privileges.

  • If you are logged on with a user account that possesses administrative privileges and want to perform a task that requires administrative credentials, the screen dims and you receive a UAC prompt. Click Continue to perform the task or Cancel to quit.

  • A non-administrative user who wants to perform a task that requires administrative credentials receives a UAC prompt that requires that an administrative password be typed.

  • Some third-party applications also display UAC prompts when you attempt to run them. You can verify that the program that is attempting to run is one that you really want. Again, a non-administrative user must enter an administrative password.

  • A third-party program that does not have a digital signature including its name and publisher produces a stronger UAC prompt that includes a yellow title bar and yellow shield. This prevents rogue programs from the Internet from executing without your knowledge. Such programs might perform harmful actions like sending private data to unauthorized sources. Make sure you really want to run this program before allowing it.

  • You can configure an application to always run with elevated privileges from the Compatibility tab of its Properties dialog box.

  • If you are logged on using the default Administrator account created when you install Windows Vista, you do not receive any UAC prompts. Do not use this account except under emergency conditions.

  • Local Group Policy provides a series of policy settings that you can configure to modify UAC behavior. You can specify that administrative users must enter a password to proceed or that they do not receive a UAC prompt at all. You can specify that non-administrative users are denied access to administrative tasks. You have several additional policies that govern application behavior and access to the Registry, and you can even disable the use of UAC entirely.

  • Windows Defender is a program that protects your computer against the damaging effects of spyware. It monitors your computer for telltale signs of spyware activity. When it finds problems, it attempts to block the actions of spyware and remove it from your computer.

  • Windows Defender automatically and continuously monitors your computer for signs of unwanted applications.

  • By default, Windows Defender performs a quick scan of the most vulnerable locations of your computer daily at 2:00 AM. You can modify the automatic scan behavior or manually initiate scans from the Windows Defender configuration screen.

  • You can also use Windows Defender to perform a full scan of your computer or choose a custom scan that enables you to select the drives and folders to be scanned.

  • If Windows Defender finds software that it thinks is spyware on your computer, it displays an alert and offers you the following options:

    • Quarantine—Places the software in a restricted location on your computer from which it cannot run.

    • Remove—Deletes the software permanently from your computer.

    • Ignore—Ignores the threat this time only.

    • Always Allow—Enables the software to run and adds it to the Windows Defender allowed list.

  • The Windows Defender Options dialog box enables you to specify the time and type of scans automatically performed, the type of actions taken when high-, medium-, and low-alert items are detected, the security agents that are run, and additional administrative actions. Table 10 lists the available security agents.

    Table 10. Available Security Agents in Windows Defender

    Agent

    What Each Agent Monitors

    Auto Start

    Applications that execute automatically on Vista startup, either from the Registry hives or the various Startup folders. Spyware can add itself to these locations to execute without the user’s knowledge.

    System Configuration (Settings)

    Security-related Windows settings. Spyware can modify these settings to allow it to run undetected.

    Internet Explorer Add-ons

    Add-ons that run automatically from Internet Explorer. Spyware can masquerade as these add-ons. See Chapter 4 for more information.

    Internet Explorer Configuration (Settings)

    Browser security settings. Spyware can modify these settings without your knowledge.

    Internet Explorer Downloads

    Downloaded applications that provide functionality to Internet Explorer, such as ActiveX controls and software installation programs. Spyware is often included with these downloads.

    Services and Drivers

    Services and drivers interacting with applications and the Windows operating system itself. Spyware can masquerade as services or drivers to perform its actions.

    Application Execution

    Programs as they start up and execute on the computer. Spyware can attach itself to these programs and run in the background.

    Application Registration

    Files and other locations in the operating system in which applications including spyware can be inserted to execute.

    Windows Add-ons

    Software utilities integrated with Windows. Such utilities can collect information about the user and transmit it to unauthorized parties.

  • Microsoft publishes updates to spyware definition signatures on a regular basis. You might be informed of an available update by receiving a message Windows Defender Definitions haven't been updated on starting Windows Defender.

  • Software Explorer is a Windows Defender component that enables you to view information about software programs and system state on your computer. It provides information on program startup type including automatic startup, Windows component programs, security risk classification, and digital signatures.

  • Software Explorer enables you to specify which programs can start from various locations such as the User Profile, All Users, and the Current User and Local Machine hives of the Registry. You can prevent programs from starting or remove them permanently from the Startup folder. You can also perform these actions for programs running from network locations.

  • To configure the security settings for an Internet zone, click the zone to select it and then click the Custom Level button to open the Security Settings dialog box. The zones are Internet, Local Intranet, Trusted Sites, and Restricted.

  • The Security Settings dialog box enables you to select individual security settings or specify a predefined group of security settings that range from Low, to Medium-Low, to Medium, to Medium-High, to High.

  • Content Advisor enables you to control what Internet content users can view on the computer. The Content Advisor dialog box enables you to specify ratings that filter websites according to their content as established by various rating boards. You can perform the following actions:

    • The Ratings tab enables you to customize the extent of filtering websites according to a series of criteria that includes topics such as fear, intimidation, drug use, language, nudity, sexual material, violence, and so on.

    • The Approved Sites tab enables you to specify websites that are always or never approved for viewing.

    • The General tab enables you to configure additional options such as viewing unrated pages and the specification of a supervisor password that enables users to view restricted content.

    • The Advanced tab enables you to add additional rules formatted according the World Wide Web Platform for Internet Content Selection (PICS).

  • The phishing filter in Internet Explorer 7 examines websites for phishing activity by performing the following actions:

    • Comparing website addresses visited by users with lists of reported legitimate sites saved on your computer.

    • Analyzing website addresses against characteristics (such as misspelled words) used by phishing sites.

    • Comparing website addresses with those in an online service that Microsoft operates for immediate checking against a list of reported phishing sites.

  • The phishing filter displays the address bar in red when it detects a known phishing site and displays a message informing you of the risks of continuing to it. If the site is not a known phishing site but behaves in a similar manner, the address bar appears in yellow and a warning message appears.

  • You can configure several options related to the phishing filter by selecting Phishing Filter from the Tools menu in Internet Explorer.

  • The Privacy tab of the Internet Options dialog box enables you to configure which cookies your browser accepts and whether websites are permitted to store cookies that use personally identifiable information. You can also access the pop-up blocker settings from this tab.

  • Besides the Content Advisor, the Content tab of the Internet Options dialog box enables you to link to the Parental Controls feature, configure the behavior of certificates used for encrypted connections and identification, specify the types of entries that Auto Complete is used for, and configure RSS settings.

  • The Advanced tab of the Internet Properties dialog box contains a large range of settings that you can configure in the subjects of accessibility, browsing, HTTP 1.1, international, multimedia, printing, searching, and security.

  • Windows Firewall is a personal firewall that stops undesirable traffic from being accepted by the computer. It is especially useful for home computers with broadband Internet connections that are always on. It includes the following features:

    • Support for IP Security (IPSec)

    • Support for environments using only IP version 6 (IPv6)

    • Configurable exceptions for both incoming and outgoing firewall

    • Exceptions to components such as ports, protocols, computers, and services

    • Support for command-line configuration

  • The Windows Firewall Settings dialog box, accessed from the Windows Firewall Control Panel applet, enables you to turn the firewall on or off, block all incoming connections, configure exceptions for specific ports, protocols, and programs, and select the connections for which the firewall rules will apply.

  • The Windows Firewall with Advanced Security snap-in enables you to configure the following additional types of firewall properties:

    • Inbound rules—You can specifically enable or disable predefined inbound firewall rules or create new rules.

    • Outbound rules—You can perform these same actions for outbound rules.

    • Connection security rules—You can create new rules that are used to determine limits applied to connections with remote computers.

    • Monitoring—Displays a summary of enabled firewall settings and provides links to active rules and security associations.

  • The Windows Firewall with Advanced Security snap-in also enables you to define different firewall behavior for three profile types: domain profiles, when you are connected to an Active Directory domain; private profiles, when you are connected to a private network location such as a home or small office; and public profiles, when you are connected to an insecure public network such as a Wi-Fi hotspot.

  • You can also use Group Policy to configure similar Windows Firewall policies to those configured with the Windows Firewall with Advanced Security snap-in.

Configuring Network Connectivity

  • The TCP/IP protocol suite is the default networking protocol for all editions of Windows Vista. It is also the default protocol used by the Internet.

  • By default, previous versions of Windows have used version 4 of the IP protocol, simply known as IPv4. While its 32-bit address space has been adequate for many years, recent rapid growth of the Internet has pushed IPv4 towards exhaustion of its address space.

  • To address this limitation, the Internet Engineering Task Force (IETF) introduced version 6 of the IP protocol (IPv6) in 1998. This protocol provides for 132-bit addressing, which allows for a practically infinite number of possible addresses and provides several additional benefits.

  • Using a new TCP/IP implementation known as the Next Generation TCP/IP stack, Vista provides a dual IP layer architecture enabling the operation of both IPv4 and IPv6 at the same time.

  • IPv4 address information applied to the network interface consists of an IP address (a unique, logical 32-bit address that identifies the computer and its subnet), subnet mask (when applied to an IP address it determines what portion is the host address and what is the subnet), default gateway (the router’s address that leads to the main network or public Internet), DNS server address (IP address of the DNS server where names are resolved to IP addresses), and Windows Internet Naming Service (WINS) server address (IP address of the server that provides NetBIOS name to IP address resolution).

  • Each network connection in the Network and Sharing Center represents a separate adapter and separate IP address information.

  • Table 11 describes the IPv4 address classes, including the maximum number of networks and number of hosts per network for each class.

    Table 11. IPv4 Address Classes

    Class

    Dotted Decimal Range

    First Octet Binary

    Usage

    Number of Networks

    Number of Hosts Per Network

    A

    1.0.0.0–126.255.255.255

    0xxxxxxx

    Large networks / ISPs

    126

    16,777,214

    B

    128.0.0.0–191.255.255.255

    10xxxxxx

    Large or mid-size networks/ ISPs

    16,382

    65,534

    C

    192.0.0.0–223.255.255.255

    110xxxxx

    Small networks

    2,097,150

    255

    D

    224.0.0.0–239.255.255.255

    1110xxxx

    Multicasting

    N/A

    N/A

    E

    240.0.0.0–254.255.255.255

    1111xxxx

    Reserved for future use

    N/A

    N/A

    Loopback

    127.0.0.1–127.255.255.255

    01111111

    Loopback testing

    N/A

    N/A

    Private IP Class A address

    10.0.0.0–10.255.255.255

    00001010

    Reserved for a private network

    1

    16,777,214

    Private IP Class B address

    172.16.0.0–172.16.255.255

    10101100

    Reserved for a private network

    1

    65,534

    Private IP Class C address

    192.168.0.0–192.168.255.255

    11000000

    Reserved for a private network

    254

    254

  • DHCP provides dynamic IP addresses to a computer when it needs to be connected to the network. When the computer is disconnected, the IP address becomes available for use by another computer. Use of DHCP ensures that all computers on the network receive unique IP addresses and that best usage is made of the available IP address scope.

  • The Automatic Private Internet Protocol Addressing (APIPA) system provides an alternate configuration to DHCP for automatic IP addressing.

  • APIPA defines its IP addresses in the range of 169.254.0.1 to 169.254.255.254. The subnet mask on these addresses is configured as 255.255.0.0.

  • IPv6 addresses consist of eight 16-bit blocks, each of which is portrayed as a 4-digit hexadecimal number and is separated from other blocks by colons. This notation is referred to as colon-hexadecimal, for example 3ffe:ffff:21a5::ff:fe21:5a3e.

  • IPv6 addresses contain a prefix that represents the network portion of the address. The number of bits used by the address prefix is represented by a number at the end of the prefix; for example, 3ffe:ffff:21a5::/64.

  • IPv6 uses the following three types of addresses:

    • Unicast—Represents a single interface within the typical scope of unicast addresses. In other words, packets addressed to this type of address are to be delivered to a single network interface.

    • Multicast—Represents multiple interfaces to which packets are delivered to all network interfaces identified by the address.

    • Anycast—Also represents multiple interfaces. Anycast packets are delivered to a single network interface that represents the nearest (in terms of routing hops) interface identified by the address.

  • Table 12 provides additional details on the IPv6 classes and subclasses.

    Table 12. IPv6 Address Classes and Subclasses

    Class

    Address Prefix

    Additional Features

    First Binary Bits

    Usage

    Global unicast

    2000::/3

    Use a global routing prefix of 45 bits (beyond the initial 001 bits) which identifies a specific organization’s network, a 16-bit subnet ID (which identifies up to 54,536 subnets within an organization’s network, and a 64-bit interface ID, which indicates a specific network interface within the subnet.

    001

    Globally routable Internet addresses that are equivalent to the public IPv4 addresses.

    Link Local unicast

    fe80::/64

    Equivalent to APIPA-configured IPv4 addresses in the 169.254.0.0/16 network prefix.

    111111101000

    Used for communication between neighboring nodes on the same link.

    Site Local unicast

    fec0::/10

    Equivalent to the private IPv4 address spaces mentioned previously in Table 6.1. Prefix followed by a 54-bit subnet ID field within which you can establish a hierarchical routing structure within your site.

    111111101100

    Used for communication between nodes located in the same site.

    Unique local IPv6 unicast

    fc00::/7

    Prefix followed by a local (L) flag, a 40-bit global ID, a 16-bit subnet ID, and a 64-bit interface ID.

    11111100

    Provide addresses that are private to an organization but unique across all the organization’s sites.

    Multicast

    ff

    Use the next 4 bits for flags (Transient[T], Prefix [P], and Rendezvous Point Address[R]), the following 4 bits for scope (determines where multicast traffic is forwarded), and the remaining 112 bits for a group ID.

    11111111

    Multiple interfaces to which packets are delivered to all network interfaces identified by the address.

    Anycast

    (from unicast addresses)

    Assigned from the unicast address space with the same scope as the type of unicast address within which the anycast address is assigned.

    (varies)

    Only utilized as destination addresses assigned to routers.

  • To assist in the migration from IPv4 to IPv6 and their coexistence, several additional address types are used, as follows:

    • IPv4-compatible addresses—Nodes communicating between IPv4 and IPv6 networks can use an address represented by 0:0:0:0:0:0:w.x.y.z, where w.x.y.z is the IPv4 address in dotted-decimal.

    • IPv4-mapped address—An IPv4-only node is represented as ::ffff:.w.x.y.z to an IPv6 node. This address type is used only for internal representation and is never specified as a source or destination address of an IPv6 packet.

    • 6-to-4 address—Used for communication between two nodes running both IPv4 and IPv6 across an IPv4 routing infrastructure. You can form the 6-to-4 address by combining the prefix 2002::/16 with the 32-bit public IPv4 address to form a 48-bit prefix.

  • New to Windows Vista, the Network and Sharing Center brings all networking tasks together in a single convenient location.

  • You can use the Network and Sharing Center to configure your computer with TCP/IP version 4 or 6 either manually or dynamically.

  • The default method is to dynamically configure TCP/IP. This includes the default gateway used for accessing the Internet as well as the addresses of WINS and DNS servers.

  • You can configure your computer with a static IPv4 or IPv6 address, along with the IPv4 subnet mask, default gateway, WINS and DNS servers, and any additional IP addresses that might be required for purposes such as hosting two different websites.

  • Although you cannot remove IPv6 from a Vista computer, you can disable IPv6 on specific network connections.

  • The Sharing and Discovery section of the Network and Sharing Center enables you to perform actions related to sharing of resources on your computer with others on the network.

  • You can share folders with other users across the network from the Computer Management snap-in or from the Sharing tab of a folder’s Properties dialog box. New to Vista, you can specify the names of users with whom you want to share each folder.

  • Windows Vista shares folders to others as Reader, which means that the users you specify can view but not modify available files. You can modify this by clicking Advanced Sharing from the Sharing tab of the Properties dialog box and clicking Permissions. This enables you to elevate the permission to Change (enables users to view and modify files but not change the attributes of the shared folder itself) or to Full Control (enables users to view and modify files and change the attributes of the shared folder including ownership).

  • You can hide shares by adding a $ symbol at the end of the name. All administrative shares are hidden. These are C$, ADMIN$, IPC$, PRINT$, and FAX$.

  • Windows Vista provides the C:UsersPublic folder as a location for sharing files as a default. By default, public folder sharing is turned off. You can configure this folder so that anyone on the network can read files or so that they can read, change, and create files. You can also turn password protected sharing on and specify a password that an external user must enter to gain access to the shared folder.

  • You can also share other resources such as printers and media such as music, pictures, and videos from the Sharing and Discovery section of the Network and Sharing Center.

  • Windows Vista lets you search for computers on the network, even when connected remotely. Click Start, Search, and then select Advanced Search from the dialog box that appears. Expand the Network entry to display available computers and then double-click the desired computer to view its shares. You can also type partial names or similar names or use the View Computers and Devices option in the Network and Sharing Center.

  • The Network and Sharing Center also enables you to configure wireless networking. Windows Vista supports the 802.11 protocols for wireless LANs and is capable of transparently moving between multiple wireless access points (WAPs), changing to a new IP subnet, and remaining connected to the network.

  • Vista provides considerably enhanced wireless network reliability, stability, and security compared to Windows XP.

  • Vista provides the Set Up a Home or Small Business Network wizard that simplifies the process of setting up various types of network connections and connecting to wireless and other networks. You can set up wireless routers or access points, manually connect to wireless networks, set up a wireless ad hoc (computer to computer) network, set up a dial-up connection, or connect to a virtual private network (VPN) office connection.

  • The Set Up a Home or Small Business Network wizard also lets you choose from several file and printer sharing options that determine how resources on your computer will be available to others on the network you have set up.

  • You can choose among the wireless security types described in Table 13 when setting up your wireless network.

    Table 13. Available Wireless Security Types

    Security Type

    Description

    Available Encryption Types

    No authentication (open)

    Open system authentication with no encryption

    None

    Wired Equivalent Privacy (WEP)

    Open system authentication using WEP

    WEP

    WPA-Personal

    Wi-Fi Protected Access (WPA) using a preshared passphrase or key

    Temporal Key Integrity Protocol (TKIP) (default) or AES

    WPA2-Personal

    Version 2 of WPA using a preshared passphrase

    TKIP or AES (default)

    WPA-Enterprise

    WPA using IEEE 802.1x authentication

    TKIP (default) or AES

    WPA2-Enterprise

    Version 2 of WPA using IEEE 802.1x authentication

    TKIP or AES (default)

    802.1x

    IEEE 802.1x authentication using WEP (also known as dynamic WEP)

    WEP

  • You can manage wireless network connections from the Manage Wireless Networks dialog box. This dialog box enables you to add new wireless networks, view or modify the properties of a wireless network connection, modify the sequence of preferred connection to these networks, or choose the type of profile (per-user or per-computer) to be applied to a network.

  • Internet Connection Sharing (ICS) can be configured on a Windows Vista computer to share its Internet connection with other computers on its local network.

  • ICS runs a simplified DHCP service, DNS forwarder, Network Address Translation (NAT), and TCP/IP traffic forwarding. It also includes an auto-dial feature that establishes the Internet connection when required from a computer on the network that does not host the Internet connection.

  • You can check the status of a LAN connection from the Network Connections folder. Right-click your connection icon and choose Status to display the Local Area Connection status dialog box. This dialog box contains a troubleshooter that attempts to diagnose the source of a connection problem.

  • Problems such as incorrect or duplicate IP addresses, incorrect subnet masks, or inability to connect to a DHCP server might prevent you from communicating on a wired or wireless network.

  • Use IP utilities, described in Table 14, to troubleshoot network connectivity on a TCP/IP network.

    Table 14. IP Utilities

    Utility

    Command

    Usage

    Packet InterNet Groper (Ping)

    ping

    Uses an echo command to establish whether packets can be routed at the Network layer on a network.

    File Transfer Protocol (FTP)

    ftp

    Uploads/downloads files on a network. This command helps you determine whether Application layer functions can work on the network.

    Telnet

    telnet

    Establishes a character-based session with a Telnet server across a network. This command helps you determine whether Session layer functions can work on a network.

    Line printer daemon

    lpr

    Executes a print job on a network printer.

    Ipconfig

    ipconfig

    Shows the IP configuration of network adapters installed in a computer. From the results of this command, you can determine whether you have incorrectly addressed the adapter or the default gateway or whether the adapter was unable to obtain an address from the DHCP server. Use the /all switch to show all IP configuration information. Other switches, such as /release or /renew, can assist with correcting DHCP problems.

    Name Server Lookup

    nslookup

    Checks DNS entries.

    Netstat

    netstat

    Displays Transmission Control Protocol/Internet Protocol (TCP/IP) connections and protocol statistics. To find all the applicable switches, type netstat /? at the command prompt.

    Nbtstat

    nbtstat

    Similar to netstat, except that it resolves NetBIOS names to IP addresses. To find all applicable command switches, type nbtstat /? at a command prompt.

    Trace Route

    tracert

    Shows all the routing hops that a packet takes to reach a destination on a network.

  • You might encounter several problems that are specific to wireless networking:

    • If your computer randomly switches between access points, place the most-used wireless network at the top of the list in the Manage Wireless Networks dialog box. Then access this network’s Properties dialog box and clear the check box labeled Connect to a More Preferred Network If Available.

    • If you are unable to connect to your wireless network, you should verify that it is available. Ensure that the wireless network name is visible in the Manage Wireless Networks dialog box. Also ensure that the service set identifier (SSID) is correct and that the WEP configuration matches the settings specified on the access point.

    • Ensure that the wireless access point is available and properly configured.

    • Check for interference from other devices such as cordless phones or microwave ovens.

    • Use Device Manager to check for conflicts between your wireless network adapter and another network adapter on your computer.

  • If you are not connecting to any network and the link light on your network card is not lit, you most likely have a hardware problem. Use Device Manager to check for disabled or non-functional devices. You might need to update the device driver or if you have recently done so, roll back the driver to a previous version.

  • For modem problems, check the Phone and Modem Options applet in the Hardware and Sound category of Control Panel. From the Diagnostic tab, click Query Modem and watch for an entry to appear in the Command/Response list. If you receive an error message, check the modem’s properties in Device Manager.

  • Remote Access enables you to connect to remote networks by means of a dial-up or VPN connection across the Internet.

  • Point-to-Point Protocol (PPP) is a dial-up protocol that supports TCP/IP and IPX/SPX and others with advanced compression and encryption functions.

  • Tunneling protocols are used for VPNs. They are Point-to-Point Tunneling Protocol (PPTP), which supports multiple networking protocols; and Layer 2 Tunneling Protocol (L2TP), which also supports multiple networking protocols and is used with IPSec.

  • Table 15 describes remote access authentication protocols and their security methods.

    Table 15. Authentication Protocols for Remote Access

    Acronym

    Name

    Security

    CHAP

    Challenge Handshake Authentication Protocol

    One-way authentication. Server authenticates client.

    EAP

    Extensible Authentication Protocol

    Not used to provide its own security, enables enhanced interoperability and efficiency of authentication process.

    MS-CHAPv2

    Microsoft Challenge Handshake Authentication Protocol version 2

    Mutual (two-way) authentication.

    PAP

    Password Authentication Protocol

    Clear-text, one-way authentication. Least secure method.

    Smart cards

    Certificates

    Certificate-based, two-way authentication.

  • The most secure protocol is certificate-based. The next most secure is MS-CHAPv2. The least secure is PAP.

  • You can specify additional remote access security settings from the Local Security Policies snap-in. From here you can specify account lockout settings that lock a user out should she attempt to guess a password.

  • You can also specify callback settings to restrict misuse of a Windows Vista computer configured to accept incoming connections via dial-up. The computer disconnects and calls the incoming user back at a predefined telephone number; if the user is not at this location, he does not gain access.

  • You can establish a VPN client connection to a remote network from the Connect to a Network dialog box. Type the username, password, and domain name (if used) when instructed. Vista saves this connection information for later use.

  • You can also configure additional properties of the VPN connection from its Properties dialog box, including the authentication protocol in use, optional or required encryption, use of ICS to share the connection with other local computers, and networking options such as File and Printer Sharing for Microsoft Networks, QoS Packet Scheduler, and the Client for Microsoft Networks.

  • Remote Assistance and Remote Desktop both use Remote Desktop Protocol (RDP).

  • To share a Remote Desktop session, open the System applet in Control Panel, click the Remote tab, and select the Allow Connections from Computers Running Any Version of Remote Desktop (for connections from XP or Vista computers) or the Allow Connections Only from Computers Running Remote Desktop with Network Level Authentication (for connections from Vista computers only). Then click the Select Users button to select the users allowed to connect.

  • Remote Desktop privileges are automatically granted to any member of the Administrators group.

  • Remote Assistance allows a user running a Windows Vista computer on a network to request assistance online or for an expert to offer assistance remotely. The expert’s session is a shadow of the user’s console.

  • You must configure Windows Firewall to allow Remote Desktop or Remote Assistance sessions to pass. Access the Security Center, select Windows Firewall, and then select Allow a Program Through Windows Firewall and click Continue on the UAC prompt that appears. On the Exceptions tab of the Windows Firewall Settings dialog box, select the Remote Assistance and Remote Desktop check boxes.

  • To request Remote Assistance, you use Help and Support in the Start menu.

  • Remote Assistance requests can be made through email or file.

Configuring Applications Included with Windows Vista

  • Windows Vista Home Premium and Windows Vista Ultimate contain a rich set of media-based applications that enable you to work with and enjoy your music, photos, videos, and TV programs on your computer. These include Windows Media Center, Windows Media Player, Windows Photo Gallery, and Windows Movie Maker.

  • Windows Media Center is a one-stop, complete multimedia application that lets you watch and record TV, listen to digital music, play games, listen to FM and Internet radio stations, or access content from online media services.

  • Express Setup in Windows Media Center simplifies the process of setting up Windows Media Center to work with the media devices installed on or available to your computer.

  • Windows Media Center displays all available media content that you have saved to your computer.

  • You can use a network projector with Windows Media Center for giving business presentations or slide shows from your computer. If you are using a wireless network, security protocols configured on the network encrypt the communication. The Connect to a Network Projector Wizard facilitates the process of locating and accessing a network projector.

  • Windows Media Player version 11 offers a high level of choice and flexibility for managing digital media, including music, photos, and videos.

  • Windows Media Player 11 provides a series of enhancements over previous versions, including improved access to features, improved navigation, use of album art to facilitate locating specific media, revamped playback controls, simplified media libraries that you can organize by several categories, the display of available playlists, the ability to connect to an online music store, ripping and burning options, synchronizing with other computers and external music players, improved video experience, and improved view options.

  • The Custom Setup feature in Windows Media Player enables you to customize settings such as privacy options, content providers, file types played by Windows Media Player, and online music stores. You can also choose to make Windows Media Player 11 to be the default music and video player.

  • The Options dialog box provides the following options for configuring Windows Media Player:

    • Library tab—Enables you to configure settings for organizing and sharing your digital media.

    • Plug-Ins tab—Enables you to search for plug-ins and visualizations on the Internet according to preconfigured category lists.

    • Privacy tab—Enables you to configure several privacy options, including information and usage rights options downloaded from the Internet, refreshing of protected media files, syncing time and date on portable devices, extended content provider services, joining the Windows Media Player Customer Experience Improvement Program, and keeping a history of recently played media files.

    • Security tab—Enables you to configure several enhanced security options that govern the playback of media by Windows Media Player. You can choose whether to run script commands when present in digital media or on a web page, playing enhanced media content, showing local captions when present, and configuring Internet Explorer security zones.

    • DVD tab—Enables you to prevent users from playing DVDs according to ratings established by the Motion Picture Association of America (MPAA).

    • Network tab—Enables you to specify how Windows Media Player accesses the Internet to obtain and play streamed digital media content.

    • Player tab—Enables you to configure player settings, such as how often Windows Media Player checks for updates, check for updates automatically, keep the player on top of other windows, prevent the screen saver from appearing, stop playback when switching to another user, and utilize the mini-Player.

    • Rip Music tab—Governs when and how Windows Media Player copies (rips) music files from an audio CD inserted in the computer’s CD-ROM drive.

    • Devices tab—Enables you to specify the properties for CD and DVD drives, displays, speakers, and portable audio devices connected to your computer.

    • Burn tab—Enables you to configure settings for recording (burning) audio and data files to CDs and DVDs.

    • Performance tab—Provides additional options that affect the performance of Windows Media Player.

  • Additional menu bar options are available that govern ripping (copying of audio CDs), burning of audio CDs, data CDs, or DVDs, and syncing of media files to portable devices such as mp3 players.

  • Group Policy offers several settings that govern Windows Media Player in the fields of networking, playback, the user interface, and retrieval of media from the Internet.

  • Windows Photo Gallery enables you to import photos and videos from cameras, scanners, removable media, other computers on the network, or the Internet. You can view the images, add or edit metadata, assign ratings, catalog the images to facilitate searching for them later, and burn them to CD or DVD.

  • The File menu in Windows Photo Gallery provides the commands for managing images as described in Table 16.

    Table 16. Windows Photo Gallery File Commands

    Command

    Purpose

    Add Folder to Gallery

    Enables you to select a folder containing pictures and videos to be included in the gallery. Browse to the desired location and then click OK.

    Import from Camera or Scanner

    Enables you to select a device containing photos to be imported from a dialog box listing all available devices such as cameras, scanners, or memory card readers. Windows Photo Gallery uses the new Media Transfer Protocol (MTP) for importing images. MTP offers enhanced capabilities including support for additional devices such as portable media players and cellular phones, faster transfer of files, support for wireless connectivity to supported devices, and improved support for audio and video formats.

    Delete, Rename, Copy, and Select All

    Function exactly as the corresponding commands in any window’s File menu.

    Screen Saver Settings

    Brings up the Screen Saver tab of the Display Properties dialog box. You can select images from your gallery to be used in a custom screen saver.

    Share with Devices

    Brings up the Media Sharing dialog box, which enables you to share music, pictures, and videos on the network. This dialog box is similar to the Media Sharing dialog box included with Windows Media Player.

    Properties

    Displays a Properties dialog box for the selected image. By default, the Details tab appears, which provides detailed information including metadata recorded by the camera when the photo was taken.

    Options

    Brings up the Windows Photo Gallery Options dialog box, which enables tooltips, copies of originals after you perform fixes, and checks for updates to Windows Photo Gallery. The Import tab of this dialog box provides options that govern the importing of images from cameras, scanners, CDs, and DVDs.

    Exit

    Exits Windows Photo Gallery.

  • You can perform a series of quick fixes on an image in Windows Photo Gallery. Available fixes include manual or automatic adjustment of exposure and color, cropping, and fixing red eye.

  • Windows Photo Gallery also has options for searching for and previewing images, playing slide shows, displaying an image as your desktop wallpaper, creating image tags and ratings, and viewing by folder or by date taken.

  • Windows Movie Maker and its companion application, Windows DVD Maker, enable you to create, import, manage, and edit digital videos in regular or high-definition format.

  • Windows Movie Maker and Windows DVD Maker offer support for high-definition video, simplified importing of videos, integration with Windows Photo Gallery, DVD authoring and burning capabilities, and high-quality graphics capabilities.

  • Windows Mail is the successor to Outlook Express and offers the following enhancements:

    • Improved reliability—Windows Mail utilizes new technology to improve the handling of large email messages and data files containing thousands of messages.

    • Instant search—As with other bundled applications, you can rapidly search across thousands of email messages, even those that are years old.

    • Spam filter—Windows Mail screens and analyzes incoming messages to spot and remove junk email.

    • Phishing filter—Windows Mail checks for messages containing fraudulent links to phishing websites.

    • Improved newsgroup capabilities—You can more easily manage and contribute to newsgroups and discussion groups.

  • Windows Mail provides a wizard that simplifies the input of your email account information.

  • The Internet Accounts dialog box enables you to manage your email and newsgroup accounts.

  • The Import command in Windows Mail enables you to import contacts, messages, and mail and news account settings. You can also export contacts and messages to other mail programs.

  • The Options dialog box in Windows Mail enables you to specify configuration options for a large range of properties including the sending and receiving of messages, reading of email and news messages, requesting of read receipt for messages you send, viewing of messages in HTML format, the font and stationery used with messages you are composing, the use of signatures and business cards, spell checking, connection to the Internet, and additional advanced options.

  • Microsoft has upgraded the security of email handled by Windows Mail to handle many new concerns including junk mail (spam), phishing, virus protection, blocking of file extensions that might contain viruses or other malware, downloading of images, and the use of digital certificates for signing or encryption of your email messages.

  • Windows Meeting Space is a new collaboration tool that enables face-to-face interaction among small groups of users in any location using a wired or wireless network.

  • Windows Meeting Space offers features such as support for wireless networking, shared control of presentations, compatibility with non-Microsoft applications, the ability to check for others on the network and invite them to a meeting, searching for meeting sessions, and the sharing and editing of files among meeting attendees.

  • The People Near Me feature identifies nearby people and enables them to send meeting invitations.

  • Windows Meeting Space enables you to share handouts, applications running on your computer, or your entire desktop with others in your meeting. Attendees can view and edit handouts, and you can perform actions such as demonstrations that others can view.

  • Windows Calendar is a full-fledged calendar application that enables you to keep track of meetings and appointments. It enables you to create tasks and appointments, create alerts to remind you of scheduled items, create task lists, and share calendars with coworkers or family members.

  • You can view meetings, appointments, and tasks on a day, week, or month basis, as well as navigate to other months or days. You can even navigate to other years or decades if needed.

  • You can create multiple calendars and share them with others in your workgroup or family so that everyone knows what others have scheduled. You can display information from multiple calendars together on a color-coded basis.

  • Windows Calendar enables you to create appointments, all-day events, and tasks. You can include information such as details, locations, the calendar to be used, URLs, all-day appointments, recurring appointments, and task priorities. You can also create reminders that alert you to upcoming appointments.

  • You can share and publish your calendars so that others are aware of your activities. You can configure web-based sharing or send calendars by email. Others can subscribe to your calendars, and you can subscribe to theirs.

  • Windows Fax and Scan simplifies the tasks of sending and receiving faxes, scanning images and documents, and sharing these items with others. This program provides the following features:

    • Single-click faxing and scanning—It is as easy to fax or scan documents as it is to use email.

    • Simplified routing of faxes and scanned documents—Enables you to create routing lists of server shares and email addresses for receiving copies of faxed and scanned documents.

    • Drag-and-drop functionality—Simplifies the task of filing and sorting your faxes and scanned documents.

    • Live preview capability—Enables you to see how documents will look prior to scanning so that you can modify settings as required.

  • Windows Fax and Scan uses fax accounts for tracking fax use by everyone using the program.

  • You can send faxes containing only a cover page, multipage faxes, or faxes with attached documents.

  • You can also send a fax document directly from many applications such as Microsoft Word by means of a fax printer driver that renders your document as a fax.

  • Windows Fax and Scan enables you to scan documents and images from scanners attached to your computer or located on the network. You can also scan and fax a document in a single step.

  • Windows Sidebar is a pane that appears by default on the right side of your display and includes a variety of items known as gadgets. By default, Windows Sidebar displays an analog clock, a slide show, and a series of newsfeed headlines from the Internet.

  • You can add gadgets from a set included with Vista by default, or you can download additional gadgets from the Internet for adding to the Sidebar.

  • Some gadgets such as the slide show feature additional customization options.

Monitoring and Optimizing System Performance and Reliability

  • Monitoring applications include the Reliability and Performance Monitor, Task Manager, and Scheduled Tasks.

  • The Reliability and Performance Monitor includes a Resource Overview that provides a summary of CPU, disk, network, and memory performance statistics including mini-graphs of recent performance of these four components.

  • Performance Monitor provides a real-time graph of computer performance:

    • Object—A specific hardware or software component capable of being monitored.

    • Counter—One of a series of statistical measurements associated with each object.

    • Instance—A single item of multiple occurrences of a given object. For example, a dual-processor computer has two instances of the processor: instance 0 and instance 1.

  • Reliability Monitor is a new component in Windows Vista that produces a trend analysis of your computer’s system stability with time. It provides the System Stability Chart, which correlates the trend of your computer’s stability against events that might destabilize the computer.

  • The Data Collector Sets feature enables you to log computer performance over time while the computer is executing other tasks.

  • Data collector sets are binary files that store performance statistics, which you can later analyze in the Performance Monitor snap-in. Vista provides a wizard that assists you in setting up a new data collector set and using it to collect performance data. You can also use a set of counters you have already configured in Performance Monitor.

  • The Data Collector Sets feature also enables you to display an alert when a selected counter exceeds or drops beneath a specified value.

  • Table 17 describes important Memory object counters and how to resolve related problems.

    Table 17. Important Counters for the Memory Object

    Counter

    What It Measures

    Interpretation and Remedial Tips

    Pages/sec

    The rate at which data is read to or written from the paging file

    A value of 20 or more indicates a shortage of RAM and a possible memory bottleneck. To view the effect of paging file performance on the system, watch this counter together with LogicalDisk\% Disk Time. Add RAM to clear the problem.

    Available Bytes

    The amount of physical memory available

    A value consistently below 4MB indicates a shortage of available memory. This might be due to memory leaks in one or more applications. Check your programs for memory leaks. You might need to add more RAM.

    Committed Bytes

    The amount of virtual memory that has been committed to either physical RAM or running processes

    Committed memory is in use and not available to other processes. If the amount of committed bytes exceeds the amount of RAM on the computer, you might need to add RAM.

    Pool Nonpaged Bytes

    The amount of RAM in the nonpaged pool system memory (an area holding objects that cannot be written to disk)

    If this value exhibits a steady increase without a corresponding increase in computer activity, check for an application with a memory leak.

    Page Faults/sec

    The number of data pages that must be read from or written to the page file per second

    A high value indicates a lot of paging activity. Add RAM to alleviate this problem.

  • The Paging File\% Usage counter is of use when troubleshooting memory problems.

  • By default, the paging file is located at %systemdrive%pagefile.sys and has a default size of the amount of RAM in the computer plus 300MB and a default maximum size of three times the amount of RAM in the computer.

  • You might want to configure equal values for the initial and final paging file sizes. It is more efficient to increase the initial size of the paging file rather than to increase the final size. Increasing the final size of the paging file can force the operating system to allocate more space as applications start, thereby causing disk fragmentation. In most cases, configuring the option for Windows to select the best paging file size will work fine.

  • Table 18 describes important Processor object counters and how to resolve related problems.

    Table 18. Important Counters for the Processor Object

    Counter

    What It Measures

    Interpretation and Remedial Tips

    % Processor Time

    The percentage of time the processor is executing meaningful actions (excludes the Idle process)

    If this value is consistently greater than 85%, the processor could be causing a bottleneck. You should check the memory counters discussed previously; if these are high, consider adding more RAM. Otherwise, you should consider adding a faster processor (or an additional one if supported by your motherboard).

    Interrupts/sec

    The rate of service requests from I/O devices that interrupt other processor activities

    A significant increase in the number of interrupts without a corresponding increase in system activity might indicate some type of hardware failure. Brief spikes are acceptable.

  • Table 19 describes important PhysicalDisk object counters and how to resolve related problems.

    Table 19. Important Counters for the PhysicalDisk Object

    Counter

    What It Measures

    Interpretation and Remedial Tips

    % Disk Time

    The percentage of time that the disk was busy reading or writing to any partition

    A value of more than 50% suggests a disk bottleneck. Consider upgrading to a faster disk or controller. Also check the memory counters to see whether more RAM is needed.

    Average Disk Queue Length

    The average number of disk read and write requests waiting to be performed

    If this value is greater than 2, follow the same suggestions as for % Disk Time.

    Average Disk Sec/Transfer

    The length of time a disk takes to fulfill requests

    A value greater than 0.3 might indicate that the disk controller is retrying the disk continually because of write failures.

  • Table 20 describes important LogicalDisk object counters and how to resolve related problems.

    Table 20. Important Counters for the LogicalDisk Object

    Counter

    What It Measures

    Interpretation and Remedial Tips

    % Disk Time

    The percentage of time that the disk is busy servicing disk requests

    A value greater than 90% might indicate a performance problem except when using a RAID device. Compare to Processor\% Processor Time to determine whether disk requests are using too much processor time.

    Average Disk Bytes/Transfer

    The amount of data transferred in each I/O operation

    Low values (below about 20KB) indicate that an application might be accessing a disk inefficiently. Watch this counter as you close applications to locate an offending application.

    Current Disk Queue Length

    The amount of data waiting to be transferred to the disk

    A value greater than 2 indicates a possible disk bottleneck, with processes being delayed because of slow disk speed. Consider adding another faster disk.

    Disk Transfers/sec

    The rate at which read or write operations are performed by the disk

    A value greater than 50 might indicate a disk bottleneck. Consider adding another faster disk.

    % Free Space

    Percentage of unused disk space

    A value less than about 15% indicates that insufficient disk space is available. Consider moving files, repartitioning the disk, or adding another disk.

  • You should log disk activity to a different disk or computer. The act of recording performance logs places an extra “hit” on performance for the disk on which logs are recorded.

  • Vista provides the following command-line tools to assist you in monitoring performance:

    • LogmanManages data collector logs. You can start, stop, and schedule the collection of performance and trace data.

    • RelogCreates new performance logs from data in existing logs by modifying the sampling rate and/or converting the file format.

    • TypeperfDisplays performance data to the command prompt window or to a log file.

  • Vista provides the following three technologies for enhancing system performance:

    • Windows SuperFetch—Optimizes memory performance based on trends of most-used programs and data on the computer, enabling Vista to decide on which content should be loaded into RAM at a particular time.

    • Windows ReadyBoost—Enables you to use a USB flash drive or memory card as an additional source of memory to enhance your computer’s performance without adding additional RAM.

    • Windows ReadyDrive—Enables mobile computers equipped with a hybrid hard disk to achieve enhanced performance and improved battery life.

  • The System Configuration Utility enables you to disable common services and startup programs to selectively troubleshoot which items are preventing a normal startup.

  • Task Manager provides data about currently running processes, including their CPU and memory usage and enables you to modify their priority or shut down misbehaving applications.

  • You can modify an application’s behavior by adjusting its priority in Task Manager or by starting the application at a different priority.

  • Priorities for applications are Realtime (the highest priority, only to be used cautiously), High, AboveNormal, Normal (the default priority), BelowNormal, and Low.

  • You can modify the application’s priority in Task Manager or by using the start /option command.

  • You might be able to improve computer performance by changing the relative priority of foreground and background applications. The following options are available:

    • Programs—Assigns more processor resources to programs currently running in the foreground (active programs)

    • Background services—Assigns equal amounts of resources to all programs, including those such as disk backup or defragmentation that are running in the background

  • You can set processor affinity from Task Manager. Simply right-click the process from the Processes tab and choose Set Affinity. Then select the appropriate processor.

  • Event Viewer enables you to see errors and system messages. This program records events in the following five logs:

    • Application—Logs events related to applications running on the computer, including alerts generated by data collector sets.

    • Security—Logs events related to security-related actions performed on the computer.

    • Setup—Logs events related to setup of applications.

    • System—Contains events related to actions taking place on the computer in general, including hardware-related events.

    • Forwarded events—Contains events logged from remote computers.

  • Most logs in Event Viewer record three types of events—errors, warnings, and informational events.

  • You can customize Event Viewer to show only the types or categories of logs you need to view. You can also associate tasks with events logged by Event Viewer.

  • Windows Update enables you to maintain your computer in an up-to-date condition by automatically downloading and installing critical updates as Microsoft publishes them.

  • You can use Windows Update to check manually for updates or configure one of several options to download and install updates automatically.

  • You can use a server running Windows Server Update Services (WSUS) to download updates on a corporate network, test them for compatibility, and distribute approved updates to computers on the network.

  • Group Policy provides a series of policy settings that govern the actions performed by Windows Update, including the manner in which computers check for updates, the use of a WSUS server, restart options, and so on.

  • Vista includes the Backup and Restore Center and the Backup Status and Configuration utility to facilitate backup and restoration of data.

  • The Backup and Restore Center enables you to back files and folders up to hard disks, CDs, DVDs, or network shared folders.

  • The Windows Complete PC Backup and Restore procedure enables you to fully restore your computer in the event of a hardware failure. This procedure replaces the System State backup used in Windows 2000/XP and backs up your data at the same time.

  • You can use the Backup and Restore Center to restore selected files and folders or to restore all files and settings from a Windows Complete PC Backup and Restore image. You can also use System Restore to restore system files and settings to an earlier point in time.

  • The Backup Status and Configuration Utility provides the following additional backup options:

    • Back Up Now—Performs an incremental backup of a selected set of files and folders. This procedure backs up only those files and folders that have changed since the previous backup.

    • Change Backup Settings—Enables you to modify the settings for backing up files and folders.

    • Restore Files—Enables you to perform an advanced restore of backup files from another computer or files for all users of the local computer.

    • Complete PC Backup—Creates a Windows Complete PC Backup and Restore image.

  • Encrypting File System (EFS) enables users to encrypt files and folders on any partition that is formatted with the NTFS file system.

  • The exam might touch on two points about Encrypting File Service (EFS): The file system must be set to NTFS if you want to use EFS, and no file can be both encrypted and compressed at the same time.

  • NTFS is required for EFS.

  • A user must have a file encryption certificate before another user can grant him the right to open a shared encrypted file.

  • Data recovery agents are users with file encryption certificates who have been designated the right to decrypt users’ encrypted files in case the user’s file encryption certificate is damaged or lost.

  • Public keys are stored in the My Certificates folder of a user’s profile in plain text.

  • Private keys are encrypted in the RSA folder in a user’s profile.

  • Cipher.exe is the command used to manage EFS encrypted files. Cipher /e encrypts, and cipher /d decrypts.

  • BitLocker is a new feature in Vista Enterprise and Ultimate that encrypts the entire Windows volume, thereby preventing unauthorized users from circumventing file and system permissions in Windows or attempting to access information on the protected partition from another computer or operating system.

  • BitLocker utilizes the Trusted Platform Module (TPM) version 1.2 to provide secure protection of encryption keys and checking of key components when Windows is booting.

  • BitLocker enables you to store encryption keys and restoration password on a USB flash drive or a separate file for additional data security and recovery capability.

  • You can use a computer that does not have a TPM module if you have a USB flash drive to store the encryption keys and password. You must enable a Group Policy setting to do so.

Configuring and Troubleshooting Mobile Computing

  • The Mobile PC Control Panel provides a centralized location for performing many of the configuration activities associated with portable computing.

  • The Windows Mobility Center includes a series of applets that enable you to configure several features specific to portable computers. Included are display brightness, speaker volume, battery status, wireless network status, external displays, Sync Center, presentation settings, and Tablet PC screen orientation.

  • When establishing a VPN connection to a server, encryption levels on the mobile computer and server must match, or an error will result.

  • Offline Files enables you to cache copies of files from the network to your computer so that you can work with them when disconnected from the network.

  • Vista provides the Sync Center, which enables you to manage the synchronization of offline files on your computer. You can synchronize with multiple devices, perform manual or scheduled synchronization, and resolve synchronization conflicts.

  • If synchronization conflicts occur as a result of different users modifying the same file, Sync Center enables you to save either or both versions of the file so you can compare the changes later.

  • You can use an Infrared Data Association (IrDA) port on your portable computer to create an ad hoc peer-to-peer network connection to another IrDA-equipped computer.

  • The Presentation Settings feature on mobile computers enables you to configure your computer for giving a presentation. It performs such actions as disabling Sleep mode, the screen saver, and system notifications; adjusting the speaker volume; and providing an alternate desktop wallpaper. You can also connect to a networked projector while giving a presentation.

  • You can use an external monitor with a VGA-equipped mobile computer in any of the following ways:

    • Mirror or duplicate your desktop to the external monitor

    • Extend your desktop to the external monitor and optionally designate the external monitor as the primary display

    • Use the external monitor as the sole display, blanking out the mobile computer display and conserving mobile computer power

  • Windows SideShow is a new application in Windows Vista that enables you to view items such as incoming email, actions scheduled in Windows Calendar, invitations to meetings run on Windows Meeting Space, and so on, using an auxiliary display found on the lid of many mobile computers or an external device such as a wireless LCD display or a mobile phone.

  • Windows SideShow uses gadgets similar to those utilized by the Sidebar.

  • You can lock the Windows SideShow device to prevent viewing of information by unauthorized parties.

  • A Tablet PC is essentially a small notebook computer equipped with a pressure-sensitive touch screen and a digital pen that can be used to tap window controls or handwrite information on the screen. Vista provides a series of applications that facilitate the use of Tablet PC computers.

  • The Tablet PC Settings dialog box enables you to perform actions such as setting handedness, calibrating the digital pen, and selecting the display orientation.

  • The Tablet PC Input Panel enables you to use the digital pen rather than the keyboard to enter handwritten text.

  • The Tablet PC Input Panel includes a writing pad where you can write text, a character pad where you can write individual characters, and a digital keyboard where you can use the pen to type text on-screen.

  • You can use pen flicks to navigate a document or perform editorial actions. Vista provides a series of default actions as well as additional actions that you can customize.

  • You can train the Tablet PC handwriting recognizer to translate your handwritten words accurately into typed text. Training enables the recognizer to understand your personal writing style and reduce confusion among similar characters.

  • The snipping tool enables you to capture an object from any application active on your screen. You can add a handwritten comment if desired and save it as an image file or paste it into a document such as a Microsoft Word file.

  • Some Tablet PC models possess touch screen capabilities, in which the screen responds to finger touches. The touch pointer is a mouse-like icon that floats on the screen below your finger when in use and enables you to perform click-and-drag actions.

  • Sleep mode in Vista automatically saves your work and configuration information in RAM and turns off the computer’s monitor, hard disk, and other system components. You can enter Sleep mode and resume Normal mode rapidly.

  • Remember the difference between Sleep mode and hibernation. If power is lost, data can be lost in Sleep mode because this mode does not save the desktop state to disk, only to RAM. However, the computer is able to resume activity more rapidly from sleep than from hibernation.

  • The preconfigured power plans are

    • High Performance—Optimizes the computer for performance at the expense of battery life

    • Power Saver—Optimizes battery life by slowing the processor down and turning off other components after short periods of inactivity

    • Balanced—Attempts to strike a balance between these extremes by maintaining processor speed and turning off components after slightly longer periods of inactivity

  • You can also specify whether to require a password when waking from sleep mode, and choose the action that takes place when you press the power and sleep buttons or close the notebook lid.

  • The Advanced Power Settings dialog box enables you to define a large range of options that govern the behavior of the computer when set for any of the three default power plans or a custom power plan. You can define these settings separately for when the computer is plugged in or running on battery power.

  • You can also create a custom power plan and define all these settings according to your individual needs.

  • The battery meter enables you to keep track of remaining battery life. It warns you when battery power is dropping below warning and critical threshold levels.

  • You can also use Group Policy to configure many power management settings.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.189.186.109