Chapter 8. Maintaining and Optimizing Systems That Run Windows Vista

<feature><title>Objectives</title>

This chapter helps you to prepare for the exam by covering the following Microsoft-specified objectives for the Maintaining and Optimizing Systems That Run Windows Vista section of the TS: Microsoft Windows Vista, Configuring exam:

Troubleshoot performance issues.

<objective>

The performance of a computer is dependent on several factors, any of which can cause a slowdown. Microsoft includes this objective to measure your understanding of the factors that affect a computer’s performance over time and how they interact with one another. You also need to know how to optimize the computer’s performance and troubleshoot problems and bottlenecks that can occur from time to time.

</objective>

Troubleshoot reliability issues by using built-in diagnostic tools.

<objective>

Windows Vista provides the System Configuration tool, Task Manager, and Event Viewer for diagnosing and troubleshooting problems that you might encounter. You should know what each of these tools can accomplish and when to utilize them.

</objective>

Configure Windows Update.

<objective>

The Microsoft Windows Update website enables you to keep your computer up-to-date with the latest security patches and productivity enhancements. Know how to configure the options available that govern how Windows Update functions on your computer and across a network.

</objective>

Configure data protection.

<objective>

Data protection is an important concern that Microsoft expects you to understand. Know how to back up and restore files and folders or your entire computer. Also know when and how to encrypt your data.

</objective>
</feature>

Outline

Introduction

468

Troubleshooting Performance Issues

468

468

469

470

473

475

479

481

482

485

486

486

486

488

Troubleshooting Reliability Issues by Using Built-in Diagnostic Tools

489

489

490

490

491

492

492

492

494

495

496

496

497

499

500

Configuring Windows Update

501

502

504

504

Configuring Data Protection

507

508

511

512

514

515

516

516

518

519

520

521

521

523

526

Summary

527

Key Terms

528

Apply Your Knowledge

528

529

530

536

539

Introduction

When you set up a brand new Windows Vista computer with a baseline set of applications, you will generally find that it performs very capably. As you install additional applications, store data, and work with the computer, its performance can slow down. Factors that affect a computer’s performance include memory, processor, disks, and applications. Windows Vista provides tools such as the Performance Console, Reliability Monitor, and Task Manager to monitor and troubleshoot computer performance. This chapter looks at monitoring the computer’s performance with these tools and keeping it working at a level close to that observed when you first set it up.

Microsoft is continually releasing new updates for its operating systems, mainly as vulnerabilities are discovered. This chapter looks at the configuration and use of the Windows Update feature including the use of a server running Microsoft Windows Server Update Services (WSUS) for updating computers on a network.

In this day and age of highly mobile workforces and risk for data theft and its often dire consequences, protection of data is of utmost importance. This chapter looks at new protection technologies introduced by Microsoft including the BitLocker drive encryption tool. Another technique that is vital for protection of data is the backup. If you do not have backup copies of data stored on a computer, valuable data can be lost forever. Windows Vista provides a Backup tool that you can use to create backup copies of data on a variety of media including disk, CD-ROM, DVD, and shared network drives.

Troubleshooting Performance Issues

Objective: Troubleshoot performance issues.

Windows Vista includes several tools that are used for monitoring, optimizing, and troubleshooting performance. These include the revamped Reliability and Performance Monitor and the new optimization tools introduced with Vista.

Reliability and Performance Monitor

The Windows Vista Reliability and Performance Monitor console replaces and updates the Performance Console tool found in Windows 2000 and XP. As shown in Figure 8.1, it includes the following monitoring tools:

  • Performance Monitor—Provides a real-time graph of computer performance, either in the current time or as logged historical data.

  • Reliability Monitor—Performs an overall reliability analysis of computer stability over time.

  • Data Collector Sets—. Known as Performance Logs and Alerts in Windows 2000/XP, this component records computer performance information into log files. Data collectors are grouped into groups that you can use for monitoring performance under different conditions.

  • Reports—Included as the Report function of the System Monitor console in Windows 2000/XP, this component creates performance report data.

The Reliability and Performance Monitor console includes several tools for monitoring and logging your computer’s performance.

Figure 8.1. The Reliability and Performance Monitor console includes several tools for monitoring and logging your computer’s performance.

This section introduces the Resource Overview pane that appears as part of the Reliability and Performance Monitor console before describing each of the monitoring tools in more detail.

Resource Overview

When you first start the Reliability and Performance Monitor, it displays the Resource Overview panel previously shown in Figure 8.1. This overview provides a summary of CPU, disk, network, and memory performance statistics including mini-graphs of recent performance of these four components. Click the downward-pointing arrow to display additional information about a component similar to that shown for CPU in Figure 8.2.

You can expand each component in Resource Overview to obtain a summary of its performance information.

Figure 8.2. You can expand each component in Resource Overview to obtain a summary of its performance information.

For each of the four components, the information provided includes the application whose resource usage is being monitored (known as the image) and the process identifier number (PID) of the application instance. The following additional information is provided for each of the four components:

  • CPU—A brief description of the monitored application, the number of threads per application, the CPU cycles currently used by each application instance, and the average CPU resulting from each instance as a percentage of total CPU usage.

  • Disk—The file being read or written by each application instance, the current read and write speeds in bytes/minute, and the total disk input/output (I/O) in bytes/minute.

  • Network—The IP address of the network component with which the computer is exchanging data, the amount of data (bandwidth) in Kbps (sent, received, and total) by each instance.

  • Memory—Current hard faults per second and memory usage information in kilobytes for committed, working set, sharable, and private memory components.

Performance Monitor, which is shown in Figure 8.3, provides a real-time graph of computer performance and enables you to perform tasks such as the following:

  • Identify performance problems such as bottlenecks

  • Monitor resource usage

  • Track trends over time

  • Measure the effects of changes in system configuration

  • Generate alerts when unusual conditions occur

Performance Monitor displays a real-time graph of activity for selected objects and counters.

Figure 8.3. Performance Monitor displays a real-time graph of activity for selected objects and counters.

Before you learn more about the Performance Monitor tool, you need to be familiar with the following terms, which are used in a specific manner when referring to performance metrics:

  • Object—. A specific hardware or software component that the Performance Console is capable of monitoring. It can be any component that possesses a series of measurable properties. Windows Vista comes with a defined set of objects; applications such as Internet Information Services (IIS) installed on Windows Vista might add more objects to the available set.

  • Counter—One of a series of statistical measurements associated with each object.

  • Instance—. Refers to multiple occurrences of a given object. For example, if your computer has two hard disks, two instances of the PhysicalDisk object will be present. These instances are numbered sequentially, starting with 0 for the first occurrence. An instance labeled “_Total” is also present, yielding the sum of performance data for each counter. Note that not all objects have multiple instances.

Information on objects and counters is displayed in the following format: Object (_instance)Counter. For example, Processor (_0)\%Processor Time measures the %Processor time on the first processor. The instance does not appear if only a single instance is present.

Performance Monitor enables you to obtain a real-time graph of computer performance statistics. Step by Step 8.1 shows you how.

Tip: You can highlight individual counters in System Monitor

To highlight an individual counter in the System Monitor display, select it from the list at the bottom of the details pane and click the highlight icon (looks like a highlighter pen) in the taskbar. You can also press the Backspace key to highlight the counter. The highlighted counter appears in a heavy line. You can use the up or down arrow keys to toggle through the list of counters and highlight each one in turn. This feature helps you to find the desired counter from a graph that includes a large number of counters.

Reliability Monitor is a new component in Windows Vista that utilizes the built-in Reliability Analysis Component (RAC) to provide a trend analysis of your computer’s system stability over time. As shown in Figure 8.6, Reliability Monitor provides the System Stability Chart, which correlates the trend of your computer’s stability against events that might destabilize the computer. Events tracked include Windows updates; software installations and removals; device driver installations, updates, rollbacks, and removals, as well as driver failure to load or unload; application hangs and crashes; disk and memory failures; and Windows failures such as boot failures, crashes, and sleep failures. This chart enables you to track a reliability change directly to a given event.

The System Stability Chart provides a trend indication of your computer’s stability.

Figure 8.6. The System Stability Chart provides a trend indication of your computer’s stability.

Note: Reliability Monitor limitations

To display data in the System Stability Chart, you must run your computer for at least 24 hours after the first installation of Windows Vista. For the first 28 days, Reliability Monitor uses a dotted line on the Stability Chart graph, indicating that the data is insufficient to establish a valid baseline for this index.

Follow Step by Step 8.2 to use Reliability Monitor.

Data Collector Sets

A data collector set is a set of performance objects and counters that enables you to log computer performance over time while you are performing other tasks. Such logging is important because changes in computer performance often occur only after an extended period of time. Best practices state that you should create a performance baseline, which is a log of computer performance that you can save for comparing with future performance and tracking any changes that might have occurred over time. In this way you can identify potential bottlenecks in computer performance and take any required corrective measures. You can also monitor the effectiveness of any changes you make to a computer’s configuration.

The Data Collector Sets feature was known as Performance Logs and Alerts in previous Windows versions.

Creating Data Collector Sets

Data collector sets are binary files that save performance statistics for later viewing and analysis in the Performance Monitor snap-in; you might also export them to spreadsheet or database programs for later analysis. Vista creates a series of data collector sets by default. The default data collector sets enable you to log default sets of performance counters for various purposes, including system diagnostics, LAN diagnostics, system performance, wireless diagnostics, event trace sessions, and startup event trace sessions. To view these sets, expand the branches under the Data Collector Sets node of the Reliability and Performance Monitor. Right-click any available data collector set and choose Properties to view information on the selected data collector set.

You might also create your own user-defined data collector set. Follow Step by Step 8.3 to create a data collector set.

To create a custom data collector set, use the Create Manually (Advanced) option in step 4 of Step by Step 8.3, and then follow Step by Step 8.4 to complete the procedure.

Using Performance Monitor to Create a Data Collector Set

Perhaps the simplest method to create a data collector set is to use a set of counters you have already configured in Performance Monitor. Step by Step 8.5 shows you how.

The data collector set is created and placed in the User Defined section. If you select the option to start the data collector set now, logging begins immediately and continues until you right-click the data collector set and choose Stop.

Optimizing and Troubleshooting Memory Performance

The Memory object includes counters that monitor the computer’s physical and virtual memory. Table 8.1 discusses the most important counters for this object.

Table 8.1. Important Counters for the Memory Object

Counter

What It Measures

Interpretation and Remedial Tips

Pages/sec

The rate at which data is read to or written from the paging file

A value of 20 or more indicates a shortage of RAM and a possible memory bottleneck. To view the effect of paging file performance on the system, watch this counter together with LogicalDisk\% Disk Time. Add RAM to clear the problem.

Available Bytes

The amount of physical memory available

A value consistently below 4MB indicates a shortage of available memory. This might be due to memory leaks in one or more applications. Check your programs for memory leaks. You might need to add more RAM.

Committed Bytes

The amount of virtual memory that has been committed to either physical RAM or running processes

Committed memory is in use and not available to other processes. If the amount of committed bytes exceeds the amount of RAM on the computer, you might need to add RAM.

Pool Nonpaged Bytes

The amount of RAM in the nonpaged pool system memory (an area holding objects that cannot be written to disk)

If this value exhibits a steady increase without a corresponding increase in computer activity, check for an application with a memory leak.

Page Faults/sec

The number of data pages that must be read from or written to the page file per second

A high value indicates a lot of paging activity. Add RAM to alleviate this problem.

In addition to these counters, the Paging File\% Usage counter is of use when troubleshooting memory problems. This counter measures the percentage of the paging file currently in use. If it approaches 100%, you should either increase the size of the paging file or add more RAM.

Lack of adequate memory might also have an impact on the performance of other subsystems in the computer. In particular, a large amount of paging, or reading/writing data from/to the paging file on the hard disk results in increased activity in both the processor and disk subsystems. You should monitor counters in these subsystems at the same time if you suspect memory-related performance problems. You learn more about monitoring counters later in the section “Optimizing and Troubleshooting Processor Utilization.”

The paging file is an area on the hard disk that is used as an additional memory location for programs and data that cannot fit into RAM (in other words, virtual memory). By default, the paging file is located at %systemdrive%pagefile.sys and has a default initial size of the amount of RAM in the computer plus 300MB and a default maximum size of three times the amount of RAM in the computer.

To improve performance on a computer equipped with more than one physical hard disk, you should locate the paging file on a different hard disk than that occupied by the operating system. You can also increase the size of the paging file or configure multiple paging files on different hard disks. Any of these configurations help to optimize performance by spreading out the activity of reading/writing data from/to the paging files. Note that you should retain a paging file on the system/boot drive to create a memory dump in case of a crash. This memory dump is useful for debugging purposes.

Follow Step by Step 8.6 to modify the configuration of the paging file.

Optimizing and Troubleshooting Processor Utilization

The processor is the “heart” of the system because it executes all program instructions, whether internal to the operating system or in user-executed applications. The Processor object contains counters that monitor processor performance. Table 8.2 discusses the most important counters for this object.

Table 8.2. Important Counters for the Processor Object

Counter

What It Measures

Interpretation and Remedial Tips

% Processor Time

The percentage of time the processor is executing meaningful actions (excludes the Idle process)

If this value is consistently greater than 85%, the processor could be causing a bottleneck. You should check the memory counters discussed previously; if these are high, consider adding more RAM. Otherwise, you should consider adding a faster processor (or an additional one if supported by your motherboard).

Interrupts/sec

The rate of service requests from I/O devices that interrupt other processor activities

A significant increase in the number of interrupts, without a corresponding increase in system activity, might indicate some type of hardware failure. Brief spikes are acceptable.

You should also look at the SystemProcessor Queue Length counter. If the value of this counter exceeds 2, a processor bottleneck might exist, with several programs contending for the processor’s time.

As mentioned in Table 8.2, memory shortages might frequently manifest themselves in high processor activity. It is usually much cheaper and easier to add RAM to a computer than to add a faster or additional processor. Consequently, you might want to consider this step first when you are experiencing frequent high processor activity.

Optimizing and Troubleshooting Disk Performance

Disk performance is measured by two processor objects: The PhysicalDisk counters measure the overall performance of a single physical hard disk rather than individual partitions. LogicalDisk counters measure the performance of a single partition or volume on a disk. These counters include the performance of spanned or striped volumes that cross physical disks.

PhysicalDisk counters are best suited for hardware troubleshooting. Table 8.3 describes the most important counters for this object.

Table 8.3. Important Counters for the PhysicalDisk Object

Counter

What It Measures

Interpretation and Remedial Tips

% Disk Time

The percentage of time that the disk was busy reading or writing to any partition

A value of more than 50% suggests a disk bottleneck. Consider upgrading to a faster disk or controller. Also check the memory counters to see whether more RAM is needed.

Avg. Disk Queue Length

The average number of disk read and write requests waiting to be performed

If this value is greater than 2, follow the same suggestions as for % Disk Time.

Average Disk Sec/Transfer

The length of time a disk takes to fulfill requests

A value greater than 0.3 might indicate that the disk controller is retrying the disk continually because of write failures.

LogicalDisk counters are best suited for investigating the read/write performance of a single partition. Table 8.4 describes the most important counters for this object.

Table 8.4. Important Counters for the LogicalDisk Object

Counter

What It Measures

Interpretation and Remedial Tips

% Disk Time

The percentage of time that the disk is busy servicing disk requests

A value greater than 90% might indicate a performance problem except when using a RAID device. Compare to Processor\% Processor Time to determine whether disk requests are using too much processor time.

Average Disk Bytes/Transfer

The amount of data transferred in each I/O operation

Low values (below about 20KB) indicate that an application might be accessing a disk inefficiently. Watch this counter as you close applications to locate an offending application.

Current Disk Queue Length

The amount of data waiting to be transferred to the disk

A value greater than 2 indicates a possible disk bottleneck, with processes being delayed because of slow disk speed. Consider adding another faster disk.

Disk Transfers/ sec

The rate at which read or write operations are performed by the disk

A value greater than 50 might indicate a disk bottleneck. Consider adding another faster disk.

% Free Space

Percentage of unused disk space

A value less than about 15% indicates that insufficient disk space is available. Consider moving files, repartitioning the disk, or adding another disk.

Tip: You should log disk activity to a different disk or computer

The act of recording performance logs places an extra “hit” on performance for the disk on which logs are recorded. To obtain accurate disk monitoring results, record this data to a different disk or computer.

Command-Line Utilities

You can perform several tasks associated with performance monitoring and optimization from the command line. The following are several available tools:

  • LogmanManages data collector logs. You can start, stop, and schedule the collection of performance and trace data.

  • RelogCreates new performance logs from data in existing logs by modify the sampling rate and/or converting the file format.

  • TypeperfDisplays performance data to the command prompt window or to a log file.

You can also use the Perfmon command to start the Reliability and Performance Monitor from a command line. For information on running these tools, type the command name followed by /? at a command prompt.

New Vista Technologies for Enhancing System Performance

New to Windows Vista are three technologies for enhancing system performance: Windows ReadyBoost, Windows SuperFetch, and Windows ReadyDrive. These three technologies are collectively known as Windows PC Accelerators. You learn about these technologies in this section.

Included with all editions of Vista, Windows SuperFetch optimizes memory performance based on trends of most-used programs and data on the computer, enabling Vista to decide which content should be loaded into RAM at a particular time. SuperFetch also enables Vista to detect and avoid problematic memory usage scenarios that would otherwise remove content of higher priority from memory.

Included with all editions of Windows Vista, Windows ReadyBoost enhances your computer’s performance without adding additional RAM. ReadyBoost enables you to use a USB flash drive or a Compact Flash or Secure Digital (SD) memory card as an additional source of memory (also known as a cache) to improve your computer’s performance. The computer can access this cache more rapidly than it can access the paging file or other data on the hard drive. ReadyBoost can work with SuperFetch to dramatically enhance your computer’s performance. You can even use a portion of the flash drive for Windows ReadyBoost and the remainder for data storage. Microsoft recommends that you use one to three times the amount of RAM in your computer for optimum performance of Windows ReadyBoost.

Devices used by Windows ReadyBoost must be USB 2.0-capable and be of at least 256MB capacity. The device must support a minimum read speed of 2.5 MB/s and a write speed of 1.75 MB/s. In addition, the USB host controller on the computer must accept the USB 2.0 standard. Windows ReadyBoost can use a cache of up to 4GB in size.

Using Windows ReadyBoost is easy, as Step by Step 8.7 shows.

Exam Alert: Fast and slow memory

Most USB flash drives contain both fast and slow flash memory. ReadyBoost can use only the fast memory on a flash drive, so the maximum amount of memory displayed on the ReadyBoost tab is often less than the total capacity of the drive. You might receive an exam question that asks why ReadyBoost is unable to use the total amount of memory provided by the flash drive.

Note: Windows encrypts the cache

To ensure that the ReadyBoost feature remains secure, Windows uses the Advanced Encryption Standard (AES) to encrypt data on the flash drive. So if you lose your flash drive, unauthorized individuals will be unable to access your data.

Windows ReadyDrive enables mobile computers equipped with a hybrid hard disk to achieve enhanced performance and improved battery life. A hybrid hard disk includes nonvolatile flash memory as a component in the hard disk; data is written to this cache where it can be accessed more rapidly and with less use of battery power (because the need for spinning the hard drive is dramatically reduced). Computers boot, hibernate, and resume from hibernation faster with Windows ReadyDrive. ReadyDrive can also work with SuperFetch for the best possible performance. To be used by ReadyDrive, the disk must have at least 50MB of nonvolatile cache that performs at a minimum speed of 4MB/s.

The hybrid hard drive technology is just being perfected at the time of writing and is expected to be available in the near future.

For more information on SuperFetch, ReadyBoost, and ReadyDrive, consult Windows PC Accelerators: Performance Technology for Windows Vista and references cited therein, included in the “Suggested Readings and Resources” section at the end of this chapter.

Troubleshooting Reliability Issues by Using Built-in Diagnostic Tools

Objective: Troubleshoot reliability issues by using built-in diagnostic tools.

Windows Vista contains several built-in tools that enable you to monitor, diagnose, and troubleshoot system reliability. You have already learned about the Reliability and Performance Monitor console and its components. In this section you look at the System Configuration Utility, Task Manager, and Event Viewer.

Microsoft has enhanced the System Configuration Utility to improve its capabilities for identifying problems that can prevent Windows from starting properly. System Configuration Utility enables you to disable common services and startup programs to selectively troubleshoot which items are preventing a normal startup.

To start the System Configuration Utility, click Start, Run, type msconfig, and press Enter. Then click Continue on the UAC prompt that appears. You receive the dialog box shown in Figure 8.13.

The System Configuration Utility enables you to troubleshoot problems that prevent Windows from starting normally.

Figure 8.13. The System Configuration Utility enables you to troubleshoot problems that prevent Windows from starting normally.

The following sections describe the functions available on each tab.

General Tab

Similar to the General tab on the Windows XP System Configuration tool, you can choose Normal Startup, which loads all drivers and services configured to start automatically; Diagnostic Startup, which loads basic drivers and services; or Selective Startup, which enables you to select the following options:

  • Load System Services—Starts all services that are configured for automatic startup.

  • Load Startup Items—Starts applications that have been configured to start at boot or logon time.

  • Use Original Boot Configuration—Remains selected unless you modify default settings on the Boot tab.

Boot Tab

Shown in Figure 8.14, the Boot tab has been completely modified in Windows Vista. On a multi-boot computer, the display window contains entries for the different operating systems present. To choose which operating system boots by default, select the desired entry and click Set as Default. You have the following boot options available:

  • Safe Boot—Provides four options for booting your computer into Safe mode. The Minimal option brings up the Windows GUI with only critical system services loaded and networking disabled. The Alternate Shell option boots to the command prompt and disables both the GUI and networking. The Active Directory repair option boots to the GUI and runs Active Directory as well as critical system services. The Network option boots to the Windows GUI with only critical services loaded and enables networking.

  • No GUI Boot—Starts Windows without displaying the Windows splash screen.

  • Boot Log—Boots according to the other options selected and logs information from the boot procedure to %systemroot%Ntbtlog.txt.

  • Base Video—Uses standard VGA drivers to load the Windows GUI in minimal VGA mode.

  • OS Boot Information—Displays driver names as the boot process loads them.

The Boot tab enables you to configure several options related to booting your computer.

Figure 8.14. The Boot tab enables you to configure several options related to booting your computer.

In addition, the Timeout setting determines the number of seconds that the boot menu is displayed on a multi-boot computer, and the Make All Boot Settings Permanent option disables tracking of changes made in the System Configuration Utility. This option disables the ability to roll back changes by selecting the Normal Startup option from the General tab.

Services Tab

The Services tab lists all Windows services available on the computer, including those installed by other applications running on the computer. You can enable or disable individual services at boot time when you think that running services might be causing boot problems. Clear the check box for those services you want to disable for the next boot, or click the Disable All command button to disable all nonessential services.

To show only services installed by non-Microsoft programs, select the Hide All Microsoft Services check box. This enables you to more rapidly locate non-Microsoft services that might be contributing to boot problems.

Caution: Ensure that you do not disable essential services

You might encounter system stability problems or other malfunctions if you disable too many services. Ensure that services you disable are not essential to your computer’s operation. The Disable All option does not disable secure Microsoft services required at boot time.

Startup Tab

The Startup tab lists all applications that are configured to start automatically when the computer starts up. Information provided includes the manufacturer name, the path to the file that starts the application, and the Registry key or shortcut that starts the application.

To prevent an application from starting on the next boot, clear its check box. To enable it to start on subsequent boots, select its check box or select the Normal Startup option from the General tab.

Tools Tab

Shown in Figure 8.15, the Tools tab enumerates all diagnostic applications and other available tools. It provides a convenient location from which you can start a program; to do so, select the desired program and click Launch.

The Tools tab enables you to start a program from a comprehensive list of Windows diagnostic utilities.

Figure 8.15. The Tools tab enables you to start a program from a comprehensive list of Windows diagnostic utilities.

Task Manager provides data about currently running processes, including their CPU and memory usage, and enables you to modify their priority or shut down misbehaving applications.

You can use any of the following methods to start Task Manager:

  1. Click Start, type taskmgr in the Search box, and select Task Manager from the programs list.

  2. Press Ctrl+Shift+Esc.

  3. Press Ctrl+Alt+Delete and select Task Manager from the Windows Security dialog box.

  4. Right-click a blank area on the taskbar and then select Task Manager.

As shown in Figure 8.16, Task Manager has six tabs that perform the following tasks:

  • Applications—Displays all applications running on the computer. You can terminate an ill-behaved program by selecting it and clicking End Task.

  • Processes—Provides information on resources consumed by processes running on the computer. New to Windows Vista is the Description column, which provides a detailed description of each process running on your computer. You can modify the property of a running application or terminate an ill-behaved process or one that is consuming a large amount of processor time. To obtain additional information, select the Select Columns option from the View menu. This displays the Select Process Page Columns dialog box shown in Figure 8.17, from which you can choose to display a large number of variables associated with each process.

  • Services—New to Vista, provides information on services installed on the computer. You can view which services are running or stopped, the service group to which they belong, and descriptive information about each service. Click the Services command button and provide UAC credentials to access the Services snap-in, which enables you to configure service startup type and properties. You can also determine whether a service is associated with a particular process by right-clicking the service name and selecting Go To Process. This opens the Processes tab and highlights the appropriate process.

  • Performance—Provides a limited performance monitoring function, showing processor and physical memory usage statistics. This tab is ideal for providing a quick snapshot of computer performance. The memory graph now displays actual memory usage instead of the page file usage displayed in Windows XP. If your computer is equipped with dual processors or a dual-core processor, the CPU usage history graph is split to show the activity of both cores or processors. You can also access the Resource Monitor application described earlier in this chapter.

  • Networking—Provides information on network utilization across the local area interface.

  • Users—Displays the users that have sessions, active or disconnected, running on the local computer.

Task Manager enables you to troubleshoot applications that are currently running, including closing ones that are not responding.

Figure 8.16. Task Manager enables you to troubleshoot applications that are currently running, including closing ones that are not responding.

The Select Process Page Columns dialog box enables you to select the information that is displayed on the Process tab of Task Manager.

Figure 8.17. The Select Process Page Columns dialog box enables you to select the information that is displayed on the Process tab of Task Manager.

You can access additional options from the menu bar of Task Manager. In particular, you can start a new process from the File menu. Doing so is equivalent to using the Run dialog box and is useful if the Explorer process has terminated or is misbehaving. The Options menu allows you to keep the Task Manager window always visible on the desktop. The View menu allows you to adjust the refresh rate of the graphs on the Performance and Networking tabs. It also allows you to modify what data is displayed on the Processes, Networking, and Users tabs.

Configuring Application Priority

You can modify application behavior by adjusting its priority in Task Manager or by starting the application at a different priority. Windows Vista offers the following application priorities, arranged in decreasing order:

  • Realtime—The highest priority level. Use extreme caution when selecting this priority because it can hang the computer.

  • High—The highest useful priority level. Devotes a high level of priority to the application without disrupting essential services.

  • AboveNormal—Runs the application at a priority slightly higher than default.

  • Normal—The default priority. All processes run at this priority unless configured otherwise.

  • BelowNormal—Runs the application at a priority slightly lower than default.

  • Low—The lowest priority.

You can modify an application’s priority in either of the following ways:

  • From Task Manager—From the Processes tab, right-click the required process and choose Set Priority. Then select one of the priorities shown. If you are unsure of the process associated with a given application, right-click the application in the Applications tab and select Go to Process. This switches you to the Processes tab, with the required process selected.

  • From a command prompt—Type Start /option executable_name, where option refers to one of the priorities shown in the preceding list, and executable_name refers to the program’s name.

Configuring the Relative Priority of Foreground and Background Tasks

Depending on your computer’s usage, you might be able to improve computer performance by changing the relative priority of foreground and background applications. As Step by Step 8.8 describes, you can accomplish this action from the Advanced tab of the Performance Options dialog box.

Configuring Multiprocessor Computers

Windows Vista includes built-in capability for computers with two processors. Under most conditions, dual-processor computers provide enhanced computing power; however, you should be aware of several considerations that exist with regard to dual-processor computers:

  • Use of Task Manager—As already mentioned, the Performance tab of Task Manager shows processor usage information for both processors by splitting the graph of CPU Usage History into two portions.

  • Running 16-bit legacy applications—Windows Vista uses a special 32-bit application called a Windows NT Virtual DOS Machine (Ntvdm.exe) to emulate the older 16-bit environment. You can have multiple instances of the Ntvdm.exe process on a single computer; however, by default Windows Vista runs all 16-bit applications in a single instance of Ntvdm.exe (also called a single memory space). This can cause two problems: First, if one application crashes or becomes unresponsive, all 16-bit applications are halted. Second, on a dual-processor computer, all 16-bit applications run on the same processor, thereby resulting in the possibility of this processor being overloaded while the other processor is underutilized. To run 16-bit applications in separate memory spaces, click Start, Run, and type start /separate application.exe, where application.exe is the name of the 16-bit application.

  • Configuring processor affinity for each application—This capability enables you to specify on which processor a given process will execute and can be utilized to distribute activity evenly across more than one processor. You can set processor affinity from Task Manager. Simply right-click the process from the Processes tab and choose Set Affinity. Then select the appropriate processor.

Caution: Legacy applications

The 64-bit editions of Windows Vista do not support 16-bit DOS applications. If you are purchasing 64-bit computers, make sure that you have upgraded all such applications to at least 32 bits.

Event Viewer

One of Windows Vista’s standard troubleshooting tools is Event Viewer, which is incorporated into the Computer Management console. You can rely on this utility to be able to see errors and system messages. This tool enables you to view events from multiple event logs on the local computer or another computer to which you can connect, save event filters as custom views for future usage, schedule tasks to run in response to events, and create and manage event subscriptions.

You can open Event Viewer by using any of the following methods:

  1. Click Start, right-click Computer, and select Manage.

  2. Click Start, Control Panel, System and Maintenance, View Event Logs.

  3. Click Start and type event viewer in the Search box. Then select Event Viewer from the Programs list.

In each case, you must click Continue or supply an administrative username and password on the UAC prompt that appears. The Event Viewer snap-in opens and displays a summary of recent administrative events in the details pane, as shown in Figure 8.18.

Event Viewer records events that have occurred on your computer.

Figure 8.18. Event Viewer records events that have occurred on your computer.

The following sections provide more detail with regard to several aspects of working with Event Viewer.

Viewing Logs in Event Viewer

To view the actual event logs, expand the Event Viewer node in the console tree and then expand the Windows Logs subnode. Windows Vista records events in the following five types of logs:

  • Application—Logs events related to applications running on the computer, including alerts generated by data collector sets.

  • Security—Logs events related to security-related actions performed on the computer. To enable security event logging, you must configure auditing of the types of actions to be recorded.

  • Setup—Logs events related to setup of applications.

  • System—Contains events related to actions taking place on the computer in general, including hardware-related events. See Figure 8.19.

    Most Event Viewer logs record errors, warning events, and informational events.

    Figure 8.19. Most Event Viewer logs record errors, warning events, and informational events.

  • Forwarded events—Contains events logged from remote computers. To enable this log, you must create an event subscription.

  • Applications and Services logs—Contained in its own subnode, these logs store events from single applications or components, as opposed to events with potential systemwide impact. Logs might include categories such as Distributed File Service (DFS) replication, hardware events, Internet Explorer events, Key Management service events, and Media Center events.

Note: Additional event logs

If you are looking at Event Viewer on a server, you might observe additional event logs added by applications such as Active Directory and DNS. Installed applications on servers and even on Windows Vista might add additional event logs to Event Viewer.

Most logs in Event Viewer record the three types of events—errors, warnings, and informational events—as previously shown in Figure 8.19. As you can see, error messages are represented by a red circle with a white exclamation mark in the center. Information messages are represented by a balloon with a blue “I” in the center, and warning messages are represented by a yellow triangle with an exclamation mark in the center. Although not always true, an error is often preceded by one or more warning messages. A series of warning and error messages can describe the exact source of the problem, or at least point you in the right direction. To obtain additional information about an event, select it. The bottom of the central pane displays information related to the selected event. You can also right-click an event and select Event Properties to display information about the event in its own dialog box that can be viewed without scrolling.

Customizing Event Viewer

If you have selected a large number of auditable events, the Event Viewer logs can rapidly accumulate a large variety of events. Windows Vista provides capabilities for customizing what appears in the Event Viewer window. To customize the information displayed, right-click Event Viewer in the console tree and choose Create Custom View. This displays the Create Custom View dialog box shown in Figure 8.20.

You can create custom views that filter event logs according to several categories.

Figure 8.20. You can create custom views that filter event logs according to several categories.

Options available from this dialog box include the following:

  1. Logged—Select the time interval that you want to examine.

  2. Event Level—Choose the type(s) of events you want to view. Select Verbose to view extra details related to the viewed events.

  3. By Log—Select the Windows logs or Applications and Services logs you want to include.

  4. By Source—Select from an extensive range of Windows services, utilities, and components whose logs you want to include.

  5. Task Category—Expand the drop-down list and select the categories you want to view.

  6. Keywords—Select the keywords you want to include in the customized view.

  7. User and Computer(s)—Select the usernames of the accounts to be displayed and the names of the computers to be displayed. Separate the names in each list by commas.

  8. XML tab—Enables you to specify an event filter as an XML query.

When you have made your selections, click OK and type a name for the custom view in the Save Filter to Custom View dialog box that appears. After you have saved the custom view, you can use this view at a future time by right-clicking Event Viewer in the console tree and choosing Import Custom View.

Creating Tasks from Events

Another new feature in Event Viewer for Windows Vista is the ability to associate tasks with events. Event Viewer integrates with Task Scheduler to make this action possible. To do so, right-click the desired event and choose Attach Task to This Event. Follow the instructions in the Create a Basic Task Wizard that opens, as shown in Figure 8.21. Actions that you can take include starting a specified program, sending an email, and displaying a message.

The Create a Basic Task Wizard enables you to specify an action that will be taken each time a specific event takes place.

Figure 8.21. The Create a Basic Task Wizard enables you to specify an action that will be taken each time a specific event takes place.

For more information on Event Viewer, refer to Event Viewer Overview and links contained therein in the “Suggested Readings and Resources” section.

Configuring Windows Update

Objective: Configure Windows Update.

Chapter 3, “Upgrading to Windows Vista,” introduced the concept of automatically receiving updates from the Windows Update website. This section takes a closer look at the options available in Windows Update and using a server running Windows Server Update Services (WSUS) to receive and distribute updates to Windows Vista computers on a network.

Windows Update enables you to maintain your computer in an up-to-date condition by automatically downloading and installing critical updates as Microsoft publishes them. By default, your computer automatically checks for updates at the Windows Update website. Critical updates are automatically installed on a daily basis, and you are informed about optional updates that might be available. The following are several key features of Windows Update:

  • Windows Update scans your computer and determines which updates are applicable to your computer. These updates include the latest security patches and usability enhancements that ensure your computer is kept as secure and functional as possible.

  • Updates classified by Microsoft as High Priority and Recommended can be downloaded and installed automatically in the background without interfering with your work. At the same time, Windows Update can inform you about optional updates and Windows Ultimate Extras.

  • Windows Update informs you if a restart is required to apply an update. You can postpone the restart so that it does not interfere with activities in progress. Should an update apply to a software program with files in use, Vista can save the files and close and restart the program.

For additional information about Windows Update, refer to Windows Update and Resulting Internet Communication in Windows Vista in the “Suggested Readings and Resources” section.

Working with Windows Update

The System and Maintenance category in Control Panel includes the Windows Update applet, which enables you to configure and work with the various options that are offered. Follow Step by Step 8.9 to work with Windows Update.

Using a WSUS Server with Windows Vista

WSUS is a server-based component that enables you to provide update services to computers on a corporate network without the need for individual computers to go online to the Microsoft Windows Update website to check for updates. It saves valuable bandwidth because only the WSUS server actually connects to the Windows Update website to receive updates, while all other computers on the network receive their updates from the WSUS server. Furthermore, WSUS provides network administrators with the ability to test updates for compatibility before enabling computers on the network to receive the updates, thereby reducing the chance of an update disrupting computer or application functionality across the network.

You can download version 3.0 of WSUS from Microsoft and install it on a computer running Windows Server 2003 or Windows Server 2008. Configuration of the WSUS server is beyond the scope of the Windows Vista exams and is not discussed here.

Windows Update Group Policies

Group Policy in Windows Vista provides a series of policies that govern the actions performed by Windows Update. To view and configure these policies, open the Group Policy Object Editor by typing gpedit.msc in the Run dialog box and accepting the UAC prompt that appears. Navigate to the Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows Update node to obtain the policy settings shown in Figure 8.24.

Group Policy in Windows Vista provides a series of settings that govern the operation of Windows Update.

Figure 8.24. Group Policy in Windows Vista provides a series of settings that govern the operation of Windows Update.

To use Group Policy to specify the behavior of automatic updates, double-click the Configure Automatic Updates policy setting to receive the Properties dialog box shown in Figure 8.25. Select Enabled and then choose one of the following settings from the Configure Automatic Updating drop-down list:

  • 2 - Notify for Download and Notify for Install—Windows Update notifies you when updates are available by displaying an icon in the notification area and a message stating that updates are available for download. The user can download the updates by clicking either the icon or the message. When the download is complete, the user is informed again with another icon and message; clicking one of them starts the installation.

  • 3 - Auto Download and Notify for Install—Windows Update downloads updates in the background without informing the user. After the updates have been downloaded, the user is informed with an icon in the notification area, and a message stating that the updates are ready for installation. Clicking one of them starts the installation. This is the default option.

  • 4 - Auto Download and Schedule the Install—Windows Update downloads updates automatically when the scheduled install day and time arrive. You can use the drop-down lists in the Configure Automatic Updates Properties dialog box to specify the desired days and times, which, by default, are daily at 3:00 a.m.

  • 5 - Allow Local Admin to Choose Setting—Enables local administrators to select a configuration option of their choice from the Automatic Updates control panel, such as their own scheduled time for installations.

The Configure Automatic Updates Properties dialog box offers four choices for configuring automatic updating of Vista computers.

Figure 8.25. The Configure Automatic Updates Properties dialog box offers four choices for configuring automatic updating of Vista computers.

The following describes several of the other more important available policy settings shown in Figure 8.24:

  • Enabling Windows Update Power Management to automatically wake up the system to install scheduled updates—Uses features of Windows Power Management to wake computers up from hibernation to install available updates.

  • Specify intranet Microsoft update service location—Enables you to specify a WSUS server for hosting updates from the Microsoft Windows Update site, as described in the previous section.

  • Automatic Updates detection frequency—Specifies the length of time in hours used to determine the waiting interval before checking for updates at an intranet update server. You need to enable the Specify Intranet Microsoft Update Service Location policy to have this policy work.

  • Allow non-administrators to receive update notifications—Enables users who are not administrators to receive update notifications according to other Automatic Updates configuration settings.

  • Allow Automatic Updates immediate installation—Enables Automatic Updates to immediately install updates that neither interrupt Windows services nor restart Windows.

  • Turn on recommended updates via Automatic Updates—Enables Automatic Updates to include both important and recommended updates.

  • No auto-restart for scheduled Automatic Updates installations—Prevents Automatic Updates from restarting a client computer after updates have been installed. Otherwise, Automatic Updates notifies the logged-on user that the computer will automatically restart in five minutes to complete the installation.

  • Reprompt for restart with scheduled installations—Specifies the number of minutes from the previous prompt to wait before displaying a second prompt for restarting the computer.

  • Delay Restart for scheduled installations—Specifies the number of minutes to wait before a scheduled restart takes place.

  • Reschedule Automatic Updates scheduled installations—Specifies the length of time in minutes that Automatic Updates waits after system startup before proceeding with a scheduled installation that was missed because a client computer was not turned on and connected to the network at the time of a scheduled installation, as previously specified by option 4 of the Configure Automatic Updates policy (Auto download and schedule the install).

  • Enable client-side targeting—Enables you to specify a target group name to be used for receiving updates from an intranet server such as a WSUS server. The group name you specify is used by the server to determine which updates are to be deployed.

  • Do not display “Install Updates and Shut Down” option in Shut Down Windows dialog box—Prevents the appearance of this option in the Shut Down Windows dialog box, even if updates are available when the user shuts down his computer.

  • Do not adjust default options to “Install Updates and Shut Down” option in Shut Down Windows dialog box—When enabled, changes the default shut down option from Install Updates and Shut Down to the last shut down option selected by the user.

For more information on these policies, consult the Explain tab of each policy’s Properties dialog box.

Configuring Data Protection

Objective: Configure Data Protection.

Windows Vista provides enhanced backup tools that are designed to help protect data from accidental loss due to hardware failure or other disaster. In addition, Vista includes encryption tools that protect data on computers against unauthorized access. This is especially important for portable computers that could be lost or stolen, resulting in data falling into the wrong hands. In this section, you first look at backup and restore solutions and then at data encryption.

Using Windows Backup to Protect Your Data

Microsoft has rewritten the backup program completely in Windows Vista, introducing the Backup and Restore Center and the Backup Status and Configuration utility to facilitate backup and restoration of data. You can back up all data on a disk or a portion thereof to a variety of media, including tapes, shared network drives, CD-ROM drives, and so on.

First introduced with Windows XP Professional and continued in Windows Vista is the concept of volume shadow copies, which create a shadow copy of the original volume at the instant the backup starts. This enables you to back up all files, including those an application might have open currently. Previous versions of Windows skipped any open files, thereby risking incomplete backups.

Follow Step by Step 8.10 to perform a backup of selected files.

Performing a Windows Complete PC Backup and Restore image enables you to fully restore your computer in the event of a hardware failure. This procedure replaces the System State backup used in Windows 2000/XP and backs up your data at the same time. The procedure to do this is similar to that of backing up selected files, as Step by Step 8.11 shows.

The following sections discuss the use of the Backup and Restore Center to restore files and folders or your entire computer, as well as the use of the Backup Status and Configuration Utility for configuring and performing backups.

Using Windows Backup to Recover Data

After you have performed a backup, the Backup and Restore Center makes it simple to restore data in the event of a hardware or software failure of some kind. Follow Step by Step 8.12 to restore data.

Using Windows Backup to Restore Your Computer

The Backup and Restore Center also enables you to restore all files and settings on your computer from a Windows Complete PC Backup and Restore image. This procedure replaces the System State restore used with Windows 2000/XP and also restores data files. Follow Step by Step 8.13 to do so.

The Backup and Restore Center also enables you to perform the following restoration tasks. You will need to supply UAC credentials to perform any of these operations:

  1. Perform an advanced restore—Click Advanced Restore to restore files from a backup performed on a different computer or to restore files for all users of this computer.

  2. Use System Restore to fix problems and undo changes to Windows—Click the link provided in the Tasks menu or at the bottom of the Backup and Restore Center to restore system files and settings to an earlier point in time. Follow the instructions provided to perform this restore.

  3. Create a restore point or change settings—Create a restore point that System Restore can use. Select this option from the Tasks menu to open the System Properties dialog box to the System Protection tab. Click Create, type a descriptive name to identify the restore point, and then click Create again.

Note: Vista and the Ntbackup utility

The restore tool in Vista’s Backup and Restore Center is not compatible with the .bkf files created using Windows NT/2000/XP/Server 2003 Ntbackup program. However, Microsoft makes a version of this utility available for download, should you need to restore backups created on an older Windows computer. You can download this utility from http://www.microsoft.com/downloads/details.aspx?FamilyID=7da725e2-8b69-4c65-afa3-2a53107d54a7&DisplayLang=en. You can navigate to this page by searching for “Windows NT Backup—Restore Utility” at Microsoft.com.

The Backup Status and Configuration Utility

You can also configure and perform backups from the Backup Status and Configuration Utility. From the Backup and Restore Center, click Change Settings in the Back Up Files or Your Entire Computer section to reveal the dialog box shown in Figure 8.33. You can also access this tool by clicking Start, All Programs, Accessories, System Tools, Backup Status and Configuration.

The Backup Status and Configuration utility enables you to perform many of the same procedures available from the Backup and Restore Center.

Figure 8.33. The Backup Status and Configuration utility enables you to perform many of the same procedures available from the Backup and Restore Center.

You can perform the following actions from the Backup Status and Configuration dialog box:

  1. Back Up Now—Performs an incremental backup of files and folders according to settings you have configured in the Back Up Files and Folders section of the Backup and Restore Center. An incremental backup procedure backs up only those files and folders that have changed since the previous backup. This procedure also marks these files as having been backed up.

  2. Change Backup Settings—Starts the wizard previously described in Step by Step 8.10, enabling you to modify the settings for backing up files and folders.

  3. Restore Files—Click the link on the left side of the dialog box to reveal the options shown in Figure 8.34, which enable you to perform the same restore procedure previously described in Step by Step 8.12 or perform an advanced restore of backup files from another computer or files for all users of the local computer.

    The Backup Status and Configuration dialog box also enables you to perform file and folder restores.

    Figure 8.34. The Backup Status and Configuration dialog box also enables you to perform file and folder restores.

  4. Complete PC Backup—Creates a Windows Complete PC Backup and Restore image according to the procedure previously described in Step by Step 8.11.

Caution: Make a habit of testing your backups and restores

You should ensure that you are creating valid backups by performing test restores on a regular basis. Use the In the Following Location option referred to in Step by Step 8.12 and shown in Figure 8.31 to restore data to a different folder and verify that the restored data is present. Otherwise you might not realize something is wrong with your backups until it is too late.

Data Security

You often hear news reports that mention thefts of laptop computers containing valuable data. In one such case, a computer stolen from a doctor’s car in Toronto contained the records of thousands of patients, exposing them to misuse and potential identity theft. The computer was protected with a password, but the data was not encrypted. Besides the Encrypting File System (EFS) introduced with Windows 2000 and continued with Windows XP, Windows Vista includes a new technology called BitLocker Drive Encryption, which encrypts a computer’s entire system partition. This section takes a look at these technologies.

For further information on both of these technologies, consult Microsoft Windows Vista Security Enhancements in the “Suggested Reading and Resources” section.

Encrypting File System

EFS enables users to encrypt files and folders on any partition that is formatted with the NTFS file system. The encryption attribute on a file or folder can be toggled the same as any other file attribute. When you set the encryption attribute on a folder, all its contents, whether subfolders or files, are also encrypted.

The encryption attribute, when assigned to a folder, affects files the same way that the compression attribute does when a file is moved or copied. Files that are copied into the encrypted folder become encrypted. Files that are moved into the encrypted folder retain their former encryption attribute, whether or not they were encrypted. When you move or copy a file to a file system that does not support EFS, such as FAT16 or FAT32, the file is automatically decrypted.

Exam Alert: EFS requirements

The file system must be set to NTFS if you want to use EFS, and no file can be both encrypted and compressed at the same time. You might be presented with a scenario where a user is unable to use EFS or file compression on a FAT32 volume; the correct answer to such a problem is to convert the file system to NTFS, as described in the section “Preparing a Disk for EFS.”

Encrypting File System Basics

Windows Vista has the capability to encrypt files directly on any NTFS volume. This ensures that no other user can use the encrypted data. Encryption and decryption of a file or folder is performed in the object’s Properties dialog box. Administrators should be aware of the rules to put into practice to manage EFS on a network:

  1. Only use NTFS as the file system for all workstation and server volumes.

  2. Keep a copy of each user’s certificate and private key on a floppy disk or other removable media.

  3. Remove the user’s private key from the computer except when the user is actually using it.

  4. When users routinely save documents only to their Documents folder, make certain their documents are encrypted by having each user encrypt his or her own Documents folder.

  5. Use two recovery agent user accounts that are reserved solely for that purpose for each Active Directory organizational unit (OU) if computers participate in a domain. Assign the recovery agent certificates to these accounts.

  6. Archive all recovery agent user account information, recovery certificates, and private keys, even if obsolete.

  7. When planning a network installation, keep in mind that EFS does take up additional processing overhead and plan to incorporate additional CPU processing power in your plans.

EFS uses certificates to manage the encryption. When a file is encrypted, the user’s encryption certificate is assigned to the file. When the user opens the file, the encryption certificate is checked, and the user is allowed to open and work with the file. When another user attempts to open the file, the user is unable to do so. Therefore, EFS is suitable for data that a user wants to keep private but not for files that are shared.

A unique encryption key is assigned to each encrypted file. You can share an encrypted file with other users in Windows Vista, but you are restricted from sharing an entire encrypted folder with multiple users or sharing a single file with a security group. This is related to the way that EFS uses certificates, which are applicable individually to users, and how EFS uses encryption keys, which are applicable individually to files. New to Windows Vista is the ability to store keys on smart cards. If you are using smart cards for user logon, EFS automatically locates the encryption key without issuing further prompts. EFS also provides wizards that assist users in creating and selecting smart card keys.

You can use different types of certificates with EFS: third party–issued certificates, certificates issued by certification authorities (CAs) including those on your own network, and self-signed certificates. If you have developed a security system on your network that utilizes mutual authentication based on certificates issued by your own CA, you can extend the system to EFS to further secure encrypted files. For more information on using certificates with EFS, refer to the Windows Vista Help and Support Center.

Preparing a Disk for EFS

Unlike previous versions of Windows, the system and boot partition in Windows Vista must be formatted with NTFS before you can install Vista, as you learned in Chapter 2, “Installing Windows Vista.” However, a data partition can be formatted with the FAT or FAT32 file systems. But you must ensure that such a partition is formatted with NTFS before you can encrypt data using EFS. If it is not, you can convert the hard disk format from FAT to NTFS or format the partition as NTFS. There are two ways to go about this:

  • Use the command-line Convert.exe utility to change an existing FAT16 or FAT32 partition that contains data to NTFS without losing the data.

  • Use the graphical Disk Management utility to format a new partition, or an empty FAT partition, to NTFS. If the volume contains data, you will lose it. (You can also use the command-line Format.exe utility to format a partition as NTFS.)

The Convert.exe utility is simple to use and typically problem-free, although you should make certain to back up the data on the partition before you convert it as a precaution. Follow Step by Step 8.14 to use this utility.

Encrypting Files

You can use either the cipher command line utility or the advanced attributes of the file or folder to encrypt a file. To use the cipher utility for encrypting a file named Myfile.txt located in the C:MYDIR folder, the full command to use is

cipher /e /s:c:mydirmyfile.txt

To change the Advanced encryption attribute of a file, open Computer and navigate to the file. Right-click the file and select Properties. On the General tab, click the Advanced button in the Attributes section. The Advanced Attributes dialog box opens, as shown in Figure 8.35.

The Advanced Attributes dialog box enables you to either compress or encrypt a file.

Figure 8.35. The Advanced Attributes dialog box enables you to either compress or encrypt a file.

Check the box next to Encrypt Contents to Secure Data and click OK. Then click OK again to close the file’s Properties sheet. You are given a warning dialog that lets you choose between encrypting just the file that you had selected or both the file and its parent folder. Select one of the options and click OK.

Note: Mutually exclusive advanced attributes

In the Advanced Attributes dialog box, if you select the Compress Contents to Save Disk Space check box, the check mark disappears from the Encrypt Contents to Secure Data check box. These two attributes are mutually exclusive—you can select only one.

After a file has been encrypted, you can view its encryption attribute details by again right-clicking the file, selecting Properties, and clicking the Advanced button on the General tab. In the Advanced Attributes dialog box, click the Details button. The User Access To dialog box opens, as shown in Figure 8.36.

After a file has been encrypted, you can add other users to access the file.

Figure 8.36. After a file has been encrypted, you can add other users to access the file.

You can see who is able to open the encrypted file, and you can add other user accounts to share the encrypted file and view the designated data recovery agent, if any. Click the Add button to share the encrypted file. A dialog box listing all the EFS-capable certificates for users opens. If a user has never been issued a certificate, the user’s account does not appear in this dialog box.

After a file is encrypted, an unauthorized user attempting to open the file is given an error message that says the user does not have access privileges. If an unauthorized user tries to move or copy an encrypted file, the user receives an Access is denied error message.

Decrypting Files

The process of decryption is the opposite of encryption. You can either use the cipher command or change the Advanced attribute for encryption on the file.

To use the cipher command to decrypt the file, click Start, Run, type cmd in the Open text box, and press Enter. At the command prompt, type cipher /d /s:c:myfoldermyfile.txt and press Enter. The file will be decrypted.

To use the Advanced Attributes method, open Computer and navigate to the file. Right-click the file and select Properties. On the General tab, click the Advanced button. In the ensuing Advanced Attributes dialog box, clear the Encrypt the Contents to Secure Data check box. Click OK and then click OK again.

If you are not the person who originally encrypted the file, or if you are not the designated recovery agent, then you will receive an error for applying attributes that says the access is denied.

BitLocker Drive Encryption

Windows Vista introduces a hardware-enabled data encryption feature named BitLocker that serves to protect data on a computer that is exposed to unauthorized access. Available on the Enterprise and Ultimate editions of Vista, BitLocker encrypts the entire Windows volume, thereby preventing unauthorized users from circumventing file and system permissions in Windows or attempting to access information on the protected partition from another computer or operating system. BitLocker even protects the data should an unauthorized user physically remove the hard drive from the computer and use other means to attempt access to the data.

BitLocker utilizes the Trusted Platform Module (TPM) version 1.2 to provide secure protection of encryption keys and checking of key components when Windows is booting. You can store keys and password on a USB flash drive that the user must insert to boot the computer. You can also employ an option that requires the user to supply a PIN code, thereby requiring multifactor authentication before the data becomes available for use. If an unauthorized individual has tampered with or modified system files or data in any way, the computer will not boot up.

Note: Trusted Platform Modules

At the time of writing, very few computers on the market are equipped with a TPM. While most computer manufacturers can include a TPM in new computers, you cannot retrofit existing computers with TPMs. For this reason, this section emphasizes the procedure for employing BitLocker on computers that are not equipped with TPMs.

You can store encryption keys and restoration password on a USB flash drive or a separate file for additional data security and recovery capability. Should a user need to recover data using BitLocker’s recovery mode, she merely needs to enter a recovery password to access data and the Windows operating system.

Preparing Your Computer to Use BitLocker

To use BitLocker your computer must have at least two partitions: a system partition or volume of at least 1.5GB size and a boot (Windows) partition or volume. The BitLocker procedure will encrypt the Windows partition.

You can use a computer that does not have a TPM module if you have a USB flash drive to store the encryption keys and password. Step by Step 8.15 outlines the procedure for setting up a new computer for BitLocker and installing Vista on this computer.

Caution: Do not use a computer containing important data

If your computer contains any data you want to retain, back this data up before performing Step by Step 8.15. Note that if your computer already has two valid partitions as described in this section, you do not have to perform Step by Step 8.15.

Tip: BitLocker Drive Preparation Tool

Microsoft makes available the BitLocker Drive Preparation Tool, which can be downloaded from the Windows Update website as an available extra. At this location, select BitLocker and EFS Enhancements and then click Install. This tool repartitions your Windows partition to add the required 1.5GB system partition. For more information, refer to Description of the BitLocker Drive Preparation Tool in the “Suggested Readings and Resources” section.

Enabling BitLocker

Because most computers that are currently available on the market or already in users’ hands do not contain a TPM module, this section covers the procedure for enabling BitLocker on such a computer. Step by Step 8.16 outlines the procedure for doing so.

After you have completed this procedure, you must have the USB drive to start your computer. Alternately, you can use the recovery mode and type the recovery password that was automatically created while enabling BitLocker. BitLocker provides the BitLocker Drive Encryption Recovery Console to enable you to insert the USB drive that contains the recovery password or press Enter, type the recovery password, and press Enter again.

Caution: Ensure that you do not lose the recovery password

If you lose the recovery password, your Windows installation and all data stored on its partition will be permanently lost. You will need to repartition your hard drive and reinstall Windows. Consequently, you should create at least two copies of the password as described in Step by Step 8.16 and store these in a secure location. Do not leave the USB flash drive in your laptop bag; attach it to your key chain or store it elsewhere on your person.

Disabling BitLocker

Should you need to turn BitLocker off for any reason, the BitLocker Drive Encryption applet in Control Panel enables you to do so. This procedure decrypts your volume and discards all encryption keys. To do so, access the BitLocker Drive Encryption applet (you will need to accept a UAC prompt) and select Turn Off BitLocker. On the BitLocker Drive Encryption dialog box, select Disable BitLocker Drive Encryption or Decrypt the Volume as required. This action begins immediately without further prompts. You will be able to monitor the decryption action from an icon in the notification area.

Summary

In this chapter, you learned about performance monitoring and optimization, using the built-in diagnostic tools to troubleshoot reliability problems, configuring Windows Update, backup and restore, and file encryption.

Windows Vista provides the Reliability and Performance Monitor console for monitoring, optimizing, and troubleshooting desktop performance. You can use Performance Monitor to monitor counters related to performance objects associated with different hardware and software components of the system. Reliability Monitor provides a trend analysis of events that can potentially destabilize your computer. You can create data collector sets to log performance counters over a period of time for a permanent record of computer performance.

Vista provides three new technologies that enhance system performance. Windows SuperFetch optimizes memory performance based on trends of most-used programs and data. Windows ReadyBoost enables you to use a USB flash drive or memory card as an additional source of memory. Windows ReadyDrive enables mobile computers equipped with a hybrid hard drive to improve their performance and battery life.

Vista provides several tools for troubleshooting reliability issues. System Configuration Utility enables you to start your computer with a reduced set of services and startup programs to troubleshoot problematic startups. You can use Task Manager to provide a quick view of computer performance. Task Manager enables you to shut down misbehaving applications and processes and start applications at different priority levels. Event Viewer logs errors, warning, and informational events that take place on the computer. You can also schedule actions to take place should a given event be logged.

Windows Update enables you to keep your computer up-to-date with security patches, Windows Defender definition updates, and other enhancements available from the Microsoft Windows Update website. On a network you can configure a WSUS server to download updates and make them available to network computers and configure policies that govern the behavior of computers obtaining updates.

Vista provides enhanced backup and restore tools in the Backup and Restore Center that help to prevent data loss resulting from hardware failure and other disasters. You can back up selected files and folders or your entire computer and schedule backups to take place at preconfigured intervals.

Vista provides two solutions for protecting data against unauthorized access by means of encryption. EFS encrypts files and folders on any NTFS volume of your computer, and BitLocker encrypts the entire system volume.

Apply Your Knowledge

Backing up and restoring crucial data is one of the most important responsibilities for anyone using modern computers. Windows Vista’s backup tools simplify the task of backing up files, folders, or the entire computer to hard disks, CD-ROMs, DVD-ROMs, and network locations.

Exercises

Backing Up a Folder

Windows Vista provides the Documents folder as a default location used by many applications to store data. In this exercise you back up this folder to a network location and then delete its contents. You need two computers running Windows Vista for this exercise.

Estimated Time: 15 minutes.

  1. At the computer that will receive the backed up data, create and share a folder named Backup. Ensure that this folder is shared with at least the Change shared folder permission. Refer to Chapter 6 if you have forgotten how to do this step.

  2. At the computer from which you will be backing up data, click Start, Control Panel, Back Up Your Computer.

  3. In the Back Up and Restore Center, click Back Up Files and then click Continue on the UAC prompt that appears.

  4. On the Back Up Files screen, select On a Network, and then type the UNC path to the shared folder on the other computer.

  5. On the Which File Types Do You Want to Back Up screen, select Documents and clear all other check boxes. Then click Next.

  6. Leave the defaults selected on the How Often Do You Want to Create a Backup screen and click Save Settings and Start Backup.

  7. Wait for the backup to be completed. Assuming you are using this computer for testing and study purposes only, this should not take more than a few minutes.

  8. When informed that the backup is completed, click Finish.

  9. Click Start, Documents to display the contents of this folder.

  10. Press Ctrl+A to select all the files in the folder and press the Delete key. On the Delete Multiple Items message box, click Yes.

  11. Minimize the Backup and Restore Center to reveal the desktop, right-click the Recycle Bin icon, and choose Empty Recycle Bin. Then click Yes to confirm permanent deletion of its contents.

Restoring Data

You just deleted the contents of the Documents folder. This would be big trouble if this were your company’s accounts receivable folder—or even your personal stock of precious digital photographs. Such things occasionally happen, whether by accident, disk failure, or other cause. Here you restore the contents of this folder from backup.

Estimated Time: 10 minutes.

  1. Press Alt+Tab to bring the Backup and Restore Center back up. If you have closed this tool, repeat step 1 of the previous exercise.

  2. Click Restore Files.

  3. On the Restore Files screen, select Files from the Latest Backup and then click Next.

  4. On the next screen, click Add Folders.

  5. Select Documents and then click Add. This folder is added to the list in the Restore Files dialog box.

  6. Click Next.

  7. On the Where Do You Want to Save the Restored Files screen, ensure that In the Original Location is selected, and then click Start Restore.

  8. Wait while the progress of the restore is charted in the Restore Progress dialog box. When informed that files were successfully restored, click Finish and close the Backup and Restore Center.

  9. Click Start, Documents, and confirm that the contents of this folder have been properly restored.

Exam Questions

1.

Your Windows Vista computer has been running slowly once or twice a day when performing processor-intensive or memory-intensive tasks, and you suspect that you might need to upgrade your processor. You have added additional RAM to the computer but need to be informed of potential processor bottlenecks, so you want to configure the computer to inform you should processor utilization exceed 85%. What should you do? (Each correct answer represents part of the solution. Choose two.)

Exam Questions

A.

Configure Performance Monitor to generate an alert when the Processor\%Processor time counter exceeds 85%.

Exam Questions

B.

Configure a data collector set to generate an alert when the Processor\%Processor time counter exceeds 85%.

Exam Questions

C.

Configure Reliability Monitor to generate an alert when the Processor\%Processor time counter exceeds 85%.

Exam Questions

D.

View the Application log in Event Viewer to determine whether any alerts have been generated.

Exam Questions

E.

View the System log in Event Viewer to determine whether any alerts have been generated.

Exam Questions

F.

In Computer Management, ensure that the Alerter service is configured to start automatically. You will then receive a message box on your desktop when an alert is generated.

2.

Ryan is concerned with the performance of his Windows Vista computer because it does not appear to be responding as rapidly as it did a few months ago. He creates a data collector set and logs his performance over the period of a workday. Then he uses Performance Monitor to display the collected data and notices the following results:

  • MemoryPages/sec: 62

  • Processor\% Processor Time: 71

  • LogicalDisk\% Disk Time: 74

  • PhysicalDisk\% Disk Time: 63

  • System: Processor Queue Length: 3

Which of the following system upgrades should Ryan do first?

Exam Questions

A.

Add a faster hard disk.

Exam Questions

B.

Add a larger hard disk.

Exam Questions

C.

Add additional memory.

Exam Questions

D.

Install a faster processor.

Exam Questions

E.

Install a second processor.

3.

Kristin is a photo enthusiast who is using a computer running Windows Vista Home Premium that is equipped with 1GB RAM and a 2.4GHz processor. When she edits large photo files from her 8-megapixel digital camera, her computer runs slowly. She needs to improve the performance of her computer, so she purchases a 1GB USB flash drive and investigates the new features available to Windows Vista. Which of the following should she utilize to improve her computer’s performance?

Exam Questions

A.

Windows SuperFetch

Exam Questions

B.

Windows ReadyBoost

Exam Questions

C.

Windows ReadyDrive

Exam Questions

D.

She cannot use any of these features. She should add more RAM instead.

4.

Brent’s Windows Vista computer is experiencing startup problems, and he believes that it is due to one of several new programs he has recently downloaded from the Internet and installed on his computer. These programs are configured to start automatically when Brent starts his computer. He wants to find out which program is causing the problem, so he boots the computer in Safe mode and accesses the System Configuration utility. Which of the following should he do first?

Exam Questions

A.

From the Boot tab, select Advanced Options and then clear the options for starting the new programs automatically.

Exam Questions

B.

From the General tab, select the Diagnostic Startup option.

Exam Questions

C.

From the General tab, select the Selective Startup option and clear the Load System Services check box.

Exam Questions

D.

From the General tab, select the Selective Startup option and clear the Load Startup Items check box.

5.

Debbie is the desktop administrator for an engineering company. All servers run Windows Server 2003, and all client computers run Windows Vista Ultimate. Several users in the Design department run a simulation application that requires several hours to process its data. These users report that when they run this application, the performance of other engineering programs becomes considerably slower.

What should Debbie instruct the users to do so that the simulation application can run with the least impact on other engineering programs being run at the same time?

Exam Questions

A.

Configure the simulation program to have BelowNormal priority.

Exam Questions

B.

Configure the simulation program to have AboveNormal priority.

Exam Questions

C.

Configure all other engineering programs to have High priority.

Exam Questions

D.

Configure all other engineering programs to have RealTime priority.

6.

Connie has experienced problems in the past with updates downloaded from the Microsoft website causing applications to fail unexpectedly. So she has configured Windows Update on her computer to check for updates but to let her choose whether to download and install them.

A few months later, Connie realizes that an optional patch that her work colleagues have received is missing from her machine, and its performance has suffered as a consequence. What should she do to view and restore this update while retaining the option to let her choose whether to download and install future updates?

Exam Questions

A.

From the Windows Update applet in Control Panel, click Change Settings, and then select the check box labeled Include Recommended Updates When Downloading, Installing, or Notifying Me About Updates.

Exam Questions

B.

From the Windows Update applet in Control Panel, click Change Settings, and then select the Install Updates Automatically (Recommended) option.

Exam Questions

C.

From the Windows Update applet in Control Panel, click View Update History, select the update, and then click Restore.

Exam Questions

D.

From the Windows Update applet in Control Panel, click Restore Hidden Updates, select the update, and then click Restore.

7.

You want to create a backup of the Windows settings including the Registry on your computer. You also want to back up your applications and data at the same time, so you access the Backup and Restore Center. Which of the following options should you select?

Exam Questions

A.

Back Up Files

Exam Questions

B.

Back Up System State

Exam Questions

C.

Back Up Computer

Exam Questions

D.

Create a Restore Point or Change Settings

8.

You are using a Windows Vista Home Premium computer at home and a Windows Vista Business computer in the office. You are working on a large, urgent project that needs to be completed by next week, but the weather office has issued a blizzard warning for the next two days. Anticipating that you will be unable to go to the office, you use Windows Backup to back up all the folders required for the project to a DVD-ROM and take this DVD-ROM home.

Which of the following procedures should you follow to restore these folders to your home computer?

Exam Questions

A.

From the Backup and Restore Center, select Restore Files and then select the option to save the files in the following location and choose an appropriate folder on your computer.

Exam Questions

B.

From the Backup and Restore Center, select the option to perform an advanced restore.

Exam Questions

C.

From the Backup and Restore Center, select the option to create a restore point or change settings.

Exam Questions

D.

From the Backup and Restore Center, select the option to load the Windows Recovery Environment.

9.

Lance is the team leader of a field research group for an environmental research company. The company is working on a new system for toxic contaminant removal from municipal sewage effluents. Researchers in his group have stored experimental data on a Windows Vista Business laptop computer that they regularly take to the field when performing measurements at several sites. They record their measurements into a folder named Effluents. The network administrator at the company has created a group named Field and added the user accounts for Lance and the other field researchers to this group.

Lance’s boss is concerned that the laptop could be stolen and the data could fall into the wrong hands, so he decides to use EFS to encrypt the Effluents folder on the laptop. He needs to enable the other researchers in his group to access data on this folder while in the field. All researchers have valid certificates for using EFS. Lance right-clicks the data folder, chooses Properties, clicks the Advanced button, and then selects the Encrypt Contents to Secure Data option.

What else does Lance need to do so that all users of the laptop can access the experimental data?

Exam Questions

A.

In the Advanced Attributes dialog box for the Effluents folder, click Details. In the Encryption Details dialog box that appears, click Add and add the other researchers individually to the list of users who can transparently access the folder.

Exam Questions

B.

In the Advanced Attributes dialog box for the Effluents folder, click Details. In the Encryption Details dialog box that appears, click Add and add the Field group to the list of users who can transparently access the folder.

Exam Questions

C.

Right-click each file in the Effluents folder and choose Properties. Click the Advanced button and in the Advanced Attributes dialog box for the file, click Details. In the User Access to Effluents dialog box that appears, click Add and add the other researchers individually to the list of users who can transparently access the file.

Exam Questions

D.

Right-click each file in the Effluents folder and choose Properties. Click the Advanced button and in the Advanced Attributes dialog box for the file, click Details. In the User Access to Effluents dialog box that appears, click Add and add the Field group to the list of users who can transparently access the file.

10.

Nancy is a sales representative for a high technology firm that includes aerospace and defense firms as well as the U.S. military among its clients. She uses a notebook computer running Windows Vista during her visits to client locations. This computer holds confidential data for all clients including data that could provoke a national security incident should the notebook fall into the wrong hands.

Nancy decides to use BitLocker drive encryption to secure the contents of the notebook, which is not equipped with a TPM module. The computer already contains several folders with important data files. Which of the following does she need to do in order to enable BitLocker on her notebook without losing any existing data? (Each correct answer represents part of the solution. Choose two.)

Exam Questions

A.

Use the Windows Vista DVD-ROM to access the System Recovery Options dialog box and select the Command Prompt option. Then repartition the hard drive in the notebook to hold a 40GB Windows partition and a single partition that holds all data files.

Exam Questions

B.

Use the Windows Vista DVD-ROM to access the System Recovery Options dialog box and select the Command Prompt option. Then repartition the hard drive in the notebook to hold a 1.5GB system partition and a single partition that holds both operating system files and the data files.

Exam Questions

C.

Use the BitLocker Drive Preparation Tool to repartition the hard drive in the notebook to hold a 40GB Windows partition and a single partition that holds all data files.

Exam Questions

D.

Use the BitLocker Drive Preparation Tool to repartition the hard drive in the notebook to hold a 1.5GB system partition and a single partition that holds both operating system files and the data files.

Exam Questions

E.

Use a USB flash drive to hold the encryption keys and access password.

Exam Questions

F.

Use a floppy disk to hold the encryption keys and access password.

Answers to Exam Questions

1.

B and D. To have the computer generate an alert when a certain condition occurs (for example, when the Processor\%Processor time counter exceeds 85%), you need to create a manually configured data collector set and access the Performance Counter Alert option. Doing so enables alerts to be recorded in the Application log, which you can view from Event Viewer. You can watch the counter values in real time from System Monitor, but this application does not generate an alert, so answer A is incorrect. Reliability Monitor displays a computer reliability graph but does not generate any alerts, so answer C is incorrect. You need to look in the Application log and not the System log to find alerts, so answer E is incorrect. You cannot configure the Alerter service to display alerts to your desktop, so answer F is incorrect. For more information, see the section, “Data Collector Sets.”

2.

C. Ryan should add more RAM. A value of MemoryPages/sec that is consistently greater than 20 indicates a shortage of RAM and a potential bottleneck. LogicalDisk\% Disk Time and PhysicalDisk\% Disk time report the percentage of time that the disk was busy servicing disk requests; in this situation, the high amount of paging results in a busy disk. When PhysicalDisk\% Disk time is above 50%, it is sometimes necessary to upgrade to a faster hard disk; however, if memory counters are also high, you should add RAM first to improve computer performance. Therefore answers A and B are incorrect. Paging activity and disk requests might cause an increase in the Processor\% Processor time; however, the value of 71 for this counter is within acceptable limits. Therefore answers D and E are incorrect. For more information, see the section, “Optimizing and Troubleshooting Memory Performance.”

3.

B. Kristin can use Windows ReadyBoost to improve the performance of her computer. ReadyBoost enables her to use a USB flash drive or memory card with at least 256MB free space as an additional memory source that responds much faster than the paging file on her hard disk. Windows SuperFetch optimizes memory performance based on recent data and program usage. It works automatically and does not use a USB flash drive, so answer A is incorrect. Windows ReadyDrive enables mobile computers equipped with a hybrid hard drive to achieve enhanced performance. It also does not use a USB flash drive, so answer C is incorrect. Because Kristin can use her USB flash drive with Windows ReadyBoost, she does not need to add RAM, so answer D is incorrect. For more information, see the section, “Windows ReadyBoost.”

4.

D. Brent should access the General tab of the System Configuration utility, select the Selective Startup option, and clear the Load Startup Items check box. Doing so prevents all applications configured to load at startup from running. He can then check the performance of the computer at startup, after which he can selectively start programs from the Startup tab. The Advanced Options dialog box accessed from the Boot tab does not contain options for starting programs automatically, so answer A is incorrect. The Diagnostic Startup option loads basic devices and services only but does not modify application startup, so answer B is incorrect. Clearing the Load System Services check box prevents nonessential services from starting but does not prevent programs from starting automatically, so answer C is incorrect. For more information, see the section, “System Configuration Utility.”

5.

A. Debbie can resolve this problem by configuring the simulation program to run at a lower priority (either Low or BelowNormal). Doing so causes more computer resources to be allocated to other engineering applications, thereby improving their performance while still allowing the simulation program to run. Configuring the simulation program to run at a higher priority would take resources away from the other programs, so answer B is incorrect. Configuring all other programs to run at High priority might help to solve the problem but requires more effort than changing the priority of a single program, so answer C is incorrect. Configuring programs for RealTime priority can cause the computer to become unstable, so answer D is incorrect. For more information, see the section, “Configuring Application Priority.”

6.

D. Connie should access the Windows Update applet in Control Panel. She should click Restore Hidden Updates, select the update, and then click Restore. Updates might become hidden if she has asked Windows not to notify her or install updates automatically. Selecting the check box labeled Include Recommended Updates When Downloading, Installing, or Notifying Me About Updates enables her to include updated definition files for Windows Defender in the updates downloaded from the Microsoft Windows Update website. This option (which is selected by default) does not enable her to restore a hidden update, so answer A is incorrect. Connie should not select the Install Updates Automatically (Recommended) option because she wants to retain the option to let her choose whether to download and install future updates, so answer B is incorrect. The View Update History option enables her to view installed updates but not access hidden updates, so answer C is incorrect. For more information, see the section, “Working with Windows Update.”

7.

C. You should select the Back Up Computer option. This option enables you to create a Windows Complete PC Backup and Restore image of your entire computer. This image contains your Windows files and Registry, and you can use it to recover from a hardware failure. The Back Up Files option enables you to back up selected files and folders but not the Windows files or Registry, so answer A is incorrect. The Back Up System State option existed in Windows 2000/XP for backing up items such as the Registry, system files, and boot files. It has been replaced by the Complete PC Backup and Restore option in Vista, so answer B is incorrect. The Create a Restore Point or Change Settings option enables you to create a point that can be used for rolling back your computer settings to a previous point in time. It does not create a backup of any type, so answer D is incorrect. For more information, see the section, “Using Windows Backup to Protect Your Data.”

8.

B. You should select the option to perform an advanced restore. In the Backup and Restore Center, click Advanced Restore and select the option to restore a backup that was created on a different computer. The option to save the restored files in a specified location enables you to create a new copy of files or folders backed up on the same computer, so answer A is incorrect. The option to create a restore point or change settings enables you to create a point that can be used for rolling back your computer settings to a previous point in time. It does not restore files from either the same computer or a different one, so answer C is incorrect. The option to load the Windows Recovery Environment is used to restore your entire computer from a Windows Complete PC Backup and Restore image. This does not restore files from another computer, so answer D is incorrect. For more information, see the section, “Using Windows Backup to Restore Your Computer.”

9.

C. Lance should access the User Access to Effluents dialog box, click Add and add the other researchers individually to the list of users that can transparently access the file. Windows Vista enables you to enable additional users to access files and folders that are encrypted with EFS. Lance can authorize the users in his group to access the data files in this folder by following the procedure in this option for each of the files in turn. The Encryption Details dialog box does not contain an option for enabling additional users to access the encrypted files, so answers A and B are incorrect. Lance cannot add a group to the list of users who can access the file on the User Access dialog box, so answer D is incorrect. For more information, see the section, “Encrypting Files.”

10.

D and E. Nancy should use the BitLocker Drive Preparation Tool to repartition the hard drive in the notebook to hold a 1.5GB system partition and a single partition that holds both operating system files and the data files. She should then use a USB flash drive to hold the encryption keys and access password while she enables BitLocker from the BitLocker Drive Encryption applet in Control Panel. If Nancy were to repartition the hard drive by using the command prompt available from the System Recovery Options dialog box, her data would be lost. Therefore answers A and B are incorrect. If she were to repartition the hard drive to hold a 40GB Windows partition and the remainder of the drive as a data partition, her data would not be protected. Therefore answer C is incorrect. It is not possible to store the encryption keys and access password on a floppy disk, so answer F is incorrect. For more information, see the section, “BitLocker Drive Encryption.”

Suggested Readings and Resources

The following are some recommended readings on the subject of monitoring and optimizing computer performance and reliability, and configuring Windows Update and data protection:

  1. Course

  2. Websites

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.133.61