PUBLISHED BY
Microsoft Press
A Division of Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052-6399
Copyright © 2005 by Microsoft Corporation
All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or
by any means without the written permission of the publisher.
Library of Congress Control Number 2004118216
Printed and bound in the United States of America.
1 2 3 4 5 6 7 8 9
QWT
9 8 7 6 5 4
Distributed in Canada by H.B. Fenn and Company Ltd.
A CIP catalogue record for this book is available from the British Library.
Microsoft Press books are available through booksellers and distributors worldwide. For further
information about international editions, contact your local Microsoft Corporation office or contact
Microsoft Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/
learning/. Send comments to tkinput@microsoft.com.
Microsoft, Active Directory, ActiveSync, ActiveX, DirectSound, DirectX, FrontPage, IntelliMirror,
Microsoft Press, MSDN, MS-DOS, MSN, NetMeeting, Outlook, Visual InterDev, Visual Studio, Win32,
Windows, Windows Media, Windows Mobile, Windows NT, and Windows Server are either registered
trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places,
and events depicted herein are fictitious. No association with any real company, organization, product,
domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
Product Planner: Martine DelRe
Content Development Manager: Marzena Makuta, Elise Morrison
Technical Editor: Karena Lynch
Project Manager: Julie Pickering
Copy Editor: Nancy Sixsmith
Indexer: Julie Hatley
Body Part No. X10-87059
For my wife, Susan
Walter Glenn
For my wife, Erica
Tony Northrup
About the Authors
Walter Glenn, Microsoft Certified System Engineer
(MCSE) and Microsoft Certified Trainer (MCT), has
been a part of the computer industry for more than
17 years. He currently works in Huntsville, Alabama,
as a consultant, trainer, and writer. Walter is the
author or coauthor of more than 20 computer books,
including Microsoft Exchange Server 2003 Administrator’s Companion (Microsoft Press, 2003), MCDST
Self-Paced Training Kit (Exam 70-271): Supporting
Users and Troubleshooting a Microsoft Windows XP
Operating System (Microsoft Press, 2004), MCDST
Self-Paced Training Kit (Exam 70-272): Supporting
Users and Troubleshooting Desktop Applications on a
Microsoft Windows XP Operating System (Microsoft
Press, 2004), and MCSE Self-Paced Training Kit
(Exam 70-297): Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure (Microsoft Press, 2003). He has also written a number of Webbased courses that are geared toward Microsoft certification training.
Tony Northrup, Certified Information Systems Security Professional (CISPP), MCSE, and Microsoft Most
Valuable Professional (MVP), is a networking consultant and author living in the Boston, Massachusetts
area. During his seven years as principal systems
architect at BBN/Genuity, he was ultimately responsible for the reliability and security of hundreds of Windows servers and dozens of Windows domains—all
directly connected to the Internet. Needless to say,
Tony learned the hard way how to keep Windows
systems safe and reliable in a hostile environment. As
a consultant, Tony has provided networking guidance
to a wide variety of businesses, from Fortune 100
enterprises to small businesses. When he is not consulting or writing, Tony enjoys cycling, hiking, and
nature photography.
Table of Contents
ix
Contents at a Glance
Part 1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Part 2
21
22
23
24
25
26
27
Learn at Your Own Pace
Introduction to Windows XP Professional. . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Installing Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Deploying Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Modifying and Troubleshooting the Startup Process . . . . . . . . . . . . . . . . 4-1
Configuring Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Installing, Managing, and Troubleshooting
Hardware Devices and Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Setting Up and Managing User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
Securing Resources with NTFS Permissions. . . . . . . . . . . . . . . . . . . . . . . 8-1
Administering Shared Folders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1
Managing Data Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1
Setting Up, Configuring, and Troubleshooting Printers. . . . . . . . . . . . . . 11-1
Managing Printers and Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1
Supporting TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1
Overview of Active Directory Service . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-1
Configuring Network and Internet Connections . . . . . . . . . . . . . . . . . . . 15-1
Configuring Security Settings and Internet Options . . . . . . . . . . . . . . . . 16-1
Monitoring and Managing Shared Folders by
Using Computer Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-1
Using Windows XP Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-1
Monitoring and Optimizing System Performance. . . . . . . . . . . . . . . . . . 19-1
Backing Up and Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-1
Prepare for the Exam
Installing Windows XP Professional (1.0) . . . . . . . . . . . . . . . . . . . . . . . . 21-3
Implementing and Conducting Administration of Resources. . . . . . . . . 22-1
Implementing, Managing, Monitoring, and
Troubleshooting Hardware Devices and Drivers . . . . . . . . . . . . . . . . . . . 23-1
Monitoring and Optimizing System Performance and Reliability . . . . . . 24-1
Configuring and Troubleshooting the Desktop Environment . . . . . . . . . 25-1
Implementing, Managing, and Troubleshooting
Network Protocols and Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26-1
Configuring, Managing, and Troubleshooting Security . . . . . . . . . . . . . . 27-1
ix
Contents
Contents
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxv
About This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxvii
Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxvii
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxviii
About the CD-ROM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxviii
Features of This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxviii
Part I: Learn at Your Own Pace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxix
Part II: Prepare for the Exam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxix
Informational Notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xl
Notational Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xl
Keyboard Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xli
Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xli
Hardware Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xli
Software Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xlii
Setup Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xlii
The Microsoft Certified Professional Program . . . . . . . . . . . . . . . . . . . . . . . . . . xliii
Certifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xliv
Requirements for Becoming a Microsoft Certified Professional . . . . . . . . . . . xliv
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xlv
Evaluation Edition Software Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xlvi
Part 1
1
Learn at Your Own Pace
Introduction to Windows XP Professional
1-3
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Lesson 1: Explaining Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Available Windows XP Editions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Lesson 2: Identifying Major Features of Windows XP Service Pack 2. . . . . . . . . . 1-8
How to Determine Whether Service Pack 2 Is Installed. . . . . . . . . . . . . . . . . 1-8
Major Enhancements Included in Windows XP Service Pack 2. . . . . . . . . . . . 1-9
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
What do you think of this book?
We want to hear from you!
Microsoft is interested in hearing your feedback about this publication so we can
continually improve our books and learning resources for you. To participate in a brief
online survey, please visit: www.microsoft.com/learning/booksurvey/
ix
x
Contents
Lesson 3: Identifying Key Characteristics of Workgroups and Domains . . . . . . . 1-16
How Workgroups Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
How Domains Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-17
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-20
Lesson 4: Logging On and Off Windows XP Professional . . . . . . . . . . . . . . . . . 1-21
How to Log On Locally to the Computer Running
Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21
Windows XP Professional Authentication Process . . . . . . . . . . . . . . . . . . . 1-24
How to Use a Password Reset Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-25
How to Run Programs with Different User Credentials . . . . . . . . . . . . . . . . 1-26
The Purpose of Fast Logon Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . 1-27
How to Log Off Windows XP Professional. . . . . . . . . . . . . . . . . . . . . . . . . . 1-27
Features of the Windows Security Dialog Box. . . . . . . . . . . . . . . . . . . . . . . 1-27
Practice: Creating a Password Reset Disk . . . . . . . . . . . . . . . . . . . . . . . . . 1-29
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-30
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-31
Case Scenario Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-32
Scenario 1.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-32
Scenario 1.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-33
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-33
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-33
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-34
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-35
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-35
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-37
2
Installing Windows XP Professional
2-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Lesson 1: Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Overview of Preinstallation Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Windows XP Professional Hardware Requirements . . . . . . . . . . . . . . . . . . . . 2-2
How to Verify Hardware Compatibility with the Windows Catalog . . . . . . . . . . 2-3
What Are Disk Partitions? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Guidelines for Choosing a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Guidelines for Choosing Domain or Workgroup Membership . . . . . . . . . . . . . 2-7
How to Ensure You Have the Necessary Information
Before Installing Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . 2-8
How Microsoft Grants Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Contents
xi
Practice: Prepare for Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-10
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11
Lesson 2: Installing Windows XP Professional from a CD-ROM . . . . . . . . . . . . . 2-12
Overview of Windows XP Professional Setup . . . . . . . . . . . . . . . . . . . . . . . 2-12
How to Initiate Text Mode Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12
How to Run the Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
How to Install Windows XP Professional Networking Components . . . . . . . . 2-15
How the Installation Is Completed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16
What Is Dynamic Update? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17
Practice: Installing Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . 2-18
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-23
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-24
Lesson 3: Installing Windows XP Professional over the Network . . . . . . . . . . . . 2-25
How to Prepare for a Network Installation . . . . . . . . . . . . . . . . . . . . . . . . . 2-25
How to Install over the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-26
How to Modify the Setup Process Using Winnt.exe. . . . . . . . . . . . . . . . . . . 2-27
How to Modify the Setup Process Using Winnt32.exe. . . . . . . . . . . . . . . . . 2-28
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-31
Lesson 4: Upgrading Earlier Versions of Windows to
Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-32
Client Upgrade Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-32
How to Generate a Hardware Compatibility Report . . . . . . . . . . . . . . . . . . . 2-33
How to Upgrade Compatible Computers Running Windows 98 . . . . . . . . . . 2-34
How to Upgrade Compatible Computers Running Windows NT 4.0 . . . . . . . 2-34
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-35
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-36
Lesson 5: Troubleshooting Windows XP Professional Setup . . . . . . . . . . . . . . . 2-37
Guidelines for Resolving Common Problems . . . . . . . . . . . . . . . . . . . . . . . 2-37
Guidelines for Troubleshooting Setup Failures
Using the Windows XP Setup Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-39
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-40
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-41
Lesson 6: Activating and Updating Windows XP Professional . . . . . . . . . . . . . . 2-42
Guidelines for Activating Windows Following Installation . . . . . . . . . . . . . . . 2-42
How to Scan a System and Display Available Updates
Using the Windows Update Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-43
How to Configure Automatic Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-43
What Is Software Update Services? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-44
xii
Contents
What Are Service Packs? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-46
Practice: Configuring Automatic Updates . . . . . . . . . . . . . . . . . . . . . . . . . . 2-49
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-49
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-50
Case Scenario Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-50
Scenario 2.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-50
Scenario 2.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-51
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-52
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-52
Question . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-52
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-53
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-53
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-54
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-54
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-56
3
Deploying Windows XP Professional
3-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Lesson 1: Creating Unattended Installations
by Using Windows Setup Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Overview of Unattended Installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
How to Find the Windows XP Deployment Tools . . . . . . . . . . . . . . . . . . . . . . 3-4
What Windows Setup Manager Does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
How to Use the Windows Setup Manager to
Create an Answer File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
How to Start an Unattended Installation . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
Practice: Creating Unattended Installations with
Windows Setup Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Lesson 2: Using Disk Duplication to Deploy Windows XP Professional . . . . . . . 3-18
Overview of Disk Duplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-18
How to Extract the Windows System Preparation Tool. . . . . . . . . . . . . . . . . 3-19
Preparing a Computer for the Creation of a Master Image
by Using the System Preparation Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19
How to Install Windows XP Professional from a Master Disk Image . . . . . . . 3-20
Practice: Deploying Windows XP Professional by
Using Disk Duplication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-21
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24
Contents
xiii
Lesson 3: Performing Remote Installations. . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25
Overview of RIS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25
Installing and Configuring RIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26
Requirements for RIS Client Computers . . . . . . . . . . . . . . . . . . . . . . . . . . 3-30
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-32
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-33
Lesson 4: Using Tools to Simplify Deployment . . . . . . . . . . . . . . . . . . . . . . . . 3-34
How to Use the Files And Settings Transfer Wizard. . . . . . . . . . . . . . . . . . . 3-34
What Is the User State Migration Tool? . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-36
How to Manage Applications by Using Windows Installer . . . . . . . . . . . . . . 3-37
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-40
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-40
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-41
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-41
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-41
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-42
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-43
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-43
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-43
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-44
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-45
4
Modifying and Troubleshooting the Startup Process
4-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Lesson 1: Explaining the Startup Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Files Used in the Startup Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
What Happens During the Preboot Sequence . . . . . . . . . . . . . . . . . . . . . . . 4-3
What Happens During the Boot Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
What Is the BOOT.INI File? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
What Happens During the Kernel Load Phase . . . . . . . . . . . . . . . . . . . . . . . 4-9
What Happens During the Kernel Initialization Phase . . . . . . . . . . . . . . . . . 4-10
What Happens During the Logon Phase . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13
Lesson 2: Editing the Registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15
What Is the Registry? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15
The Hierarchical Structure of the Registry . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
How to View and Edit the Registry Using the Registry Editor . . . . . . . . . . . . 4-20
Practice: Modifying the Registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21
xiv
Contents
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-23
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-24
Lesson 3: Troubleshooting Problems Using Startup and Recovery Tools . . . . . . 4-25
Guidelines for Troubleshooting Startup Using Safe Mode . . . . . . . . . . . . . . 4-25
Guidelines for Troubleshooting Startup Using
the Last Known Good Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27
Additional Advanced Boot Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-29
How to Perform Troubleshooting and Recovery Tasks
Using the Recovery Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-30
Practice: Installing and Accessing the
Windows XP Professional Recovery Console . . . . . . . . . . . . . . . . . . . . . . . 4-34
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-36
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-37
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-37
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-37
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-38
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-38
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-40
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-40
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-40
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-41
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-42
5
Configuring Windows XP Professional
5-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Lesson 1: Configuring and Troubleshooting the Display . . . . . . . . . . . . . . . . . . . 5-3
How to Configure Display and Desktop Properties . . . . . . . . . . . . . . . . . . . . 5-3
How to Configure Multiple Displays. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-8
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Lesson 2: Configuring Power Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-13
How to Select a Power Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-13
How to Configure Advanced Power Options . . . . . . . . . . . . . . . . . . . . . . . . 5-15
How to Enable Hibernate Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-16
How to Configure Advanced Power Management . . . . . . . . . . . . . . . . . . . . 5-16
How to Configure an Uninterruptible Power Supply . . . . . . . . . . . . . . . . . . . 5-17
Practice: Configuring Power Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-18
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-19
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20
Contents
xv
Lesson 3: Configuring System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21
How to Configure System Performance Options . . . . . . . . . . . . . . . . . . . . . 5-21
How to Configure User Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-27
How to Configure Startup and Recovery Settings . . . . . . . . . . . . . . . . . . . . 5-31
How to Configure Environment Variables . . . . . . . . . . . . . . . . . . . . . . . . . . 5-34
How to Configure Error Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-35
Practice: Configuring System Settings by Using Control Panel . . . . . . . . . . 5-36
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-37
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-39
Lesson 4: Configuring Languages, Locations,
and Accessibility Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-40
How to Configure and Troubleshoot Regional
and Language Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-40
How to Configure and Troubleshoot Accessibility Options . . . . . . . . . . . . . . 5-43
Practice: Configuring Multiple Languages by Using Control Panel. . . . . . . . . 5-48
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-49
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-50
Lesson 5: Managing Windows Components. . . . . . . . . . . . . . . . . . . . . . . . . . . 5-51
How to Add Windows Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-51
How to Remove Windows Components . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-53
How to Manage Internet Information Services . . . . . . . . . . . . . . . . . . . . . . 5-53
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-55
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-56
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-56
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-56
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-56
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-58
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-59
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-59
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-59
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-60
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-62
6
Installing, Managing, and Troubleshooting
Hardware Devices and Drivers
6-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Lesson 1: Installing a Hardware Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2
How to Install Hardware Automatically. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2
How to Install Hardware Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5
xvi
Contents
Practice: Running the Add Hardware Wizard . . . . . . . . . . . . . . . . . . . . . . . . 6-8
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9
Lesson 2: Configuring and Troubleshooting Hardware Devices . . . . . . . . . . . . . 6-11
How to Configure and Troubleshoot Devices Using Device Manager. . . . . . . 6-11
How to Install, Configure, Manage, and Troubleshoot Fax Support . . . . . . . . 6-14
How to Manage and Troubleshoot the Most Common I/O Devices. . . . . . . . 6-18
Practice: Disabling and Re-enabling a Hardware Device . . . . . . . . . . . . . . . 6-24
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-25
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-26
Lesson 3: Viewing and Configuring Hardware Profiles . . . . . . . . . . . . . . . . . . . 6-27
When to Use Hardware Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27
How to Create a Hardware Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-27
How to Manage Hardware Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-29
How to Configure Hardware Settings in a Profile . . . . . . . . . . . . . . . . . . . . 6-29
How to Select a Hardware Profile During Startup . . . . . . . . . . . . . . . . . . . . 6-30
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-30
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-31
Lesson 4: Configuring and Troubleshooting Device Drivers . . . . . . . . . . . . . . . . 6-32
What Is the Driver.cab File? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-32
Actions You Can Take to Update Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . 6-32
How to Configure and Monitor Driver Signing . . . . . . . . . . . . . . . . . . . . . . . 6-33
Practice: Configuring Driver Signature Settings
and Scanning for Unsigned Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-35
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-36
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-37
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-37
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-38
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-38
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-39
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-40
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-41
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-41
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-41
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-43
7
Setting Up and Managing User Accounts
7-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
Lesson 1: Introduction to User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Contents
xvii
Local User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Domain User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Built-In User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4
How to Enable or Disable the Guest Account . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8
Lesson 2: Planning New User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
Naming Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9
Password Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-12
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-12
Lesson 3: Modifying, Creating, and Deleting User Accounts . . . . . . . . . . . . . . . 7-13
User Accounts Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-13
Computer Management Snap-In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17
How to Create a Password Reset Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20
Practice: Modifying, Creating, and Deleting Local User Accounts . . . . . . . . . 7-21
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-27
Lesson 4: Configuring Properties for User Accounts . . . . . . . . . . . . . . . . . . . . 7-28
The General Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28
The Member Of Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-29
The Profile Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-29
Practice: Modifying User Account Properties . . . . . . . . . . . . . . . . . . . . . . . . . . 7-32
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-33
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-35
Lesson 5: Implementing Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-36
What Is a Group? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-36
Guidelines for Using Local Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-37
How to Create Local Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-38
How to Add Members to a Local Group . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-39
How to Delete Local Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-40
Built-In Local Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-40
Built-In System Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-42
Practice: Creating and Managing Local Groups . . . . . . . . . . . . . . . . . . . . . 7-42
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-44
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-45
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-46
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-46
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-46
xviii
Contents
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-47
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-49
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-49
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-49
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-50
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-51
8
Securing Resources with NTFS Permissions
8-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1
Lesson 1: Introduction to NTFS Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Standard NTFS Folder Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Standard NTFS File Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
How Windows XP Professional Uses Access Control Lists. . . . . . . . . . . . . . . 8-3
How Effective Permissions Are Calculated When Multiple
Sets of NTFS Permissions Are in Effect . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
How NTFS Permissions Inheritance Is Controlled . . . . . . . . . . . . . . . . . . . . . 8-5
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7
Lesson 2: Assigning NTFS Permissions and Special Permissions . . . . . . . . . . . . 8-8
How to Assign or Modify Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8
How to Grant or Deny Special Permissions . . . . . . . . . . . . . . . . . . . . . . . . 8-10
How to Take Ownership of Files and Folders . . . . . . . . . . . . . . . . . . . . . . . 8-13
How to Prevent Permissions Inheritance . . . . . . . . . . . . . . . . . . . . . . . . . . 8-14
Guidelines for Planning NTFS Permissions. . . . . . . . . . . . . . . . . . . . . . . . . 8-14
Practice: Planning and Assigning NTFS Permissions . . . . . . . . . . . . . . . . . . 8-15
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-21
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-22
Lesson 3: Supporting NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23
Effect on NTFS File and Folder Permissions
When Files and Folders Are Copied. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23
Effect on NTFS File and Folder Permissions
When Files and Folders Are Moved . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-24
How to Troubleshoot Common Permissions Problems . . . . . . . . . . . . . . . . 8-25
Practice: Managing NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-26
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-30
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-31
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-32
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-32
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-32
Contents
xix
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-33
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-33
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-34
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-35
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-37
9
Administering Shared Folders
9-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1
Lesson 1: Introduction to Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
Simple File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
Shared Folder Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3
Requirements for Sharing a Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3
Characteristics of Shared Folder Permissions . . . . . . . . . . . . . . . . . . . . . . . 9-4
How to Share a Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4
How to Assign Shared Folder Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5
How to Create Multiple Share Names for a Shared Folder. . . . . . . . . . . . . . . 9-6
How to Modify a Shared Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7
How to Connect to a Shared Folder. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7
What Are Administrative Shares? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-9
How to Manage Shared Folders by Using Computer Management . . . . . . . . 9-10
Guidelines for Shared Folder Permissions . . . . . . . . . . . . . . . . . . . . . . . . . 9-13
Practice: Managing Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-14
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-17
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-18
Lesson 2: Combining Shared Folder Permissions and NTFS Permissions . . . . . 9-20
How to Calculate Effective Permissions for Folders
That Have Shared Folder and NTFS Permissions . . . . . . . . . . . . . . . . . . . . 9-20
Rules When Combining Shared Folder Permissions and
NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-20
Practice: Combining Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-21
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-23
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-24
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-24
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-24
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-26
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-26
xx
Contents
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-28
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-29
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-29
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-29
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-30
10
Managing Data Storage
10-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
Lesson 1: Managing and Troubleshooting Disks and Volumes . . . . . . . . . . . . . 10-3
Overview of Basic and Dynamic Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3
Managing Hard Disks by Using the Disk Management Tool . . . . . . . . . . . . . 10-6
How to Manage Disks Remotely By Using Computer Management . . . . . . 10-21
How to Manage Disks from the Command Line by Using Diskpart . . . . . . . 10-21
How to Troubleshoot Disks and Volumes . . . . . . . . . . . . . . . . . . . . . . . . . 10-22
Removable Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-23
Practice: Managing Hard Disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-26
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-26
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-27
Lesson 2: Managing Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-28
What Is the Compressed Folders Feature? . . . . . . . . . . . . . . . . . . . . . . . 10-28
How to Compress Files, Folders, or Volumes
by Using NTFS Compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-29
Practice: Managing Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-34
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-37
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-38
Lesson 3: Managing Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-39
Overview of Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-39
How to Set Disk Quotas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-40
How to Determine the Status of Disk Quotas . . . . . . . . . . . . . . . . . . . . . 10-43
How to Monitor Disk Quotas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-43
Guidelines for Using Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-43
Practice: Managing Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-44
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-47
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-48
Lesson 4: Increasing Security by Using EFS . . . . . . . . . . . . . . . . . . . . . . . . . 10-49
Overview of EFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-49
How to Encrypt a Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-51
How to Decrypt a Folder. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-51
How to Control Encryption From the Command Line
Contents
xxi
by Using the Cipher Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-52
How to Create an EFS Recovery Agent . . . . . . . . . . . . . . . . . . . . . . . . . . 10-52
Practice: Increasing Security by Using EFS. . . . . . . . . . . . . . . . . . . . . . . . 10-53
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-54
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-55
Lesson 5: Maintaining Disks with Disk Defragmenter,
Check Disk, and Disk Cleanup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-57
How to Analyze and Defragment Disks with Disk Defragmenter . . . . . . . . . 10-57
How to Scan a Hard Disk for Errors with Check Disk . . . . . . . . . . . . . . . . 10-60
How to Free Up Disk Space with Disk Cleanup. . . . . . . . . . . . . . . . . . . . . 10-62
Practice: Maintaining Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-65
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-67
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-68
Lesson 6: Configuring Offline Folders and Files. . . . . . . . . . . . . . . . . . . . . . . 10-69
How to Enable the Offline Files Feature On Your Computer . . . . . . . . . . . . 10-69
How to Make Folders and Files Available Offline . . . . . . . . . . . . . . . . . . . 10-70
How to Configure Your Computer to Share Offline Folders and Files. . . . . . 10-71
How to Synchronize Offline Folders and Files . . . . . . . . . . . . . . . . . . . . . . 10-72
Practice: Configuring Offline Folders and Files . . . . . . . . . . . . . . . . . . . . . 10-74
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-76
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-76
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-77
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-77
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-77
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-78
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-79
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-80
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-80
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-80
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-83
11
Setting Up, Configuring, and Troubleshooting Printers
11-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1
Lesson 1: Introduction to Windows XP Professional Printing. . . . . . . . . . . . . . . 11-2
Important Printing Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-2
Requirements for Network Printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3
Guidelines for Developing a Network-wide Printing Strategy. . . . . . . . . . . . . 11-4
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-5
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6
xxii
Contents
Lesson 2: Setting Up Network Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-7
How to Add and Share a Local Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-7
How to Add and Share a Network Interface Printer . . . . . . . . . . . . . . . . . . 11-10
How to Add an LPR Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-12
How to Configure Client Computers So Users Can Print . . . . . . . . . . . . . . 11-13
Practice: Installing a Network Printer. . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-15
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-19
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-20
Lesson 3: Connecting to Network Printers . . . . . . . . . . . . . . . . . . . . . . . . . . 11-21
Add Printer Wizard Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-21
How to Connect Directly to a Shared Printer . . . . . . . . . . . . . . . . . . . . . . 11-22
How to Use a Web Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-23
How to Find a Printer Using the Search Assistant. . . . . . . . . . . . . . . . . . . 11-23
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-24
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-25
Lesson 4: Configuring Network Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-26
How to Share an Existing Printer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-26
How to Install Additional Printer Drivers. . . . . . . . . . . . . . . . . . . . . . . . . . 11-27
How to Stop the Sharing of a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-29
How to Create a Printer Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-29
How to Set Priorities Among Printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-30
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-31
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-32
Lesson 5: Troubleshooting Setup and Configuration Problems . . . . . . . . . . . . 11-33
How to Use Windows Troubleshooters. . . . . . . . . . . . . . . . . . . . . . . . . . . 11-33
Possible Solutions to Common Troubleshooting Scenarios . . . . . . . . . . . . 11-34
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-35
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-35
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-36
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-36
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-36
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-37
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-37
Question . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-37
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-37
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-38
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-38
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-39
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-40
Contents
12
Managing Printers and Documents
xxiii
12-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1
Lesson 1: Introduction to Printer Administration . . . . . . . . . . . . . . . . . . . . . . . 12-2
Printer Management Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Document Management Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2
Common Printer Problems that Require Troubleshooting. . . . . . . . . . . . . . . 12-3
How to Access Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-3
Windows XP Professional Print Permissions. . . . . . . . . . . . . . . . . . . . . . . . 12-4
Practice: Changing the Default Permissions on a Printer. . . . . . . . . . . . . . . 12-7
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-8
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9
Lesson 2: Managing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-10
How to Assign Forms to Paper Trays . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-10
How to Set Up a Separator Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-11
How to Pause a Printer and Cancel Documents . . . . . . . . . . . . . . . . . . . . 12-13
How to Redirect Documents to a Different Printer . . . . . . . . . . . . . . . . . . 12-13
Formats Supported by the WinPrint Print Processor . . . . . . . . . . . . . . . . . 12-14
How to Configure Spooling Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-15
How to Take Ownership of a Printer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-16
Practice: Managing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-17
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-18
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-19
Lesson 3: Managing Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-20
How to Pause, Restart, and Cancel a Document . . . . . . . . . . . . . . . . . . . 12-20
How to Set Notification, Priority, and Printing Time . . . . . . . . . . . . . . . . . . 12-21
Practice: Managing Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-22
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-24
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-25
Lesson 4: Administering Printers by Using a Web Browser . . . . . . . . . . . . . . . 12-26
The Advantages of Using a Web Browser to Manage Printers . . . . . . . . . . 12-26
How to Access Printers Using a Web Browser . . . . . . . . . . . . . . . . . . . . . 12-26
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-27
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-28
Lesson 5: Troubleshooting Common Printing Problems . . . . . . . . . . . . . . . . . 12-29
Guidelines for Examining a Printing Problem . . . . . . . . . . . . . . . . . . . . . . 12-29
Solutions to Common Printing Problems . . . . . . . . . . . . . . . . . . . . . . . . . 12-29
How to Solve Printing Problems Using the
Windows XP Professional Printing Troubleshooter. . . . . . . . . . . . . . . . . . . 12-31
xxiv
Contents
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-31
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-31
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-32
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-32
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-32
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-33
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-34
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-35
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-35
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-36
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-37
13
Supporting TCP/IP
13-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1
Lesson 1: Configuring and Troubleshooting TCP/IP . . . . . . . . . . . . . . . . . . . . . 13-2
What Is an IP Address? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2
How to Configure TCP/IP to Use a Static IP Address . . . . . . . . . . . . . . . . . 13-6
How to Configure TCP/IP to Obtain an IP Address Automatically . . . . . . . . . 13-8
What Is Automatic Private IP Addressing? . . . . . . . . . . . . . . . . . . . . . . . . . 13-9
How to Specify an Alternate Configuration for TCP/IP . . . . . . . . . . . . . . . . 13-11
How to Use TCP/IP Tools to Troubleshoot a Connection . . . . . . . . . . . . . . 13-12
Practice: Configuring and Troubleshooting TCP/IP . . . . . . . . . . . . . . . . . . 13-18
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-23
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-25
Lesson 2: Understanding the Domain Name System . . . . . . . . . . . . . . . . . . . 13-26
What Is the Domain Namespace?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-26
Domain-Naming Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-29
What Are Zones?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-29
What Are Name Servers?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-30
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-31
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-32
Lesson 3: Overview of Name Resolution. . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-33
How a Forward Lookup Query Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-33
What Is Name Server Caching? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-34
How a Reverse Lookup Query Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-35
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-36
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-37
Lesson 4: Configuring a DNS Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-38
How to Configure DNS Server Addresses . . . . . . . . . . . . . . . . . . . . . . . . 13-38
Contents
xxv
How to Configure DNS Query Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . 13-40
Practice: Configuring a DNS Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-42
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-43
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-44
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-44
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-44
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-44
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-45
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-46
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-47
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-47
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-47
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-49
14
Overview of Active Directory Service
14-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-1
Lesson 1: Overview of Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-2
The Advantages of Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-2
Logical Structure of Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-3
Physical Structure of Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-9
Replication Within an Active Directory Site . . . . . . . . . . . . . . . . . . . . . . . 14-11
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-12
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-12
Lesson 2: Important Active Directory Concepts . . . . . . . . . . . . . . . . . . . . . . . 14-14
What Is the Active Directory Schema?. . . . . . . . . . . . . . . . . . . . . . . . . . . 14-14
What Is the Global Catalog?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-15
What Is a Namespace? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-17
Naming Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-17
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-19
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-20
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-21
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-21
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-22
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-22
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-23
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-24
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-24
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-24
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-26
xxvi
15
Contents
Configuring Network and Internet Connections
15-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-2
Lesson 1: Configuring Local Area Network (LAN) Connections . . . . . . . . . . . . . 15-3
Viewing LAN Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-3
Configuring a LAN Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-4
The New Connection Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-11
Practice: Configuring a LAN Connection. . . . . . . . . . . . . . . . . . . . . . . . . . 15-15
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-17
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-18
Lesson 2: Configuring Dial-Up Connections. . . . . . . . . . . . . . . . . . . . . . . . . . 15-19
Configuring Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-19
Configuring a Dial-Up Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-21
Allowing Incoming Dial-Up Connections . . . . . . . . . . . . . . . . . . . . . . . . . . 15-25
Practice: Configuring an Inbound Connection . . . . . . . . . . . . . . . . . . . . . . 15-27
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-28
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-29
Lesson 3: Configuring Wireless Connections . . . . . . . . . . . . . . . . . . . . . . . . 15-30
Introduction to Wireless Networking Standards . . . . . . . . . . . . . . . . . . . . 15-30
Introduction to Wireless Networking Architecture . . . . . . . . . . . . . . . . . . . 15-31
Introduction to Wireless Networking Security . . . . . . . . . . . . . . . . . . . . . . 15-33
Configuring Wireless Networking in Windows XP Professional . . . . . . . . . . 15-36
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-40
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-41
Lesson 4: Configuring Internet Connection Sharing (ICS) . . . . . . . . . . . . . . . 15-42
Introducing Internet Connection Sharing (ICS) . . . . . . . . . . . . . . . . . . . . . 15-42
ICS Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-43
Troubleshooting ICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-44
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-44
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-45
Lesson 5: Configuring Windows Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-46
Introducing Windows Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-46
How to Enable or Disable Windows Firewall for all Network
Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-47
How to Enable or Disable Windows Firewall for a Specific
Network Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-48
Windows Firewall Advanced Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-49
Troubleshooting Windows Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-56
Practice: Configure Windows Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-57
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-58
Contents
xxvii
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-59
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-60
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-60
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-60
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-62
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-63
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-63
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-64
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-64
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-65
16
Configuring Security Settings and Internet Options
16-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-2
Lesson 1: Overview of Security Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-3
How to Configure Local Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-3
What Is Group Policy? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-9
How to View Policies That Are in Effect On a
Computer Running Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . 16-12
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-14
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-15
Lesson 2: Configuring Account Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-16
How to Configure Password Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-16
How to Configure Account Lockout Policy. . . . . . . . . . . . . . . . . . . . . . . . . 16-18
Practice: Configuring Account Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-19
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-23
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-23
Lesson 3: Configuring User Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-24
How to Configure User Rights. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-24
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-29
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-30
Lesson 4: Configuring Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-31
How to Configure Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-31
Practice: Configuring Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . 16-33
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-33
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-35
Lesson 5: Implementing an Audit Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-36
Overview of Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-36
What Should You Audit?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-37
How to Configure an Audit Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-38
xxviii
Contents
How to Enable Auditing for Files and Folders . . . . . . . . . . . . . . . . . . . . . . 16-40
How to Enable Auditing for Printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-42
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-44
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-44
Lesson 6: Configuring Internet Explorer Options . . . . . . . . . . . . . . . . . . . . . . 16-46
How to Configure Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-47
How to Configure Privacy Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-50
How to Configure Content Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-51
How to Configure Connections Options . . . . . . . . . . . . . . . . . . . . . . . . . . 16-52
How to Configure Programs Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-54
How to Configure Advanced Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-55
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-57
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-58
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-58
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-59
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-59
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-60
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-61
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-61
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-63
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-64
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-64
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-64
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-66
17
Monitoring and Managing Shared Folders by
Using Computer Management
17-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-1
Lesson 1: Monitoring Access to Shared Folders . . . . . . . . . . . . . . . . . . . . . . . 17-2
Reasons for Monitoring Network Resources . . . . . . . . . . . . . . . . . . . . . . . 17-2
Who Can Monitor Access to Network Resources? . . . . . . . . . . . . . . . . . . . 17-3
How to Use the Shares Folder to View and Monitor Shared Folders . . . . . . . 17-3
How to Use the Open Files Folder to Monitor Files . . . . . . . . . . . . . . . . . . . 17-6
How to Disconnect Users from Open Files. . . . . . . . . . . . . . . . . . . . . . . . . 17-6
Practice: Monitoring Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-7
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-8
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-9
Lesson 2: Creating and Sharing Local and Remote Folders . . . . . . . . . . . . . . 17-10
How to Create a New Folder and Share It by Using Shared Folders . . . . . . 17-10
Contents
xxix
How to Share a Folder on a Remote Computer
by Using Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-11
How to Stop Sharing a Folder by Using Shared Folders . . . . . . . . . . . . . . . 17-12
Practice: Creating a Shared Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-13
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-14
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-14
Lesson 3: Monitoring Network Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-15
How to Monitor User Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-15
How to Disconnect Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-16
How to Send Administrative Messages to Users . . . . . . . . . . . . . . . . . . . 17-17
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-18
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-18
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-19
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-19
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-19
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-20
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-21
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-21
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-21
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-22
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-23
18
Using Windows XP Tools
18-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-1
Lesson 1: Working with Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-2
How to Manage Services by Using the Services Console . . . . . . . . . . . . . . 18-2
How to Disable and Enable Services by
Using the System Configuration Utility. . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-8
Practice: Working with Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-9
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-10
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-11
Lesson 2: Using Event Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-12
Overview of Windows XP Professional Logs . . . . . . . . . . . . . . . . . . . . . . . 18-12
How to View Event Logs by Using Event Viewer . . . . . . . . . . . . . . . . . . . . 18-12
How to View an Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-14
How to Locate Events In a Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-15
Logging Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-16
How to Save and Open Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-17
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-17
xxx
Contents
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-18
Lesson 3: Using Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-19
Overview of Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-19
How to Schedule a Task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-20
How to Configure Advanced Options for a Scheduled Task . . . . . . . . . . . . 18-20
How to Troubleshoot Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . 18-21
Practice: Using Task Scheduler. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-22
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-23
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-24
Lesson 4: Using System Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-25
Overview of System Restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-25
How to Enable or Disable System Restore. . . . . . . . . . . . . . . . . . . . . . . . 18-27
How to Create a Restore Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-28
How to Restore a Restore Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-29
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-30
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-31
Lesson 5: Using Remote Desktop and Remote Assistance . . . . . . . . . . . . . . 18-32
How to Configure and Use Remote Desktop . . . . . . . . . . . . . . . . . . . . . . 18-32
How to Configure and Use Remote Assistance . . . . . . . . . . . . . . . . . . . . 18-37
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-40
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-41
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-41
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-41
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-42
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-43
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-43
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-44
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-45
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-46
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-46
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-47
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-48
19
Monitoring and Optimizing System Performance
19-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-1
Lesson 1: Using Task Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-2
How to Monitor Programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-2
How to Monitor Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-3
How to Monitor System Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-6
Contents
xxxi
How to Monitor Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-8
Practice: Using Task Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-10
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-11
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-12
Lesson 2: Using the Performance Console . . . . . . . . . . . . . . . . . . . . . . . . . . 19-13
How to Use System Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-13
How to Add Counters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-15
How to Use Performance Logs And Alerts . . . . . . . . . . . . . . . . . . . . . . . . 19-17
How to Establish a Baseline for Performance Data. . . . . . . . . . . . . . . . . . 19-20
How to Identify and Resolve Bottlenecks. . . . . . . . . . . . . . . . . . . . . . . . . 19-20
Practice: Using System Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-22
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-23
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-23
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-24
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-24
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-24
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-25
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-28
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-28
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-28
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-29
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-30
20
Backing Up and Restoring Data
20-1
Why This Chapter Matters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-1
Lesson 1: Using the Backup Utility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-2
What Is the Backup Utility? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-2
Who Can Back Up and Restore Data? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-4
How to Plan a Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-5
Types of Backup Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-7
How to Change Default Backup Options . . . . . . . . . . . . . . . . . . . . . . . . . 20-10
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-12
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-13
Lesson 2: Backing Up Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-14
Preliminary Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-14
How to Select Files and Folders to Back Up. . . . . . . . . . . . . . . . . . . . . . . 20-15
How to Specify Backup Destination, Media Settings,
and Advanced Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-16
How to Schedule Backup Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-18
xxxii
Contents
Practice: Backing Up Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-19
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-23
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-25
Lesson 3: Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-26
How to Prepare to Restore Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-26
How to Select Backup Sets, Files, and Folders to Restore . . . . . . . . . . . . 20-27
How to Specify Advanced Restore Settings . . . . . . . . . . . . . . . . . . . . . . . 20-27
Practice: Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-29
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-30
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-31
Lesson 4: Using the Automated System Recovery Wizard . . . . . . . . . . . . . . . 20-32
Overview of the Automated System Recovery Wizard . . . . . . . . . . . . . . . . 20-32
How to Use the Automated System Recovery Wizard . . . . . . . . . . . . . . . . 20-33
How to Recover Important Registry Keys by
Using Recovery Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-34
Lesson Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-35
Lesson Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-36
Case Scenario Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-36
Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-36
Questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-37
Troubleshooting Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-37
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-38
Exam Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-38
Key Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-38
Key Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-39
Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-40
Part 2
21
Prepare for the Exam
Installing Windows XP Professional (1.0)
21-3
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-4
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-7
Objective 1.1: Perform and Troubleshoot an Attended
Installation of Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-10
Objective 1.2: Perform and Troubleshoot an Unattended
Installation of Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-19
Objective 1.3: Upgrade from a Previous Version of Windows to
Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-28
Objective 1.4: Perform Post-Installation Updates
and Product Activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-35
Objective 1.5: Troubleshoot Failed Installations . . . . . . . . . . . . . . . . . . . . . . . 21-42
Contents
22
Implementing and Conducting Administration of Resources
xxxiii
22-1
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-1
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-3
Objective 2.1: Monitor, Manage, and Troubleshoot
Access to Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-5
Objective 2.2: Manage and Troubleshoot Access to Shared Folders . . . . . . . . 22-11
Objective 2.3: Connect to Local and Network Print Devices. . . . . . . . . . . . . . . 22-17
Objective 2.4: Configure and Manage File Systems . . . . . . . . . . . . . . . . . . . . 22-22
Objective 2.5: Manage and Troubleshoot Access to
and Synchronization of Offline Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-27
23
Implementing, Managing, Monitoring, and
Troubleshooting Hardware Devices and Drivers
23-1
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23-1
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23-3
Objective 3.1: Implement, Manage, and Troubleshoot Disk Devices . . . . . . . . . 23-6
Objective 3.2: Implement, Manage, and Troubleshoot Display Devices . . . . . . 23-12
Objective 3.3: Configure Advanced Configuration Power Interface . . . . . . . . . . 23-17
Objective 3.4: Implement, Manage, and Troubleshoot I/O Devices . . . . . . . . . 23-21
Objective 3.5: Manage and Troubleshoot Drivers and Driver Signing . . . . . . . . 23-29
Objective 3.6: Monitor and Configure Multiprocessor Computers . . . . . . . . . . 23-35
24
Monitoring and Optimizing System Performance and Reliability
24-1
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24-1
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24-2
Objective 4.1: Monitor, Optimize, and Troubleshoot Performance of the
Windows XP Professional Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24-4
Objective 4.2: Manage, Monitor, and Optimize
System Performance for Mobile Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24-13
Objective 4.3: Restore and Back Up the Operating System,
System State Data, and User Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24-19
25
Configuring and Troubleshooting the Desktop Environment
25-1
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-1
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-4
Objective 5.1: Configure and Manage User
Profiles and Desktop Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-6
Objective 5.2: Configure Support for Multiple
Languages or Multiple Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-14
Objective 5.3: Manage Applications by Using
Windows Installer Packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-19
xxxiv
26
Contents
Implementing, Managing, and Troubleshooting
Network Protocols and Services
26-1
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26-1
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26-4
Objective 6.1: Configure and Troubleshoot the TCP/IP Protocol . . . . . . . . . . . . . 26-7
Objective 6.2: Connect to Computers by Using Dial-Up Networking . . . . . . . . . 26-13
Objective 6.3: Connect to Resources Using Internet Explorer . . . . . . . . . . . . . 26-17
Objective 6.4: Configure, Manage, and Implement
Internet Information Services (IIS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26-22
Objective 6.5: Configure, Manage, and Troubleshoot Remote Desktop
and Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26-28
Objective 6.6: Configure, Manage, and Troubleshoot
an Internet Connection Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26-34
27
Configuring, Managing, and Troubleshooting Security
27-1
Tested Skills and Suggested Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27-1
Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27-3
Objective 7.1: Configure, Manage, and Troubleshoot
Encrypting File System (EFS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27-5
Objective 7.2: Configure, Manage, and Troubleshoot
a Security Configuration and Local Security Policy . . . . . . . . . . . . . . . . . . . . . 27-10
Objective 7.3: Configure, Manage, and Troubleshoot
Local User and Group Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27-16
Objective 7.4: Configure, Manage, and Troubleshoot
Internet Explorer Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27-22
Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .G-1
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I-1
What do you think of this book?
We want to hear from you!
Microsoft is interested in hearing your feedback about this publication so we can
continually improve our books and learning resources for you. To participate in a brief
online survey, please visit: www.microsoft.com/learning/booksurvey/
Acknowledgments
A book like this is a big project and it would not get done without the help of a lot of
people. I have worked on many books over the years with a lot of different people.
Without question, the team at Microsoft Learning is the best. Team members are exacting and conscientious, and they take pride in producing the best books they can.
I want to extend my thanks to everyone who worked on this book. Julie Pickering, our
project manager, did a great job of coordinating everyone’s effort—and that can be a
pretty tough assignment when you are working with writers. Our editors—Elise Morrison, Lori Kane, and Marzena Makuta—pored over every detail to make sure that the
book was of the highest quality and that everyone involved turned in their best effort.
And Tony Northrup, our technical editor of part 1, gave a detailed technical review and
helped to make sure that I actually knew what I was talking about. I also want to thank
Randall Galloway at Microsoft for his technical guidance and support along the way.
And as always, I want to thank Neil Salkind and everyone else at StudioB for helping
put this project together.
Walter Glenn
I’d like to thank my friends, especially Chris and Diane Geggis, Bob Hogan, Kurt and
Beatriz Dillard, Eric and Alyssa Faulkner, John and Tara Banks, Kristin Casciato, Samuel
Jackson, and Eric John Parucki. They each helped me enjoy my time away from the
keyboard. I have to thank my wife, Erica, more than anyone, for being so patient during many long days of writing.
Tony Northrup
xxxv
About This Book
Welcome to MCSE Self-Paced Training Kit (Exam 70-270): Installing, Configuring, and
Administering Microsoft Windows XP Professional, Second Edition. This book introduces you to the Microsoft Windows XP Professional operating system and prepares
you to install, configure, and support Windows XP Professional.
You will learn how to work with Windows XP Professional in a networked environment. This book focuses on the following:
■
Installing Windows XP Professional
■
Implementing and managing resources
■
Installing, managing, and troubleshooting hardware devices and drivers
■
Monitoring and optimizing system performance and reliability
■
Configuring and troubleshooting the desktop environment
■
Implementing, managing, and troubleshooting network protocols and services
Note
For more information about becoming a Microsoft Certified Professional, see the section titled “The Microsoft Certified Professional Program” later in this introduction.
Intended Audience
Anyone who wants to learn about Windows XP Professional will find this book useful.
This book was developed for information technology (IT) professionals who need to
design, plan, implement, and support Windows XP Professional or who plan to take
the related Microsoft Certified Professional Exam 70-270, Installing, Configuring, and
Administering Microsoft Windows XP Professional.
Note
Exam skills are subject to change without prior notice and at the sole discretion of
Microsoft.
xxxvii
xxxviii
About This Book
Prerequisites
This training kit requires that students meet the following prerequisites:
■
Have a working knowledge of the Windows XP operating system
■
Have a basic understanding of computer hardware
■
Have a basic understanding of networking technologies
About the CD-ROM
For your use, this book includes a Supplemental CD-ROM, which contains a variety of
informational aids to complement the book content:
■
The Microsoft Press Readiness Review Suite Powered by MeasureUp. This suite of
practice tests and objective reviews contains questions of varying degrees of complexity and offers multiple testing modes. You can assess your understanding of
the concepts presented in this book and use the results to develop a learning plan
that meets your needs.
■
An electronic version of this book (eBook). For information about using the
eBook, see the “The eBook” section later in this introduction.
■
Tools recommended in the book.
A second CD-ROM contains a 180-day Evaluation Edition of Microsoft Windows XP
Professional with Service Pack 2.
Caution
The 180-day Evaluation Edition provided with this training kit is not the full retail
product and is provided only for the purposes of training and evaluation. Microsoft Technical
Support does not support this evaluation edition.
For additional support information regarding this book and the CD-ROM (including
answers to commonly asked questions about installation and use), visit the Microsoft
Learning Technical Support Web site at http://www.microsoft.com/learning/support/.
You can also e-mail tkinput@microsoft.com or send a letter to Microsoft Learning, Attn:
Microsoft Learning Technical Support, One Microsoft Way, Redmond, WA 98052-6399.
Features of This Book
This book has two parts. Use Part I to learn at your own pace and practice what you
have learned with practical exercises. Part II contains questions and answers you can
use to test yourself on what you have learned.
About This Book
xxxix
Part I: Learn at Your Own Pace
Each chapter identifies the exam objectives that are covered within the chapter, provides an overview of why the topics matter by identifying how the information is
applied in the real world, and lists any prerequisites that must be met to complete the
lessons presented in the chapter.
The chapters are divided into lessons. Most lessons contain practices that include one
or more hands-on exercises. These exercises give you an opportunity to use the skills
being presented or to explore the part of the application being described.
After the lessons, you are given an opportunity to apply what you have learned in a
case scenario exercise. In this exercise, you work through a multistep solution for a
realistic case scenario. You are also given an opportunity to work through a troubleshooting lab that explores difficulties you might encounter when applying what you
have learned on the job.
Each chapter ends with a short summary of key concepts and a short section that lists
key topics and terms you need to know before taking the exam. This section summarizes the key topics you have learned, with a focus on demonstrating that knowledge
on the exam.
Real World Helpful Information
You will find sidebars like this one that contain related information you might
find helpful. “Real World” sidebars contain specific information gained through
the experience of IT professionals just like you.
Part II: Prepare for the Exam
Part II helps to familiarize you with the types of questions you will encounter on the
Microsoft Certified Professional (MCP) exam. By reviewing the objectives and sample
questions, you can focus on the specific skills you need to improve before taking
the exam.
See Also
For a complete list of MCP exams and their related objectives, go to http://
www.microsoft.com/learning/mcp/.
Part II is organized by the exam’s objectives. Each chapter covers one of the primary
groups of objectives, referred to as Objective Domains. Each chapter lists the tested
skills you need to master to answer the exam questions, and it includes a list of further
readings to help you improve your ability to perform the tasks or skills specified by the
objectives.
xl
About This Book
Within each Objective Domain, you will find the related objectives that are covered on
the exam. Each objective provides you with several practice exam questions. The
answers are accompanied by explanations of each correct and incorrect answer.
On the CD
These questions are also available on the companion CD as a practice test.
Informational Notes
Several types of reader aids appear throughout the training kit.
■
Tip contains methods of performing a task more quickly or in a not-so-obvious
way.
■
Important contains information that is essential to completing a task.
■
Note contains supplemental information.
■
Caution contains valuable information about possible loss of data; be sure to read
this information carefully.
■
Warning contains critical information about possible physical injury; be sure to
read this information carefully.
■
See Also contains references to other sources of information.
■
On the CD points you to supplementary information or files you need that are on
the companion CD.
■
Security Alert highlights information you need to know to maximize security in
your work environment.
■
Exam Tip flags information you should know before taking the certification
exam.
■
Off the Record contains practical advice about the real-world implications of
information presented in the lesson.
Notational Conventions
The following conventions are used throughout this book:
■
Characters or commands that you type appear in bold type.
■
Italic in syntax statements indicates placeholders for variable information. Italic is
also used for book and exam titles.
■
Names of files and folders appear in Title caps, except when you are to type them
directly. Unless otherwise indicated, you can use all lowercase letters when you
type a file name in a dialog box or at a command prompt.
About This Book
xli
■
File name extensions appear in all uppercase.
■
Acronyms appear in all uppercase.
■
type represents code samples, examples of screen text, or entries that
you might type at a command prompt or in initialization files.
■
Square brackets [ ] are used in syntax statements to enclose optional items. For
example, [filename] in command syntax indicates that you can choose to type a
file name with the command. Type only the information within the brackets, not
the brackets themselves.
■
Braces { } are used in syntax statements to enclose required items. Type only the
information within the braces, not the braces themselves.
Monospace
Keyboard Conventions
■
A plus sign (+) between two key names means that you must press those keys at
the same time. For example, “Press ALT+TAB” means that you hold down ALT while
you press TAB.
■
A comma (,) between two or more key names means that you must press each of
the keys consecutively, not together. For example, “Press ALT, F, X” means that
you press and release each key in sequence. “Press ALT+W, L” means that you first
press ALT and W at the same time, and then release them and press L.
Getting Started
This training kit contains hands-on exercises to help you learn about supporting
applications in Windows XP. Use this section to prepare your self-paced training
environment.
Hardware Requirements
To follow the practices in this book, it is recommended that you use a computer that
is not your primary workstation because you will be called on to make changes to
the operating system and application configuration. The computer you use must
have the following minimum configuration. All hardware should be listed in the Windows Catalog.
■
Personal computer with an Intel Pentium 233 MHz or faster processor (300 MHz or
faster processor recommended)
■
64 MB of RAM or higher (128 MB or higher recommended)
■
1.5 GB of available hard disk space
■
CD-ROM drive or DVD drive
xlii
About This Book
■
Super VGA (800 x 600) or higher resolution monitor
■
Microsoft Mouse or compatible pointing device
■
Internet connection
Software Requirements
The following software is required to complete the procedures in this training kit. (A
180-day Evaluation Edition of Microsoft Windows XP Professional with Service Pack 2
is included on the CD-ROM.)
■
Windows XP Professional with Service Pack 2
Caution
The 180-day Evaluation Edition provided with this training is not the full retail product and is provided only for the purposes of training and evaluation. Microsoft Technical Support does not support this evaluation edition. For additional support information regarding
this book and the CD-ROMs (including answers to commonly asked questions about installation and use), visit the Microsoft Learning Technical Support Web site at http://
mspress.microsoft.com/learning/support/. You can also e-mail tkinput@microsoft.com or
send a letter to Microsoft Learning, Attn: Microsoft Learning Technical Support, One Microsoft
Way, Redmond, WA 98502-6399.
Setup Instructions
Set up your computer according to the manufacturer’s instructions.
Caution If your computer is part of a larger network, you must verify with your network
administrator that the computer name, domain name, and other information used in configuring Windows XP in several chapters of this book do not conflict with network operations. If
they do conflict, ask your network administrator to provide alternative values and use those
values throughout all the exercises in this book. It is better if you can configure your computer
as a stand-alone computer with Internet access.
The Readiness Review Suite
The CD-ROM includes a practice test made up of 300 sample exam questions and an
objective-by-objective review with an additional 125 questions. Use these tools to reinforce your learning and to identify any areas in which you need to gain more experience before taking the exam.
About This Book
xliii
To install the practice test and objective review
1. Insert the Supplemental CD-ROM into your CD-ROM drive.
Note
If AutoRun is disabled on your machine, refer to the Readme.txt file on the CD-ROM.
2. Click Readiness Review Suite on the user interface menu.
The eBook
The CD-ROM includes an electronic version of the Training Kit. The eBook is in Portable Document Format (PDF) and can be viewed by using Adobe Acrobat Reader.
To use the eBook
1. Insert the Supplemental CD-ROM into your CD-ROM drive.
Note
If AutoRun is disabled on your machine, refer to the Readme.txt file on the CD-ROM.
2. Click Training Kit eBook on the user interface menu. You can also review any of
the other eBooks that are provided for your use.
The Microsoft Certified Professional Program
The Microsoft Certified Professional (MCP) program provides the best method to prove
your command of current Microsoft products and technologies. The exams and corresponding certifications are developed to validate your mastery of critical competencies
as you design and develop, or implement and support, solutions with Microsoft products and technologies. Computer professionals who become Microsoft-certified are recognized as experts and are sought after industry-wide. Certification brings a variety of
benefits to the individual and to employers and organizations.
See Also
default.asp.
For a full list of MCP benefits, go to http://www.microsoft.com/learning/itpro/
xliv
About This Book
Certifications
The Microsoft Certified Professional program offers multiple certifications, based on
specific areas of technical expertise:
■
Microsoft Certified Professional (MCP). Demonstrated in-depth knowledge of at
least one Microsoft Windows operating system or architecturally significant platform. An MCP is qualified to implement a Microsoft product or technology as part
of a business solution for an organization.
■
Microsoft Certified Desktop Support Technician (MCDST). Individuals who support
end users and troubleshoot desktop environments running on the Windows operating system.
■
Microsoft Certified Solution Developer (MCSD). Professional developers qualified
to analyze, design, and develop enterprise business solutions with Microsoft
development tools and technologies including the Microsoft .NET Framework.
■
Microsoft Certified Application Developer (MCAD). Professional developers qualified to develop, test, deploy, and maintain powerful applications using Microsoft
tools and technologies including Microsoft Visual Studio .NET and XML Web services.
■
Microsoft Certified Systems Engineer (MCSE). Qualified to effectively analyze the
business requirements and design and implement the infrastructure for business
solutions based on the Microsoft Windows Server 2003 operating system.
■
Microsoft Certified Systems Administrator (MCSA). Individuals with the skills to
manage and troubleshoot existing network and system environments based on the
Microsoft Windows Server 2003 operating systems.
■
Microsoft Certified Database Administrator (MCDBA). Individuals who design,
implement, and administer Microsoft SQL Server databases.
■
Microsoft Certified Trainer (MCT). Instructionally and technically qualified to
deliver Microsoft Official Curriculum through a Microsoft Certified Technical Education Center (CTEC).
Requirements for Becoming a Microsoft Certified Professional
The certification requirements differ for each certification and are specific to the products and job functions addressed by the certification.
To become a Microsoft Certified Professional, you must pass rigorous certification
exams that provide a valid and reliable measure of technical proficiency and expertise.
These exams are designed to test your expertise and ability to perform a role or task
with a product and are developed with the input of professionals in the industry.
About This Book
xlv
Questions in the exams reflect how Microsoft products are used in actual organizations,
giving them “real-world” relevance.
■
Microsoft Certified Professional (MCP) candidates are required to pass one current
Microsoft certification exam. Candidates can pass additional Microsoft certification
exams to further qualify their skills with other Microsoft products, development
tools, or desktop applications.
■
Microsoft Certified Solution Developers (MCSDs) are required to pass three core
exams and one elective exam. (MCSD for Microsoft .NET candidates are required
to pass four core exams and one elective.)
■
Microsoft Certified Application Developers (MCADs) are required to pass two core
exams and one elective exam in an area of specialization.
■
Microsoft Certified Systems Engineers (MCSEs) are required to pass five core
exams and two elective exams.
■
Microsoft Certified Systems Administrators (MCSAs) are required to pass three core
exams and one elective exam that provide a valid and reliable measure of technical proficiency and expertise.
■
Microsoft Certified Database Administrators (MCDBAs) are required to pass three
core exams and one elective exam that provide a valid and reliable measure of
technical proficiency and expertise.
■
Microsoft Certified Trainers (MCTs) are required to meet instructional and technical requirements specific to each Microsoft Official Curriculum course they are
certified to deliver. The MCT program requires ongoing training to meet the
requirements for the annual renewal of certification. For more information about
becoming a Microsoft Certified Trainer, visit http://www.microsoft.com/learning/
mcp/mct/ or contact a regional service center near you.
Technical Support
Every effort has been made to ensure the accuracy of this book and the contents of the
companion disc. If you have comments, questions, or ideas regarding this book or the
companion disc, please send them to Microsoft Learning using either of the following
methods:
E-mail:
tkinput@microsoft.com
Postal Mail:
Microsoft Learning
Attn: MCSE Self-Paced Training Kit (Exam 70-270): Installing,
Configuring, and Administering Microsoft Windows XP Professional,
Second Edition, Editor
One Microsoft Way
Redmond, WA 98052-6399
xlvi
About This Book
For additional support information regarding this book and the CD-ROM (including
answers to commonly asked questions about installation and use), visit the Microsoft
Learning Technical Support Web site at http://www.microsoft.com/learning/support/. To
connect directly to the Microsoft Press Knowledge Base and enter a query, visit http://
www.microsoft.com/mspress/support/search.asp. For support information regarding
Microsoft software, please connect to http://support.microsoft.com/.
Evaluation Edition Software Support
The 180-day Evaluation Edition provided with this training is not the full retail product
and is provided only for the purposes of training and evaluation. Microsoft and
Microsoft Technical Support do not support this evaluation edition.
Caution
The Evaluation Edition of Windows XP Professional with Service Pack 2 included
with this book should not be used on a primary work computer. The Evaluation Edition is
unsupported. For online support information relating to the full version of Windows XP Professional that might also apply to the Evaluation Edition, you can connect to http://support
.microsoft.com/.
Information about any issues relating to the use of this Evaluation Edition with this
training kit is posted to the Support section of the Microsoft Learning Web site (http://
www.microsoft.com/learning/support/). For information about ordering the full version
of any Microsoft software, please call Microsoft Sales at (800) 426-9400 or visit http://
www.microsoft.com.
Part I
Learn at Your Own Pace
1 Introduction to Windows XP
Professional
Exam Objectives in this Chapter:
■
This first chapter serves as an introduction to Windows XP Professional and does
not specifically cover any exam objective.
Why This Chapter Matters
This book prepares you to install, configure, and support Microsoft Windows XP
Professional. This chapter introduces you to the various editions of Microsoft
Windows that make up the Windows XP family. It also provides a look at some
of the areas in which Microsoft has enhanced Windows XP with Windows XP Service Pack 2. This chapter introduces the concepts of workgroups and domains
and also explains how to log on and off Windows XP Professional. By the time
you are finished reading this chapter, you should have a firm understanding of
where and why Windows XP Professional is used.
Lessons in this Chapter:
■
Lesson 1: Explaining Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4
■
Lesson 2: Identifying Major Features of Windows XP Service Pack 2 . . . . . . . .1-8
■
Lesson 3: Joining Workgroups and Domains. . . . . . . . . . . . . . . . . . . . . . . . .1-16
■
Lesson 4: Identifying Key Characteristics of Workgroups and Domains . . . . .1-21
Before You Begin
There are no special requirements to complete this chapter.
1-3
1-4
Chapter 1
Introduction to Windows XP Professional
Lesson 1: Explaining Windows XP
This lesson introduces the various editions of Windows XP, including Windows XP Professional, Windows XP Home Edition, Windows XP Tablet PC Edition, Windows XP
Home Media Edition, and Windows XP 64-Bit Edition.
After this lesson, you will be able to
■ Identify the available editions of Windows XP.
■ Explain the differences between Windows XP editions.
Estimated lesson time: 10 minutes
Available Windows XP Editions
There are a number of different editions of Windows XP, each of which is designed for
different users and computing devices. The following editions are part of the Windows
family:
■
Windows XP Professional Edition
■
Windows XP Home Edition
■
Windows XP Media Center Edition
■
Windows XP Tablet PC Edition
■
Windows XP 64-Bit Edition
Windows XP Professional Edition
Windows XP Professional Edition is intended for computers that are part of a corporate
network, for the majority of computers on small networks, and for home users who
need certain advanced capabilities. Windows XP Professional sets the standard for
desktop performance, security, and reliability.
Windows XP Professional is also the focus of both this book and Exam 70-270: Installing, Configuring, and Administering Microsoft Windows XP Professional.
Windows XP Home Edition
Windows XP Home Edition, which is intended for home users, simplifies many aspects
of networking and file management so that home users have a cleaner experience. In
particular, Windows XP Home Edition has the following limitations compared with
Windows XP Professional:
■
Computers running Windows XP Home Edition cannot join a domain.
Lesson 1
Explaining Windows XP
1-5
■
Windows XP Home Edition does not support the use of NTFS or print permissions.
Instead, Windows XP Home Edition supports only Simple File Sharing. You will
learn more about NTFS permissions in Chapter 8, “Securing Resources with NTFS
Permissions.” You will learn more about print permissions in Chapter 12, “Managing Printers and Documents.”
■
Windows XP Home Edition does not support the use of dynamic disks, which you
will learn about in Chapter 10, “Managing Data Storage.”
■
Windows XP Home Edition does not support the Encrypting File System (EFS),
which you will learn about in Chapter 10.
■
Windows XP Home Edition supports only one processor, whereas Windows XP
Professional supports two processors.
■
Windows XP Home Edition does not include Internet Information Services.
■
Windows XP Home Edition does not include Remote Desktop.
■
Windows XP Home Edition does not provide Remote Installation Services (RIS)
support (which you will learn about in Chapter 3, “Deploying Windows XP Professional”).
See Also You can learn more about Windows XP Home Edition and find a detailed feature
comparison with Windows XP Professional at http://www.microsoft.com/windowsxp/home/.
Windows XP Media Center Edition
The Windows XP Media Center Edition 2004 operating system is available only on new
Media Center PCs—computers with special hardware features that enable users to connect the computer as an integral part of a home entertainment system. Because of its
special requirements, Media Center PCs running Windows XP Media Center Edition are
available only from Microsoft PC manufacturer partners.
See Also For more information about Windows XP Media Center Edition, visit http://
www.microsoft.com/windowsxp/mediacenter/.
Windows XP Tablet PC Edition
The Windows XP Tablet PC Edition operating system expands on Windows XP Professional, providing all the features and performance of Windows XP Professional, while
also providing additional capabilities designed to take advantage of a touch-screen
interface: pen input, handwriting recognition, and speech recognition.
1-6
Chapter 1
Introduction to Windows XP Professional
Windows XP Tablet PC Edition offers users the efficiency and dependability of Windows XP Professional. For developers, it offers a rich platform for creating new applications or extending their current applications to take advantage of Tablet PC
handwriting and speech capabilities.
See Also For more information about Windows XP Tablet PC Edition, visit http://
www.microsoft.com/windowsxp/tabletpc/.
Windows XP 64-Bit Edition
Microsoft Windows XP 64-Bit Edition, which provides support for the 64-bit computing
platforms, is designed to meet the demands of advanced technical workstation users
who require large amounts of memory and floating point performance in areas such as
mechanical design and analysis, 3D animation, video editing and composition, and scientific and high-performance computing applications. One of the key differences
between the 64-bit and 32-bit platforms is that the 64-bit platform supports considerably more system memory—up to 16 GB of physical RAM.
See Also For more information about Windows XP 64-Bit Edition, visit http://
www.microsoft.com/windowsxp/64bit/.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you are unable to answer a question, review the lesson
materials and try the question again. You can find answers to the questions in the
“Questions and Answers” section at the end of this chapter.
1. Windows XP _________ Edition and Windows XP __________ Edition are available only on supported hardware devices and are not available as stand-alone
products. Fill in the blanks.
2. Which features supported in Windows XP Professional are not supported in Windows XP Home Edition?
Lesson 1
Explaining Windows XP
1-7
Lesson Summary
■
The Windows XP family includes Windows XP Professional Edition, Windows XP
Home Edition, Windows XP Media Center Edition, Windows XP Tablet PC Edition,
and Windows XP 64-Bit Edition.
■
Features provided in Windows XP Professional that are not provided in Windows
XP Home Edition include dynamic disks, Remote Desktop, NTFS and print permissions, Encrypting File System, domain membership, dual processors, and IIS.
1-8
Chapter 1
Introduction to Windows XP Professional
Lesson 2: Identifying Major Features of Windows XP
Service Pack 2
As part of a major effort to increase the security of desktop computers, in 2004,
Microsoft is releasing an update to Windows XP named Windows XP Service Pack 2.
As with all Windows service packs, Windows XP Service Pack 2 includes all of the critical updates released for Windows XP to date. In addition, Service Pack 2 includes a
large number of new enhancements to Windows XP—enhancements aimed at increasing the default level of security for the operating system.
In addition to a new Security Center that provides at-a-glance security status for a
computer, Service Pack 2 provides enhancements to the built-in software firewall in
Windows XP (now named Microsoft Windows Firewall), to the Automatic Updates feature, and to Microsoft Internet Explorer.
After this lesson, you will be able to
■ Determine whether Service Pack 2 is installed on a computer running Windows XP
Professional.
■ Identify the major enhancements included in Windows XP Service Pack 2.
Estimated lesson time: 20 minutes
How to Determine Whether Service Pack 2 Is Installed
Aside from simply looking for new enhancements to the interface (such as the Security
Center), you can determine whether Service Pack 2 (or any Service Pack, for that matter) is installed in one of two ways:
■
From the Start menu, right-click My Computer and click Properties. The General
tab of the System Properties dialog box (in the System section) allows you to
know which version of Windows and which Service Pack is installed.
■
From the Start menu, click Run. In the Run dialog box, type winver.exe and click
OK. The About Windows dialog box shows you the exact version of Windows
(including Service Pack), down to the build number.
Note
This section presents an overview of the most important and obvious features of Windows XP Service Pack 2. The procedures and discussions in this book assume that you have
Windows XP Service Pack 2 installed. You can learn more about Windows XP Service Pack 2
at http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/winxpsp2.mspx.
You can download and install Service Pack 2 from the Windows Update site at
http://www.windowsupdate.com.
Lesson 2
Identifying Major Features of Windows XP Service Pack 2
1-9
Major Enhancements Included in Windows XP Service Pack 2
The major enhancements in Windows XP Service Pack 2 include Security Center, Automatic Updates, Windows Firewall, and Internet Explorer. This section describes these
enhancements in detail.
Security Center
Security Center is an entirely new feature provided by Windows XP Service Pack 2. The
Security Center service runs as a background process in Windows XP and routinely
checks the status of the following components:
Windows Firewall Security Center detects whether Windows Firewall is enabled
or disabled. Security Center can also detect the presence of some third-party software firewall products.
Automatic Updates Security Center detects the current Automatic Updates setting
in Windows XP. If Automatic Updates is turned off or not set to the recommended
settings, the Security Center provides appropriate recommendations.
Virus Protection Security Center detects the presence of antivirus software from
many third-party organizations. If the information is available, the Security Center
service also determines whether the software is up-to-date and whether real-time
scanning is turned on.
When Security Center is running, its presence is indicated by an icon in the notification
area on the Windows taskbar, as shown in Figure 1-1. When Security Center detects an
important security condition (such as improper settings), it displays a pop-up notice in
the notification area.
F01US01
Figure 1-1 The Security Center icon in the notification area provides access to the Security Center
window and alerts the user to security conditions.
You can also double-click the Security Center icon in the notification area to open the
main Security Center window, shown in Figure 1-2. The Security Center window provides the following information:
■
Resources where you can learn more about security-related issues.
■
An indication of whether Windows Firewall is enabled or disabled, as well as a
shortcut for opening the Windows Firewall dialog box.
1-10
Chapter 1
Introduction to Windows XP Professional
■
The current configuration for Automatic Updates, as well as a link for changing
Automatic Updates settings.
■
The current status of antivirus software installed on the computer. For some antivirus products, Security Center can also determine whether the antivirus software
is up-to-date.
■
Additional shortcuts for opening the Internet Options and System dialog boxes.
F01US02.bmp
Figure 1-2 The Security Center window provides a central interface for managing security on a computer running Windows XP.
Note
If you are running firewall or antivirus software that is not detected by Security Center,
Security Center presents options for bypassing alerts for that component. If you see a Recommendations button, you can use it to open a window that allows you to disable alerts or
research any appropriate third-party products.
Automatic Updates
Software updates help keep computers protected from new vulnerabilities that are discovered (and new threats that are created) after the initial shipping of an operating system. Updates are crucial to keeping computers secure and functioning properly.
Updates provided by Microsoft provide solutions to known issues, including patches
for security vulnerabilities, and updates to the operating system and some applications.
Windows XP features an automatic updating service named Automatic Updates that
can download and apply updates automatically in the background. Automatic Updates
Lesson 2
Identifying Major Features of Windows XP Service Pack 2
1-11
connects periodically to Windows Update on the Internet (or possibly to a Windows
Update Services server on a corporate network). When Automatic Updates discovers
new updates that apply to the computer, it can be configured to install all updates
automatically (the preferred method) or to notify the computer’s administrator (or
other users configured to receive notifications) that an update is available.
Windows XP Service Pack 2 provides several enhancements to the Automatic Updates
feature, including the following:
■
The latest version of Automatic Updates offers expanded support for Microsoft
products, including Microsoft Office.
■
Previous versions of Automatic Updates could download only critical updates.
Now Automatic Updates can download updates in the following categories: security updates, critical updates, update roll-ups, and service packs.
■
Automatic Updates now prioritizes the download of available updates based on
the importance and size of the updates. For example, if a large service pack is
being downloaded, and a smaller security update is released to address an exploit,
that security update will be downloaded more quickly than the service pack.
■
Automatic Updates is now more automated. The need for users to accept EndUser License Agreements (EULAs) has been eliminated. Also, the user now has a
choice of whether to restart the computer following the installation of updates that
might require a restart. Updates that do require a restart can now be consolidated
into a single installation so that only one restart is required.
Real World A New Windows Update Site
A forthcoming update to the online Windows Update Web site will provide many
of the same features that Automatic Updates provides to users of Windows XP
Service Pack 2 who choose not to use Automatic Updates. These features include
the ability to download updates for Microsoft applications in addition to operating
system updates, to perform express installations that require minimal user input,
and to research updates more easily.
The Windows Update site offers a more hands-on approach to updating Windows than
Automatic Updates. If a user resists using the Automatic Updates feature, teach the user
to frequently visit the Windows Update site and perform an Express Install that scans
for, downloads, and then installs critical and security updates.
Windows Firewall
A firewall protects a computer from attacks originating outside the computer (specifically, the Internet) by blocking all incoming network traffic except that which you spe-
1-12
Chapter 1
Introduction to Windows XP Professional
cifically configure the firewall to allow through. Any computer connected directly to
any network—whether it is a stand-alone computer, a computer that provides Internet
Connection Sharing (ICS) services for other computers on a network, or even a computer that is already on a network protected by perimeter firewalls—should have a firewall enabled.
Previous versions of Windows XP include a software-based firewall named Internet
Connection Firewall (ICF). After installing Windows XP Service Pack 2, this firewall is
replaced by Windows Firewall. Windows Firewall is a stateful, host-based firewall that
drops all incoming traffic that does not meet one of the following conditions:
■
Solicited traffic (valid traffic that is sent in response to a request by the computer)
is allowed through the firewall.
■
Excepted traffic (valid traffic that you have specifically configured the firewall to
accept) is allowed through the firewall.
In addition to its new name, Windows Firewall also boasts a number of enhancements,
including the following:
Enabled by default Windows Firewall is now enabled by default on all network
connections. This includes LAN (wired and wireless), dial-up, and virtual private
network (VPN) connections that exist when Windows XP Service Pack 2 is
installed. When a new connection is created, Windows Firewall is also enabled by
default.
Global settings In Windows XP (prior to installing Windows XP Service Pack 2), ICF
settings must be configured individually for each connection. After installing Windows XP Service Pack 2, Windows Firewall provides an interface for configuring
global settings that apply to all the connections of the computer. When you
change a global Windows Firewall setting, the change is applied to all the connections on which Windows Firewall is enabled. Of course, you can still apply configurations to individual connections as well.
New interface In previous versions, ICF is enabled by selecting a single check box
on the Advanced tab of the Properties dialog box for a connection. A Settings button opens a separate dialog box, in which you can configure services, logging,
and Internet Control Message Protocol (ICMP) allowances. In Windows XP Service
Pack 2, the check box on the Advanced tab has been replaced with a Settings button that launches the new Windows Firewall Control Panel applet, which consolidates global and connection-specific settings, service, and ICMP allowances and
log settings in a single updated interface.
Prevent excepted traffic In previous versions, ICF is either enabled or disabled.
When enabled, solicited traffic and excepted traffic are allowed. When disabled,
all traffic is allowed. In Windows XP Service Pack 2, Windows Firewall supports a
Lesson 2
Identifying Major Features of Windows XP Service Pack 2
1-13
new feature that allows you to keep Windows Firewall enabled and also not allow
any exceptions; only solicited traffic is allowed. This new feature is intended to
create an even more secure environment when connecting to the Internet in a
public location or other unsecured location.
Startup security In previous versions, ICF becomes active on connections only
when the ICF/ICS service is started successfully. This means that when a computer
is started, there is a delay between when the computer is active on the network
and when the connections are protected with ICF. In Windows XP Service Pack 2,
a startup Windows Firewall policy performs stateful packet filtering during startup,
so that the computer can perform basic network tasks (such as contacting
Dynamic Host Configuration Protocol [DHCP] and Domain Name System [DNS]
servers) and still be protected.
!
Exam Tip
Remember that the new Windows Firewall policy performs packet filtering during
Windows startup, meaning that connections are protected from the moment they become
active on the network.
Traffic source restrictions In previous versions, you could not apply firewall rules
based on Internet Protocol (IP) addresses. In Windows XP Service Pack 2, you can
configure Windows Firewall so that firewall rules apply to IP addresses (or IP
address ranges), meaning that only traffic from computers with valid IP addresses
is allowed through the firewall.
Create exceptions using application file names In previous versions, you configure permitted traffic by specifying the Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP) ports used by a service or application. In Windows
XP Service Pack 2, you can also configure permitted traffic by specifying the file
name of the application. When the application runs, Windows Firewall monitors
the ports on which the application listens and automatically adds them to the list
of allowed incoming traffic.
Internet Explorer
Windows XP Service Pack 2 introduces a number of new security features to Internet
Explorer 6. As with the rest of the enhancements introduced with Windows XP Service
Pack 2, most of the updates to Internet Explorer are intended to provide better security.
Internet Explorer enhancements provided by Windows XP Service Pack 2 include the
following:
Information bar The Internet Explorer Information bar in Windows XP Service
Pack 2 replaces many of the common dialog boxes that prompt users for information and provides a common area for displaying information. Notifications such as
blocked ActiveX installs, blocked pop-up windows, and downloads all appear in
1-14
Chapter 1
Introduction to Windows XP Professional
the Information bar, which appears below the toolbars and above the main browsing window. Either clicking or right-clicking on the Information bar brings up a
menu that relates to the notification that is presented. A new custom security zone
setting allows users to change the settings of the Information bar for each security
zone, including the ability to disable the Information bar and return to using separate dialog boxes.
Pop-up blocker When Windows XP Service Pack 2 is installed, Internet Explorer
provides a pop-up blocker for blocking pop-up windows. Internet Explorer displays a notification in the Information bar when a pop-up is blocked. Clicking the
information bar allows you to show the blocked pop-up, allow all pop-ups on the
current site, and configure other settings.
File download prompt With Windows XP Service Pack 2 installed, Internet
Explorer presents a new dialog box when a user downloads a file, as shown in
Figure 1-3. The new dialog box displays publisher information for the file (if available) and a section with information on the risks of downloading the file.
F01US03.eps
Figure 1-3 The Internet Explorer File Download dialog box provides more file information.
Add-on management With Windows XP Service Pack 2 installed, Internet Explorer
prompts users when add-on software tries to install itself into Internet Explorer.
Users can also view and control the list of add-ons that can be loaded by Internet
Explorer. Internet Explorer also attempts to detect crashes in Internet Explorer that
are related to add-ons. If an add-on is identified, this information is presented to
the user; the user can then disable the add-ons to prevent future crashes.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you are unable to answer a question, review the lesson
materials and try the question again. You can find answers to the questions in the
“Questions and Answers” section at the end of this chapter.
Lesson 2
Identifying Major Features of Windows XP Service Pack 2
1-15
1. After Windows XP Service Pack 2 is installed, Internet Explorer combines many of
the common dialog boxes that prompt users for information into a common area
named the _______________. Fill in the blank.
2. Which of the following is true of Windows Firewall? Choose all that apply.
a. Windows Firewall is enabled by default.
b. Windows Firewall is disabled by default.
c. Windows Firewall must be configured individually for each connection.
d. Windows Firewall protects a network connection as soon as the connection is
active on the network.
Lesson Summary
■
You can determine whether Service Pack 2 is installed by viewing the General tab
of the System Properties dialog box or by typing winver.exe in the Run dialog
box to open the About Windows dialog box.
■
Windows XP Service Pack 2 includes four major enhancements:
❑
Security Center, an entirely new feature, provides real-time status and alerts
for Windows Firewall, Automatic Updates, and some antivirus software.
❑
Enhancements to Automatic Updates allow it to download updates for more
Microsoft products, download all types of updates, and prioritize update
importance.
❑
Enhancements to Windows Firewall enable the firewall for each connection
by default, allow the inspection of traffic from the moment the connection
becomes active, and let you make global configuration settings for all connections.
❑
Enhancements to Internet Explorer include a new Information bar that consolidates many user prompts, a pop-up blocker, and better add-on management.
1-16
Chapter 1
Introduction to Windows XP Professional
Lesson 3: Identifying Key Characteristics of Workgroups
and Domains
Windows XP Professional supports two types of network environments in which users
can share common resources, regardless of network size. A workgroup consists of a
number of peer-based computers, with each maintaining its own security. A domain
consists of servers that maintain centralized security and directory structures and workstations that participate in those structures.
After this lesson, you will be able to
■ Identify the key characteristics of workgroups and explain how they work.
■ Identify the key characteristics of domains and explain how they work.
Estimated lesson time: 15 minutes
How Workgroups Work
A Windows XP Professional workgroup is a logical grouping of networked computers
that share resources, such as files and printers. A workgroup is also called a peer-topeer network because all computers in the workgroup can share resources as equals
(peers) without requiring a dedicated server.
Each computer in the workgroup maintains a local security database, which is a list of user
accounts and resource security information for the computer on which it resides. Using a
local security database on each workstation decentralizes the administration of user
accounts and resource security in a workgroup. Figure 1-4 shows a local security database.
Windows Server
2003
Windows XP
Professional
Local security
database
Local security
database
Windows XP
Professional
Windows Server
2003
Local security
database
Local security
database
F01US04.eps
Figure 1-4 A Windows XP Professional workgroup is also called a peer-to-peer network.
Lesson 3
Identifying Characteristics of Workgroups and Domains
1-17
Note
A workgroup can contain computers running a server operating system, such as Windows Server 2003, as long as the server is not configured as a domain controller (in other
words, as long as no domain is present). In a workgroup, a computer running Windows Server
2003 is called a stand-alone server.
Because workgroups have decentralized administration and security, the following are
true:
■
A user must have a user account on a local computer if that user wants to log on
to that computer locally (that is, by sitting down at that computer).
■
Any changes to user accounts, such as changing a user’s password or adding a
new user account, must be made on each computer in the workgroup. If you forget to add a new user account to one of the computers in your workgroup, the
new user cannot log on to that computer and cannot access resources on it.
Workgroups provide the following advantages:
■
Workgroups do not require a domain controller to hold centralized security information, making workgroups much simpler to configure and manage.
■
Workgroups are simple to design and implement. Workgroups do not require the
extensive planning and administration that a domain requires.
■
Workgroups provide a convenient networking environment for a limited number
of computers in close proximity. However, a workgroup becomes impractical in
environments with more than 10 computers.
How Domains Work
A domain is a logical grouping of network computers that share a central directory
database. (See Figure 1-5.) A directory database contains user accounts and security
information for the domain. This database, which is known as the directory, is the database portion of Active Directory service—the Windows 2003 directory service.
In a domain, the directory resides on computers that are configured as domain controllers. A domain controller is a server that manages all security-related aspects of user
and domain interactions, centralizing security and administration.
!
Exam Tip
You can designate only a computer running Microsoft Windows 2000 Server or
Windows Server 2003 as a domain controller. If all computers on the network are running
Windows XP Professional, the only type of network available is a workgroup.
1-18
Chapter 1
Introduction to Windows XP Professional
Domain
controller
Replication
Domain
controller
Active
Directory
Active
Directory
Member
server
Client
computer
Client
computer
F01US05.eps
Figure 1-5 A Windows 2003 domain relies on Active Directory to provide user authentication.
A domain does not refer to a single location or specific type of network configuration.
The computers in a domain can share physical proximity on a small LAN or they can
be located in different corners of the world. They can communicate over any number
of physical connections, including dial-up connections, Integrated Services Digital Network (ISDN) circuits, Ethernet networks, token ring connections, frame relay networks,
satellite links, and leased lines.
The benefits of a domain include the following:
■
Centralized administration because all user information is stored in the Active
Directory database. This centralization allows users to manage only a single user
name and password, and enables domain administrators to control which users
can access resources on any computer that is a member of the domain.
■
A single logon process for users to gain access to network resources (such as file,
print, and application resources) for which they have permissions. In other words,
you can log on to one computer and use resources on another computer in the
network as long as you have appropriate permissions to access the resource.
■
Scalability, so that you can create very large networks with hundreds or thousands
of computers.
A typical Windows 2003 domain includes the following types of computers:
Domain controllers running Windows Server 2003 Each domain controller
stores and maintains a copy of Active Directory. In a domain, you create a user
account in Active Directory only once. When a user logs on to a computer in the
domain, a domain controller authenticates the user by checking the directory for
the user name, password, and logon restrictions. When there are multiple domain
controllers in a domain, they periodically replicate their directory information so
Lesson 3
Identifying Characteristics of Workgroups and Domains
1-19
that each domain controller has a copy of Active Directory. Domain controllers do
not maintain a local user database.
Member servers running Windows Server 2003 A member server is a server
that is a member of a domain, but is not configured as a domain controller. A
member server does not store directory information and cannot authenticate users.
Member servers provide shared resources such as shared folders or printers.
Client computers running Windows XP Professional or Windows 2000
Professional Client computers run a user’s desktop environment and allow the
user to gain access to resources in the domain.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you are unable to answer a question, review the lesson
materials and try the question again. You can find answers to the questions in the
“Questions and Answers” section at the end of this chapter.
1. Which of the following statements about a Windows XP Professional workgroup
are correct? Choose all that apply.
a. A workgroup is also called a peer-to-peer network.
b. A workgroup is a logical grouping of network computers that share a central
directory database.
c. A workgroup is practical in environments with up to 100 computers.
d. A workgroup can contain computers running Windows Server 2003 as long as
the server is not configured as a domain controller.
2. What is a domain controller?
3. A directory database contains user accounts and security information for the
domain and is known as the __________________. This directory database is the
database portion of ______________________________, which is the Windows
2000 directory service. Fill in the blanks.
4. A(n) ____________ provides a single logon for users to gain access to network
resources that they have permission to access—such as file, print, and application
resources. Fill in the blank.
1-20
Chapter 1
Introduction to Windows XP Professional
Lesson Summary
■
■
To explain how workgroups work, you must know the following things:
❑
A Windows XP Professional workgroup is a logical grouping of networked
computers that share resources such as files and printers.
❑
A workgroup is referred to as a peer-to-peer network because all computers
in the workgroup can share resources as equals (peers) without a dedicated
server.
❑
Each computer in the workgroup maintains a local security database, which is
a list of user accounts and resource security information for the computer on
which it resides.
To explain how domains work, you must know the following things:
❑
A domain is a logical grouping of network computers that share a central
directory database containing user accounts and security information for the
domain.
❑
This central directory database, known as the directory, is the database portion of Active Directory service, which is the Windows 2003 directory service.
❑
The computers in a domain can share physical proximity on a small LAN or
can be distributed worldwide, communicating over any number of physical
connections.
❑
You can designate a computer running Windows Server 2003 as a domain
controller. If all computers on the network are running Windows XP Professional, the only type of network available is a workgroup.
Lesson 4
Logging On and Off Windows XP Professional
1-21
Lesson 4: Logging On and Off Windows XP Professional
This lesson explains the Welcome screen and the Enter Password dialog box, which are
the two options that you use to log on to Windows XP Professional. It also explains
how Windows XP Professional authenticates a user during the logon process. This
mandatory authentication process ensures that only valid users can gain access to
resources and data on a computer or the network.
After this lesson, you will be able to
■ Log on locally to the computer running Windows XP Professional.
■ Identify how Windows XP Professional authenticates a user when the user logs on to a
local computer or to a domain.
■ Create and use a password reset disk to recover a forgotten password.
■ Run programs using different credentials than the currently logged-on user.
■ Use Fast Logon Optimization.
■ Log off or turn off a computer that is running Windows XP Professional.
■ Identify the features of the Windows Security dialog box.
Estimated lesson time: 15 minutes
How to Log On Locally to the Computer Running Windows XP
Professional
Windows XP Professional offers two options for logging on locally: the Welcome
screen and the Log On To Windows dialog box.
The Welcome Screen
By default, if a computer is a member of a workgroup, Windows XP Professional uses
the Welcome screen to allow users to log on locally, as shown in Figure 1-6. To log on,
click the icon for the user account you want to use. If the account requires a password,
you are prompted to enter it. If the account is not password-protected, you are logged
on to the computer. You can also use CTRL+ALT+DELETE at the Welcome screen to get
the Log On To Windows dialog box. This dialog box enables you to log on to the
Administrator account, which is not displayed on the Welcome screen when other user
accounts have been created. To use CTRL+ALT+DELETE, you must enter the sequence
twice to get the logon prompt.
1-22
Chapter 1
Introduction to Windows XP Professional
F01US06.eps
Figure 1-6 The Welcome screen is used by default on computers in workgroups.
See Also For more information about creating user accounts during installation, see Chapter 2, “Installing Windows XP Professional.” For more information about setting up user
accounts (including turning on and off the Welcome screen), see Chapter 7, “Setting Up and
Managing User Accounts.”
A user can log on locally to either of the following:
■
A computer that is a member of a workgroup
■
A computer that is a member of a domain but is not a domain controller
Note Because domain controllers do not maintain a local security database, local user
accounts are not available on domain controllers. Therefore, a user cannot log on locally to a
domain controller.
The User Accounts program in the Control Panel includes a Change The Way Users Log
On Or Off task, which allows you to configure Windows XP Professional to use the Log
On To Windows dialog box instead of the Welcome screen.
The Log On To Windows Dialog Box
To use the Log On To Windows dialog box (shown in Figure 1-7) to log on locally to
a computer running Windows XP Professional, you must supply a valid user name; if
the user name is password-protected, you must also supply the password. Windows
Lesson 4
Logging On and Off Windows XP Professional
1-23
XP Professional authenticates the user’s identity during the logon process. Only valid
users can access resources and data on a computer or a network. Windows XP Professional authenticates users who log on locally to the computer at which they are seated;
a domain controller authenticates users who log on to a domain.
F01US07.eps
Figure 1-7
screen.
Use the Log On To Windows dialog box in domains or as an alternative to the Welcome
When a user starts a computer running Windows XP Professional that is configured to
use the Log On To Windows dialog box, an Options button also appears. Table 1-1
describes the options in the Log On To Windows dialog box for a computer that is part
of a domain.
Table 1-1
Log On To Windows Dialog Box Options
Option
Description
User Name
A unique user logon name that is assigned by an administrator. To log on
to a domain with the user name, the user must have an account that
resides in the directory.
Password
The password that is assigned to the user account. Users must enter a
password to prove their identity. Passwords are case sensitive. For security purposes, the password appears on the screen as asterisks (*). To prevent unauthorized access to resources and data, users must keep
passwords secret.
Log On To
Allows the user to choose to log on to the local computer or to log on to
the domain.
Log On Using
Permits a user to connect to a domain server by using dial-up networking.
Dial-Up Connection Dial-up networking allows a user to log on and perform work from a
remote location.
Shutdown
Closes all files, saves all operating system data, and prepares the computer so that a user can safely turn it off.
Options
Toggles on and off between the Log On To option and the Log On Using
Dial-Up Connection option. The Options button appears only if the computer is a member of a domain.
1-24
Chapter 1
Note
Introduction to Windows XP Professional
If your computer is not part of a domain, the Log On To option is not available.
Windows XP Professional Authentication Process
To gain access to a computer running Windows XP Professional or to any resource on
that computer (whether the computer is configured to use the Welcome screen or the
Log On To Windows dialog box), you must provide a user name and possibly a password. (You will learn more about using passwords effectively in Chapter 7.)
The way Windows XP Professional authenticates a user depends on whether the user
is logging on to a domain or logging on locally to a computer (see Figure 1-8).
1
Logs on
Local
security
database
2
3
Access
token
Logging on
locally
F01US08.eps
Figure 1-8 Windows XP Professional grants an access token based on user credentials during the
authentication process.
The steps in the authentication process are as follows:
1. The user logs on by providing logon credentials—typically user name and password—and Windows XP Professional forwards this information to the security
subsystem of that local computer.
2. Windows XP Professional compares the logon credentials with the user information in the local security database, which resides in the security subsystem of the
local computer.
3. If the credentials are valid, Windows XP Professional creates an access token for
the user, which is the user’s identification for that local computer. The access
token contains the user’s security settings, which allow the user to gain access to
the appropriate resources on that computer and to perform specific system tasks.
Note In addition to the logon process, any time a user makes a connection to a computer,
that computer authenticates the user and returns an access token. This authentication process is invisible to the user.
Lesson 4
Logging On and Off Windows XP Professional
1-25
If a user logs on to a domain, Windows XP Professional contacts a domain controller
in the domain. The domain controller compares the logon credentials with the user
information that is stored in Active Directory. If the credentials are valid, the domain
controller creates an access token for the user. The security settings contained in the
access token allow the user to gain access to the appropriate resources in the domain.
How to Use a Password Reset Disk
A password reset disk allows a user to recover a user account when the user forgets
his or her password. You create a password reset disk using the Forgotten Password
Wizard, which you can start in the following ways:
■
If your computer is a member of a domain, press CTRL+ALT+DELETE to open the
Windows Security dialog box. Click Change Password, and then click Backup to
start the wizard.
■
If your computer is in a workgroup, and you are using a computer administrator
account, open the User Accounts tool in Control Panel, click your account name,
and then click Prevent A Forgotten Password.
■
If your computer is in a workgroup, and you are using a limited account, open the
User Accounts tool in Control Panel, and in the Relate Tasks section on the left
side of the window, click Prevent A Forgotten Password.
No matter which way you start the Forgotten Password Wizard, the wizard walks you
through the steps necessary to create a password reset disk. You can store your password reset key on any removable disk, including floppy (in which case you will need
one, blank, formatted 1.44 MB floppy disk) and universal serial bus (USB) flash drives.
Warning
You can have only one password reset disk at a time. If you create a new disk,
any previous disk becomes invalid.
If you forget your logon password, you can use a password reset disk in one of the following ways:
■
If your computer is a member of a domain, simply try to log on to Windows by
using an invalid password. In the Logon Failed dialog box that appears, click
Reset to start the Password Reset Wizard, which will walk you through the
recovery process.
■
If your computer is a member of a workgroup, on the Windows XP logon
screen, click the user name that you want to use to make the Type Your Password box appear. Press ENTER or click the right arrow button. In the pop-up
error message that appears, click Use Your Password Reset Disk to start the
Password Reset Wizard.
1-26
Chapter 1
Introduction to Windows XP Professional
How to Run Programs with Different User Credentials
Windows XP Professional allows you to run programs using user credentials that are
different from the currently logged-on user. Using different credentials is useful if you
are troubleshooting a user’s computer and do not want to log off and log back on
using administrative permissions just to perform a troubleshooting task or run a particular program. Using this method is also more secure than logging on to a user’s computer with administrative credentials.
Running a program with different credentials in Windows XP Professional relies on a
built-in service named the Secondary Logon service. This service must be running
(and it is by default on computers running Windows XP) to run a program with alternate credentials.
To determine whether the Secondary Logon service is running (and enable the service
if it is not running), follow these steps:
1. Log on to the computer as Administrator or as a user with administrative permissions.
2. From the Start menu, click Control Panel.
3. In the Control Panel window, click Performance and Maintenance.
4. In the Performance and Maintenance window, click Administrative Tools.
5. In the Administrative Tools window, double-click Services.
6. In the Services window, locate the Secondary Logon service on the list of Services.
7. If the status for the Secondary Logon service is listed as Started, the service is
enabled, and you can close the Services window. If the status is listed as Manual
or Disabled, right-click the Secondary Logon service and click Properties.
8. On the General tab of the Secondary Logon Properties dialog box, on the Startup
type drop-down list, click Automatic.
9. In the Service Status section, click Start.
10. Click OK to close the Secondary Logon Properties dialog box, and then close the
Services window.
If the Secondary Logon service is running, you can run a program using different user
credentials than the currently logged-on user. On the Start menu, right-click the shortcut for the program you want to run. On the shortcut menu, click Run As. In the Run
As dialog box that opens, you can run the program as the current user, or you can
enter an alternative user name and password. Microsoft recommends logging on with
a limited user account and using this technique to run applications that require administrative privileges.
Lesson 4
Logging On and Off Windows XP Professional
1-27
The Purpose of Fast Logon Optimization
Windows XP Professional includes a feature named Fast Logon Optimization. Enabled
by default, this feature allows existing users to log on by using cached credentials
instead of waiting for the network to become fully initialized before allowing logon.
This features enables faster logons from the user perspective. Group Policy and other
settings are applied in the background after logon and after the network is initialized.
Fast Logon Optimization is always turned off in the following situations:
■
The first time a user logs on to a computer
■
When a user logs on using a roaming profile, a home directory, or a user logon
script (you will learn more in Chapter 7)
How to Log Off Windows XP Professional
To log off a computer running Windows XP Professional, click Start and then click Log
Off. Notice that the Start menu, shown in Figure 1-9, also allows you to turn off the
computer.
F01US09.eps
Figure 1-9
The Start menu provides a way to log off Windows XP Professional.
Features of the Windows Security Dialog Box
The Windows Security dialog box provides information such as the user account currently logged on, and the domain or computer to which the user is logged on. This
1-28
Chapter 1
Introduction to Windows XP Professional
information is important for users with multiple user accounts, such as a user who has
a regular user account as well as a user account with administrative privileges.
If a computer running Windows XP Professional is joined to a domain (or if the Welcome screen is disabled even when the computer is a member of a workgroup), you
can access the Windows Security dialog box by pressing CTRL+ALT+DELETE at any time
while Windows is running. If the Welcome screen is enabled, pressing
CTRL+ALT+DELETE activates Task Manager instead. Figure 1-10 shows the Windows
Security dialog box, and Table 1-2 describes the Windows Security dialog box options.
F01US10.eps
Figure 1-10
Table 1-2
Use the Windows Security dialog box for many security activities.
The Windows Security Dialog Box Options
Option
Description
Lock Computer
Allows users to secure the computer without logging off. All programs
remain running. Users should lock their computers when they leave for a
short time. The user who locks the computer can unlock it by pressing
CTRL+ALT+DELETE and entering the valid password. An administrator can
also unlock a locked computer. This process logs off the current user.
Whether the Windows Security dialog box is available or not, you can also
press WINDOWS KEY+L to immediately lock the computer.
Log Off
Allows a user to log off as the current user and close all running programs, but leaves Windows XP Professional running. You can also log off
Windows by choosing Log Off from the Start menu.
Shut Down
Allows a user to close all files, save all operating system data, and prepare
the computer so that it can be safely turned off. You can also log off Windows by choosing Turn Off Computer from the Start menu.
Change Password
Allows a user to change his or her user account password. The user must
know the current password to create a new one. This is the only way
users can change their own passwords. Administrators can also change
the password.
Lesson 4
Table 1-2
Logging On and Off Windows XP Professional
1-29
The Windows Security Dialog Box Options
Option
Description
Task Manager
Provides a list of the programs that are running and a summary of overall
central processing unit (CPU) and memory usage, as well as a quick view
of how each program, program component, or system process is using the
CPU and memory resources. Users can also use Task Manager to switch
between programs and to stop a program that is not responding. You can
also access Task Manager by right-clicking any open space on the taskbar
and clicking Task Manager.
Cancel
Closes the Windows Security dialog box.
Practice: Creating a Password Reset Disk
In this practice, you will create a password reset disk. Complete either Exercise 1 or
Exercise 2. If you are working on a computer that is a member of a domain, use the
steps in Exercise 1 to create the disk. If you are working on a computer that is a member of a workgroup, use the steps in Exercise 2 to create the disk. For either exercise,
you will need a blank, formatted, 1.44-MB floppy disk.
Exercise 1: Creating a Password Reset Disk on a Computer That Is a Member of a
Domain
1. Log on as the user for whom you are creating a password reset disk.
2. Press CTRL+ALT+DELETE.
3. In the Windows Security dialog box, click Change Password.
4. In the Change Password dialog box, click Backup.
5. On the Welcome page of the Forgotten Password Wizard, click Next.
6. On the Create A Password Reset Disk page, make sure that the correct floppy
drive is selected; ensure that a blank, formatted, 1.44-MB floppy disk is inserted in
the drive; and then click Next.
7. On the Current User Account Password page, type the current password for the
account, and then click Next.
8. After Windows writes the key information to the disk, click Next.
9. Click Finish. Remove the disk, label it, and store it in a secure location. If an
attacker gains access to this disk, he can log on to your computer without a password.
1-30
Chapter 1
Introduction to Windows XP Professional
Exercise 2: Creating a Password Reset Disk on a Computer That Is a Member of a
Workgroup
1. Log on as the user for whom you are creating a password reset disk.
2. From the Start menu, click Control Panel.
3. In the Control Panel window, click User Accounts.
4. In the User Accounts window, click the account you want to use if you are logged
on as an Administrator. Otherwise, continue to the next step.
5. In the Related Tasks section, click Prevent A Forgotten Password.
6. On the Welcome page of the Forgotten Password Wizard, click Next.
7. On the Create A Password Reset Disk page, make sure that the correct floppy
drive is selected; ensure that a blank, formatted, 1.44 MB floppy disk is inserted in
the drive; and then click Next.
8. On the Current User Account Password page, type the current password for the
account, and then click Next.
9. After Windows writes the key information to the disk, click Next.
10. Click Finish. Remove the disk and label it.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you are unable to answer a question, review the lesson
materials and try the question again. You can find answers to the questions in the
“Questions and Answers” section at the end of this chapter.
1. What can you do when you log on locally to a computer, and what determines
what you can do when you log on locally to a computer?
Lesson 4
Logging On and Off Windows XP Professional
1-31
2. What is the main difference in the authentication process for logging on locally to
a computer and logging on to a domain?
3. Which of the following computers can a user log on to locally? Choose all that
apply.
a. A computer running Windows XP Professional that is in a workgroup
b. A computer running Windows XP Professional that is in a domain
c. A computer running Windows Server 2003 that is configured as a domain
controller
d. A computer running Windows Server 2003 that is a member server in a
domain
4. Which of the following statements about the Windows Security dialog box are correct? Choose all that apply.
a. You can access it by pressing CTRL+ALT+DELETE.
b. The dialog box tells you how long the current user has been logged on.
c. The dialog box allows you to log off the computer or domain.
d. The dialog box allows a user with administrative permissions to change other
users’ passwords.
Lesson Summary
■
By default, Windows XP Professional uses the Welcome screen to allow users to
log on locally to the computer. You can configure Windows XP Professional to use
the Log On To Windows dialog box instead of the Welcome screen. When a user
logs on, she can log on to the local computer; if the computer is a member of a
domain, the user can log on to the domain.
■
When a user logs on locally, the local computer does the authentication. When a
user logs on to a domain, a domain controller must do the authentication. In a
workgroup environment, an access token is the user’s identification for that local
computer, and it contains the user’s security settings. These security settings allow
the user to gain access to the appropriate resources on that computer and to perform specific system tasks.
1-32
Chapter 1
Introduction to Windows XP Professional
■
An administrator or a user can create a password reset disk for a user that allows
the user to recover a forgotten password and log on to Windows XP Professional.
■
Instead of logging on as Administrator, you can specify administrative credentials
when you run a program no matter what user account you are logged on with.
This provides a way to run programs that requires administrative rights without
the risks associated with logging on using an Administrator account.
■
Fast Logon Optimization allows existing users to log on by using cached credentials instead of waiting for the network to become fully initialized before allowing
logon. This features enables faster logons from the user perspective.
■
You can log off Windows XP (and should whenever you leave your computer for
an extended period) by using the Log Off command on the Start menu.
■
The Windows Security dialog box allows you to lock your computer, change your
password, log off your computer, shut down your computer, and access Task
Manager.
Case Scenario Exercises
Read the following two scenarios and answer the associated questions. You can use
the scenarios to help determine whether you have learned enough to move on to the
next chapter. If you have difficulty completing this work, review the material in this
chapter before beginning the next chapter. You can find answers to these questions in
the “Questions and Answers” section at the end of this chapter.
Scenario 1.1
You are working as an administrator who supports users by telephone. One of your
users says that she has recently installed Windows XP Professional on her home computer, which she uses to connect to her company’s corporate network. She is used to
having to press CTRL+ALT+DELETE to log on to Windows, but instead her new computer
shows a Welcome screen with her user name listed. She would feel more comfortable
using the Log On To Windows dialog box instead of the Welcome screen. How should
you configure the computer?
Troubleshooting Lab
1-33
Scenario 1.2
You are an administrator for a corporate network that runs a Windows Server 2003–
based domain. All client workstations run Windows XP Professional. A user complains
to you that when he logs on to his computer, his desktop does not look right and he
cannot access any network resources. What do you suspect might be the problem?
Troubleshooting Lab
Using what you have learned in this chapter, provide the following information about
your own computer:
■
What edition of Windows XP are you running?
■
Which Service Pack, if any, is applied to your installation of Windows XP? What
tools can you use to determine which one you have?
■
Is your computer a member of a workgroup or a domain? What is the name of the
workgroup or domain?
■
If your computer is a member of a domain, can you also log on to your computer
locally?
Chapter Summary
■
The Windows XP family includes Windows XP Professional Edition, Windows XP
Home Edition, Windows XP Media Center Edition, Windows XP Tablet PC Edition,
and Windows XP 64-Bit Edition. Features provided in Windows XP Professional
that are not provided in Windows XP Home Edition include dynamic disks,
Remote Desktop, NTFS and print permissions, EFS, domain membership, dual
processors, and IIS.
■
You can determine whether Service Pack 2 is installed by viewing the General tab
of the System Properties dialog box or by typing winver.exe in the Run dialog
box to open the About Windows dialog box. Enhancements provided by Service
Pack 2 include:
❑
Security Center provides real-time status and alerts for Windows Firewall,
Automatic Updates, and some antivirus software.
❑
Enhancements to Automatic Updates allow it to download updates for more
Microsoft products, download all types of updates, and prioritize update
importance.
1-34
Chapter 1
■
■
Introduction to Windows XP Professional
❑
Enhancements to Windows Firewall enable the firewall for each connection
by default, allow the inspection of traffic from the moment the connection
becomes active, and let you make global configuration settings for all connections.
❑
Enhancements to Internet Explorer include a new Information bar that consolidates many user prompts, a pop-up blocker, and better add-on management.
A computer running Windows XP Professional can be a member of two types of
networks: a workgroup or a domain. You can designate a computer running Windows Server 2003 as a domain controller. If all computers on the network are running Windows XP Professional, the only type of network available is a workgroup.
Features of workgroups and domains include:
❑
A Windows XP Professional workgroup is a logical grouping of networked
computers that share resources such as files and printers. A workgroup is
referred to as a peer-to-peer network because all computers in the workgroup can share resources as equals (peers) without a dedicated server. Each
computer in the workgroup maintains a local security database, which is a list
of user accounts and resource security information for the computer on
which it resides.
❑
A domain is a logical grouping of network computers that share a central
directory database containing user accounts and security information for the
domain. This central directory database is known as the directory; it is the
database portion of Active Directory service, which is the Windows 2003
directory service. The computers in a domain can share physical proximity on
a small LAN or can be distributed worldwide, communicating over any number of physical connections.
By default, Windows XP Professional uses the Welcome screen to allow users to
log on locally to the computer. You can configure Windows XP Professional to use
the Log On To Windows dialog box instead of the Welcome screen. When a user
logs on, he can log on to the local computer; if the computer is a member of a
domain, the user can log on to the domain.
❑
When a user logs on locally, the local computer does the authentication.
❑
When a user logs on to a domain, a domain controller must do the authentication.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Exam Highlights
1-35
Key Points
■
The new Windows Firewall policy performs packet filtering during Windows
startup, meaning that connections are protected from the moment they become
active on the network.
■
You can designate only a computer running Microsoft Windows 2000 Server or
Windows Server 2003 as a domain controller. If all computers on the network are
running Windows XP Professional, the only type of network available is a workgroup.
Key Terms
access token An object that describes the security context for a user. When a user
logs on, Windows verifies the user’s credentials. After the user is authenticated,
Windows assigns an access token that defines the user’s rights and permissions.
Active Directory A directory structure that allows any object on a network to be
tracked and located. Active Directory is the directory service used in Windows
2000 Server and Windows Server 2003. Active Directory provides the foundation
for Windows-based distributed networks.
Automatic Updates A Windows service that scans for, downloads, and installs available updates for Windows XP and other Microsoft programs.
domain A group of computers that consists of servers that maintain centralized security and directory structures, and workstations that participate in those structures.
domain controller A server in an Active Directory domain that stores a copy of the
Active Directory database and runs the Active Directory service.
member server A server that is a member of an Active Directory domain but is not
a domain controller.
password reset disk A disk that allows a user to recover a user account when the
user forgets her password.
Secondary Logon service A service that allows a user to run a program (by using
the Run As command) with credentials different from the currently logged-on
user.
Security Center A software interface that provides at-a-glance security status for a
computer, including information on Windows Firewall, Automatic Updates, and
antivirus software.
stand-alone server A computer running Windows Server 2003 or Windows 2000
Server that is a member of a workgroup.
Windows Firewall A software-based firewall built in to Windows XP Service Pack
2 that replaces the ICF built into Windows XP prior to Service Pack 2.
1-36
Chapter 1
Introduction to Windows XP Professional
Windows XP Service Pack 2 An update that includes all the critical updates
released for Windows XP to date. In addition, Service Pack 2 includes a large number of new enhancements to Windows XP—enhancements aimed at increasing
the default level of security for the operating system.
workgroup A group of computers that consists of a number of peer-based computers, each of which maintains its own security.
Questions and Answers
1-37
Questions and Answers
Lesson 1 Review
Page
1-6
1. Windows XP _________ Edition and Windows XP __________ Edition are available only on supported hardware devices and are not available as stand-alone
products. Fill in the blanks.
Tablet PC and Media Center
2. Which features supported in Windows XP Professional are not supported in Windows XP Home Edition?
Features provided in Windows XP Professional that are not provided in Windows XP Home Edition include dynamic disks, Remote Desktop, NTFS and print permissions, EFS, domain membership, dual processors, and IIS.
Lesson 2 Review
Page
1-14
1. After Windows XP Service Pack 2 is installed, Internet Explorer combines many of
the common dialog boxes that prompt users for information into a common area
named the _______________. Fill in the blanks.
Information bar
2. Which of the following is true of Windows Firewall? Choose all that apply.
a. Windows Firewall is enabled by default.
b. Windows Firewall is disabled by default.
c. Windows Firewall must be configured individually for each connection.
d. Windows Firewall protects a network connection as soon as the connection is
active on the network.
A and D are correct. Windows Firewall is enabled by default and begins protecting a network
connection as soon as the connection is active on the network. B is not correct because Windows Firewall is enabled by default. C is not correct because you can configure global settings
for Windows Firewall that affect all connections (although you can configure connections individually if you want to).
Lesson 3 Review
Page
1-19
1. Which of the following statements about a Windows XP Professional workgroup
are correct? Choose all that apply.
a. A workgroup is also called a peer-to-peer network.
b. A workgroup is a logical grouping of network computers that share a central
directory database.
1-38
Chapter 1
Introduction to Windows XP Professional
c. A workgroup is practical in environments with up to 100 computers.
d. A workgroup can contain computers running Windows Server 2003 as long as
the server is not configured as a domain controller.
A and D are correct. A is correct because in a workgroup, computers act as equals (or peers),
and the arrangement is also called a peer-to-peer network. D is correct because computers running a server product might be part of a workgroup (such computers are called stand-alone
servers) as long as no server is acting as a domain controller. B is not correct because each
computer in a workgroup maintains its own security database instead of relying on a centralized security database. C is not correct because a workgroup begins to become impractical
with more than 10 workstations—not 100 workstations.
2. What is a domain controller?
A domain controller is a computer running Windows 2000 Server that is configured as a domain
controller so that it can manage all security-related aspects of user and domain interactions.
3. A directory database contains user accounts and security information for the
domain and is known as the __________________. This directory database is the
database portion of ______________________________, which is the Windows
2000 directory service. Fill in the blanks.
directory, Active Directory service
4. A(n) ____________ provides a single logon for users to gain access to network
resources that they have permission to access—such as file, print, and application
resources. Fill in the blanks.
domain
Lesson 4 Review
Page
1-30
1. What can you do when you log on locally to a computer, and what determines
what you can do when you log on locally to a computer?
When you log on locally to a computer, you can access the appropriate resources on that computer and you can perform specific system tasks. What you can do when logged on locally to a
computer is determined by the access token assigned to the user account you used to log on.
The access token is your identification for that local computer; it contains your security settings. These security settings allow you to access specific resources on that computer and to
perform specific system tasks.
2. What is the main difference in the authentication process for logging on locally to
a computer and logging on to a domain?
When you log on locally to a computer, its security subsystem uses the local security database
to authenticate the user name and password you entered. When you log on to a domain, a
domain controller uses the directory to authenticate the user name and password you entered.
Questions and Answers
1-39
3. Which of the following computers can a user log on to locally? Choose all that
apply.
a. A computer running Windows XP Professional that is in a workgroup
b. A computer running Windows XP Professional that is in a domain
c. A computer running Windows Server 2003 that is configured as a domain
controller
d. A computer running Windows Server 2003 that is a member server in a
domain
A, B, and D are correct. C is not correct because domain controllers do not maintain a local
security database, so you cannot log on locally to a domain controller.
4. Which of the following statements about the Windows Security dialog box are correct? Choose all that apply.
a. You can access it by pressing CTRL+ALT+DELETE.
b. The dialog box tells you how long the current user has been logged on.
c. The dialog box allows you to log off the computer or domain.
d. The dialog box allows a user with administrative permissions to change other
users’ passwords.
A and C are correct. B is not correct because the Windows Security dialog box does not tell you
how long you have been logged on. D is not correct because the Windows Security dialog box
does not allow you to change other users’ passwords.
Case Scenario Exercises: Scenario 1.1
Page
1-32
You are working as an administrator who supports users by telephone. One of your
users says that she has recently installed Windows XP Professional on her home computer, which she uses to connect to her company’s corporate network. She is used to
having to press CTRL+ALT+DELETE to log on to Windows, but instead her new computer
shows a Welcome screen with her user name listed. She would feel more comfortable
using the Log On To Windows dialog box instead of the Welcome screen. How should
you configure the computer?
In the Windows Control Panel, you should open the User Accounts tool. In the User
Accounts window, you should click Change The Way Users Log On Or Off, and then
clear the Use The Welcome Screen check box.
1-40
Chapter 1
Introduction to Windows XP Professional
Case Scenario Exercises: Scenario 1.2
Page
1-33
You are an administrator for a corporate network that runs a Windows Server 2003–
based domain. All client workstations run Windows XP Professional. A user complains
to you that when he logs on to his computer, his desktop does not look right and he
cannot access any network resources. What do you suspect might be the problem?
Most likely, the user is logging on to the workstation locally instead of logging on to
the domain.
2 Installing Windows XP
Professional
Exam Objectives in this Chapter:
■
Perform and troubleshoot an attended installation of Windows XP.
■
Upgrade from a previous version of Windows to Windows XP Professional.
■
❑
Prepare a computer to meet upgrade requirements.
❑
Migrate existing user environments to a new installation.
Troubleshoot failed installations.
Why This Chapter Matters
This chapter prepares you to install Windows XP Professional. You will learn some
preinstallation tasks that help ensure that your installation of Windows XP Professional will go smoothly. These tasks include verifying that your hardware and any
software installed on the computer are compatible with Windows XP Professional,
determining which file system to use, and deciding whether your computer will
join a workgroup or a domain. You will learn about installing Windows XP Professional from a CD-ROM and over the network, and about upgrading from a previous
version of Windows. You will learn how to modify an installation using switches
and how to troubleshoot failed installations. Finally, you will learn how to perform
post-installation tasks such as activating and updating Windows XP.
Lessons in this Chapter:
■
Lesson 1: Preparing for Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
■
Lesson 2: Installing Windows XP Professional from a CD-ROM . . . . . . . . . . .2-12
■
Lesson 3: Installing Windows XP Professional over the Network . . . . . . . . . . 2-25
■
Lesson 4: Upgrading Earlier Versions of Windows to
Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-32
■
Lesson 5: Troubleshooting Windows XP Professional Setup. . . . . . . . . . . . . .2-37
■
Lesson 6: Activating and Updating Windows XP Professional . . . . . . . . . . . .2-42
Before You Begin
To complete this chapter, you must have a computer that meets or exceeds the minimum hardware requirements listed in the preface, “About This Book.” You must also
have a Windows XP Professional installation CD-ROM.
2-1
2-2
Chapter 2
Installing Windows XP Professional
Lesson 1: Preparing for Installation
When you install Windows XP Professional, the Windows XP Professional Setup program allows you to specify how to install and configure the operating system. Preparing in advance helps you avoid problems during and after installation.
After this lesson, you will be able to
■ Verify that your computer meets the minimum hardware requirements for installing
Windows XP Professional.
■ Verify that hardware is compatible with Windows XP Professional.
■ Create a partitioning scheme appropriate for an installation.
■ Choose a file system appropriate for an installation.
■ Join a domain or workgroup during installation.
■ Update installation files using Dynamic Updates.
■ Explain how Microsoft grants software licenses.
Estimated lesson time: 70 minutes
Overview of Preinstallation Tasks
Before you start the installation, you should complete the following tasks:
■
Ensure that your hardware meets the requirements for installing Windows XP Professional.
■
Determine whether your hardware is in the Windows Catalog.
■
Decide how you will partition the hard disk on which you will install Windows XP
Professional.
■
Choose a file system for the installation partition.
■
Determine whether your computer will join a domain or a workgroup.
■
Complete a preinstallation checklist.
Windows XP Professional Hardware Requirements
Before installing Windows XP Professional, you must determine whether your hardware meets or exceeds the minimum requirements for installing and operating Windows XP Professional, as shown in Table 2-1.
Lesson 1
Table 2-1
Preparing for Installation
2-3
Windows XP Professional Hardware Requirements
Component
Requirements
Central process- Pentium 233 megahertz (MHz) or equivalent.
ing unit (CPU)
!
Memory
64 megabytes (MB) minimum; 128 MB recommended; 4 gigabytes (GB) of
random access memory (RAM) maximum.
Hard disk
space
1.5 GB of free disk space for installing Windows XP Professional. You should
also have several additional gigabytes of hard disk space to allow for updates,
additional Windows components, applications, and user data.
Networking
Network adapter card and a network cable, if necessary.
Display
Video display adapter and monitor with Video Graphics Adapter (VGA) resolution or higher.
Other drives
CD-ROM drive, 12X or faster recommended (not required for installing Windows XP Professional over a network), or DVD drive.
High-density 3.5-inch disk drive as drive A, unless the computer supports
starting the Setup program from a CD-ROM or DVD drive.
Accessories
Keyboard and Microsoft-compatible mouse or other pointing device.
Exam Tip You should memorize the basic hardware requirements for running Windows XP. A
233 MHz processor, 64 MB RAM, and a 2 GB hard disk with 1.5 GB free space are required.
How to Verify Hardware Compatibility with the Windows Catalog
Although the Windows XP Professional Setup Wizard automatically checks your hardware and software for potential conflicts, before you install Windows XP Professional,
you should verify that your hardware is listed in the Windows Catalog. Microsoft provides tested drivers for the listed devices only. Using hardware not listed in the Windows Catalog could cause problems during or after installation. To find the Windows
Catalog, go to the Windows Catolog page of the Microsoft Web site at http://
www.microsoft.com/windows/catalog/.
Note
If your hardware is not in the Windows Catalog, the hardware manufacturer might be
able to provide you with a Windows XP Professional driver for the component.
What Are Disk Partitions?
The Windows XP Professional Setup program examines the hard disk to determine its
existing configuration. Setup then allows you to install Windows XP Professional on an
existing partition or to create a new partition on which to install it.
2-4
Chapter 2
Installing Windows XP Professional
A disk partition is a logical section of a hard disk on which the computer can write
data. Partitions offer a way to divide the space on a single physical hard disk into multiple areas, each of which is treated as a different disk within Windows. Some people
create separate partitions to help organize their files. For example, you might store the
Windows system files and application files on one partition, user-created documents
on another partition, and backup files on another partition.
Another reason to use multiple partitions is to isolate operating systems from one
another when you install more than one operating system on a computer. Although it
is technically possible to install some operating systems on the same partition,
Microsoft does not recommend or support this practice. You should always create a
separate partition for each operating system.
Depending on the hard disk configuration, do one of the following procedures during
installation:
■
If the hard disk is not partitioned, create and size the Windows XP Professional
partition. Unless you have a specific reason to create multiple partitions (such as
for multiple operating systems or to have a separate partition for document storage), you should create one partition that uses all available drive space.
■
If an existing partition is large enough, install Windows XP Professional on that
partition. Installing on an existing partition might overwrite any existing operating
system files.
■
If the existing partition is not large enough, delete it and combine it with other
partitions on the same physical disk to provide more unpartitioned disk space for
creating the Windows XP Professional partition.
Although you can use Setup to create other partitions, you should create and size only
the partition on which you will install Windows XP Professional. After you install Windows XP Professional, use the Disk Management snap-in of the Computer Management
console to partition any remaining unpartitioned space on the hard disk. Disk Management is much easier to use for disk partitioning than Setup. You will learn more about
partitions and the Disk Management tool in Chapter 10, “Managing Data Storage.”
Guidelines for Choosing a File System
After you create the installation partition, Setup prompts you to select the file system
with which to format the partition. Windows XP Professional can be installed on two
file systems:
File allocation table (FAT) Although Windows Setup references only file allocation table (FAT), there are actually two versions of FAT: FAT and FAT32. FAT is a
16-bit file system used in older versions of Windows. FAT32 is a 32-bit file system
supported by Windows 95 original equipment manufacturer (OEM) Service
Release 2, Windows 98, Windows Me, Windows 2000, and Windows XP.
Lesson 1
Preparing for Installation
2-5
NTFS The preferred file system for Windows XP, NTFS provides more security and
flexibility than FAT32. Microsoft recommends that you always use NTFS unless
there is a specific reason to use another file system (such as when you are installing more than one operating system on a computer and one of those operating
systems does not recognize NTFS partitions). NTFS is supported by Windows NT
4.0, Windows 2000, Windows XP, and Windows 2003 Server.
Figure 2-1 summarizes some of the features of these file systems.
NTFS
· File-level and folder-level security
· Disk compression
· File encryption
FAT or
FAT32
· Dual boot configuration support
· No file-level security
F02us01
Figure 2-1
!
NTFS offers more features than FAT.
Exam Tip
Unless you are installing Windows XP Professional on a multiple-boot computer
that also has an operating system that cannot access NTFS partitions (such as Windows 98),
you should always use NTFS.
Using NTFS
Use NTFS when the partition on which Windows XP Professional will reside requires
any of the following features:
File- and folder-level security NTFS allows you to control access to files and folders. For additional information, see Chapter 8, “Securing Resources with NTFS
Permissions.”
Disk compression NTFS can compress files to store more data on the partition. For
additional information, see Chapter 10.
Disk quota NTFS allows you to control disk usage on a per-user basis. For additional
information, see Chapter 10.
Encryption NTFS allows you to encrypt file data on the physical hard disk by using the
Microsoft Encrypting File System (EFS). For additional information, see Chapter 10.
The version of NTFS in Windows XP Professional supports remote storage, dynamic
volumes, and mounting volumes to folders. Windows XP Professional, Windows 2000,
and Windows NT are the only operating systems that can access data on a local hard
disk formatted with NTFS.
2-6
Chapter 2
Installing Windows XP Professional
FAT and FAT32
FAT and FAT32 offer compatibility with other operating systems. You must format the
system partition with either FAT or FAT32 if you will dual boot Windows XP Professional and another operating system that requires FAT or FAT32.
FAT and FAT32 do not offer many of the features (for example, file-level security) that
NTFS supports. Therefore, in most situations, you should format the hard disk with
NTFS. The only reason to use FAT or FAT32 is for dual booting with an older operating
system that does not support NTFS. If you are setting up a computer for dual booting,
you need to format the system partition that contains the older version of Windows
with FAT or FAT32. For example, if drive C is the system partition that holds Windows
98, you could format drive C as FAT or FAT32. You should then format the system partition that will hold Windows XP as NTFS. Finally, for multiple booting to be successful,
the boot partition must be formatted using a file system that all installed operating systems can access. For example, if you are dual-booting between Windows XP and Windows 95, the boot partition (as well as the system partition on which Windows 95 is
installed) would have to be formatted with FAT.
Converting a FAT or FAT32 Volume to NTFS
Windows XP Professional provides the Convert command for converting a partition to
NTFS without reformatting the partition and losing all the information on the partition.
To use the Convert command, click Start, click Run, type cmd in the Open text box,
and then click OK. This opens a command prompt, which you use to request the Convert command. The following example shows how you might use switches with the
Convert command.
Convert volume /FS:NTFS [/V] [/CvtArea:filename] [/NoSecurity] [/X]
Table 2-2 lists the switches available in the Convert command and describes their functions.
Table 2-2
Convert Command Switches
Switch
Function
Required
Volume
Specifies the drive letter (followed by a colon), volume
mount point, or volume name that you want to convert
Yes
/FS:NTFS
Specifies converting the volume to NTFS
Yes
/V
Runs the Convert command in verbose mode
No
/CvtArea:filename
Specifies a contiguous file in the root directory to be the
placeholder for NTFS system files
No
/NoSecurity
Sets the security settings to make converted files and
directories accessible by everyone
No
/X
Forces the volume to dismount first, if necessary, and all
open handles to the volume are then not valid
No
Lesson 1
Preparing for Installation
2-7
If you convert a system volume (or any volume that has files that are currently in use),
the Convert command might not be able to convert the drive right away. Instead, Windows schedules the conversion to happen the next time Windows is restarted.
Note
For help with any command-line program, at the command prompt, type the command
followed by /? and then press ENTER. For example, to receive help on the Convert command,
type Convert /? and then press ENTER.
Guidelines for Choosing Domain or Workgroup Membership
During installation, you must choose the type of network security group that the computer will join: a domain or a workgroup. Figure 2-2 shows the requirements for joining a domain or workgroup.
tailspintoys.com
Domain
Joining a domain requires:
· A domain name
· A computer account
· An available domain controller
and a DNS server
Workgroup
Joining a workgroup requires:
· A new or an existing workgroup
name
F02US02 (FYI, this was Figure 2.2 from page 42 of previous edition)
Figure 2-2
Joining a domain requires more planning than joining a workgroup.
Joining a Domain
When you install Windows XP Professional on a computer, you can add that computer
to an existing domain. Adding a computer to a domain is referred to as joining a
domain. You can join a computer to a domain during or following installation. Joining
a domain during installation requires the following:
Domain name Ask the domain administrator for the Domain Name System (DNS)
name for the domain that the computer will join. An example of a DNS-compatible
domain name is microsoft.com, in which microsoft is the name of the organization’s DNS identity.
Computer account Before a computer can join a domain, you must create a computer
account in the domain. You can ask a domain administrator to create the computer
2-8
Chapter 2
Installing Windows XP Professional
account before installation or, if you have been assigned the Add Workstations To
Domain right, you can create the computer account during installation. If you create
the computer account during installation, Setup prompts you for the name and password of a user account with authority to add domain computer accounts.
Available domain controller and a server running the DNS service (called the
DNS server) At least one domain controller in the domain that you are joining and
one DNS server must be online when you install a computer in the domain.
Joining a Workgroup
When you install Windows XP Professional on a computer, you can add that computer
to an existing workgroup. This process is referred to as joining a workgroup.
You can join a computer to a workgroup during installation simply by assigning a
workgroup name to the computer. The workgroup name you assign can be the name
of an existing workgroup or the name of a new workgroup that you create during
installation.
How to Ensure You Have the Necessary Information Before Installing
Windows XP Professional
Complete the following preinstallation checklist to ensure that you have all the necessary information available before you begin installing Windows XP Professional.
Task
Done
Verify that your components meet the minimum hardware requirements.
❑
Verify that all your hardware is listed in the Windows Catalog.
❑
Verify that the hard disk on which you will install Windows XP Professional has a
minimum of 1.5 GB of free disk space.
❑
Select the file system for the Windows XP Professional partition. Format this partition
with NTFS unless you need to dual boot operating systems with an operating system
that requires a FAT partition.
❑
Determine the name of the domain or workgroup that each computer will join. If the
computer joins a domain, write down the domain name in the DNS format:
server.subdomain.domain. If the computer joins a workgroup, use the
15-character NetBIOS naming convention: Server_name.
❑
Determine the name of the computer before installation.
❑
If the computer will join a domain, create a computer account in that domain. You can
create a computer account during installation if you have been granted the Add Workstations To Domain right.
❑
Determine a password for the Administrator account.
❑
Lesson 1
Preparing for Installation
2-9
How Microsoft Grants Software Licenses
A software license grants a user the right to run an application. Microsoft grants software licenses in one of three ways:
Full Packaged Product A Full Packaged Product is boxed software like you would
buy in a retail store. Full Packaged Products are intended for consumers who need
to purchase a small quantity of software licenses. When you install the Full Packaged Product version of Windows XP Professional, Setup asks you to enter a product ID (a 25-digit code found on the product packaging) during installation. You
must also activate Windows XP Professional after installation.
Original Equipment Manufacturer or System Builder Original Equipment Manufacturer (OEM) and System Builder licenses are acquired when you buy a computer that already has software installed. Typically, you do not have to activate this
type of license.
Volume Licensing Microsoft Volume Licensing programs are intended for consumers who need to purchase large quantities of software licenses, such as in a small
business or corporate environment. When a company has a volume license for
Windows XP Professional, the installation files are typically made available for
installation over the network. Product IDs and product activation are not required.
Practice: Prepare for Installation
In this practice, you will determine whether your computer meets the minimum
requirements specified by Microsoft to run Windows XP Professional and whether the
hardware in your computer is in the Windows Catalog. Complete the two exercises that
follow.
Exercise 1: Gather Information About Your Computer
1. From the Start menu, click Run.
2. In the Run dialog box, type msinfo32 and click OK.
3. The System Information utility opens to show a summary of your system. Use this
information to fill out the following table and determine whether your computer
meets the minimum hardware requirements.
2-10
Chapter 2
Installing Windows XP Professional
Component
Minimum Required
CPU
233 MHz Pentium- or AMD-compatible
Memory
64 MB RAM
Hard disk space
2GB hard disk with 1.5 GB free
disk space
Display
Super Video Graphics Array
(SVGA)–compatible (800 x 600)
Input devices
Keyboard and Microsoft mouse
(or other pointing device)
Other
CD-ROM or DVD-ROM
Your Computer
Exercise 2: Verify Your Hardware in the Windows Catalog
1. Locate the documentation that came with your computer, including any information about the motherboard, expansion cards, network adapters, video display
adapters, and sound cards.
2. Compare your findings with those in the Windows Catalog.
3. If any of your current hardware is not on the list, contact the manufacturer to
determine whether Windows XP supports the product.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What are the minimum and recommended memory requirements for installing
Windows XP Professional?
2. What is the minimum hard disk space required for installing Windows XP Professional? Choose the correct answer.
a. 500 MB
b. 1 GB
c. 1.5 GB
d. 2 GB
Lesson 1
Preparing for Installation
2-11
3. What information is required when joining a domain during the Windows XP Professional installation? Choose all that apply.
a. You must know the DNS name for the domain the computer will join.
b. You must have a user account in the domain.
c. At least one domain controller in the domain must be online when you install
a computer in the domain.
d. At least one DNS server must be online when you install a computer in the
domain.
4. Which of the following statements about file systems are correct? Choose all that
apply.
a. File- and folder-level security is available only with NTFS.
b. Disk compression is available with FAT, FAT32, and NTFS.
c. Dual booting between Windows 98 and Windows XP Professional is available
only with NTFS.
d. Encryption is available only with NTFS.
Lesson Summary
■
The first preinstallation task is to ensure that your hardware meets the hardware
requirements for installing Windows XP Professional.
■
The next preinstallation task is to ensure that your hardware is in the Windows
Catalog. Additional preinstallation tasks include determining how to partition the
hard disk on which you will install Windows XP Professional and deciding
whether to format the partition as NTFS, FAT, or FAT32.
■
Your computer can join a domain or a workgroup during or after installation.
2-12
Chapter 2
Installing Windows XP Professional
Lesson 2: Installing Windows XP Professional from a CD-ROM
This lesson covers the four-stage process of installing Windows XP Professional from a
CD-ROM. After you learn about these four stages, you will install Windows XP Professional on your computer.
After this lesson, you will be able to
■ Describe the Windows XP Professional setup process
■ Initiate text mode setup
■ Run the setup wizard
■ Install Windows XP Professional networking components
■ Explain how the installation process is completed
■ Describe the purpose of the Dynamic Update feature
Estimated lesson time: 70 minutes
Overview of Windows XP Professional Setup
The installation process for Windows XP Professional combines the Setup program
with wizards and informational screens. Installing Windows XP Professional from a
CD-ROM to a clean hard disk consists of these four stages:
Text mode setup During the text mode phase of installation, Setup prepares the
hard disk for the later installation stages and copies the files necessary to run the
Setup Wizard.
Setup Wizard The Setup Wizard requests setup information about the computer,
such as names, and passwords.
Network setup After gathering information about the computer, the Setup Wizard
prompts you for networking information and then installs the networking components that allow the computer to communicate with other computers on the network.
Completing the installation Setup copies files to the hard disk and configures the
computer. The system restarts after installation is complete.
The following sections cover the four stages in more detail.
How to Initiate Text Mode Setup
If a computer’s basic input/output system (BIOS) supports booting directly from CDROM, you can initiate text mode setup by inserting the Windows XP Professional installation CD-ROM in your CD-ROM drive and starting your computer. If a computer does
Lesson 2
Installing Windows XP Professional from a CD-ROM
2-13
not support booting from CD, you can create a set of floppy disks that will start the
computer and then initiate setup from the CD. After the installation has started, this
method proceeds just like booting from CD.
See Also
Microsoft makes the tools for creating boot floppy disks for Windows XP
Professional Edition and Windows XP Home Edition available for download. Visit http://
www.microsoft.com/downloads and search by using the keywords Windows XP boot floppy to
locate these utilities.
If a computer is already running a previous version of Windows, you can simply insert
the Windows XP installation CD and use a setup wizard to begin the installation. Setup
gives you the choice of upgrading the existing operating system or performing a clean
installation.
Figure 2-3 shows the six steps involved in the text mode stage of Setup.
Boot
1
Load Setup program into memory
2
Start text-based Setup program
3
Create the Windows XP Professional partition
4
Format the Windows XP Professional partition
5
Copy setup files to the hard disk
6
Restart the computer
Setup Wizard
F02us03
Figure 2-3
There are six steps in the text mode stage of Setup.
Running the Setup program involves the following steps:
1. After the computer starts, a minimal version of Windows XP Professional is copied
into memory. This version of Windows XP Professional starts the Setup program.
2. Setup then starts the text mode portion of Setup, which loads storage device drivers and then prompts you to read and accept a licensing agreement. If you have
a storage device for which Windows XP does not provide drivers, you can press
F6 during the initial setup and supply drivers for your device.
3. Setup prompts you to select the partition on which to install Windows XP Professional, as shown in Figure 2-4. You can select an existing partition or create a new
partition by using unpartitioned space on the hard disk.
2-14
Chapter 2
Installing Windows XP Professional
F02US04
Figure 2-4 Select the partition on which to install Windows XP Professional.
4. Setup prompts you to select a file system for the new partition. Next, Setup formats the partition with the selected file system.
5. Setup copies files to the hard disk and saves configuration information.
6. Setup restarts the computer and then starts the Windows XP Professional Setup
Wizard, the graphical user interface (GUI) portion of Setup. By default, the Setup
Wizard installs the Windows XP Professional operating system files in the C:\Windows folder.
How to Run the Setup Wizard
The graphical Windows XP Professional Setup Wizard leads you through the next stage
of the installation process. It gathers information about you, your organization, and
your computer, including the following information:
Regional settings Customize language, locale, and keyboard settings. You can configure Windows XP Professional to use multiple languages and regional settings.
See Also
You can add another language or change the locale and keyboard settings after
installation is complete. For more information, see Chapter 5, “Configuring Windows XP Professional.”
Name and organization Enter the name of the person and the organization to
which this copy of Windows XP Professional is licensed.
Computer name Enter a computer name of up to 15 characters. The computer name
must be different from other computer, workgroup, or domain names on the network. The Setup Wizard displays a default name (the organization name you
entered earlier in the process).
Lesson 2
Installing Windows XP Professional from a CD-ROM
2-15
Note
To change the computer name after installation is complete, click Start, click My Computer, and then click View System Information. In the System Properties dialog box, click the
Computer Name tab, and then click Change.
Password for Administrator account Specify a password for the Administrator
user account, which the Setup Wizard creates during installation. The Administrator account provides the administrative privileges required to manage the computer. Securely store this password in case you or another administrator at your
organization needs to use it later to access the computer.
Time and date Select the time zone, adjust the date and time settings if necessary,
and determine whether you want Windows XP Professional to automatically
adjust for daylight-savings time.
After you complete this step, the Setup Wizard starts to install the Windows networking
components.
How to Install Windows XP Professional Networking Components
After gathering information about your computer, the Setup Wizard guides you through
installing the Windows XP Professional networking components, as shown in Figure 2-5.
Networking
1
Detect network adapter cards
2
Select networking components
3
Join a workgroup or domain
4
Install components
Complete setup
F02us05
Figure 2-5
The Setup Wizard installs Windows networking components.
Installing Windows XP Professional networking components involves the following
steps:
1. Detect network adapter cards.
The Windows XP Professional Setup Wizard detects and configures any network
adapter cards installed on the computer. After configuring network adapters, it
attempts to locate a server running the Dynamic Host Configuration Protocol
(DHCP) service (called the DHCP server) on the network.
2. Select networking components.
The Setup Wizard prompts you to choose typical or customized settings for the
networking components it installs. The typical installation includes the following
options:
2-16
Chapter 2
Installing Windows XP Professional
❑
Client For Microsoft Networks
resources.
Allows your computer to access network
❑
File And Printer Sharing For Microsoft Networks Allows other computers to access file and print resources on your computer.
❑
QoS Packet Scheduler Helps provide a guaranteed delivery system for network traffic, such as Transmission Control Protocol/Internet Protocol (TCP/
IP) packets.
❑
Internet Protocol (TCP/IP) Allows your computer to communicate over
local area networks (LANs) and wide area networks (WANs). TCP/IP is the
default networking protocol.
Note You can install other clients, services, and network protocols during the Windows XP
Professional installation; or you can wait until after the installation has completed. You will
learn more about networking with TCP/IP in Chapter 13, “Supporting TCP/IP.”
3. Join a workgroup or domain.
If you choose to join a domain for which you have sufficient privileges, you can
create the computer account during installation. The Setup Wizard prompts you
for the name and password of a user account with authority to add domain computer accounts.
Note
To change the domain or workgroup for your computer after you have installed Windows XP Professional, click Start, click My Computer, click View System Information, click the
Computer Name tab, and then click Change.
4. Install components.
The Setup Wizard installs and configures the Windows networking components
you selected.
How the Installation Is Completed
After installing the networking components, the Setup Wizard automatically starts the
final step in the installation process. (See Figure 2-6.)
Lesson 2
Installing Windows XP Professional from a CD-ROM
2-17
Complete setup
1
Copy files
2
Configure the computer
3
Save the configuration
Remove temporary files
4
5
Restart the computer
Setup
complete
F02us06
Figure 2-6
Windows completes the installation with these steps.
To complete the installation, the Setup Wizard performs the following tasks:
Installs Start menu items
the Start menu.
Registers components
specified earlier.
The Setup Wizard sets up shortcuts that will appear on
The Setup Wizard applies the configuration settings that you
Saves the configuration The Setup Wizard saves your configuration settings to the
local hard disk. The next time you start Windows XP Professional, the computer
uses this configuration automatically.
Removes temporary files To save hard disk space, the Setup Wizard deletes any
files used for installation only.
Restarts the computer
installation.
The Setup Wizard restarts the computer. This finishes the
What Is Dynamic Update?
Dynamic Update is a feature of the Windows XP Professional Setup program that
allows you to download updated files that are used during the installation of Windows
XP. Setup uses Dynamic Update to query the Windows Update site prior to installing
Windows XP to obtain the following files:
Critical Updates Setup downloads any available replacements for files on the Windows XP Professional installation CD.
Device Drivers Setup also downloads any available hardware driver replacement
files for drivers found on the Windows XP Professional installation CD.
To use Dynamic Update during Setup, your computer must have a working Internet
connection. For this reason, Dynamic Update is available only when you start a clean
installation or upgrade from within an existing installation of Windows. When Setup
asks whether it should look for updates, click Yes to have Setup search for and install
available updates.
2-18
Chapter 2
Installing Windows XP Professional
Dynamic Update is also enabled by default during unattended installations. You will
learn more about unattended installations in Chapter 3, “Deploying Windows XP Professional.”
Important
Setup does not use Dynamic Update to download any updates that are not
already included on the installation CD, so even if you use Dynamic Update, you should still
use the Windows Update site or the Windows Automatic Updates feature to obtain critical
updates following installation. You will learn more about updating Windows in Lesson 6,
“Activating and Updating Windows XP Professional.”
Practice: Installing Windows XP Professional
In this practice, you install Windows XP Professional. In Exercise 1, you will install
Windows XP Professional from a CD-ROM onto a computer that contains no partitions
or operating systems by booting the computer using the CD-ROM. If your computer
does not boot from a CD-ROM or if there is already an operating system loaded on
your computer, go to Exercise 2 to install Windows XP Professional from a CD-ROM
without having to boot from the Windows XP Professional installation CD-ROM.
Exercise 1: Installing Windows XP Professional from a CD-ROM
1. Make sure that your computer is set up to start from the CD-ROM drive. If you are
not sure how to do this, consult your computer documentation for information
about accessing the BIOS settings.
2. Insert the Windows XP Professional installation CD into your CD-ROM drive and
restart the computer. When the computer restarts, the text mode portion of the
installation begins.
During this time, you will be asked if you need to install any third-party drivers.
You only have a few seconds to press the F6 key and install the drivers before the
installation continues.
Note
Some computers will require you to press a key to boot from the CD-ROM drive. If you
are prompted to press any key to boot from the CD, press the spacebar.
3. Windows loads a number of files needed for setup, and the Welcome To Setup
screen appears after a few minutes. You can use this screen to set up Windows XP
or to repair an existing installation. Press ENTER to continue with the installation.
4. The Windows XP Licensing Agreement appears. After reading the terms of the
license, press F8 to accept the terms and continue the installation. If you do not
accept the agreement, Setup does not continue.
Lesson 2
Installing Windows XP Professional from a CD-ROM
2-19
5. After you accept the Licensing Agreement, Setup proceeds to the Disk Partitioning
portion. If you have multiple partitions, Setup will list them and allow you to you
choose which one to install XP Professional to. If you have no partitions configured, you can create one at this point.
6. After you have determined which partition to install to, press ENTER to continue.
7. The Format screen appears, which is where you decide how the drive should be
formatted (FAT or NTFS). Select Format The Partition Using The NTFS File System
and press ENTER.
Caution
If you are planning on dual booting your computer with an operating system that
does not support NTFS, your C drive cannot be formatted with NTFS. You might want to install
Windows XP Professional in a different drive and format that drive with NTFS.
8. Setup displays a screen warning that formatting the disk will delete all files from
it. Press F to format the drive and continue.
9. After the format process is complete, Setup copies the files needed to complete
the next phase of the install process and then restarts the computer.
10. After the computer restarts, Setup enters the GUI mode portion of the installation.
11. Setup continues the installation for several minutes, and then displays the
Regional And Language Options page. Make sure that the settings are correct for
your area, and then click Next.
12. The Personalize Your Software page appears. Fill in the appropriate information
and click Next.
13. The Product Key entry page appears. Enter the 25-digit product ID and click Next.
14. The Computer Name And Administrator Password page appears. Enter a name for
your computer, choose a password for the Administrator account, and click Next.
15. The Date And Time Settings page appears. Make sure that the information is correct for your area and click Next.
If Setup detects an installed network adapter, Setup will install network components next.
16. The Network Settings page appears. You should select the Typical Settings option
if you want Setup to automatically configure networking components. Typical
components include Client For Microsoft Networks, File And Print Sharing For
Microsoft Networks, and TCP/IP. Click Next.
17. After you choose the network settings, Setup displays the Workgroup Or Computer Domain name page. Enter the appropriate information and click Next.
2-20
Chapter 2
Installing Windows XP Professional
18. After you click Next in the Workgroup Or Computer Domain page, Setup continues with the final portion of the installation. It might take from 15 to 60 minutes
for the process to finish. When the installation is complete, the computer restarts
and you are prompted to log on for the first time.
Exercise 2: Installing Windows XP Professional from an Existing Operating System
If your computer does not boot from a CD-ROM, or if there is already an operating system loaded on your computer, you can install Windows XP Professional from a CDROM without having to boot from the Windows XP Professional installation CD-ROM.
Important
If you have completed Exercise 1, do not do this practice.
1. If there is an operating system currently installed on your computer, start the computer, log on as an administrator, and insert the Windows XP Professional CDROM into the CD-ROM drive.
2. When the Welcome To Microsoft Windows XP page appears, click Install Windows XP.
3. If you see a Windows Setup message box indicating that the version of the operating system cannot be upgraded and that option to upgrade will not be available,
click OK.
4. On the Welcome To Setup page in the Installation Type box, click New Installation
(Advanced), and then click Next.
5. On the License Agreement page, read the license agreement, select I Accept This
Agreement, and then click Next.
6. On the Your Product Key page, type in your 25-character product key, and then
click Next.
7. The Setup Options page allows you to configure the following three options:
❑
Advanced Options Allows you to control where the installation files are
obtained, where the installation files are copied to, whether or not to copy all
installation files to the hard disk, and whether or not you want to specify the
drive letter and partition during Setup.
❑
Accessibility Options Gives you the option of using the Microsoft Magnifier during Setup to display an enlarged portion of the screen in a separate
window for users with limited vision and the option of using the Microsoft
Narrator to read the contents of the screen for users who are blind.
❑
Select The Primary Language And Region You Want To Use
to specify the primary language and region you use.
Allows you
Lesson 2
Installing Windows XP Professional from a CD-ROM
2-21
8. After you have configured any required Setup options, click Next.
9. Setup displays the Get Updated Setup Files dialog box. If your computer has
access to the Internet, you might want to ensure that the Yes, Download The
Updated Setup Files (Recommended) check box is selected, and then click Next.
Otherwise, select No, Skip This Step And Continue Installing Windows, and then
click Next.
10. If your partition is not currently formatted with Windows XP Professional NTFS,
the Setup Wizard displays the Upgrade To The Windows NTFS File System page.
If you get the Upgrade To The Windows NTFS File System page, ensure that Yes,
Upgrade My Drive is selected, and then click Next.
Caution If you plan to dual boot your computer with an operating system that does not support NTFS, your C drive cannot be formatted with NTFS. You might want to install Windows XP
Professional in a different drive, and then format that drive with NTFS. If you install Windows
XP Professional on a drive other than the C drive, you must be sure you are using the correct
drive for the rest of the practices in the training kit.
11. If you are installing an Evaluation Edition of Windows XP Professional, the Setup
Wizard displays the Setup Notification page, informing you that this is an evaluation version. If Setup displays the Setup Notification screen, press ENTER to continue.
12. On the Welcome To Setup page, press ENTER to install Windows XP Professional.
Note
You can also delete partitions at this time. If you have a C partition, you might not be
able to delete it because Setup has already loaded some files onto it. The partition you choose
to use must be at least 2000 MB in size. If you cannot use the C partition to install Windows XP
Professional, you must replace the C partition in all following practices in this training kit with
the appropriate partition, the one on which you install Windows XP Professional.
13. The Setup Wizard prompts you to select an area of free space on an existing partition to install Windows XP Professional. Select the C partition.
The Setup Wizard displays the following message: You Chose To Install Windows
XP On A Partition That Contains Another Operating System. Installing Windows
XP Professional On This Partition Might Cause The Other Operating System To
Function Improperly.
14. Press C to have Setup continue and use this partition.
2-22
Chapter 2
Installing Windows XP Professional
Caution
Depending on the operating system currently installed on the C partition, Setup
might display the following message: A Windows Folder Already Exists That May Contain A
Windows Installation. If You Continue, The Existing Windows Installation Will Be Overwritten. If
You Want To Keep Both Operating Systems, Press Esc And Specify A Different Folder To Use.
15. If you get a warning about a Windows folder already existing, press L to use the
folder and delete the installation in it.
If your partition was not formatted with NTFS and you choose to have the partition formatted as NTFS, Setup formats it as NTFS, and then copies files. Otherwise,
Setup examines the partition and then copies files.
16. The Setup Wizard reboots the computer and continues to copy files in GUI mode,
after which it displays the Regional And Language Options page. Select the appropriate system locale, user locale, and keyboard layout (or ensure that they are correct for your language and location), and then click Next.
17. Setup displays the Personalize Your Software page, prompting you for your name
and your organization name. The Setup Wizard uses your organization name to
generate the default computer name.
Many applications that you install later will use this information for product registration and document identification. In the Name text box, type your name. In the
Organization text box, type the name of your organization, and then click Next.
18. The Setup Wizard displays the Computer Name And Administrator Password page.
Type a name for the computer in the Computer Name text box.
Caution
If your computer is on a network, check with the network administrator before
assigning a name to your computer.
19. In the Administrator Password text box and in the Confirm Password text box,
type a password, and then click Next.
20. Depending on your computer configuration, the Setup Wizard might display the
Modem Dialing Information page. Configure the following information:
❑
Ensure that the correct country or region is selected.
❑
Type the correct area code or city code.
❑
If you dial a number to get an outside line, type the number.
❑
Ensure that the correct dialing tone is selected, and then click Next.
21. The Setup Wizard displays the Date And Time Settings page. If necessary, select
the time zone for your location from the Time Zone drop-down list, and adjust the
date and the time. Ensure that the Automatically Adjust Clock For Daylight Saving
Lesson 2
Installing Windows XP Professional from a CD-ROM
2-23
Changes check box is selected if you want Windows XP Professional to automatically adjust the time on your computer for daylight savings time, and then click
Next.
22. Ensure that Typical Settings is selected, and then click Next.
23. On the Workgroup Or Computer Domain page, ensure that the No, This Computer
Is Not On A Network, Or Is On A Network Without A Domain option is selected,
make sure that the workgroup name is Workgroup, and then click Next.
24. The Setup Wizard configures the networking components and then copies files,
installs Start menu items, registers components, saves settings, and removes temporary files. This process takes several minutes.
25. The computer restarts, and Windows XP Professional starts for the first time.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. If TCP/IP is installed on your computer, what is the maximum length for the computer name you specify during installation?
2. Can you change the computer name after installation without having to reinstall
Windows XP Professional? If you can change the name, how do you do it? If you
cannot change the name, why not?
3. Which of the following statements about joining a workgroup or a domain are correct? Choose all that apply.
a. You can add your computer to a workgroup or a domain only during installation.
b. If you add your computer to a workgroup during installation, you can join the
computer to a domain later.
c. If you add your computer to a domain during installation, you can join the
computer to a workgroup later.
d. You cannot add your computer to a workgroup or a domain during installation.
2-24
Chapter 2
Installing Windows XP Professional
4. When you install networking components with typical settings, what components
are installed? What does each component do?
Lesson Summary
■
If your computer does not support booting from a CD-ROM, you can install Windows XP Professional by booting another operating system first and then accessing the Windows XP Professional installation CD-ROM.
■
The Setup Wizard asks you to provide regional settings, your name and your organization’s name, a computer name, and a password for the Administrator account. It
also asks you to specify the time zone, time, and date; and to decide whether you
want Windows XP Professional to automatically adjust for daylight savings time.
■
Choosing to install networking components using typical settings installs the Client For Microsoft Networks, File And Printer Sharing For Microsoft Networks, and
TCP/IP.
■
You can customize the networking components during installation or any time
after installation.
Lesson 3
Installing Windows XP Professional over the Network
2-25
Lesson 3: Installing Windows XP Professional over the
Network
You can install Windows XP Professional over the network. This lesson discusses the
similarities and differences between installing from a CD-ROM and installing over the
network. The major difference is the location of the source files needed for installation.
This lesson also lists the requirements for an over-the-network installation.
After this lesson, you will be able to
■ Prepare for a network installation
■ Install Windows XP Professional over a network
■ Modify the setup process using Winnt.exe
■ Modify the setup process using Winnt32.exe
Estimated lesson time: 10 minutes
How to Prepare for a Network Installation
In a network installation, the Windows XP Professional installation files are located in
a shared location on a network file server, which is called a distribution server. From
the computer on which you want to install Windows XP Professional (the target computer), you connect to the distribution server, and then run the Setup program.
Figure 2-7 shows the requirements for a network installation.
Installation
files
Distribution
server
Target computer
Requirements for a network installation:
· Distribution server
· FAT partition on the target computer
· Network client
F02us07
Figure 2-7
A network client contacts a distribution server for installation files.
Installing Windows XP Professional requires you to do the following:
1. Locate a distribution server. The distribution server contains the installation files
from the I386 folder on the Windows XP Professional CD-ROM. These files reside in
a common network location in a shared folder that allows computers on the network to access the installation files. Contact a network administrator to obtain the
path to the installation files on the distribution server.
2-26
Chapter 2
Installing Windows XP Professional
Note After you have created or located a distribution server, you can use the over-the-network
installation method to concurrently install Windows XP Professional on multiple computers.
2. Create a FAT partition on the target computer. The target computer requires a formatted partition to copy the installation files to. Create a partition containing at
least 1.5 GB of disk space or more, and format it with the FAT file system.
3. Install a network client. A network client is software that allows the target computer to connect to the distribution server. On a computer without an operating
system, you must boot from a client disk that includes a network client that
enables the target computer to connect to the distribution server.
How to Install over the Network
The Setup program copies the installation files to the target computer and creates the
Setup boot disks. After Setup copies the installation files, you start the installation on
the target computer by booting from the Setup boot disks. From this point, you install
Windows XP Professional as you would from a CD-ROM.
Figure 2-8 shows the process for installing Windows XP Professional over the network.
Boot
1
Boot the network client
2
Connect to the distribution server
3
Run WINNT.EXE or WINNT32.EXE
4
Install Windows XP Professional
Setup
F02us08
Figure 2-8 Install Windows XP Professional over the network.
Installing Windows XP Professional over the network involves the following steps:
1. Boot the network client.
On the target computer, boot from a floppy disk that includes a network client or
start another operating system that can be used to connect to the distribution server.
2. Connect to the distribution server.
After you start the network client on the target computer, connect to the shared folder
on the distribution server that contains the Windows XP Professional installation files.
3. Run Winnt.exe or Winnt32.exe to start the Setup program.
Winnt.exe and Winnt32.exe reside in the shared folder on the distribution server.
❑
Use Winnt.exe for an installation using MS-DOS or Windows 3.0 or later versions on the source system.
❑
Use Winnt32.exe for an installation using Windows 95, Windows 98, Windows Me, Windows NT 4.0, or Windows 2000 Professional.
Lesson 3
!
Installing Windows XP Professional over the Network
2-27
Exam Tip
You can use Winnt.exe and Winnt32.exe to install Windows XP Professional from
the command line, using optional parameters to modify the installation. Winnt.exe runs under
MS-DOS and Windows 3.0/3.1. Winnt32.exe runs under the 32-bit Windows operating systems such as Windows 95, Windows 98, Windows Me, Windows NT 4.0, and Windows 2000.
Running Winnt.exe or Winnt32.exe from the shared folder does the following:
❑
Creates the $Win_nt$.~ls temporary folder on the target computer
❑
Copies the Windows XP Professional installation files from the shared folder
on the distribution server to the $Win_nt$.~ls folder on the target computer
4. Install Windows XP Professional.
Setup restarts the local computer and begins installing Windows XP Professional.
How to Modify the Setup Process Using Winnt.exe
You can modify an over-the-network installation by changing how Winnt.exe runs
Setup. Table 2-3 lists the parameters you can use with Winnt.exe and describes their
functions.
Table 2-3
Winnt.exe Parameters
Switch
Function
/a
Enables accessibility options.
/r[:folder]
Specifies an optional folder to be copied and saved. The folder remains
after Setup finishes.
/rx[:folder]
Specifies the optional folder to be copied. The folder is deleted after Setup
finishes.
/s[:sourcepath]
Specifies the source location of Windows XP Professional files. This must be
a full path of the form x:\[path] or \\server\share\[path]. The default is the
current folder location.
/t[:tempdrive]
Specifies a drive to contain temporary setup files and directs Setup to install
Windows XP Professional on that drive. If you do not specify a drive, Setup
attempts to locate the drive with the most available space.
/u[:script_file]
Performs an unattended installation by using an optional script file. Unattended installations also require using the /s switch. The answer file provides answers to some or all of the prompts that the end user normally
responds to during Setup.
/udf:id[,UDF_ file]
Indicates an identifier (id) that Setup uses to specify how a uniqueness
database file (UDF) modifies an answer file. The /udf parameter overrides
values in the answer file, and the identifier determines which values in the
UDF file are used. If you do not specify a UDF_ file, Setup prompts you to
insert a disk that contains the $UNIQUE$.UDB file.
2-28
Chapter 2
Installing Windows XP Professional
How to Modify the Setup Process Using Winnt32.exe
You can modify an over-the-network installation by changing how Winnt32.exe runs
Setup. Table 2-4 lists the parameters you can use with Winnt32.exe and describes their
functions.
Table 2-4
Winnt32.exe Parameters
Switch
Function
/checkupgradeonly
Checks your computer for upgrade compatibility for Windows XP
Professional. If you use this option with /unattend, no user input is
required. Otherwise, the results are displayed onscreen and you can
save them under the file name you specify.
For Windows 98 or Windows Me upgrades, the default filename is
Upgrade.txt in the %systemroot% folder (the folder that contains the
Windows XP Professional system files).
For Windows NT 4.0 or Windows 2000 upgrades, the default file
name is Ntcompat.txt in the %systemroot% folder.
/cmd:command_line
Specifies a specific command that Setup is to run. This command is
run after the computer restarts and after Setup collects the necessary
configuration information.
/cmdcons
Copies to the hard disk the additional files necessary to load a command-line interface, the Recovery Console, which is used for repair
and recovery. The Recovery Console is installed as a Startup option.
You can use the Recovery Console to stop and start services and to
access the local drive, including drives formatted with NTFS. You can
use this option only after you install Windows XP Professional.
/copydir:foldername
Creates an additional folder within the %systemroot% folder, which
contains the Windows XP Professional system files. For example, if
your source folder contains a folder called My_drivers, type /copydir:My_drivers to copy the My_drivers folder to your system folder.
You can use the /copydir switch to create as many additional folders
as you want. /copysource:foldername creates an additional folder
within the %systemroot% folder. Setup deletes folders created with
/copysource after installation is complete.
/debug[level] [:file_name] Creates a debug log at the specified level. By default, the debug log
file is C:\Winnt32.log, and the default level is 2. Includes the following levels:
■ 0 (severe errors)
■ 1 (errors)
■ 2 (warnings)
■ 3 (information)
■ 4 (detailed information for debugging)
Each level includes the level below it.
Lesson 3
Table 2-4
Installing Windows XP Professional over the Network
2-29
Winnt32.exe Parameters
Switch
Function
/dudisable
Prevents Dynamic Update from running. Without Dynamic Update,
Setup runs only with the original Setup files. This option disables
Dynamic Update even if you use an answer file and specify Dynamic
Update options in that file.
/dushare:pathname
Specifies a share on which you previously downloaded Dynamic
Update files (updated files for use with Setup) from the Microsoft
Download Center. When run from your installation share and used
with /duprepare, it prepares the updated files for use in networkbased client installations. When used without /duprepare and run on
a client, it specifies that the client installation will use the updated
files on the share specified in the path.
/duprepare:pathname
Prepares an installation share for use with Dynamic Update files that
you downloaded from the Microsoft Download Center. You can use
this share for installing Windows XP Professional for multiple clients
(used only with /dushare).
/m:foldername
Instructs Setup to copy replacement files from an alternate location.
Directs Setup to look in the alternate location first and, if files are
present, to use them instead of the files from the default location.
/makelocalsource
Instructs Setup to copy all installation source files to the local hard
disk. Use this switch when installing from a CD-ROM to provide
installation files when the CD-ROM is not available later in the installation.
/noreboot
Prevents Setup from restarting the computer after completing the filecopy phase. This allows you to execute another command.
/s:sourcepath
Specifies the source location of Windows XP Professional installation
files. To simultaneously copy files from multiple paths, use a separate
/s switch for each source path. If you type multiple /s switches, the
first location specified must be available or the installation will fail.
You can use a maximum of eight /s switches.
/syspart:[drive_letter]
Copies Setup startup files to a hard disk and marks the drive as active.
You can then install the drive in another computer. When you start
that computer, Setup starts at the next phase. Using /syspart requires
the /tempdrive switch. You can use /syspart on computers running
Windows NT 4.0, Windows 2000, Windows XP Professional, or Windows 2000 Server. You cannot use it on computers running Windows
95, Windows 98, or Windows Me.
/tempdrive:drive_letter
Places temporary files on the specified drive and installs Windows XP
Professional on that drive.
2-30
Chapter 2
Table 2-4
Installing Windows XP Professional
Winnt32.exe Parameters
Switch
Function
/udf:id[,udb_file]
Indicates an identifier (id) that Setup uses to specify how a UDF modifies an answer file. The UDF file overrides values in the answer file,
and the identifier determines which values in the UDF file are used.
For example, /udf:RAS_user, Our_company.udf overrides settings that
are specified for the RAS_user identifier in the Our_company.udf file.
If you do not specify a UDF file, Setup prompts you to insert a disk
that contains the $Unique$.udf file.
/unattend
Upgrades your previous version of Windows 98, Windows Me, Windows NT 4.0, or Windows 2000 in unattended mode (without user
input). Setup downloads the Dynamic Update files from Windows
Update and includes these files in the installation. All user settings are
taken from the previous installation, so no user intervention is
required during Setup.
/unatPerforms a fresh installation of Windows in unattended mode using
tend[num]:[answer_file] the specified answer file. Setup downloads the Dynamic Update files
from the Windows Update website and includes these files in the
installation. The specified num value indicates the number of seconds
between the time that Setup finishes copying the files and when Setup
restarts. You can use num on any computer running Windows 98,
Windows Me, Windows NT Workstation 4.0, Windows 2000, or Windows XP. The specified answer_file provides Setup with your custom
specifications.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. On which of the following operating systems running on the client computer do
you use Winnt32.exe to install Windows XP Professional? Choose all that apply.
a. Windows 3.0
b. Windows 95
c. Windows 98
d. Windows NT 4.0
Lesson 3
Installing Windows XP Professional over the Network
2-31
2. Which Windows XP Professional command allows you to verify that your computer is compatible with Windows XP Professional before you begin installing it?
3. You use the ______ switch with Winnt32.exe to prevent Setup from restarting the
computer after completing the file-copy phase.
4. You use the ___________ switch with Winnt32.exe to tell Setup to copy all installation source files to your local hard disk.
Lesson Summary
■
When you install Windows XP Professional, the main difference between an overthe-network installation and an installation from CD-ROM is the location of the
source files.
■
After you connect to the shared folder containing the source files and start
Winnt.exe or Winnt32.exe, the installation proceeds as an installation from CDROM.
■
Several switches for Winnt.exe and Winnt32.exe allow you to modify the installation process.
■
The /checkupgradeonly switch specifies that Winnt32.exe should check your
computer only for upgrade compatibility with Windows XP Professional.
2-32
Chapter 2
Installing Windows XP Professional
Lesson 4: Upgrading Earlier Versions of Windows to
Windows XP Professional
You can upgrade many earlier versions of Windows operating systems directly to Windows XP Professional. Before upgrading, however, you must do the following:
■
Ensure that the computer hardware meets the minimum Windows XP Professional
hardware requirements.
■
Check the Windows Catalog or test the computer for hardware compatibility using
the Windows XP Professional Compatibility tool. Using compatible hardware prevents problems when you start the upgrade on a large number of client computers.
After this lesson, you will be able to
■ Identify client upgrade paths to Windows XP Professional.
■ Generate a hardware compatibility report.
■ Upgrade earlier Windows client operating systems to Windows XP Professional.
Estimated lesson time: 10 minutes
Client Upgrade Paths
You can upgrade most client computers running earlier versions of Windows directly to
Windows XP Professional. However, computers running some earlier versions of Windows (including Windows 95, Windows NT 3.1, and Windows NT 3.5) require an additional step. Table 2-5 lists the Windows XP Professional upgrade paths for various
client operating systems.
Table 2-5
Windows XP Professional Upgrade Paths for Client Operating Systems
Upgrade From
Upgrade To
Windows NT 3.1, 3.5, or 3.51
Windows NT 4.0 Workstation first, and then upgrade to
Windows XP Professional
Windows 95
Windows 98 first, and then upgrade to
Windows XP Professional
Windows 98
Windows XP Professional
Windows Me
Windows XP Professional
Windows NT Workstation 4.0
with Service Pack 6 or later
Windows XP Professional
Windows 2000 Professional
Windows XP Professional
Windows XP Home Edition
Windows XP Professional
Lesson 4
Upgrading Earlier Versions of Windows to Windows XP Professional
2-33
Real World Upgrading Older Computers
Microsoft provides a number of upgrade paths to Windows XP Professional—
even from operating systems as old as Windows 95. However, although upgrades
from these operating systems are supported, it is unlikely that the computer hardware running the older operating systems will support Windows XP Professional.
Even if the hardware and applications on the computers prove compatible with
Windows XP Professional, it is not likely that the computers will run Windows XP
Professional or any modern applications with acceptable performance.
How to Generate a Hardware Compatibility Report
Before you upgrade a client computer to Windows XP Professional, ensure that it
meets the minimum hardware requirements by using the Windows XP Compatibility
tool to generate a hardware and software compatibility report. This tool runs automatically during the actual upgrade process, but running it before beginning the upgrade
should identify any hardware and software problems and allow you to fix compatibility
problems ahead of time.
Generating the Compatibility Report
To run the Windows XP Compatibility tool and generate a compatibility report, perform the following steps:
1. Insert the Windows XP Professional CD-ROM into the CD-ROM drive.
2. From the Start menu, select Run.
3. In the Run dialog box, type d:\i386\winnt32 /checkupgradeonly (where d is
the drive letter of your CD-ROM drive) and click OK.
Note Generating the upgrade report can take several minutes. The tool checks only for
compatible hardware and software, and generates a report that you can analyze to determine
the system components that are compatible with Windows XP Professional.
Reviewing the Report
The winnt32 /checkupgradeonly command generates a report that appears as a text
document, which you can view from within the Compatibility tool or save as a text file
and view with any text editor. The report documents the system hardware and software that are incompatible with Windows XP Professional. It also specifies whether
you need to obtain an upgrade pack for software installed on the system and recommends additional system changes or modifications to maintain functionality in Windows XP Professional.
2-34
Chapter 2
Installing Windows XP Professional
How to Upgrade Compatible Computers Running Windows 98
For client computers running Windows 98 that test as compatible with Windows XP
Professional, you can upgrade using a setup wizard or by running Winnt32.exe to complete the upgrade.
To upgrade a computer running Windows 98 to Windows XP Professional using
Winnt32.exe, complete the following steps:
1. Insert the Windows XP Professional CD-ROM in the CD-ROM drive.
2. The Autorun program on the Windows XP Professional CD-ROM displays the Welcome To Microsoft Windows XP screen.
Note If you do not want to use any switches with Winnt32.exe, click Install Windows XP and
follow the prompts on your screen. These steps are the same as Exercise 1 in Lesson 2,
“Installing Windows XP Professional from a CD-ROM.”
3. Open the Command Prompt window, type d:\i386\winnt32.exe with any
appropriate switches, and press ENTER.
4. Accept the license agreement.
5. If the computer is already a member of a domain, create a computer account in
that domain. Windows 98 clients do not require a computer account, but Windows
XP Professional clients do.
6. Provide upgrade packs for applications that need them. Upgrade packs update the
software to work with Windows XP Professional. These packs are available from
the software vendor.
7. Upgrade to NTFS when prompted. Select the upgrade if you do not plan to set up
the client computer to dual boot.
8. Continue with the upgrade if the Windows XP Professional Compatibility tool generates a report showing that the computer is compatible with Windows XP Professional. The upgrade finishes without further intervention, and adds your computer
to a domain or workgroup.
If the report shows that the computer is incompatible with Windows XP Professional,
terminate the upgrade process, and then upgrade your hardware or software.
How to Upgrade Compatible Computers Running Windows NT 4.0
The upgrade process for computers running Windows NT 4.0 is similar to the upgrade
process for computers running Windows 98. Before you perform the upgrade, use the
Windows XP Professional Compatibility tool to verify that the systems are compatible
with Windows XP Professional and to identify any potential problems.
Lesson 4
Upgrading Earlier Versions of Windows to Windows XP Professional
2-35
Windows NT 4.0 computers that meet the hardware compatibility requirements can
upgrade directly to Windows XP Professional. To upgrade a computer running Windows NT 4.0 to Windows XP Professional using Winnt32.exe, complete the following
steps:
1. Insert the Windows XP Professional CD-ROM in the CD-ROM drive. The Autorun
program on the Windows XP Professional CD-ROM displays the Welcome To
Microsoft Windows XP screen.
Note
If you do not want to use any switches with Winnt32.exe, click Install Windows XP and
follow the prompts on your screen. These steps are the same as those in Practice 2 in Lesson 2.
2. Open the Command Prompt window, type d:\i386\winnt32.exe with any
appropriate switches, and press ENTER.
3. On the Welcome To Windows page, in the Installation Type drop-down list, select
Upgrade, and then click Next.
4. On the License Agreement page, read the license agreement, click I Accept This
Agreement, and then click Next.
5. On the Product Key page, enter your 25-character product key, which is located
on the back of the Windows XP Professional CD-ROM case.
6. On the Windows XP Professional NTFS File System page, click Yes, Upgrade My
Drive, and then click Next.
7. After Setup copies installation files, the computer restarts and the upgrade finishes
without further user intervention necessary.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Which of the following operating systems can be upgraded directly to Windows
XP Professional? Choose all that apply.
a. Windows NT Workstation 4.0
b. Windows NT 3.51
c. Windows 2000 Professional
d. Windows NT Server 4.0
2-36
Chapter 2
Installing Windows XP Professional
2. How can you upgrade a computer running Windows 95 to Windows XP Professional?
3. Before you upgrade a computer running Windows NT 4.0 Workstation, which of
the following actions should you perform? Choose all that apply.
a. Create a 2 GB partition on which to install Windows XP Professional.
b. Verify that the computer meets the minimum hardware requirements.
c. Generate a hardware and software compatibility report.
d. Format the partition containing Windows NT 4.0 so that you can install Windows XP Professional.
4. How can you verify that your computer is compatible with Windows XP Professional and therefore can be upgraded?
Lesson Summary
■
Before you upgrade a client computer to Windows XP Professional, ensure that it
meets the minimum hardware requirements.
■
Use the Windows XP Professional Compatibility tool to generate a hardware and
software compatibility report.
■
For client systems that test as compatible with Windows XP Professional, run the
Windows XP Professional Setup program (Winnt32.exe) to complete the upgrade.
Lesson 5
Troubleshooting Windows XP Professional Setup
2-37
Lesson 5: Troubleshooting Windows XP Professional Setup
The best way to avoid problems when installing Windows XP Professional is to fully
prepare a computer for installation, choose the right kind of installation for your needs,
and make sure that the hardware in the computer is compatible with Windows XP Professional prior to beginning the installation. Although installations of Windows XP Professional complete without any problems most of the time, this lesson introduces you
to some common reasons why an installation might fail and what you can to do solve
the problem.
After this lesson, you will be able to
■ Identify common setup failures and their solutions.
■ Troubleshoot setup failures by using setup logs.
Estimated lesson time: 15 minutes
Guidelines for Resolving Common Problems
Fortunately, most installation problems are relatively minor issues that are simple to
correct. Table 2-6 lists some common installation problems and offers solutions to
those problems.
Table 2-6
Troubleshooting Tips
Problem
Solution
Media errors occur.
If you are installing from a CD-ROM, use a different CD-ROM. To
request a replacement CD-ROM, contact Microsoft or your vendor.
Try using a different computer and CD-ROM drive. If you can read
the CD-ROM on a different computer, you can perform an over-thenetwork installation. If one of your Setup disks is not working, try
using a different set of Setup disks.
CD-ROM drive is not
supported.
Replace the CD-ROM drive with a supported drive. If replacement is
impossible, try another installation method such as installing over
the network. After you complete the installation, install the driver
for the adapter card driver for the CD-ROM drive if it is available.
Computer cannot copy
files from the CD-ROM.
Test the CD-ROM on another computer. If you can copy the files
using a different CD-ROM drive on a different computer, use the CDROM to copy the files to a network share or to the hard drive of the
computer on which you want to install Windows XP Professional.
Sometimes, when you get an error stating that Setup cannot copy a
particular file, the problem can actually be a failed RAM module. If
you test the CD and CD-ROM drive successfully, testing your memory should be the next step.
2-38
Chapter 2
Table 2-6
Installing Windows XP Professional
Troubleshooting Tips
Problem
Insufficient disk space.
Solution
Do one of the following:
Use the Setup program to create a partition by using existing free space on the hard disk.
■ Delete and create partitions as needed to create a partition
that is large enough for installation.
■ Reformat an existing partition to create more space.
■
Verify that Windows XP supports the mass storage devices on the
Setup failure during
early text mode portion of computer. If not, press F6 when prompted and supply the necessary
drivers for these devices from floppy disk.
Setup.
Dependency service fails
to start.
In the Windows XP Professional Setup Wizard, return to the Network Settings page and verify that you installed the correct protocol
and network adapter. Verify that the network adapter has the proper
configuration settings, such as transceiver type, and that the local
computer name is unique on the network.
During Setup, the comWhen Setup attempts to write to the boot sector to make the hard
puter’s BIOS-based virus disk Windows XP-bootable, BIOS-based virus scanners might interscanner gives an error
pret the action as an attempt by a virus to infect the system. Disable
message indicating that a the virus protection in the BIOS and enable it again after Windows
virus is attempting to infect XP is fully installed.
the boot sector. Setup fails.
Setup cannot connect to
the domain controller.
Verify the following:
■ The domain name is correct.
■ The server running the DNS service and the domain controller are both running and online. If you cannot locate a
domain controller, install Windows XP Professional into a
workgroup and then join the domain after installation.
■ The network adapter card and protocol settings are set correctly. If you are reinstalling Windows XP Professional and
are using the same computer name, delete the computer
account and re-create it.
Windows XP Professional Verify the following:
■ Windows XP Professional is detecting all the hardware.
fails to install or start.
■ All the hardware is in the Windows Catalog. Try running
Winnt32 /checkupgradeonly to verify that the hardware is
compatible with Windows XP Professional.
Remove unsupported devices in an attempt to get past the error. If
you are unsure about which devices are unsupported, consider
removing all devices during the installation (except those necessary
to run the system, such as the motherboard, display adapter, memory, and so on) and then reconnecting them after Windows is
installed.
Lesson 5
Troubleshooting Windows XP Professional Setup
2-39
Guidelines for Troubleshooting Setup Failures Using the Windows XP
Setup Logs
During Setup, Windows XP Professional generates a number of log files containing
installation information that can help you resolve any problems that occur after Setup
is completed. The action log and the error log are especially useful for troubleshooting.
Both are located in the installation folder (C:\Windows by default).
Tip
The logs are text documents that you can view in Notepad, WordPad, or Word. Some of
the documents are very large. Consider searching the document for the word fail, which can
help you locate instances in the log files that contain information on failed operations.
Action Log
The action log records the actions that the Setup program performs in chronological
order. It includes actions such as copying files and creating Registry entries. It also contains entries that are written to the Setup error log. The action log is named Setupact.log. If an installation fails, you can often pinpoint what was going on (for
example, what file was being copied) when the installation failed. Searching the
Microsoft Knowledge Base using the description of the action as a keyword often
yields solutions to the problem at hand.
Error Log
The error log describes errors (and their severity) that occur during Setup. Because the
contents of this log are also included in the action log, you can think of the error log
as a subset of the action log. The error log is named Setuperr.log. If errors occur, the
log viewer displays the error log at the end of Setup. If no errors occurred during installation, this file is empty.
See Also
For additional information about troubleshooting installations, see Lesson 3,
“Using Startup and Recovery Tools,” in Chapter 4, "Modifying and Troubleshooting the Startup
Process."
Troubleshooting Stop Errors
Stop errors, also referred to as blue screen errors, occur when the system detects a
condition from which it cannot recover. The system stops responding and displays a
screen of information on a blue background. The most likely time during installation
that you might experience stop errors is when the text mode stage of setup has finished, your computer restarts, and the Setup Wizard stage begins. During this transi-
2-40
Chapter 2
Installing Windows XP Professional
tion, Windows XP loads the newly installed operating system kernel for the first time
and initializes new hardware drivers.
Stop errors are identified by a 10-digit hexadecimal number. The two most common
stop errors you will encounter during Windows XP installation are described as follows:
Stop: 0x0000000A Error This error usually indicates that Windows attempted to
access a particular memory address at too high an internal request level (IRQL).
This error usually occurs when a hardware driver uses an incorrect memory
address, but can also indicate an incompatible device driver or a general hardware
problem. To troubleshoot this error, confirm that your hardware is listed in the
Windows Catalog, make sure that your BIOS is compatible with Windows XP Professional, and perform general hardware troubleshooting. You can learn more
about troubleshooting this stop error by reading Microsoft Knowledge Base article
314063, “Troubleshooting a Stop 0x0000000A Error in Windows XP.”
Stop: 0x0000007B Error This error normally indicates that you have an inaccessible
boot device, meaning that Windows cannot access your hard disk. The common
causes for this type of error are a boot sector virus, bad or incompatible hardware,
or missing hardware drivers. You can learn more about troubleshooting this stop
error by reading Microsoft Knowledge Base article 324103, “How to Troubleshoot
‘Stop 0x0000007B’ Errors in Windows XP.”
Tip
Although these are the two most common Stop errors you will see during Windows XP
installation, you might encounter other Stop errors. If you get a Stop error, write down the
Stop error number. Search the Microsoft Knowledge Base using the number as your keyword,
and you can find information on how to resolve the error. You can learn more about troubleshooting Stop errors by reading the article “Windows Server 2003 Troubleshooting Stop
Errors,” which is available at http://www.microsoft.com/technet/prodtechnol/
windowsserver2003/operations/system/sptcestp.mspx. Although the article is written for
Windows Server 2003, it also applies to Windows XP.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
Lesson 5
Troubleshooting Windows XP Professional Setup
2-41
1. If you encounter an error during setup, which of the following log files should you
check? Choose all that apply.
a. Setuperr.log
b. Netsetup.log
c. Setup.log
d. Setupact.log
2. If your computer cannot connect to the domain controller during installation, what
should you do?
3. If your computer cannot connect to read the CD-ROM during installation, what
should you do?
Lesson Summary
■
The action log, Setupact.log, records and describes in chronological order the
actions that Setup performs.
■
The error log, Setuperr.log, describes errors that occur during Setup and indicates
the severity of each error.
■
If a failed installation results in a stop error, you can search the Microsoft Knowledge Base for information on troubleshooting the problem.
2-42
Chapter 2
Installing Windows XP Professional
Lesson 6: Activating and Updating Windows XP
Professional
After installing Windows XP for a home or small business user, you will need to activate Windows. Unless activated, Windows can only be used only for 30 days. Corporate installations typically do not need to be activated because most corporations use a
volume licensing system. You will also need to install any available updates and preferably configure Windows to download and install critical updates automatically.
After this lesson, you will be able to
■ Activate Windows XP following installation.
■ Scan a system and display available updates by using the Windows Update site.
■ Configure Automatic Updates to download and install updates automatically.
■ Explain the purpose of Software Update Services.
■ Explain the purpose of service packs.
Estimated lesson time: 30 minutes
Guidelines for Activating Windows Following Installation
Unless you are working with an installation that is part of a volume licensing plan,
Windows XP Professional requires that the operating system be activated with
Microsoft within 30 days of installation. Typically, if you install Windows XP Professional using an original installation CD, you need to activate it. If the operating system
is not activated within this time, Windows ceases to function until it is activated. You
are not allowed to log on to the system until you contact one of Microsoft’s product
activation centers.
The first time you log on to Windows following installation, Windows prompts you to
activate the product if activation is necessary. If you do not perform the activation,
Windows continues to prompt you at regular intervals until you activate the product.
Windows Product Activation (WPA) requires each installation to have a unique
product key. When you enter the 25-character product key during Windows installation, the Setup program generates a 20-character product ID (PID). During activation,
Windows combines the PID and a hardware ID to form an installation ID. Windows
sends this installation ID to a Microsoft license clearinghouse, where the PID is verified
to ensure that it is valid and that it has not already been used to activate another installation. If this check passes, the license clearinghouse sends a confirmation ID to your
computer, and Windows XP Professional is activated. If the check fails, activation fails.
Lesson 6
Activating and Updating Windows XP Professional
2-43
How to Scan a System and Display Available Updates Using the
Windows Update Site
Windows Update is an online service that provides enhancements to the Windows
family of operating systems. Product updates such as critical and security updates, general Windows updates, and device driver updates are all easily accessible. When you
connect to the Windows Update website, the site scans your system (a process that
happens locally without sending any information to Microsoft) to determine what is
already installed, and then presents you with a list of available updates for your system.
You can access Windows Update in the following ways:
■
Through Internet Explorer by clicking Windows Update from the Tools menu
■
Through any Web browser by using the URL http://www.microsoft.com/windowsupdate
■
Through the Help And Support Center by clicking Windows Update
■
Through the Start menu by clicking All Programs and then Windows Update
■
Through Device Manager by clicking Update Driver in the Properties dialog box
of any device
Using the Windows Update Site
To perform an Express Install from the Windows Update site, follow these steps:
1. From the Start menu, click All Programs, and then click Windows Update.
2. On the Microsoft Windows Update website, click Express Install.
3. After the scan is complete (a process that is performed locally—no information is
sent to Microsoft’s servers), click Install.
4. If you are prompted with an End User License Agreement (EULA), read the agreement and click I Accept.
5. Wait while the updates are downloaded and installed. If you are prompted to
restart your computer, click Restart Now. If you are not prompted to restart, click
Close.
How to Configure Automatic Updates
Windows XP also supports Automatic Updates, a feature that automatically downloads and installs new updates when they become available. You should configure the
Automatic Updates feature in Windows XP to automatically download and install new
updates according to a regular schedule.
To configure Automatic Updates, follow these steps:
2-44
Chapter 2
Installing Windows XP Professional
1. From the Start menu, click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click System.
4. On the Automatic Updates tab, click the Automatic option, as shown in Figure 2-9.
5. Select how often and at what time of day updates should be downloaded and
installed. For users with dedicated connections (such as a cable modem), you
should configure Windows to check for updates daily at a time when the user is
not using the computer. Users with dial-up connections might want to check less
frequently if they are concerned about allowing their computers to connect to the
Internet automatically.
F02US09
Figure 2-9 You should schedule Automatic Updates to download and install
updates automatically.
6. Click OK.
!
Exam Tip
Enabling Automatic Update and configuring it to download and install updates
automatically according to a preset schedule is the recommended way for handling critical
updates for Windows XP.
What Is Software Update Services?
By default, Automatic Updates locates and downloads updates from Microsoft’s public
update servers. As an alternative, you can configure an update service to run on the
local network and supply updates to clients. This procedure provides better control
over the specific updates made available to client computers.
Lesson 6
Activating and Updating Windows XP Professional
2-45
Software Update Services (SUS) is a server component installed on a Windows 2000 or
Windows 2003 server inside the corporate firewall. SUS allows for the distribution of critical updates and security updates; it does not allow the distribution of Service Packs or
driver updates, and it does not have a mechanism to deploy software packages outright.
SUS synchronizes with the public Windows Update site at Microsoft on behalf of your
clients. SUS, which is designed to support up to 15,000 clients, serves as a distribution
point of updates to the clients in your organization in two ways:
Automatically You can create an automatic content distribution point on the SUS
server that will synchronize its content with the content from the Windows Update
website. This option offers clients the same updates as the public server, but cuts
down on Internet traffic by providing the updates locally.
Manually You can also create a content distribution point on a server running
Microsoft Internet Information Services (IIS) version 5.0 or later. This option lets
you specify which updates are available.
You can also control which server each Windows client connects to for updates (if you
are running more than one SUS server across multiple sites), as well as schedule when
the client should perform the installations of critical updates.
Installing SUS
You can install the Software Update Services server component on a server running
either Windows 2000 Server or Windows Server 2003. The computer should meet the
following system requirements:
■
Pentium III 700 MHz or better processor
■
512 MB of RAM
■
6 GB of available hard disk space formatted with NTFS
■
Windows 2000 Server (with Service Pack 2 or later) or Windows Server 2003
■
IIS 5.0 or later
■
Internet Explorer 6.0 or later
The SUS component is available for download from (http://www.microsoft.com/
windows2000/windowsupdate/sus/default.asp). After the download is complete, double-click the setup file to begin the installation process and simply follow the menu
prompts for a Typical installation (a Custom installation lets you choose the folder
where the service is installed and the location where updates are stored).
To Use Group Policy to Configure Clients to Access SUS
After SUS is installed in your environment, you need to configure the client systems to
use it—otherwise, they will just keep using the Windows Update public server instead.
2-46
Chapter 2
Installing Windows XP Professional
You must use Group Policy to configure clients to use the SUS server. You can set the
policy at either the domain or organizational unit level. Group Policy is explained in
more detail in Chapter 16, “Configuring Security Settings and Internet Options.”
To set the Group Policy, follow these steps:
1. Log on as a domain administrator or open the Active Directory Users And Computers tool using the Run As command to enter the appropriate credentials.
2. Right-click the domain or organizational unit and choose Properties from the
shortcut menu.
3. Switch to the Group Policy tab.
4. You could edit the default domain policy, but it is normally recommended that
you create another one for these types of secondary settings. To do this, choose
the New button and name the new policy that appears in the window.
5. After you have named the policy, click the Edit button to open the Group Policy
Object Editor window.
6. Expand the Computer Configuration node, then the Administrative Templates
node, then the Windows Components node, and then the Windows Update node.
7. Double-click the Configure Automatic Updates setting to specify any of the following:
❑
Notify The User Before Download And Before Installation
❑
Automatically Download And Notify The User Before Installation
❑
Automatically Download And Schedule An Automatic Installation
8. Double-click the Specify Intranet Microsoft Update Service Location setting.
Change the setting to Enabled and enter the name of the internal SUS server that
the clients in the domain should use into both fields. This information can be
entered by name or by IP address.
9. Double-click the Reschedule Automatic Updates scheduled installations setting to
change the schedule for automatic installation on clients.
10. Double-click the No Auto-Restart For Scheduled Automatic Updates installations
to prevent clients from restarting after an automatic installation.
Note
After Automatic Updates is configured by Group Policy, the Automatic Updates settings become unavailable to the user of the client computer.
What Are Service Packs?
Microsoft periodically releases service packs for Windows XP. A service pack is a collection of all updates released to that point, and often includes new features, as well.
Lesson 6
Activating and Updating Windows XP Professional
2-47
You should be familiar with the deployment of service packs to ensure that all operating systems on the network are up-to-date and to avoid issues that you might encounter in the future.
Windows XP ships with a utility called Winver.exe, which you can use to determine
what version of Windows you are running and what level of service pack (if any) is
installed. Figure 2-10 displays the output of Winver.exe prior to any service pack being
installed. If a service pack has been installed, the version will be noted after the build
number.
F02US10
Figure 2-10
Use Winver.exe to determine the current Windows version and service pack.
To Obtain a Service Pack
Service packs are free, and you can get them in the following ways:
■
Use Windows Update to update a single computer with a service pack.
■
Download the service pack from Windows Update to deploy to many computers.
The download is a single large self-extracting executable, which will have a different name depending on the service pack version that you are installing. The file is
quite large (85 MB or more), so be sure that you have sufficient bandwidth available to support the download.
■
Order the service pack CD. You can order the service pack CD from Microsoft for
a nominal fee that covers the cost of manufacture and shipping. In addition to
containing the service pack, the CD contains operating system enhancements and
other advanced utilities.
■
Use Microsoft subscription services. Microsoft has several subscription services,
such as Microsoft TechNet, which automatically provide you with service packs
with the next issue after the release of the service pack.
2-48
Chapter 2
Installing Windows XP Professional
To Install a Service Pack
Service pack setup programs can have various names, though most Windows Service
Packs use a program named Update.exe. Regardless of the file name, though, most
Windows updates support the same command-line parameters, which control how the
service pack deploys. Table 2-7 lists these parameters.
Table 2-7
Common Command-Line Parameters for Windows Updates
Switch
Function
/f
Forces all applications to close prior to restarting the system.
/n
Does not back up uninstall files. You cannot uninstall the service
pack if this switch is used.
/o
Overwrites OEM-provided files without prompting the user.
/q
Installation runs in quiet mode with no user interaction required
(requires /o to update OEM-supplied files).
/s:[path to
distribution folder]
Creates an integration installation point.
/u
Unattended installation (requires /o to update OEM-supplied files).
/x
Extracts files without starting Setup. This is useful if you want to
move installation files to another location.
/z
Disables automatic restart when installation is finished.
Service pack installations require a significant amount of disk space (hundreds of
megabytes). The uninstall folder consumes the majority of this disk space. You can
install a service pack without saving uninstall files by using the /n switch when installing the service pack.
You must choose an installation method from the following options:
Update installation The service pack executable is started locally, across the network, or through Windows Update. The service pack is installed on the existing
operating system.
Integrated installation Also called slipstreaming, an integrated installation is one in
which the service pack is applied to the installation files on a distribution server
using the /s switch, integrating the installation files and the service pack into a single set of updated installation files. New installations that included the service
pack can then be performed from the integrated distribution point. This eliminates
the need to apply the service pack after the installation. However, the service pack
cannot be uninstalled if it is applied in this fashion.
Combination installation This involves installation using a combination of an integrated installation, an answer file to control the installation process, and a Cmdlines.txt file to launch additional application setup programs after the operating
system setup has completed.
Lesson 6
Activating and Updating Windows XP Professional
2-49
When you install new operating system components after a service pack has been
installed, Setup requires both the operating system and service pack installation files.
This allows Setup to install the updated version of the component.
To Uninstal a Service Pack
By default, the service pack setup program automatically creates a backup of the files and
settings that are changed during the service pack installation and places them in an uninstall folder named \$NTServicepackUninstall$\ in %systemroot%. You can uninstall the
service pack through Add/Remove Programs on Control Panel or from a command line by
running Spuninst.exe from the %systemroot%\$NTServicepackUninstall\Spuninst\ folder.
Note
If you installed a service pack without creating a backup, you cannot uninstall the service pack.
Practice: Configuring Automatic Updates
In this practice, you will configure Automatic Updates to download and install critical
updates automatically.
1. From the Start menu, click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click System.
4. On the Automatic Updates tab, click the Automatic option.
5. Click OK.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. A(n) _______________ is a collection of all updates released to a particular point,
and often includes new features.
2. What is the recommended way to configure the Automatic Updates feature in
Windows XP?
2-50
Chapter 2
Installing Windows XP Professional
3. For how many days does Windows XP function if you do not activate Windows or
are not part of a volume licensing agreement? Choose the correct answer.
a. 10 days
b. 14 days
c. 30 days
d. 60 days
e. 120 days
Lesson Summary
■
You can use the Windows Update site to scan a computer and display available
critical, Windows, and driver updates.
■
Automatic Updates is a Windows XP feature that downloads and installs critical
updates automatically. Although you can specify that Automatic Updates prompt
users before downloading or installing, Microsoft recommends that you configure
it to download and install automatically according to a preset schedule.
■
Service packs are collections of updates (and sometimes new features) that have
been tested to ensure that they work together correctly. Microsoft occasionally
issues new service packs for its products.
Case Scenario Exercises
Read the following two scenarios and answer the associated questions. You can use
the scenarios to help determine whether you have learned enough to move on to the
next chapter. If you have difficulty completing this work, review the material in this
chapter before beginning the next chapter. You can find answers to these questions in
the “Questions and Answers” section at the end of this chapter.
Scenario 2.1
You have been given a computer running Windows 98 Second Edition with the following hardware installed:
■
200 MHz Pentium II processor
■
32 MB of RAM
■
4 GB hard disk, 500 MB free
■
24x CD-ROM drive
Case Scenario Exercises
■
Floppy drive, mouse, keyboard
■
SVGA monitor and video card
■
10 Mbps Ethernet network card
2-51
You will reformat the hard disk, create one partition that uses the entire hard disk, and
install Windows XP Professional.
Question
What additional hardware do you need to install onto the computer prior to installing
Windows XP?
Scenario 2.2
One of your users wants you to install Windows XP Professional on his workstation.
Currently, the workstation is running Windows 98. The user wants to continue having Windows 98 running on the computer because he often must test the software
he develops on that system. The user’s computer is configured with the following
hardware:
■
2.4 GHz Pentium 4 processor
■
512 MB of RAM
■
60 GB hard disk
There are currently 2 partitions on the hard disk: a 20 GB partition on which Windows 98 and the user’s current applications are installed and a 15 GB partition on
which the user stores his documents. Both partitions are formatted using the
FAT32 file system. There is 25 GB of unpartitioned space.
■
24x CD-ROM drive
■
Floppy drive, mouse, keyboard
■
SVGA monitor and video card
■
10 Mbps Ethernet network card
2-52
Chapter 2
Installing Windows XP Professional
Question
How should you configure this computer to run both Windows 98 and Windows XP
Professional?
Troubleshooting Lab
Read the following troubleshooting scenario and then answer the question that follows. You can use this lab to help determine whether you have learned enough to
move on to the next chapter. If you have difficulty completing this work, review the
material in this chapter before beginning the next chapter. You can find the answer to
this question in the “Questions and Answers” section at the end of this chapter.
Scenario
One of your users is attempting to upgrade to Windows XP Professional on a computer
that has been running Windows 98. Her computer has one hard disk that is configured
with a single partition. She has already backed up her computer and plans to reformat
the partition, and then perform a clean installation of Windows XP Professional. She
has configured her BIOS to start the computer from CD-ROM. When she starts the computer, the text mode stage of Windows XP Professional Setup begins as expected.
However, when the user tries to reformat the partition, her computer presents an error
message stating that a virus is attempting to infect the boot sector of her hard disk. She
is certain that she is using a genuine Windows XP Professional installation CD.
Question
What do you suspect is the problem?
Exam Highlights
2-53
Chapter Summary
■
Before installing Windows XP Professional, you should first ensure that your hardware meets the minimum hardware requirements and that your hardware is in the
Windows Catalog. Additional preinstallation tasks include determining how to
partition the hard disk on which you will install Windows XP Professional and
deciding whether to format the partition as NTFS, FAT, or FAT32.
■
Your computer can join a domain or a workgroup during or after installation.
■
When you install Windows XP Professional, the main difference between an overthe-network installation and an installation from CD-ROM is the location of the
source files.
■
After you connect to the shared folder containing the source files and start
Winnt.exe or Winnt32.exe, the installation proceeds as an installation from CDROM. Several switches for Winnt.exe and Winnt32.exe allow you to modify the
installation process. The /checkupgradeonly switch specifies that Winnt32.exe
should check your computer only for upgrade compatibility with Windows XP
Professional.
■
Before you upgrade a client computer to Windows XP Professional, use the Windows XP Professional Compatibility tool to generate a hardware and software
compatibility report. For client systems that test as compatible with Windows XP
Professional, run the Windows XP Professional Setup program (Winnt32.exe) to
complete the upgrade.
■
The Setupact.log action log records and describes in chronological order the
actions that Setup performs. The Setuperr.log error log describes errors that occur
during Setup and indicates the severity of each error.
■
You can use the Windows Update site to scan a computer and display available
critical, Windows, and driver updates. Automatic Updates is a Windows XP feature
that downloads and installs critical updates automatically. Although you can specify that Automatic Updates prompt users before downloading or installing,
Microsoft recommends that you configure it to download and install automatically
according to a preset schedule. Service packs are collections of updates (and
sometimes new features) that have been tested to ensure that they work together
correctly. Microsoft issues new service packs for its products occasionally.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
2-54
Chapter 2
Installing Windows XP Professional
Key Points
■
You should memorize the basic hardware requirements for running Windows XP.
A 233MHz processor, 64MB RAM, and a 2GB hard disk with 1.5GB of free space
are required.
■
Unless you are installing Windows XP Professional on a multiple-boot computer
that also has an operating system that cannot access NTFS partitions (such as Windows 98), you should always use NTFS.
■
You can use Winnt.exe and Winnt32.exe to install Windows XP Professional from
the command line by using optional parameters to modify the installation.
Winnt.exe runs under MS-DOS and Windows 3.0/3.1. Winnt32.exe runs under the
32-bit Windows operating systems such as Windows 95, Windows 98, Windows
Me, Windows NT 4.0, and Windows 2000.
Key Terms
Automatic Update A feature that automatically downloads and installs new updates
when they become available.
boot partition The disk partition that possesses the system files required to load the
operating system into memory.
disk partition A logical section of a hard disk on which the computer might write
data.
File Allocation Table (FAT) A file system used in older versions of Windows and
still supported in Windows XP Professional. The 16-bit FAT system for older versions of Windows is called FAT16, and the 32-bit system for newer versions of
Windows is called FAT32.
Files And Settings Transfer Wizard One of two methods used by administrators to
transfer user configuration settings and files from systems running Windows 95 or
later to a clean Windows XP installation.
NTFS The native file management system for Windows XP. However, Windows XP is
also capable of working with FAT and FAT32 file systems so that it can remain
compatible with older Microsoft operating systems.
service pack A collection of all updates for a Microsoft product released to a certain
point. Service packs sometimes include new features, as well.
stop errors Occur when the system detects a condition from which it cannot
recover. (Also referred to as blue screen errors.)
Exam Highlights
2-55
system partition Normally the same partition as the boot partition, this partition
contains the hardware-specific files required to load and start Windows XP.
User State Migration Tools (USMT) Tools that let administrators transfer user configuration settings and files from systems running Windows 95 or later to a clean
Windows XP installation.
Windows Catalog A site that lists all hardware and software tested for compatibility
with Windows XP by Microsoft.
Windows Product Activation (WPA) The process of activating a copy of Windows
with Microsoft after installation. Windows XP Professional requires that the operating system be activated with Microsoft within 30 days of installation.
Windows Update An online service that provides enhancements to the Windows
family of operating systems.
Winnt.exe The command used for starting Windows XP Professional installation in
MS-DOS and Windows 3.0/3.1.
Winnt32.exe The command used for starting Windows XP Professional installation
in Windows 95, Windows 98, Windows Me, Windows NT 4.0, or Windows 2000
Professional.
2-56
Chapter 2
Installing Windows XP Professional
Questions and Answers
Lesson 1 Review
Page
2-10
1. What are the minimum and recommended memory requirements for installing
Windows XP Professional?
The minimum amount of memory required to install Windows XP Professional is 64 MB, and the
recommended amount of memory is 128 MB.
2. What is the minimum hard disk space required for installing Windows XP Professional? Choose the correct answer.
a. 500 MB
b. 1 GB
c. 1.5 GB
d. 2 GB
C is the correct answer. Windows XP Professional requires 1.5 GB of free disk space.
3. What information is required when joining a domain during the Windows XP Professional installation? Choose all that apply.
a. You must know the DNS name for the domain the computer will join.
b. You must have a user account in the domain.
c. At least one domain controller in the domain must be online when you install
a computer in the domain.
d. At least one DNS server must be online when you install a computer in the
domain.
A, C, and D are correct. To join a domain during the installation of Windows XP Professional, you
must know the DNS name for the domain the computer will join. To add an account for the computer to the domain, a domain controller must be available. Also, a DNS server must be available so that the computer on which you are installing Windows XP can locate the domain
controller for the domain. B is not correct because you do not need to have a user account to
join a computer to a domain. However, the computer must already have an account in the
domain, or you must have sufficient privileges in the domain so that you can create a computer
account during the installation.
4. Which of the following statements about file systems are correct? Choose all that
apply.
a. File- and folder-level security is available only with NTFS.
b. Disk compression is available with FAT, FAT32, and NTFS.
Questions and Answers
2-57
c. Dual booting between Windows 98 and Windows XP Professional is available
only with NTFS.
d. Encryption is available only with NTFS.
A and D are correct. NTFS provides file-level security and encryption. B is not correct because
only NTFS offers disk compression; FAT and FAT32 do not. C is not correct because Windows 98
cannot access a drive formatted with NTFS.
Lesson 2 Review
Page
2-22
1. If TCP/IP is installed on your computer, what is the maximum length for the computer name you specify during installation?
63 characters
2. Can you change the computer name after installation without having to reinstall
Windows XP Professional? If you can change the name, how do you do it? If you
cannot change the name, why not?
Yes. To change the computer name after installation is complete, click Start, click My Computer, click View System Information, click the Computer Name tab, and then click Change.
3. Which of the following statements about joining a workgroup or a domain are correct? Choose all that apply.
a. You can add your computer to a workgroup or a domain only during installation.
b. If you add your computer to a workgroup during installation, you can join the
computer to a domain later.
c. If you add your computer to a domain during installation, you can join the
computer to a workgroup later.
d. You cannot add your computer to a workgroup or a domain during installation.
B and C are correct. You can join a domain or a workgroup during installation or at any time following installation. A and D are not correct because you can join a domain or workgroup during
or after installation.
4. When you install networking components with typical settings, what components
are installed? What does each component do?
There are four components. Client For Microsoft Networks allows your computer to access network resources. File And Printer Sharing For Microsoft Networks allows other computers to
access file and print resources on your computer. The QoS Packet Scheduler helps provide a
guaranteed delivery system for network traffic, such as TCP/IP packets. TCP/IP is the default
networking protocol that allows your computer to communicate over LANs and WANs.
2-58
Chapter 2
Installing Windows XP Professional
Lesson 3 Review
Page
2-30
1. On which of the following operating systems running on the client computer do
you use Winnt32.exe to install Windows XP Professional? Choose all that apply.
a. Windows 3.0
b. Windows 95
c. Windows 98
d. Windows NT 4.0
B, C, and D are correct. A is not correct because you use the Winnt.exe command with MS-DOS
and Windows 3.0.
2. Which Windows XP Professional command allows you to verify that your computer is compatible with Windows XP Professional before you begin installing it?
Winnt32.exe with the /checkupgradeonly switch
3. You use the ______ switch with Winnt32.exe to prevent Setup from restarting the
computer after completing the file-copy phase.
/noreboot
4. You use the ___________ switch with Winnt32.exe to tell Setup to copy all installation source files to your local hard disk.
/makelocalsource
Lesson 4 Review
Page
2-35
1. Which of the following operating systems can be upgraded directly to Windows
XP Professional? Choose all that apply.
a. Windows NT Workstation 4.0
b. Windows NT 3.51
c. Windows 2000 Professional
d. Windows NT Server 4.0
A and C are correct. B is not correct because you must first upgrade Windows NT 3.51 to Windows NT 4.0 Workstation, and then upgrade to Windows XP Professional. D is not correct
because you cannot upgrade to Windows XP Professional from a server product.
2. How can you upgrade a computer running Windows 95 to Windows XP Professional?
Upgrade the computer to Windows 98 first, and then upgrade to Windows XP Professional.
3. Before you upgrade a computer running Windows NT 4.0 Workstation, which of
the following actions should you perform? Choose all that apply.
a. Create a 2 GB partition on which to install Windows XP Professional.
Questions and Answers
2-59
b. Verify that the computer meets the minimum hardware requirements.
c. Generate a hardware and software compatibility report.
d. Format the partition containing Windows NT 4.0 so that you can install Windows XP Professional.
B and C are correct. A is not correct because you do not need to create a new partition to
upgrade the operating system. D is not correct because you should not reformat the partition
containing Windows NT 4.0 in order to perform an upgrade. If you did reformat, you would lose
all data, including current configuration information and installed applications.
4. How can you verify that your computer is compatible with Windows XP Professional and therefore can be upgraded?
Use the Windows XP Professional Compatibility tool. You can start this tool by typing winnt32
/checkupgradeonly at the command prompt.
Lesson 5 Review
Page
2-40
1. If you encounter an error during setup, which of the following log files should you
check? Choose all that apply.
a. Setuperr.log
b. Netsetup.log
c. Setup.log
d. Setupact.log
A and D are correct. During installation, Windows XP Professional Setup creates an action log
(Setupact.log) and an error log (Setuperr.log). B and C are not correct because they are not
valid installation log files.
2. If your computer cannot connect to the domain controller during installation, what
should you do?
First, verify that a domain controller is running and online, and then verify that the server running the DNS service is running and online. If both servers are online, verify that the network
adapter card and protocol settings are correctly set and that the network cable is plugged into
the network adapter card.
3. If your computer cannot connect to read the CD-ROM during installation, what
should you do?
Use a different CD-ROM. (To request a replacement CD-ROM, contact Microsoft or your vendor.)
You can also try using a different computer and CD-ROM drive. If you can read the CD-ROM on
a different computer, you can do an over-the-network installation.
Lesson 6 Review
Page
2-49
1. A(n) _______________ is a collection of all updates released to a particular point,
and often includes new features.
service pack
2-60
Chapter 2
Installing Windows XP Professional
2. What is the recommended way to configure the Automatic Updates feature in
Windows XP?
Microsoft recommends that you configure Automatic Updates to download and install updates
automatically according to a preset schedule.
3. For how many days does Windows XP function if you do not activate Windows or
are not part of a volume licensing agreement? Choose the correct answer.
a. 10 days
b. 14 days
c. 30 days
d. 60 days
e. 120 days
C is correct. Windows functions normally for 30 days following installation. If you do not activate Windows within 30 days of installation, you cannot start Windows until you activate it.
Case Scenario Exercises: Scenario 2.1
Page
2-50
What additional hardware do you need to install onto the computer prior to installing
Windows XP?
According to the minimum requirements for installing Windows XP Professional, you would
need to upgrade the processor to at least a 233 MHz processor. Ideally, though, if you want to
upgrade this processor, you should consider upgrading to something significantly faster.
Although Windows XP Professional also requires a minimum of 64 MB RAM, 128 MB of RAM is
recommended for adequate performance.
Case Scenario Exercises: Scenario 2.2
Page
2-51
How should you configure this computer to run both Windows 98 and Windows XP
Professional?
You can install Windows XP Professional either by starting the installation from within Windows
98 or by starting the system using the Windows XP installation CD. You should create a new
partition from the unpartitioned space on which to install Windows XP Professional. You should
probably format the new partition using the FAT 32 file system. If you format the partition using
NTFS, Windows 98 cannot access any data on that partition.
Troubleshooting Lab
Page
2-52
What do you suspect is the problem?
Because Setup is failing when trying to write to the boot sector of the disk (which happens
when Setup tries to reformat the disk), it is likely that the user’s computer has virus detection
enabled in her computer’s BIOS. She must disable the BIOS-based protection while installing
Windows XP Professional. She should re-enable the BIOS-based virus protection after the
installation of Windows XP Professional is complete.
3 Deploying Windows XP
Professional
Exam Objectives in this Chapter:
■
■
Perform and troubleshoot an unattended installation of Microsoft Windows XP
Professional
❑
Install Windows XP Professional by using Remote Installation Services
(RIS).
❑
Install Windows XP Professional by using the System Preparation Tool.
❑
Create unattended answer files by using Windows Setup Manager to
automate the installation of Windows XP Professional.
Manage applications by using Windows Installer packages
Why This Chapter Matters
This chapter prepares you to automate the process of installing Microsoft Windows XP Professional. Automated deployments can be done in three ways. The
decision to use a specific method instead of another is usually determined by the
resources, infrastructure, and deployment time required. The three automated
deployment methods include the following:
■
Small deployments or situations involving many different hardware configurations often use an unattended installation, in which the Winnt32 and
Winnt commands are used along with an unattended answer file to script the
installation. This file is created with Windows Setup Manager.
■
Many larger enterprise deployments use disk duplication to deploy systems, a process in which you use the System Preparation Tool to create an
image from a computer running Windows XP Professional, and then clone
that image on other computers. Using disk duplication usually requires thirdparty software.
■
Microsoft provides Remote Installation Services (RIS) for use in environments in which Active Directory service is available. The RIS server software
(which resides on a server computer running Windows 2000 Server or Windows Server 2003) stores images of Windows XP installations and makes
those images available over the network. A client computer boots from the
network (or by using a special RIS boot disk), contacts the RIS server, and
then installs an image from that server.
3-1
3-2
Chapter 3
Deploying Windows XP Professional
This chapter will also look at some tools in Windows XP Professional that help
make your deployment of Windows XP Professional easier. These tools include
the File and Transfer Wizard, the User State Migration Tool (USMT), and Windows
Installer.
Lessons in this Chapter:
■
Lesson 1: Creating Unattended Installations by Using Windows
Setup Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-3
■
Lesson 2: Deploying Windows XP Professional by Using Disk
Duplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-18
■
Lesson 3: Performing Remote Installations . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25
■
Lesson 4: Using Tools to Simplify Deployment . . . . . . . . . . . . . . . . . . . . . . . 3-34
Before You Begin
To complete this chapter, you must have a computer that meets or exceeds the minimum hardware requirements listed in the preface, “About This Book.” You must also
have Windows XP Professional installed on a computer on which you can make
changes.
Lesson 1
Creating Unattended Installations by Using Windows Setup Manager
3-3
Lesson 1: Creating Unattended Installations
by Using Windows Setup Manager
This lesson presents methods that will help you create unattended Windows XP Professional installations. When you must install Windows XP Professional on computers
with varying configurations, scripting provides automation with increased flexibility.
You will learn how Windows Setup Manager makes it easy to create the answer files
that are necessary for scripted installations.
After this lesson, you will be able to
■ Describe unattended installations.
■ Find the Windows XP deployment tools.
■ Explain what Windows Setup Manager is used for.
■ Use Windows Setup Manager to create an answer file.
■ Explain how to start an unattended installation.
Estimated lesson time: 45 minutes
Overview of Unattended Installations
At several points during a standard installation, Setup requires that the user provide
information, such as the time zone, network settings, and so on. One way to automate
an installation is to create an answer file that supplies the required information.
Answer files are really just text files that contain responses to some, or all, of the questions that Setup asks during the installation process. After creating an answer file, you
can apply it to as many computers as necessary.
However, there also are certain settings that must be unique to each computer, such as
the computer name. To answer this need, Windows Setup Manager also allows the creation of a file called a uniqueness database file (UDF), which is used in conjunction
with the standard answer file. The UDF contains the settings that are unique to each
computer.
!
Exam Tip
Remember that a standard answer file is used to provide the common configuration settings for all computers that are affected during an unattended installation. A UDF
provides the unique settings that each computer needs to distinguish it from other computers.
3-4
Chapter 3
Deploying Windows XP Professional
How to Find the Windows XP Deployment Tools
Windows Setup Manager is one of the Windows XP deployment tools included on the
Windows XP Professional installation CD-ROM. The tools that concern this chapter are
as follows:
■
Deploy.chm A compiled Hypertext Markup Language (HTML) help named
“Microsoft Windows Corporate Deployment Tools User’s Guide” that provides
detailed information on using all the deployment tools
■
Setupmgr.chm
■
Setupmgr.exe
■
Sysprep.exe The System Preparation Tool (covered in Lesson 2, “Deploying
Windows XP Professional by Using Disk Duplication”)
Compiled HTML help file for using Windows Setup Manager
The Windows Setup Manager Wizard tool
To extract the Windows XP deployment tools to your hard disk, use these steps:
1. Insert the Windows XP Professional CD-ROM in the CD-ROM drive.
2. If the Welcome To Microsoft Windows XP screen is displayed automatically, click
Exit to close that screen.
3. In Windows Explorer, create a folder to hold the deployment tools.
4. In Windows Explorer, locate the \Support\Tools folder on the Windows XP
Professional CD-ROM.
5. In the \Support\Tools folder, double-click the Deploy.cab file to open it.
Windows XP Professional displays the contents of Deploy.cab.
6. Select all the files listed in Deploy.cab, and then copy them to the folder you
created on your hard disk.
Tip
To select all the files in any folder quickly, press CTRL+A.
7. Open the folder you created on your hard disk to view the contents and access the
deployment tools.
What Windows Setup Manager Does
Windows Setup Manager provides a wizard-based interface that allows you to
quickly create an answer file for an unattended installation of Windows XP Professional. Windows Setup Manager (see Figure 3-1) enables you to create scripts to perform customized installations on workstations and servers that meet the specific
hardware and network requirements of your organization.
Lesson 1
Creating Unattended Installations by Using Windows Setup Manager
3-5
F03us01.bmp
Figure 3-1
Use Windows Setup Manager to create unattended answer files.
You can create or modify an answer file, typically named unattend.txt, by using Windows
Setup Manager. You can also create answer files with a simple text editor, such as Notepad, but using the Windows Setup Manager reduces errors in syntax.
Windows Setup Manager does the following:
■
Provides a wizard with an easy-to-use graphical interface with which you can create and modify answer files
■
Makes it easy to create UDFs (typically named unattend.udb)
Note
A uniqueness database file (UDF) provides the ability to specify per-computer parameters. The UDF modifies an installation by overriding values in the answer file. When you run
Setup with Winnt32.exe, you use the /udf:id[,UDF_filename] switch. The UDF overrides values
in the answer file, and the identifier (id) determines which values in the .udb file are used.
■
Makes it easy to specify computer-specific or user-specific information
■
Simplifies the inclusion of application setup scripts in the answer file
■
Creates the distribution folder that you use for the installation files
Note If you are upgrading systems to Windows XP Professional, you can add any application upgrades or update packs to the distribution folder and enter the appropriate commands
in the Additional Commands page of the Windows Setup Manager Wizard so that these
upgrades or update packs are applied to the application as part of the upgrade.
3-6
Chapter 3
Deploying Windows XP Professional
How to Use the Windows Setup Manager to Create an Answer File
Windows Setup Manager provides a straightforward wizard interface. To create an
answer file for a fully automated installation by using Windows Setup Manager, use
these steps:
1. In Windows Explorer, locate the folder where you extracted Windows Setup
Manager (setupmgr.exe). Double-click setupmgr.exe.
Windows XP Professional starts the Windows Setup Manager Wizard.
2. Click Next.
The New Or Existing Answer File page appears.
3. Ensure that the Create A New Answer File is selected, and then click Next.
The Windows Setup Manager Wizard displays the Product To Install page, which
provides the following three options:
❑
Windows Unattended Installation
❑
Sysprep Install
❑
Remote Installation Services
4. Ensure that Windows Unattended Installation is selected, and then click Next.
The Windows Setup Manager Wizard displays the Platform page.
5. Ensure that Windows XP Professional is selected, and then click Next.
The Windows Setup Manager Wizard displays the User Interaction Level page,
shown in Figure 3-2, which has the following five options:
❑
Provide Defaults. The answers you provide in the answer file are the default
answers that the user sees. The user can accept the default answers or change
any of the answers supplied by the script.
❑
Fully Automated. The installation is fully automated. The user does not have
the chance to review or change the answers supplied by the script.
❑
Hide Pages. The answers provided by the script are supplied during the installation. Any page for which the script supplies all answers is hidden from the
user, so the user cannot review or change the answers supplied by the script.
❑
Read Only. The script provides the answers, and the user can view the
answers on any page that is not hidden, but the user cannot change the
answers.
❑
GUI Attended. The text-mode portion of the installation is automated, but
the user must supply the answers for the graphical user interface (GUI) mode
portion of the installation.
Lesson 1
Creating Unattended Installations by Using Windows Setup Manager
3-7
F03us02.bmp
Figure 3-2 Select the level of user interaction you want.
6. Select Fully Automated, and then click Next.
The Windows Setup Manager Wizard displays the Distribution Folder page. The
Setup Manager Wizard can create a distribution folder on your computer or network containing the required source files. You can add files to this distribution
folder to further customize your installation.
7. Select No, This Answer File Will Be Used To Install From A CD, and then click Next.
The Windows Setup Manager Wizard displays the License Agreement page.
8. Select I Accept The Terms Of The License Agreement, and then click Next.
The Windows Setup Manager Wizard displays the Customize The Software page,
shown in Figure 3-3.
F03us03.bmp
Figure 3-3 Use the Customize The Software Page to provide details for the answer file that will
be used during installation.
3-8
Chapter 3
Deploying Windows XP Professional
9. Type your name in the Name box and your organization in the Organization box,
and then click Next.
The Windows Setup Manager Wizard displays the Display Settings page.
10. Leave the default settings on the Display Settings page, and then click Next.
The Windows Setup Manager displays the Time Zone page.
11. Select the appropriate time zone, and then click Next.
The Windows Setup Manager Wizard displays the Providing The Product Key page.
12. Type in the appropriate product key.
Note
The product key identifies your copy of Windows XP Professional, so you need a separate license for each copy that you install. Note, however, that in many corporate environments a volume licensing system is in place, so you might need a special key for that. Also,
Setup Manager does not validate the product key when you enter it, so you won’t actually find
out until installing Windows XP Professional with the answer file whether the key is valid.
Make sure that you use a valid key.
13. Click Next.
The Windows Setup Manager Wizard displays the Computer Names page, shown
in Figure 3-4. Notice that you have three choices:
❑
Enter a series of names to be used during the various iterations of the script.
❑
Click Import and provide the name of a text file that has one computer name
per line listed. Setup imports and uses these names as the computer names in
the various iterations of the script.
❑
Select Automatically Generate Computer Names Based On Organization Name
to allow the system to automatically generate the computer names to be used.
F03us04.bmp
Figure 3-4 Add the names of the computers that will use the installation.
Lesson 1
Creating Unattended Installations by Using Windows Setup Manager
3-9
14. In the Computer Name text box, type a name for the computer, and then click
Add. Repeat this step to add additional computers to the installation.
15. Click Next.
The Windows Setup Manager Wizard displays the Administrator Password page,
which appears with the following two options:
❑
Prompt The User For An Administrative Password
❑
Use The Following Administrative Password (127 Characters Maximum)
Note You selected the User Interaction level of Fully Automated, so the Prompt The User
For An Administrative Password option is unavailable.
Notice that you have the option to encrypt the Administrator’s password in the
answer file. You also have the option to have the Administrator log on automatically, and you can set the number of times you want the Administrator to log on
automatically when the computer is restarted.
16. Ensure that Use The Following Administrative Password (127 Characters Maximum) is selected, and then type a password in the Password text box and the
Confirm Password box.
17. Select Encrypt Administrator Password In Answer File, and then click Next.
The Windows Setup Manager Wizard displays the Networking Components page,
shown in Figure 3-5, with the following two options:
❑
Typical Settings. Installs Transmission Control Protocol/Internet Protocol
(TCP/IP), enables Dynamic Host Configuration Protocol (DHCP), installs the
Client For Microsoft Networks protocol, and installs File And Printer Sharing
For Microsoft Networks for each destination computer
❑
Customize Settings. Allows you to select and configure the networking
components to be installed
F03us05.bmp
Figure 3-5 Choose network settings for the installation.
3-10
Chapter 3
Deploying Windows XP Professional
18. Configure network settings as appropriate for your network, and then click Next.
The Windows Setup Manager Wizard displays the Workgroup Or Domain page.
19. If the computer will join a workgroup, type the workgroup name. If the computer
will join a domain, click Windows Server Domain, and then type the name of the
domain. If a computer that will join a domain does not already have a computer
account in that domain, you can have Windows Setup create such an account during installation. Click Create A Computer Account In The Domain, and then enter
the credentials for an account that has permission to create new computer
accounts in the domain. Click Next to continue.
The Windows Setup Manager Wizard displays the Telephony page.
20. Select the appropriate setting for What Country/Region Are You In.
21. Type the appropriate setting for What Area (Or City) Code Are You In.
22. If necessary, type the appropriate setting for If You Dial A Number To Access An
Outside Line, What Is It.
23. Select the appropriate setting for The Phone System At This Location Uses, and
then click Next.
The Windows Setup Manager Wizard displays the Regional Settings page. The
default selection is Use The Default Regional Settings For The Windows Version
You Are Installing, but you can also specify different regional settings.
24. Configure the regional settings, and then click Next.
The Windows Setup Manager Wizard displays the Languages page, which allows
you to add support for additional languages.
25. Select additional languages if they are required for the computers on which you
will install Windows XP Professional, and then click Next.
The Windows Setup Manager Wizard displays the Browser And Shell Settings page
with the following three options:
❑
Use Default Internet Explorer Settings
❑
Use An Autoconfiguration Script Created By The Internet Explorer Administration Kit To Configure Your Browser
❑
Individually Specify Proxy And Default Home Page Settings
26. Make your selection, and then click Next.
The Windows Setup Manager Wizard displays the Installation Folder page with the
following three options:
❑
A Folder Named Windows. This is the default selection.
❑
A Uniquely Named Folder Generated By Setup. Setup generates a unique
folder name so that the installation folder will be less obvious. This folder
Lesson 1
Creating Unattended Installations by Using Windows Setup Manager
3-11
name is recorded in the Registry, so programs and program installations can
easily access the Windows XP Professional system files and folders.
❑
This Folder. If you select this option, you must specify a path and folder name.
27. Make your selection, and then click Next.
The Windows Setup Manager Wizard displays the Install Printers page, shown in
Figure 3-6, which allows you to specify a network printer to be installed the first
time a user logs on after Setup.
F03us06.bmp
Figure 3-6 Specify printers to be installed during setup.
28. Add any printers that you want to configure during installation, and then click
Next.
The Windows Setup Manager Wizard displays the Run Once page. This page
allows you to configure Windows to run one or more commands the first time a
user logs on.
29. To add a command, type the command in the Command To Run text box, and
then click Add. Click Next when you are finished adding commands.
The Windows Setup Manager Wizard displays the Additional Commands page.
This page allows you to specify additional commands to be run at the end of the
unattended setup before any user logs on to the computer.
30. To add a command, type the command in the Command To Run text box, and
then click Add. Click Finish when you are finished adding commands.
The Windows Setup Manager Wizard displays a dialog box indicating that
the Windows Setup Manager has successfully created an answer file. It also
prompts you for a location and a name for the script. The default is a file named
unattend.txt in the folder from which you launched Windows Setup Manager.
Note
If multiple computer names were specified, the wizard also creates a .udb file.
3-12
Chapter 3
Deploying Windows XP Professional
31. Accept the default name and location, or type an alternate name and location.
Click OK to continue.
The Windows Setup Manager Wizard displays the Setup Manager Complete page,
indicating that new files were created:
❑
unattend.txt is the answer file.
❑
unattend.udb is the uniqueness database file created if you supply multiple
computer names.
❑
unattend.bat is a batch script that will launch the Windows installation using
the answer file and uniqueness database file.
32. On the File menu, click Exit.
How to Start an Unattended Installation
To perform an installation, you can use the unattend.bat file created by the Windows
Setup Manager. This batch file simply uses the winnt32.exe command to start the installation, supplying parameters based on the location you saved the files to when you ran
Windows Setup Manager. You can modify this batch file to suit your needs or simply
start Setup from the command line yourself (the most common way to start an unattended installation). To start Setup from the command line (or modify the batch file),
you must use a specific parameter and indicate the location of the answer file.
To use the winnt.exe command from a Microsoft MS-DOS or Windows 3.x command
prompt to perform a clean installation of Windows XP, you must use the following syntax:
winnt [/s:SourcePath] [/u:answer file] [/udf:ID [,UDB_file]]
To use the winnt32.exe command from a Windows 95, Windows 98, Windows Me, or
Windows 2000 command prompt to perform a clean installation of Windows XP, you
must use the following syntax:
winnt32 [/unattend[num]:[answer_file] [/udf:ID [,UDB_file]]
See Also
For more information on answer file structure, syntax, and configurable options,
see the Deployment User Tools Guide on the Windows XP Professional CD. You can find it in
the following location: \Support\Tools\Deploy.cab\Deploy.chm.
On the CD
At this point, you should view the multimedia presentation, “How Setup Uses
Answer Files and UDFs,” included in the Multimedia folder on the CD accompanying this book.
This presentation will help deepen your understanding of unattended installations.
Lesson 1
Creating Unattended Installations by Using Windows Setup Manager
3-13
Practice: Creating Unattended Installations with Windows
Setup Manager
In this practice, you extract the Windows XP Professional deployment tools from the
Windows XP Professional CD-ROM you used for program installation, and then you
use the Windows System Manager to create a fully automated unattended answer file.
Exercise 1: Extract the Windows XP Deployment Tools
In this exercise, you extract the Windows deployment tools from the CD-ROM you
used to install Windows XP Professional and copy them to your hard drive.
1. Insert the Windows XP Professional CD-ROM in the CD-ROM drive.
2. If the Welcome To Microsoft Windows XP screen opens automatically, click Exit to
close the screen.
3. In Windows Explorer, locate the root of the C drive and create a folder named
Deploy.
The C:\Deploy folder will be used to contain the files extracted from
DEPLOY.CAB on the Windows XP Professional CD-ROM.
4. In Windows Explorer, open your CD-ROM drive and locate the Support\Tools\
folder. In the Tools folder, double-click Deploy.cab.
Note
If D is not the correct drive letter for your CD-ROM drive, replace the D with the letter
representing your CD-ROM drive.
Windows XP Professional displays the contents of Deploy.cab.
5. Press CTRL+A to select all of the files listed in Deploy.cab.
6. Press CTRL+C to copy the selected files.
7. In Windows Explorer, locate and open the Deploy folder that you created on the
C drive.
8. In the Deploy folder that you created, press CTRL+V to paste (copy) the files.
9. Double-click Readme.txt.
10. Take a moment to view the topics covered in the Readme.txt file, and then close
Notepad.
Exercise 2: Create an Answer File by Using Windows Setup Manager
In this exercise, you use Windows Setup Manager to create an answer file for a fully
automated unattended installation. At the same time, the Windows Setup Manager
Wizard creates a distribution folder and a .udb file.
3-14
Chapter 3
Deploying Windows XP Professional
1. In Windows Explorer, locate the C:\Deploy folder.
2. Double-click Setupmgr.exe
Windows XP Professional starts the Windows Setup Manager Wizard.
3. Click Next.
The New Or Existing Answer File page appears.
4. Ensure that Create A New Answer File is selected, and then click Next.
The Windows Setup Manager Wizard displays the Product To Install page.
5. Ensure that Windows Unattended Installation is selected, and then click Next.
The Windows Setup Manager Wizard displays the Platform page.
6. Ensure that Windows XP Professional is selected, and then click Next.
The Windows Setup Manager Wizard displays the User Interaction Level page.
7. Click Fully Automated, and then click Next.
The Windows Setup Manager Wizard displays the Distribution Folder page.
8. Select No, This Answer File Will Be Used To Install From A CD, and then click
Next.
The Windows Setup Manager Wizard displays the License Agreement page.
9. Select I Accept The Terms Of The License Agreement, and then click Next.
The Windows Setup Manager Wizard displays the Customize The Software page.
10. Type your name in the Name box and your organization in the Organization box,
and then click Next.
The Windows Setup Manager Wizard displays the Display Settings page.
11. Leave the default settings on the Display Settings page, and then click Next.
Windows Setup Manager displays the Time Zone page.
12. Select the appropriate time zone, and then click Next.
The Windows Setup Manager Wizard displays the Providing The Product Key
page.
13. Enter your Windows XP Professional product key, and then click Next.
The Windows Setup Manager Wizard displays the Computer Names page.
14. In the Computer Name text box, type Client1, and then click Add. Repeat this
step to add Client2 and Client3 to the list of names.
Notice that the names Client1, Client2, and Client3 appear in the Computers To Be
Installed box.
Lesson 1
Creating Unattended Installations by Using Windows Setup Manager
3-15
15. Click Next.
The Windows Setup Manager Wizard displays the Administrator Password page.
16. Ensure that Use The Following Administrative Password (127 Characters Maximum) is selected, and then type password in the Password text box and the
Confirm Password text box.
17. Click Encrypt Administrator Password In Answer File, and then click Next.
The Windows Setup Manager Wizard displays the Networking Components page.
18. Leave Typical Settings selected, and then click Next.
The Windows Setup Manager Wizard displays the Workgroup Or Domain page.
19. Click Next to accept the default of the computers joining a workgroup named
WORKGROUP.
The Windows Setup Manager Wizard displays the Telephony page.
20. Select the appropriate setting for What Country/Region Are You In.
21. Type the appropriate setting for What Area (Or City) Code Are You In.
22. If necessary, type the appropriate setting for If You Dial A Number To Access An
Outside Line, What Is It.
23. Select the appropriate setting for The Phone System At This Location Uses, and
then click Next.
The Windows Setup Manager Wizard displays the Regional Settings page.
24. Click Next to accept the default settings.
The Windows Setup Manager Wizard displays the Languages page.
25. Click Next to accept the default setting.
The Windows Setup Manager Wizard displays the Browser And Shell Settings
page.
26. Click Next to accept the default setting: Use Default Internet Explorer Settings.
The Windows Setup Manager Wizard displays the Installation Folder page.
27. Select This Folder. In the This Folder text box, type WINXPPro, and then click
Next.
The Windows Setup Manager Wizard displays the Install Printers page.
28. Click Next to continue without having the script install any network printers.
The Windows Setup Manager Wizard displays the Run Once page.
29. Click Next to continue without having the script run any additional commands.
The Windows Setup Manager Wizard displays the Additional Commands page.
3-16
Chapter 3
Deploying Windows XP Professional
30. Click Finish to complete the script without having the script run any additional
commands.
The Windows Setup Manager Wizard displays a dialog box indicating that the
Windows Setup Manager has successfully created an answer file.
31. Click OK to accept the default file name and location.
The Windows Setup Manager Wizard displays the Setup Manager Complete page.
32. On the File menu, click Exit.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. What is the purpose of Windows Setup Manager?
2. How can you apply an application update pack as part of the Windows XP Professional installation?
3. What type of answer files does Windows Setup Manager allow you to create?
4. Why would you use a UDF?
Lesson Summary
■
The Windows Setup Manager Wizard makes it easy to create the answer files that
are necessary for unattended installations.
■
To use the Windows Setup Manager, you must extract the files located in the
\Support\Tools\Deploy.cab file on the Windows XP Professional CD-ROM.
Lesson 1
Creating Unattended Installations by Using Windows Setup Manager
3-17
■
Windows Setup Manager provides a wizard with an easy-to-use graphical interface
with which you can create and modify answer files and UDFs. The Windows Setup
Manager makes it easy to specify computer-specific or user-specific information and
to include application setup scripts in the answer file. The Windows Setup Manager
can also create the distribution folder and copy the installation files to it.
■
You run Windows Setup Manager by launching the setupmgr.exe file that you
extracted from the Deploy.cab file. The wizard walks you through choosing the
type of installation you want to create and how much detail you want to provide
in the answer file.
■
To perform an installation, you can use the Unattend.bat file created by the Windows Setup Manager. You can also start Setup from the command line by using
the Winnt.exe command (from an MS-DOS or Windows 3.1 command line) or the
Winnt32.exe command (from a Windows 95 or later command line).
3-18
Chapter 3
Deploying Windows XP Professional
Lesson 2: Using Disk Duplication to Deploy
Windows XP Professional
When you install Windows XP Professional on several computers with identical hardware configurations, the most efficient installation method to use is disk duplication.
By creating a disk image of a Windows XP Professional installation and copying that
image onto multiple destination computers, you save time in the rollout of Windows XP
Professional. This method also creates a convenient baseline that you can easily recopy
onto a computer that is experiencing significant problems.
After this lesson, you will be able to
■ Explain the purpose of disk duplication.
■ Extract the System Preparation Tool that is used to prepare a disk image for duplication.
■ Prepare a computer for the creation of a master image by using the System Preparation
Tool.
■ Install Windows XP Professional from a master disk image.
Estimated lesson time: 40 minutes
Overview of Disk Duplication
Windows XP Professional includes a program named System Preparation
(sysprep.exe) that allows you to prepare master images of an existing Windows XP
installation for distribution to other computers by removing machine-specific information from the image. The first step of creating a disk image is for the administrator to
install Windows XP Professional onto a reference computer. The reference computer
can contain just the Windows XP Professional operating system, or it can contain the
operating system and any number of installed applications.
After the reference computer is configured properly, you will use the System Preparation Tool to prepare the computer for imaging. Many settings on a Windows XP Professional computer must be unique, such as the Computer Name and the Security
Identifier (SID), which is a number used to track an object through the Windows
security subsystem. The System Preparation Tool removes the SID and all other userand computer-specific information from the computer, and then shuts down the computer so that you can use can use a disk duplication utility to create a disk image. The
disk image is simply a compressed file that contains the contents of the entire hard disk
on which the operating system is installed.
When a client computer starts Windows XP Professional for the first time after loading
a disk image that has been prepared with Sysprep, Windows automatically generates a
unique SID, initiates Plug-and-Play detection, and starts the Mini Setup Wizard. The
Lesson 2
Using Disk Duplication to Deploy Windows XP Professional
3-19
Mini Setup Wizard prompts the user for user- and computer-specific information, such
as the following:
■
End-User License Agreement (EULA)
■
Regional options
■
User name and company
■
Product key
■
Computer name and administrator password
■
Time zone selection
Note When you create a disk image, all the hardware settings of the reference computer
become part of the image. Thus, the reference computer should have the same (or similar)
hardware configuration as the destination computers. If the destination computers contain
Plug and Play devices that are not present in the reference computer, they are automatically
detected and configured at the first startup following installation. The user must install any
non–Plug and Play devices manually.
To install Windows XP Professional using disk duplication, you first need to install and
configure Windows XP Professional on a test computer. You then need to install and
configure any applications and software updates on the test computer.
How to Extract the Windows System Preparation Tool
Before you can use the Windows System Preparation Tool, you must copy the necessary files onto the computer you are using to create the master image. To copy the
System Preparation Tool, you must extract the files from \Support\Tools\Deploy.cab
on the Windows XP Professional CD-ROM. For the steps to do this, see Lesson 1,
“Creating Unattended Installations by Using Windows Setup Manager.”
Preparing a Computer for the Creation of a Master Image
by Using the System Preparation Tool
The System Preparation Tool was developed to eliminate problems encountered in
disk copying. First of all, every computer must have a unique security identifier
(SID). If you copied an existing disk image to other computers, every computer on
which the image was copied would have the same SID. To prevent this problem, the
System Preparation Tool adds a system service to the master image that creates a
unique local domain SID the first time the computer to which the master image is
copied is started.
3-20
Chapter 3
Deploying Windows XP Professional
The hard drive controller device driver and the hardware abstraction layer (HAL)
on the computer on which the disk image was generated and on the computer to
which the disk image was copied must be identical. The other peripherals, such as the
network adapter, the video adapter, and sound cards on the computer on which the
disk image was copied, need not be identical to the ones on the computer on which
the image was generated because the computer will run a full Plug and Play detection
when it starts the first time following installation from the image.
You can run the System Preparation Tool in its default mode by simply double-clicking
the Sysprep.exe file that you extracted from Windows XP deployment tools. Table 3-1
describes some of the optional parameters you can use when running Sysprep.exe.
Table 3-1
Optional Parameters for Sysprep.exe
Switch
Description
/quiet
Runs with no user interaction because it does not show the user
confirmation dialog boxes
/nosidgen
Does not regenerate SID on reboot
/pnp
Forces Setup to detect Plug and Play devices on the destination
computers on the next reboot
/reboot
Restarts the source computer after Sysprep.exe has completed
/noreboot
Shuts down without a reboot
/forceshutdown
Forces a shutdown instead of powering off
Note
For a complete list of the switches for Sysprep.exe, start a command prompt, change
to the Deploy folder or the folder where you installed Sysprep.exe, type sysprep.exe/?, and
press ENTER.
How to Install Windows XP Professional from a Master Disk Image
After running Sysprep on your test computer, you are ready to run a non-Microsoft disk
image copying tool to create a master disk image. Save the new disk image on a shared
folder or CD-ROM, and then copy this image to the multiple destination computers.
End users can then start the destination computers. The Mini-Setup Wizard prompts the
user for computer-specific variables, such as the administrator password for the computer and the computer name. If a sysprep.inf file was provided, the Mini-Setup Wizard
is bypassed, and the system loads Windows XP Professional without user intervention.
You can also automate the completion of the Mini-Setup Wizard further by creating a
sysprep.inf file.
Lesson 2
Using Disk Duplication to Deploy Windows XP Professional
3-21
Practice: Deploying Windows XP Professional by Using Disk Duplication
In this practice, you use the Windows System Preparation Tool to prepare a master image
for disk duplication. You will then use that master image to perform an installation.
Exercise 1: Prepare a Master Image
Important
If you have not completed Exercise 1 of Lesson 1 in this chapter, you must complete that exercise and extract the System Preparation Tool from the Windows XP Professional
CD-ROM before you can complete the following exercise.
Caution
You should perform this procedure only on a test computer that does not contain
valuable data. After completing the following exercise, you will have to reinstall Windows XP
Professional on your computer.
1. Click Start, point to All Programs, point to Accessories, and then click Command
Prompt.
2. In the Command Prompt window, type cd \Deploy, and then press ENTER.
Note
If you extracted the sysprep.exe file to a different location, use that location instead.
3. Type sysprep.exe /pnp /noreboot and then press ENTER.
4. What do the optional parameters /pnp and /noreboot do?
Note
You should run Sysprep only if you are preparing your computer for duplication.
5. If you are certain that you do not mind having to reinstall Windows XP Professional, click OK to continue.
Sysprep displays a System Preparation Tool dialog box that allows you to configure Sysprep.
3-22
Chapter 3
Deploying Windows XP Professional
Note To quit Sysprep, in the Flags box, click the down-pointing arrow in the Shutdown box,
select Quit, and then click Reseal to stop System Preparation from running on your computer.
6. In the Flags box, select Mini-Setup.
7. In the Shutdown list, click Shut Down, and then click Reseal.
Sysprep displays a Windows System Preparation Tool message box, telling you
that you have chosen to regenerate the SIDs on the next reboot. You need to
regenerate SIDs only if you plan to image after shutdown.
Note If you did not want to regenerate SIDs, you would click Cancel, select the NoSIDGEN
check box in the Flags box, and then click Reseal.
8. Click OK.
Sysprep displays a Sysprep Is Working message box, telling you that the tool is
removing the system-specific data on your computer. When Sysprep is finished,
your computer shuts down.
9. If your computer does not turn off automatically after shutting down, turn your
computer off.
Exercise 2: Install Windows XP Professional from a Master Image
In this exercise, you use a master disk image that you created in the previous exercise
to install Windows XP Professional. Normally, you would use a third-party tool to copy
this disk image to another computer. For the purposes of this practice, you reinstall by
using the master disk image as if it were a computer that had the disk image copied to it.
1. Turn on your computer.
Setup displays the following message: Please Wait While Windows Prepares To Start.
After a few minutes, Setup displays the Welcome To The Windows XP Setup Wizard page.
2. Click Next to continue with Setup.
The Windows XP Professional Setup Wizard displays the License Agreement page.
3. Read through the license agreement, click I Accept This Agreement, and then
click Next.
The Windows XP Professional Setup Wizard displays the Regional And Language
Options page.
4. Ensure that the Regional And Language Options and Text Input Languages settings
are correct, and then click Next.
The Windows XP Professional Setup Wizard displays the Personalize Your Software page.
Lesson 2
Using Disk Duplication to Deploy Windows XP Professional
3-23
5. In the Name text box, type your name. In the Organization text box, type your
organization name, and then click Next.
The Windows XP Professional Setup Wizard displays the Your Product Key page.
6. Enter your product key, and then click Next.
The Windows XP Professional Setup Wizard displays the Computer Name And
Administrator Password page.
7. In the Computer Name text box, type the name for your computer.
8. In the Password and Confirm Password text boxes, type a password, and then click Next.
The Windows XP Professional Setup Wizard displays the Modem Dialing Information page.
Note If you do not have a modem, you might not see this page. If you do not get the
Modem Dialing Information page, skip to Step 13.
9. Select the appropriate setting for What Country/Region Are You In.
10. Type the appropriate setting for What Area Or City Code Are You In.
11. If necessary, type the appropriate setting for If You Dial A Number To Access An
Outside Line, What Is It.
12. Select the appropriate setting for The Phone System At This Location Uses, and
then click Next.
The Windows XP Professional Setup Wizard displays the Date And Time Settings page.
13. Ensure that the settings for Date, Time, Time Zone, and Daylight Saving Changes
are correct, and then click Next.
The Windows XP Professional Setup Wizard displays the Networking Settings page.
14. Ensure that the default setting of Typical Settings is selected, and then click Next.
The Windows XP Professional Setup Wizard displays the Workgroup Or Computer
Domain page.
15. Ensure that No, This Computer Is Not On A Network Or Is On A Network Without
A Domain is selected.
16. Ensure that WORKGROUP appears in the Workgroup Or Computer Domain Box,
and then click Next.
The Windows XP Professional Setup Wizard displays the Performing Final Tasks
page, and then it displays the Completing The Windows XP Setup Wizard page.
17. Click Finish.
The system will reboot, and the Welcome screen appears.
18. Log on as you normally would.
3-24
Chapter 3
Deploying Windows XP Professional
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. What is disk duplication?
2. What is the purpose of the System Preparation Tool?
3. What does the /quiet switch do when you run Sysprep.exe?
Lesson Summary
■
The first step in disk duplication is preparing a computer running Windows XP
Professional that will serve as a reference computer. This preparation includes
installing, updating, and configuring the operating system, as well as installing
other applications. After the reference computer is configured, the next step is
using the System Preparation Tool to prepare the computer for imaging. The final
step is using a non-Microsoft disk duplication utility to create a hard disk image.
■
To use the System Preparation Tool, you must extract the files located in the
\Support\Tools\Deploy.cab file on the Windows XP Professional CD-ROM.
■
One of the primary functions of the System Preparation Tool is to delete security
identifiers (SIDs) and all other user-specific or computer-specific information.
■
When the user restarts the destination computer, the Windows Setup Wizard
appears, but requires very little input to complete. You can automate the completion of the Windows Setup Wizard by creating a sysprep.inf file.
Lesson 3
Performing Remote Installations
3-25
Lesson 3: Performing Remote Installations
Remote Installation Services (RIS) is a service that is available for servers running Windows 2000 Server and Windows Server 2003 in a Microsoft Active Directory directory
service environment. The RIS server is a disk image server that contains as many disk
images as are necessary to support the different configurations of Windows XP Professional on a network. A RIS client is a computer that connects to the RIS server and
downloads an image for installation. The RIS server might be preconfigured to download a particular image to a client computer, or the user might be able to select an
image manually from a special RIS Administration menu.
After this lesson, you will be able to
■ Describe how RIS is used
■ Install and configure RIS on a server running Windows Server 2003
■ Explain requirements for RIS client computers
Estimated lesson time: 60 minutes
Overview of RIS
RIS provides the best features of unattended installations and disk duplication and also
provides a powerful way to make remote installations possible in large network environments. The basic RIS process works as follows:
1. In an Active Directory domain, you install RIS on a server running Windows 2000
Server or Windows Server 2003. The methods for installation on each version are
different, and each method is covered in this lesson.
2. You load disk images on the RIS server. RIS supports two types of images:
❑
A CD-based image that contains the Windows XP Professional operating
installation files. You can create answer files for these images to automate the
installation process on the client end.
❑
A Remote Installation Preparation (RIPrep) image that can contain the Windows XP Professional operating system along with other applications. This
image is based on a preconfigured reference computer, much like the computer used in creating images for disk duplication.
3. A client computer connects to the RIS server over the network. Clients must
conform to the Net PC specification or have a network adapter that supports the
Preboot eXecution Environment (PXE) standard for network booting. This
type of adapter allows the client to boot the computer with no pre-existing operating system installed, locate a RIS server, and start the installation process using
an image on the RIS server. For clients who do not have a PXE-compliant network
adapter, you can create a special boot floppy disk that will allow the client to boot
up and contact the RIS server.
3-26
Chapter 3
Deploying Windows XP Professional
4. The client begins the installation of Windows XP Professional from an image on the
RIS server. A RIS server can support many different disk images, and the user of the
client computer can choose the image they want to use to install Windows XP Professional. You can also configure a RIS server so that installation choices are made
automatically when a client computer contacts the RIS server. The user of the client
computer sees a screen that indicates the operating system being installed, but is not
prompted to make any choices or provide any information. If only one image is
available on the RIS server, the user also does not get to make a choice.
5. Windows XP Professional is installed on the client computer. Depending on the
image and type of installation, the user might be or might not be prompted for
personal information during the installation.
RIS provides the following benefits:
■
It enables remote installation of Windows XP Professional.
■
It simplifies server image management by eliminating hardware-specific images
and by detecting Plug and Play hardware during setup.
■
It supports recovery of the operating system and computer in the event of computer failure.
■
It retains security settings after restarting the destination computer.
■
It reduces total cost of ownership (TCO) by allowing either users or technical staff
to install the operating system on individual computers.
Installing and Configuring RIS
RIS is available only on computers running Windows 2000 Server or Windows Server
2003. The RIS server can be a domain controller or a member server. Table 3-2 lists the
network services required for RIS and their RIS function. These network services do
not have to be installed on the same computer as RIS, but they must be available somewhere on the network.
Table 3-2
Network Services Requirements for RIS
Network Service
RIS Function
DNS Service
RIS relies on the Domain Name System (DNS) server for locating
both the directory service and client computer accounts.
DHCP service
Client computers that can perform a network boot receive an Internet
Protocol (IP) address from the DHCP server.
Active Directory
RIS relies on the Active Directory service in Windows XP Professional for locating existing client computers as well as existing RIS
servers.
Lesson 3
Performing Remote Installations
3-27
Note
This chapter covers installing RIS on a computer running Windows Server 2003. The
method for installing RIS on a computer running Windows 2000 Server is different, but you
make many of the same choices.
!
Exam Tip
Remember that RIS requires an Active Directory environment so that RIS clients
can locate RIS servers. Active Directory requires that DNS be used on a network; DNS is
used to locate services in Active Directory. DHCP is also required for RIS because RIS clients
must be able to contact a DHCP server to obtain an IP address so that they can communicate
with other devices on the network.
Remote installation requires that RIS be installed on a volume that is shared over the
network. This shared volume must meet the following criteria:
■
The shared volume cannot be on the same volume that holds the Windows 2000
Server or Windows Server 2003 system files.
■
The shared volume must be large enough to hold the RIS software and the various
Windows XP Professional images.
■
The shared volume must be formatted with the NTFS file system.
To install RIS on a computer running Windows Server 2003, use the following steps:
1. Click Start, point to Control Panel, and then click Add Or Remove Programs.
2. In the Add Or Remove Programs window, click Add/Remove Windows Components.
3. In the Windows Components Wizard, in the Components list, select the Remote
Installation Services check box, and then click Next.
Windows Server 2003 builds a list of necessary files, and then installs RIS.
4. Click Finish to exit the Windows Components Wizard.
Windows prompts you to restart your computer.
5. Click Yes.
The computer restarts.
6. After the computer restarts, log on as an administrator, click Start, point to Administrative Tools, and then click Remote Installation Services Setup.
7. On the Welcome page of the Remote Installation Services Setup Wizard, click Next.
Windows displays the Remote Installation Folder Location page, shown in Figure 3-7. You must specify a path for the location in which to create the installation
folder structure—the folders that will contain the RIS images. This path cannot be
3-28
Chapter 3
Deploying Windows XP Professional
on the system volume. The path must be on an NTFS-formatted volume that has
enough space to hold the images.
F03us07.bmp
Figure 3-7 Specify a path in which to create the installation folder structure.
8. Type a path, and then click Next.
Windows displays the Initial Settings page, as shown in Figure 3-8. By default, the
RIS server will not support client computers until you specifically configure it to
do so following Setup. This gives you the chance to configure the server before
accepting client connections. However, you can select the Respond To Client
Computers Requesting Service check box if you want the server to begin responding immediately.
F03us08.bmp
Figure 3-8 Choose whether the server should respond to client requests immediately or after
configuration.
Lesson 3
Performing Remote Installations
3-29
9. Choose whether you want the server to begin responding to client requests immediately, and then click Next.
Windows displays the Installation Source Files Location page, which you can use to
specify the path to the Windows XP Professional installation files you want to use.
10. Type the path into the Path text box, and then click Next to continue.
11. On the Windows Installation Image Folder Name page, type the name for the
folder to which the Windows installation files will be copied. This folder is created
in the path you specified on the Remote Installation Folder Location page.
12. On the Friendly Description And Help Text page, shown in Figure 3-9, type a
description and help text that helps users on RIS clients identify the operating system.
Click Next to continue.
F03us09.bmp
Figure 3-9 Enter a friendly description for the operating system and any help text that might
assist users.
13. On the Review Settings page, make sure that the settings you have selected look
okay, and then click Finish.
The Remote Installation Services Setup Wizard begins copying Windows installation
files, and then performs a number of additional tasks that include the following:
❑
Creating the remote installation folder
❑
Copying files needed by RIS
❑
Copying the Windows XP Professional installation files to the server
❑
Configuring the Client Installation Wizard screens that appear during a
remote installation
❑
Creating an unattended installation answer file
3-30
Chapter 3
Deploying Windows XP Professional
❑
Creating remote installation services
❑
Updating the Registry
❑
Creating the Single-Instance Store volume
❑
Starting the required RIS services
❑
Authorizing the RIS server in DHCP
14. When the wizard is finished, click Done.
Requirements for RIS Client Computers
To support remote installation from a RIS server, client computers must have one of the
following configurations:
■
A configuration meeting the Net PC specification
■
A network adapter card with a PXE-compliant network adapter and basic input/
output system (BIOS) support for starting the computer from PXE
■
A supported network adapter card and a remote installation boot disk
!
Exam Tip For the exam, remember the three options for enabling a RIS client to boot from
the network and locate a RIS server: Net PC configuration, a PXE-compliant network adapter,
or a supported network adapter card and a remote installation boot disk.
Net PCs
The Net PC is a highly manageable platform with the capability to perform a network
boot, manage upgrades, and prevent users from changing the hardware or operating
system configuration. Additional requirements for the Net PC are as follows:
■
The network adapter must be set as the primary boot device within the system BIOS.
■
The user account that will be used to perform the installation must be assigned the
user right Log On As A Batch Job. For more information on assigning user rights,
see Chapter 16, “Configuring Security Settings and Internet Options.”
Note
The Administrator group does not have the right to log on to a batch job by default.
You should create a new group for performing remote installations, assign that group the Log
On As A Batch Job user right, and then add users to that group prior to attempting a remote
installation.
■
Users must be assigned permission to create computer accounts in the domain
they are joining. The domain is specified in the Advanced Settings on the RIS
server.
Lesson 3
Performing Remote Installations
3-31
PXE-Compliant Network Adapters
Computers that do not directly meet the Net PC specification can still interact with the
RIS server. To enable remote installation on a computer that does not meet the Net PC
specification, perform the following steps:
1. Install a PXE-compliant network adapter card.
2. Set the BIOS to start from the PXE boot ROM.
3. The user account that will be used to perform the installation must be assigned the
user right Log On As A Batch Job.
4. Users must be assigned permission to create computer accounts in the domain they
are joining. The domain is specified in the Advanced Settings on the RIS server.
RIS Boot Floppy Disk
If the network adapter card in a client is not equipped with a PXE boot ROM, or the
BIOS does not allow starting from the network adapter card, create a remote installation boot disk. The boot disk simulates the PXE boot process. After installing RIS, you
can use the Remote Boot Disk Generator (see Figure 3-10), which allows you to easily
create a boot disk.
F03us10.bmp
Figure 3-10
Use the Remote Boot Disk Generator to create RIS boot floppy disks.
You can run the Remote Boot Disk Generator (rbfg.exe) to create a boot disk. The
rbfg.exe file is located in the Admin\i386 folder in the remote installation folder location
you specified when installing RIS. These boot floppies support only the Peripheral Component Interconnect (PCI)–based network adapters listed in the Adapters List. To see the
list of the supported network adapters, click Adapter List, as shown in Figure 3-10. A partial listing of the supported network adapter cards is shown in Figure 3-11.
You also need to set the user rights and permissions. The user account that will be used
to perform the installation must be assigned the user right Log On As A Batch Job. The
users must be assigned permission to create computer accounts in the domain they are
joining. The domain is specified in the Advanced Settings on the RIS server.
3-32
Chapter 3
Deploying Windows XP Professional
F03us11.bmp
Figure 3-11
View network adapters that are supported by boot floppies.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. What is a RIS server and what is it used for?
2. What network services are required for RIS?
3. What can you do if the network adapter card in a client is not PXE-compliant?
Does this solution work for all network adapter cards? Why or why not?
4. Which user rights must be assigned to the user account that will be used to
perform the remote installation?
Lesson 3
Performing Remote Installations
3-33
Lesson Summary
■
Remote installation is the process of connecting to a Remote Installation Services
(RIS) server and starting an automated installation of Windows XP Professional on
a local computer. Remote installation enables administrators to install Windows XP
Professional on client computers throughout a network from a central location.
■
RIS is available only on computers running Windows 2000 Server or Windows
Server 2003. The RIS server can be a domain controller or a member server. In
Windows Server 2003, you use the Add/Remove Windows Components Wizard to
add the RIS service. After adding the service, you use the Remote Installation Services Setup Wizard to configure RIS.
■
Client computers that support remote installation must have one of the following
configurations:
❑
A configuration that meets the Net PC specification, and the network adapter
must be set as the primary boot device within the system BIOS
❑
A network adapter card with a PXE boot ROM, and BIOS support for starting
from the PXE boot ROM
❑
A supported network adapter card and a remote installation boot disk
Real World Automating Installations in Large Networks
In large network environments, users typically are not responsible for installing
Windows XP Professional themselves. Most IT departments have dedicated staff
whose job it is to purchase or build computers, install the operating system and
applications, configure the computer, and deliver the computers to users. Most
often, this process happens by using disk duplication or RIS.
After installation of the operating system, most large companies use software like
Microsoft Systems Management Server (SMS) to distribute and upgrade software
(SMS cannot be used to install an operating system to new computers because the
client computer must have SMS client components installed). SMS not only automates installations and upgrades; it also monitors the distribution of software
throughout the network, helps resolve problems related to installations, and generates reports on the rate and success of deployments.
3-34
Chapter 3
Deploying Windows XP Professional
Lesson 4: Using Tools to Simplify Deployment
There are some additional tools in Windows XP Professional that will help make your
deployment of the operating system easier. These tools include the Files And Settings
Transfer Wizard, the User State Migration Tool (USMT), and Windows Installer.
After this lesson, you will be able to
■ Use the Files And Settings Transfer Wizard
■ Explain the purpose of the USMT
■ Manage applications by using Windows Installer
Estimated lesson time: 60 minutes
How to Use the Files And Settings Transfer Wizard
Windows XP Professional provides the Files And Settings Transfer Wizard to simplify
the task of moving data files and personal settings from your old computer to your new
one. You do not have to configure all your personal settings on your new computer
because you can move your old settings—including display settings, Microsoft Internet
Explorer and Microsoft Outlook Express options, dial-up connections, and your folder
and taskbar options—to your new computer. The wizard also helps you move specific
files and folders to your new computer as well.
The best way to connect your old computer to your new computer is to use a network
connection, but you can also use a direct cable connection. To directly connect your
computers using a cable, you must have the following items:
■
An available COM port (serial port) on both computers
■
A null modem cable long enough to connect the two computers
Tip Null modem cables are sometimes called serial file transfer cables. The null modem
cable must be serial. You cannot use parallel cables for file transfers using the Direct cable
option. Most older computers have 25-pin serial ports, and most newer ones have 9-pin serial
ports. Before you purchase your cable, check what type of serial ports are on your computers.
To connect your computers and use a network, check out Chapter 15, “Configuring
Network and Internet Connections.” After you have connected your computers, you
are ready to run the Files And Settings Transfer Wizard.
To open the Files And Settings Transfer Wizard, do the following:
1. Click Start, point to All Programs, point to Accessories, and point to System Tools.
Lesson 4
Using Tools to Simplify Deployment
3-35
2. Click Files And Settings Transfer Wizard.
Windows XP Professional starts the Files And Settings Transfer Wizard.
3. In the Welcome To The Files And Settings Transfer Wizard page, click Next.
The Files And Settings Transfer Wizard displays the What Computer Is This page,
which has the following two options:
❑
New Computer. Select this option if you want to transfer your files and
settings to this computer.
❑
Old Computer. Select this option if you want to transfer the files and settings
on this computer to your new computer.
Note
The old computer can be running Windows 95 or later.
4. Select the Old Computer option and click Next. If you have Service Pack 2
installed, a Windows Security Alert dialog box appears. Click Unblock.
The Files And Settings Transfer Wizard displays the Select The Transfer Method
page, which has the following four options:
❑
Direct Cable. A cable that connects your computer’s serial ports.
❑
Home Or Small Office Network. Both computers must be connected to a
network.
❑
Floppy Drive Or Other Removable Media. Both computers must have the
same type of drive.
❑
Other. You can save files and settings to any disk drive or folder on your
computer or on the network.
Note
If you are saving the files and settings to your computer, you can click Browse to
locate or create a new folder to hold the files and settings.
5. Select the appropriate option and click Next. Depending on your choice, you
might be asked to configure your connection. Configure the connection, and then
click Next.
The Files And Settings Transfer Wizard displays the What Do You Want To Transfer page, which has the following three options:
❑
Settings Only. The following settings are transferred: Accessibility, Command Prompt Settings, Display Properties, Internet Explorer Settings,
Microsoft Messenger, Microsoft NetMeeting, Mouse And Keyboard, MSN
Explorer, Network Printer And Drives, Outlook Express, Regional Settings,
Sounds And Multimedia, Taskbar Options, Windows Media Player, and Windows Movie Maker.
3-36
Chapter 3
Deploying Windows XP Professional
❑
Files Only. The following folders are transferred: Desktop, Fonts, My Documents, My Pictures, Shared Desktop, and Shared Documents. The following
files types are transferred: *.asf (Windows Media Audio/Video file), *.asx
(Windows Media Audio/Video shortcut), *.AU (AU format sound), *.avi (video
clip), *.cov (fax cover page file), *.cpe (fax cover page file), *.doc (WordPad
document), *.dvr-ms (Microsoft Recorded TV Show), *.eml (Internet e-mail
message), *.m3u (M3U file), *.mid (MIDI sequence), *.midi (MIDI sequence),
*.mp2 (Movie File MPEG), *.mp3 (MP3 Format Sound), *.mpa (Movie File
MPEG), *.mpeg and *.mpg (Movie File MPEG), *.MSWMM (Windows Movie
Maker Project), *.nws (Internet News Message), *.ppi (Microsoft Passport configuration), *.rft (Rich Text Format), *.snd (AU Sound Format), *.wav (Wave
Sound), *.wm (Windows Media Audio/Video file), *.wma (Windows Media
Audio file), *.wpl (Windows Media Playlist), *.wri (Write document).
❑
Both Files And Settings.
Tip You can select the Let Me Select A Custom List Of Files And Settings When I Click Next
check box if you do not want all the default folders, file types, and settings to be transferred.
6. Select the appropriate option and click Next.
Unless you select the Let Me Select A Custom List Of Files And Settings When I
Click Next check box, the Files And Settings Transfer Wizard displays the Collection In Progress page. The Files And Settings Transfer Wizard displays the Completing The Collection Phase page.
Important
This page indicates any files and settings that the wizard could not collect. You
must manually transfer these files and settings or they will not be transferred to your new
computer.
7. Click Finish to complete the wizard on your old computer.
8. Move to your new computer and run the Files And Settings Transfer Wizard on it
to complete the transfer of files and settings.
What Is the User State Migration Tool?
The User State Migration Tool (USMT) provides all the same functionality as the Files
And Settings Transfer Wizard plus the ability to fully customize specific settings such as
unique modifications to the Registry. Where the Files And Settings Transfer Wizard is
designed for a single user to migrate settings and files from an old computer to a new
computer, the USMT is designed for administrators to facilitate large-scale deployments
of Windows XP Professional in an Active Directory setting.
Lesson 4
Using Tools to Simplify Deployment
3-37
The USMT consists of two executable files (ScanState.exe, LoadState.exe), and four
migration rule information files (Migapp.inf, Migsys.inf, Miguser.inf, and Sysfiles.inf).
ScanState.exe collects user data and settings based on the information contained in
Migapp.inf, Migsys.inf, Miguser.inf and Sysfiles.inf. LoadState.exe deposits this user
state data on a computer running a fresh (not upgraded) installation of Windows XP
Professional.
See Also
For more information on using the USMT, visit http://www.microsoft.com/technet/
prodtechnol/winxppro/deploy/usermigr.mspx.
How to Manage Applications by Using Windows Installer
Windows Installer and installation packages (.msi files) simplify the installation and
removal of software applications. An installation package contains all the information
that the Windows Installer requires to install or uninstall an application or product and to
run the setup user interface. Each installation package includes an .msi file that contains
an installation database, a summary information stream, and data streams for various
parts of the installation. The .msi file can also contain one or more transforms, internal
source files, and external source files or cabinet files required by the installation.
If there is a problem during the installation of a software application, or if the installation fails, Windows Installer can restore or roll back the operating system to its previous state. Windows Installer also reduces conflicts between applications by preventing
the installation of an application from overwriting a dynamic-link library (DLL) used by
another application. Windows Installer can determine if an application you installed
using it has any missing or corrupted files, and can then replace them to resolve the
problem.
To preserve users’ disk space, Windows Installer allows you to install only the essential
files required to run an application. It supports the installation of application features
on demand, which means that the first time a user accesses any feature not included in
the minimal installation, the necessary files are automatically installed. Windows
Installer allows you to configure unattended application installations and it supports
both 32-bit and 64-bit applications.
The Windows Installer can advertise the availability of an application to users or other
applications without actually installing the application. If an application is advertised,
only the interfaces required for loading and launching the application are presented to
the user or other applications. If a user or application activates an advertised interface,
the installer then proceeds to install the necessary components.
The two types of advertising are assigning and publishing. An application appears
installed to a user when that application is assigned to the user. The Start menu
contains the appropriate shortcuts, icons are displayed, files are associated with the
3-38
Chapter 3
Deploying Windows XP Professional
application, and Registry entries reflect the application’s installation. When the user
tries to open an assigned application, it is installed upon demand.
You can also publish a Windows Installer application from within Active Directory. A
published application becomes available to the user for installation, but is not advertised to the user. The user can locate and install the application by using the Add Or
Remove Programs tool in Control Panel.
Windows Installer supports Microsoft’s .NET framework technology. The .NET framework gives developers code reuse, code specialization, resource management, multilanguage development, improved security, deployment, and administration. Windows
Installer also provides software restriction policies that provide virus protection, including protection from Trojan horse viruses and worms propagated through e-mail and
the Web.
The way you troubleshoot a Windows Installer package depends on the problem you
are having. If a Windows Installer package does not install correctly, you need to determine whether the package has become corrupted. To repair a corrupted Windows
Installer package, use the Windows Installer repair option. Open a command prompt
and type the following command:
msiexec /f[p][o][e][d][c[][a][u][m][s][v] {package|ProductCode}
For an explanation of the parameters used with the /f switch in the Msiexec.exe command, see Table 3-3.
Table 3-3
Parameters for the /f Switch for Msiexec.exe
Parameters
Description
P
Reinstall only if the file is missing
O
Reinstall if the file is missing or if an older version is installed
E
Reinstall if the file is missing or if an equal or older version is installed
D
Reinstall if the file is missing or if a different version is installed
C
Reinstall if the file is missing or if the stored checksum does not match the
calculated value
A
Force all the files to be reinstalled
U
Rewrite all the required user-specific Registry entries
M
Rewrite all the required computer-specific Registry entries
S
Overwrite all the existing shortcuts
V
Run from source and recache the local package
There are several additional switches for the Msiexec.exe command. These switches
include the ones explained in Table 3-4. In this table, package is the name of the
Lesson 4
Using Tools to Simplify Deployment
3-39
Windows Installer Package file, and ProductCode is the globally unique identifier
(GUID) of the Windows Installer package. For a complete listing of switches, see Help
And Support Center.
Table 3-4
Switches for Msiexec.exe
Switch
Parameter
Description
/I
{package|ProductCode}
Installs or configures a product
For example: msiexec /i a:\sample.msi
/a
Package
Administrative installation option
For example: msiexec /a a:\sample.msi
/x
{package|ProductCode}
Uninstalls a product
For example: msiexec /x sample.msi
/j
[u|m]package]
Advertises a product, as follows:
u Advertises to the current user
m Advertises to all users
For example: msiexec /jm sample.msi
/L
[i][w][e][a][r][u]
[c][m][p][v][+][!]logfile
The path to the log file. The parameters specify
what to log, as follows:
i Log status messages
w Log nonfatal warnings
e Log all error messages
a Log all startup actions
r Log action-specific records
u Log user requests
c Log initial user interface parameters
m Log out of memory
p Log terminal properties
v Log verbose output
+ Append to existing file
! Flush each line to the log
* Log all information except the v option (wildcard)
To include the v options, specify /L*v
If the installation process stops before completing, either Windows Installer was unable
to read the package, or conditions on your computer prevented it from installing the
application. Open Event Viewer and review the Application log.
See Also For more information about how to use Event Viewer, see Chapter 18, “Using
Windows XP Tools.”
3-40
Chapter 3
Deploying Windows XP Professional
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. When do you use the Files And Settings Transfer Wizard?
2. Which of the following statements are true for the Files And Settings Transfer Wizard?
(Choose all that apply.)
a. You run the Files And Settings Transfer Wizard only on your old computer.
b. You must run the Files And Settings Transfer Wizard on both your old and
your new computers.
c. You can use a standard 25-pin cable to connect the parallel ports on your old
and new computers to run the Files And Settings Transfer Wizard.
d. You can use serial ports to directly connect your old and new computers to
run the Files And Settings Transfer Wizard.
3. How can Windows Installer help you minimize the amount of disk space taken up
on a user’s disk when you install a new application on that user’s disk?
Lesson Summary
■
The Files And Settings Transfer Wizard simplifies the task of moving data files and
personal settings from your old computer to your new one. The Files And Settings
Transfer Wizard can move your display settings, Internet Explorer and Outlook
Express options, dial-up connections, and your folder and taskbar options to your
new computer.
Case Scenario Exercise
3-41
■
The USMT offers all the advantages of the Files And Settings Transfer Wizard, but is
geared toward large-scale deployments of multiple users in an Active Directory setting.
■
Windows Installer has a client-side installer service, Msiexec.exe, which allows the
operating system to control the installation. Windows Installer uses the information stored in the package file, an .msi file, to install the application.
Case Scenario Exercise
In this exercise, you will read a scenario about deploying Windows XP Professional, and
then answer the questions that follow. If you have difficulty completing this work, review
the material in this chapter before beginning the next chapter. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
Scenario
You are working as an administrator for the School of Fine Art, which has a large campus
in San Francisco. The school’s network consists of 75 client computers running Windows XP Professional and six servers running Windows Server 2003. All computers are
members of the same Active Directory domain. Two of the servers are configured as
domain controllers. The rest are configured as member servers that serve various roles on
the network. The company is adding 25 computers to its network, and you have been
given the responsibility of installing Windows XP Professional on these computers. All 25
of these computers are the same model computer from the same manufacturer and have
similar hardware. Your company has a volume licensing arrangement and has purchased
an additional 25 licenses of Windows XP Professional for the computers.
Questions
1. What automated methods could you use to install Windows XP Professional on
these computers?
2. Because all the computers have the same hardware configuration, you have
decided to use disk duplication to install Windows XP Professional on the computers. What component will you need to obtain that does not come with Windows XP Professional?
3-42
Chapter 3
Deploying Windows XP Professional
3. How should you prepare the reference computer?
Troubleshooting Lab
You are working as an administrator for a company named Wide World Importers,
which has recently hired a number of new employees. The company has purchased a
number of new computers and placed them in the appropriate locations. You do not
have time to install Windows XP Professional for every new user, so you have installed
a RIS server that will enable users to install the operating system when they first start
their computers. The new users have been briefed on the process, but you decide to
test the process on one of the new computers. When you turn on his computer, the
process does not work.
List the network, server, and client requirements for using a RIS server and why those
requirements are important.
The requirements for using a RIS server are as follows:
■
RIS requires an Active Directory environment with DNS and DHCP service. RIS clients must be able to contact a DHCP server to obtain an IP address so they can
communicate with other devices on the network. RIS clients require DNS so that
they can locate the appropriate services in Active Directory. RIS clients require
Active Directory so that they can locate RIS servers.
■
RIS must be installed on a server running Windows 2000 Server or Windows
Server 2003 that is a member of an Active Directory domain. You must add the RIS
service to the computer, and then set the service up.
■
RIS clients must be able to boot from the network. To do this, the client must support the Net PC specification or have a PXE-compliant network adapter, or you
must create a floppy boot disk for the client with drivers for the client’s network
adapter.
Exam Highlights
3-43
Chapter Summary
■
Small deployments or situations involving many different hardware configurations
often use an unattended installation, in which the Winnt32 and Winnt commands
are used along with an unattended answer file to script the installation. This file is
created with Windows Setup Manager.
■
Many larger enterprise deployments use disk duplication to deploy systems, a process in which you use the System Preparation Tool to create an image from a computer running Windows XP Professional, and then clone that image on other
computers. Using disk duplication usually requires third-party software.
■
Microsoft provides RIS for use in environments in which Active Directory service
is available. The RIS server software (which resides on a server computer running
Windows 2000 Server or Windows Server 2003) stores images of Windows XP
installations and makes those images available over the network. A client computer boots from the network (or using a special RIS boot disk), contacts the RIS
server, and then installs an image from that server.
■
Windows XP Professional also provides tools that help make your deployment of
Windows XP Professional easier. These tools include the Files And Settings Transfer Wizard, the USMT, and Windows Installer.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
An answer file is used to provide the common configuration settings for all computers that are affected during an unattended installation. A UDF provides the
unique settings that each computer needs to distinguish it from other computers.
■
RIS requires an Active Directory environment so that RIS clients can locate RIS
servers. Active Directory requires that DNS be used on a network; DNS is used to
locate services in Active Directory. DHCP is also required for RIS because RIS clients must be able to contact a DHCP server to obtain an IP address so that they
can communicate with other devices on the network.
■
There are three ways that a RIS client can boot from the network and locate a RIS
server: by being compliant with the Net PC configuration, having a PXE-compliant
network adapter, or having a supported network adapter card and using a RIS
boot disk.
3-44
Chapter 3
Deploying Windows XP Professional
Key Terms
answer file A text file that supplies Windows XP Professional Setup with information
necessary during the installation process.
disk duplication An automated installation in which you use the System Preparation
Tool to create an image from a computer running Windows XP Professional, and
then clone that image on other computers. Using disk duplication usually requires
third-party software.
Files And Settings Transfer Wizard A Windows XP Professional wizard that simplifies the task of moving data files and personal settings from your old computer to
your new one.
Preboot eXecution Environment (PXE) A standard for network booting that is
supported by some network adapters. Using a PXE-compliant network adapter is
one of three configurations that allow a RIS client to boot from the network and
locate a RIS server. (RIS clients can also be compliant with the Net PC specification
or use a RIS boot disk.)
Remote Installation Services (RIS) Software stores images of Windows XP installations and makes those images available over the network.
System Preparation A utility that allows you to prepare master images of an existing Windows XP installation for distribution to other computers by removing
machine-specific information from the computer.
unattended installation An automated installation in which the Winnt32 and Winnt
commands are used along with an unattended answer file to script the installation.
uniqueness database file (UDF) A text file that is used in conjunction with an
answer file and contains the settings that are unique to each computer.
User State Migration Tool (USMT) A utility that provides all the same functionality
as the Files And Settings Transfer Wizard plus the ability to fully customize specific
settings such as unique modifications to the Registry. The USMT is designed for
administrators to facilitate large-scale deployments of Windows XP Professional in
an Active Directory setting.
Windows Setup Manager A wizard-based program that allows you to quickly create
a script for a unattended installation of Windows XP Professional.
winnt.exe A command-line utility used to start Windows Setup from the MS-DOS or
Windows 3.1 command prompt.
winnt32.exe A command-line utility used to start Windows Setup from the Windows 95 or later command prompt.
Questions and Answers
3-45
Questions and Answers
Lesson 1 Review
Page
3-16
1. What is the purpose of Windows Setup Manager?
Windows Setup Manager makes it easy to create the answer files and uniqueness database
files that you use to run unattended installations.
2. How can you apply an application update pack as part of the Windows XP Professional installation?
You need to add the commands to execute in the Additional Commands page of the Windows
Setup Manager Wizard so that the update packs will be applied to the application as part of the
Windows XP Professional installation.
3. What type of answer files does Windows Setup Manager allow you to create?
Windows Unattended Installation, Sysprep Install, and RIS
4. Why would you use a UDF?
A UDF allows you to specify per-computer parameters for an unattended installation. This file
overrides values in the answer file.
Lesson 2 Practice: Exercise 1
Page
3-21
4. What do the optional parameters /pnp and /noreboot do?
The /pnp parameter forces the destination computer to detect Plug and Play devices on their
first reboot following installation. The /noreboot parameter prevents the computer on which
you are running Sysprep.exe from rebooting after running Sysprep.exe.
A Windows System Preparation Tool dialog box appears, warning you that running Sysprep
might modify some of the security parameters of this system.
Lesson 2 Review
Page
3-24
1. What is disk duplication?
Creating a disk image of a Windows XP Professional installation and copying that image to multiple computers with identical hardware configurations.
2. What is the purpose of the System Preparation Tool?
The System Preparation Tool was developed to prepare a master image for disk copying. Every
computer must have a unique SID. The System Preparation Tool adds a system service to the
master image that will create a unique local domain SID the first time the computer to which
the master image is copied is started. The System Preparation Tool also adds a Mini-Setup Wizard to the master copy that runs the first time the computer to which the master image is copied is started and guides you through entering user-specific information.
3-46
Chapter 3
Deploying Windows XP Professional
3. What does the /quiet switch do when you run Sysprep.exe?
The /quiet switch causes Sysprep.exe to run without any user intervention.
Lesson 3 Review
Page
3-32
1. What is a RIS server and what is it used for?
A RIS server is a computer running Windows 2000 Server or Windows Server 2003, on which
you have installed RIS. The RIS server is used to perform remote installations of Windows XP
Professional. Remote installation enables administrators to install Windows XP Professional on
client computers throughout a network from a central location.
2. What network services are required for RIS?
DNS Service, DHCP, and Active Directory
3. What can you do if the network adapter card in a client is not PXE-compliant?
Does this solution work for all network adapter cards? Why or why not?
If the network adapter card in a client is not PXE-compliant, you can create a remote installation
boot disk that simulates the PXE boot process. A remote installation boot disk does not work
for all network adapter cards; it works only for those cards supported by the Windows 2000
Remote Boot Disk Generator.
4. Which user rights must be assigned to the user account that will be used to perform the remote installation?
The user account that will be used to perform the installation must be assigned the user right
Log On As A Batch Job.
Lesson 4 Review
Page
3-40
1. When do you use the Files And Settings Transfer Wizard?
The Files And Settings Transfer Wizard helps you move data files and personal settings when
you upgrade your hardware. The settings you can move include display settings, Internet
Explorer and Outlook Express options, dial-up connections, and your folder and taskbar
options. The wizard also helps you move specific files and folders to your new computer.
2. Which of the following statements are true for the Files And Settings Transfer
Wizard? (Choose all that apply.)
a. You run the Files And Settings Transfer Wizard only on your old computer.
b. You must run the Files And Settings Transfer Wizard on both your old and
your new computers.
c. You can use a standard 25-pin cable to connect the parallel ports on your old
and new computers to run the Files And Settings Transfer Wizard.
d. You can use serial ports to directly connect your old and new computers to
run the Files And Settings Transfer Wizard.
Questions and Answers
3-47
The correct answers are B and D. A is not correct because you run the wizard on both the old
and new computers. C is not correct because you use parallel ports to directly connect the old
and new computers.
3. How can Windows Installer help you minimize the amount of disk space taken up
on a user’s disk when you install a new application on that user’s disk?
Windows Installer allows you to install only the essential files required to run an application to
reduce the amount of space used on a user’s hard disk. The first time a user accesses any feature not included in the minimal installation, the necessary files are automatically installed.
Case Scenario Exercise Questions
Page
3-41
1. What automated methods could you use to install Windows XP Professional on
these computers?
You could use one of the three methods discussed in this chapter: use Setup Manager to create an answer file, use the System Preparation Tool to prepare images for disk duplication, or
configure RIS on one of the server computers.
2. Because all the computers have the same hardware configuration, you have
decided to use disk duplication to install Windows XP Professional on the computers. What component will you need to obtain that does not come with Windows XP Professional?
You will need to obtain a disk duplication utility to copy the disk images to the new computers.
3. How should you prepare the reference computer?
You should first install Windows XP Professional on the reference computer, and then apply all
available software updates. You should then configure Windows as it should be configured on
all the computers. You should also install any other applications that all of the computers will
need. After you have done this, you should run the System Preparation Tool on the reference
computer to prepare it for disk imaging.
4 Modifying and
Troubleshooting the Startup
Process
Exam Objectives in this Chapter:
■
Restore and back up the operating system, System State data, and user data.
❑
Troubleshoot system restoration by starting in safe mode.
❑
Recover System State data and user data by using the Recovery Console.
Why This Chapter Matters
Troubleshooting startup problems in Microsoft Windows XP Professional is an
important skill. To effectively troubleshoot startup problems, you must have a
clear understanding of how the startup process works. This chapter introduces
the Windows XP Professional startup process. It also teaches how the Windows
Registry works and how to use the startup and recovery tools that Windows XP
Professional provides.
Lessons in this Chapter:
■
Lesson 1: Explaining the Startup Process . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-2
■
Lesson 2: Editing the Registry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15
■
Lesson 3: Troubleshooting Problems Using Startup and Recovery Tools. . . . .4-25
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have Windows XP Professional installed on your computer.
4-1
4-2
Chapter 4
Modifying and Troubleshooting the Startup Process
Lesson 1: Explaining the Startup Process
In this lesson, you learn about the files that Windows XP Professional uses during the
startup process. You also learn the five stages of startup: preboot sequence, boot
sequence, kernel load, kernel initialization, and logon. You also learn how to effectively troubleshoot the Windows XP Professional startup process.
After this lesson, you will be able to
■ Describe the files used in the startup process.
■ Explain what happens during the preboot sequence.
■ Explain what happens during the boot sequence.
■ Explain the purpose and function of the BOOT.INI file.
■ Explain what happens during the kernel load phase.
■ Explain what happens during the kernel initialization phase.
■ Explain what happens during the logon phase.
Estimated lesson time: 40 minutes
Files Used in the Startup Process
Windows XP Professional requires certain files during startup. Table 4-1 lists the files
used in the Windows XP Professional startup process, the appropriate location of each
file, and the phases of the startup process associated with each file.
Note
%systemroot% represents the path of your Windows XP Professional installation directory, which by default is a folder named \Windows on the system partition.
Table 4-1
Files Used in the Windows XP Professional Startup Process
File
Location
Startup Phase
NTLDR
System partition root (C:\ )
Preboot and boot
BOOT.INI
System partition root
Boot
BOOTSECT.DOS
System partition root
Boot (optional)
NTDETECT.COM
System partition root
Boot
NTBOOTDD.SYS
System partition root
Boot (optional)
NTOSKRNL.EXE
%systemroot%\System32
Kernel load
HAL.DLL
%systemroot%\System32
Kernel load
SYSTEM
%systemroot%\System32
Kernel initialization
Device drivers (.sys)
%systemroot%\System32\Drivers
Kernel initialization
Lesson 1
Explaining the Startup Process
4-3
Note
To view the files listed in Table 4-1, open Windows Explorer and click Folder Options
on the Tools menu. In the View tab of the Folder Options dialog box, under Hidden Files And
Folders, click Show Hidden Files And Folders. Clear the Hide Protected Operating System
Files (Recommended) check box. A Warning message box appears, indicating that it is not a
good idea to display the protected operating system files. Click Yes to display them. Click OK
to close the Folder Options dialog box.
What Happens During the Preboot Sequence
During startup, a computer running Windows XP Professional initializes and then
locates the boot portion of the hard disk.
The following four steps occur during the preboot sequence:
1. The computer runs power-on self test (POST) routines to determine the amount of
physical memory, whether the hardware components are present, and so on. If
the computer has a Plug and Play–compatible basic input/output system (BIOS),
enumeration and configuration of hardware devices occurs at this stage.
2. The computer BIOS locates the boot device, and then loads and runs the Master
Boot Record (MBR).
3. The MBR scans the partition table to locate the active partition, loads the boot sector on the active partition into memory, and then executes it.
4. The computer loads and initializes the NTLDR file, which is the operating system
loader.
Note
Windows XP Professional Setup modifies the boot sector during installation so that
NTLDR loads during system startup.
There are a number of problems that can occur during the preboot sequence, including
the following:
Improper hardware configuration or malfunctioning hardware If the BIOS
cannot detect a hard drive during its POST routine, startup fails early during the
preboot sequence and usually presents a message stating that a hard drive cannot
be located.
Corrupt MBR If your MBR becomes corrupt (a fairly common action taken by
viruses), you can generally repair it by using the Recovery Console, which is covered in Lesson 3, “Troubleshooting Problems Using Startup and Recovery Tools.”
Antivirus software can prevent and often repair a corrupt MBR.
4-4
Chapter 4
Modifying and Troubleshooting the Startup Process
Floppy or USB disk inserted If you see an error message stating that there is a nonsystem disk or a disk error, or stating that no operating system could be found, a
common reason is that a floppy disk or a universal serial bus (USB) flash memory
disk is inserted in the drive during startup. On most computers, BIOS is configured
by default to try starting using the floppy drive or an available USB drive before it
attempts to start by using the hard drive.
What Happens During the Boot Sequence
After the computer loads NTLDR into memory, the boot sequence gathers information
about hardware and drivers in preparation for the Windows XP Professional load
phases. The boot sequence uses the following files: NTLDR, BOOT.INI, BOOTSECT.DOS (optional), NTDETECT.COM, and NTOSKRNL.EXE.
The boot sequence has four phases: initial boot loader phase, operating system selection,
hardware detection, and configuration selection (described in the following sections).
Initial Boot Loader Phase
During the initial boot loader phase, NTLDR switches the microprocessor from real
mode to 32-bit flat memory mode, which NTLDR requires to carry out any additional
functions. Next, NTLDR starts the appropriate minifile system drivers. The minifile system drivers are built into NTLDR so that NTLDR can find and load Windows XP Professional from partitions formatted with file allocation table (FAT), FAT32, or NT file
system (NTFS).
Operating System Selection
During the boot sequence, NTLDR reads the BOOT.INI file. If more than one operating
system selection is available in the BOOT.INI file, a Please Select The Operating System
To Start screen appears, listing the operating systems specified in the BOOT.INI file. If
you do not select an entry before the timer reaches zero, NTLDR loads the operating
system specified by the default parameter in the BOOT.INI file. Windows XP Professional Setup sets the default parameter to the most recent Windows XP Professional
installation. If there is only one entry in the BOOT.INI file, the Please Select The Operating System To Start screen does not appear, and the default operating system is automatically loaded.
Note
If the BOOT.INI file is not present, NTLDR attempts to load Windows XP Professional
from the first partition of the first disk—typically C:\.
Lesson 1
Explaining the Startup Process
4-5
Hardware Detection
NTDETECT.COM and NTOSKRNL.EXE perform hardware detection. NTDETECT.COM
executes after you select Windows XP Professional on the Please Select The Operating
System To Start screen (or after the timer times out).
Note
If you select an operating system other than Windows XP Professional (such as Windows 98), NTLDR loads and executes BOOTSECT.DOS, which is a copy of the boot sector that
was on the system partition at the time Windows XP Professional was installed. Passing execution to BOOTSECT.DOS starts the boot process for the selected operating system.
NTDETECT.COM collects a list of currently installed hardware components and
r e t u r n s this list to NTLDR for later inclusion in the Registry under the
HKEY_LOCAL_MACHINE\HARDWARE key.
NTDETECT.COM detects the following components:
■
Bus/adapter type
■
Communication ports
■
Floating-point coprocessor
■
Floppy disks
■
Keyboard
■
Mouse/pointing device
■
Parallel ports
■
SCSI adapters
■
Video adapters
Configuration Selection
After NTLDR starts loading Windows XP Professional and collects hardware information, the operating system loader presents you with the Hardware Profile/Configuration Recovery menu, which contains a list of the hardware profiles that are set up on
the computer. The first hardware profile is highlighted. You can press the DOWN
arrow key to select another profile. You also can press L to invoke the Last Known
Good configuration.
If there is only a single hardware profile, NTLDR does not display the Hardware Profile/Configuration Recovery menu and loads Windows XP Professional using the
default hardware profile configuration.
4-6
Chapter 4
Modifying and Troubleshooting the Startup Process
Troubleshooting the Boot Sequence
There are a number of problems that can occur during the boot sequence, including
the following:
Missing or corrupt boot files If the NTLDR, BOOT.INI, BOOTSECT.DOS, NTDETECT.COM, or NTOSKRNL.EXE files become corrupt or are missing, you see an error
message indicating the situation, and Windows startup fails. You should use the Recovery Console (described in Lesson 3) to restore the files.
Improperly configured BOOT.INI An improperly configured BOOT.INI file generally results from an error while manually editing the file or from a change to disk configuration. It is also possible for the BOOT.INI file to become corrupt or missing. In this
case, you should use the Recovery Console to restore the files.
Improperly configured hardware NTDETECT.COM can fail during its detection of
hardware if a hardware device is incorrectly configured, a bad driver is installed, or the
device is malfunctioning. If startup fails during hardware detection, you should begin
troubleshooting hardware by removing unnecessary devices from the computer and
adding them back one at a time until you discover the source of the problem. You can
also try the Last Known Good configuration if you suspect that a new configuration or
driver is at fault.
What Is the BOOT.INI File?
When you install Windows XP Professional on a computer, Windows Setup saves the
BOOT.INI file in the active partition. NTLDR uses information in the BOOT.INI file to
display the boot loader screen, from which you select the operating system to start.
The BOOT.INI file includes two sections, [boot loader] and [operating systems], which
contain information that NTLDR uses to create the Boot Loader Operating System
Selection menu. A typical BOOT.INI might contain the following lines:
[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS=”Microsoft Windows XP Professional” /fastdetect
multi(0)disk(0)rdisk(0)partition(1)\WINNT=”Windows NT Workstation Version 4.00”
multi(0)disk(0)rdisk(1)partition(1)\ WINNT=”Windows NT Server Workstation 4.00 [VGA mo
de]” /basevideo /sos
C:\CMDCONS\BOOTSECT.DAT=”Microsoft Windows Recovery Console” /cmdcons
The [operating systems] section of a BOOT.INI file that is created during a default installation of Windows XP Professional contains a single entry for Windows XP Professional. If your computer is a Windows 95–based or Windows 98–based dual-boot
Lesson 1
Explaining the Startup Process
4-7
system, the [operating systems] section also contains an entry for starting the system by
using the other operating system. If you installed Windows XP Professional on a computer and kept an installation of Windows NT 4.0 on another partition of the same
computer, the [operating systems] section also contains an entry for starting the system
using this version of Windows NT.
ARC Paths
During installation, Windows XP Professional generates the BOOT.INI file, which contains Advanced RISC Computing (ARC) paths pointing to the computer’s boot partition.
(RISC stands for Reduced Instruction Set Computing, a microprocessor design that uses
a small set of simple instructions for fast execution.) The following is an example of an
ARC path:
multi(0)disk(0)rdisk(1)partition(2)
Table 4-2 describes the naming conventions for ARC paths.
Table 4-2
ARC Path Naming Conventions
Convention
Description
multi(x) | scsi(x)
The adapter/disk controller. Use scsi to indicate a Small Computer System
Interface (SCSI) controller on which SCSI BIOS is not enabled. For all
other adapter/disk controllers, use multi, including SCSI disk controllers
with BIOS enabled. Here, x represents a number that indicates the load
order of the hardware adapter. For example, if you have two SCSI adapters in a computer, the first to load and initialize receives number 0, and
the next SCSI adapter receives number 1.
Disk(y)
The SCSI ID. For multi, this value is always 0.
Rdisk(z)
A number that identifies the disk (ignored for SCSI controllers).
Partition(a)
A number that identifies the partition.
In both multi and scsi conventions, multi, scsi, disk, and rdisk numbers are assigned
starting with 0. Partition numbers start with 1. All primary partitions are assigned numbers first, followed by logical volumes in extended partitions.
!
Exam Tip
Learn the syntax of ARC paths and how to determine which disk and partition a particular path refers to. Most disk types use the multi convention. The value following multi indicates the disk number. The value following partition indicates the partition number on that disk.
See Figure 4-1 for some examples of how to determine the ARC path.
4-8
Chapter 4
Modifying and Troubleshooting the Startup Process
multi(0)disk(0)rdisk(1)partition(2)
No BIOS
multi(0)
scsi(0)
rdisk(1)
rdisk(0)
partition
(1)
partition
(2)
C:
D:
F:
G:
disk(0)
partition
(1)
partition
(2)
E:
partition
(1)
F04us01
Figure 4-1 ARC paths list the available partitions.
The scsi ARC naming convention varies the disk(y) parameter for successive disks on
one controller, whereas the multi format varies the rdisk(z) parameter.
BOOT.INI Switches
You can add a variety of switches to the entries in the [operating systems] section of the
BOOT.INI file to provide additional functionality. Table 4-3 describes some of these
optional switches that you can use for entries in the BOOT.INI file.
Table 4-3
BOOT.INI Optional Switches
Switch
Description
/basevideo
Boots the computer using the standard Video Graphics
Adapter (VGA) video driver. If a new video driver is not
working correctly, use this switch to start Windows XP
Professional, and then change to a different driver.
/fastdetect=[comx | comx,y,z.]
Disables serial mouse detection. Without a port specification,
this switch disables peripheral detection on all COM ports.
This switch is included in every entry in the BOOT.INI file by
default.
/maxmem:n
Specifies the amount of random access memory (RAM) that
Windows XP Professional uses. Use this switch if you suspect
that a memory chip is bad.
/noguiboot
Boots the computer without displaying the graphical boot
status screen.
/sos
Displays the device driver names as they are loading. Use this
switch when startup fails while loading drivers to determine
which driver is triggering the failure.
Lesson 1
Explaining the Startup Process
4-9
Modifications to BOOT.INI
You can modify the timeout and default parameter values in the BOOT.INI file using
the Startup And Recovery dialog box (which you can open from the Advanced tab of
the System Properties dialog box). In addition, you can manually edit these and other
parameter values in the BOOT.INI file. For example, you might modify the BOOT.INI
file to add more descriptive entries for the Boot Loader Operating System Selection
menu or to include various switches to aid in troubleshooting the boot process.
During Windows XP Professional installation, Windows Setup sets the read-only and
system attributes for the BOOT.INI file. Before editing the BOOT.INI file with a text
editor, you must make the file visible and turn off the read-only attribute. You can
change file attributes using My Computer, Windows Explorer, or the command prompt.
To change file attributes by using My Computer or Windows Explorer, complete the
following steps:
1. From the Start menu, click My Computer.
2. In the My Computer window, double-click the icon for the drive containing the
BOOT.INI file.
3. On the Tools menu, click Folder Options.
4. In the Folder Options dialog box, on the View tab, click Show Hidden Files And
Folders. Clear the Hide Protected Operating System Files check box and click Yes
when prompted. Click OK.
5. Click Show The Contents Of This Drive. In the window showing the contents of
the drive, right-click the file named BOOT, and then click Properties.
6. On the General tab, under Attributes, clear the Read-Only check box, and then
click OK.
To change file attributes using the command prompt, switch to the directory containing
the BOOT.INI file if necessary, and then type
attrib -s -r boot.ini
After you have changed the attributes of the BOOT.INI file, you can open and modify
the file using a text editor.
What Happens During the Kernel Load Phase
After configuration selection, the Windows XP Professional kernel (NTOSKRNL.EXE)
loads and initializes. NTOSKRNL.EXE also loads and initializes device drivers and loads
services. If you press ENTER when the Hardware Profile/Configuration Recovery menu
4-10
Chapter 4
Modifying and Troubleshooting the Startup Process
appears, or if NTLDR makes the selection automatically, the computer enters the kernel
load phase. The screen clears, and a series of white rectangles appears across the bottom of the screen, indicating startup progress.
During the kernel load phase, NTLDR does the following:
■
Loads NTOSKRNL.EXE, but does not initialize it.
■
Loads the hardware abstraction layer file (HAL.DLL).
■
Loads the HKEY_LOCAL_MACHINE\SYSTEM Registry key.
■
Selects the control set it will use to initialize the computer. A control set contains
configuration data used to control the system, such as a list of the device drivers
and services to load and start.
■
Loads device drivers with a value of 0x0 for the Start entry. These typically are
low-level hardware device drivers, such as those for a hard disk. The value for the
List entry, which is specified in the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ServiceGroupOrder subkey of the Registry, defines the order
in which NTLDR loads these device drivers.
Problems during the kernel load phase of startup often occur because of corrupted system files or because of a hardware malfunction. In the case of corrupted system files,
you can try to replace those files using the Recovery Console, which is covered in Lesson 3. In the case of a hardware problem, you will likely need to troubleshoot by
removing or replacing hardware components until you identify the problem. You may
be able to isolate the hardware device causing the problem by enabling boot logging
(which is also covered in Lesson 3).
What Happens During the Kernel Initialization Phase
When the kernel load phase is complete, the kernel initializes, and then NTLDR passes
control to the kernel. At this point, the system displays a graphical screen with a status
bar that indicates load status. Four tasks are accomplished during the kernel initialization stage:
The Hardware key is created. On successful initialization, the kernel uses the data
collected during hardware detection to create the Registry key
HKEY_LOCAL_MACHINE\HARDWARE. This key contains information about
hardware components on the system board and the interrupts used by specific
hardware devices.
The Clone control set is created. The kernel creates the Clone control set by copying the control set referenced by the value of the Current entry in the
Lesson 1
Explaining the Startup Process
4-11
HKEY_LOCAL_MACHINE\SYSTEM\Select subkey of the Registry. The Clone control set is never modified because it is intended to be an identical copy of the data
used to configure the computer and should not reflect changes made during the
startup process.
Device drivers are loaded and initialized. After creating the Clone control set, the
kernel initializes the low-level device drivers that were loaded during the kernel
load phase. The kernel then scans the HKEY_LOCAL_MACHINE\ SYSTEM\CurrentControlSet\Services subkey of the Registry for device drivers with a value of
0x1 for the Start entry. As in the kernel load phase, a device driver’s value for the
Group entry specifies the order in which it loads. Device drivers initialize as soon
as they load. If an error occurs while loading and initializing a device driver, the
boot process proceeds based on the value specified in the ErrorControl entry for
the driver. Table 4-4 describes the possible ErrorControl values and the resulting
boot sequence actions.
Table 4-4
ErrorControl Values and Resulting Action
ErrorControl
Value
Action
0x0 (Ignore)
The boot sequence ignores the error and proceeds without displaying an
error message.
0x1 (Normal)
The boot sequence displays an error message, but ignores the error and proceeds.
0x2 (Severe)
The boot sequence fails and then restarts using the Last Known Good control
set. If the boot sequence is currently using the Last Known Good control set,
the boot sequence ignores the error and proceeds.
0x3 (Critical)
The boot sequence fails and then restarts using the Last Known Good control
set. However, if the Last Known Good control set is causing the critical error,
the boot sequence stops and displays an error message.
Note
ErrorControl values appear in the Registry under the subkey HKEY_LOCAL_MACHINE\
SYSTEM\CurrentControlSet\Services\name_of_service_or_driver\ErrorControl.
Services are started. After the kernel loads and initializes device drivers, Session
Manager (SMSS.EXE) starts the higher-order subsystems and services for Windows
XP Professional. Session Manager executes the instructions in the BootExecute
data item, and in the Memory Management, DOS Devices, and SubSystems keys.
Table 4-5 describes the function of each instruction set and the resulting Session
Manager action.
4-12
Chapter 4
Table 4-5
Modifying and Troubleshooting the Startup Process
Session Manager Reads and Executes These Instruction Sets
Data Item or Key Action
BootExecute
data item
Session Manager executes the commands specified in this data item before
it loads any services.
Memory Management key
Session Manager creates the paging file information required by the Virtual
Memory Manager.
DOS Devices key
Session Manager creates symbolic links that direct certain classes of commands to the correct component in the file system.
SubSystems key
Session Manager starts the Win32 subsystem, which controls all input/output (I/O) and access to the video screen, and starts the WinLogon process.
What Happens During the Logon Phase
The logon phase begins at the conclusion of the kernel initialization phase. The Win32
subsystem automatically starts WINLOGON.EXE, which in turn starts the Local Security
Authority (LSASS.EXE) and displays the Logon dialog box. You can log on at this time,
even though Windows XP Professional might still be initializing network device drivers.
Next, the Service Control Manager executes and makes a final scan of the HKEY_
LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services subkey, looking for services
with a value of 0x2 for the Start entry. These services, including the Workstation service
and the Server service, are marked to load automatically.
The services that load during this phase do so based on their values for the DependOnGroup or DependOnService entries in the HKEY_LOCAL_MACHINE\ SYSTEM\CurrentControlSet\Services Registry subkey.
A Windows XP Professional startup is not considered good until a user successfully
logs on to the system. After a successful logon, the system copies the Clone control set
to the Last Known Good control set.
Note
For more information on Last Known Good configuration, see Lesson 3 later in this
chapter.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you are unable to answer a question, review the lesson
materials and try the question again. You can find answers to the questions in the
“Questions and Answers” section at the end of this chapter.
Lesson 1
Explaining the Startup Process
4-13
1. Windows XP Professional modifies the boot sector during installation so that
__________ loads during system startup. Fill in the blank.
2. What is the purpose of the BOOT.INI file, and what happens if it is not present?
3. What does the BOOTSECT.DOS file contain and when is it used?
4. A user calls you and tells you that Windows XP Professional does not appear to be
loading correctly. The Hardware Profile/Configuration Recovery menu does not
appear when the computer is restarted, but it does appear on the computer of the
person sitting in the next cubicle when that computer is restarted. What would
you tell the user?
Lesson Summary
■
Files used during the Windows XP Professional startup process include NTLDR,
BOOT.INI, BOOTSECT.DOS, NTDETECT.COM, NTBOOTDD.SYS, NTOSKRNL.EXE, HAL.DLL, SYSTEM, and Device drivers (.sys).
■
During the preboot sequence, the BIOS runs a POST test, locates a boot device,
and loads the MBR found on that boot device. The MBR loads the boot sector on
the active partition into memory and then initializes NTLDR.
■
The boot sequence has four phases: initial boot loader phase, operating system
selection, hardware detection, and configuration selection. The boot sequence
uses the following files: NTLDR, BOOT.INI, BOOTSECT.DOS (optional), NTDETECT.COM, and NTOSKRNL.EXE.
4-14
Chapter 4
Modifying and Troubleshooting the Startup Process
■
NTLDR uses information in the BOOT.INI file to display the boot loader screen,
from which you select the operating system to start. You can edit the BOOT.INI
file, including modifying ARC paths and using the optional BOOT.INI switches.
■
During the kernel load phase, the Windows XP Professional kernel (NTOSKRNL.EXE) loads and initializes. NTOSKRNL.EXE also loads and initializes device
drivers and loads services.
■
During the kernel initialization phase, the kernel initializes, and then NTLDR
passes control to the kernel. At this point, the system displays a graphical screen
with a status bar that indicates load status. Four tasks are accomplished during the
kernel initialization phase:
■
❑
The Hardware key is created.
❑
The Clone control set is created.
❑
Device drivers are loaded and initialized.
❑
Services are started.
During the logon phase, the Win32 subsystem automatically starts WINLOGON.EXE, which in turn starts the Local Security Authority (LSASS.EXE) and
displays the Logon dialog box. You can log on at this time, even if Windows XP
Professional might still be initializing network device drivers.
Lesson 2
Editing the Registry
4-15
Lesson 2: Editing the Registry
Windows XP Professional stores hardware and software settings centrally in a hierarchical database called the Registry, which replaces many of the .ini, .sys, and .com configuration files used in earlier versions of Windows. The Registry controls the Windows
XP Professional operating system by providing the appropriate initialization information to boot Windows XP Professional, to start applications, and to load components
such as device drivers and network protocols.
Most users of Windows XP Professional never need to access the Registry. However,
management of the Registry is an important part of the system administrator’s job, and
includes viewing, editing, backing up, and restoring the Registry. You use Registry Editor to view and change the Registry configuration.
After this lesson, you will be able to
■ Identify the purpose of the Registry.
■ Define the hierarchical structure of the Registry.
■ View and edit the Registry by using Registry Editor.
Estimated lesson time: 40 minutes
What Is the Registry?
The Registry is a hierarchical database that contains a variety of different types of data,
including descriptions of the following:
■
The hardware installed on the computer, including the central processing unit
(CPU), bus type, pointing device or mouse, and keyboard.
■
Installed device drivers.
■
Installed applications.
■
Installed network protocols.
■
Network adapter card settings. Examples include the interrupt request (IRQ) number, memory base address, I/O port base address, I/O channel ready, and transceiver type.
The Registry structure provides a secure set of records. The data in the Registry is read,
updated, or modified by many of the Windows XP Professional components. Table 4-6
describes some of the components that access and store data in the Registry.
4-16
Chapter 4
Table 4-6
Modifying and Troubleshooting the Startup Process
Components That Use the Registry
Component
Description
Windows XP
Professional kernel
During startup, the Windows XP Professional kernel (NTOSKRNL.EXE)
reads information from the Registry, including the device drivers to load
and the order in which they should be loaded. The kernel writes information about itself to the Registry, such as the version number.
Device drivers
Device drivers receive configuration parameters from the Registry. They
also write information to the Registry. A device driver informs the Registry which system resources it is using, such as hardware interrupts or
direct memory access (DMA) channels. Device drivers also report discovered configuration data.
User profiles
Windows XP Professional creates and maintains user work environment
settings in a user profile. When a user logs on, the system caches the
profile in the Registry. Windows XP Professional first writes user configuration changes to the Registry and then to the user profile.
Setup programs
During setup of a hardware device or application, a setup program can
add new configuration data to the Registry. It can also query the Registry
to determine whether required components have been installed.
Hardware profiles
Computers with two or more hardware configurations use hardware profiles. When Windows XP Professional starts, the user selects a hardware
profile, and Windows XP Professional configures the system accordingly.
NTDETECT.COM
During system startup, NTDETECT.COM performs hardware detection.
This dynamic hardware configuration data is stored in the Registry.
The Hierarchical Structure of the Registry
The Registry is organized in a hierarchical structure similar to the hierarchical structure
of folders and files on a disk. Figure 4-2 shows the hierarchical structure of the Registry
as displayed by the Registry Editor.
F04us02r
Figure 4-2 Registry Editor displays the hierarchical structure of the Registry.
Lesson 2
Editing the Registry
4-17
Table 4-7 describes the components that make up the hierarchical structure of the Registry.
Table 4-7
Components That Make Up the Registry
Component Description
Subtree
A subtree (or subtree key) is analogous to the root folder of a disk. The Windows XP Professional Registry has two subtrees: HKEY_LOCAL_MACHINE and
HKEY_USERS. However, to make the information in the Registry easier to find
and view, there are five predefined subtrees that can be seen in the editor:
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_CONFIG
Keys
Keys, which are analogous to folders and subfolders, correspond to hardware or
software objects and groups of objects. Subkeys are keys within higher-level keys.
Entries
Keys contain one or more entries. An entry has three parts: name, data type, and
value (data or configuration parameter).
Hive
A hive is a discrete body of keys, subkeys, and entries. Each hive has a corresponding Registry file and .log file located in %systemroot%\System32\Config.
Windows XP Professional uses the .log file to record changes and ensure the
integrity of the Registry.
Data types
Each entry’s value is expressed as one of these data types:
REG_SZ (String value). One value; Windows XP Professional
interprets it as a string to store.
■ REG_BINARY (Binary value). One value; it must be a string of
hexadecimal digits. Windows XP Professional interprets each pair as
a byte value.
■ REG_DWORD (DWORD value). One value; must be a string of 1–8
hexadecimal digits.
■ REG_MULTI_SZ (Multistring value). Multiple values allowed;
Windows XP Professional interprets each string as a component of
MULTI_SZ separate entries.
■ REG_EXPAND_SZ (Expandable string value). Similar to REG_SZ,
except the text can contain a replaceable variable. For example, in the
string %systemroot%\NTVDM.EXE, Windows XP Professional replaces
the systemroot environmental variable with the path to the Windows XP
Professional System32 folder.
■ REG_FULL_RESOURCE_DESCRIPTOR. Stores a resource list for hardware components or drivers. You cannot add or modify an entry with
this data type.
■
4-18
Chapter 4
Modifying and Troubleshooting the Startup Process
Registry Subtrees
Understanding the purpose of each subtree can help you locate specific keys and values in the Registry. The following five subtrees or subtree keys are displayed in the
Registry Editor (refer to Figure 4-2):
HKEY_CLASSES_ROOT Contains software configuration data: object linking and
embedding (OLE) and file-class association data. This subtree points to the Classes
subkey under HKEY_LOCAL_MACHINE\SOFTWARE.
HKEY_CURRENT_USER Contains data about the current user. Retrieves a copy of
each user account used to log on to the computer from the NTUSER.DAT file and
stores it in the %systemroot%\Profiles\username key. This subkey points to the
same data contained in HKEY_USERS\SID_currently_logged_on_user. This subtree takes precedence over HKEY_LOCAL_MACHINE for duplicated values.
HKEY_LOCAL_MACHINE Contains all configuration data for the local computer,
including hardware and operating system data such as bus type, system memory,
device drivers, and startup control data. Applications, device drivers, and the operating system use this data to set the computer configuration. The data in this subtree remains constant regardless of the user.
HKEY_USERS Contains the .DEFAULT subkey, which holds the system default settings (system default profile) used to display the CTRL+ALT+DELETE logon screen,
and the Security Identifier (SID) of the current user.
HKEY_CURRENT_CONFIG Contains data on the active hardware profile extracted
from the SOFTWARE and SYSTEM hives. This information is used to configure settings such as the device drivers to load and the display resolution to use.
The HKEY_LOCAL_MACHINE Subtree
HKEY_LOCAL_MACHINE provides a good example of the subtrees in the Registry for
two reasons:
■
The structure of all subtrees is similar.
■
HKEY_LOCAL_MACHINE contains information specific to the local computer and
is always the same, regardless of the user who is logged on.
The HKEY_LOCAL_MACHINE root key has five subkeys, which are explained in Table 4-8.
Table 4-8
HKEY_LOCAL_MACHINE Subkeys
Subkey
Description
HARDWARE
The type and state of physical devices attached to the computer. This subkey is
volatile, meaning that Windows XP Professional builds it from information gathered during startup. Because the values for this subkey are volatile, it does not
map to a file on the disk. Applications query this subkey to determine the type
and state of physical devices attached to the computer.
Lesson 2
Table 4-8
Editing the Registry
4-19
HKEY_LOCAL_MACHINE Subkeys
Subkey
Description
SAM
The directory database for the computer. The SAM hive maps to the SAM and
SAM.LOG files in the %systemroot%\System32\Config directory. Applications
that query SAM must use the appropriate application programming interfaces
(APIs). This hive is a pointer to the same one accessible under
HKEY_LOCAL_MACHINE\SECURITY\SAM.
SECURITY
The security information for the local computer. The SECURITY hive maps to
the Security and SECURITY.LOG files in the %systemroot%\System32\Config
directory.
Applications cannot modify the keys contained in the SECURITY subkey.
Instead, applications must query security information by using the security APIs.
SOFTWARE
Information about the local computer software that is independent of per-user
configuration information. This hive maps to the Software and SOFTWARE.LOG
files in the %systemroot%\System32\Config directory. It also contains file associations and OLE information.
SYSTEM
Information about system devices and services. When you install or configure
device drivers or services, they add or modify information under this hive.
The SYSTEM hive maps to the System and SYSTEM.LOG files in the
%systemroot%\System32\Config directory. The Registry keeps a backup of
the data in the SYSTEM hive in the SYSTEM.ALT file.
Control Sets
A typical Windows XP Professional installation contains the following control set subkeys: Clone, ControlSet001, ControlSet002, and CurrentControlSet. Control sets are
stored as subkeys of the Registry key HKEY_LOCAL_MACHINE\SYSTEM (see Figure
4-3). The Registry might contain several control sets, depending on how often you
change or have problems with system settings.
F04us03
Figure 4-3
You can view the current control sets using Registry Editor.
4-20
Chapter 4
Modifying and Troubleshooting the Startup Process
The CurrentControlSet subkey is a pointer to one of the ControlSet00x keys. The Clone
control set is a clone of the control set used to initialize the computer (either Default
or Last Known Good), and is created by the kernel initialization process each time you
start your computer. The Clone control set is not available after you log on.
To better understand control sets, you should know about the Registry subkey
HKEY_LOCAL_MACHINE\SYSTEM\Select. The entries contained in this subkey
include the following:
Current Identifies which control set is the CurrentControlSet. When you use Control
Panel options or the Registry Editor to change the Registry, you modify information in the CurrentControlSet.
Default Identifies the control set to use the next time Windows XP Professional starts
unless you select the Last Known Good configuration. Default and Current typically contain the same control set number.
Failed Identifies the control set that was designated as failed the last time the computer was started using the Last Known Good control set.
LastKnownGood Identifies a copy of the control set that was used the last time the
computer started Windows XP Professional successfully. After a successful logon,
the Clone control set is copied to the Last Known Good control set.
Each of these entries in HKEY_LOCAL_MACHINE\SYSTEM\Select takes a
REG_DWORD data type, and the value for each entry refers to a specific control set.
For example, if the value for the Current entry is set to 0x1, the CurrentControlSet
points to ControlSet001. Similarly, if the value for the Last Known Good entry is set to
0x2, the Last Known Good control set points to ControlSet002.
How to View and Edit the Registry Using the Registry Editor
Setup installs Registry Editor (REGEDIT.EXE) in the %systemroot%\System32 directory
during installation. However, because most users do not need to use Registry Editor, it
does not appear on the Start menu. To start Registry Editor, click Run on the Start
menu, type Regedit, and then click OK.
Although Registry Editor allows you to perform manual edits on the Registry, it is
intended for troubleshooting and problem resolution. You should make most configuration changes through either Control Panel or Administrative Tools. However, some
configuration settings can be made only directly through the Registry.
Caution Using Registry Editor incorrectly can cause serious, system-wide problems that
could require reinstallation of Windows XP Professional. When using Registry Editor to view or
edit data, use a program such as Windows Backup to save a backup copy of the Registry file
before viewing. In Windows XP Professional, you can use Backup to back up the System State,
which includes the Registry, the COM class registration database, and the system boot files.
Lesson 2
Editing the Registry
4-21
Registry Editor saves data automatically as you make entries or corrections. New Registry data takes effect immediately.
You can select Find Key on the View menu to search the Registry for a specific key.
Key names appear in the left pane of Registry Editor. The search begins at the currently
selected key and parses all descendant keys for the specified key name. The search is
local to the subtree in which the search begins. For example, a search for a key in the
HKEY_LOCAL_MACHINE subtree does not include keys under
HKEY_CURRENT_USER.
Practice: Modifying the Registry
In this practice, you use Registry Editor to view the information in the Registry. Complete Exercise 1 to determine information such as the BIOS, the processor on your
computer, and the version of the operating system. Complete Exercise 2 to use Registry
Editor’s Find Key command to search the Registry for a specific word with key names.
Complete Exercise 3 to modify the Registry by adding a value to it, and save a subtree
as a file so that you can use an editor such as Notepad to search the file.
Exercise 1: Exploring the Registry
1. Ensure that you are logged on as Administrator.
2. From the Start menu, click Run.
3. In the Run dialog box, type Regedit and then click OK.
Security Alert
You should make it a practice not to log on as an administrator when performing non-administrative functions. It is better to log on as a normal user and use the Run
As command when you need to perform an administrative function. If you prefer to run the
Registry Editor without logging on as an administrator, at the command prompt, type
runas /user:administrator regedit.
4. Maximize the Registry Editor window, and then expand HKEY_LOCAL_MACHINE.
5. Under HKEY_LOCAL_MACHINE, expand HARDWARE.
6. Expand DESCRIPTION and then double-click the System subkey. Find the following information:
❑
The SystemBiosDate and SystemBiosVersion of your computer
❑
The computer type of your local machine according to the Identifier entry
7. Expand SOFTWARE\Microsoft\WindowsNT.
8. Click CurrentVersion, and then fill in the following information.
4-22
Chapter 4
Modifying and Troubleshooting the Startup Process
Software Configuration
Value and String
Current build number
Current version
Registered organization
Registered owner
Exercise 2: Using the Find Command
In this exercise, you use the Registry Editor’s Find command to search the Registry to
find a specific word in the keys, values, and data in the Registry.
1. In Registry Editor, click the HKEY_LOCAL_MACHINE subkey to ensure that the
entire subtree is searched.
2. On the Edit menu, click Find.
3. In the Find dialog box, in the Find What text box, type serial and then clear the
Values and Data check boxes. Click Find Next.
4. The Registry Editor locates and highlights the first entry containing serial. Press F3
to find the next entry containing serial. Continue pressing F3 until a Registry Editor
dialog box appears, indicating that Registry Editor has finished searching the Registry. Notice that serial appears in many locations in the Registry.
5. Click OK to close the Registry Editor dialog box.
Exercise 3: Modifying the Registry
1. In Registry Editor, expand HKEY_CURRENT_USER.
2. Under HKEY_CURRENT_USER, click Environment. The values in the Environment
key appear in the right pane of the Registry Editor window.
3. Click the Edit menu, point to New, and then click String Value. The Registry Editor
adds a New Value #1 entry in the right pane of the Registry Editor window.
4. Name the new value Test and then press ENTER.
5. Right-click the Test value, and then click Modify.
6. In the Edit String dialog box, in the Value Data text box, type
%windir%\system32 and then click OK. Test REG_SZ %windir%\ system32 is
now an entry in the right pane of the Registry Editor window.
7. Minimize the Registry Editor window.
8. From the Start menu, right-click My Computer, and then click Properties.
Lesson 2
Editing the Registry
4-23
9. In the System Properties dialog box, on the Advanced tab, click Environment
Variables.
10. In the Environment Variables dialog box, ensure that the test variable appears in
the User Variables For Administrator list.
11. Close the Environment Variables dialog box, and then close the System Properties
dialog box.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you are unable to answer a question, review the lesson
materials and try the question again. You can find answers to these questions in the
“Questions and Answers” section at the end of this chapter.
1. What is the Registry and what does it do?
2. What are some of the Windows XP Professional components that use the Registry?
3. How do you access the Registry Editor?
4. Why should you make most of your configuration changes through either Control
Panel or Administrative Tools rather than by editing the Registry directly with the
Registry Editor?
4-24
Chapter 4
Modifying and Troubleshooting the Startup Process
Lesson Summary
■
Windows XP Professional stores hardware and software settings in the Registry, a
hierarchical database that replaces many of the .ini, .sys, and .com configuration
files used in earlier versions of Windows. The Registry provides the appropriate
initialization information to boot Windows XP Professional, to start applications,
and to load components such as device drivers and network protocols.
■
The Registry structure provides a secure set of records that can be read,
updated, or modified by many of the Windows XP Professional components.
The Registry has two subtrees: HKEY_LOCAL_MACHINE and HKEY_USERS.
However, additional parts of the Registry (including HKEY_CLASSES_ROOT,
HKEY_CURRENT_USER, and HKEY_CURRENT_CONFIG) are represented in the
top level of the visible structure in Registry Editor to make important areas easier
to locate.
■
The Registry Editor (REGEDIT.EXE) allows you to view and change the Registry.
The Registry Editor is primarily intended for troubleshooting. For most configuration changes, you should use either Control Panel or Administrative Tools, not
Registry Editor.
Lesson 3
Troubleshooting Problems Using Startup and Recovery Tools
4-25
Lesson 3: Troubleshooting Problems Using Startup and
Recovery Tools
In this lesson, you learn about the tools and options Windows XP Professional provides to help you troubleshoot problems with starting your computer and recovering
from disasters. These tools include safe mode, the Last Known Good configuration,
and the Recovery Console (which are all covered in this lesson), and the Automated
System Restore Wizard (which is covered in Chapter 20, “Backing Up and Restoring
Data”).
After this lesson, you will be able to
■ Troubleshoot startup using safe mode.
■ Troubleshoot startup using the Last Known Good configuration.
■ Describe additional advanced boot options.
■ Perform troubleshooting and recovery tasks using the Windows XP Professional Recov-
ery Console.
Estimated lesson time: 40 minutes
Guidelines for Troubleshooting Startup Using Safe Mode
If your computer does not start normally, you might be able to start it by using safe
mode. Pressing F8 during the operating system selection phase of startup (just after the
POST screen disappears) displays a screen with advanced options for booting Windows XP Professional. If you select safe mode, Windows XP Professional starts with
limited device drivers and system services. These basic device drivers and system services include the mouse, standard VGA monitor, keyboard, mass storage, default system services, and no network connections. Safe mode also ignores programs that
automatically start up, user profiles, programs listed in the Registry to automatically
run, and all local group policies.
Safe mode provides access to Windows XP Professional configuration files, so you can
make configuration changes. You can disable or delete a system service, a device
driver, or an application that automatically starts that prevents the computer from starting normally.
If you choose to start your computer in safe mode, the background will be black and
“Safe Mode” appears in all four corners of the screen (see Figure 4-4). If your computer
does not start using safe mode, you can try Windows XP Professional Automatic System Recovery.
4-26
Chapter 4
Modifying and Troubleshooting the Startup Process
F04us04
Figure 4-4 Use safe mode to troubleshoot drivers and services that prevent Windows from starting
normally.
Safe Mode with Networking
One variation of safe mode is safe mode with networking, which is identical to safe
mode except that it adds the drivers and services necessary to enable networking to
function when you restart your computer. Safe mode with networking allows Group
Policy to be implemented, including settings that are implemented by the server during
the logon process and those configured on the local computer.
Safe Mode with Command Prompt
A second variation of safe mode is safe mode with command prompt, which is similar
to safe mode, but it loads the command interpreter as the user shell instead of the
graphical interface, so when the computer restarts, it displays a command prompt.
See Also After starting a computer in safe mode, you can use the tools built into Windows
XP Professional to troubleshoot any problems you are having. Coverage of specific troubleshooting tools appears throughout this book. You can learn more about troubleshooting hardware devices and drivers in Chapter 6, “Installing, Managing, and Troubleshooting Hardware
Devices and Drivers.” You can learn more about using the Windows Event Viewer to view
important event logs in Chapter 18, “Using Windows XP Tools.”
Lesson 3
Troubleshooting Problems Using Startup and Recovery Tools
4-27
Guidelines for Troubleshooting Startup Using the Last Known Good
Configuration
Selecting the Last Known Good configuration advanced boot option starts Windows XP
Professional using the control set saved to the Registry following the last successful
logon. If you change the Windows XP Professional configuration to load a driver and
have problems rebooting, you can use the Last Known Good configuration to recover
your working configuration.
Windows XP Professional provides two configurations for starting a computer, Default
and Last Known Good. Figure 4-5 shows the events that occur when you make configuration changes to your system. Any configuration changes (for example, adding or
removing drivers) are saved in the Current control set.
Map
addresses
Virtual address space
Physical memory
Swap memory
contents
Disk
F04us05
Figure 4-5
Default and Last Known Good are the two available startup configurations.
After you reboot the computer, the kernel copies the information in the Current control
set to the Clone control set during the kernel initialization phase. When you successfully log on to Windows XP Professional, the information in the Clone control set is
copied to the Last Known Good control set, as shown in the lower part of Figure 4-5.
If you experience startup problems that you think might relate to Windows XP Professional configuration changes, shut down the computer without logging on, and then
restart it. When you are prompted to select the operating system to start from a list of the
operating systems specified in the BOOT.INI file, press F8 to open the Windows
Advanced Options Menu screen. Then select the Last Known Good Configuration option.
!
Exam Tip
The Safe Mode and Last Known Good Configuration options are two of the most
useful tools to try first when troubleshooting Windows startup. Enabling Boot Logging is also
useful, typically when you are having trouble locating the source of the problem.
4-28
Chapter 4
Modifying and Troubleshooting the Startup Process
The next time you log on, the Current configuration is copied to the Default configuration. If your configuration changes work correctly, the next time you log on, the Current
configuration is copied to the Default configuration. If your configuration changes do
not work, you can restart and use the Last Known Good Configuration option to log on.
Table 4-9 summarizes the purpose of the Default and Last Known Good configurations.
Table 4-9
Default and Last Known Good Configurations
Configuration
Description
Default
Contains information that the system saves when a computer shuts down.
To start a computer using the default configuration, select Windows XP
Professional on the Please Select The Operating System To Start menu.
Last Known Good
Contains information that the system saves after a successful logon. The
Last Known Good configuration loads only if the system is recovering from
a severe or critical device driver loading error or if it is selected during the
boot process.
Table 4-10 lists situations in which you can use the Last Known Good configuration
and the related solutions.
Table 4-10 When to Use the Last Known Good Configuration
Situation
Solution
After a new device driver is
installed, Windows XP
Professional restarts, but the
system stops responding.
Use the Last Known Good configuration option to start Windows
XP Professional because the Last Known Good configuration
does not contain any reference to the new (possibly faulty)
driver.
You accidentally disable a
critical device driver (such
as the Scsiport driver).
Some critical drivers are written to keep users from making the
mistake of disabling them. With these drivers, the system automatically reverts to the Last Known Good control set if a user
disables the driver. If the driver does not automatically cause the
system to revert to the Last Known Good control set, you must
manually select the Last Known Good Configuration option.
Using the Last Known Good configuration does not help in the following situations:
■
When the problem is not related to Windows XP Professional configuration
changes. Such a problem might arise from incorrectly configured user profiles or
incorrect file permissions.
■
After you log on. The system updates the Last Known Good control set with Windows XP Professional configuration changes after a successful logon.
■
When startup failures relate to hardware failures or missing or corrupted files.
Lesson 3
Troubleshooting Problems Using Startup and Recovery Tools
4-29
Important
Starting Windows XP Professional using the Last Known Good configuration
overwrites any changes made since the last successful boot of Windows XP Professional.
Additional Advanced Boot Options
Pressing F8 during the operating system selection phase displays a screen with the
Windows Advanced Options menu. This menu provides the following additional
options:
Enable Boot Logging Selecting the Enable Boot Logging advanced boot option logs
the loading and initialization of drivers and services for troubleshooting boot
problems. All drivers and services that are loaded and initialized or that are not
loaded in a file are logged. The log file, NTBTLOG.TXT, is located in the %windir%
folder. All three versions of safe mode automatically create this boot log file.
See Also
You can learn more about using boot logging to troubleshoot by reading Appendix D
of the Microsoft Windows XP Professional Resource Kit Documentation on the Microsoft Web
site at http://www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/.
Enable VGA Mode Selecting the Enable VGA Mode advanced boot option starts
Windows XP Professional with a basic VGA driver. Use this setting if you are experiencing problems with the video card, video driver, or monitor.
Directory Services Restore Mode Selecting the Directory Services Restore Mode
advanced boot option is applicable only to domain controllers, so it does not
apply to computers running Windows XP Professional.
Debugging Mode Selecting the Debugging Mode advanced boot option starts Windows XP Professional in kernel debug mode, which allows a debugger to break
into the kernel for troubleshooting and system analysis.
Disable Automatic Restart On System Failure By default, Windows XP Professional automatically restarts the computer when there is a system failure. Normally, this default setting works well, but you might want to disable automatic
restarts when you are troubleshooting certain problems. A good example of this is
when troubleshooting stop errors. If automatic restarting is enabled, Windows
restarts the computer before you can get a chance to read the error message. Use
the Disable Automatic Restart On System Failure setting to prevent Windows from
restarting when the computer fails (using this setting gives you the chance to read
the error or perform any actions you need to perform before a restart).
4-30
Chapter 4
Modifying and Troubleshooting the Startup Process
Note When using the advanced boot options in Windows XP, logging is enabled with every
option except Last Known Good Configuration. The system writes the log file (NTBTLOG.TXT)
to the %systemroot% folder. In addition, each option except Last Known Good Configuration
loads the default VGA driver.
Using an advanced boot option to boot the system sets the environment variable
%SAFEBOOT_OPTION% to indicate the mode used to boot the system.
How to Perform Troubleshooting and Recovery Tasks Using the
Recovery Console
The Windows XP Professional Recovery Console is a text mode command interpreter
that you can use to access NTFS, FAT, and FAT32 volumes without starting Windows XP
Professional. The Recovery Console allows you to perform a variety of troubleshooting
and recovery tasks, including the following:
■
Copying files between hard disks and from a floppy disk to a hard disk (but not
from hard disk to a floppy disk), which allows you replace or remove items that
might be affecting the boot process, or to retrieve user data from an unsalvageable
computer
■
Starting and stopping services
■
Adding, removing, and formatting partitions on the hard disk
■
Repairing the MBR or boot sector of a hard disk or volume
■
Restoring the Registry
This section explains how to install, start, and use the Recovery Console and presents
the major Recovery Console commands.
!
Exam Tip
The Recovery Console provides an excellent way to access hard disks when the
operating system will not boot. You can use the Recovery Console to access all partitions on
a drive, regardless of the file system.
How to Install the Recovery Console
To install the Recovery Console, insert the Windows XP Professional CD-ROM into
your CD-ROM drive, and close the Windows XP Professional CD dialog box if it opens.
Open a Run dialog box or a Command Prompt window in Windows XP Professional,
and run the command drive:\i386\Winnt32.exe /cmdcons, where drive represents the
Lesson 3
Troubleshooting Problems Using Startup and Recovery Tools
4-31
letter of the CD-ROM or network drive that holds the Windows XP installation files.
After installation, you can start the Recovery Console by choosing it from the list of
installed operating systems—you do not need to have the installation CD.
How to Start the Windows XP Professional Recovery Console
You can also run the Recovery Console from the Windows XP Professional CD-ROM
without installing it. The Recovery Console provides a limited set of administrative
commands that you can use to repair your Windows XP Professional installation. You
can use the following steps to start the Recovery Console from the Windows XP Professional CD-ROM:
1. Insert the Windows XP Professional CD-ROM into the CD-ROM drive and restart
the computer. If your computer or the workstation you want to repair does not
have a bootable CD-ROM drive, you need to insert your Windows XP Professional
Setup Boot disk into your floppy disk drive. Insert the additional Windows XP Professional Setup disks when you are prompted to do so.
2. When Setup displays the Setup Notification message, read it, and then press Enter
to continue.
3. Setup displays the Welcome To Setup screen. In addition to the initial installation
of Windows XP Professional, you can use Windows Setup to repair or recover a
damaged Windows XP Professional installation. Press R to repair a Windows XP
Professional installation.
4. The Windows XP Recovery Console screen appears. Press C to start the Recovery
Console.
5. If you have more than one installation of Windows XP Professional on the computer, you are prompted to select which installation you want to repair. Type 1
and then press ENTER.
6. Type the Administrator’s password, and then press ENTER.
7. Setup displays a command prompt. Type help and then press ENTER for a list of
the commands available.
8. When you have completed the repair process, type exit and then press ENTER.
The computer will restart.
The Major Recovery Console Commands
There are a number of commands available in the Recovery Console, some of which
are described in Table 4-11.
4-32
Chapter 4
Modifying and Troubleshooting the Startup Process
Table 4-11 Major Recovery Console Commands
Command
Description
Attrib
Changes the attributes of a file or folder.
– Clears an attribute
+ Sets an attribute
c Compressed file attribute
h Hidden file attribute
r Read-only attribute
s System file attribute
Chdir (cd)
Displays the name of the current folder or changes the current folder.
Chkdsk
Checks a disk and displays a status report.
Cls
Clears the screen.
Copy
Copies a single file to another location. You cannot copy a file from a hard
drive to a floppy disk, but you can copy a file from a floppy disk or a CD-ROM
to a hard drive or from a hard drive to another hard drive. This command
allows you to access and recover user data when you cannot otherwise start
the computer.
Delete (Del)
Deletes one or more files.
Dir
Displays a list of files and subfolders in a folder. The wildcard characters * and
? are permitted.
Disable
Disables a system service or a device driver.
Diskpart
Creates, deletes, and manages partitions on your hard disk.
/add Creates a new partition
/delete Deletes an existing partition
Do not modify the structure of dynamic disks with this command because you
might damage your partition table.
Enable
Starts or enables a system service or a device driver.
Exit
Exits the Recovery Console and restarts your computer.
Expand
Expands a compressed file stored on the Windows XP Professional CD-ROM
or from within a .cab file and copies it to a specified destination.
Fdisk
Manages partitions on your hard disk.
Fixboot
Writes a new partition boot sector onto the system partition.
Fixmbr
Repairs the MBR of the partition boot sector. This command overwrites only the
master boot code, leaving the existing partition table intact. If corruption in the
MBR affects the partition table, running fixmbr might not resolve the problem.
Format
Formats a disk. If no file system is specified, NTFS is used by default.
Help
Lists the commands you can use in the Recovery Console.
Logon
Logs on to a Windows XP Professional installation.
Map
Displays the drive letter mappings.
Mkdir (md)
Creates a folder.
Lesson 3
Table 4-11
Troubleshooting Problems Using Startup and Recovery Tools
4-33
Major Recovery Console Commands
Command
Description
More
Displays a test file.
Rmdir (rd)
Deletes a folder.
Rename (ren)
Renames a single file.
Systemroot
Sets the current folder to the %systemroot% folder of the system you are currently logged on to.
Type
Displays a text file.
See Also
You can also use Recovery Console to restore System and Software files, which
are stored in the %systemroot%\System32\Config folder, with a backup copy that is stored in
the %systemroot%\repair folder. Windows XP Professional uses these files to create the registry keys HKEY_LOCAL_MACHINE\SYSTEM and HKEY_LOCAL_MACHINE\SOFTWARE. The Windows Backup program automatically backs up these files when you back up the System
State. For more information about backups and about restoring these files by using Recovery
Console, see Chapter 20, “Backing Up and Restoring Data.”
Real World Fixing Corrupted Boot Files
Although the Recovery Console is useful for replacing missing and corrupted boot
files such as NTLDR and for fixing problematic MBRs, this is an area in which you
should be careful. One of the most common reasons for MBR and NTLDR problems is a type of virus known as a boot sector virus—a virus that resides in the
MBR. Once entrenched, boot sector viruses can set about corrupting other files,
such as NTLDR. Boot sector viruses can also be difficult to get rid of because they
can often survive even a full reformatting of a hard disk. Even if you use the
Recovery Console to fix a corrupted boot file, you should not assume that you
have gotten to the root of the problem.
Fortunately, there are some fairly simple steps you can take to help prevent boot
sector viruses from ever becoming a problem. First, all computers should be running good antivirus software that is kept up-to-date with the latest virus information. You should configure the antivirus software to perform full system scans
regularly—scans that include the MBR. On most computers, you can also configure BIOS to prevent virus-like activity (which essentially means that it will prompt
you before it allows any program to write information to the boot sector).
4-34
Chapter 4
Modifying and Troubleshooting the Startup Process
Practice: Installing and Accessing the Windows XP Professional
Recovery Console
In this practice, you install and then start the Recovery Console, and you look at Help
to determine which commands are available in the Recovery Console. You also use the
Listsvc command to view the services, and then use the Disable command to disable
the Server service. Complete Exercises 1, 2, and 3.
Exercise 1: Installing the Windows XP Professional Recovery Console
In this exercise, you install the Recovery Console.
1. Log on as Administrator.
2. Insert the Windows XP Professional CD into the CD-ROM drive.
3. When the Windows XP Professional CD splash screen appears, close it.
4. From the Start menu, click Run.
5. In the Run dialog box, type <cd-drive>:\i386\winnt32 /cmdcons (where
<cd-drive> represents the letter assigned to your CD-ROM drive), and then click
OK.
Security Alert
If you have installed Windows XP Service Pack 2 on your computer, you cannot install the Recovery Console. Instead, you must run the Recovery Console from your
installation CD. If you have not yet installed Service Pack 2, you can first install the Recovery
Console and then install Service Pack 2.
6. In the Windows Setup message box that appears, click Yes to install the Windows
XP Professional Recovery Console. Windows Setup next attempts to contact
Microsoft and confirm that you have the latest version of Setup; it then installs the
Windows XP Recovery Console on your hard disk. Windows XP Professional then
displays a Windows XP Professional Setup message box indicating that the Windows Recovery Console has been successfully installed.
7. Click OK to close the Microsoft Windows XP Professional Setup dialog box.
Exercise 2: Using the Recovery Console to Disable the Server Service
In this exercise, you start the Recovery Console and use the Help command to view the
available commands. You then use the Listsvc and Disable commands.
1. Restart your computer.
2. In the Please Select The Operating System To Start screen, select Windows Recovery Console.
Lesson 3
Troubleshooting Problems Using Startup and Recovery Tools
4-35
3. The Windows XP Recovery Console starts and prompts you to select which Windows installation you want to log on to. If you had more than one Windows XP
Professional installation on this computer, all of them would be listed here. Type
1 and then press ENTER.
4. When prompted for the Administrator password, enter your password and press
ENTER.
5. At the prompt, type help and then press ENTER to see the list of available commands.
6. Scroll through the list of commands.
7. The Listsvc command allows you to view all the available services. Type listsvc
and press ENTER, and then scroll through the list of available services.
8. Press ESC to stop viewing services.
9. Type disable and press ENTER.
The Disable command allows you to disable a Windows system service or driver.
10. Type disable server and then press ENTER.
Recovery Console displays several lines of text describing how the Registry entry
for the Server service has been changed from Service_Demand_Start to
Service_Disabled. The Server service is now disabled.
11. Type exit and then press ENTER to restart your computer.
Exercise 3: Restarting the Server Service
In this exercise, you confirm that the Server service is disabled and then restart it.
1. Log on as Administrator.
2. Click Start, click All Programs, click Administrative Tools, and then click Computer
Management.
3. In the Computer Management window, expand Services And Applications.
4. Under Services And Applications, click Services.
5. Double-click Server.
6. In the Server Properties dialog box, change the Startup Type option to Automatic
and click OK.
7. Right-click Server and click Start.
8. Close the Computer Management window.
4-36
Chapter 4
Modifying and Troubleshooting the Startup Process
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you are unable to answer a question, review the lesson
materials and try the question again. You can find answers to these questions in the
“Questions and Answers” section at the end of this chapter.
1. What is safe mode and why do you use it?
2. How do you start Windows XP Professional in safe mode?
3. When is the Last Known Good configuration created?
4. When do you use the Last Known Good configuration?
Case Scenario Exercise
4-37
5. How can you install the Windows XP Professional Recovery Console on your
computer?
Lesson Summary
■
If your computer does not start, you might be able to start it by using safe mode
because Windows XP Professional starts with limited device drivers and system
services.
■
If you change the Windows XP Professional configuration to load a driver and
have problems rebooting, you can use the Last Known Good process to recover
your working configuration.
■
Pressing F8 during the operating system selection phase displays a screen with the
Windows Advanced Options menu that provides the following options: Safe
Mode, Safe Mode With Networking, Safe Mode With Command Prompt, Enable
Boot Logging, Enable VGA Mode, Last Known Good Configuration, Directory Services Restore Mode, and Debugging Mode.
■
The Windows XP Professional Recovery Console is a command-line interface that
you can use to perform a variety of troubleshooting and recovery tasks.
Case Scenario Exercise
In this exercise, you will read a scenario about a user who is experiencing a startup
problem and then answer the questions that follow. If you have difficulty completing
this work, review the material in this chapter before beginning the next chapter. You
can find answers to these questions in the “Questions and Answers” section at the end
of this chapter.
Scenario
You are an administrator working for a company named Contoso, Ltd. You receive a
call from one of your users. She tells you that this morning, on advice from a friend,
she downloaded and installed the newest drivers for her video card. After the installation, the setup program prompted her to restart the computer. When the computer
restarted, the user could log on, but the computer stopped responding shortly thereafter. The user tells you that she has made no other changes to her system.
4-38
Chapter 4
Modifying and Troubleshooting the Startup Process
Questions
1. What is the likely problem?
2. You decide to remove the new driver. However, the computer stops responding
before you can do so. What should you do? Choose the correct answer.
a. Start the computer using the Last Known Good configuration.
b. Start the computer in safe mode and try to roll back the driver.
c. Use the Recovery Console to roll back the new driver.
d. Use the Recovery Console to edit the BOOT.INI file.
Troubleshooting Lab
In this lab, you will create a system boot failure, and then repair that failure using the
Recovery Console. Complete Exercises 1 and 2.
Important
To complete this exercise, you must have a computer that is capable of booting
using the CD-ROM drive. You must also know the password for the local Administrator
account. If you do not meet these requirements, do not attempt this exercise. You should
also not attempt this exercise on a production computer.
Exercise 1: Creating a System Boot Failure
To create a system boot failure, use the following steps:
1. From the Start menu, right-click My Computer, and then click Explore.
2. In the Explorer window, in the Folders list, click Local Disk (C:), and then click
Show The Contents Of This Folder.
3. Click the Tools menu, and then click Folder Options.
4. In the Folder Options dialog box, on the View tab, in the Advanced Settings list,
click Show Hidden Files And Folders. Also clear the Hide Protected Operating System Files (Recommended) check box. Click OK.
5. In the right pane of the Explorer window, right-click the file named NTLDR and
then click Rename.
Troubleshooting Lab
4-39
6. Type oldntldr and then press ENTER.
7. Windows XP Professional displays a Confirm File Rename dialog box asking if you
are sure you want to rename the system file NTLDR to OLDNTLDR. Click Yes.
8. Restart the computer.
When you restart the computer, you should see an error message stating that
NTLDR is missing. Windows startup will fail at this point.
Restart your computer, start the Recovery Console, and try to repair the installation. If
you need assistance, you can use the following procedure.
Exercise 2: Using the Recovery Console to Repair an Installation
1. Insert the Windows XP Professional installation CD into the CD-ROM drive and
press CTRL+ALT+DELETE to restart the computer.
2. If your computer requires you to press a key to boot from the CD-ROM, press
SPACEBAR when prompted.
3. Setup displays the Welcome To Setup screen. Press R to repair a Windows XP Professional installation.
4. Setup starts the Recovery Console. Type 1 and press ENTER.
5. You are prompted to enter the Administrator’s password. Type your password and
press ENTER.
6. Setup displays a C:\Windows command prompt. Type d: (where d is the letter of
your CD-ROM drive) and press ENTER.
7. Type cd i386 to change to the i386 folder and press ENTER.
8. Type dir and press ENTER.
9. Most of the files on the CD-ROM end with an _ (for example, NTOSKRNL.EX_).
Press SPACEBAR to scroll through the files and locate NTLDR. NTLDR is not compressed, so you can copy it directly to your computer.
10. Type copy ntldr c:\ntldr and then press ENTER.
11. When the copy is complete, Setup displays a 1 File(s) Copied message. If there is
a disk in your floppy drive, remove it. If your computer is capable of booting from
the CD-ROM drive, remove the Windows XP Professional CD from your CD-ROM
drive. Type exit and press ENTER. The computer reboots and should start normally.
4-40
Chapter 4
Modifying and Troubleshooting the Startup Process
Chapter Summary
■
Files used during the Windows XP Professional startup process include NTLDR,
BOOT.INI, BOOTSECT.DOS, NTDETECT.COM, NTBOOTDD.SYS, NTOSKRNL.EXE, HAL.DLL, SYSTEM, and Device drivers (.sys). The startup sequence
occurs in five major stages:
❑
Preboot sequence
❑
Boot sequence
❑
Kernel load
❑
Kernel initialization
❑
Logon
■
Windows XP Professional stores hardware and software settings in the Registry, a
hierarchical database that replaces many of the .ini, .sys, and .com configuration
files used in earlier versions of Windows. The Registry provides the appropriate
initialization information to boot Windows XP Professional, to start applications,
and to load components such as device drivers and network protocols. The Registry Editor (REGEDIT.EXE) allows you to view and change the Registry.
■
Pressing F8 during the operating system selection phase displays a screen with the
Windows Advanced Options menu that provides the following options: Safe
Mode, Safe Mode With Networking, Safe Mode With Command Prompt, Enable
Boot Logging, Enable VGA Mode, Last Known Good Configuration, Directory Services Restore Mode, and Debugging Mode. The Windows XP Professional Recovery Console is a command-line interface that you can use to perform a variety of
troubleshooting and recovery tasks.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
Learn the syntax of ARC paths and how to determine which disk and partition a
particular path refers to. Most disk types use the multi convention. The value following multi indicates the disk number. The value following partition indicates the
partition number on that disk.
■
The Safe Mode and Last Known Good Configuration options are two of the most
useful tools to try first when troubleshooting Windows startup. Enabling Boot Logging is also useful, typically when you are having trouble locating the source of
the problem.
Exam Highlights
■
4-41
The Recovery Console provides an excellent way to access hard disks when the
operating system will not boot. You can use the Recovery Console to access all
partitions on a drive, regardless of the file system.
Key Terms
BOOT.INI A file used to build the operating system choices that are displayed during
startup.
Last Known Good configuration A hardware configuration that is available by
pressing the F8 key during startup. The Last Known Good configuration contains
the configuration information saved after the last successful logon.
master boot record (MBR) The first sector on a hard disk, which begins the process
of starting a computer. The MBR contains the partition table for the disk.
NTLDR A file used to control the Windows startup process until control is passed to
the Windows kernel.
Recovery Console A command-line console interface that provides access to the
hard disks and a limited set of administrative commands useful for recovering a
computer.
Registry A hierarchical database that controls the Windows XP Professional operating system by providing the appropriate initialization information to boot Windows XP Professional, to start applications, and to load components.
safe mode A method of starting Windows using only basic files and drivers and without networking support.
4-42
Chapter 4
Modifying and Troubleshooting the Startup Process
Questions and Answers
Lesson 1 Review
Page
4-12
1. Windows XP Professional modifies the boot sector during installation so that
__________ loads during system startup. Fill in the blank.
NTLDR
2. What is the purpose of the BOOT.INI file, and what happens if it is not present?
NTLDR reads BOOT.INI to determine the operating system selections to be loaded. If BOOT.INI
is missing, NTLDR attempts to load Windows XP Professional from the Windows folder on the
first partition of the first disk—typically C:\Windows.
3. What does the BOOTSECT.DOS file contain and when is it used?
BOOTSECT.DOS is a copy of the boot sector that was on the system partition at the time Windows
XP Professional was installed. BOOTSECT.DOS is used if you are booting more than one operating
system and you choose to load an operating system other than Windows XP Professional.
4. A user calls you and tells you that Windows XP Professional does not appear to be
loading correctly. The Hardware Profile/Configuration Recovery menu does not
appear when the computer is restarted, but it does appear on the computer of the
person sitting in the next cubicle when that computer is restarted. What would
you tell the user?
The user probably has only one hardware profile. If there is a single hardware profile, NTLDR
does not display the Hardware Profile/Configuration Recovery menu and instead loads Windows XP Professional using the default hardware profile configuration.
Lesson 2 Review
Page
4-23
1. What is the Registry and what does it do?
The Registry is a hierarchical database in which Windows XP Professional stores hardware and
software settings. The Registry provides the appropriate initialization information to boot Windows XP Professional, to start applications, and to load components such as device drivers
and network protocols.
2. What are some of the Windows XP Professional components that use the Registry?
Windows NT kernel, device drivers, user profiles, setup programs, hardware profiles, and NTDETECT.COM.
3. How do you access the Registry Editor?
On the Start menu, click Run, type Regedit and then click OK.
Questions and Answers
4-43
4. Why should you make most of your configuration changes through either Control
Panel or Administrative Tools rather than by editing the Registry directly with the
Registry Editor?
Using the Registry Editor to modify the Registry is dangerous because the Registry Editor saves
data automatically as you make entries or corrections, so new Registry data takes effect immediately. If you incorrectly edit the Registry it can cause serious, system-wide problems that
could require you to reinstall Windows XP Professional.
Lesson 3 Review
Page
4-36
1. What is safe mode and why do you use it?
Starting Windows XP Professional in safe mode uses limited device drivers and system services, and no network connections. Safe mode also ignores programs that automatically
start up, user profiles, programs listed in the Registry to automatically run, and all local
group policies. Safe mode allows Windows to start successfully when the normal Windows XP
startup fails.
You use safe mode because it provides access to Windows XP Professional configuration
files so you can make configuration changes. You can disable or delete a system service, a
device driver, or application that automatically starts that prevents the computer from starting normally.
2. How do you start Windows XP Professional in safe mode?
To start Windows XP Professional in safe mode, restart or boot the computer and press F8 during the operating system selection phase.
3. When is the Last Known Good configuration created?
After you reboot the computer, the kernel copies the information in the Current control set to
the Clone control set during the kernel initialization phase. When you successfully log on to
Windows XP Professional, the information in the Clone control set is copied to the Last Known
Good control set.
4. When do you use the Last Known Good configuration?
If you change the Windows XP Professional configuration to load a driver and have problems
rebooting, you use the Last Known Good process to recover your working configuration.
5. How can you install the Windows XP Professional Recovery Console on your
computer?
To install the Recovery Console, insert the Windows XP Professional CD-ROM into your CD-ROM
drive. Open a Command Prompt window, change to the i386 folder on the Windows XP Professional CD, and then run the winnt32 command with the /cmdcoms switch.
4-44
Chapter 4
Modifying and Troubleshooting the Startup Process
Case Scenario Exercise
Page
4-37
1. What is the likely problem?
Because the user has made no other configuration changes, and because the problem started
after the new driver installation, the most likely problem is the new driver.
2. You decide to remove the new driver. However, the computer stops responding
before you can do so. What should you do? Choose the correct answer.
a. Start the computer using the Last Known Good configuration.
b. Start the computer in safe mode and try to roll back the driver.
c. Use the Recovery Console to roll back the new driver.
d. Use the Recovery Console to edit the BOOT.INI file.
The correct answer is B. Starting the computer in safe mode loads only a generic video driver.
You should then be able to roll back the new driver. A is not correct because the Last Known
Good configuration is created after a successful logon. Because the user could log on following
the driver installation, reverting to the Last Known Good configuration would not roll back the
new driver. C is not correct because you cannot use the Recovery Console to roll back drivers.
D is not correct because editing the BOOT.INI file does not help in this situation.
5 Configuring Windows XP
Professional
Exam Objectives in this Chapter:
■
Manage and troubleshoot Web server resources.
■
Implement, manage, and troubleshoot display devices.
❑
Configure multiple-display support.
❑
Install, configure, and troubleshoot a video adapter.
■
Configure Advanced Configuration Power Interface.
■
Configure and manage user profiles and desktop settings.
■
Configure support for multiple languages or multiple locations.
❑
Enable multiple-language support.
❑
Configure multiple-language support for users.
❑
Configure local settings.
❑
Configure Microsoft Windows XP Professional for multiple locations.
Why This Chapter Matters
The Microsoft Windows XP Professional desktop environment provides a user
interface that is easily customized. Appropriate configuration of the desktop
enhances a user’s experience with the operating system and can increase productivity. Configuration information on a computer running Windows XP Professional is stored in the Windows Registry. On computers that are part of a domain,
configuration information might also be stored in Active Directory or on other
server computers. Each user on a computer has a profile that contains that user’s
desktop configuration settings and also governs the location in which configuration information is stored.
It is important that you understand the options that are available for desktop configuration and management. This chapter covers configuring and troubleshooting
display settings, power management, basic operating system settings, the desktop
environment, and Windows components.
5-1
5-2
Chapter 5
Configuring Windows XP Professional
Lessons in this Chapter:
■
Lesson 1: Configuring and Troubleshooting the Display . . . . . . . . . . . . . . . . .5-3
■
Lesson 2: Configuring Power Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-13
■
Lesson 3: Configuring System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21
■
Lesson 4: Configuring Languages, Locations, and Accessibility Options . . . . . 5-40
■
Lesson 5: Managing Windows Components . . . . . . . . . . . . . . . . . . . . . . . . . 5-51
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have Windows XP Professional installed on a computer on which you can make changes.
Lesson 1
Configuring and Troubleshooting the Display
5-3
Lesson 1: Configuring and Troubleshooting the Display
Users can configure and clean up the icons that appear on their computer’s desktop.
Users with permission to load and unload device drivers can also install and test video
drivers. Windows XP Professional allows you to change video resolutions dynamically
without restarting the system and also supports multiple display configurations.
After this lesson, you will be able to
■ Configure display and desktop properties.
■ Configure a computer to use multiple displays.
Estimated lesson time: 30 minutes
How to Configure Display and Desktop Properties
To view or modify the display or the Desktop properties, in Control Panel, click
Appearance And Themes, and then click Display. The tabs in the Display Properties
dialog box (see Figure 5-1) are described in Table 5-1.
F05us01.bmp
Figure 5-1
Table 5-1
Use the Display Properties dialog box to control display and desktop settings.
Display Properties Dialog Box Tabs
Tab
Description
Themes
Allows you to choose a theme. A theme is a collection of settings that include
desktop background, sounds, icons, and other elements to help you personalize
your computer.
Desktop
Allows you to choose a background and color for your desktop. The Customize
Desktop button allows you to add or remove some Windows program icons and
determine which icons represent those programs. You can also include Web content on your desktop (see Figure 5-2).
5-4
Chapter 5
Configuring Windows XP Professional
Table 5-1
Display Properties Dialog Box Tabs
Tab
Description
Screen Saver Allows you to choose a screen saver to appear on your screen when the computer
is idle. The default time after which a screen saver initiates is 10 minutes. On older
CRT monitors, screen savers prevented damage to monitors by preventing an image
from becoming burned into the monitor. Although this is no longer a problem on
newer cathode-ray tube (CRT) and liquid crystal display (LCD) monitors, screen
savers are still useful. When a computer is left unattended, a screen saver protects
the information on the screen from casual eavesdropping. If you configure the
screen saver to prompt for a password to return to the desktop, you can also prevent more deliberate intrusion. You can also click Power to adjust monitor power
settings and save energy. See Lesson 2, “Configuring Power Options.”
Appearance
Allows you to configure the windows and buttons styles, the color scheme, and
the font size. Click Effects to configure the following options:
■ Use The Following Transition Effect For Menus And Tooltips. Options
■
■
■
■
■
■
Settings
Important
include a fade effect or scroll effect. Although these features look nice to
some people, many people find that it slows the perceived responsiveness of Windows.
Use The Following Method To Smooth Edges Of Screen Fonts. Options
include Standard (best for CRT monitors) and Clear Type (best for LCD
monitors).
Use Large Icons. This option can help users who have trouble seeing
smaller icons. However, using this option can reduce performance on
slow computers.
Show Shadows Under Menus. This option gives menus a threedimensional appearance.
Show Windows Contents While Dragging. This option causes Windows to
redraw folders as you drag them. Although useful, this option can reduce
performance on slow computers.
Hide Underlined Letters For Keyboard Navigation Until I Press The Alt
Key. Windows provides keyboard access to many menu commands when
you press the ALT key. Clear this check box if users find the underlined
letters in commands bothersome.
If you select Windows Classic as your theme, you can click Advanced to
customize the look of windows, menus, fonts, and icons.
Allows you to configure display options including the number of colors, video
resolution, font size, and refresh frequency, as shown in Figure 5-3 and
explained in Table 5-2.
You can enable security settings that restrict access to Display options. For
example, you can remove the Appearance tab or the Settings tab from the Display Properties
dialog box. For more information about security settings, see Chapter 16, “Configuring Security Settings and Internet Options.”
Lesson 1
Configuring and Troubleshooting the Display
5-5
F05us02.bmp
Figure 5-2
Use the Desktop Items dialog box to control what appears on your desktop.
To access the Desktop Items dialog box, on the Desktop tab, click Customize Desktop.
The Desktop Items dialog box allows you to include or exclude an icon for My Documents, My Computer, My Network Places, and the Internet Explorer on your desktop,
as well as to customize the icons used to represent these items. You can also configure
the frequency with which the Desktop Cleanup Wizard runs. The default setting for
running the Desktop Cleanup Wizard is every 60 days. Click Clean Desktop Now to
run the Desktop Cleanup Wizard immediately. The Desktop Cleanup Wizard removes
icons from the desktop that have not been used in the last 60 days, but it does not
remove any programs from your computer.
To include Web content on your desktop, in the Desktop Items dialog box, click the
Web tab. Any Web page listed in the Web Pages text box can be included on your
desktop by selecting it. Click New to add a Web page and click Delete to remove a
Web page from the list. Click Properties to view the Properties dialog box for the Web
page. The Properties dialog box allows you to make the Web page available offline,
synchronize immediately or schedule the synchronization of this offline Web page with
the content on the Internet, and specify whether you want Internet Explorer to download more than just the top-level page of this Web site.
Note
If you want Internet Explorer to download more than just the top-level page, you can
specify up to three levels deep, but specifying three levels deep downloads all the pages
linked to the second-level pages. This process can quickly result in hundreds of pages,
depending on how many links are on each page.
5-6
Chapter 5
Configuring Windows XP Professional
F05us03.bmp
Figure 5-3 Use the Settings tab to control the color quality and screen resolution of the desktop.
Table 5-2 describes the options available in the Settings tab for configuring the display
settings.
Table 5-2
Settings Tab Options for Configuring the Display
Option
Description
Color Quality
The Color Quality setting displays the current color configuration for the
monitor attached to the video adapter listed under Display. This option allows
you to change the color quality for the display adapter. You should set this
value to the highest quality available for your chosen screen resolution
because using a higher-quality color depth does not significantly affect performance.
Screen
Resolution
Screen Resolution controls the current resolution settings for the monitor
attached to the video adapter listed under Display. This option allows you to
set the resolution for the display adapter. As you increase the number of pixels, you display more information on the screen, but you decrease the size of
the fonts and pictures. Users will need to experiment with resolutions until
they find one that strikes a good balance between amount of information displayed and the size of that information. You should also note that many LCD
monitors operate at a fixed native resolution. Changing the resolution on these
monitors might make the information displayed look bad.
Identify
Identify displays large numbers on the desktop of each monitor in a multipledisplay configuration. This helps you identify which physical monitor corresponds to each displayed monitor on the Settings tab. For more information
on using multiple displays, see the section “How to Configure Multiple
Displays,” later in this lesson.
Troubleshoot
Troubleshoot opens the Video Display Troubleshooter to aid you in diagnosing display problems.
Advanced
Advanced opens the Properties dialog box for the display adapter, as
described next.
Lesson 1
Configuring and Troubleshooting the Display
5-7
To open the Properties dialog box for the display adapter, click Advanced. Table 5-3
describes the display adapter options.
Table 5-3
Display Adapter Advanced Options
Tab
Option
Description
General
Display
Provides small, large, or other display font option. The
other option lets you choose any custom font size you
want.
General
Compatibility
Determines the action that the Windows XP operating
systems should take when you make changes to display
settings. After you change the color settings, you must
choose one of the following options:
■ Restart The Computer Before Applying The New
Display Settings
■ Apply The New Display Settings Without
Restarting
■ Ask Me Before Applying The New Display
Settings
You should use Restart The Computer Before Applying
The New Display Settings only if you experience problems changing resolution.
Adapter
Adapter Type
Provides the manufacturer and model number of the
installed adapter. Clicking Properties displays the Properties dialog box for your adapter. The General tab of
the Properties dialog box provides additional information, including device status, resource settings, and any
conflicting devices. The Driver tab of the Properties dialog box provides details about the driver and allows
you to update the driver, roll back to the previously
installed driver, and uninstall the driver. The Resources
tab of the Properties dialog box indicates resources,
such as areas of memory being used by the adapter.
Adapter
Adapter
Information
Provides additional information about the display
adapter, such as video chip type, digital-to-analog converter (DAC) type, memory size, and basic input/output
system (BIOS).
Adapter
List All Modes
Displays all compatible modes for your display adapter
and lets you select resolution, color depth, and refresh
frequency in one step.
Monitor
Monitor Type
Provides the manufacturer and model number of the
monitor currently installed. The Properties button provides additional information and gives access to the
Video Display Troubleshooter to help resolve problems
with this device.
5-8
Chapter 5
Configuring Windows XP Professional
Table 5-3
!
Display Adapter Advanced Options
Tab
Option
Description
Monitor
Monitor Settings
Configures the refresh rate frequency. This option
applies only to high-resolution drivers. Do not select a
refresh rate and screen resolution combination that is
unsupported by the monitor. If you are unsure, refer to
your monitor documentation or select the lowest
refresh rate option.
Troubleshoot
Hardware
Acceleration
Lets you progressively decrease your display hardware’s
acceleration features to help you isolate and eliminate
display problems. Lets you select whether to use write
combining, which improves video performance by
speeding up the display of information to your screen.
Increased speed can lead to screen corruption, however.
If you experience trouble with your display, try clearing
the Enable Write Combining check box.
Color
Management
Chooses the color profile for your monitor.
Other tabs
Some video adapters create additional tabs with other
options for controlling the adapter features.
Exam Tip
Understand how to control color quality and screen resolution. Also understand
how to control advanced display settings, such as adapter type, monitor type, and compatibility.
How to Configure Multiple Displays
Windows XP Professional supports using multiple displays simultaneously, which
means that you can attach more than one monitor to your computer and have your
desktop spread across all attached monitors, as shown in Figure 5-4. Windows XP Professional supports the extension of your display across a maximum of 10 monitors.
· Use of multiple displays extends the desktop
across a maximum of 10 monitors.
· Multiple displays must use Peripheral Component
Interconnect (PCI) or Accelerated Graphics Port
(AGP) devices.
· Hardware requirements for primary (main) and
secondary displays differ.
F05us04.bmp
Figure 5-4 Windows XP Professional can spread your desktop across multiple displays.
Lesson 1
Configuring and Troubleshooting the Display
5-9
Important
You must use Peripheral Component Interconnect (PCI) or Accelerated Graphics
Port (AGP) video adapters when configuring multiple displays.
If one of the display adapters is built into the motherboard, note these additional
considerations:
■
The motherboard adapter always becomes the secondary adapter. It must be
multiple-display compatible.
■
You must set up Windows XP Professional before installing another adapter. Windows XP Professional Setup disables the motherboard adapter if it detects another
adapter. Some systems completely disable the onboard adapter on detecting an
add-in adapter. If you are unable to override this detection in the BIOS, you cannot use the motherboard adapter with multiple displays.
Typically, the system BIOS selects the primary display based on PCI slot order. However, on some computers, the BIOS allows the user to select the primary display
device.
You cannot stop the primary display (in other words, there will always be a primary
display, although you can switch the monitor that is the primary display). This caveat
is an important consideration for laptop computers with docking stations. For example,
some docking stations contain a display adapter; they often disable, or turn off, a laptop’s built-in display. Multiple display support does not function on these configurations unless you attach multiple adapters to the docking station.
How to Install Multiple Monitors
Before you can configure multiple displays, you must install them. When you configure
multiple displays, you must configure each one in a multiple-display environment.
To install multiple monitors, complete the following steps:
1. Turn off your computer and insert one or more additional PCI or AGP video
adapters into available slots on your computer.
2. Plug an additional monitor into each PCI or AGP video adapter that you installed.
3. Turn on your computer and allow Windows XP Professional to detect the new
adapters and install the appropriate device drivers.
4. In Control Panel, click Appearance And Themes, and then click Display.
5. In the Settings tab, click the monitor icon that represents the monitor you want to
use in addition to your primary monitor. Click Identify if you are not sure which
monitor corresponds to which display.
5-10
Chapter 5
Configuring Windows XP Professional
6. Select the Extend My Windows Desktop Onto This Monitor check box and then
click OK.
To configure your display in a multiple-display environment, complete the following
steps:
1. In Control Panel, click Appearance And Themes, and then click Display.
2. In the Display Properties dialog box, click the Settings tab.
3. Click the monitor icon for the primary display device.
4. Select the color depth and resolution.
5. Click the monitor icon for the secondary display device.
6. Select the Extend My Windows Desktop Onto This Monitor check box.
7. Select the color depth and resolution for the secondary display.
8. Repeat Steps 5 through 7 for each additional display.
Windows XP Professional uses the virtual desktop concept to determine the relationship of each display. The virtual desktop uses coordinates to track the position of each
individual display desktop.
The coordinates of the top-left corner of the primary display always remain 0, 0. Windows XP Professional sets secondary display coordinates so that all the displays adjoin
each other on the virtual desktop, which allows the system to maintain the illusion of
a single large desktop in which users can cross from one monitor to another without
losing track of the mouse.
To change the display positions on the virtual desktop, in the Settings tab click Identify
and drag the display representations to the desired position. The positions of the icons
dictate the coordinates and the relative positions of the displays to one another.
Real World
Using Multiple Displays
Using multiple displays is a great way to increase your desktop space (although
it can quickly consume the space on your actual desk). Many video adapter manufacturers have adapters that already have ports for more than one monitor—an
easy way to set up a multiple-display configuration. Some of these adapters come
with extra software to help manage the displays that provides features like controlling the particular display on which applications appear, limiting the appearance of dialog boxes to the display on which the parent application is shown,
using separate screen savers for each display, and so on.
When you are purchasing extra monitors, you should try to use monitors that are
roughly the same size and set them to use the same resolution. The reason for this
Lesson 1
Configuring and Troubleshooting the Display
5-11
decision is that when you arrange your displays on the Settings tab, the location
of the monitor icons accurately predicts what happens when you move your
mouse pointer between displays. For example, assume that you have two displays side by side. One of the displays is a 19-inch monitor and one is a 15-inch
monitor. You can arrange these displays on the Settings tab so that either the tops
or the bottoms of the displays are aligned. If the tops were aligned, whenever you
move your mouse pointer from the bottom of the bigger display toward the second display, the pointer would get “stuck.” To get the pointer over to the smaller
display, you would have to move the pointer upward to the point where the bottom of the smaller display was. Although it seems as if it might not be a big deal,
losing track of your mouse pointer because of this arrangement is a common
complaint among multiple-display users.
How to Troubleshoot Multiple Displays
If you encounter problems with multiple displays, use the troubleshooting guidelines
in Table 5-4 to help resolve them.
Table 5-4
Troubleshooting Tips for Multiple Displays
Problem
Solution
You cannot see any output
on the secondary displays.
Activate the device in the Display Properties dialog box.
Confirm that you chose the correct video driver.
Restart the computer to confirm that the secondary display
initialized. If not, check the status of the video adapter in
Device Manager.
Switch the order of the adapters in the slots. (The primary
adapter must qualify as a secondary adapter.)
The Extend My Windows
Desktop Onto This Monitor
check box is unavailable.
Select the secondary display rather than the primary one in
the Display Properties dialog box.
Confirm that the secondary display adapter is supported.
Confirm that Windows XP Professional can detect the
secondary display.
An application fails to display
on the secondary display.
Run the application on the primary display.
Run the application in full-screen mode (for Microsoft
MS-DOS-based programs) or maximized (for older
Windows-based programs).
Disable the secondary display to determine whether the
problem is specific to multiple-display support.
5-12
Chapter 5
Configuring Windows XP Professional
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. You can enable ________________________________ to restrict access to Display
options.
2. Which of the following items does the Desktop Items dialog box allow you to
choose to include or exclude an icon on your desktop? (Choose all that apply.)
a. My Documents
b. Control Panel
c. My Network Places
d. Recycle Bin
3. Windows XP Professional supports extension of your display across a maximum
of ______________ monitors.
4. You must use __________________________ or ______________________ video
adapters when configuring multiple displays.
5. If one of the display adapters is built into the motherboard, the motherboard
adapter always becomes the _____________ (primary/secondary) adapter.
Lesson Summary
■
You can use the Display Properties dialog box to control most settings that govern
the appearance of your desktop and the settings for your video adapter and monitor.
■
Windows XP Professional supports the use of up to 10 displays, extending the
Windows desktop so that it is spread across all available displays. You must use
PCI or AGP video adapters when configuring multiple displays.
Lesson 2
Configuring Power Options
5-13
Lesson 2: Configuring Power Options
Windows XP Professional contains a number of features that allow the operating system to manage the use of power by your computer and the hardware devices attached
to it. Power management features included in Windows XP Professional include System Power Management, Device Power Management, Processor Power Management,
System Events, and Battery Management.
After this lesson, you will be able to
■ Select a power scheme.
■ Configure advanced power options.
■ Enable hibernate mode.
■ Configure Advanced Power Management.
■ Configure an uninterruptible power supply.
Estimated lesson time: 40 minutes
How to Select a Power Scheme
Power Options allows you to configure Windows XP Professional to turn off the power
to your monitor and your hard disk, or put the computer in hibernate mode. To configure Power Options, in Control Panel, click Performance And Maintenance, and then
click Power Options. The Power Options Properties dialog box allows you to configure
Power Options (see Figure 5-5).
F05us05.bmp
Figure 5-5 Use the Power Schemes tab of the Power Options Properties dialog box to control
automatic power-saving options.
5-14
Chapter 5
Configuring Windows XP Professional
Note
Your hardware must support powering off the monitor and hard disk for you to configure power schemes. Almost all modern monitors and hard disks support this feature. However, some applications (particularly older applications) do not respond well to monitors and
hard disks being turned off, causing loss of data or even crashing.
Power schemes allow you to configure Windows XP Professional to turn off the
power to your monitor and your hard disk, conserving energy. In the Power Options
Properties dialog box, click the Power Schemes tab. Windows XP Professional provides
the following six built-in power schemes:
■
Home/Office Desk This power scheme is designed for a desktop computer.
After 20 minutes of inactivity, the monitor is turned off, but the hard disks are never
turned off.
■
Portable/Laptop This power scheme is optimized for portable computers that
will be running on batteries. After 15 minutes of inactivity, the monitor is turned
off; after 30 minutes of inactivity, the hard disks are turned off.
■
Presentation This power scheme is designed for use with presentations for
which the computer display is always to remain on. The monitor and the hard
disks are never turned off.
■
Always On This power scheme is designed for use with personal servers. After
20 minutes of inactivity, the monitor is turned off, but the hard disks are never
turned off.
■
Minimal Power Management This power scheme disables some power management features such as timed hibernation. After 15 minutes of inactivity, the
monitor is turned off, but the hard disks are never turned off.
■
Max Battery This power scheme is designed to conserve as much battery power
as possible. After 15 minutes of inactivity, the monitor is turned off, but the hard
disks are never turned off.
To select a power scheme, use the following steps:
1. Ensure that you are logged on with a user account that is a member of the Administrators local group.
2. Click Start, click Control Panel, and then click Performance And Maintenance.
3. Click Power Options.
Windows XP Professional displays the Power Options Properties dialog box with
the Power Schemes tab active.
4. Click the arrow at the end of the Power Schemes box to display the pull-down
menu listing the available power schemes. Click the power scheme you want to use.
5. Click OK to close the Power Options Properties dialog box.
Lesson 2
Configuring Power Options
5-15
If none of these power schemes is appropriate for your computer environment, you
can modify one of the built-in power schemes or configure a new power scheme. To
modify a power scheme or to create a new power scheme, use the following steps:
1. Ensure that you are logged on with a user account that is a member of the Administrators group.
2. Click Start, click Control Panel, and then click Performance And Maintenance.
3. Click Power Options.
Windows XP Professional displays the Power Options Properties dialog box with
the Power Schemes tab active.
4. Click the arrow at the end of the Power Schemes box to display the pull-down
menu listing the available power schemes. Click the power scheme you want to
base your new power scheme on.
5. In the Settings For Power_Scheme_Name Power Scheme text box, modify the amount
of inactive time before the monitor or hard drives are turned off.
6. Do one of the following:
❑
Click OK to modify the existing power scheme and close the Power Options
Properties dialog box.
❑
Click Save As to create a new power scheme.
How to Configure Advanced Power Options
To configure your computer to use advanced power options, open the Power Options
Properties dialog box and click the Advanced tab. There are two options that always
appear on the Advanced tab. If you want an icon to appear in the notification area that
displays the current power status for your computer (plugged-in or on battery power)
and provides quick power-management access, select the Always Show Icon On The
Taskbar check box. The second check box on the Advanced tab is Prompt For Password When Computer Resumes From Standby. Selecting this check box causes Windows to prompt you for your Windows password when your computer comes out of
standby mode.
If you have a portable computer, you will also see a Power Buttons section on the
Advanced tab. This section allows you to configure what happens when you press the
power button on the computer, when you close the lid (thereby pressing the small button signaling that the lid is closed, and when you press the sleep button (if your computer has one). Options that you can choose for each of these buttons include shutting
down the computer, sending the computer to standby mode, and having the computer
enter hibernation.
5-16
Chapter 5
Configuring Windows XP Professional
Note The Prompt For Password When Computer Resumes From Standby box will not be displayed if the computer does not support standby mode (this is the case with many desktop
computers).
How to Enable Hibernate Mode
Hibernate mode works in a way that is a bit different from standby mode. When a
computer enters standby mode, Windows XP turns off most of the devices in the computer (including the display, hard disks, and peripherals), but keeps just enough power
flowing to keep the information in memory intact—information that includes open
windows and running programs. When you exit standby mode (typically by moving
the mouse or pressing a key), Windows is returned to the state in which you left it.
However, when a computer is in standby mode, it is still reliant on a power source. If
the power source is interrupted (for example, if the battery runs out), information in
memory is lost.
When your computer enters hibernate mode, Windows saves the information in memory (including open programs and windows) to your hard disk, and then your computer shuts down. When you start the computer after it has been hibernating, Windows
returns to its previous state. Restarting to the previous state includes automatically
restarting any programs that were running when it went into hibernate mode, and it
even restores any network connections that were active at the time. The advantage of
hibernation mode over standby mode is that when a computer is in hibernation mode,
it is not reliant on a power source—the computer is completely shut down.
To configure your computer to use hibernate mode, use the Power Options Properties
dialog box. Click the Hibernate tab and select the Enable Hibernation check box. If the
Hibernate tab is unavailable, your computer does not support this mode.
Hibernation works by saving the information currently stored in your computer’s memory to hard disk. To do this, Windows creates a hibernation file on the root of your system partition. This file changes size, depending on the amount of memory you have,
but always consumes the amount of space it will need—even if you have never hibernated. Unless you plan to use hibernation, you should disable this option to save disk
space.
How to Configure Advanced Power Management
Windows XP Professional supports Advanced Power Management (APM), which
helps reduce the power consumption of your system. To configure your computer to
use APM, use the Power Options Properties dialog box. Click the APM tab and select
the Enable Advanced Power Management Support check box. If the APM tab is
unavailable, your computer is compliant with a newer standard named Advanced
Lesson 2
Configuring Power Options
5-17
Configuration and Power Interface (ACPI), which automatically enables Advanced
Power Management Support and disables the APM tab. You must be logged on as a
member of the Administrators group to configure APM.
If your computer does not have an APM BIOS installed, Windows XP Professional does
not install APM, so there will not be an APM tab in the Power Options Properties dialog
box. However, your computer can still function as an ACPI computer if it has an ACPIbased BIOS, which takes over system configuration and power management from the
Plug and Play BIOS.
Note
If your laptop has an ACPI-based BIOS, you can insert and remove PC cards on the fly,
and Windows XP Professional automatically detects and configures them without requiring
you to restart your machine. This is known as dynamic configuration of PC cards. There are
two other important features for mobile computers that rely on dynamic Plug and Play: hot
and warm docking/undocking and hot swapping of Integrated Device Electronics (IDE) and
floppy devices. Hot and warm docking/undocking means you can dock and undock from the
Windows XP Professional Start menu without turning off your computer. Windows XP Professional automatically creates two hardware profiles for laptop computers: one for the docked
state and one for the undocked state. (For more information about hardware profiles see
Chapter 6, “Installing, Managing, and Troubleshooting Hardware Devices and Drivers.”) Hot
swapping of IDE and floppy devices means that you can remove and swap devices such as
floppy drives, DVD/CD drives, and hard drives without shutting down your system or restarting
your system. Windows XP Professional automatically detects and configures these devices.
How to Configure an Uninterruptible Power Supply
An uninterruptible power supply (UPS) is a device connected between a computer
or another piece of electronic equipment and a power source, such as an electrical outlet. The UPS ensures that the electrical flow to the computer is not interrupted because
of a power outage and, in most cases, protects the computer against potentially damaging events such as power surges and brownouts. When a power outage occurs, the
UPS provides a limited amount of time for you to save documents, exit applications,
and turn off the computer. Different UPS models offer different levels of protection.
To configure your UPS, click the UPS tab in the Power Options Properties dialog box.
The UPS tab shows the current power source, the estimated UPS run time, the estimated UPS capacity, and the battery condition. In the UPS tab, click Configure to display the UPS Selection dialog box. It displays a list of manufacturers from which you
can select the manufacturer of your UPS.
Note
Check the Windows Catalog to make sure that the UPS you are considering is compatible with Windows XP Professional before you purchase it.
5-18
Chapter 5
Configuring Windows XP Professional
If you want to configure a custom simple-signaling UPS, in the Select Manufacturer list
box, click Generic. In the Select Model list box, click Generic, and then click Next. You
can configure the conditions that trigger the UPS device to send a signal in the UPS
Interface Configuration dialog box (see Figure 5-6). These conditions include power
failures, a low battery, and the UPS shutting down.
F05us06.bmp
Figure 5-6 Configure the UPS by using the UPS Configuration dialog box.
After you have configured the UPS service for your computer, you should test the configuration to ensure that your computer is protected from power failures. Disconnect
the main power supply to simulate a power failure. During your test, the computer and
the devices connected to the computer should remain operational. You should let the
test run long enough for the UPS battery to reach a low level so that you can verify that
an orderly shutdown occurs.
Off the Record
Although Windows XP Professional provides some level of support for
UPSs, a good UPS usually comes with software of its own. The manufacturer’s software is
often better than Windows XP Professional at determining battery levels and estimated run
time. In addition, some software includes extra features such as the capability to automatically save documents, exit programs, and shut down the computer (or even to send the
computer into hibernation) when a power outage occurs.
Practice: Configuring Power Options
In this practice, you use Control Panel to configure Power Options.
1. Ensure that you are logged on with a user account that is a member of the Administrators group.
2. Click Start, click Control Panel, and then click Performance And Maintenance.
Lesson 2
Configuring Power Options
5-19
3. Click Power Options.
Windows XP Professional displays the Power Options Properties dialog box with
the Power Schemes tab active.
4. In the Power Schemes list, select Portable/Laptop.
5. In the Turn Off Monitor box, select After 10 Mins.
6. In the Turn Off Hard Disks box, select After 20 Mins.
7. Click Save As, and then in the Save Scheme text box, type Airplane.
8. Click OK.
You have just created a new power scheme. If you click the arrow at the end of
the Power Scheme box, Airplane is now included in the list of available power
schemes. If you want to use this power scheme, click Apply.
9. Click the Advanced tab and select the Always Show Icon On The Taskbar check box.
10. Click the Hibernate tab.
11. If the Enable Hibernation check box is not selected, select it, and then click Apply.
12. Click the APM tab.
13. If you do not see an APM tab on your computer, what are two reasons why it
might not be there?
14. If the Enable Advanced Power Management Support check box is not selected,
select it, and then click Apply.
15. To apply these changes you would click OK. Click Cancel.
Windows XP Professional closes the Power Options Properties dialog box.
16. Close all open windows.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. What is a power scheme and why would you use one?
5-20
Chapter 5
Configuring Windows XP Professional
2. Which of the following statements about Windows XP Professional power
schemes are true? (Choose all that apply.)
a. Windows XP Professional ships with six built-in power schemes.
b. Windows XP Professional allows you to create your own power schemes.
c. Windows XP Professional allows you to modify existing power schemes, but
you cannot create new ones.
d. Windows XP Professional does not ship with any built-in power schemes.
3. A(n) _____________________________ is a device that connects between a computer and a power source to ensure that the electrical flow to the computer is not
abruptly stopped because of a blackout.
4. What does hibernate mode do?
Lesson Summary
■
A power scheme is a collection of energy-saving power options. You can configure
a power scheme to turn off your monitor or hard disk, or even send the computer
to standby after a certain amount of idle time.
■
The advanced power management options allow you to add an icon for quick
access to Power Management to the taskbar and choose to be prompted for your
Windows password when your computer comes out of standby mode.
■
When your computer hibernates, it saves the current system state to your hard
disk, and then your computer shuts down. When you start the computer after it
has been hibernating, it returns to its previous state.
■
APM is a power standard that helps reduce the power consumption of your computer. To support APM, you must have an APM-compatible BIOS in your computer. A newer standard, ACPI, automatically enables APM support.
■
A UPS is a device that ensures that the electrical flow to a computer is not interrupted because of power loss.
Lesson 3
Configuring System Settings
5-21
Lesson 3: Configuring System Settings
You use the System Properties dialog box (available in the Control Panel window) to
configure operating system settings. These system settings affect the operating system
environment regardless of which user is logged on to the computer.
After this lesson, you will be able to
■ Configure system performance options.
■ Create, modify, and manage user profiles.
■ Configure startup and recovery settings.
■ Configure environmental variables.
■ Configure error reporting.
Estimated lesson time: 70 minutes
How to Configure System Performance Options
To configure system settings, in Control Panel, click Performance And Maintenance. To
view operating system performance configuration options, in the Performance And
Maintenance window, click System, and then click the Advanced tab. The Advanced
tab of the System Properties dialog box (see Figure 5-7) allows you to configure performance options, user profiles, startup and recovery settings, environment variables,
and error reporting.
Tip You can open the System Properties dialog box quickly by right-clicking the My Computer icon and clicking Properties.
F05us07.bmp
Figure 5-7 Use the Advanced tab of the System Properties dialog box to configure a number of
system settings.
5-22
Chapter 5
Configuring Windows XP Professional
On the Advanced tab, in the Performance section, click Settings to display the Performance Options dialog box. There are three tabs on the Performance Options dialog
box: Visual Effects, Advanced, and Data Execution Prevention.
Visual Effects Tab
The Visual Effects tab of the Performance Options dialog box is shown in Figure 5-8.
There are a number of options that you can select to manually control the visual effects
on your computer. Windows XP Professional provides four options to help you control
the visual effects: Let Windows Choose What’s Best For My Computer, Adjust For Best
Appearance, Adjust For Best Performance, and Custom. If you want to manually indicate which visual effects to apply, click Custom.
F05us08.bmp
Figure 5-8 Use the Visual Effects tab to control performance options.
Table 5-5 lists the visual effects along with descriptions of those that are not selfexplanatory.
Table 5-5
Windows XP Visual Effects
Visual Effect
Description
Animate windows
when minimizing and
maximizing
Causes a zoom effect when you minimize or maximize a window. Disabling this effect makes windows minimize and maximize faster.
Fade or slide menus
into view
Causes menus to fade or slide into view instead of simply appearing.
Disabling this effect makes menus appear faster.
Fade or slide ToolTips Causes ToolTips to fade or slide into view instead of simply appearing.
into view
ToolTips are the pop-up descriptions that appear beside certain items
when you hold your pointer over them. Disabling this effect makes
ToolTips appear faster.
Lesson 3
Table 5-5
Configuring System Settings
5-23
Windows XP Visual Effects
Visual Effect
Description
Fade-out menu items
after clicking
Causes menus to fade out after you select a command. Disabling this
effect makes menus disappear instantly after selecting a command.
Show shadows under
menus
Causes Windows to display a drop shadow behind menus for a threedimensional effect. Disabling this effect makes menus appear more
quickly.
Show shadows under
mouse pointer
Causes Windows to display a drop shadow behind the mouse pointer.
Disabling this effect can make the mouse more responsive. Also, some
older applications do not work well when this feature is enabled.
Show translucent
selection rectangle
Draws a filled-in rectangle when selecting multiple items on the desktop instead of just a rectangle outline. Disabling this effect slightly
increases the speed with which you can select items.
Show window
contents while
dragging
Causes Windows to redraw a window while the window is being
moved. Disabling this command makes dragging open windows
noticeably faster.
Slide open
combo boxes
Causes combo boxes to slide open instead of simply appear. A combo
box is a drop-down list of items that you open from within a dialog box.
Disabling this effect makes combo boxes appear more quickly.
Slide taskbar buttons
Causes taskbar buttons to slide to the left when other programs are
closed or to the right when new programs are opened. Disabling this
effect makes taskbar buttons appear instantly in the new location
instead of sliding. Disabling this effect makes taskbar buttons available
more quickly when they change locations.
Smooth edges of
screen fonts
Makes screen fonts easier to read, especially at higher resolutions. Disabling this effect increases the speed at which Windows displays windows and dialog boxes.
Smooth-scroll
list boxes
Causes the contents of a list box to scroll smoothly when you click the
scroll bar rather than just jump down a few items in the list. Disabling this
effect makes scrolling list boxes faster, but often disorienting.
Use a background
image for each
folder type
Different types of folders in Windows XP can use different background
images. Many of the special Windows folders, such as Control Panel,
make use of this effect.
Use common tasks
in folders
Causes folders in Windows to display a task pane on the left side of the
folder that lists tasks that are related to the files in the folder.
Use drop shadows
for icon labels on
the desktop
Creates a transparency effect on text labels for icons, but this transparency really allows you to see only any other icons obscured by an icon
on top. The transparency does not allow you to “see through” to the
actual desktop background. Disabling this effect causes Windows to
display the desktop more quickly.
Use visual styles on
windows and buttons
This setting is an important one in that it controls the new look of Windows XP. If you disable it, your desktop will look like previous versions of Windows.
5-24
Chapter 5
Configuring Windows XP Professional
Advanced Performance Options
The Advanced tab of the Performance Options dialog box is shown in Figure 5-9. The
options in this dialog box allow you to adjust the application response, which is the
priority of foreground programs versus background programs, and virtual memory.
F05us09.bmp
Figure 5-9 Configure additional settings on the Advanced tab of the Performance
Options dialog box.
Processor Scheduling Windows XP Professional uses the Processor Scheduling settings to distribute microprocessor resources among running programs. Selecting Programs assigns more resources to the foreground program (the active program that is
responding to user input). Windows XP Professional assigns more resources to the
foreground program by allocating short, variable time slices, or quanta, to running programs. A time slice, or quantum, is a brief period of time during which a particular task
is given control of the microprocessor. When you select Background Services, Windows assigns an equal number of resources to all programs by assigning long fixed
quanta instead. You should select Background Services only when a computer is used
as a server.
!
Exam Tip
Understand the difference between the Programs and Background Services
options.
Memory Usage Windows XP Professional uses the Memory Usage settings to distribute memory resources between running programs. Select Programs if your computer is
being used primarily as a workstation. With the Programs option, your programs
will work faster, and your system cache will be the default size for Windows XP
Lesson 3
Configuring System Settings
5-25
Professional. Select System Cache if you are using your computer as a server or if the
programs you are running require a large system cache.
Virtual Memory For virtual memory, Windows XP Professional uses a process called
demand paging to exchange data between random access memory (RAM) and paging
files on the hard disk. When you install Windows XP Professional, Setup creates a
virtual-memory paging file, PAGEFILE.SYS, on the partition in which you installed
Windows XP Professional. The default or recommended paging file size for Windows XP
Professional is equal to 1.5 times the total amount of RAM. For best results, never set
the value of the paging file size to less than the recommended amount. Typically, you
can leave the size of the paging file set to the default value and let Windows XP Professional manage the file size. In some circumstances, such as when you run a large
number of applications simultaneously, you might find it advantageous to use a larger
paging file or multiple paging files.
!
Exam Tip
By default, Windows XP manages the paging file size, but you can designate a
file size for special circumstances. The recommended paging file size is equal to 1.5 times
the total amount of RAM.
To configure the paging file, in the Performance Options dialog box, click the Change
button in the Virtual Memory section. The Virtual Memory dialog box (see Figure 5-10)
identifies the drives in which the paging files reside and allows you to modify the
paging file size for the selected drive.
F05us10.bmp
Figure 5-10
Configure paging file settings in the Virtual Memory dialog box.
5-26
Chapter 5
Configuring Windows XP Professional
Important
Only users with administrative rights can use the Performance Options dialog
box to increase the paging file size.
Paging files never decrease below the value found in the Initial Size text box that was
set during installation. Unused space in the paging file remains available to the internal
Windows XP Professional Virtual Memory Manager (VMM). As needed, a paging file
grows from its initial size to the maximum configured size, which is listed in the Maximum Size text box. When a paging file reaches the maximum size, but a running program still needs to allocate more virtual memory, Windows XP Professional will refuse
that allocation, which can cause an error, or even a crash, in applications.
When you restart a computer running Windows XP Professional, the system resizes all
paging files to the initial size.
Data Execution Prevention
Data Execution Prevention (DEP) is a set of hardware and software technologies that
perform additional checks on memory to help prevent malicious code from running on
a computer. In Windows XP Professional, DEP can be enforced by compatible hardware and by software.
Note DEP is an update included with Windows XP Service Pack 2. Hardware DEP is available with compatible devices and runs only on the 32-bit version of Windows XP Professional
and Home Edition.
Hardware DEP works by marking all pages in memory as non-executable unless the
page explicitly contains executable code. This process helps prevent malicious
attacks that try to insert and run executable code into memory. To use hardware DEP,
a computer must have a compatible processor that allows Windows to mark memory
pages as non-executable. Both Intel and AMD provide hardware DEP–compatible
processors.
Software DEP is a set of security checks that can run on any processor capable of running Windows XP. However, the security provided by software DEP is limited compared to that provided by hardware DEP.
You can configure DEP by using the Data Execution Prevention tab of the Performance
Options dialog box. By default, DEP is enabled for only essential Windows programs
and services. However, you can turn DEP on for all programs and services, and then
select specific programs and services for which you do not want DEP enabled.
Lesson 3
Configuring System Settings
5-27
How to Enhance System Performance
You can enhance system performance in several ways. First, if your computer has multiple hard disk controllers, you can create a paging file on a disk on each controller.
Distributing information across multiple paging files improves performance because
Windows can read and write from disks on different controllers simultaneously. When
attempting to write to the paging file, VMM tries to write the page data to the paging
file on the controller that is the least busy.
Second, you can enhance performance by moving the paging file off the drive that
contains the Windows XP Professional %systemroot% folder (by default, the Windows
folder), which avoids competition between the various reading and writing requests. If
you place a paging file on the Windows XP Professional system partition to facilitate
the recovery feature, which is discussed in the section entitled “How to Configure Startup
and Recovery Settings” later in this lesson, you can still increase performance by creating multiple paging files. Because the VMM alternates write operations between paging
files, the paging file on the boot partition is accessed less frequently.
Third, you can enhance system performance by setting the initial size of the paging
file to the value displayed in the Virtual Memory dialog box’s Maximum Size box,
which eliminates the time required to enlarge the file from the initial size to the maximum size.
Note
When applying new settings, be sure to click Set before clicking OK.
How to Configure User Profiles
Each user account in Windows XP has an associated user profile that stores userspecific configuration settings, such as a customized desktop or personalized application settings. Understanding how user profiles function and how to control them
lets you effectively manage the user’s desktop environment.
Windows XP supports three types of user profiles:
■
Local A local user profile is available only on the system on which it was created. A unique local user profile is created and stored on each computer that a
user logs on to.
■
Roaming Roaming profiles, which are stored in a shared folder on a network
server, are accessible from any location in the network.
■
Mandatory Mandatory user profiles are roaming user profiles that users cannot
make permanent changes to. Mandatory profiles are used to enforce configuration
settings.
5-28
Chapter 5
Configuring Windows XP Professional
Where Local User Profiles Are Stored
Windows stores local user profiles in the Documents And Settings folder hierarchy on
the %systemroot% drive. When a user logs on to a Windows XP system for the first
time, Windows creates a folder in Documents And Settings that matches the user’s user
name. Within each user profile, several files and folders contain configuration information and data. These files and folders include the following:
■
Application Data Contains application configuration information. Applications
that are Windows XP–aware can take advantage of this folder to store user-specific
configuration settings. This folder is hidden.
■
Cookies Contains cookie files, which Web sites usually create to store user
information and preferences on the local system. When you return to a site, the
cookie files allow the site to provide you with customized content and track your
activity within the site.
■
Desktop Contains files, folders, and shortcuts that have been placed on the
Windows XP desktop.
■
Favorites Used to store shortcuts to locations that a user has added to the Favorites list in Windows Explorer or Internet Explorer.
■
Local Settings Holds application data, history, and temporary files (including
temporary Internet files). This folder is hidden.
■
My Documents Used to store documents and other user data. My Documents is
easily accessible from the Start menu.
■
My Recent Documents Contains shortcuts to recently accessed documents and
folders. You can also access My Recent Documents from the Start Menu. This
folder is hidden.
■
NetHood Holds shortcuts created by the Add Network Place option in My Network Places. This folder is hidden.
■
PrintHood Contains shortcuts to printer folder items. This folder is hidden.
■
SendTo Contains shortcuts to document-handling utilities, such as e-mail applications. These shortcuts are displayed on the Send To option on the action menu
for files and folders. This folder is hidden.
■
Start Menu Holds the shortcuts to programs that are displayed in the Start
menu. One way to modify the Start Menu is to add or delete folders and shortcuts
to the Start Menu folder within a user’s profile folder.
■
Templates Contains template items. Created by user applications and are used
by those applications when a user creates a new document. This folder is hidden.
■
NTUSER.DAT The user-specific portion of the Registry. This file contains configuration changes made to Windows Explorer and the taskbar, as well as user-specific
Lesson 3
Configuring System Settings
5-29
Control Panel and Accessories settings. These settings are visible under
HKEY_CURRENT_USER in the Registry.
■
NTUSER.DAT.LOG A log file used as part of the process of committing changes
to Ntuser.dat and also in the recovery of Ntuser.dat if the system crashes.
Built-In User Profiles
Windows stores user profiles locally by default. A local user profile is available only on
the system on which it was created. Windows creates two built-in local user profiles
during installation:
■
Default User profile Windows uses the Default User profile as a template to
create all new profiles on the system. When a new user logs on, the user receives
a copy of the Default User profile as her own personal user profile. You can customize the Default User profile to control which options and settings a new user
will receive. Modifications to the Default User profile will affect only the profiles
of new users; existing personal profiles will not be affected. The Default User profile is stored in the \Documents and Settings\Default User folder. This folder is
hidden. To view and work with it, you must set the Folder Options in Windows
Explorer to include hidden files and folders.
■
All Users profile The All Users profile contains settings that apply to every user
who logs on to the system. Windows merges the settings in All Users with the current user’s profile for the duration of the logon session, but the settings are not made
a permanent part of the user’s profile. You can modify the All Users profile to contain settings that all users logging on to the system should have. For example, many
applications create shortcuts in the Start menu or desktop of the All Users profile
during installation, which ensures that all users who log on to the system have easy
access to those applications. As the Administrator, you can directly edit the All Users
profile to add and remove items as necessary. The All Users profile is stored in the
\Documents and Settings\All Users folder. The folder contains only a subset of the
folders contained in other profiles on the system because it is concerned only with
settings that could potentially apply to everyone.
How to Use Multiple Profiles for the Same User Account
If a computer running Windows XP Professional is a member of a Windows domain,
there is the potential for two users with the same user account name to log on to the
same system. An example of this is the local Administrator account (stored in the local
accounts database of the Windows XP computer) and the domain Administrator
account (stored in the centralized accounts database on the domain controllers). The
local account and the domain account are discrete entities, each maintaining a different
user profile.
Windows XP does not permit two user accounts with the same name to share the same
profile folder (for example, C:\Documents and Settings\Administrator). If Windows
5-30
Chapter 5
Configuring Windows XP Professional
did allow this to happen, the profile of one user would overwrite the profile of the
other. Instead, Windows creates the profile of the first user to log on using the user
name of the user in \Documents and Settings\%username%. Windows stores subsequent user accounts with the same name using the path \Documents and Settings\%username%.x. The folder extension (x) varies as follows:
■
If the additional user to log on with the same user name is a domain account, Windows creates the folder extension using the name of the domain.
■
If the additional user to log on with the same user name is a local account, Windows creates the folder extension using the name of the computer.
For example, if the local Administrator logs on first, and the domain Administrator logs
on second, Windows stores the local Administrator’s profile in the Administrator folder,
and the domain Administrator’s profile would be stored in a folder named Administrator.<domain_name>.
Multiple user profiles are an issue only when the system is a member of a domain
because domain membership enables both local and domain accounts to log on. In a
workgroup environment, Windows XP relies solely on the local accounts database, and
you cannot create two user accounts of the same name on the same computer.
How to Work with Local User Profiles
To view, create, delete, and change the type of user profiles, in Control Panel, click
Performance And Maintenance, click System, and then click the Advanced tab (refer to
Figure 5-7). In the User Profiles box, click Settings to display the User Profiles dialog
box (see Figure 5-11).
F05us11r.bmp
Figure 5-11
Use the User Profiles dialog box to control local user profiles.
Lesson 3
Configuring System Settings
5-31
The User Profiles dialog box lists the profiles stored on the computer you are sitting at.
You can perform the following tasks:
■
Change Type
Allows you to change the type of profile to local or roaming.
■
Delete
■
Copy To Allows you to create user profiles by copying an existing user profile
and assigning it to another user.
Allows you to delete user profiles.
After you click Copy To, the Copy Profile To text box allows you to specify a path for
the location to which the user profile is to be copied. You can click Browse to locate
the appropriate path. The Permitted To Use box allows you to specify the user or users
who can use the user profile.
How to Configure Startup and Recovery Settings
The System Properties dialog box also controls the startup and recovery settings for a
computer. Click Settings in the Startup And Recovery section of the Advanced Tab of
the System Properties dialog box to display the Startup And Recovery dialog box, as
shown in Figure 5-12. The System Startup options control the behavior of the Please
Select The Operating System To Start menu that appears when your computer starts.
The System Failure options control the actions that Windows XP Professional performs
in the event of a stop error, which is a severe error that causes Windows XP Professional to stop all processes.
F05us12.bmp
Figure 5-12 Use the Startup And Recovery dialog box to control startup and system
failure settings.
Off the Record
Stop errors are often referred to as fatal system errors or blue screen errors.
5-32
Chapter 5
Configuring Windows XP Professional
System Startup
When you first turn on the computer, the system displays the Please Select The Operating System To Start screen, which lists the available operating systems if more than
one is installed. By default, the system chooses one of the operating systems and displays a countdown timer. If you do not choose another operating system, the system
starts the preselected operating system when the countdown timer reaches zero or
when you press ENTER. Modify the options under System Startup to determine which
operating system is preselected, how long the countdown timer runs, and whether to
display the boot menu. You are also given the option of modifying the BOOT.INI file
manually, but it is usually better to allow Windows XP Professional to modify the file
rather than attempting to do so manually.
System Failure
The four recovery options that Windows XP Professional provides to assist administrators in the event of a system failure are described in Table 5-6.
Important
You must be logged on as a member of the Administrators group to set the
options in the Startup And Recovery dialog box.
Table 5-6
Recovery Options
Option
Additional Information
Write An Event To
The System Log
Select this check box to have Windows XP Professional write an event
to the system log when a system stops unexpectedly. Read Chapter 18,
“Using Windows XP Tools,” for more on events and the system log.
Send An
Administrative Alert
Select this check box to have Windows XP Professional send an
administrative alert to administrators when the system stops
unexpectedly.
Automatically Restart
Select this check box to have Windows XP Professional reboot whenever the system stops unexpectedly. Clear this check box if you are
troubleshooting a computer that continually reboots itself due to a
startup error.
Write Debugging
Information
This section allows you to specify whether Windows XP Professional
should record the contents of memory to a debugging file when there
is a system failure and how much of the memory contents to write.
Typically, debugging information is used by Microsoft support technicians to help identify and solve problems. The first option allows you
to specify what information Windows XP Professional should write to
the dump file: Memory.dmp. The following four choices are available:
■ None
Nothing is written to the dump file.
Lesson 3
Table 5-6
Option
Configuring System Settings
5-33
Recovery Options
Additional Information
■ Small Memory Dump
The minimum amount of useful information will be dumped. This option (the default setting)
requires a paging file of at least 2 MB on the boot volume of
your computer. A new dump file will be created every time the
system stops unexpectedly. The small dump directory stores a
history of these dumps. By default, the small dump directory is
%Systemroot%\Minidump. A small memory dump can be useful
when troubleshooting stop errors because it allows you to see
the actual stop error and often determines the driver causing
the error.
■ Kernel Memory Dump
Only kernel memory is written to the
dump file. Depending on the amount of RAM on your computer,
you must have from 50 MB to 800 MB available in the paging file
on the boot volume. A kernel memory dump can be useful when
debugging more complicated system failures. Typically, providing
a kernal memory to Microsoft support technicians allows them to
determine the cause of most errors.
■ Complete Memory Dump
Records the entire contents of
system memory when the system stops unexpectedly. You must
have a paging file on the boot volume large enough to hold all
the RAM on your system plus 1 MB. A complete memory dump
is quite large and usually contains more information than you
will find useful for simple debugging. You should enable this
option only when a Microsoft support technician requests it.
There are also two additional options:
■ Small Dump Directory
Specifies the name and location
of the small memory dump file. By default, it is %Systemroot%\
Memory.dmp.
■ Overwrite Any Existing File
By default, if you choose Complete Memory Dump or Kernel Memory Dump, Windows XP
Professional always writes to the same dump file: Memory.dmp.
Clear this check box to prevent Windows from overwriting
Memory.dmp.
The following requirements must be met for the Write Debugging Information recovery
option to work:
■
A paging file must be on the system partition (the partition that contains the %systemroot% folder).
■
The paging file must be at least 1 MB larger than the amount of physical RAM in
your computer if you choose Complete Memory Dump.
■
You must have enough disk space to write the file to the location you specify.
5-34
Chapter 5
Configuring Windows XP Professional
How to Configure Environment Variables
Environment variables define the system and user environment information, and
they contain information such as a drive, path, or file name. Environment variables
provide information that Windows XP Professional uses to control various applications.
For example, the TEMP environment variable specifies where some applications place
temporary files.
In the Advanced tab of the System Properties dialog box, click Environment Variables
to display the system and user environment variables that are currently in effect in the
Environment Variables dialog box (see Figure 5-13).
F05us13.bmp
Figure 5-13
Environment variables control the system and user environment.
System Environment Variables
Because system environment variables apply to the entire computer, they also affect all
users of the computer. During installation, Setup configures the default system environment variables, including the path to the Windows XP Professional files. Only an
administrator can add, modify, or remove a system environment variable.
User Environment Variables
The user environment variables differ for each user of a particular computer. The user
environment variables include any user-defined settings (such as a desktop pattern)
and any variables defined by applications (such as the path to the location of the application files). Users can add, modify, or remove their user environment variables in the
System Properties dialog box.
Lesson 3
Configuring System Settings
5-35
How Windows XP Professional Sets Environment Variables
Windows XP Professional sets environment variables in the following order:
1. By default, Windows XP Professional searches the AUTOEXEC.BAT file, if it exists,
and sets any environment variables.
2. Next, the system environment variables are set. If any system environment variables conflict with environment variables set from the search of the
AUTOEXEC.BAT file, the system environment variables override them.
3. Finally, the user environment variables are set. If any user environment variables
conflict with environment variables set from the search of the AUTOEXEC.BAT file
or from the system environment variables, the user environment variables override
them.
For example, if you add the line SET TMP=C:\ in AUTOEXEC.BAT, and a
TMP=X:\TEMP user variable is set, the user environment variable setting (X:\TEMP)
overrides the prior setting C:\.
Note You can prevent Windows XP Professional from searching the AUTOEXEC.BAT file by
editing the registry and setting the value of the ParseAutoexec entry to 0. The ParseAutoexec
entry is located in the registry under the following subkey:
\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\ CurrentVersion\Winlogon. See
Chapter 4, “Modifying and Troubleshooting the Startup Process,” for more information on the
Windows Registry.
How to Configure Error Reporting
Error reporting helps Microsoft improve future products and resolve any difficulties
you might encounter with Windows XP Professional. To configure error reporting, in
the Advanced tab of the System Properties dialog box, click Error Reporting. This displays the Error Reporting dialog box. Notice that Enable Error Reporting is selected by
default. To turn off error reporting, click Disable Error Reporting.
If you do not want to turn off error checking, you can configure reporting to indicate
which errors to report. Under Enable Error Reporting there are two check boxes
selected by default. Clear the Windows Operating System check box if you do not want
errors in the operating system to be reported. Clear the Programs check box if you do
not want errors in any of the programs running on your system to be reported. If you
want to specify the programs for which Windows XP Professional reports errors, click
Select Programs.
5-36
Chapter 5
Configuring Windows XP Professional
Note If a system or program error occurs and you have configured your system to report it,
Windows XP Professional displays a dialog box that allows you to indicate whether you want
to send the report to Microsoft.
Practice: Configuring System Settings by Using Control Panel
In this practice, you use the System program to change some of the system settings.
First, you change the paging file size. Then, you add a new system environment
variable.
Exercise 1: Change the Paging File Size
In this exercise, you use the System Properties dialog box to change the size of the
Windows XP Professional paging file.
1. In the System Properties dialog box, click the Advanced tab.
2. In the Performance box, click Settings.
Windows XP Professional displays the Performance Options dialog box with the
Visual Effects tab active.
3. Click the Advanced tab.
By default, both Processor Scheduling and Memory Usage are optimized for applications.
4. In the Virtual Memory box, click Change.
Windows XP Professional displays the Virtual Memory dialog box.
5. In the Drive list, click the drive that contains your paging file, if necessary.
6. In the Initial Size text box, increase the value by 10, and then click Set.
You have just increased the initial size of the paging file.
7. Click OK to close the Virtual Memory dialog box.
8. Click OK to close the Performance Options dialog box.
Leave the System Properties dialog box open for the next exercise.
Exercise 2: Add a System Environment Variable
In this exercise, you use the System Properties dialog box to add a new system environment variable. You then test the new variable by using it at the command prompt.
1. In the System Properties dialog box, in the Advanced tab, click Environment
Variables.
Windows XP Professional displays the Environment Variables dialog box.
Lesson 3
Configuring System Settings
5-37
2. Under System Variables, click New.
Windows XP Professional displays the New System Variable dialog box.
3. In the Variable Name text box, type WinXPdir.
4. In the Variable Value text box, type the path to the folder containing the Windows
XP Professional system files, for example, C:\Windows.
If you are not sure of the path to the Windows XP Professional system files, use
Windows Explorer to locate the Windows directory.
5. Click OK.
You are returned to the Environment Variables dialog box.
6. Scroll through the System Environment Variables and verify that WinXPdir is listed.
7. Click OK to close the Environment Variables dialog box, and then click OK to
close the System Properties dialog box.
8. Close the Performance And Maintenance window.
9. From the Start menu, click Run.
10. In the Open text box, type cmd, and then click OK.
11. What does typing the cmd command do?
12. At the command prompt, type set | more, and then press ENTER.
The list of current environment variables is displayed, and WinXPdir is listed. (You
might need to press SPACEBAR to scroll down to see WinXPdir listed.)
13. If necessary, type c: and then press ENTER to switch to the drive on which you
installed Windows XP Professional. (Adjust the drive letter, if necessary.)
14. Type cd\ and then press ENTER to switch to the root directory.
15. Type cd %WinXPdir%, and then press ENTER.
You should now be in the Windows directory.
16. Type exit and press ENTER to close the command prompt.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
5-38
Chapter 5
Configuring Windows XP Professional
1. What performance options can you control with the tabs of the Performance
Options dialog box?
2. Which of the following statements about the use of virtual memory in Windows
XP Professional are correct? (Choose all that apply.)
a. When you install Windows XP Professional, Setup creates a virtual memory
paging file, PAGEFILE.SYS, on the partition where you installed Windows XP
Professional.
b. In some environments, you might find it advantageous to use multiple paging
files.
c. If the entire paging file is not in use, it can decrease below the initial size that
was set during installation.
d. Unused space in the paging file remains unavailable to all programs, even the
internal Windows XP Professional VMM.
3. When you first turn on the computer, the system displays a Please Select The
Operating System To Start screen, which lists the available operating systems.
What happens if a user does not select an operating system before the countdown
timer reaches zero?
4. Which requirements must be met for the Write Debugging Information recovery
option to work?
Lesson 3
Configuring System Settings
5-39
Lesson Summary
■
The Advanced tab of the System Properties dialog box allows you to configure
performance options for a computer. You can enable and disable visual effects
that affect performance, as well as configure processor scheduling, memory usage,
virtual and memory settings.
■
Each user account in Windows XP has an associated user profile that stores userspecific configuration settings. There are three types of user profiles: local, roaming, and mandatory. Local user profiles are stored in the Documents And Settings
folder hierarchy on the %systemroot% drive.
■
You can also use the System Properties dialog box to control the startup and
recovery settings for a computer. Startup settings include which operating system
is loaded by default during Windows Startup and how long Windows waits for
you to choose an operating system before loading the default automatically.
Recovery settings allow you to control Windows behavior in the event of a system
failure.
■
Environment variables define the system and user environment information. Environment variables provide information that Windows XP Professional uses to control various applications.
■
When Error Reporting is enabled, Windows collects information after an application or operating system error and offers to send that information to Microsoft.
Error reporting assists Microsoft in improving future products and in resolving any
difficulties you might encounter with Windows XP Professional.
5-40
Chapter 5
Configuring Windows XP Professional
Lesson 4: Configuring Languages, Locations,
and Accessibility Options
Windows XP Professional provides great flexibility when configuring the desktop. You
can configure your computer for multiple languages and multiple locations. This is
especially important for international companies that deal with customers in more than
one country or users who live in a country in which more than one language is spoken. Windows XP Professional also provides accessibility options that allow you to
make the operating system easier to use.
After this lesson, you will be able to
■ Configure and troubleshoot regional and language options.
■ Configure and troubleshoot accessibility options.
Estimated lesson time: 40 minutes
How to Configure and Troubleshoot Regional and Language Options
Regional And Language Options, available from Date, Time, Language, And Regional
Options in Control Panel, define the standards and formats that the computer uses to
perform calculations; provide information such as date and time; and display the correct format for currency, numbers, dates, and other units. These settings also define a
user’s location, which enables help services to provide local information such as news
and weather. Language options define the input languages (one computer can accept
input in many different languages); therefore, the computer must be configured with
the proper settings.
In many instances, users need to add a region or an input language because they
travel, work, or live in two different countries or regions; an input language needs to
be added because users who share a computer speak different languages; or a currency, time, and date need to be changed temporarily on a user’s laptop while he is on
a business trip.
You will perform almost all regional and language configuration and troubleshooting
tasks in Control Panel by clicking Date, Time, Language, And Regional Options; and
then clicking Regional And Language Options. Figure 5-14 shows the Regional And
Language Options dialog box.
Configuring Correct Currency, Time, and Date
When a user requests a change to the currency, time, or date standards and formats on
a computer, you make those changes in the Regional And Language Options dialog
box on the Regional Options tab. Changing the standard and format is as simple as
clicking the drop-down list in the Standards And Formats section and selecting a new
Lesson 4
Configuring Languages, Locations, and Accessibility Options
5-41
option. In Figure 5-15, English (United States) is no longer selected; French (France) is.
Notice that the date is written in French, that the currency has changed, and that the
date, November 4, 2004, is written 04/11/2004—different from the English version,
which is 11/04/2004.
F05us14.bmp
Figure 5-14 The Regional And Language Options dialog box allows you to select available
languages and customize formatting.
F05us15.bmp
Figure 5-15
and more.
Changing standard and format options changes the currency, date, language,
To make changes and to access the other regional and language options, use these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Date, Time, Language, And Regional Options;
and then click Regional And Language Options.
5-42
Chapter 5
Configuring Windows XP Professional
3. In the Regional And Language Options dialog box, on the Regional Options tab,
in the Standards And Formats section, click the drop-down list to view the additional choices. Select one of these choices.
4. In the Location section, choose a country or region from the list to change the
default location.
5. To further customize the settings, click Customize.
6. When finished, click OK in each open dialog box to exit.
How to Customize Regional Options
If you need to change the default settings—such as changing the currency symbol, the
time or date format, or the system of measurement—but need to keep other default settings intact, click Customize (refer to Figure 5-14) and make the appropriate changes.
Each option has a drop-down list, and selecting a different option requires only selecting it from the list.
How to Configure Input Languages
The input language that is configured for the computer tells Windows how to react
when a user types text using the keyboard. A user might want you to add a language
if he works in or travels between two or more countries that use different languages
and he needs to work in those languages or perform calculations with the currencies
in those countries. With multiple languages configured, the user can toggle between
them as needed. In addition, users might want to change language settings even if they
do not travel because they do work with an international group or conduct business
with other countries.
To add (or remove) an input language, use these steps:
1. Click Start menu, and then click Control Panel.
2. In the Control Panel window, click Date, Time, Language, And Regional Options;
and then click Regional And Language Options.
3. In the Regional And Language Options dialog box, on the Languages tab, click
Details.
4. In the Text Services And Input Languages dialog box, click Add to add a language.
5. In the Add Input Language dialog box, click the language you want to add. To
choose a specific keyboard layout, select the Keyboard Layout/IME check box and
choose the appropriate layout. (To add a keyboard layout or input method editor
[IME], you need to have installed it on your computer first.) Click OK.
6. In the Text Services And Input Languages dialog box, select which language
should be the default language from the Default Input Language drop-down list
and click OK.
Lesson 4
Configuring Languages, Locations, and Accessibility Options
5-43
Figure 5-16 shows two available languages: English [United States]-US and French
[France]-France. You can now switch between these languages by using the Language
toolbar located on the taskbar.
F05us16.bmp
Figure 5-16
Two languages are now available.
How to Troubleshoot Language-Related Problems
When users have multiple languages configured, language-related problems will probably occur. A common problem occurs when a user who has multiple languages configured changes the default language in use by accidentally pressing the key
combination that switches between them. By default, pressing L EFT A LT + S HIFT
switches between languages. If you press this combination accidentally, it might suddenly seem that the keyboard does not act as it is supposed to. You must press the key
combination again (or use the Language toolbar) to switch back to the default language. You might want to disable this feature if it becomes a regular problem.
!
Exam Tip
Consider regional settings as a possibility when keyboard errors are reported or
when users report that symbols do not look correct.
How to Configure and Troubleshoot Accessibility Options
Windows XP Professional provides the ability to configure accessibility options
through the Accessibility Options icon in Control Panel.
Keyboard Options
To configure keyboard options, in Control Panel, click Accessibility Options. In the
Accessibility Options window, click Accessibility Options to display the Accessibility
Options dialog box. The Keyboard tab of the Accessibility Options dialog box, shown
5-44
Chapter 5
Configuring Windows XP Professional
in Figure 5-17, allows you to configure the keyboard options StickyKeys, FilterKeys,
and ToggleKeys.
F05us17.bmp
Figure 5-17
Configure keyboard accessibility options.
StickyKeys Turning on StickyKeys allows you to press a multiple-key combination,
such as CTRL+ALT+DELETE, one key at a time. This is useful for people who have difficulty pushing more than one key at a time. This is a check box selection, so it is either
on or off. You can configure StickyKeys by clicking Settings to activate the Settings For
StickyKeys dialog box (see Figure 5-18).
F05us18.bmp
Figure 5-18
StickyKeys allows you to press a multiple-key combination one key at a time.
Lesson 4
Configuring Languages, Locations, and Accessibility Options
5-45
You can also configure a shortcut key for StickyKeys. You can use the default shortcut
key, pressing SHIFT five times, to turn on StickyKeys. This option is activated by default.
Two other options can also be configured for StickyKeys: Press Modifier Key Twice To
Lock and Turn StickyKeys Off If Two Keys Are Pressed At Once. The modifier keys are
CTRL, ALT, SHIFT, and the Windows Logo key. If you select the modifier key option,
pressing one of the modifier keys twice will cause that key to remain active until you
press it again. This is useful for people who have difficulty pressing key combinations.
If you choose to use the second option, StickyKeys is disabled if two keys are pressed
simultaneously.
Two Notification settings can be configured for StickyKeys: Make Sounds When Modifier Key Is Pressed and Show StickyKeys Status On Screen. The first notification setting
causes a sound to be made when any of the modifier keys—CTRL, ALT, SHIFT, or the
Windows Logo key—is pressed. The second notification setting causes a StickyKeys
icon to be displayed in the taskbar when StickyKeys is turned on.
FilterKeys The Keyboard tab also allows you to configure FilterKeys. Turning on
FilterKeys causes the keyboard to ignore brief or repeated keystrokes. This option also
allows you to configure the keyboard repeat rate, which is the rate at which a key continuously held down repeats the keystroke. This is a check box selection, so it is either
on or off. You can configure FilterKeys by clicking Settings to activate the Settings For
FilterKeys dialog box (see Figure 5-19).
F05us19.bmp
Figure 5-19
FilterKeys causes the keyboard to ignore brief or repeated keystrokes.
You can also configure a shortcut key for FilterKeys. You can use the default shortcut
key, holding down the RIGHT SHIFT key for eight seconds, to turn on FilterKeys. This
setting is activated by default.
5-46
Chapter 5
Configuring Windows XP Professional
Two other Filter options can also be configured for FilterKeys: Ignore Repeated Keystrokes and Ignore Quick Keystrokes And Slow Down The Repeat Rate. Ignore
Repeated Keystrokes is inactive by default; Ignore Quick Keystrokes And Slow Down
The Repeat Rate is active by default. Only one of these two filter options can be active
at a time. Configure each of them by clicking Settings.
Two Notification settings can be configured for FilterKeys: Beep When Keys Pressed
Or Accepted and Show FilterKey Status On Screen. The first notification setting causes
a beep when you press a key and another beep when the keystroke is accepted. The
second notification option causes a FilterKeys icon to be displayed in the taskbar when
FilterKeys is turned on. These settings are check boxes, so one of the settings, both of
the settings (the default), or neither of the settings can be selected.
ToggleKeys You can also configure ToggleKeys in the Keyboard tab. Turning on
ToggleKeys causes the computer to make a high-pitched sound each time the CAPS
LOCK, NUM LOCK, or SCROLL LOCK key is switched on. Turning on ToggleKeys also causes
the computer to make a low-pitched sound each time these three keys are turned off.
You can configure a shortcut key for ToggleKeys by clicking Settings. You can use the
shortcut key, holding down NUM LOCK for five seconds, to turn on ToggleKeys. This
setting is activated by default.
Note
There is one more check box on the Keyboard tab: Show Extra Keyboard Help In
Programs. When activated, this check box causes other programs to display additional
keyboard help if available.
Sound Options
The Sound tab provides the Use SoundSentry check box, which allows you to configure Windows XP Professional to generate visual warnings when your computer makes
a sound. The Sound tab also provides the Use ShowSounds check box, which allows
you to configure Windows XP Professional programs to display captions for the speech
and sounds they make.
Display Options
The Display tab of the Accessibility Options dialog box provides the Use High Contrast
check box, which allows you to configure Windows XP Professional to use color and
fonts designed for easy reading. You can click Settings to turn off or on the use of a
shortcut, LEFT ALT+LEFT SHIFT+PRTSCN, which is enabled by default. Clicking Settings
also allows you to select the high-contrast appearance scheme that you want to use.
The Display tab also provides cursor options that allow you to set the blink rate and
the width of the cursor.
Lesson 4
Configuring Languages, Locations, and Accessibility Options
5-47
Mouse Options
The Mouse tab provides the Use MouseKeys check box, which allows you to configure
Windows XP Professional to control the pointer with the numeric keypad on your keyboard. You can click Settings to configure MouseKeys in the Settings For MouseKeys
dialog box (see Figure 5-20).
F05us20.bmp
Figure 5-20
MouseKeys allows you to control the pointer with the numeric keypad.
MouseKeys uses a shortcut, LEFT ALT+LEFT SHIFT+NUM LOCK, which is enabled by
default. You can also configure the pointer speed and acceleration speed. There is
even a check box, Hold Down Ctrl To Speed Up And Shift To Slow Down, that allows
you to temporarily speed up or slow down the mouse pointer speed when you are
using MouseKeys. To speed up the mouse pointer movement, hold down CTRL while
you press the numeric keypad directional keys. To slow down the mouse pointer
movement, hold down SHIFT while you press the numeric keypad directional keys.
General Tab
The General tab of the Accessibility Options dialog box (see Figure 5-21) allows you to
configure Automatic Reset. This feature turns off all the accessibility features, except
the SerialKeys devices, after the computer has been idle for a specified amount of time.
The General tab also includes the Notification feature, which allows you to configure
Windows XP Professional to give a warning message when a feature is activated and to
make a sound when turning a feature on or off.
The General tab also allows you to activate the SerialKeys Devices feature, which configures Windows XP Professional to support an alternative input device (also called an
augmentative communication device) to your computer’s serial port.
5-48
Chapter 5
Configuring Windows XP Professional
F05us21.bmp
Figure 5-21
Configure general accessibility options.
The Administrative Options feature provides two check boxes, Apply All Settings To
Logon Desktop and Apply All Settings To Defaults For New Users, which allow you to
configure Windows XP Professional to apply all configured accessibility options to this
user at logon and to apply all configured accessibility options to all new users.
Practice: Configuring Multiple Languages by Using Control Panel
In this practice, you use the Regional And Language Options icon in Control Panel to
configure multiple languages and multiple locations.
1. In Control Panel, click the Date, Time, Language, And Regional Options icon.
2. Click Regional And Language Options.
Windows XP Professional displays the Regional And Language Options dialog box
with the Regional Options tab active.
3. Click the Languages tab.
4. In the Text Services And Input Languages box, click Details.
Windows XP Professional displays the Text Services And Input Languages dialog
box.
5. In the Installed Services box, click Add.
Windows XP Professional displays the Add Input Language dialog box.
Lesson 4
Configuring Languages, Locations, and Accessibility Options
5-49
6. Click the down-pointing arrow at the end of the Input Languages box to scroll
through the listed languages and select French (France).
The French Keyboard Layout/IME is selected automatically.
7. Click OK to close the Add Input Language dialog box.
Windows XP Professional displays the Text Services And Input Languages dialog
box. Notice that there are now two Installed Services.
8. Click OK to close the Text Services And Input Languages dialog box.
9. Click OK to close the Regional And Language Options dialog box.
10. Close all open programs.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. How can you configure Windows XP Professional to use multiple languages?
2. Which of the following features allows you to press a multiple-key combination,
such as CTRL+ALT+DELETE, one key at a time. (Choose the correct answer.)
a. FilterKeys
b. StickyKeys
c. ToggleKeys
d. MultiKeys
5-50
Chapter 5
Configuring Windows XP Professional
3. Turning on ________________________ causes the keyboard to ignore brief or
repeated keystrokes. This option also allows you to configure the keyboard
repeat rate, which is the rate at which a key continuously held down repeats the
keystroke.
4. When using MouseKeys, to speed up the mouse pointer movement, hold down
the ________ key while you press the numeric keypad directional keys. To slow
down the mouse pointer movement, hold down the ________ key while you press
the numeric keypad directional keys.
Lesson Summary
■
Regional and language options, available from Control Panel, define the standards
and formats that the computer uses to perform calculations; provide information
such as date and time; and display the correct format for currency, numbers, dates,
and other units.
■
Windows XP also provides a number of accessibility options that make Windows
easier to work with for some people. Some of these features are as follows:
❑
StickyKeys allows you to press a multiple-key combination, such as
CTRL+ALT+DELETE, one key at a time.
❑
FilterKeys causes the keyboard to ignore brief or repeated keystrokes.
❑
ToggleKeys causes the computer to make a high-pitched sound each time the
CAPS LOCK, NUM LOCK, or SCROLL LOCK key is switched on.
❑
SoundSentry causes Windows XP Professional to generate visual warnings
when your computer makes a sound.
❑
ShowSounds causes Windows XP Professional programs to display captions
for the speech and sounds they make.
❑
MouseKeys allows you to configure Windows XP Professional to control the
pointer with the numeric keypad on your keyboard.
Lesson 5
Managing Windows Components
5-51
Lesson 5: Managing Windows Components
Windows XP Professional provides the Add or Remove Programs tool in Control Panel
to make it easy for you manage programs and Windows components on your computer. You use it to add applications, such as Microsoft Word, from CD-ROM, floppy
disk, or network shares. You also use it to add Windows components to a Windows XP
Professional installation. The Add Or Remove Programs tool also allows you to remove
applications or Windows components.
After this lesson, you will be able to
■ Add Windows components
■ Remove Windows components
■ Manage Microsoft Internet Information Services (IIS)
Estimated lesson time: 20 minutes
How to Add Windows Components
You can install Windows components that you did not select when you installed Windows XP Professional on your computer. The components you can install include Fax
Services, Internet Information Services (IIS), Management and Monitoring Tools,
Message Queuing, and additional Network Services. If you want to install one of the
Windows components, select it, and then click Next.
To install or remove Windows components, use the Add Or Remove Programs tool. In
the Add Or Remove Programs window, click Add/Remove Windows Components to
open the Windows Components Wizard (see Figure 5-22).
F05us22.bmp
Figure 5-22 Use the Windows Components Wizard to add or remove components from a
Windows XP Professional installation.
5-52
Chapter 5
Configuring Windows XP Professional
Adding components works pretty much the same way no matter what component you
install, so this chapter focuses on IIS: Web server software that is included with Windows XP.
To install IIS, use these steps:
1. Click Start, and then click Control Panel
2. In the Control Panel window, click Add Or Remove Programs.
3. In the Add Or Remove Programs window, click Add/Remove Windows Components.
Windows XP Professional starts the Windows Components Wizard.
4. Select the Internet Information Services (IIS) check box.
5. Click Details.
The Windows Components Wizard displays the Internet Information Services
page, which shows the components included when you install IIS. Table 5-7 lists
these components.
Table 5-7
Components Included with IIS
Component
Selected by
Default
Common Files
Yes
Installs the required IIS program files
Documentation
Yes
Installs documentation about publishing site content, and Web and FTP Server Administration
File Transfer Protocol
(FTP) Service
No
Provides support to create FTP sites used to
upload and download files
FrontPage 2000 Server
Extensions
Yes
Enables authoring and administration of Web
sites with Microsoft FrontPage and Microsoft
Visual InterDev
Internet Information
Services Snap-In
Yes
Installs the IIS Administrative interface into
Microsoft Management Console
SMTP Service
Yes
Supports the transfer of electronic mail
World Wide
Web Service
Yes
Uses the Hypertext Transfer Protocol (HTTP)
to respond to Web client requests on a TCP/IP
network
Description
6. Click OK to close the Internet Information Services (IIS) page.
7. In the Windows Components page, click Next to continue with the installation of IIS.
The Windows Components Wizard displays the Configuring Components page while
the appropriate files are copied and the components are configured. This might take
a few minutes.
Lesson 5
Managing Windows Components
5-53
8. In the Completing The Windows Components Wizard page, click Finish.
9. Click Close to close the Add Or Remove Programs tool.
How to Remove Windows Components
The Windows Components Wizard is also used to uninstall or remove Windows components from your computer. If you want to remove a Windows component, on the
Windows Component page of the Windows Components Wizard, clear the check box
for the component you want to remove, and then click Next. The Windows Components Wizard displays the Configuring Components page as the files are removed from
your computer. When the component is removed, the Windows Components Wizard
displays the Completing The Windows Components Wizard page; click Finish to close
the wizard. Click Close to close the Add Or Remove Programs tool, and then close
Control Panel.
How to Manage Internet Information Services
IIS allows you to easily publish information on the Internet, or on your or your company’s intranet. You place your Web files in directories on your server and users establish HTTP connections and view your files with a Web browser. IIS for Windows XP
Professional is designed for home or small business networks and allows only 10
simultaneous client connections. It also does not provide all the features that the version included with Windows Server 2003 provides.
You will use the Internet Information Services snap-in to manage IIS. The Internet
Information Services snap-in helps you manage the content of and access to your Web
and FTP sites. To access the Internet Information Services snap-in, click Start, point to
All Programs, point to Administrative Tools, and then click Internet Information Services. The Internet Information Services snap-in lets you handle all aspects of administration for IIS. For example, every Web and FTP site must have a home directory. When
you install IIS, a default home directory is created. When you create a new Web site,
you can use the Internet Information Services snap-in to change your home directory.
To change your home directory, in the Internet Information Services snap-in, rightclick a Web or FTP site, and then click Properties. In the site’s Properties dialog box,
click the Home Directory tab. You can specify a directory on this computer, a shared
directory located on another computer, or a redirection to a URL, and then type the
path in the Local Path text box. Click OK and you have changed your home directory.
If your Web site contains files that are located in directories other than your home directory (for example, on another computer), you must create virtual directories to include
these files on your Web site. You use the IIS console to create these virtual directories. In
the console, select the Web or FTP site to which you want to add a directory. On the
Action menu, point to New, and click Virtual Directory. This starts the Virtual Directory
Creation Wizard, which will guide you through creating the new directory.
5-54
Chapter 5
Configuring Windows XP Professional
When IIS is installed on a computer running Windows XP Professional, an additional
tab named Web Sharing becomes available on the Properties dialog box of any folder,
as shown in Figure 5-23. You can use this tab to quickly make any folder accessible via
your personal Web site.
F05us23.bmp
Figure 5-23
IIS makes the Web Sharing tab available on the Properties dialog box for folders.
To share a folder on a personal Web site by using the Web Sharing tab, use these steps:
1. In Windows Explorer, right-click the folder you want to share through your Web
site, and then click Properties.
2. In the Properties dialog box for the folder, on the Web Sharing tab, use the Share
On menu to select the site on which you want to share the folder. By default, the
Default Web Site is selected. If you have only one Web site, there are no other
choices on the menu.
3. Click Share This Folder.
Windows XP displays the Edit Alias dialog box.
4. In the Edit Alias dialog box, type an Alias for the folder. The alias is the name by
which the folder is displayed on the Web site. By default, Windows creates an alias
that is the same as the folder name.
5. Configure access permissions for the folder. Available access permissions are as
follows:
❑
The Read permission allows users to open or download files in the folder.
❑
The Write permission allows users to modify files in the folder.
❑
The Script Source Access permission allows users to access source code for
scripts in the folder.
❑
The Directory Browsing permission allows users to view the files in the folder.
Lesson 5
Managing Windows Components
5-55
6. Configure Application Permissions for the folder. This setting determines whether
applications can run scripts or executable files in the folder.
7. Click OK to exit the Edit Alias dialog box.
8. Click OK again to apply settings and exit the Properties dialog box for the folder.
You can also use the Web Sharing tab to create additional aliases for a folder, edit the
properties of existing aliases, and remove an alias from a folder.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. How do you add Windows components to your Windows XP Professional
installation?
2. What service does IIS provide?
3. How many simultaneous client connections can you have by using IIS for Windows XP Professional?
a. 8
b. 10
c. 20
d. 32
5-56
Chapter 5
Configuring Windows XP Professional
4. How do you administer IIS for Windows XP Professional?
Lesson Summary
■
Use the Add or Remove Programs tool in Control Panel to add applications and
Windows components. To add a Windows component, in the Add or Remove Programs window, select Add/Remove Windows Components.
■
You will also use the Add/Remove Windows Components dialog box to remove
components from a Windows XP Professional installation.
■
IIS allows you to publish information on the Internet or on your intranet. IIS for
Windows XP Professional is designed for home or small business networks and
only allows 10 simultaneous client connections.
Case Scenario Exercise
In this exercise, you will read a scenario about configuring Windows XP and then
answer the questions that follow. If you have difficulty completing this work, review
the material in this chapter before beginning the next chapter. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
Scenario
You are working as an administrator for a company named Trey Research, a manufacturer of wireless tracking devices. You are working with Olinda, a technical writer and
translator who is creating a user manual in English and French for the software interface to one of the company’s products.
Questions
1. The software interface for the products uses the metric system instead of the U.S.
system of measurement. Olinda’s regional settings are configured to use the
English (United States) standard. How would you change the default system of
measurement on her computer from U.S. to metric?
Case Scenario Exercise
5-57
2. Because Olinda is documenting how to run the software interface in Windows XP,
she needs to be able to use Windows XP in both English and French. How should
you configure this feature?
3. After adding French to Olinda’s computer, how can she switch between English
and French?
4. After working with the software interface for the company’s product, Olinda
reports that sometimes after she leaves her computer for a while, her monitor goes
blank. When she moves her mouse, she says the monitor comes back, but the program crashes. She wants to stop her monitor from going blank when she leaves it
unattended. What should you do?
5. After working with the creators of the software interface, Olinda discovers that the
program does not respond well to certain visual effects. In particular, the programmers tell her that displaying shadows under the mouse pointer can cause problems with the program. Olinda wants to include instructions in her manual for
disabling this feature and has asked you to provide those instructions. What do
you tell her?
5-58
Chapter 5
Configuring Windows XP Professional
Troubleshooting Lab
You are working as an administrator for a company named Contoso, Ltd., a national
distributor of paper products. Marcel, a user in the Sales department, reports that he is
having a problem with his computer running Windows XP Professional. When he starts
his computer, the startup process gets as far as the Windows logo screen and then fails.
Marcel sees a blue screen with a lot of text on it, and then the computer restarts. The
computer does this over and over again.
1. What is happening to Marcel’s computer?
2. You can start Marcel’s computer successfully in safe mode. You want to see the
Stop error. What should you do?
3. After researching the Stop error on Marcel’s computer, you have determined that
a damaged paging file is causing the stop error. You need to remove the paging
file from Marcel’s computer. How would you do this?
4. After removing the damaged paging file, you need to create a new paging file. You
want Windows to manage the paging file size. How would you do this?
Exam Highlights
5-59
Chapter Summary
■
You can use the Display Properties dialog box to control most settings that govern
the appearance of your desktop and the settings for your video adapter and monitor. Windows XP Professional supports the use of up to 10 displays, extending the
Windows Desktop so that it is spread across all available displays. You must use
PCI or AGP video adapters when configuring multiple displays.
■
Power Options allows you to configure Windows XP Professional to turn off the
power to your monitor and your hard disk, configure APM support, enable hibernation, and configure support for a UPS.
■
The Advanced tab of the System Properties dialog box allows you to configure
performance options for a computer. You can enable and disable visual effects
that affect performance, as well as configure processor scheduling, memory usage,
and virtual and memory settings. You can also use the System Properties dialog
box to control the startup and recovery settings for a computer, user profiles, and
environmental variables.
■
Regional and language options, available from Control Panel, define the standards
and formats that the computer uses to perform calculations; provide information
such as date and time; and display the correct format for currency, numbers, dates,
and other units. Windows XP also provides a number of accessibility options that
make Windows easier to work with for some people.
■
You can use the Add Or Remove Programs tool in Control Panel to add and
remove applications and Windows components. IIS, Web server software built
into Windows XP Professional, is an example of a component you can add.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
Understand how to control color quality and screen resolution. Also understand
how to control advanced display settings, such as adapter type, monitor type, and
compatibility.
■
You can configure processor scheduling to favor Programs or Background Services. Selecting Programs assigns more resources to the foreground program (the
active program that is responding to user input). When you select Background
Services, Windows assigns an equal number of resources to all programs.
5-60
Chapter 5
Configuring Windows XP Professional
■
By default, Windows XP manages the paging file size, but you can designate a file
size for special circumstances. The recommended paging file size is equal to 1.5
times the total amount of RAM.
■
Consider regional settings as a possibility when keyboard errors are reported or
when users report that symbols do not look correct.
Key Terms
Advanced Configuration and Power Interface (ACPI) A newer power standard
than APM that allows Windows to control power settings for a computer. A computer that supports ACPI automatically supports APM.
Advanced Power Management (APM) A power standard that allows Windows to
manage the power settings on a computer.
Color Quality A setting that affects the number of colors used to display objects on
the Desktop.
Desktop Cleanup Wizard A wizard that runs every 60 days by default, offering to
remove unused Desktop icons.
Environment variables Variables that define the system and user environment
information, and contain information such as a drive, path, or file name.
hibernate mode A state in which Windows saves the current system state (including open programs and windows) to your hard disk, and then shuts the computer
down. When you restart the computer, the open programs and windows are
restored.
input languages Languages installed on a computer running Windows XP Professional from which the computer can accept input.
Internet Information Services (IIS) Web server software built into Windows XP
Professional that allows you to easily publish information on the Internet, or on
your or your company’s intranet.
paging file The file Windows uses to swap pages of data between physical memory
and hard disk to augment the memory on a computer. This augmentation is
known as virtual memory.
Power schemes Schemes that allow you to configure Windows XP Professional to
turn off the power to your monitor and your hard disk, conserving energy.
primary display The default display in a multiple display configuration. You can
often change which video adapter controls the primary display by changing settings in the computer’s BIOS.
Screen Resolution A setting that allows you to set the number of pixels Windows
uses to display the Desktop.
Exam Highlights
5-61
uninterruptible power supply (UPS) A device connected between a computer or
another piece of electronic equipment and a power source to ensure that the electrical flow to the computer is not interrupted because of a power outage.
user profile A collection of user-specific settings, such as a customized desktop or
personalized application settings.
Visual Effects Desktop display features that look nice, but often degrade a computer’s performance.
5-62
Chapter 5
Configuring Windows XP Professional
Questions and Answers
Lesson 1 Review
Page
5-12
1. You can enable ________________________________ to restrict access to Display
options.
Group Policy settings
2. Which of the following items does the Desktop Items dialog box allow you to
choose to include or exclude an icon on your desktop? (Choose all that apply.)
a. My Documents
b. Control Panel
c. My Network Places
d. Recycle Bin
The correct answers are A and C. B is not correct because you cannot include the Control Panel
icon on your Desktop. D is not correct because you cannot remove the Recycle Bin icon from
your Desktop.
3. Windows XP Professional supports extension of your display across a maximum
of ______________ monitors.
10
4. You must use __________________________ or ______________________ video
adapters when configuring multiple displays.
PCI, AGP
5. If one of the display adapters is built into the motherboard, the motherboard
adapter always becomes the _____________ (primary/secondary) adapter.
Secondary
Lesson 2 Practice: Configuring Power Options
Page
5-19
13. If you do not see an APM tab on your computer, what are two reasons why it
might not be there?
The APM tab is not shown if your computer does not have an APM-capable BIOS. Also, if your
computer supports the newer ACPI standard, the APM tab is not shown because Windows XP
Professional automatically enabled APM support.
Lesson 2 Review
Page
5-19
1. What is a power scheme and why would you use one?
Power schemes allow you to configure Windows XP Professional to turn off the power to your
monitor and your hard disk to conserve energy.
Questions and Answers
5-63
2. Which of the following statements about Windows XP Professional power
schemes are true? (Choose all that apply.)
a. Windows XP Professional ships with six built-in power schemes.
b. Windows XP Professional allows you to create your own power schemes.
c. Windows XP Professional allows you to modify existing power schemes, but
you cannot create new ones.
d. Windows XP Professional does not ship with any built-in power schemes.
The correct answers are A and B. C is not correct because Windows XP Professional does allow
you to create new power schemes. D is not correct because Windows XP Professional comes
with several power schemes built in.
3. A(n) _____________________________ is a device that connects between a computer and a power source to ensure that the electrical flow to the computer is not
abruptly stopped because of a blackout.
UPS
4. What does hibernate mode do?
When your computer hibernates, it saves the current system state to your hard disk, and then
your computer shuts down. When you start the computer after it has been hibernating, it
returns to its previous state, restarts any programs that were running, and restores any active
network connections.
Lesson 3 Practice: Exercise 2
Page
5-37
11. What does typing the cmd command do?
Typing cmd in the Run dialog box opens the Command Prompt window.
Lesson 3 Review
Page
5-37
1. What performance options can you control with the tabs of the Performance
Options dialog box?
The Visual Effects tab of the Performance Options dialog box provides a number of options that
allow you to manually control the visual effects on your computer. The Advanced tab of the Performance Options dialog box allows you to adjust the application response, which is the priority
of foreground applications versus background applications, and virtual memory.
2. Which of the following statements about the use of virtual memory in Windows
XP Professional are correct? (Choose all that apply.)
a. When you install Windows XP Professional, Setup creates a virtual memory
paging file, PAGEFILE.SYS, on the partition where you installed Windows XP
Professional.
b. In some environments, you might find it advantageous to use multiple paging
files.
5-64
Chapter 5
Configuring Windows XP Professional
c. If the entire paging file is not in use, it can decrease below the initial size that
was set during installation.
d. Unused space in the paging file remains unavailable to all programs, even the
internal Windows XP Professional VMM.
The correct answers are A and B. C is not correct because the paging file size will never
decrease below the initial size. D is not correct because unused space in the paging file is
available to all programs.
3. When you first turn on the computer, the system displays a Please Select The
Operating System To Start screen, which lists the available operating systems.
What happens if a user does not select an operating system before the countdown
timer reaches zero?
If a user does not choose an operating system, the system starts the preselected operating
system when the countdown timer reaches zero.
4. Which requirements must be met for the Write Debugging Information recovery
option to work?
A paging file must be on the system partition (the partition that contains the %systemroot%
folder). You must have enough disk space to write the file to the location you specify. A small
memory dump requires a paging file of at least 2 MB on the boot volume. A kernel memory
dump requires 50 MB to 800 MB available in the paging file on the boot volume. A complete
memory dump requires a paging file on the boot volume large enough to hold all the RAM on
your computer plus 1 MB. With a small memory dump, a new dump file will be created every
time the system stops unexpectedly. For a complete memory dump or kernel memory dump, if
you want the new dump file to overwrite an existing file, select the Overwrite Any Existing File
check box.
Lesson 4 Review
Page
5-49
1. How can you configure Windows XP Professional to use multiple languages?
To configure multiple languages, in Control Panel, click Date, Time, Language, And Regional
Options. In the Date, Time, Language, And Regional Options window, click Regional And Language Options to open the Regional And Language Options dialog box. In the Languages tab of
the Regional And Languages Options dialog box, click Details. Windows XP Professional displays the Text Services And Input Languages dialog box. Click Add. Click the down-pointing
arrow at the end of the Input Language list box. Scroll through the list of languages and select
the ones you want to add. If you added at least one language to the one already installed on
your computer, your computer is now supporting multiple languages.
2. Which of the following features allows you to press a multiple key combination,
such as CTRL+ALT+DELETE, one key at a time. (Choose the correct answer.)
a. FilterKeys
b. StickyKeys
c. ToggleKeys
d. MultiKeys
Questions and Answers
5-65
The correct answer is B. A, C, and D are not correct because it is the StickyKeys feature that
allows you to press a multiple key combination one key at a time.
3. Turning on ________________________ causes the keyboard to ignore brief or
repeated keystrokes. This option also allows you to configure the keyboard repeat
rate, which is the rate at which a key continuously held down repeats the keystroke.
FilterKeys
4. When using MouseKeys, to speed up the mouse pointer movement, hold down
the ________ key while you press the numeric keypad directional keys. To slow
down the mouse pointer movement, hold down the ________ key while you press
the numeric keypad directional keys.
CTRL; SHIFT
Lesson 5 Review
Page
5-55
1. How do you add Windows components to your Windows XP Professional
installation?
In Control Panel, click Add Or Remove Programs. In the Add Or Remove Windows Programs window, click Add/Remove Windows Components to start the Windows Components Wizard. You
use the Windows Components Wizard to select the Windows components that you want to add
to or remove from your Windows XP Professional installation.
2. What service does IIS provide?
IIS allows you to publish information on the Internet or on your intranet. You place your files in
directories on your server, and IIS allows users to establish HTTP connections and view the
files with their Web browsers.
3. How many simultaneous client connections can you have by using IIS for Windows XP Professional?
a. 8
b. 10
c. 20
d. 32
The correct answer is B. Windows XP Professional allows up to 10 concurrent connections.
4. How do you administer IIS for Windows XP Professional?
You use the Internet Information Services snap-in to manage IIS and the content of and access
to your Web and FTP sites.
5-66
Chapter 5
Configuring Windows XP Professional
Case Scenario Exercise
Page
5-56
1. The software interface for the products uses the metric system instead of the U.S.
system of measurement. Olinda’s regional settings are configured to use the
English (United States) standard. How would you change the default system of
measurement on her computer from U.S. to metric?
You should keep the English (United States) setting, but customize the measurement system
to use the metric system.
2. Because Olinda is documenting how to run the software interface in Windows XP,
she needs to be able to use Windows XP in both English and French. How should
you configure this feature?
You should add the French input language to Olinda’s computer. To do this, use the Regional
And Language Options dialog box. On the Languages tab, click Details to show the languages
installed on Olinda’s computer. Click Add to add French to Olinda’s computer.
3. After adding French to Olinda’s computer, how can she switch between English
and French?
Olinda can switch between installed input languages by using the Language toolbar on the taskbar or by pressing left ALT+SHIFT—the default key combination for switching languages.
4. After working with the software interface for the company’s product, Olinda
reports that sometimes after she leaves her computer for a while, her monitor goes
blank. When she moves her mouse, she says the monitor comes back, but the program crashes. She wants to stop her monitor from going blank when she leaves it
unattended. What should you do?
You should configure Olinda’s current power scheme so that Windows does not attempt to turn
off the monitor after an idle period.
5. After working with the creators of the software interface, Olinda discovers that the
program does not respond well to certain visual effects. In particular, the programmers tell her that displaying shadows under the mouse pointer can cause problems with the program. Olinda wants to include instructions in her manual for
disabling this feature and has asked you to provide those instructions. What do
you tell her?
You should tell her to open the System Properties dialog box by right-clicking the My Computer
icon and clicking Properties. She should click the Advanced tab and, in the Performance section, click Settings. In the Performance Options dialog box that opens, Olinda should click Custom, and then clear the Show Shadows Under Mouse Pointer check box. She should then click
OK to close the Performance Options dialog box, and then click OK again to close the System
Properties dialog box.
Questions and Answers
5-67
Troubleshooting Lab
Page
5-58
1. What is happening to Marcel’s computer?
Marcel’s computer is experiencing a Stop error when it starts. However, the computer is restarting each time it encounters this error, causing an endless loop.
2. You can start Marcel’s computer successfully in safe mode. You want to see the
Stop error. What should you do?
You should use the Startup and Recovery dialog box to clear the Automatically Restart check
box in the System Failure section. This action will prevent Marcel’s computer from restarting
when it encounters the error, giving you time to see the actual error.
3. After researching the Stop error on Marcel’s computer, you have determined that
a damaged paging file is causing the stop error. You need to remove the paging
file from Marcel’s computer. How would you do this?
You should use the Virtual Memory dialog box (available via the Advanced tab in the Performance Options dialog box). In the Paging File Size For Selected Drive section, you should click
No Paging File, click Set, and then exit the dialog boxes that are open. You should then restart
the computer.
4. After removing the damaged paging file, you need to create a new paging file. You
want Windows to manage the paging file size. How would you do this?
You should open the Virtual Memory dialog box again. In the Paging File Size For Selected Drive
section, you should click System Managed Size, click Set, and then exit the dialog boxes that
are open. You should then restart the computer.
6 Installing, Managing, and
Troubleshooting Hardware
Devices and Drivers
Exam Objectives in this Chapter:
■ Implement, manage, and troubleshoot input and output (I/O) devices.
■
❑
Monitor, configure, and troubleshoot I/O devices, such as printers, scanners, multimedia devices, mouse, keyboard, and smart card reader.
❑
Monitor, configure, and troubleshoot multimedia hardware, such as
cameras.
❑
Install, configure, and manage Infrared Data Association (IrDA) devices.
❑
Install, configure, and manage universal serial bus (USB) devices.
❑
Install, configure, and manage handheld devices.
Manage and troubleshoot drivers and driver signing.
Why This Chapter Matters
Microsoft Windows XP Professional provides features that make installing, configuring, and managing hardware devices easier than ever. The Plug and Play specification, taken advantage of by most modern hardware, makes installation and
configuration of devices nearly automatic. Device Manager provides a single
interface for configuring and troubleshooting hardware devices on a computer.
This chapter introduces the installation, configuration, and troubleshooting of
hardware devices in Windows XP Professional. It also teaches how to configure
hardware profiles and work with hardware drivers.
Lessons in this Chapter:
■
Lesson 1: Installing a Hardware Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-2
■
Lesson 2: Configuring and Troubleshooting Hardware Devices . . . . . . . . . . .6-11
■
Lesson 3: Viewing and Configuring Hardware Profiles . . . . . . . . . . . . . . . . .6-27
■
Lesson 4: Configuring and Troubleshooting Device Drivers . . . . . . . . . . . . .6-32
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have Windows XP Professional installed on the computer.
6-1
6-2
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
Lesson 1: Installing a Hardware Device
Windows XP Professional supports both Plug and Play and non–Plug and Play hardware. This lesson introduces you to the automatic hardware-installation features of
Windows XP Professional. Occasionally, Windows XP Professional fails to automatically detect a hardware device. When this occurs, you must install the hardware device
manually. You might also have to do this if the device requires a specific hardware
resource to ensure that it is installed properly.
After this lesson, you will be able to
■ Install a hardware device automatically.
■ Install a hardware device manually.
Estimated lesson time: 30 minutes
How to Install Hardware Automatically
Windows XP Professional supports Plug and Play hardware. For most devices that are
Plug and Play–compliant, as long as the appropriate driver is available and the basic
input/output system (BIOS) on the computer is Plug and Play–compatible or supports
Advanced Configuration and Power Interface (ACPI), Windows XP Professional automatically detects, installs, and configures the device. When Windows XP Professional
detects a new piece of hardware for which it does not have a hardware driver, it displays the Found New Hardware Wizard, shown in Figure 6-1.
F06us01
Figure 6-1 Use the Found New Hardware Wizard to configure devices for which Windows does not
have a hardware driver.
Lesson 1
!
Installing a Hardware Device
6-3
Exam Tip
Windows XP Professional automatically detects, installs, and configures most
Plug and Play and some non–Plug and Play hardware. If Windows does not detect Plug and
Play hardware, you can often force the detection by restarting the computer or running the
Add Hardware Wizard. For many non–Plug and Play devices, you must use the Add Hardware
Wizard to manually configure the device.
To Use the Add Hardware Wizard
Occasionally, Windows does not detect a new Plug and Play hardware device automatically, so you might need to initiate the installation process by using the Add Hardware
Wizard. You can also use the Add Hardware Wizard to initiate automatic hardware
installation for undetected hardware devices (both Plug and Play and non–Plug and
Play) and to troubleshoot devices.
To use the Add Hardware Wizard to have Windows automatically detect and install
Plug and Play hardware, complete the following steps:
1. From the Start menu, select Control Panel.
2. In the Control Panel window, click Printers And Other Hardware.
3. In the Printers And Other Hardware window, in the See Also section, click Add
Hardware.
4. On the Welcome To The Add Hardware Wizard page, click Next.
5. Windows XP Professional searches for new devices and one of the following three
events occurs:
❑
If Windows XP Professional detects any new Plug and Play hardware for
which it has a hardware driver built in, Windows installs the new hardware.
❑
If Windows XP Professional detects new hardware for which it does not have
a hardware driver, Windows starts the Found New Hardware Wizard.
❑
If the wizard cannot find a new device, it displays the Is The Hardware Connected page. If you have already connected the new device, click Yes, I Have
Already Connected The Hardware, and then click Next. The wizard displays
the The Following Hardware Is Already Installed On Your Computer page, as
shown in Figure 6-2. To add hardware that is not in the list, click Add A New
Hardware Device.
6-4
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
F06us02
Figure 6-2 Add hardware or troubleshoot with the Add Hardware Wizard.
Note
To use the Add Hardware Wizard to troubleshoot a hardware device, click the device in
the list of installed hardware devices and click Next. The Completing The Add Hardware Wizard page appears. Click Finish to launch a troubleshooter to help resolve any problems you
might be having with that hardware device.
To Confirm Hardware Installation
After installing hardware, you should confirm the installation by using Device Manager.
To start Device Manager, follow these steps:
1. From the Start menu, select Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click System.
4. In the System Properties dialog box, on the Hardware tab, click Device Manager.
Device Manager allows you to view the hardware installed on a computer, as
shown in Figure 6-3.
Lesson 1
Installing a Hardware Device
6-5
F06us03
Figure 6-3 Device Manager shows devices listed by type.
Windows XP Professional uses icons in the Device Manager window to identify each
installed hardware device. If Windows XP Professional does not have an icon for the
device type (usually because the hardware device is unidentified), Device Manager displays a question mark as the icon for the device.
Expand the device tree to locate the newly installed hardware device. The device icon
indicates whether the hardware device is operating properly. You can use the information in Table 6-1 to determine the hardware status.
Table 6-1
Device Manager Hardware Status
Icon
Hardware Status
Normal icon
Hardware is operating properly.
Stop sign on icon
Windows XP Professional disabled the hardware device because of
hardware conflicts.
Exclamation point on icon The hardware device is incorrectly configured or its drivers are
missing.
Red “x” on icon
The hardware device is disabled in the current hardware profile.
How to Install Hardware Manually
Most non–Plug and Play hardware requires manual installation. Although it is rare
these days to find computers running Windows XP Professional that still use non–Plug
and Play hardware, it does happen on occasion, so you should understand how to
install and configure hardware manually. To manually install hardware, first determine
6-6
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
which hardware resource is required by the hardware device. Next, you must determine the available hardware resources. In some cases, you have to change hardware
resources. Finally, you might have to troubleshoot any problems you encounter.
Hardware Device Communication Resources
With older, non–Plug and Play devices, you often must configure the device itself to
specify which hardware resources the device will use. This configuration mostly happens by changing jumpers or switches on the device, but sometimes happens through
a software interface. Again, it is extremely rare that you will encounter a device made
within the last few years that you will have to configure manually, but it is still handy
information to have.
When installing new hardware, you need to know which resources the hardware can
use. You can reference the product documentation to determine the resources that a
hardware device requires. Table 6-2 describes the resources that hardware devices use
to communicate with an operating system.
Table 6-2
Hardware Device Resources
Resource
Description
Interrupt
Hardware devices use interrupts to send messages. The microprocessor
knows this as an interrupt request (IRQ). The microprocessor uses this
information to determine which device needs its attention and the type of
attention that it needs. There are 16 IRQs (numbered 0 to 15) that Windows
XP assigns to devices. For example, Windows XP Professional assigns IRQ
1 to the keyboard.
Input/output (I/O) I/O ports are a section of memory that a hardware device uses to commuport
nicate with the operating system. When a microprocessor receives an IRQ,
the operating system checks the I/O port address to retrieve additional
information about what the hardware device wants it to do. An I/O port is
represented as a hexadecimal number.
Direct memory
access (DMA)
DMAs are channels that allow a hardware device, such as a floppy disk
drive, to access memory directly, without interrupting the microprocessor.
DMA channels speed up access to memory. Windows XP Professional
assigns eight DMA channels, numbered 0 through 7.
Memory
Many hardware devices, such as a network interface card (NIC), use
onboard memory or reserve system memory. This reserved memory is
unavailable for use by other devices or Windows XP Professional.
Lesson 1
Installing a Hardware Device
6-7
To Determine Available Hardware Resources
After you determine which resources a hardware device requires, you can look for an
available resource. Device Manager provides a list of all hardware resources and their
availability, as shown in Figure 6-4.
F06us04
Figure 6-4
Device Manager can also list resources by connection type.
To view the hardware resource lists in Device Manager, follow these steps:
1. In Device Manager, click the View menu, and then click Resources By Connection.
2. The Device Manager displays the resources that are currently in use (for example,
IRQs). To view a list of resources for another type of hardware resource, on the
View menu, click the type of hardware resource you want to see.
After you know which hardware resources are available, you can configure the device
to use those resources and then install the hardware manually with the Add Hardware
Wizard.
Note If you select a hardware resource during manual installation, you might need to configure the hardware device so that it can use the resource. For example, for a network adapter
to use IRQ 5, you might have to set a jumper on the adapter and configure Windows XP Professional so that it recognizes that the adapter now uses IRQ 5.
6-8
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
To Change Hardware Resource Assignments
In some circumstances, you might need to change the resource assignments for a
device. For example, a hardware device might require a specific resource presently in
use by another device. You might also encounter two hardware devices requesting the
same hardware resource, resulting in a conflict.
To change a resource setting, in Device Manager, open the device’s Properties dialog
box and switch to the Resources tab.
When you change a hardware resource, print the content of Device Manager, which
provides you with a record of the hardware configuration. If you encounter problems,
you can use the printout to verify the hardware resource assignments.
From this point, follow the same procedures that you used to choose a hardware
resource during a manual installation.
Note
Changing the resource assignments for non–Plug and Play devices in Device Manager
does not change the resources used by that device. You use Device Manager only to instruct
the operating system on device configuration. To change the resources used by a non–Plug
and Play device, consult the device documentation to see whether switches or jumpers must
be configured on the device.
Practice: Running the Add Hardware Wizard
In this practice, you will manually install the software for a printer that is not actually
connected to your computer. Complete the following steps.
Important
This practice assumes that you do not already have a hardware device connected to a parallel port named LPT2 on your computer. Do not worry if you do not have an
LPT2 port; the exercise will work anyway.
1. From the Start menu, click Control Panel.
2. In the Control Panel window, click Printers And Other Hardware.
3. In the Printers And Other Hardware window, in the See Also section, click Add
Hardware.
4. On the Welcome To The Add Hardware Wizard page of the Add Hardware Wizard, click Next.
5. The Add Hardware Wizard searches for any new Plug and Play devices, and then
displays the Is The Hardware Connected page. Click Yes, I Have Already Connected The Hardware, and then click Next.
Lesson 1
Installing a Hardware Device
6-9
6. In the list of installed hardware, scroll to the bottom and click Add A New Hardware Device. Click Next.
7. Click Install The Hardware That I Manually Select From A List (Advanced), and
then click Next.
8. In the list of common hardware types, click Printers and then click Next.
9. On the Select A Printer Port page, in the Use The Following Port drop-down list,
click LPT2: (Printer Port), and then click Next.
10. On the Install Printer Software page, in the Manufacturer list, click Royal. In the
Printers list, select Royal CJP 450. Click Next.
11. On the Name Your Printer page, click Next.
12. On the Print Test Page page, select No and then click Next.
13. If you are using Windows XP Professional and you have Simple File Sharing disabled, you next will see a page asking whether you want to share the new printer.
Select Do Not Share This Printer, and then click Next.
14. Click Finish to exit the Add Hardware Wizard.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. When you initiate automatic hardware installation by starting the Add Hardware
Wizard, what does Windows XP Professional query the hardware about?
2. _______________________ are channels that allow a hardware device, such as a
floppy disk drive, to access memory directly (without interrupting the microprocessor). Fill in the blank.
3. Why would you install a hardware device manually?
Lesson Summary
■
For most Plug and Play hardware, you connect the device to the computer, and
Windows XP Professional automatically configures the new settings. For non–Plug
and Play hardware, Windows XP Professional often identifies the hardware and
6-10
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
automatically installs and configures it. For the occasional Plug and Play hardware
device and for any non–Plug and Play hardware that Windows XP Professional
does not identify, install, and configure, you initiate automatic hardware installation with the Add Hardware Wizard.
■
When you manually install hardware, you must determine any resources required
by that hardware device. Hardware resources include interrupts, I/O ports, and
memory. The Device Manager snap-in provides a list of all hardware resources
and their availability.
Lesson 2
Configuring and Troubleshooting Hardware Devices
6-11
Lesson 2: Configuring and Troubleshooting Hardware
Devices
Device Manager is one of the tools you use to manage and troubleshoot devices—you
learn how to use it and how it helps you manage your computer. You also learn to
install and configure fax support in Windows XP Professional, as well as how to manage various I/O devices.
After this lesson, you will be able to
■ Configure and troubleshoot devices by using Device Manager.
■ Install, configure, and troubleshoot fax support.
■ Manage and troubleshoot I/O devices.
Estimated lesson time: 40 minutes
How to Configure and Troubleshoot Devices Using Device Manager
Device Manager provides you with a graphical view of the hardware installed on your
computer and helps you manage and troubleshoot hardware devices. You can use
Device Manager to configure, disable, and uninstall devices as well as to update device
drivers. Device Manager also helps you determine whether the hardware on your computer is working properly.
Tip
Windows XP Professional also provides the Hardware Troubleshooter to troubleshoot
hardware problems. It should appear automatically if you have problems. To start it manually,
on the Start menu, click Help And Support. In the Help And Support Center, under Pick A Help
Topic, click Hardware. In the Hardware list, click Fixing A Hardware Problem. Under Fixing A
Hardware Problem, click Hardware Troubleshooter. The Hardware Troubleshooter walks you
through the troubleshooting process.
When you change device configurations manually, Device Manager can help you avoid
problems by allowing you to identify free resources, assign devices to those resources,
disable devices to free resources, and reallocate resources used by devices to free a
required resource. You must be logged on as a member of the Administrators group to
change resource settings. Even if you are logged on as Administrator, if your computer
is connected to a network, policy settings on the network might prevent you from
changing resources.
6-12
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
Caution Improperly changing resource settings on devices can disable your hardware and
cause your computer to stop working.
Windows XP Professional automatically identifies Plug and Play devices and arbitrates
their resource requests. However, the resource allocation among Plug and Play devices
is not permanent. If another Plug and Play device requests a resource that has already
been allocated, Windows XP Professional again arbitrates the requests to satisfy all the
devices.
You should not change resource settings for a Plug and Play device manually because
Windows XP Professional is then unable to arbitrate the assigned resources if
requested by another Plug and Play device. In Device Manager, Plug and Play devices
have a Resources tab in their Properties dialog box. To free the resource settings you
manually assigned and to allow Windows XP Professional to again arbitrate the
resources, select the Use Automatic Settings check box in the Resources tab.
You can use the following procedure to configure or troubleshoot a device using
Device Manager:
1. From the Start menu, right-click My Computer, and then click Manage. The Computer Management window opens, as shown in Figure 6-5.
F06us05
Figure 6-5 You can access Device Manager through the Computer Management window.
2. Expand the System Tools node, and then click Device Manager.
3. In the right pane, expand the device category (Network adapters, for example),
and then double-click the device you want to configure. The Properties dialog box
for the device appears, as shown in Figure 6-6.
Lesson 2
Configuring and Troubleshooting Hardware Devices
6-13
F06us06
Figure 6-6 Use the Properties dialog box to configure the device.
Although the tabs available in a device’s Properties dialog box vary depending on the
device, they usually include some of the tabs listed in Table 6-3.
Table 6-3
A Device’s Properties Dialog Box Tabs
Tab
Functionality
Advanced or
Advanced Properties
The properties listed vary depending on the device selected.
General
Displays the device type, manufacturer, and location. It also displays
the device status and provides a troubleshooter to help you troubleshoot any problems you are having with the device. The troubleshooter steps you through a series of questions to determine the
problem and provide a solution.
Device Properties
The properties listed vary depending on the device selected.
Driver
Displays the driver provider, driver date, driver version, and digital
signer. This tab also provides the following three additional buttons:
Driver Details, Uninstall, and Driver Update. These buttons allow you
to get additional information on the driver, uninstall the driver, or
update the driver with a newer version, respectively.
Port Settings
In a communications port (COM1) Properties dialog box, displays and
allows you to configure settings for bits per second, data bits, parity,
stop bits, and flow control.
Properties
Determines the way Windows uses the device. For example, on the
CD-ROM, the properties could include volume and a feature named
Digital CD Playback, which allows you to to enable digital instead of
analog playback. These settings determine how Windows uses the CDROM for playing CD music.
Resources
Displays the resource type and setting, whether there are any resource
conflicts, and whether or not you can change the resource settings.
6-14
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
Viewing Hidden Devices
By default, Device Manager does not display all devices. Some devices are hidden, such as non–Plug and Play devices and devices that are not currently connected to the computer (phantom devices). To view any hidden non–Plug and
Play devices, on the Device Manager View menu, click Show Hidden Devices.
To view phantom devices, follow these steps:
1. Click Start and then click Run. In the Open text box, type cmd and click OK.
2. At the command prompt, type set DEVMGR_SHOW_NONPRESENT_
DEVICES=1.
3. Press ENTER.
4. Start Device Manager by typing start devmgmt.msc and pressing ENTER.
To set Device Manager to always show phantom devices, add the following system environment variable: set DEVMGR_SHOW_NONPRESENT_DEVICES=1.
For information on adding system environment variables, see Chapter 5, “Configuring Windows XP Professional.”
How to Install, Configure, Manage, and Troubleshoot Fax Support
Windows XP Professional can provide complete fax facilities from your computer. It
provides you with the capability to send and receive faxes with a locally attached fax
device, or with a remote fax device connected on your network. You can track and
monitor fax activity as well. However, the Fax component of Windows XP Professional
is not installed by default, so you must install it.
You can use the following procedure to install the Fax component:
1. From the Start menu, click Control Panel.
2. In the Control Panel window, click Add Or Remove Programs.
3. In the Add Or Remove Programs window, click Add/Remove Windows Components.
4. In the Windows Components Wizard, select Fax Services, and then click Next.
The Configuring Components page appears while the Windows Components
Wizard examines the components, copies the necessary files, and configures
the Fax Service.
5. On the Completing The Windows Components Wizard page, click Finish.
Lesson 2
Configuring and Troubleshooting Hardware Devices
6-15
6. Close the Add Or Remove Programs window.
7. In the Control Panel window, click Printers And Other Hardware.
8. In the Printers And Other Hardware window, click Printers And Faxes. Notice that
a new printer named Fax has been added.
Note
If there is no Fax icon, click Install A Local Fax Printer to add one.
After installing the Fax Service, a new icon named Fax appears in the Control Panel
window. You can use this tool to add, monitor, and troubleshoot fax devices, including
fax modems and fax printers.
You can use the following procedure to configure how Windows sends and receives
faxes:
1. From the Start menu, select Printers And Faxes.
2. In the Printers And Faxes window, double-click the Fax icon.
3. On the Welcome To The Fax Configuration Wizard page, click Next.
4. On the Sender Information page, enter information in the following text boxes:
Your Full Name, Fax Number, E-Mail Address, Title, Company, Office Location,
Department, Home Phone, Work Phone, Address, and Billing Code. When you are
done, click Next.
5. On the Completing The Fax Configuration Wizard page, click Finish. Windows XP
Professional displays the Fax Console.
Tip
To configure a fax, click Configure Fax on the Tools menu of the Fax Console. To open
the Fax Console, click Start, point to All Programs, point to Accessories, point to Communications, point to Fax, and then click Fax Console.
To Manage and Troubleshoot Fax Support
Windows XP Professional provides the Fax Console to help you manage and troubleshoot faxes.
To manage and troubleshoot faxes, complete the following steps:
1. From the Start menu, point to All Programs, point to Accessories, point to Communications, point to Fax, and then click Fax Console.
2. Windows XP Professional displays the Fax Console, as shown in Figure 6-7.
6-16
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
F06us07
Figure 6-7 Use the Fax Console to manage and troubleshoot faxes.
The Outbox contains all faxes waiting to be sent or in the process of being sent,
whether the faxes were sent using a locally attached fax device or a network fax
device. You can right-click any fax shown, and then press DELETE or click Delete on the
File menu to delete the fax. When you right-click a fax, you can also click Pause to prevent it from being sent or click Resume to place a fax that you paused back in the
queue to be sent. If a fax fails, you can right-click the fax and click Restart to attempt
to resend the fax. Finally, when you right-click a fax, you can click Save As to save a
copy of the fax, Mail To to mail a copy of the fax to someone, or Print to print a copy
of the fax.
The Incoming box allows you to manage incoming faxes in the same manner that the
Outgoing box helps you manage outgoing faxes. You can click the Incoming box, and
then right-click a fax to delete, pause, resume, save, mail to someone, and print the fax.
You can also click Properties to view the properties of an incoming fax.
Table 6-4 discusses some common troubleshooting scenarios for faxes.
Table 6-4
Common Fax Troubleshooting Scenarios
Problem
Cause
Solution
When I click the Print
button on my application’s toolbar, my fax
does not print to a fax
printer.
The print button on the toolbar
of some Windows applications
does not use the Print dialog
box, causing your document to
be printed on the last printer
used.
On the File menu of your Windows application, click Print to
access the Print dialog box so
that you can select your fax
printer.
Lesson 2
Table 6-4
Configuring and Troubleshooting Hardware Devices
6-17
Common Fax Troubleshooting Scenarios
Problem
Cause
Solution
A fax I sent is pending
in the Outbox.
There is a problem with the
local fax device.
Either there is no local fax
device configured to send
faxes or there is a problem
with the local fax device. Verify
that there is a local fax device
and that it is configured for
sending faxes. On the Tools
menu of the Fax Console, click
Fax Printer Status.
The remote fax device is
busy.
On the Tools menu of the Fax
Console, click Fax Printer Status.
Someone sent me a
fax, and my incoming
fax device is not
detecting the call.
There is a problem with your
local fax device.
Verify that your local fax device
is configured to receive faxes. If
you have an external modem,
turn it off and on. If you have
an internal modem, shut down
your computer and restart it.
I am using dialing rules
with calling cards, but
the calling card
information is not
working.
Calling card information is
defined on a per-user basis.
Ensure that the Fax Service is
running by using the same
user account as the calling
card information.
Right-click My Computer, click
Manage, and then click Services And Applications. In the
Services list, double-click Fax.
Click Log On. Set the Fax Service to run under the calling
card user account.
To Send a Fax
Windows XP Professional makes it simple for you to use your computer to send faxes.
You can use the following procedure to send a fax:
1. From the Start menu, point to All Programs, point to Accessories, point to Communications, point to Fax, and then click Send A Fax.
2. On the Welcome To The Send Fax Wizard page (which indicates that if you want
to fax a document, you create or open the document in a Windows-based application and print it to a fax printer), click Next.
3. On the Recipient Information page, enter the name and number of the person to
whom you want to send a fax, and then click Next.
Tip
To send the fax to multiple recipients, enter the first person’s name and phone number,
and then click Add. Enter the information for each recipient and click Add until all recipients
have been entered.
6-18
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
4. On the Preparing The Cover Page page, select a cover page template. You can also
enter a subject line, a note, and sender information. Click Next.
Note
Either the Subject Line or Note text boxes must be filled in to proceed.
5. On the Schedule page, choose when to send the fax (Now, When Discount Rates
Apply, or A Specific Time In The Next 24 Hours). You can also specify a priority
of High, Normal, or Low. Click Next.
6. On the Completing The Send Fax Wizard page, review the information. If the
information is correct, click Finish to send the fax.
How to Manage and Troubleshoot the Most Common I/O Devices
The list of possible devices that you can install is too long to include here. Instead, the
following sections include some of the most common devices and how they are
installed, configured, and managed.
Scanners and Cameras
Most digital cameras, scanners, and other imaging devices are Plug and Play devices,
and Windows XP Professional installs them automatically when you connect them to
your computer. If your imaging device is not installed automatically when you connect
it, or if it does not support Plug and Play, use the Scanner And Camera Installation Wizard. To open this wizard, in Control Panel, click Printers And Other Hardware, and
then click Scanners And Cameras. In the Scanners And Cameras window, double-click
Add An Imaging Device to start the Scanners And Camera Installation Wizard. Click
Next and follow the onscreen instructions to install your digital camera, scanner, or
other imaging device.
In Device Manager, select the appropriate device, and then click Properties. The standard color profile for Integrated Color Management (ICM 2.0) is RGB, but you can add,
remove, or select an alternate color profile for a device. To change the color profile,
click the Color Management tab on the device’s Properties dialog box. If you are having problems with your scanner or camera, click Troubleshoot in the Scanners And
Cameras Properties dialog box.
You use the Scanners And Cameras tool in Control Panel to manage imaging devices.
Configuration options vary depending on the device that is connected, but at a minimum you can test the device to verify that it is functioning, set the rate at which data
is transferred from the camera or scanner to the computer, and control color profiles.
It is important to not set the data transfer rate higher than what the device supports. If
the transfer rate is set too high, image transfer might fail.
Lesson 2
Configuring and Troubleshooting Hardware Devices
6-19
Mouse Devices
Mouse devices are generally Plug and Play, and Windows generally recognizes mouse
devices when they are connected to the computer or, at the least, when Windows starts
up. In some cases, though, you must install a mouse using the Add Hardware Wizard.
Mouse devices connect to computers through a mouse (PS/2) port, serial port, or USB
port. Wireless mouse devices are also available, although they usually communicate
with a receiver that connects to the computer using a USB port.
Click the Mouse icon in the Printers And Other Hardware window of Control Panel to
configure and troubleshoot your mouse. The Buttons tab (see Figure 6-8) allows you to
configure your mouse for a left-handed or right-handed user. It also allows you to set
a single mouse click as select or open and to control the double-click speed.
F06us08
Figure 6-8
Configure button properties using the Buttons tab of the Mouse Properties dialog box.
The Pointers tab allows you to select or create a custom scheme for your pointer. The
Pointer Options tab allows you to adjust the speed and acceleration of your pointer
and to set the Snap To Default option, which moves the pointer automatically to the
default button in dialog boxes.
The Hardware tab allows you to access the troubleshooter if you are having problems
with your mouse. The Hardware tab also has a Properties button that allows you to do
an advanced configuration for your mouse. This includes uninstalling or updating your
driver, viewing or changing the resources allocated to your mouse, and increasing or
decreasing the sensitivity of your mouse by varying the sample rate, which changes
how often Windows XP Professional determines the position of your mouse.
Keyboards
Like mouse devices, keyboards are generally Plug and Play devices. Keyboards are
usually connected to the computer through a (PS/2) keyboard port or a USB port.
6-20
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
Wireless keyboards are also available, although (like wireless mouse devices) they typically communicate with a receiver that connects to the computer using a USB port.
Click Keyboard in the Printers And Other Hardware window of Control Panel to configure or troubleshoot a keyboard. In the Speed tab, you can configure the character
repeat delay and the character repeat rate. You can also control the cursor blink rate.
The Hardware tab shows you the device properties for the installed keyboard and
allows you to access the troubleshooter if you are having problems with your keyboard. You can also install a device driver, roll back to a previous device driver, or
uninstall a device driver.
USB Devices
Universal serial bus (USB) is a type of connection developed to provide a fast, flexible
method of attaching up to 127 peripheral devices to a computer. USB provides a connection format designed to replace the computer’s traditional serial-port and parallelport connections. The term “universal” indicates that many kinds of devices can take
advantage of USB. USB is fully Plug and Play–compliant.
The USB system comprises a single USB host and USB devices. The host is at the top
of the USB hierarchy. In a Windows XP environment, the operating system and the
hardware work together to form the USB host. Devices include hubs, which are connection points for other USB devices and nodes. Nodes are end devices such as printers, scanners, mouse devices, keyboards, and so on. Some nodes also function as hubs,
allowing additional USB devices to be connected to them.
You can connect USB peripherals together by using connection hubs that allow the bus
to branch out through additional port connections. In this example, some of the
peripheral devices are simply devices, whereas others serve as both devices and connection hubs. The computer provides a USB host connection that serves as the main
USB connection.
A special hub, called the root hub, is an integral part of the host system (typically built
into the motherboard), and provides one or more attachment points for USB devices
(the ports available on the computer). The built-in USB ports on computers function as
the root hub. USB provides for a total of up to five levels of devices. The root hub is
at the first level. Regular hubs can form up to three additional levels, and nodes can
function as the last level.
You can add or remove most USB devices from a computer while the computer is
turned on. This practice is often referred to as hot-plugging the device. Plug and Play
detects the presence (or absence) of the device and configures it for operation.
The USB interface provides power to the peripheral that is attached to it. The root hub
provides power from the host computer to directly connected devices. Hubs also supply
power to connected devices. Even if the interface supplies power to the USB devices, USB
Lesson 2
Configuring and Troubleshooting Hardware Devices
6-21
devices also can have their own power sources, if necessary. Many devices, such as digital
cameras and scanners, draw more power than a USB hub can provide.
!
Exam Tip Some USB hubs are self-powered, and some are not. Hubs that are not self-powered draw power from the hub to which they are connected or from the computer itself. If you
find that a USB device that is connected to an unpowered USB hub is not working as
expected, try replacing the unpowered USB hub with a self-powered hub.
Because you can add nearly any type of peripheral device to the PC through the USB
port, the range of symptoms that are associated with USB devices include all the symptoms that are listed for peripheral devices in this chapter. Problems that are associated
specifically with the USB technology occur in the following general areas:
■
USB hardware device
■
USB controller
■
USB drivers
The first step in troubleshooting USB problems is to check the BIOS setup to make sure
that the USB function is enabled for the computer. Table 6-5 describes basic USB troubleshooting procedures.
Table 6-5
Basic USB Troubleshooting
If This Happens
Do This
USB functionality is enabled
in the BIOS.
Check Device Manager to make sure that the USB controller
appears there. In Windows XP, the USB controller should be
listed under the Universal Serial Bus Controllers entry (using
the default Devices By Type view in Device Manager).
The controller does not
Contact the BIOS manufacturer for an updated copy of the
appear in Device Manager,
BIOS because the computer’s BIOS might be outdated.
or a yellow warning icon
appears next to the controller.
The controller is present in
Device Manager.
Right-click the USB controller, and then select Properties. If
there are any problems, a message should appear in the Device
Status section on the General tab of the controller’s Properties
dialog box.
The BIOS and controller
settings appear to be correct.
Check the USB port drivers next. USB ports are listed in Device
Manager as USB Root Hubs. Right-click a USB Root Hub entry,
and then select Properties. Use the Driver tab of the USB Root
Hub Properties dialog box to update or roll back drivers, if
necessary.
6-22
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
When troubleshooting USB devices, you must be aware that the problem could be a
result of general USB issues or be a problem with the device itself. Usually, but not
always, general USB issues affect more than one device. If you suspect a problem with
a specific device, uninstall the device by using Device Manager, disconnect the device
from the computer, and then restart the computer. After the computer restarts, reconnect the device and let Plug and Play detect, install, and configure it again. If the device
still does not function correctly, investigate the possibility that the device is damaged in
some way or that you need to obtain updated drivers from Microsoft or the device
manufacturer.
Smart Card Readers
Smart cards are small, credit card–sized devices that are used to store information.
Smart cards are generally used to store authentication credentials, such as public and
private keys, and other forms of personal information. They are highly portable, allowing users to easily carry their credentials and other personal information with them.
A computer must have a smart card reader to access a smart card. The reader is generally a PS/2, USB, or PC Card device, although some computers have smart card readers
built in. Windows XP supports Plug and Play smart card readers that follow the Personal Computer/Smart Card (PC/SC) standards. A manufacturer might provide a device
driver for its legacy smart card device, but Microsoft recommends using only Plug and
Play smart card readers.
In addition to installing drivers for a smart card reader, you must enable the Smart Card
service for Windows XP Professional to read smart cards. After you have installed and
configured the smart card reader, make sure that the Smart Card service is started by
using the Services snap-in in Computer Management.
Modems
Analog modems connect a computer to a remote device through the Public Switched
Telephone Network (PSTN). Modems are often used to connect to the Internet through
an Internet service provider (ISP) or to connect to a remote private network, such as a
corporate network.
A modem can be either an internal or an external device. Internal modems connect to
one of the computer’s internal expansion slots. External modems connect to one of the
computer’s serial or USB ports.
You can manage modems through the Phone And Modem Options tool in Control Panel
and through Device Manager. In Control Panel, select Printers And Other Hardware;
then select Phone And Modem Options. In the Phone and Modem Options dialog box,
on the Modems tab, double-click a modem to open a modem’s Properties dialog box.
The Properties dialog box allows you to control speaker volume for the modem or to
Lesson 2
Configuring and Troubleshooting Hardware Devices
6-23
disable modem sound entirely. This is actually a common request from users who do
not like hearing the modem sounds every time they connect to the Internet.
The Maximum Port Speed list controls how quickly communications programs are permitted to send information to the modem. This is not the same as the modem’s connection speed, which is negotiated when the modem dials out and establishes a
connection. The maximum port speed is generally configured during installation and
does not need to be reconfigured to match the modem’s connection speed.
The Wait For Dial Tone Before Dialing check box is enabled by default. The telephone
systems of some countries do not use a dial tone, in which case this option must be disabled or else the modem will never dial.
The Diagnostics tab of the modem’s Properties dialog box lets you query the modem
to see whether it can respond to standard modem commands. When you are troubleshooting, this is a useful way to determine whether the modem is initializing and functioning correctly.
During installation, Windows XP often installs a standard modem driver rather than the
specific driver for the modem. This happens in cases where Windows cannot find a
device-specific driver. The standard modem driver provides basic functionality, but
does not support advanced modem features. You can use this driver temporarily until
you obtain the appropriate driver from the manufacturer.
Game Controllers
Click Game Controllers in the Printers And Other Hardware window of Control Panel
to install, configure, or troubleshoot your game controller. Attach the game controller
to the computer (for example, if it is USB game controller, attach it to a USB port). If it
does not install properly, in Device Manager, look under Human Interface Devices. If
the controller is not listed, then check to make sure that USB is enabled in the BIOS.
When prompted during system startup, access BIOS setup and enable USB. If USB is
enabled in BIOS, contact the maker or vendor for your computer and obtain the current version of BIOS.
To configure the controller, select a device, and then click Properties. To troubleshoot
a device, select it, and then click Troubleshoot.
IrDA and Wireless Devices
Most internal Infrared Data Association (IrDA) devices should be installed by Windows
XP Professional Setup or when you start Windows XP Professional after adding one of
these devices. If you attach an IrDA transceiver to a serial port, you must install it using
the Add Hardware Wizard. In Control Panel, click Printers And Other Hardware, and
then click Add Hardware to start the Add Hardware Wizard. Click Next to close the
6-24
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
Welcome To The Add Hardware Wizard page. Select Yes, I Have Already Connected
The Hardware, and then click Next. Select Add A New Hardware Device and then click
Next, and follow the directions onscreen.
To configure an IrDA device, in Control Panel click Wireless Link. In the Hardware tab,
click the device you want to configure, and then click Properties. The Properties dialog
box shows the status of the device, driver files, and any power management settings.
Note The Wireless Link icon appears in Control Panel only if you have already installed an
infrared device on your computer.
Handheld Devices
Most handheld devices support either IrDA standards or connect to the computer
through a serial or USB port. For handheld devices that use a port, some connect directly
to the port, and some connect to a cradle, which in turn is connected to the port.
You will need to install software so that Windows XP can communicate correctly with
the handheld device. For example, Palm-based personal digital assistants (PDAs)
require you to install the Palm desktop software to allow the PDA to transfer data to
and from a Windows-based PC. Handheld devices running Windows Mobile software,
such as the Pocket PC, require that you install a program named ActiveSync on the
computer.
See Also
For more information about supporting handheld devices running Windows
Mobile software, visit the Windows Mobile page of the Microsoft Web site at http://
www.microsoft.com/windowsmobile/.
Practice: Disabling and Re-enabling a Hardware Device
In this practice, you use Device Manager to disable and re-enable a hardware device.
Complete the following steps.
1. From the Start menu, click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click System.
4. In the System Properties dialog box, on the Hardware tab, click the Device Manager button.
Lesson 2
Configuring and Troubleshooting Hardware Devices
6-25
5. In the Device manager window, expand the Ports (COM & LPT) category, rightclick the parallel port—almost always named Printer Port (LPT1)—and click
Properties.
6. In the Printer Port (LPT1) Properties dialog box, on the General tab, in the Device
Usage drop-down list, select Do Not Use This Device (Disable). Click OK.
7. In the Device Manager window, note that the icon for Printer Port (LPT1) has a red
“x” on it, indicating that the device is disabled. Right-click the Printer Port (LPT1)
and click Properties.
8. In the Printer Port (LPT1) Properties dialog box, on the General tab, in the Device
Usage drop-down list, select Use This Device (Enable). Click OK.
9. Close all open windows.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Windows XP Professional automatically identifies Plug and Play devices and arbitrates their resource requests; the resource allocation among these devices is
___________________________ (permanent/not permanent).
2. How can you free any resource settings that you manually assigned to a Plug and
Play device?
3. You get a call on the help desk from a user wondering why there is no Wireless
Link icon in Control Panel on her desktop computer like the one on her laptop
computer. What should you tell the user?
6-26
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
Lesson Summary
■
Device Manager provides you with a graphical view of the hardware installed on
your computer and helps you manage and troubleshoot it. Device Manager flags
each device with an icon that indicates the device type and the status of the
device. By default, Device Manager does not display non–Plug and Play devices
and devices that are not currently connected to the computer (phantom devices).
■
You can use the Windows XP Professional Fax Service to send and receive faxes
with a locally attached fax device or with a remote fax device connected on your
network. The Fax Service is not installed by default, so you must install it.
■
Windows XP Professional supports a number of different types of I/O devices,
including the following:
❑
Most imaging devices are installed automatically when you connect them. If
your device is not installed, Windows XP Professional provides the Scanner
and Camera Installation Wizard to help you install it.
❑
Use the Mouse option in the Printers And Other Hardware window of Control
Panel to configure and troubleshoot your mouse.
❑
Use the Phone And Modem Options option in the Printers And Other Hardware window of Control Panel to install, configure, or troubleshoot your
modem.
❑
Use the Game Controllers option in the Printers And Other Hardware window
of Control Panel to install, configure, or troubleshoot your game controller.
❑
Use the Add Hardware Wizard to install an IrDA transceiver you attach to a
serial port.
❑
The Wireless Link icon that you use to configure an infrared device does not
appear in Control Panel until you have installed an infrared device on your
computer.
❑
Use the Keyboard option in the Printers And Other Hardware window of
Control Panel to configure or troubleshoot a keyboard.
Lesson 3
Viewing and Configuring Hardware Profiles
6-27
Lesson 3: Viewing and Configuring Hardware Profiles
A hardware profile is a collection of configuration information about the hardware that
is installed on your computer. Within a profile, you can enable or disable each piece of
hardware (such as networking adapters, ports, monitors, and so on) or provide specific
configuration information. You can have many hardware profiles on a computer and
switch between different profiles when booting into Windows XP.
After this lesson, you will be able to
■ Explain when to use hardware profiles.
■ Create a hardware profile.
■ Manage hardware profiles.
■ Configure hardware settings in a hardware profile.
■ Select a hardware profile during Windows startup.
Estimated lesson time: 15 minutes
When to Use Hardware Profiles
With Windows XP Professional’s capability to reconfigure network settings when it
detects a new network, hardware profiles are not as important as they used to be, and
it is likely that you will never need to use them. Nonetheless, hardware profiles are still
used, and you should understand how to create and configure them.
Hardware profiles are useful when you have one or more hardware devices that you
want to disable sometimes and enable other times. Rather than enabling and disabling
the devices using Device Manager each time you start Windows, you can create hardware profiles in which the devices are enabled or disabled, and then just choose the
correct hardware profile during startup.
This functionality is particularly useful when you have an older portable computer that
does not support hot docking (the capability for Windows XP to automatically determine whether the portable computer is docked and reconfigure devices appropriately).
How to Create a Hardware Profile
Hardware profiles provide a way to configure a single computer for different situations.
Within a profile, you can enable or disable specific hardware devices and configure
those devices differently. As an example, assume that you have a user with a portable
computer. When he is at home, the computer is connected to an external monitor, keyboard, mouse, and printer. When the user takes the computer away from home, none
of these devices is connected. You could set his computer up with two hardware profiles: one in which those devices were enabled, and one in which they were disabled.
6-28
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
Whenever the computer starts, the user would choose the hardware profile to use, preventing him from having to make configuration changes or be notified of missing
devices.
By default, Windows creates one hardware profile named Profile 1 during installation.
To create an additional hardware profile, perform the following steps:
1. From the Start menu, select Control Panel.
2. In the Control Panel window, select Performance And Maintenance.
3. In the Performance And Maintenance window, select System.
4. In the System Properties dialog box, on the Hardware tab, click the Hardware Profiles button.
5. In the Hardware Profiles dialog box, shown in Figure 6-9, select Profile 1 (Current), and then click the Copy button. You cannot create a new profile directly;
you must copy an existing profile and then modify the copy.
F06us09
Figure 6-9 Copy and modify an existing hardware profile.
6. In the Copy Profile dialog box, type a name for the new profile, and then click
OK.
7. In the Hardware Profiles dialog box, select the new profile you just named, and
then click the Properties button.
8. In the Properties dialog box for the profile, you can configure two options:
❑
Select the This Is A Portable Computer check box if the computer is a portable
computer that uses a docking station (and if that docking station is one that
Windows XP supports). When a supported docking station is used, Windows
Lesson 3
Viewing and Configuring Hardware Profiles
6-29
XP can determine whether a portable computer is docked or undocked, and
then apply the correct profile automatically. If you do not use a docking station (or just prefer to set up and control your own profiles), leave this option
deselected.
❑
Select the Always Include This Profile As An Option When Windows Starts
check box if you want the profile to appear on the boot menu as a selectable
profile.
9. In the Properties dialog box for the profile, click OK to return to the Hardware
Profiles dialog box.
10. Click OK to return to the System Properties dialog box, and then click OK again
to return to Windows.
How to Manage Hardware Profiles
After you have created a profile, you can control generally how Windows XP treats
profiles by using the same Hardware Profiles dialog box you used to create the profile.
(Open the System Properties dialog box, switch to the Hardware tab, and then click the
Hardware Profiles button to access the dialog box.)
First, you can specify how Windows uses hardware profiles during startup. You have
the following options:
■
Have Windows wait until you select a hardware profile before it continues booting.
■
Have Windows automatically select the first hardware profile in the list and continue booting after a specified amount of time. If you select this option, you can
specify how long Windows should wait before going on without you. The default
is 30 seconds.
You also can specify the order in which hardware profiles appear in the list during startup. The order is important, mostly because it is the first profile on the list that Windows will boot if you configure Windows to select a profile automatically. Select any
profile on the list and use the up or down buttons on the right to move the profile
around.
How to Configure Hardware Settings in a Profile
After you have created the necessary profiles and configured Windows to display and
start them the correct way, the next step is to configure hardware settings for each profile. To configure hardware for a profile, you must start the computer by using that profile. After you have started Windows by using a profile, use Device Manager to enable,
disable, and configure individual devices. The settings you make will affect the currently loaded profile.
6-30
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
The only tricky part of setting up hardware devices in profiles is actually remembering
which profile you are currently using because neither Device Manager nor a device’s
Properties dialog box provides information on the current profile. You can always
switch back to the System Properties dialog box and open the Hardware Profiles window to determine your current profile.
How to Select a Hardware Profile During Startup
If there are two or more profiles in the Available Hardware Profiles list, Windows XP
Professional prompts the user to make a selection during startup. You can configure
how long the computer waits before starting the default configuration. To adjust this time
delay, click the Select The First Profile Listed If I Don’t Select A Profile option, and then
specify the number of seconds in the Seconds text box within the Hardware Profiles
Selection group. You can configure Windows XP Professional to start the default profile
by setting the number of seconds to 0. To override the default during startup, press
SPACEBAR during the system prompt. You can also select the Wait Until I Select A Hardware Profile option to have Windows XP Professional wait for you to select a profile.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What is the minimum number of hardware profiles you can have on your computer?
2. Windows XP Professional creates an initial profile during installation and assigns
it the name of _______________________ in the list of hardware profiles available
on the computer. Fill in the blank.
3. Which of the following statements are true about hardware profiles in Windows
XP Professional? Choose all that apply.
a. Windows XP Professional prompts the user to select a hardware profile during startup only if there are two or more profiles in the Available Hardware
Profiles list.
b. It is a good idea to delete the default profile when you create a new profile
to avoid confusion.
Lesson 3
Viewing and Configuring Hardware Profiles
6-31
c. You can configure Windows XP Professional to always start the default profile
by selecting the Do Not Display The Select Hardware Profile check box.
d. You can select the Wait Until I Select A Hardware Profile option to have Windows XP Professional wait for you to select a profile at startup.
Lesson Summary
■
A hardware profile stores configuration settings for a set of devices and services.
Windows XP Professional uses hardware profiles to determine which drivers to
load when system hardware changes. To create or modify a hardware profile, in
the System Properties dialog box, click the Hardware tab and then click Hardware
Profiles to view the Available Hardware Profiles list.
■
After you have created a profile, you can control whether Windows displays available profiles during startup and whether Windows automatically selects a particular profile after a specified amount of time.
■
After you have created a profile and configured how Windows uses profiles, you
can configure hardware for a profile by starting Windows using that profile and
configuring the hardware using Device Manager.
■
If there are two or more profiles in the Available Hardware Profiles list, Windows
XP Professional prompts the user to make a selection during startup.
6-32
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
Lesson 4: Configuring and Troubleshooting Device Drivers
Hardware drivers are software that govern the interactions between Windows and a
hardware device. Device Manager provides a simple method of viewing and updating
drivers for any device in the system. Windows XP also supports driver signing, which
provides a method to verify that Microsoft has tested the designated device drivers for
reliability.
After this lesson, you will be able to
■ Explain the purpose of the Driver.cab file.
■ Update device drivers.
■ Configure and monitor driver signing.
Estimated lesson time: 20 minutes
What Is the Driver.cab File?
Drivers that ship with Windows XP are stored on the installation CD in a single cabinet
file called Driver.cab. Windows XP Setup copies this file to the %systemroot%\Driver
Cache\i386 folder on the local hard disk during installation. Windows uses this file during and after installation to install drivers when new hardware is detected. This process
helps by ensuring that users do not have to provide the installation CD whenever drivers are installed. All drivers in the Driver.cab file are digitally signed.
Actions You Can Take to Update Drivers
It is important to keep device drivers updated for all devices in a system. Using up-todate drivers ensures optimum functionality and reduces the chance of an outdated
device driver causing problems.
The Driver tab of a device’s Properties dialog box (shown in Figure 6-10) displays basic
information about the device driver, such as the date of the driver and version number.
You can also perform the following actions on the Driver tab:
■
View the names of the actual driver files by clicking the Driver Details button.
■
Update a device driver to a more recent version by clicking the Update Driver button. Windows prompts you for the location of the newer version of the driver. You
can obtain new drivers from the device’s manufacturer. You can also use the
Update Driver option to reinstall drivers for a device that has ceased to function
correctly because of a driver problem. If updating the drivers does not successfully
restore device functionality, consider removing the device by using Device Manager and then restarting the computer. If the device supports Plug and Play, Win-
Lesson 4
Configuring and Troubleshooting Device Drivers
6-33
dows will recognize the device when the computer restarts. Non–Plug and Play
devices require manual reinstallation.
■
Revert to a previous version of a driver by clicking the Roll Back Driver button.
This feature restores the last device driver that was functioning before the current
driver was installed. Windows supports driver rollback for all devices except printers. In addition, driver rollback is available only on devices that have had new
drivers installed. When a driver is updated, the previous version is stored in the
%systemroot%\system32\reinstallbackups folder.
■
Remove the device from the computer by clicking the Uninstall button.
Security Alert
To work with device drivers, your user account must have the Load And
Unload Device Drivers user right.
F06us10
Figure 6-10
!
Use the Driver tab of a device’s Properties dialog box to view driver details.
Exam Tip
You should consider rolling back a driver when you are sure that a new driver is
causing a problem and you do not want to affect other system configurations or drivers with a
tool such as System Restore.
How to Configure and Monitor Driver Signing
Hardware drivers can often cause a computer running Windows XP to become unstable or to fail entirely. Windows XP implements driver signing as a method to reduce
the likelihood of such problems. Driver signing allows Windows XP to identify drivers
that have passed all Windows Hardware Quality Labs (WHQL) tests, and have not been
altered or overwritten by any program’s installation process.
6-34
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
To configure how the system responds to unsigned files, click System in the Performance And Maintenance window in Control Panel. In the System Properties dialog
box, on the Hardware tab, click Driver Signing to open the Driver Signing Options dialog box (see Figure 6-11).
F06us11
Figure 6-11
Configure driver signing in the Driver Signing Options dialog box.
You can configure the following three driver signing settings:
■
Ignore This option allows any files to be installed regardless of their digital signature or the lack thereof.
■
Warn This option, the default, displays a warning message before allowing the
installation of an unsigned file.
■
Block
This option prevents the installation of unsigned files.
Real World
Driver Signing
Because of the time that it takes for Microsoft to test device drivers before signing
them, the most recent drivers available from a manufacturer are rarely signed. If
you are managing a small number of computers, you are usually better off not
worrying too much about driver signing and just using the most recent driver
available from the manufacturer of a device because newer drivers are likely to
have bug fixes and improvements that are worth having. Just make sure that you
acquire the drivers directly from the vendor.
If you are managing a large installation of computers, though, the small risk associated with using unsigned drivers becomes significant enough that it is probably
better to wait for the signed drivers to come out.
Lesson 4
Configuring and Troubleshooting Device Drivers
6-35
If you are logged on as Administrator or as a member of the Administrators group, you
can select the Make This Action The System Default check box to apply the driver signing configuration you set up to all users who log on to the computer.
The File Signature Verification utility (Sigverif.exe) in Windows scans a computer
running Windows XP and notifies you if there are any unsigned drivers on the computer. You can start the utility by typing sigverif.exe at the command prompt or at the
Run dialog box. After the File Signature Verification utility scans your computer, the
utility displays the results in a window similar to the one shown in Figure 6-12. Note
that you cannot use the utility to remove or modify unsigned drivers; the utility scans
only for unsigned drivers and shows you their location.
F06us12
Figure 6-12
The File Signature Verification utility scans a system for unsigned drivers.
The File Signature Verification utility also writes the results of the scan to a log file
named Segverif.txt, which is found in the %systemroot% folder. You can change this
log file’s name and location, as well as configure advanced search options, by clicking
the Advanced button on the File Signature Verification dialog box.
Practice: Configuring Driver Signature Settings and Scanning for
Unsigned Drivers
In this practice, you will configure settings for unsigned drivers and use the File Signature Verification utility to scan your computer for unsigned drivers. Complete the following two exercises.
6-36
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
Exercise 1: Configure Settings for Driver Signatures
1. From the Start menu, click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click System.
4. In the System Properties dialog box, on the Hardware tab, click the Driver Signing
button.
5. In the Driver Signing Options dialog box, ensure that the Warn option is selected
so that you are prompted whenever Windows detects drivers that have not been
digitally signed. Click OK to close the Driver Signing Options dialog box.
6. Click OK again to close the System Properties dialog box.
Exercise 2: Using the Windows File Signature Verification Tool
1. From the Start menu, click Run.
2. In the Run dialog box, type sigverif.exe and click OK.
3. In the File Signature Verification dialog box, click Start.
4. The File Signature Verification utility scans your system for unsigned drivers, a
process that can take anywhere from a few seconds to a few minutes. When the
scan is finished, a list of unsigned drivers is displayed.
5. Click Close to exit the Signature Verification Results window. Click Close again to
exit the File Signature Verification dialog box.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Why does Microsoft digitally sign the files in Windows XP Professional?
Case Scenario Exercise
6-37
2. Which of the following tools would you use to block the installation of unsigned
files? Choose the correct answer.
a. File Signature Verification utility
b. Driver Signing Options in the System Control Panel
c. System File Checker
d. Sigverif
3. How can you view the file signature verification log file?
Lesson Summary
■
The Driver.cab file contains all the device drivers that ship with Windows XP Professional. Windows uses this file during and after installation to install drivers
when new hardware is detected.
■
You can use the Driver tab of a device’s Properties dialog box in Device Manager to view driver details for a device. Windows XP Professional also allows
you to roll back a driver to a previous version if a new driver causes instability
in a system.
■
Digitally signed drivers indicate that a driver has passed quality testing at Microsoft
and has not been altered since testing. You can configure Windows to ignore or
accept unsigned drivers, or to notify you if an unsigned driver is about to be
installed. Windows XP Professional provides two tools to verify the digital signatures of system files: SFC and File Signature Verification.
Case Scenario Exercise
In this exercise, you will read a scenario about a user who is trying to install a device
driver for a new sound card that he has purchased for his computer; you will then
answer the questions that follow. If you have difficulty completing this work, review
the material in this chapter before beginning the next chapter. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
6-38
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
Scenario
You are an administrator working for Contoso, Ltd., a nationwide insurance company.
You receive an e-mail from Darren Parker, one of your users, that says “After receiving
authorization from the IT support staff, I purchased a sound card for my desktop computer running Windows XP Professional. The IT support staff created a temporary administrator account so that I could install the drivers for the card. I followed the instructions
provided by the manufacturer for physically installing the sound card in the computer.
After restarting Windows, I continued to follow the manufacturer’s instructions and canceled the Found New Hardware Wizard when it appeared. Then I inserted the CD-ROM
that came with the sound card. The Setup program on the CD ran automatically and notified me that it would first install device drivers and then install other related applications.
But then early during the installation, I received an error message, stating that the drivers
I am trying to install are unsigned and cannot be installed. The Setup program ended
with an error message. I have a big video presentation to finish today, and if I do not get
this problem fixed in the next hour, I am totally hosed. Help!”
Questions
1. What is the likely problem?
2. What should you tell Darren to do to allow driver signing?
3. If the IT staff had not provided Darren with a temporary administrator account,
what might have prevented Darren from being able to allow driver signing?
4. Aside from assigning Darren a temporary administrator account, in what two ways
might the IT support staff allow Darren to install unsigned drivers?
Troubleshooting Lab
6-39
Troubleshooting Lab
In this lab, you will use Device Manager to simulate troubleshooting an unterminated
Small Computer System Interface (SCSI) chain. Complete the following steps.
1. From the Start menu, right-click My Computer, and then click Manage.
2. In the Computer Management window, under the System Tools node, click Device
Manager.
3. In the right pane, expand the Disk Drives category, and then double-click one of
the drives listed.
4. In the Properties dialog box for the drive you selected, on the General tab, the
Device Status field indicates whether there are any problems with the device. Click
Troubleshoot. (Normally, you would do this only if a problem was indicated with
this device.)
5. Windows XP Professional displays the Help And Support Center window with the
Drives And Network Adapters Troubleshooter displayed.
6. Click I Am Having A Problem With A Hard Disk Drive Or Floppy Disk Drive, and
then click Next.
7. Read the information about SCSI devices; click Yes, I Am Having A Problem With
A SCSI Device; and then click Next.
8. Read the information provided, click Yes, My Hardware Is On The HCL, and then
click Next.
9. On the Does The SCSI Adapter Or A Device In The Chain Need Power page, you
are asked, “Does Your Drive Work When All The SCSI Components Have The
Power They Need?” Click No, My Drive Does Not Work, and then click Next.
10. On the Does Device Manager Show A Problem With Your Device page, you are
asked, “Does This Information Help You To Solve The Problem?” Click No, My
Device Still Does Not Work, and then click Next.
11. On the Did You Recently Install A New Driver page, you are asked, “Does Rolling
Back To A Previous Driver Solve The Problem?” Click No, I Still Have A Problem,
and then click Next.
12. On the Is There A Problem With The Driver For Your Device page, you are asked,
“Does Reinstalling Or Updating Your Driver Solve The Problem?” Click No, I Still
Have A Problem, and then click Next.
13. On the Is Your SCSI Cable Connected Correctly page, you are asked, “Does Your
Drive Work When You Replace Any Faulty Cables Or Adapters?” Click No, My
Drive Does Not Work.
6-40
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
14. On the Is the SCSI Chain Terminated page, you are asked, “Does Your Drive Work
When You Terminate The SCSI Chain?” Click Yes, Terminating The SCSI Chain
Solves The Problem, and then click Next.
15. Close Help And Support Center, close the Properties dialog box for the selected
disk drive, and close Computer Management.
Chapter Summary
■
For most Plug and Play hardware, you connect the device to the computer, and
Windows XP Professional automatically configures the new settings. For non–Plug
and Play hardware, Windows XP Professional often identifies the hardware and
automatically installs and configures it. For the occasional Plug and Play hardware
device and for any non–Plug and Play hardware that Windows XP Professional
does not identify, install, and configure, you initiate automatic hardware installation with the Add Hardware Wizard. When you manually install hardware, you
must determine any resources required by that hardware device. Hardware
resources include interrupts, I/O ports, and memory. The Device Manager snap-in
provides a list of all hardware resources and their availability.
■
Device Manager provides you with a graphical view of the hardware installed on
your computer, and helps you manage and troubleshoot it. Device Manager flags
each device with an icon that indicates the device type and the status of the
device. Windows XP Professional supports a number of different types of I/O
devices, including the following:
❑
Most imaging devices are installed automatically when you connect them, but
if your device is not, Windows XP Professional provides the Scanner and
Camera Installation Wizard to help you install it.
❑
Use the Mouse option in the Printers And Other Hardware window of Control
Panel to configure and troubleshoot your mouse.
❑
Use the Phone And Modem Options option in the Printers And Other Hardware window of Control Panel to install, configure, or troubleshoot your
modem.
❑
Use the Game Controllers option in the Printers And Other Hardware window
of Control Panel to install, configure, or troubleshoot your game controller.
❑
Use the Add Hardware Wizard to install an IrDA transceiver you attach to a
serial port.
❑
The Wireless Link icon that you use to configure an infrared device does not
appear in Control Panel until you have installed an infrared device on your
computer.
❑
Use the Keyboard option in the Printers And Other Hardware window of
Control Panel to configure or troubleshoot a keyboard.
Exam Highlights
6-41
■
A hardware profile stores configuration settings for a set of devices and services.
Windows XP Professional uses hardware profiles to determine which drivers to
load when system hardware changes. To create or modify a hardware profile, in
the System Properties dialog box, click the Hardware tab, and then click Hardware
Profiles to view the Available Hardware Profiles list.
■
You can use the Driver tab of a device’s Properties dialog box in Device Manager
to view driver details for a device. Windows XP Professional also allows you to
roll back a driver to a previous version if a new driver causes instability in a system. Digitally signed drivers indicate that a driver has passed quality testing at
Microsoft and has not been altered since testing. You can configure Windows to
ignore or accept unsigned drivers, or to notify you if an unsigned driver is about
to be installed. Windows XP Professional provides two tools to verify the digital
signatures of system files: SFC and File Signature Verification.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
Windows XP Professional automatically detects, installs, and configures most Plug
and Play (and some non–Plug and Play) hardware. If Windows does not detect
Plug and Play hardware, you can often force the detection by restarting the computer or running the Add Hardware Wizard. For many non–Plug and Play devices,
you must use the Add Hardware Wizard to manually configure the device.
■
Some USB hubs are self-powered, and some are not. Hubs that are not self-powered draw power from the hub to which they are connected or from the computer
itself. If you find that a USB device that is connected to an unpowered USB hub
is not working as expected, try replacing the unpowered USB hub with a selfpowered hub.
■
You should consider rolling back a driver when you are sure that a new driver is
causing a problem and you do not want to affect other system configurations or
drivers with a tool such as System Restore.
Key Terms
Device Manager An administrative tool that you can use to manage the devices on
your computer. Using Device Manager, you can view and change device properties, update device drivers, configure device settings, and uninstall devices.
6-42
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
driver signing A process in which device drivers that have passed a series of tests
by Microsoft are digitally signed, enabling the operating system to determine
whether the drivers are acceptable for use.
File Signature Verification utility (Sigverif.exe) A utility that is used to scan a
Windows XP system for unsigned files, providing a simple method to identify
unsigned drivers.
Plug and Play A technology that enables the computer to automatically determine
which hardware devices are installed on the computer and then to allocate system
resources to those devices as required to configure and manage the devices.
Roll Back Driver A feature in Windows XP that permits you to reinstall (roll back)
a previously installed driver. The uninstalled drivers are stored in the systemroot\system32\reinstallbackups folder.
Questions and Answers
6-43
Questions and Answers
Lesson 1 Review
Page
6-9
1. When you initiate automatic hardware installation by starting the Add Hardware
Wizard, what does Windows XP Professional query the hardware about?
The resources the hardware requires and the settings for those resources.
2. _______________________ are channels that allow a hardware device, such as a
floppy disk drive, to access memory directly (without interrupting the microprocessor). Fill in the blank.
DMAs
3. Why would you install a hardware device manually?
You install a hardware device manually if Windows XP Professional fails to automatically detect
a hardware device.
Lesson 2 Review
Page
6-25
1. Windows XP Professional automatically identifies Plug and Play devices and arbitrates their resource requests; the resource allocation among these devices is
___________________________ (permanent/not permanent).
Not permanent
2. How can you free any resource settings that you manually assigned to a Plug and
Play device?
To free the resource settings you manually assigned and allow Windows XP Professional to
again arbitrate the resources, in Device Manager, select the Use Automatic Settings check box
in the Resources tab of the Properties dialog box for the device.
3. You get a call on the help desk from a user wondering why there is no Wireless
Link icon in Control Panel on her desktop computer like the one on her laptop
computer. What should you tell the user?
Tell the user that the Wireless Link icon appears in Control Panel only if she has already
installed an infrared device on her computer. Apparently, infrared devices are not installed on
her desktop computer.
Lesson 3 Review
Page
6-30
1. What is the minimum number of hardware profiles you can have on your computer?
Windows XP Professional creates an initial profile during installation, which is listed as Profile
1 (Current), so one is the minimum number of hardware profiles you can have on a computer.
6-44
Chapter 6
Installing, Managing, and Troubleshooting Hardware Devices and Drivers
2. Windows XP Professional creates an initial profile during installation and assigns
it the name of _______________________ in the list of hardware profiles available
on the computer. Fill in the blank.
Profile 1 (Current)
3. Which of the following statements are true about hardware profiles in Windows
XP Professional? Choose all that apply.
a. Windows XP Professional prompts the user to select a hardware profile during startup only if there are two or more profiles in the Available Hardware
Profiles list.
b. It is a good idea to delete the default profile when you create a new profile
to avoid confusion.
c. You can configure Windows XP Professional to always start the default profile
by selecting the Do Not Display The Select Hardware Profile check box.
d. You can select the Wait Until I Select A Hardware Profile option to have Windows XP Professional wait for you to select a profile at startup.
A and D are the correct answers. B is not correct because you cannot delete the default profile.
C is not correct because you must choose the Select The First Profile Listed If I Don’t Select A
Profile In xx Seconds option to always start a particular profile.
Lesson 4 Review
Page
6-36
1. Why does Microsoft digitally sign the files in Windows XP Professional?
Windows XP Professional drivers and operating system files have been digitally signed by
Microsoft to ensure their quality and to simplify troubleshooting of altered files. Some applications overwrite existing operating files as part of their installation process, which might cause
system errors that are difficult to troubleshoot.
2. Which of the following tools would you use to block the installation of unsigned
files? Choose the correct answer.
a. File Signature Verification utility
b. Driver Signing Options in the System Control Panel
c. System File Checker
d. Sigverif
B is the correct answer. A and D are not correct because the File Signature Verification Utility
(sigverif.exe) scans a computer for unsigned files. C is not correct because the System File
Checker scans a computer for Windows files that have been modified since the installation of
Windows.
Questions and Answers
6-45
3. How can you view the file signature verification log file?
By default, the Windows File Signature Verification tool saves the file signature verification to a
log file. To view the log file, click Start, click Run, type sigverif, and then press ENTER. Click
Advanced, click the Logging tab, and then click View Log.
Case Scenario Exercise
Page
6-37
1. What is the likely problem?
Driver signing on Darren’s computer is configured so that unsigned drivers might not be
installed.
2. What should you tell Darren to do to allow driver signing?
He should open the Driver Signing Options dialog box. He can do this by clicking the Driver Signing button on the Hardware tab of the System Properties dialog box. In the Driver Signing
Options dialog box, he should select either the Warn or Ignore option.
3. If the IT staff had not provided Darren with a temporary administrator account,
what might have prevented Darren from being able to allow driver signing?
If an administrator has configured a system default for the computer so that Windows
blocks unsigned drivers, Darren could not configure Windows to allow the installation of
unsigned drivers.
4. Aside from assigning Darren a temporary administrator account, in what two ways
might the IT support staff allow Darren to install unsigned drivers?
The IT support staff could have Darren use the Run As command to enable Driver Signing without actually logging on with an administrator account. Also, the IT support staff could assign
Darren’s account the Load And Unload Device Drivers user right.
7 Setting Up and Managing
User Accounts
Exam Objectives in this Chapter:
■
Configure, manage, and troubleshoot local user and group accounts.
❑
Configure, manage, and troubleshoot account settings.
Why This Chapter Matters
One of the most important functions that you will undertake as an administrator
is the creation and management of user accounts. User accounts allow a person
to log on to a computer or a network. User accounts also govern the access that
person has to various resources and the ability a person has to perform certain
actions on the computer. Groups make the administration of user accounts easier by allowing you to group together users who share common security and
access needs.
This chapter explains how to plan, establish, and maintain local user accounts
and local groups on computers running Microsoft Windows XP Professional.
Lessons in this Chapter:
■
Lesson 1: Introduction to User Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-2
■
Lesson 2: Planning New User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-9
■
Lesson 3: Modifying, Creating, and Deleting User Accounts. . . . . . . . . . . . . .7-13
■
Lesson 4: Configuring Properties for User Accounts . . . . . . . . . . . . . . . . . . .7-28
■
Lesson 5: Implementing Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-36
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have Windows XP Professional installed on your computer.
7-1
7-2
Chapter 7
Setting Up and Managing User Accounts
Lesson 1: Introduction to User Accounts
A user logs on to a computer or a network by supplying a user name and password
that identify that user’s user account. There are two types of user accounts.
■
A local user account allows you to log on to a specific computer to access
resources on that computer.
■
A domain user account allows you to log on to a domain to access network
resources.
After this lesson, you will be able to
■ Describe how a local user account works
■ Describe how a domain user account works
■ Identify the built-in local user accounts in Windows XP Professional
■ Enable or disable the built-in Guest account
Estimated lesson time: 30 minutes
Local User Accounts
Local user accounts allow users to log on only to the computer on which the local user
account has been created and to access resources only on that computer. When you
create a local user account, Windows XP Professional creates the account only in that
computer’s security database, called the local security database, shown in Figure 7-1.
Windows XP Professional uses the local security database to authenticate the local user
account, which allows the user to log on to that computer. Windows XP Professional
does not replicate local user account information on any other computer.
Local User
Account
Local User
Local Security
Database
Local user accounts
• Provide access to resources on the local computer
• Are created only on computers that are not in a domain
• Are created in the local security database
F07us01
Figure 7-1 Local user accounts provide access to local resources only and should be used in workgroup settings.
Lesson 1
Introduction to User Accounts
7-3
Microsoft recommends that you use local user accounts only on computers in workgroups. If you create a local user account in a workgroup of five computers running
Windows XP Professional—for example, User1 on Computer1—you can only log on to
Computer1 with the User1 account. If you need to be able to log on as User1 to all five
computers in the workgroup, you must create a local user account, User1, on each of
the five computers. Furthermore, if you decide to change the password for User1, you
must change the password for User1 on each of the five computers because each computer maintains its own local security database.
!
Exam Tip
A domain does not recognize local user accounts, so do not create local user
accounts on computers running Windows XP Professional that are part of a domain. Doing so
restricts users from accessing resources on the domain and prevents the domain administrator from administering the local user account properties or assigning access permissions for
domain resources.
Domain User Accounts
Domain user accounts allow you to log on to the domain and access resources anywhere on the network. When you log on, you provide your logon information, which
is your user name and password. A domain controller running Windows 2000 Server or
Windows Server 2003 uses this logon information to authenticate your identity and
build an access token that contains your user information and security settings. The
access token identifies you to the computers in the domain on which you try to access
resources. The access token is valid throughout the logon session.
Note You can have domain user accounts only if you have a domain. You can have a
domain only if you have at least one computer running Windows 2000 Server or later that is
configured as a domain controller (which means that the server has the Active Directory directory service installed).
You create a domain user account in the Active Directory database (the directory) on
a domain controller, as shown in Figure 7-2. The domain controller replicates the new
user account information to all domain controllers in the domain. After the domain
controller replicates the new user account information to other domain controllers, all
the domain controllers in the domain tree and other computers that are members of the
domain can authenticate the user during the logon process.
7-4
Chapter 7
Setting Up and Managing User Accounts
Domain Controller
Domain User
Account
Domain User
Active
Directory
Domain user accounts
• Provide access to network resources
• Provide the access token for authentication
• Are created in Active Directory directory services
on a domain controller
F07us02
Figure 7-2 Domain user accounts
Built-In User Accounts
Windows XP Professional automatically creates a number of built-in local user
accounts. Table 7-1 describes these accounts.
Table 7-1 Built-In Local User Accounts
Account
Description
Administrator
Use the built-in Administrator account to manage the overall computer.
You can perform tasks to create and modify user accounts and groups,
manage security policies, create printer resources, and assign the permissions and rights that allow user accounts to access resources.
Guest
Use the built-in Guest account to allow occasional users to log on and
access resources. For example, an employee who needs access to
resources for a short time can use the Guest account. This account is
disabled by default to protect your computer from unauthorized use.
InitialUser
The InitialUser account is named based on the registered user and is
created during Windows Activation (directly following installation)
only if the computer is a member of a workgroup. For example, if a
user named Sandra installed and activated Windows XP Professional as
a member of a workgroup, an account named Sandra is created following installation. This account is made a member of the Administrators local group.
HelpAssistant
The HelpAssistant account is not available for standard logon. Instead,
this account is used to authenticate users who connect by using
Remote Assistance. Windows enables this account automatically when
a user creates a Remote Assistance invitation and disables the account
automatically when all invitations have expired. You will learn more
about Remote Assistance in Chapter 18, “Using Windows XP Tools.”
Lesson 1
Table 7-1
Account
Introduction to User Accounts
7-5
Built-In Local User Accounts
Description
SUPPORT_xxxxxxxx The SUPPORT_xxxxxxxx account (where xxxxxxxx is a random number generated during Windows setup) is used by Microsoft when providing remote support through the Help And Support Service account.
It is not available for logon or general use
Although you cannot delete any of the built-in user accounts, you can rename or disable them. To rename a user account, right-click the account in the Computer Management window and then select Rename. You will learn more about disabling accounts
later in this section.
Real World Using RunAs to Start a Program
As you might expect, administrators require more permissions and user rights to
perform their duties than other users. However, logging on using an administrator
account as a regular practice is not a good idea because it makes the computer
(and the network) more vulnerable to security risks such as viruses, Trojan
horses, spyware, and other malicious programs. A much safer practice is to log on
routinely using a normal account that is a member of the Users or Power Users
group and to use the RunAs command to perform tasks that require administrative rights or permissions. For example, you could log on using your normal user
account and then launch the Computer Management tool using administrative
credentials.
Windows XP Professional provides this functionality using the Secondary Logon
service, which must be enabled for the RunAs command to work. To learn how
to enable this service, read Chapter 1, “Introduction to Windows XP Professional.”
After the Secondary Logon service is enabled, you can use the RunAs command
in one of two ways.
■
In Windows Explorer (or on the Start menu), hold down the SHIFT key, rightclick the program (or shortcut) you want to run, and click Run As. In the Run
As dialog box, provide your administrative credentials.
■
At the command prompt, type runas /user: domain_name\administrator_
account program name. For example, you might type runas /user: contoso\administrator compmgmt.msc to start the Computer Management
tool using an account named Administrator in a domain named Contoso.
7-6
Chapter 7
Setting Up and Managing User Accounts
How to Enable or Disable the Guest Account
The Guest account has limited privileges on a computer and is used to provide access
to users who do not have a user account on the computer. Although the Guest account
can be useful for providing limited access to a computer, the account does present
security problems because by design the Guest account allows anyone to log on to the
computer. Fortunately, the Guest account is turned off (also known as disabled) by
default. For a more secure environment, leave the Guest account turned off and create
a normal user account for anyone who needs to use the computer.
!
Exam Tip
Allow Guest access only in low-security workgroups, and always assign a password to the Guest account. Also, you can rename the Guest account, but you cannot delete it.
Log on with a user account that is a member of the Administrators group, and use the
User Accounts tool in the Control Panel (shown in Figure 7-3) to turn the Guest
account on or off. The User Accounts window displays the user accounts that can log
on to the computer. The User Accounts window in Figure 7-3 indicates that Guest
access is on.
F07us03
Figure 7-3 Use the User Accounts window to enable and disable the Guest account.
To enable or disable the Guest account, complete the following steps:
1. Click Start, click Control Panel, and then click User Accounts.
2. In the User Accounts window, click User Accounts.
Lesson 1
Introduction to User Accounts
7-7
3. If the Guest account is turned off, in the User Accounts window (a different window from the one in step 2), click the Guest icon to access the Do You Want To
Turn On The Guest Account window (shown in Figure 7-4). Click Turn On The
Guest Account. The Guest account is now turned on.
If the Guest account is turned on, click the Guest icon to access the What Do You
Want To Change About The Guest Account page. Click Turn Off The Guest
Account.
F07us04
Figure 7-4 The Do You Want To Turn On The Guest Account window
4. Close the User Accounts window and the Control Panel window.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Where do local user accounts allow users to log on and gain access to resources?
2. Where should you create user accounts for computers running Windows XP Professional that are part of a domain?
7-8
Chapter 7
Setting Up and Managing User Accounts
3. Which of the following statements about domain user accounts are correct?
(Choose all that apply.)
a. Domain user accounts allow users to log on to the domain and gain access to
resources anywhere on the network, as long as the users have the required
access permissions.
b. If at least one computer on the network is configured as a domain controller,
you should use domain user accounts only.
c. The domain controller replicates the new user account information to all
other computers in the domain.
d. A new domain user account is established in the local security database on
the domain controller on which you created the account.
4. Which of the following statements about built-in accounts are correct? (Choose all
that apply.)
a. You can delete the Guest account.
b. You cannot delete the Administrator account.
c. You cannot rename the Guest account.
d. You can rename the Administrator account.
5. How do you disable the Guest account?
Lesson Summary
■
Local user accounts allow users to log on at and access resources on only the computer on which you create the local user account. When you create a local user
account, Windows XP Professional creates the account only in that computer’s
security database, which is called the local security database.
■
Domain user accounts allow users to log on to the domain and access resources
anywhere on the network. You create a domain user account in the copy of the
Active Directory database (the directory) on a domain controller.
■
Windows XP Professional automatically creates a number of built-in local user
accounts. The two most important built-in local user accounts are Administrator
and Guest. You cannot delete built-in accounts, but you can rename them or disable them.
■
You can use the User Accounts tool to enable or disable the Guest account.
Lesson 2
Planning New User Accounts
7-9
Lesson 2: Planning New User Accounts
On networks with more than just a few computers, you should take the time to create
a plan for user accounts. In particular, you should establish a naming convention so
that user account names are consistent. You should also establish password requirements for users.
After this lesson, you will be able to
■ Establish an effective naming convention for your organization’s local user accounts
■ Create password requirements for protecting access to computers running Windows XP
Professional
Estimated lesson time: 10 minutes
Naming Conventions
A naming convention is an organization’s established standard for identifying users.
Following a consistent naming convention, especially on large networks, helps administrators and users remember logon names. It also makes it easier for administrators to
locate specific user accounts to add them to groups or perform account administration.
Table 7-2 summarizes some guidelines for determining an effective naming convention
for your organization.
Table 7-2
Naming Convention Guidelines
Guideline
Explanation
Create unique user
logon names.
Local user account names must be unique on the computer on which
you create the local user account. User logon names for domain user
accounts must be unique to the directory. Common practices include
the following:
■ Use the first and middle initials and the last name. A user
named Kevin F. Browne, for example, would have the user
name kfbrowne.
■ Separate first and last name with a period (.). A user named
David Johnson would have the user name David.Johnson.
Use a maximum of
20 characters.
User account names can contain up to 20 uppercase or lowercase
characters. The field accepts more than 20 characters, but Windows
XP Professional recognizes only the first 20.
Remember that user
logon names are not
case sensitive.
You can use a combination of special and alphanumeric characters
to establish unique user accounts. User logon names are not case sensitive, but Windows XP Professional preserves the case for display
purposes.
Avoid characters that
are not valid.
The following characters are not valid: “ / \ [ ] : ; | = , + * ? < >
7-10
Chapter 7
Setting Up and Managing User Accounts
Table 7-2
Naming Convention Guidelines
Guideline
Explanation
Accommodate
employees with
duplicate names.
If two users have the same name, you could create a user logon name
consisting of the first name, the last initial, and additional letters from
the last name to differentiate the users. For example, if two users are
named John Evans, you could create one user account logon as johne
and the other as johnev. You could also number each user logon
name—for example, johne1 and johne2.
Identify the type of
employee.
Some organizations prefer to identify temporary employees in their
user accounts. You could add a T and a dash in front of the user’s
logon name (T-johne) or use parentheses at the end—for example,
johne(Temp).
Rename the
Administrator and
Guest built-in user
accounts.
You should rename the Administrator and Guest accounts to provide
greater security.
Password Guidelines
To protect access to the computer, every user account should have a password. Consider the following guidelines for passwords:
■
Always assign a password to the Administrator account to prevent unauthorized
access to the account.
■
Determine whether the Administrator or the users will control passwords. You can
assign unique passwords to user accounts and prevent users from changing them,
or you can allow users to enter their own passwords the first time they log on. In
most cases, users should control their passwords.
■
Use passwords that are hard to guess. For example, avoid using passwords with
an obvious association, such as a family member’s name. Using a real name, a user
name, or a company name makes for an easy-to-guess password. Also avoid using
common passwords such as “letmein” or “password.”
■
Using a common dictionary word makes you vulnerable to automated programs
that are designed to guess passwords.
■
Using any password that you write down or that you share with someone else is
not secure.
■
Passwords can contain up to 128 characters; a minimum length of 8 characters is
recommended.
Lesson 2
Planning New User Accounts
7-11
■
Include both uppercase and lowercase letters (unlike user names, user passwords
are case sensitive), numerals, and the valid nonalphanumeric characters (such as
punctuation).
■
Using no password at all is not a good practice because it is then easy for other
users to just walk up to an unsecured computer and log on.
If users find that complex passwords are difficult to remember, tell them that Windows
XP allows the use of pass phrases instead of passwords. For example, a perfectly valid
password in Windows XP is “My dog ate 2 turkeys last Thanksgiving.” Another technique is to join together simple words with numbers and symbols. An example of a
password that uses this technique is “2eggs+2bacon=1breakfast”.
!
Exam Tip
You should understand the guidelines for creating strong passwords. In particular, remember that a password should be a minimum of eight characters and should include a
mix of uppercase and lowercase letters, numbers, and symbols.
Security Alert
You can use a blank password by default on Windows XP Professional if the
computer is a member of a workgroup. However, you will only be able to use this password to
log on and access local resources on the computer. By default, the local security policy in
Windows XP prohibits you from logging on to a remote computer if you have a blank password. The name of this security setting is Accounts: Limit Local Account Use Of Blank Passwords To Console Logon Only. You will learn more about local security policy in Chapter 16,
“Configuring Security Settings and Internet Options.”
Creating Strong Passwords
Weak passwords are a big security risk. You should encourage users to select and
use strong passwords, even if they do not really want to. You can use the following guidelines to create strong passwords:
■
Passwords should be at least eight characters long—and longer is better.
■
Passwords should use a combination of lowercase and uppercase letters,
numbers, and symbols (for example, ` ~ ! @ # $ % ^ & * ( ) _ + - = { } | [ ] \
: “ ; ‘ < > ? , . / or a space character).
■
Passwords should be changed regularly.
An example of a strong password using these guidelines is J5!if^8D.
7-12
Chapter 7
Setting Up and Managing User Accounts
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. The maximum number of characters that Windows XP Professional recognizes in
a local user account name is __________.
2. When are duplicate local user accounts valid in a network of computers running
Windows XP Professional?
3. Passwords can be up to ______ characters long with a minimum length of ______
characters recommended.
Lesson Summary
■
Local user account names must be unique on the computer on which you create
the account, and domain user accounts must be unique to the directory. User
logon names can contain up to 20 uppercase or lowercase characters. The User
Name text box in the Log On To Windows dialog box accepts more than 20 characters, but Windows XP Professional recognizes only the first 20. The following
characters are not valid: “ / \ [ ] : ; | = , + * ? < >
■
Passwords can be up to 128 characters long; a minimum of 8 characters is recommended. Use a mixture of uppercase and lowercase letters, numerals, and valid
nonalphanumeric characters in creating passwords.
Lesson 3
Modifying, Creating, and Deleting User Accounts
7-13
Lesson 3: Modifying, Creating, and Deleting User Accounts
Windows XP Professional provides two tools for modifying, creating, and deleting user
accounts: the User Accounts tool in the Control Panel (for creating and managing user
accounts in a workgroup) and the Computer Management snap-in (for creating and
managing user accounts in a workgroup or domain).
After this lesson, you will be able to
■ Manage users by using the User Accounts tool
■ Manage users by using the Computer Management snap-in
■ Create a password reset disk
Estimated lesson time: 50 minutes
User Accounts Tool
The User Accounts tool in the Control Panel (shown in Figure 7-5) is one of the tools
that you use to modify, create, and delete local user accounts when working in a workgroup environment.
F07us05
Figure 7-5
Use the User Accounts tool to perform limited user account tasks.
7-14
Chapter 7
Setting Up and Managing User Accounts
If you are logged on with an account that is a member of the Administrators group, the
Pick A Task portion of the User Accounts tool allows you to perform the following
tasks:
■
Change an account (which includes deleting the account)
■
Create a new user account
■
Change the way users log on or log off
How to Modify an Existing User Account by Using the User Accounts Tool
If you are an administrator, the Change An Account task allows you to make changes
to any user account on the computer. If you are logged on with a limited user account,
you do not see the same Pick A Task page as an administrator; you see only a Pick A
Task page that contains some of the following options that an administrator can perform:
■
Change My/The Name Changes the user account name of an account on the
computer. You see this option only if you are logged on as an administrator
because only an administrator can perform this task.
■
Create A Password Creates a password for your account. You only see this
option if your user account does not have a password. Only an administrator can
create passwords for other user accounts.
■
Change My/The Password Changes the password for your account. You only
see this option if your user account already has a password signed to it; you see
this option instead of the Create A Password option. Only an administrator can
change passwords for other user accounts.
■
Remove My/The Password Removes the password for your account or any
other account on the computer. You only see this option if your user account
already has a password assigned to it. Only an administrator can remove passwords for other user accounts.
■
Change My/The Picture Changes the picture that appears on the Welcome
screen. Only an administrator can change the pictures for other user accounts.
■
Change My/The Account Type Changes the account type for a specified
account. Only an administrator can change the account type for a user account.
■
Set Up My Account To Use A .NET Passport Starts the Add A .NET Passport To
Your Windows XP Professional Account Wizard. A passport allows you to have
online conversations with family and friends, create your own personal Web
pages, and sign in instantly to all Microsoft .NET–enabled sites and services. You
can set up only your own account to use a .NET Passport.
Lesson 3
■
Modifying, Creating, and Deleting User Accounts
7-15
Delete The Account Deletes a specified user account. You only see this option
if you are logged on as an administrator because only an administrator can perform this task.
Caution
When you delete a user account, there is no way to recover the permissions and
the rights that are associated with that account. Also, when you delete a user account, Windows XP Professional displays the Do You Want To Keep local_user_account’s Files window. If
you click Keep Files, Windows XP Professional saves the contents of the user’s desktop and
My Documents folder to a new folder named local_user_account on your desktop. However, it
cannot save user’s e-mail messages, Internet Favorites, or other settings.
To modify an account while logged on with a limited user account, complete the following steps:
1. Click Start, click Control Panel, and then click User Accounts.
The Pick A Task page appears.
2. Click the appropriate option for the modification that you want to make, and then
follow the prompts on the screen.
To change an account while logged on as an administrator, complete the following
steps:
1. Click Start, click Control Panel, and then click User Accounts.
2. In the User Accounts window, click Change An Account.
The Pick An Account To Change page appears. The account modifications that
you can make on this page depend on the account type and how it is configured.
3. Click the account you want to change.
The What Do You Want To Change About account_name Account page appears.
4. Click the appropriate option for the modification that you want to make, and then
follow the prompts on the screen.
How to Change the Way That Users Log On or Off by Using the User Accounts Tool
Only administrators can change the way users log on or log off the computer. This
option is available on the Pick A Task page only if you are logged on with a user
account that is a member of the Administrators group.
7-16
Chapter 7
Setting Up and Managing User Accounts
The following options control how all users log on and log off the computer. Remember that these options are only available if the computer is a member of a workgroup
and not if the computer is part of a domain.
■
Use The Welcome Screen This check box, enabled by default, allows you to
click your user account on the Welcome screen to log on to the computer. If you
clear this check box, you must type your user name and password at a logon
prompt to log on.
■
Use Fast User Switching This check box, enabled by default, allows you to
quickly switch to another user account without first logging off and closing all programs.
To change the way users log on or log off, complete the following steps:
1. Click Start, click Control Panel, and then click User Accounts.
2. In the User Accounts window, click Change The Way Users Log On Or Off. The
Select Logon And Logoff Options window appears.
3. Select or clear the appropriate check boxes.
How to Create a New User Account in the User Accounts Tool
Only administrators can create new user accounts. This option is only available on the
Pick A Task screen if you are logged on with a user account that is a member of the
Administrators group.
To create a new user account, complete the following steps:
1. Click Start, click Control Panel, and then click User Accounts.
2. In the User Accounts window, click Create A New Account.
The Name The New Account page appears.
3. In the Type A Name For The New Account box, type a user logon name (up to 20
characters), and then click Next.
Note
The user’s logon name appears in the Welcome screen and on the Start menu. For
information about valid characters for creating user accounts, see Table 7-2.
The Pick An Account Type window appears. Windows XP Professional provides
two account types: Computer Administrator and Limited. Table 7-3 lists the capabilities of each account type.
4. Select the appropriate account type, and then click Create Account.
Lesson 3
Table 7-3
Modifying, Creating, and Deleting User Accounts
7-17
User Account Types and Capabilities
Computer
Administrator
Limited
Account
Change your own picture
X
X
Create, change, or remove your password
X
X
Change your own account type
X
Change your own account name
X
Change other users’ pictures, passwords, account types, and
account names
X
Have full access to other user accounts
X
Create user accounts on this computer
X
Capability
Delete user accounts on this computer
X
Access and read all files on this computer
X
Install programs and hardware
X
Make system-wide changes to the computer
X
Computer Management Snap-In
The Computer Management snap-in, shown in Figure 7-6, provides a more sophisticated means of managing local users than the User Accounts tool. Using Computer
Management, you can create, delete, and disable local user accounts. You can also create and manage local groups.
F07us06
Figure 7-6
Use the Computer Management snap-in for a more detailed set of user account tasks.
7-18
Chapter 7
Setting Up and Managing User Accounts
How to Create a Local User Account by Using Computer Management
To create local user accounts by using the Computer Management snap-in complete
the following steps:
1. From the Start menu, click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools window, double-click Computer Management.
Tip
You can also access the Computer Management window by right-clicking the My Computer icon on the desktop or Start menu and clicking Manage.
5. In the console tree of the Computer Management window, click the Computer
Management plus sign (+) icon to expand the tree. Computer Management contains three folders: System Tools, Storage, and Services And Applications.
6. In the console tree, expand System Tools, and then click Local Users And Groups.
7. In the details pane, right-click Users, and then click New User.
8. Fill in the appropriate text boxes in the New User dialog box (shown in Figure 77), click Create, and then click Close.
F07us07
Figure 7-7 Create a new user.
Table 7-4 describes the user account options shown in Figure 7-8.
Lesson 3
Modifying, Creating, and Deleting User Accounts
7-19
Table 7-4
Local User Account Options
Option
Action
User Name
Type the user’s logon name. This field is required.
Full Name
Type the user’s full name. You can include the user’s first and last
names, but you can also include the middle name or initial. This field is
optional.
Description
Type descriptive text about the user account or the user. This field is
optional.
Password
Type the account password that is used to authenticate the user. For
greater security, always assign a password. As an additional security
measure, the password appears as a string of asterisks as you type it.
Confirm Password
Confirm the password by typing it a second time. This field is required
if you assign a password.
User Must Change
Password At Next
Logon
Select this check box if you want the user to change his or her password the first time that he or she logs on. This ensures that only the
user knows the password. This option is selected by default.
User Cannot
Change Password
Select this check box if more than one person uses the same user
account (such as Guest), or if you want only administrators to control
passwords. If you have selected the User Must Change Password At
Next Logon check box, this option is not available.
Password Never
Expires
Select this check box if you never want the password to change—for
example, for a domain user account that a program or a Windows XP
Professional service uses. The User Must Change Password At Next
Logon option overrides this option, so if you have selected the User
Must Change Password At Next Logon check box, this option is not
available.
Account Is Disabled Select this check box to prevent use of this account—for example, for a
new employee who has not yet started working for your organization.
Security Alert
Always require new users to change their passwords the first time they log
on. This forces them to use passwords that only they know. For added network security, use a
combination of letters and numbers to create unique initial passwords for all new user
accounts.
How to Delete a User by Using Computer Management
You can also delete users in Computer Management. To delete a user by using the
Computer Management snap-in, use these steps:
1. From the Start menu, click Control Panel.
7-20
Chapter 7
Setting Up and Managing User Accounts
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools window, double-click Computer Management.
5. In the console tree of the Computer Management window, click the Computer
Management plus sign (+) icon to expand the tree. Computer Management contains three folders: System Tools, Storage, and Services And Applications.
6. In the console tree, expand System Tools, and then click Local Users And Groups.
7. Under Local Users And Groups, click Users.
8. In the Details pane, right-click the user you want to delete and click Delete.
Windows displays the Local Users And Groups dialog box, which warns you that
when you delete a user, all permissions and rights associated with that user
account are also lost.
9. In the Local Users And Groups dialog box, click Yes.
How to Create a Password Reset Disk
The password reset disk is a floppy disk that contains encrypted password information and allows users to change their password without knowing the old password. As
standard practice, you should encourage users to create a password reset disk and
keep it in a secure location.
To create a password reset disk for a domain-based user account, follow these steps:
1. Press CTRL+ALT+DEL, and then click Change Password.
2. In the User Name box, type the user name of the account for which you want to
create a password reset disk.
3. In the Log On To box, click ComputerName, where ComputerName is your
assigned computer name, and then click Backup.
4. Follow the steps in the Forgotten Password Wizard until the procedure is complete. Store the password reset disk in a secure place.
To create a password reset disk for a local user account, follow these steps:
1. From the Start menu, click Control Panel.
2. In Control Panel, click User Accounts.
3. If you are logged on using a Computer Administrator account, click the account
name and then, in the Related Tasks list, select Prevent A Forgotten Password. If
you are logged on using a Limited account, the Prevent A Forgotten Password
option is located on the main page of the User Accounts window. (You do not
have to click the account name first.)
Lesson 3
Modifying, Creating, and Deleting User Accounts
7-21
4. Follow the steps in the Forgotten Password Wizard until the procedure is complete. Store the password reset disk in a secure place.
Users cannot change their password and create a password reset disk at the same time.
If a user types a new password in the New Password and Confirm New Password
boxes before the user clicks Backup, the new password information is not saved.
When the wizard prompts a user for his current user account password, the user must
type the old password.
A user can change a password anytime after creating a password reset disk. The user
does not have to create a new password disk after changing a password or resetting a
password manually.
When logging on, if a user forgets the password and has previously created a password
reset disk, the user is presented with an option to reset his password by using the password reset disk. Select the option on the logon screen to launch the Password Reset
Wizard. The Password Reset Wizard asks user to create a new password and hint. Log
on with the new password and then return the password reset disk to its safe storage
place. The user does not need to make a new password reset disk.
Practice: Modifying, Creating, and Deleting Local User Accounts
In this practice, you create a new local user account and assign it a password using the
User Accounts tool. You then create a custom Microsoft Management Console (MMC)
that contains the Computer Management snap-in and use the snap-in to create two
more new user accounts. Then you test one of the newly created local user accounts.
You complete the practice by using the User Accounts tool to delete a local user
account.
After completing this practice, you will be able to accomplish the following tasks:
■
Use the User Accounts tool to create a new local user account
■
Create a customized MMC containing the Computer Management snap-in
■
Use the Computer Management snap-in to create a new local user account
Exercise 1: Creating a New Local User Account by Using the User Accounts Tool
1. Log on with a user account that is a member of the Administrators group.
2. Click Start, click Control Panel, and then click User Accounts.
3. In the User Accounts window, under Pick A Task, click Create A New Account.
4. On the Name The New Account page, in the Type A Name For The New Account
text box, type User1, and then click Next.
5. On the Pick An Account Type page, click Limited.
7-22
Chapter 7
Setting Up and Managing User Accounts
Note If your account is a limited account type, you can change or remove your password,
change the picture displayed with your account, and change your theme and other desktop
settings. You can also view files that you created and files in the shared documents folder.
6. Click Create Account.
Windows XP Professional displays the User Accounts window; User1 appears in
the list of accounts.
7. Create an account named User2 using steps 3 through 6.
Leave the User Accounts window open for the next exercise.
Exercise 2: Assigning a Password to a Local User Account by Using the User
Accounts Tool
1. In the User Accounts window, click User1.
2. Click Create A Password.
3. Type password in both the Type A New Password text box and the Type The
New Password Again To Confirm text box.
4. Type the most commonly used password in the Type A Word Or Phrase To
Use As A Password Hint text box.
5. Click Create Password.
6. What two new options appear for User1’s account? What option is no longer available?
7. Click the Home icon to return to the User Accounts window.
8. Assign User2 the password User2.
9. Close the User Accounts window and Control Panel.
Exercise 3: Creating a Customized MMC That Contains the Computer Management
Snap-In
1. Click Start, and then click Run.
2. In the Open text box, type mmc and then click OK.
The MMC starts and displays an empty console.
3. Maximize the Console1 window by clicking Maximize.
Lesson 3
Modifying, Creating, and Deleting User Accounts
7-23
4. Maximize the Console Root window by clicking Maximize.
5. On the File menu, click Add/Remove Snap-In.
The MMC displays the Add/Remove Snap-In dialog box.
6. Click Add.
The MMC displays the Add Standalone Snap-In dialog box.
7. In the Available Standalone Snap-Ins list, click Computer Management and then
click Add.
The MMC displays the Computer Management dialog box, which allows you to
specify the computer that you want to administer. The Local Computer option is
selected by default.
8. In the Computer Management dialog box, click Finish.
The MMC creates the console that contains the Computer Management snap-in for
managing the local computer.
9. In the Add Standalone Snap-In dialog box, click Close.
10. In the Add/Remove Snap-In dialog box, click OK to place the Computer Management snap-in in your customized MMC.
Computer Management (Local) now appears in the console tree.
11. On the File menu, click Save As.
The MMC displays the Save As dialog box.
12. In the File Name text box, type Computer Management Local, and then click
Save.
The title bar is now Computer Management Local. You have just created a customized MMC containing the Computer Management snap-in and have named it Computer Management Local.
Exercise 4: Creating a New Local User Account by Using the Computer
Management Snap-In
1. In the Computer Management Local window, in the console pane, click the plus
sign in front of Computer Management (Local) to expand it.
Computer Management contains three folders: System Tools, Storage, and Services
And Applications.
2. In the console pane, expand System Tools, and then click Local Users And
Groups.
3. In the details pane, right-click Users, and then select New User.
The New User dialog box appears.
7-24
Chapter 7
Setting Up and Managing User Accounts
4. In the User Name text box, type User3.
5. In the Full Name text box, type User Three.
Do not assign a password to the user account.
6. Confirm that the User Must Change Password At Next Logon check box is
selected.
7. Click Create to create the new user, and then click Close.
8. Click Start, click Control Panel, and then click User Accounts.
The User Accounts window appears.
9. What type of account is User3? (Get answer.)
The account type for User3 is Limited Account.
10. Close the User Accounts window, and then close Control Panel.
11. In the Computer Management Local window, in the details pane, right-click Users,
and then click New User.
12. In the User Name text box, type User4.
13. In the Full Name text box, type User Four.
14. In the Password and Confirm Password text boxes, type User4.
15. How does the password appear on the screen? Why?
Security Alert
In high-security environments, assign initial passwords to user accounts
and then require users to change their passwords the next time they log on. This accomplishes two goals: it prevents a user account from existing without a password and ensures
that only the user knows the password. The password assigned in this exercise was for ease
of use in the exercise. The passwords you assign should be difficult to guess and should
include both uppercase and lowercase letters, numerals, and valid nonalphanumeric characters. For information about valid characters for creating user accounts, see Table 7-2.
16. Confirm that the User Must Change Password At Next Logon check box is
selected, and then click Create.
17. Close the New User dialog box.
18. In the Computer Management console, on the File menu, click Exit to close the
Computer Management custom MMC.
The Microsoft Management Console dialog box appears, in which you indicate
whether you want to save Console settings to Computer Management.
Lesson 3
Modifying, Creating, and Deleting User Accounts
7-25
Note
If you click Yes, the next time you open the Computer Management console, it
appears as it does now. If you click No, Windows XP Professional does not save the settings.
19. Click Yes to save the console settings.
20. Click Start, and then click Log Off.
Windows XP Professional displays a Log Off Windows dialog box telling you to
click Switch User if you want to leave programs running and switch to another
user. Your other options are to click Log Off or Cancel.
21. In the Log Off Windows dialog box, click Log Off.
22. On the Welcome screen, click User Three.
23. What happens?
24. Click OK. The Change Password dialog box appears.
25. Leave the Old Password text box blank, and in the New Password and Confirm
New Password text boxes, type User3, and then click OK.
Windows XP Professional displays a Change Password dialog box indicating that
the password has been changed.
26. Click OK to close the Change Password dialog box.
The User3 user account that you created using the Computer Management snapin allowed you to log on. Because you left the default check box, User Must
Change Password At Next Logon, selected when you created the account, you
were prompted to change passwords when you logged on as User3. You confirmed that the User3 user account was created with a blank password when you
left the Old Password box blank and successfully changed the password to User3.
27. Log off the computer.
Exercise 5: Deleting a Local User Account
1. Log on with a user account that is a member of the Administrators group.
2. In the Control Panel, click User Accounts.
3. Click User Three.
Windows XP Professional displays the What Do You Want To Change About User
Three’s Account window.
4. Click Delete The Account.
Windows XP Professional displays the Do You Want To Keep User Three’s Files
window.
7-26
!
Chapter 7
Setting Up and Managing User Accounts
Exam Tip
After you delete a user account, there is no way to recover the rights and permissions associated with that user account. A better practice than deleting user accounts is to
disable them until you are sure they are no longer needed.
5. Click Delete Files.
Windows XP Professional displays the Are You Sure You Want To Delete User
Three’s Account window.
6. Click Delete Account.
Windows XP Professional displays the User Accounts window. Notice that the
User3 account is no longer listed under Or Pick An Account To Change.
7. Close the User Accounts tool, and then close the Control Panel.
8. Log off the computer.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Which of the following statements about the Windows XP Professional User
Accounts tool are correct? (Choose all that apply.)
a. The User Accounts tool allows you to remotely create, modify, and delete user
accounts on all computers in the network running Windows XP Professional.
b. The User Accounts tool allows you to view and modify all accounts on the
computer.
c. The tasks you can perform with the User Accounts tool depend on the type
of account you use to log on to the local computer.
d. The User Accounts tool allows users to delete, create, or remove their individual passwords.
2. Which of the following tasks can both account types (Computer Administrator and
Limited) perform? (Choose all that apply.)
a. Change your picture
b. Change your account type
c. Create, change, or remove your password
d. Change your account name
Lesson 3
Modifying, Creating, and Deleting User Accounts
7-27
3. Which of the following statements about logging on or logging off a computer
running Windows XP Professional are true? (Choose all that apply.)
a. When you use the Welcome screen to log on the local computer, you can
quickly switch to another user account without logging off and closing all
programs that you are running.
b. The User Accounts tool allows you to disable a local user account to prevent
users from using the disabled account to log on.
c. When you use the Welcome screen to log on the local computer, you can log
on using only one of the accounts displayed on the Welcome screen.
d. The User Accounts tool allows you to replace the Welcome screen with a
logon prompt that requires users to type their individual user names and
passwords.
4. When you use the Computer Management snap-in to create a new user account,
which check box do you select to prevent a new employee from using the new
account until the employee starts working for the company?
Lesson Summary
■
The User Accounts tool allows administrators to create a new user account,
change an existing account, and change the way a user logs on or logs off. The
two check boxes that control the way users log on and log off the computer, Use
The Welcome Screen and Use Fast User Switching, are available only on computers that are workgroup members and apply to all users. You cannot configure
them for individual local user accounts.
■
The Computer Management snap-in allows you to create, modify, and delete user
accounts for the local computer on which you are working. If your computer is
part of a network, you can use the Computer Management snap-in on a remote
computer. The Computer Management snap-in provides all the functionality of the
User Accounts tool and additional functionality, including the ability to view all
accounts in the local security database and to disable accounts.
7-28
Chapter 7
Setting Up and Managing User Accounts
Lesson 4: Configuring Properties for User Accounts
Windows XP Professional creates a set of default account properties for each local user
account. After you create a local user account, you can configure the account properties by using the Computer Management snap-in. The account properties are grouped
under three tabs in the Properties dialog box for a user account: General, Member Of,
and Profile.
After this lesson, you will be able to
■ Configure general properties for user accounts by using the General tab
■ Add a user account to groups by using the Members tab
■ Configure a user profile by using the Profile tab
Estimated lesson time: 30 minutes
The General Tab
The General tab in the Properties dialog box for a user account (shown in Figure 7-8)
allows you to configure or edit all the fields from the New User dialog box except User
Name, Password, and Confirm Password. In addition, it provides an Account Is Locked
Out check box.
F07us08
Figure 7-8 Configure basic user properties by using the General tab of the Properties dialog box for
a user account.
If the account is active and is not locked out of the system, the Account Is Locked Out
check box is unavailable. The system locks out a user who exceeds the limit for the
number of failed logon attempts. This security feature makes it more difficult for an
unauthorized user to break into the system by guessing passwords. If the system locks
Lesson 4
Configuring Properties for User Accounts
7-29
out an account, the Account Is Locked Out check box becomes available, and an
administrator can clear the check box to allow user access. You will learn more about
account lockout in Chapter 16.
The Member Of Tab
The Member Of tab in the Properties dialog box for a user account allows you to add
the user account to or remove the user account from a group. For information about
groups, see Lesson 5, “Implementing Groups.”
The Profile Tab
The Profile tab in the Properties dialog box for a user account allows you to enter a
path for the user profile, the logon script, and home folder (shown in Figure 7-9).
F07us09
Figure 7-9
Configure user profiles, logon scripts, and home folders by using the Profile tab.
User Profile
A user profile is a collection of folders and data that stores your current desktop environment, application settings, and personal data. It also contains all the network connections that are established when you log on to a computer, such as Start menu items
and drives mapped to network servers. The user profile maintains consistency by providing the same desktop environment every time you log on to the computer.
Windows XP Professional creates a user profile the first time you log on to a computer
and stores it on that computer. This user profile is also known as a local user profile.
User profiles on client computers running Windows XP Professional operate in the following way:
7-30
Chapter 7
Setting Up and Managing User Accounts
■
User profiles are stored locally in a subfolder of the Documents And Settings
folder. The subfolder has the same name as the user account and contains important user folders, such as My Documents, Favorites, and Desktop. The user profile
folder also stores application data and Windows settings pertinent to the user.
■
When you log on the client computer, you always receive your desktop settings
and connections, regardless of how many users share the same client computer.
■
The first time you log on to the client computer, Windows XP Professional creates
a default user profile for you. The default user profile is stored in the
system_partition_root\Documents and Settings\user_logon_name folder (typically
C:\Documents and Settings\user_logon_name), where user_logon_name is the
name you enter when logging on to the system.
■
The user profile contains the My Documents folder, which provides a place to
store personal files. My Documents is the default location for the File Open and
Save As commands. My Documents appears on the Start menu, which makes it
easier to locate personal documents.
Important
Users can store their documents in My Documents or in home folders, such as a
home directory that is located on a network server. Home folders are covered later in this lesson. Windows XP Professional automatically sets up My Documents as the default location for
storing data for Microsoft applications. If there is adequate room on drive C or the drive where
Windows XP Professional was installed, users can store their documents in My Documents.
However, using My Documents to store personal data greatly increases the amount of space
required on a hard disk for installing Windows XP Professional well beyond the minimum.
■
You can change your user profile by changing desktop settings. For example, if
you make a new network connection or add a file to My Documents, Windows XP
Professional incorporates the changes into your user profile when you log off. The
next time you log on, the new network connection and the file are present.
Logon Script
A logon script is a file that you can create and assign to a user account to configure the
user’s working environment. For example, you can use a logon script to establish network connections or start applications. Each time a user logs on, the assigned logon
script is run.
Home Folder
In addition to the My Documents folder, Windows XP Professional allows you to create
home folders for users to store their personal documents. You can store a home folder
on a client computer, in a shared folder on a file server, or in a central location on a
network server.
Lesson 4
Configuring Properties for User Accounts
7-31
Storing all home folders on a file server provides the following advantages:
■
Users can access their home folders from any client computer on the network.
■
You can centralize backing up and administering user documents by moving the
responsibility for backing up and managing the documents out of the hands of the
users and into the hands of one of the network backup operators or network
administrators.
Note
The home folders are accessible from a client computer running any Microsoft operating system, including MS-DOS, Windows 95, Windows 98, Windows 2000 Professional, and
Windows XP Professional.
Important
Store home folders on an NTFS volume so that you can use NTFS permissions
to control access to user documents. If you store home folders on a file allocation table (FAT)
volume, you can restrict home folder access only by using shared folder permissions.
To create a home folder on a network file server, complete the following steps:
1. Create and share a folder for storing all users’ home folders on a network server.
The home folder for each user will reside in this shared folder.
2. For the shared folder, remove the default Full Control permission from the Everyone group and assign Full Control to the Users group.
This ensures that only users with domain user accounts can access the shared
folder.
3. In the Properties dialog box for the user account, on the Profile tab, click Connect
and select or type a drive letter with which to connect to the user account home
folder on the network.
4. In the To text box, type a Universal Naming Convention (UNC) name (\\server_
name\shared_folder_name\user_logon_name).
Type the username variable as the user’s logon name to automatically give each
user’s home folder the user logon name (for example, \\server_name\Users\
%username%). Naming a folder on an NTFS volume with the username variable
assigns the NTFS Full Control permission to the user and removes all other permissions for the folder, including those for the Administrator account.
To configure User Account properties, complete the following steps:
7-32
Chapter 7
Setting Up and Managing User Accounts
1. Click Start, point to All Programs, point to Administrative Tools, and click Computer Management.
2. Under System Tools, expand Local Users And Groups, and then click Users.
3. In the details pane, right-click the appropriate user account and then click Properties.
4. Click the appropriate tab for the properties that you want to configure or modify,
and then enter a value for each property.
Practice: Modifying User Account Properties
This practice presents exercises that allow you to modify user account properties and
test them.
1. Log on with a user account that is a member of the Administrators group.
2. Click Start, click Run, type mmc and then click OK.
The MMC starts and displays an empty console.
3. On the File menu, click Computer Management Local.
4. Expand Local Users And Groups, and then click Users.
The MMC displays the user accounts in the details pane.
5. Right-click User1, and then click Properties.
6. In the User1 Properties dialog box, on the General tab, select User Cannot Change
Password, and then clear all other check boxes.
Tip
When you select the User Cannot Change Password check box, the User Must Change
Password At Next Logon option is unavailable.
7. Click OK to close the User1 Properties dialog box.
8. Right-click User2, and then click Properties.
9. In the User2 Properties dialog box, on the General tab, select the Account Is Disabled check box and clear all other check boxes.
10. Click OK to close the User2 Properties dialog box.
11. Close the Computer Management window, and if you are prompted about saving
the console settings, click No.
12. Log off the computer.
Lesson 4
Configuring Properties for User Accounts
7-33
13. On the Welcome screen, click User1.
14. In the Type Your Password dialog box, click the question mark icon for your password hint.
Windows XP Professional displays the password hint you entered.
15. In the Type Your Password text box, type password and then press ENTER.
16. In the Control Panel, click User Accounts.
Windows XP Professional starts the User Accounts tool.
17. Click Change My Password.
18. In the Type Your Current Password text box, type password.
19. In the Type A New Password and Type The New Password Again To Confirm text
boxes, Type User1.
20. Click Change Password.
21. What happens? Why?
22. Log off as User1.
Notice that disabled accounts such as User2 do not appear on the Welcome
screen.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. When can you select the Account Is Locked Out check box for a user and why?
7-34
Chapter 7
Setting Up and Managing User Accounts
2. Which of the following statements about local user account properties are correct?
(Choose all that apply.)
a. You can configure all of the default properties associated with each local user
account using the User Accounts tool located in the Control Panel.
b. In Computer Management, the General tab in a user account’s Properties dialog box allows you to disable the account.
c. In Computer Management, the General tab in a user account’s Properties dialog box allows you to select the Account Is Locked Out check box to prevent
the user from logging on to the computer.
d. You can use the Computer Management snap-in to configure all of the default
properties associated with each local user account.
3. Which of the following statements about user profiles are correct? (Choose all that
apply.)
a. A user profile is a collection of folders and data that stores the user’s current
desktop environment, application settings, and personal data.
b. A user profile contains all the network connections that are established when
a user logs on to a computer.
c. Windows XP Professional creates a user profile when you create a new local
user account.
d. You must create each user profile by copying and modifying an existing user
profile.
4. Which of the following statements about user profiles are correct? (Choose all that
apply.)
a. Users should store their documents in home directories rather than in their
My Documents folders.
b. The Profile tab in the account-name Properties dialog box for a user account
allows you to create a path for the user profile, logon script, and home folder.
c. A user profile contains the My Documents folder, which provides a place for
users to store personal files.
d. When users change their desktop settings, the changes are reflected in their
user profiles.
Lesson 4
Configuring Properties for User Accounts
7-35
5. What three tasks must you perform to create a home folder on a network server?
Lesson Summary
■
The General tab in a user account’s Properties dialog box allows you to configure
or edit all the fields from the New User dialog box except for User Name, Password, and Confirm Password. In addition, it provides an Account Is Locked Out
check box.
■
The Member Of tab in a user account’s Properties dialog box allows you to add
the user account to or remove the user account from a group.
■
The Profile tab in a user account’s Properties dialog box for a user account allows
you to create a path for the user profile, logon script, and home folder.
7-36
Chapter 7
Setting Up and Managing User Accounts
Lesson 5: Implementing Groups
In this lesson, you will learn what groups are and how you can use them to simplify
user account administration. You will also learn about built-in groups, which have a
predetermined set of user rights and group membership, and about special groups,
which you cannot add members to yourself but for which Windows creates memberships dynamically. Windows XP Professional has two categories of built-in groups,
local and system, which it creates for you to simplify the process of assigning rights and
permissions for commonly used functions.
After this lesson, you will be able to
■ Explain the purpose of a group
■ Identify guidelines for using local groups
■ Create a local group
■ Add members to a local group
■ Delete a local group
■ Identify the built-in local groups
■ Identify the built-in system groups
Estimated lesson time: 40 minutes
What Is a Group?
A group is a collection of user accounts. Groups simplify administration by allowing
you to assign permissions and rights to a group of users rather than to each user
account individually (shown in Figure 7-10).
Permissions control what users can do with a resource such as a folder, a file, or a
printer. When you assign permissions, you allow users to gain access to a resource and
you define the type of access that they have. For example, if several users need to read
the same file, you can add their user accounts to a group and then give the group permission to read the file. Rights allow users to perform system tasks, such as changing
the time on a computer and backing up or restoring files.
See Also For more information about permissions, see Chapter 8, “Securing Resources
with NTFS Permissions.” For more information about rights, see Chapter 16.
Lesson 5
Assign permissions
once for a group
- instead of -
Implementing Groups
7-37
Assign permissions for
each user account
permissions
permissions
User
Group
Resources
permissions
User
permissions
User
• Groups are collections of user accounts.
• Members receive permissions given to groups.
• Users can be members of multiple groups.
• Groups can be members of other groups.
F07us10
Figure 7-10
Groups simplify administration.
Guidelines for Using Local Groups
A local group is a collection of user accounts on a computer. Use local groups to assign
permissions to resources residing on the computer on which the local group is created.
Windows XP Professional creates local groups in the local security database.
Guidelines for using local groups include the following:
■
Before creating a new group, determine whether a built-in group (or other existing group) fits your needs. For example, if all users need access to a resource, use
the built-in Users group.
■
Use local groups on computers that do not belong to a domain. You can use local
groups only on the computer on which you create them. Although local groups
are available on member servers and domain computers running Windows 2000
Server or later, do not use local groups on computers that are part of a domain.
Using local groups on domain computers prevents you from centralizing group
administration. Local groups do not appear in the Active Directory service, and
you must administer them separately for each computer.
■
You can assign permissions to local groups to access only the resources on the
computer on which you create the local groups.
Note You cannot create local groups on domain controllers because domain controllers
cannot have a security database that is independent of the database in Active Directory.
7-38
Chapter 7
Setting Up and Managing User Accounts
Membership rules for local groups include the following:
■
Local groups can contain local user accounts from the computer on which you
create the local groups.
■
Local groups cannot belong to any other group.
How to Create Local Groups
Use the Computer Management snap-in to create local groups in the Groups folder.
To create a local group, complete the following steps:
1. In Computer Management, expand Local Users And Groups.
2. Right-click Groups, and then click New Group.
The MMC displays the New Group dialog box (shown in Figure 7-11). Table 7-5
describes the available options.
F07us11
Figure 7-11 Create a new group using the Computer Management snap-in.
3. Enter the appropriate information, and then click Create.
Table 7-5
New Local Group Options
Option
Description
Group Name
Requires a unique name for the local group. This is the only required
entry. Use any character except for the backslash (\). The name can
contain up to 256 characters, but very long names might not display in
some windows.
Description
Describes the group.
Lesson 5
Table 7-5
Implementing Groups
7-39
New Local Group Options
Option
Description
Members
Lists the user accounts belonging to the group.
Add
Adds a user to the list of members.
Remove
Removes a user from the list of members.
Create
Creates the group.
Close
Closes the New Group dialog box.
How to Add Members to a Local Group
You can add members to a local group when you create the group by clicking Add in
the New Group dialog box. In addition, Windows XP Professional provides two methods for adding members to a group that has already been created: by using the Properties dialog box of the group or by using the Member Of tab in the Properties dialog
box for a user account.
To add members to a group by using the Properties dialog box of the group, follow
these steps:
1. Start the Computer Management snap-in.
2. Expand Local Users And Groups, and then click Groups.
3. In the details pane, right-click the appropriate group and then click Properties.
Computer Management displays Properties dialog box for the group.
4. Click Add.
Computer Management displays the Select Users dialog box, as shown in Figure 7-12.
F07us12
Figure 7-12
Type a user name in the Select Users dialog box.
7-40
Chapter 7
Setting Up and Managing User Accounts
5. In the From This Location text box, ensure that the computer on which you created the group is selected.
6. In the Select Users dialog box, in the Enter The Object Names To Select text box,
type the user account names that you want to add to the group, separated by
semicolons, and then click OK.
Tip
The Member Of tab in Properties dialog box of a user account allows you to add a user
account to multiple groups. Use this method to quickly add the same user account to multiple
groups.
How to Delete Local Groups
Use the Computer Management snap-in to delete local groups. Each group that you
create has a unique identifier that cannot be used again. Windows XP Professional uses
this value to identify the group and its assigned permissions. When you delete a group,
Windows XP Professional does not use the identifier again, even if you create a new
group with the same name as the group that you deleted. Therefore, you cannot
restore access to resources by re-creating the group.
When you delete a group, you remove only the group and its associated permissions
and rights. Deleting a group does not delete the user accounts that are members of the
group. To delete a group, right-click the group name in the Computer Management
snap-in and then click Delete.
Built-In Local Groups
All computers running Windows XP Professional have built-in local groups. These
groups give rights to perform system tasks on a single computer, such as backing up
and restoring files, changing the system time, and administering system resources. Windows XP Professional places the built-in local groups in the Groups folder in Computer
Management.
Table 7-6 lists the most commonly used built-in local groups and describes their capabilities. Except where noted, these groups do not include initial members.
Lesson 5
Table 7-6
Implementing Groups
7-41
Built-In Local Group Capabilities
Local Group
Description
Administrators
Members can perform all administrative tasks on the computer. By default,
the built-in Administrator account is a member. When a member server or
a computer running Windows XP Professional joins a domain, the domain
controller adds the Domain Admins group to the local Administrators
group.
Backup Operators
Members can use Windows Backup to back up and restore the computer.
Guests
Members can do the following:
Perform only the tasks for which they have been specifically
granted rights
■ Access only those resources for which they have assigned
permissions
■
Members cannot make permanent changes to their desktop environment.
By default, the built-in Guest account is a member. When a member
server or a computer running Windows XP Professional joins a domain,
the domain controller adds the Domain Guests group to the local Guests
group.
Power Users
Members can create and modify local user accounts on the computer and
share resources.
Replicator
Supports file replication in a domain.
Users
Members can do the following:
Perform only the tasks for which they have been specifically
granted rights
■ Access only those resources for which they have assigned permissions
■
By default, Windows XP Professional adds to the Users group all local
user accounts that an administrator creates on the computer. When a
member server or a computer running Windows XP Professional joins a
domain, the domain controller adds the Domain Users group to the local
Users group.
7-42
Chapter 7
Setting Up and Managing User Accounts
Built-In System Groups
Built-in system groups exist on all computers running Windows XP Professional. System groups do not have specific memberships that you can modify; instead, they represent different users at different times, depending on how a user gains access to a
computer or resource. You do not see system groups when you administer groups, but
they are available when you assign rights and permissions to resources. Windows XP
Professional bases system group membership on how the computer is accessed, not on
who uses the computer. Table 7-7 lists the most commonly used built-in system groups
and describes their capabilities.
Table 7-7
Built-In System Group Capabilities
System Group
Description
Everyone
All users who access the computer. By default, when you format a volume
with NTFS, the Full Control permission is assigned to the Everyone group.
This presented a problem in earlier versions of Windows, including Windows
2000. In Windows XP Professional, the Anonymous Logon is no longer
included in the Everyone group. When a Windows 2000 Professional system
is upgraded to a Windows XP Professional system, resources with permission
entries for the Everyone group and not explicitly for the Anonymous Logon
group are no longer available to the Anonymous Logon group.
Authenticated
Users
All users with valid user accounts on the computer. (If your computer is part
of a domain, it includes all users in Active Directory.)
Creator Owner
The user account for the user who created or took ownership of a resource.
If a member of the Administrators group creates a resource, the Administrators group owns the resource.
Network
Any user with a current connection from another computer on the network
to a shared resource on the computer.
Interactive
The user account for the user who is logged on at the computer. Members of
the Interactive group can access resources on the computer at which they are
physically located. They log on and access resources by “interacting” with the
computer.
Anonymous
Logon
Any user account that Windows XP Professional cannot authenticate.
Dialup
Any user who currently has a dial-up connection.
Practice: Creating and Managing Local Groups
In this practice, you create two local groups, and then add members to the local groups
after you create them. You delete a member from one of the groups, and then delete
one of the local groups that you created.
Lesson 5
Implementing Groups
7-43
Exercise 1: Creating Local Groups
In this exercise, you create two local groups, Accounting and Marketing.
1. Log on with a user account that is a member of the Administrators group.
2. Click Start, point to All Programs, point to Administrative Tools, and then click
Computer Management.
Windows XP Professional starts Computer Management.
3. Under System Tools, if necessary, expand Local Users And Groups, right-click
Groups, and then click New Group.
4. In the New Group dialog box, in the Group Name text box, type Accounting.
5. In the Description text box, type Access to Accounts Receivable Files.
6. Click Add.
7. In the Select Users dialog box, in the Name text box, type User1; User2; User4
and then click OK.
User1, User2, and User4 appear in the Members list in the New Group dialog box.
8. Click Create.
Windows XP Professional creates the group and adds it to the list of groups in the
details pane. Notice that the New Group dialog box is still open and might block
your view of the list of groups.
9. Repeat steps 4 through 8 to create a group named Marketing with a description of
Access To Mailing Lists and User2 and User4 as group members.
10. When you finish creating both the Accounting and the Marketing groups, click
Close to close the New Group dialog box.
The Accounting and the Marketing groups now appear in the details pane.
Exercise 2: Adding and Removing Members
In this exercise, you add members to both groups that you created in the previous
exercise. You add a member to the existing Marketing group, and then remove a member from the Marketing group.
1. In the details pane of the Computer Management window, double-click Marketing.
The Marketing Properties dialog box displays the properties of the group. Notice
that User2 and User4 are in the Members list.
2. To add a member to the group, click Add.
Computer Management displays the Select Users dialog box.
7-44
Chapter 7
Setting Up and Managing User Accounts
3. In the Name text box, type User1, and then click OK.
The Marketing Properties dialog box now displays User1, User2, and User4 in the
Members list.
4. Select User4, and then click Remove.
Notice that User4 is no longer in the Members list. User4 still exists as a local user
account, but it is no longer a member of the Marketing group.
5. Click OK.
Exercise 3: Deleting a Local Group
1. In the details pane of the Computer Management window, right-click Marketing,
and then click Delete.
Computer Management displays a Local Users And Groups dialog box asking
whether you are sure that you want to delete the group.
2. Click Yes.
Marketing is no longer listed in the details pane indicating that the Marketing
group was successfully deleted.
3. In the console pane of the Computer Management window, click Users.
User1 and User2 are still listed in the details pane indicating that the group was
deleted, but the members of the group were not deleted from the Users folder.
4. Close Computer Management.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What are groups, and why do you use them?
2. An administrator or owner of a resource uses __________________ to control what
users can do with a resource such as a folder, a file, or a printer.
3. You use local groups to assign permissions to resources residing _______________
_____________________________________.
Lesson 5
Implementing Groups
7-45
4. Which of the following statements about deleting local groups are correct?
(Choose all that apply.)
a. Each group that you create has a unique identifier that cannot be reused.
b. You can restore access to resources by re-creating the group.
c. When you delete a group, you also remove the permissions and rights associated with it.
d. Deleting a group deletes the user accounts that are members of the group.
5. What is the difference between built-in system groups and built-in local groups
found on computers running Windows XP Professional? Give at least two examples of each type of group.
Lesson Summary
■
Groups simplify administration by allowing you to assign permissions and rights
to a group of users rather than to individual user accounts. Permissions control
what users can do with a resource such as a folder, file, or printer. Rights allow
users to perform system tasks, such as changing the time on a computer and backing up or restoring files.
■
Windows XP Professional creates local groups in the local security database, so
you can use local groups only on the computer on which you create them.
■
You can use the Computer Management snap-in to create, add members to, and
delete local groups.
■
All computers running Windows XP Professional have built-in local groups that
give rights to perform system tasks on a single computer.
■
Computers running Windows XP Professional also have built-in system groups
whose membership is determined dynamically.
7-46
Chapter 7
Setting Up and Managing User Accounts
Case Scenario Exercise
In this exercise, you will read a scenario about creating users and groups and then
answer the questions that follow. If you have difficulty completing this work, review
the material in this chapter before beginning the next chapter. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
Scenario
You are an administrator working for the Baldwin Museum of Science. The museum
has hired a number of temporary workers that will be researching information for a
new exhibit on the history of coal use in northern Europe. Each of these workers has
been assigned a workstation in a small workgroup that the museum has set up in the
exhibit room. One computer in the workgroup is acting as a file server where the
workers will store their research files. All workstations and the file server are running
Windows XP Professional.
The temporary researchers’ names are as follows:
■
Cat Francis
■
David Jaffe
■
Mary North
■
Jeff Teper
■
Bernhard Tham
Questions
1. Your first task is to create a naming convention for these workers. The museum
management would like the user names to reflect that these are temporary workers, but not require too complicated a user name for the workers to type. Use the
following table to create names for the workers.
Full Name
Cat Francis
David Jaffe
Mary North
Jeff Teper
Bernhard Tham
User Account Name
Troubleshooting Lab
7-47
2. Where should you create these user names?
3. The file server in the workgroup contains a folder named Coal Research, to which
each of the workers needs access. You would like to minimize the number of
times you have to assign permissions to the Research folder. How would you do
this?
4. When creating passwords for the users on their workstations, what must you
ensure so that the users can access the file server?
Troubleshooting Lab
You are working as an administrator for Tailspin Toys, a manufacturer of remote-controlled airplanes. Raymond, one of your junior administrators, tells you that he received
a call from Martin, a user in the Sales department, who shares a workstation with two
other users. Martin complained to Raymond that he had forgotten the password for his
local user account and could not log on to his computer. Raymond intended to use Computer Management to reset Martin’s password, but accidentally deleted the user account
instead. He says that he clicked Yes in the dialog box that warned him about the deletion, thinking that the message was warning him about resetting the password instead.
7-48
Chapter 7
Setting Up and Managing User Accounts
1. Martin’s user account was assigned permissions to access a number of resources on
the computer and Raymond is not sure exactly what permissions were assigned. He
wants to recover the deleted user account. Can he do this? If so, how?
2. If you really mean to delete the user account, what is often a better way to handle
the situation than simply deleting the user account?
3. To prevent a situation like the one that happened with Raymond (in which rights and
permissions to resources were assigned directly to Martin’s user account and were
thus difficult to reconstruct), what is a better way to assign rights and permissions?
4. Soon after creating a new user account for Martin, Raymond contacts you and tells
you that Martin has forgotten his new password. Can you reset his password? How?
5. What should you tell Martin to do so that he can recover his own password should
this happen again?
Exam Highlights
7-49
Chapter Summary
■
Local user accounts allow users to log on at and access resources on only the computer on which you create the local user account. Domain user accounts allow
users to log on to the domain and access resources anywhere on the network.
■
Local user account names must be unique on the computer on which you create
the account, and domain user accounts must be unique to the directory. Passwords can be up to 128 characters long; a minimum of 8 characters is recommended. Use a mixture of uppercase and lowercase letters, numerals, and valid
nonalphanumeric characters in creating passwords.
■
You can administer local user accounts using the following two tools:
❑
The User Accounts tool allows administrators to create a new user account,
change an existing account, and change the way a user logs on or logs off.
❑
The Computer Management snap-in allows you to create, modify, and delete
user accounts for the local computer on which you are working. If your computer is part of a network, you can use the Computer Management snap-in on
a remote computer.
■
After creating a user account, you can modify the properties for the account by
using the Properties dialog box for the user account in Computer Management.
■
Groups simplify administration by allowing you to assign permissions and rights
to a group of users rather than to individual user accounts. Windows XP Professional creates local groups in the local security database, so you can use local
groups only on the computer on which you create them.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
A domain does not recognize local user accounts, so do not create local user
accounts on computers running Windows XP Professional that are part of a
domain. Doing so restricts users from accessing resources in the domain and prevents the domain administrator from administering the local user account properties or assigning access permissions for domain resources.
■
Allow Guest access only in low-security workgroups, and always assign a password to the Guest account. You can rename the Guest account, but you cannot
delete it.
7-50
Chapter 7
Setting Up and Managing User Accounts
■
You should understand the guidelines for creating strong passwords. In particular,
remember that a password should be a minimum of eight characters and should
include a mix of uppercase and lowercase letters, numbers, and symbols.
■
After you delete a user account, there is no way to recover the rights and permissions associated with that user account. A better practice than deleting user
accounts is to disable them until you are sure they are no longer needed.
Key Terms
Computer Management A console that provides access to a number of management utilities for administering a computer, including the ability to create, manage,
and monitor shared folders.
domain user account An account that allows you to log on to a domain to access
network resources.
group A collection of user accounts. Groups simplify administration by allowing you
to assign permissions and rights to a group of users rather than to each user
account individually.
local security database A database on a computer running Windows XP Professional that holds local user accounts and groups.
local user account An account that allows you to log on to a specific computer to
access resources on that computer.
naming convention
An organization’s established standard for identifying users.
password reset disk A floppy disk that contains encrypted password information
and allows users to change their password without knowing the old password.
Permissions Permissions control what users can do with a resource such as a folder,
a file, or a printer.
Rights Rights allow users to perform system tasks, such as changing the time on a
computer and backing up or restoring files.
user profile A collection of folders and data that stores your current desktop environment, application settings, and personal data.
Questions and Answers
7-51
Questions and Answers
Lesson 1 Review
Page
7-7
1. Where do local user accounts allow users to log on and gain access to resources?
Only on the computer on which the local user account is created.
2. Where should you create user accounts for computers running Windows XP Professional that are part of a domain?
You should create it on one of the domain controllers. You should not use local user accounts
on Windows XP Professional computers that are part of a domain.
3. Which of the following statements about domain user accounts are correct?
(Choose all that apply.)
a. Domain user accounts allow users to log on to the domain and gain access to
resources anywhere on the network, as long as the users have the required
access permissions.
b. If at least one computer on the network is configured as a domain controller,
you should use domain user accounts only.
c. The domain controller replicates the new user account information to all
other computers in the domain.
d. A new domain user account is established in the local security database on
the domain controller on which you created the account.
The correct answers are A and B. C is not correct because the domain controller replicates user
account information only to other domain controllers in a domain—not to every computer. D is
not correct because a domain user account is established in Active Directory, not in the local
security database. A local user account is established in the local security database.
4. Which of the following statements about built-in accounts are correct? (Choose all
that apply.)
a. You can delete the Guest account.
b. You cannot delete the Administrator account.
c. You cannot rename the Guest account.
d. You can rename the Administrator account.
The correct answers are B and D. A is not correct because you cannot delete the Guest account
(or any built-in local user accounts, for that matter). C is not correct because you can rename
the Guest account.
7-52
Chapter 7
Setting Up and Managing User Accounts
5. How do you disable the Guest account?
Click Start, click Control Panel, and then click User Accounts. In the User Accounts window,
click the Guest icon. In the What Do You Want To Change About The Guest Account window,
click Turn Off The Guest Account. The Guest Account is now disabled.
Lesson 2 Review
Page
7-12
1. The maximum number of characters that Windows XP Professional recognizes in
a local user account name is __________.
20
2. When are duplicate local user accounts valid in a network of computers running
Windows XP Professional?
They are valid as long as they are not on the same computer. In fact, in a workgroup, you must
create the same user account on each computer in the workgroup that you want the user to be
able to access.
3. Passwords can be up to ______ characters long with a minimum length of ______
characters recommended.
128, 8
Page
7-22
Lesson 3 Practice: Exercise 2
6. What two new options appear for User1’s account? What option is no longer available?
The list of changes you can make to the user’s account includes two new options: Change The
Password and Remove The Password. The Create A Password option is gone.
Lesson 3 Practice: Exercise 4
Page
7-23
1. What type of account is User3? (Get answer.)
The account type for User3 is Limited Account.
15. How does the password appear on the screen? Why?
The password is displayed as large dots as you type. This prevents others from viewing the
password as you type it.
23. What happens?
A Logon Message dialog box appears, informing you that you are required to change your password at first logon.
Lesson 3 Review
Page
7-26
1. Which of the following statements about the Windows XP Professional User
Accounts tool are correct? (Choose all that apply.)
Questions and Answers
7-53
a. The User Accounts tool allows you to remotely create, modify, and delete
user accounts on all computers in the network running Windows XP Professional.
b. The User Accounts tool allows you to view and modify all accounts on the
computer.
c. The tasks you can perform with the User Accounts tool depend on the type
of account you use to log on to the local computer.
d. The User Accounts tool allows users to delete, create, or remove their individual passwords.
The correct answers are C and D. A is not correct because you cannot use the User Accounts
tool to administer a remote computer. B is not correct because the User Accounts tool does not
allow you to administer certain built-in accounts.
2. Which of the following tasks can both account types (Computer Administrator and
Limited) perform? (Choose all that apply.)
a. Change your picture
b. Change your account type
c. Create, change, or remove your password
d. Change your account name
The correct answers are A and C. B and D are not correct because only computer administrators can change the account type and account name.
3. Which of the following statements about logging on or logging off a computer
running Windows XP Professional are true? (Choose all that apply.)
a. When you use the Welcome screen to log on the local computer, you can
quickly switch to another user account without logging off and closing all
programs that you are running.
b. The User Accounts tool allows you to disable a local user account to prevent
users from using the disabled account to log on.
c. When you use the Welcome screen to log on the local computer, you can log
on using only one of the accounts displayed on the Welcome screen.
d. The User Accounts tool allows you to replace the Welcome screen with a
logon prompt that requires users to type their individual user names and
passwords.
The correct answers are A and D. B is not correct because the User Accounts tool allows you
to disable the Guest account, but not to disable other user accounts. C is not correct because
you can press CTRL+ALT+DELETE at the Welcome screen to access the traditional logon dialog
box, which allows you to type in a user name.
7-54
Chapter 7
Setting Up and Managing User Accounts
4. When you use the Computer Management snap-in to create a new user account,
which check box do you select to prevent a new employee from using the new
account until the employee starts working for the company?
Account Disabled
Lesson 4 Practice: Modifying User Account Properties
Page
7-32
1. What happens? Why?
A User Accounts dialog box appears with the message Windows Cannot Change The Password.
This happens because you enabled the User Cannot Change Password option for User1.
Lesson 4 Review
Page
7-33
1. When can you select the Account Is Locked Out check box for a user and why?
Never because the Account Is Locked Out check box is unavailable when the account is active
and is not locked out of the system. The system locks out a user if the user exceeds the limit
for the number of failed logon attempts.
2. Which of the following statements about local user account properties are correct?
(Choose all that apply.)
a. You can configure all of the default properties associated with each local user
account using the User Accounts tool located in Control Panel.
b. In Computer Management, the General tab in a user account’s Properties dialog box allows you to disable the account.
c. In Computer Management, the General tab in a user account’s Properties dialog box allows you to select the Account Is Locked Out check box to prevent
the user from logging on to the computer.
d. You can use the Computer Management snap-in to configure all of the default
properties associated with each local user account.
The correct answers are B and D. A is not correct because the User Accounts tool only provides
a limited subset of the available options for a user account. You must use the Computer Management snap-in to access all options for a user account. C is not correct because you cannot
select the Account Is Locked Out check box manually. This check box is selected automatically
when an account is locked out.
3. Which of the following statements about user profiles are correct? (Choose all that
apply.)
a. A user profile is a collection of folders and data that stores the user’s current
desktop environment, application settings, and personal data.
b. A user profile contains all the network connections that are established when
a user logs on to a computer.
Questions and Answers
7-55
c. Windows XP Professional creates a user profile when you create a new local
user account.
d. You must create each user profile by copying and modifying an existing user
profile.
The correct answers are A and B. C is not correct because Windows XP does not create a user
profile when you create a user account, but rather the first time someone logs on using that
user account. D is not correct because a user profile is created automatically the first time a
person logs on with a user account.
4. Which of the following statements about user profiles are correct? (Choose all that
apply.)
a. Users should store their documents in home directories rather than in their
My Documents folders.
b. The Profile tab in the account-name Properties dialog box for a user account
allows you to create a path for the user profile, logon script, and home folder.
c. A user profile contains the My Documents folder, which provides a place for
users to store personal files.
d. When users change their desktop settings, the changes are reflected in their
user profiles.
The correct answers are B, C, and D. A is not correct because the My Documents folder is
located within a user’s home directory automatically when a home directory is created. Users
do not need to go looking for their home directory.
5. What three tasks must you perform to create a home folder on a network server?
First, create and share a folder in which to store all home folders on a network server. Second,
for the shared folder, remove the default Full Control permission from the Everyone group and
assign Full Control to the Users group for users that will reside in this shared folder. Third, provide the path to the user’s home folder in the shared home directory folder on the Profile tab of
the Properties dialog box for the user account.
Lesson 5 Review
Page
7-44
1. What are groups, and why do you use them?
A group is a collection of user accounts. A group simplifies administration by allowing you to
assign permissions and rights to a group of users rather than to each individual user account.
2. An administrator or owner of a resource uses __________________ to control what
users can do with a resource such as a folder, a file, or a printer.
Permissions
3. You use local groups to assign permissions to resources residing ______________
________________________________________.
On the computer on which the local group is created
7-56
Chapter 7
Setting Up and Managing User Accounts
4. Which of the following statements about deleting local groups are correct?
(Choose all that apply.)
a. Each group that you create has a unique identifier that cannot be reused.
b. You can restore access to resources by re-creating the group.
c. When you delete a group, you also remove the permissions and rights associated with it.
d. Deleting a group deletes the user accounts that are members of the group.
The correct answers are A and C. B is not correct because re-creating a group does not re-create the membership of that group or any of the rights or permissions associated with that
group. D is not correct because deleting a group does not delete the user accounts that are
members of the group. Deleting a group does remove any rights and permissions that were
extended to the members of the group by virtue of their membership.
5. What is the difference between built-in system groups and built-in local groups
found on computers running Windows XP Professional? Give at least two examples of each type of group.
Built-in local groups give rights to perform system tasks on a single computer, such as backing
up and restoring files, changing the system time, and administering system resources. Some
examples of built-in local groups are Administrators, Backup Operators, Guests, Power Users,
Replicator, and Users. Built-in system groups do not have specific memberships that you can
modify, but they can represent different users at different times, depending on how a user
gains access to a computer or resource. You do not see system groups when you administer
groups, but they are available for use when you assign rights and permissions to resources.
Some examples of built-in system groups are Everyone, Authenticated Users, Creator Owner,
Network, Interactive, Anonymous Logon, and Dialup.
Case Scenario Exercise
Page
7-46
1. Your first task is to create a naming convention for these workers. The museum
management would like the user names to reflect that these are temporary workers, but not require too complicated a user name for the workers to type. Use the
following table to create names for the workers.
Full Name
Cat Francis
David Jaffe
Mary North
Jeff Teper
Bernhard Tham
User Account Name
Questions and Answers
7-57
There are a number of ways you could create these user names. One way would be to use the
first initial and last name of each person to create the user name and then to prepend each
user name with a T to indicate the workers’ temporary status. This could give you the following
user names:
❑
T_cfrancis
❑
T_djaffe
❑
T_mnorth
❑
T_jteper
❑
T_btham
2. Where should you create these user names?
You must create a local user name for each user on the user’s workstation. You must also create a local user name for each user on the file server so that you can assign permissions.
3. The file server in the workgroup contains a folder named Coal Research, to which
each of the workers needs access. You would like to minimize the number of
times you have to assign permissions to the Research folder. How would you do
this?
You should create a local group on the file server. You should name the group something simple
like Coal Researchers and then add each of the workers’ user names to that group. You can
then assign permissions to the group for the Coal Research folder rather than assigning permissions to each user name.
4. When creating passwords for the users on their workstations, what must you
ensure so that the users can access the file server?
You must not create blank passwords for the users on their workstations. Although blank passwords would allow the users to log on to their workstations and access local resources, the
default security configuration on the file server is to enable the Accounts: Limit Local Account
Use Of Blank Passwords To Console Logon Only security setting, which would prevent users
with blank passwords from being able to access resources on the file server remotely.
Troubleshooting Lab
Page
7-47
1. Martin’s user account was assigned permissions to access a number of resources
on the computer and Raymond is not sure exactly what permissions were
assigned. He wants to recover the deleted user account. Can he do this? If so,
how?
After a user account is deleted, it cannot be recovered. All permissions and rights assigned to
the user account are lost.
7-58
Chapter 7
Setting Up and Managing User Accounts
2. If you really mean to delete the user account, what is often a better way to handle
the situation than simply deleting the user account?
It is usually better to disable the account instead of deleting it. When an account is disabled,
no user can log on by using it. If the account is needed again, you can re-enable it, and all rights
and permissions are retained. When you are sure that you no longer need a disabled account,
you can then delete it.
3. To prevent a situation like the one that happened with Raymond (in which rights and
permissions to resources were assigned directly to Martin’s user account and were
thus difficult to reconstruct), what is a better way to assign rights and permissions?
You should assign rights and permissions to local groups rather than directly to local user
accounts. You should then make the user accounts members of the appropriate groups. This
way, if a user account is accidentally deleted, you can create a new user account and place it
in the appropriate groups again, rather than having to reconstruct rights and permissions on
the user account. Using groups also helps to manage rights and permissions better in other situations, such as when a user no longer needs access to particular resources or when a new
user joins the company.
4. Soon after creating a new user account for Martin, Raymond contacts you and tells
you that Martin has forgotten his new password. Can you reset his password?
How?
Yes. You must log on to Martin’s computer and use the Computer Management snap-in (or use
the Computer Management snap-in remotely) to reset the password. You should also configure
Martin’s user account so that he must change the password the next time he logs on, so that
the password is known only to him.
5. What should you tell Martin to do so that he can recover his own password should
this happen again?
You should show Martin how to create a password reset disk.
8 Securing Resources with
NTFS Permissions
Exam Objectives in this Chapter:
■
Monitor, manage, and troubleshoot access to files and folders.
❑
Control access to files and folders by using permissions.
Why This Chapter Matters
This chapter introduces you to NT file system (NTFS) folder and file permissions
for Windows XP Professional. You will learn how to assign NTFS folder and file
permissions to user accounts and groups, and you will see how moving or copying files and folders affects NTFS file and folder permissions. You will also learn
how to troubleshoot common resource access problems.
Lessons in this Chapter:
■
Lesson 1: Introduction to NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . .8-2
■
Lesson 2: Assigning NTFS Permissions and Special Permissions . . . . . . . . . . . .8-8
■
Lesson 3: Supporting NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-23
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have
Microsoft Windows XP Professional installed on the computer.
8-1
8-2
Chapter 8
Securing Resources with NTFS Permissions
Lesson 1: Introduction to NTFS Permissions
You use NTFS permissions to specify which users and groups can access files and
folders and what they can do with the contents of the files or folders. NTFS permissions
are available only on NTFS volumes; they are not available on volumes formatted with
file allocation table (FAT) or FAT32 file systems. NTFS security is effective whether a
user accesses the file or folder at the local computer or over the network.
The permissions you assign for folders are different from the permissions you assign for
files. Administrators, the owners of files or folders, and users with Full Control permission
can assign NTFS permissions to users and groups to control access to files and folders.
After this lesson, you will be able to
■ Identify the standard NTFS folder permissions
■ Identify the standard NTFS file permissions
■ Describe how Windows XP Professional uses access control lists (ACLs)
■ Explain how effective permissions are calculated when multiple sets of NTFS permis-
sions are in effect
■ Explain how permissions inheritance is controlled
Estimated lesson time: 30 minutes
Standard NTFS Folder Permissions
You assign folder permissions to control the access that users have to folders and to the
files and subfolders that are contained within the folders. Table 8-1 lists the standard
NTFS folder permissions that you can assign and the type of access that each provides.
Table 8-1
NTFS Folder Permissions
This NTFS Folder
Permission
Allows the User To
Read
See files and subfolders in the folder and view folder permissions, and
attributes (such as Read-Only, Hidden, Archive, and System)
Write
Create new files and subfolders within the folder, change folder
attributes, and view folder ownership and permissions
List Folder Contents
See the names of files and subfolders in the folder
Read & Execute
Move through folders to reach other files and folders, even if the users
do not have permission for those folders, and perform actions permitted by the Read permission and the List Folder Contents permission
Modify
Delete the folder plus perform actions permitted by the Write
permission and the Read & Execute permission
Full Control
Change permissions, take ownership, and delete subfolders and files;
plus perform actions permitted by all other NTFS folder permissions
Lesson 1
Introduction to NTFS Permissions
8-3
You can deny permission to a user account or group. To deny all access to a user
account or group for a folder, deny the Full Control permission.
Standard NTFS File Permissions
You assign file permissions to control the access that users have to files. Table 8-2 lists
the standard NTFS file permissions that you can assign and the type of access that each
provides.
Table 8-2
NTFS File Permissions
This NTFS File
Permission
Allows the User to
Read
Read the file and view file attributes, ownership, and permissions
Write
Overwrite the file, change file attributes, and view file ownership and
permissions
Read & Execute
Run applications, plus perform the actions permitted by the Read
permission
Modify
Modify and delete the file, plus perform the actions permitted by the Write
permission and the Read & Execute permission
Full Control
Change permissions and take ownership, plus perform the actions
permitted by all other NTFS file permissions
How Windows XP Professional Uses Access Control Lists
NTFS stores an access control list (ACL) with every file and folder on an NTFS volume. The ACL contains a list of all user accounts and groups that have been assigned
permissions for the file or folder, as well as the permissions that they have been
assigned. When a user attempts to gain access to a resource, the ACL must contain an
entry, called an access control entry (ACE), for the user account or a group to which
the user belongs. The entry must allow the type of access that is requested (for example, Read access) for the user to gain access. If no ACE exists in the ACL, the user cannot access the resource.
How Effective Permissions Are Calculated When Multiple Sets of NTFS
Permissions Are in Effect
It is possible for multiple sets of NTFS permissions to apply to a user for a particular
resource. For example, a user might be a member of two different groups, each of
which is assigned different permissions to access a resource. To assign permissions
effectively, you must understand the rules and priorities by which NTFS assigns and
combines multiple permissions and NTFS permissions inheritance.
8-4
Chapter 8
Securing Resources with NTFS Permissions
What Are Effective Permissions?
A user’s effective permissions for a resource are the sum of the NTFS permissions
that you assign to the individual user account and to all the groups to which the user
belongs. If a user is granted Read permission for a folder and is a member of a group
with Write permission for the same folder, the user has both Read and Write permissions for that folder.
!
Exam Tip
To manually calculate effective NTFS permissions, first combine all allow permissions from all sources. Next, determine any deny permissions the user has. Deny permissions override allow permissions. The result is the user’s effective permissions for the
resource.
How File Permissions Override Folder Permissions
NTFS permissions assigned to files take priority over NTFS permissions assigned to the
folder that contains the file. If you have access to a file, you can access the file if you
have the Bypass Traverse Checking security permission—even if you do not have
access to the folder containing the file. You can access the files for which you have permissions by using the full Universal Naming Convention (UNC) or local path to open
the file from its respective application, even if you have no permission to access the
folder that contains the file. In other words, if you do not have permission to access the
folder containing the file you want to access, you must have the Bypass Traverse
Checking security permission and you have to know the full path to the file to access
it. Without permission to access the folder, you cannot see the folder, so you cannot
browse for the file.
See Also
The Bypass Traverse Checking security permission is described further in Lesson 2,
“Assigning NTFS Permissions and Special Permissions.”
How Deny Permissions Override Allow Permissions
In addition to granting a permission, you can also specifically deny a permission
(although this is not the recommended method of controlling access to resources).
Denying a permission overrides all instances in which that permission is allowed. Even
if a user has permission to access a file or folder as a member of a group, denying permission to the user blocks any other permissions the user might have (see Figure 8-1).
In Figure 8-1, User1 has Read permission for FolderA and is a member of Group A and
Group B. Group B has Write permission for FolderA. Group A has been denied Write
permission for File2.
Lesson 1
Group B
Introduction to NTFS Permissions
8-5
NTFS volume
Write
R/W
Folder A
File 1
User1
Read
File 2
Group A
Deny Write to File2
• NTFS permissions are cumulative.
• File permissions override folder permissions.
• Deny overrides other permissions.
F08us01
Figure 8-1
You must be able to calculate effective NTFS permissions.
The user can read and write to File1. The user can also read File2, but cannot write to
File2 because she is a member of Group A, which has been denied Write permission
for File2.
How NTFS Permissions Inheritance Is Controlled
By default, permissions that you assign to the parent folder are inherited by and propagated to the subfolders and files contained in the parent folder. However, you can
prevent permissions inheritance, as shown in Figure 8-2.
NTFS volume
R/W
Folder A
File A
Access to FileA
Inherit permissions
NTFS volume
R/W
Folder A
No access to FileA
File A
Prevent inheritance
F08us02
Figure 8-2
Files and folders inherit permissions from their parent folder.
8-6
Chapter 8
Securing Resources with NTFS Permissions
By default, whatever permissions you assign to the parent folder also apply to subfolders
and files contained within the parent folder. When you assign NTFS permissions to give
access to a folder, you assign permissions for the folder and for any existing files and subfolders, as well as for any new files and subfolders that are created in the folder.
You can prevent permissions that are assigned to a parent folder from being inherited
by subfolders and files that are contained within the folder. That is, you can change the
default inheritance behavior and cause subfolders and files to not inherit permissions
that have been assigned to the parent folder containing them.
The folder for which you prevent permissions inheritance becomes the new parent
folder. The subfolders and files contained within this new parent folder inherit the permissions assigned to it.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Which of the following statements correctly describe NTFS file and folder permissions? Choose all that apply.
a. NTFS security is effective only when a user gains access to the file or folder
over the network.
b. NTFS security is effective when a user gains access to the file or folder on the
local computer.
c. NTFS permissions specify which users and groups can gain access to files and
folders and what they can do with the contents of the file or folder.
d. NTFS permissions can be used on all file systems available with Windows XP
Professional.
2. Which of the following NTFS folder permissions allow you to delete the folder?
Choose the correct answer.
a. Read
b. Read & Execute
c. Modify
d. Administer
3. Which of the NTFS file permissions should you assign to a file if you want to allow
users to delete the file but do not want to allow users to take ownership of a file?
Lesson 1
Introduction to NTFS Permissions
8-7
4. What is an access control list (ACL), and what is the difference between an ACL
and an access control entry (ACE)?
5. What are a user’s effective permissions for a resource?
6. By default, what inherits the permissions that you assign to the parent folder?
Lesson Summary
■
NTFS folder permissions are Read, Write, List Folder Contents, Read & Execute,
Modify, and Full Control.
■
The NTFS file permissions are Read, Write, Read & Execute, Modify, and Full Control.
■
NTFS stores an ACL, which contains a list of all user accounts and groups that have
been granted access to the file or folder, as well as the type of access that they
have been granted, with every file and folder on an NTFS volume.
■
It is possible for multiple sets of NTFS permissions to apply to a user for a particular resource. A user’s effective permissions for a resource are the sum of the
NTFS permissions that you assign to the individual user account and to all the
groups to which the user belongs.
■
By default, permissions that you assign to the parent folder are inherited by and
propagated to the subfolders and files contained in the parent folder. However,
you can prevent permissions inheritance.
8-8
Chapter 8
Securing Resources with NTFS Permissions
Lesson 2: Assigning NTFS Permissions and Special
Permissions
You should follow certain guidelines for assigning NTFS permissions. Assign permissions according to group and user needs, which include allowing or preventing permissions to be inherited from parent folders to subfolders and files that are contained
in the parent folder.
After this lesson, you will be able to
■ Assign or modify NTFS folder and file permissions to user accounts and groups
■ Grant or deny special permissions
■ Take ownership of files and folders
■ Prevent permissions inheritance
■ Identify guidelines for planning NTFS permissions
Estimated lesson time: 70 minutes
How to Assign or Modify Permissions
Administrators, users with the Full Control permission, and owners of files and folders
can assign permissions to user accounts and groups.
To assign or modify NTFS permissions for a file or a folder, in the Security tab of the
Properties dialog box for the file or folder, configure the options that are shown in Figure 8-3 and described in Table 8-3.
Table 8-3
Security Tab Options
Option
Description
Group Or User Names
Allows you to select the user account or group for which you want to
change permissions or that you want to remove from the list.
Permissions For group
or user name
Allows and denies permissions. Select the Allow check box to allow a
permission. Select the Deny check box to deny a permission.
Add
Opens the Select Users Or Groups dialog box, which you use to
select user accounts and groups to add to the Group Or User Names
list (see Figure 8-4).
Remove
Removes the selected user account or group and the associated permissions for the file or folder.
Advanced
Opens the Advanced Security Settings dialog box for the selected folder
so that you can grant or deny special permissions (see Figure 8-5).
Lesson 2
Figure 8-3
Assigning NTFS Permissions and Special Permissions
8-9
Use the Security tab of the Properties dialog box for a folder to set NTFS permissions.
Clicking the Add button on the Security tab of a file or folder’s Properties dialog box
displays the Select Users Or Groups dialog box (see Figure 8-4). Use this dialog box to
add users or groups so that you can assign them permissions for accessing a folder or
file. The options available in the Select Users Or Groups dialog box are described in
Table 8-4.
F08us04
Figure 8-4
Table 8-4
Use the Select Users or Groups dialog box to add additional users and groups.
Select Users Or Groups Dialog Box Options
Option
Description
Select This Object
Type
Allows you to select the types of objects you want to look for, such as
built-in user accounts, groups, and computer accounts.
From This Location
Indicates where you are currently looking; for example, in the domain
or on the local computer.
Locations
Allows you to select where you want to look; for example, in the
domain or on the local computer.
8-10
Chapter 8
Table 8-4
Securing Resources with NTFS Permissions
Select Users Or Groups Dialog Box Options
Option
Description
Enter The Object
Names To Select
Allows you to type in a list of built-in users or groups to be added.
Check Names
Verifies the selected list of built-in users or groups to be added.
Advanced
Allows you access to advanced search features, including the ability to
search for deleted accounts, accounts with passwords that do not
expire, and accounts that have not logged on for a certain number of
days.
How to Grant or Deny Special Permissions
Click the Advanced button on the Security tab of a file or folder’s Properties dialog box
to display the Advanced Security Settings dialog box (shown in Figure 8-5), which lists
the users and groups and the permissions they have on this object. The Permissions
Entries box also shows where the permissions were inherited from and where they are
applied.
F08us05
Figure 8-5 Assign special permissions using the Permissions tab of the Advanced Security Settings dialog box.
You can use the Advanced Security Settings dialog box to change the permissions set
for a user or group. To change the permissions set for a user or group, select a user and
click Edit to display the Permission Entry For dialog box (see Figure 8-6). You can then
select or clear the specific permissions, explained in Table 8-5, that you want to
change.
Lesson 2
Assigning NTFS Permissions and Special Permissions
8-11
F08us06
Select special permissions by using the Permission Entry For dialog box.
Figure 8-6
Table 8-5
Special Permissions
Permission
Description
Full Control
Full Control applies all permissions to the user or group.
Traverse Folder/
Execute File
Traverse Folder is applied only to folders and allows a user to move (or
denies a user from moving) through folders even when the user has no permissions set on the traversed folder (the folder that the user is moving
through). For example, a user might not have permissions set on a folder
named Sales, but might have permission to access a subfolder named Brochures that is in the Sales folder. If allowed the Traverse Folder permission,
the user could access the Brochures folder. The Traverse Folder permission
has no affect on users for whom the Bypass Traverse Checking user right is
assigned.
Execute File is applied only to files and allows or denies running executable
files (application files). Execute File applies only to files.
List Folder/Read
Data
List Folder allows or denies viewing file names and subfolder names within
the folder. List Folder applies only to folders.
Read Data allows or denies viewing the contents of a file. Read Data applies
only to files.
Read Attributes
Read Attributes allows or denies the viewing of the attributes of a file or
folder. These attributes are defined by NTFS.
Read Extended
Attributes
Read Extended Attributes allows or denies the viewing of extended
attributes of a file or a folder. These attributes are defined by programs.
Create Files/
Write Data
Create Files allows or denies the creation of files within a folder. Create
Files applies to folders only.
Write Data allows or denies the making of changes to a file and the overwriting of existing content. Write Data applies to files only.
8-12
Chapter 8
Table 8-5
Securing Resources with NTFS Permissions
Special Permissions
Permission
Description
Create Folders/
Append Data
Create Folders allows or denies the creation of folders within the folder.
Create Folders applies only to folders.
Append Data allows or denies making changes to the end of the file, but
not changing, deleting, or overwriting existing data. Append Data applies to
files only.
Write Attributes
Write Attributes allows or denies the changing of the attributes of a file or
folder. These attributes are defined by NTFS.
Write Extended
Attributes
Write Extended Attributes allows or denies the changing of the extended
attributes of a file or a folder. These attributes are defined by programs.
Delete Subfolders Delete Subfolders And Files allows or denies the deletion of subfolders or
And Files
files within a folder, even if the Delete permission has not been granted on
the particular subfolder or file.
Delete
Delete allows or denies the deletion of a file or folder. A user can delete a
file or folder even without having the Delete permission granted on that file
or folder, if the Delete Subfolder And Files permission has been granted to
the user on the parent folder.
Read Permissions Read Permissions allows or denies the reading of the permissions assigned
to the file or folder.
Change Permissions
Change Permissions allows or denies the changing of the permissions
assigned to the file or folder. You can give other administrators and users
the ability to change permissions for a file or folder without giving them the
Full Control permission over the file or folder. In this way, the administrator
or user cannot delete or write to the file or folder, but can assign permissions to the file or folder.
Take Ownership Take Ownership allows or denies taking ownership of the file or folder. The
owner of a file can always change permissions on a file or folder, regardless
of the permissions set to protect the file or folder.
Synchronize
!
Exam Tip
Synchronize allows or denies different threads in a multithreaded program
to synchronize with one another. A multithreaded program performs multiple actions simultaneously by using both processors in a dual-processor
computer. This permission is not assigned to users, but instead applies only
to multithreaded programs.
When you grant permissions, grant users the minimum permissions that they
need to get their job done. This is referred to as the principle of least privilege.
Lesson 2
Assigning NTFS Permissions and Special Permissions
8-13
How to Take Ownership of Files and Folders
Every object (file or folder) on an NTFS volume has an owner who controls how permissions are set on the object and to whom permissions are granted. When a user creates an object, that user automatically becomes the object’s owner.
You can transfer ownership of files and folders from one user account or group to
another. You can give someone the ability to take ownership and, as an administrator,
you can take ownership of a file or folder.
The following rules apply for taking ownership of a file or folder:
■
The current owner or any user with Full Control permission can assign the Full
Control standard permission or the Take Ownership special access permission to
another user account or group, allowing the user account or any member of the
group to take ownership.
■
An administrator can take ownership of a folder or file, regardless of assigned permissions. If an administrator takes ownership, the Administrators group becomes
the owner, and any member of the Administrators group can change the permissions for the file or folder and assign the Take Ownership permission to another
user account or group.
For example, if an employee leaves the company, an administrator can take ownership
of the employee’s files and assign the Take Ownership permission to another
employee, and then that employee can take ownership of the former employee’s files.
Note
You cannot assign anyone ownership of a file or folder. The owner of a file, an administrator, or anyone with Full Control permission can assign Take Ownership permission to a
user account or group, allowing them to take ownership. To become the owner of a file or
folder, a user or group member with Take Ownership permission must explicitly take ownership of the file or folder.
To take ownership of a file or folder, the user or a group member with Take Ownership permission must explicitly take ownership of the file or folder, as follows:
1. In the Security tab of the Properties dialog box for the file or folder, click
Advanced.
2. In the Advanced Security Settings dialog box, in the Owner tab, in the Change
Owner To list, select your name.
3. Select the Replace Owner On Subcontainers And Objects check box to take ownership of all subfolders and files that are contained within the folder, and then
click OK.
8-14
Chapter 8
Securing Resources with NTFS Permissions
How to Prevent Permissions Inheritance
By default, subfolders and files inherit permissions that you assign to their parent
folder. This is indicated in the Advanced Security Settings dialog box (refer to Figure 85) when the Inherit From Parent The Permission Entries That Apply To Child Objects
check box is selected. To prevent a subfolder or file from inheriting permissions from
a parent folder, clear the check box. You are then prompted to select one of the
options described in Table 8-6.
Table 8-6
Preventing Permissions Inheritance Options
Option
Description
Copy
Copy the permission entries that were previously applied from the parent to the
child and then deny subsequent permissions inheritance from the parent folder.
Remove
Remove the permission entries that were previously applied from the parent to
the child and retain only the permissions that you explicitly assign here. Clicking
this button removes all permissions from the file or folder; if you do not grant
yourself permissions immediately afterward, you could lose access to the file. To
recover access to the file, you would need to take ownership.
Cancel
Cancel the dialog box.
Guidelines for Planning NTFS Permissions
If you take the time to plan your NTFS permissions and follow a few guidelines, you
will find that permissions are more straightforward to manage than you might imagine.
Use the following guidelines when you assign NTFS permissions:
■
To simplify administration, organize files into folders so that you can assign permissions to folders instead of directly to files.
■
Allow users only the level of access that they require. If a user only needs to read
a file, assign the Read permission to his or her user account for the file. This
reduces the possibility of users accidentally modifying or deleting important documents and application files.
■
Create groups according to the access that the group members require for
resources, and then assign the appropriate permissions to the group. Assign permissions to individual user accounts only when necessary.
■
When you assign permissions to application folders, assign the Read & Execute
permission to the Users group and the Administrators group. This prevents application files from being accidentally deleted or damaged by users or viruses.
■
When you assign permissions for public data folders, assign the Read & Execute
permission and the Write permission to the Users group and the Full Control permission to the CREATOR OWNER. By default, the user who creates a file is also
Lesson 2
Assigning NTFS Permissions and Special Permissions
8-15
the owner of the file. The owner of a file can grant another user permission to take
ownership of the file. This grants users the ability to read and modify documents
that other users create (and the ability to read, modify, and delete the files and
folders that they create).
■
Do not make denying permissions a part of your permissions plan. Deny permissions only when it is essential to deny specific access to a specific user account or
group.
■
Encourage users to assign permissions to the files and folders that they create and
teach them how to do so.
Real World Managing Permissions Structures
The availability of so many different permissions often lures administrators into
creating permission structures that are much more complicated than necessary. In
addition to following the guidelines set out in this chapter (such as applying permissions to folders instead of files, and assigning permissions to groups instead of
user accounts), you can make a permissions structure more manageable by doing
the following:
■
For most companies, you will want to err on the side of being too secure.
Make it a practice to lock everything down with permissions and then grant
access only to those that need it. Also, grant only the level of permission that
users need. It is often tempting to grant Full Control to users just to avoid
complaints from those users about not being able to perform tasks, but avoid
that temptation. On smaller networks, you might want to take an opposite
approach—one in which you allow access to everything and then secure
only those resources that need to be secured.
■
Document your security decisions and encourage users to do so, as well.
You should record which folders and files have which permissions, and
make notes on why you made the decision. Although it seems an extra burden (and does require more work upfront), this documentation is invaluable
when the time comes to change or troubleshoot the permissions structure.
Practice: Planning and Assigning NTFS Permissions
In this practice, you will plan NTFS permissions for folders and files based on a business scenario. Then you will apply NTFS permissions for folders and files on your computer running Windows XP Professional in a workgroup environment, based on a
second scenario. Finally, you will test the NTFS permissions that you set up to make
sure that they are working properly.
8-16
Chapter 8
Securing Resources with NTFS Permissions
Complete the following six exercises, and answer any questions that are asked. You
can find answers to these questions in the “Questions and Answers” section at the end
of this chapter.
Exercise 1: Preparing for This Practice
To prepare for subsequent exercises, log on with an account that is a member of the
Administrators group and create the Limited users listed in the following table.
User Account
Type
User81
Limited
User82
Limited
User83
Limited
User84
Limited
Create the following folders:
■
C:\Public
■
C:\Public\Library
Exercise 2: Determining the Default NTFS Permissions for a Folder
In this exercise, you determine the default NTFS permissions for the newly created
Public folder located on a computer running Windows XP Professional in a workgroup
environment.
1. Log on with a user account that is a member of the Administrators group.
2. On the Start menu, right-click My Computer, and then click Explore.
3. Expand Local Disk (C:), right-click the Public folder, and then click Properties.
4. In the Public Properties dialog box, on the Security tab, note the default groups
and users that have permissions for the Public folder.
Tip
If you do not see a Security tab, there are two things to check: Is your partition formatted as NTFS or FAT? Only NTFS partitions use NTFS permissions, so only NTFS partitions have
a Security tab. Are you using Simple File Sharing? Click Cancel to close the Public Properties
dialog box. On the Tools menu, click Folder Options. In the Folder Options dialog box, click
View. Under Advanced Settings, clear the Use Simple File Sharing (Recommended) check box
and click OK. Repeat Steps 3 and 4 and continue with this practice.
5. Click each user and group in the Group Or User Names list, noting the default permissions assigned to each.
Lesson 2
Assigning NTFS Permissions and Special Permissions
8-17
6. What are the existing folder permissions?
7. Click OK to close the Public Properties dialog box.
8. Close Windows Explorer and log off.
Exercise 3: Testing the Folder Permissions for the Public Folder
1. Log on as User81, and then start Windows Explorer.
2. Expand the Public folder.
3. In the Public folder, create a text document named USER81 and type in the following text: The first four letters in the alphabet are a, b, c, and d.
Tip
With the Public folder selected in the folder tree (the left pane), on the File menu, click
New, and then click Text Document to create the text document.
4. Were you successful? Why or why not?
5. Attempt to perform the following tasks for the file that you just created:
❑
Open the file
❑
Modify the file
❑
Delete the file
6. Were you able to complete all of these tasks and why?
7. In the Public folder, re-create the text file named User81.
8. Log off Windows XP Professional.
8-18
Chapter 8
Securing Resources with NTFS Permissions
9. Log on as User82 and attempt to perform the following tasks on the USER81 text
document:
❑
Open the file
❑
Modify the file
❑
Delete the file
10. Which tasks were you able to perform and why?
Exercise 4: Assigning NTFS Permissions
In this exercise, you assign NTFS permissions for the Public folder.
The permissions that you assign are to be based on the following criteria:
■
All users should be able to read documents and files in the Public folder.
■
All users should be able to create documents in the Public folder.
■
All users should be able to modify the contents, properties, and permissions of the
documents that they create in the Public folder.
■
User82 is responsible for maintaining the Public folder and should be able to modify and delete all files in the Public folder.
1. Based on what you learned in Exercise 1, what changes in permission assignments
do you need to make to meet each of these four criteria? Why?
Lesson 2
Assigning NTFS Permissions and Special Permissions
8-19
2. You are currently logged on as User82. Can you change the permissions assigned
to User82 while logged on as User82? Why or why not?
3. Log on with a user account that is a member of the Administrators group, and then
start Windows Explorer.
4. Expand the Public folder.
5. Right-click the Public folder, and then click Properties.
6. In the Properties dialog box for the folder, on the Security tab, click Add.
7. In the Select Users Or Groups dialog box, in the Enter The Object Names To Select
text box, type User82, and then click Check Names.
8. Computer_name\User82 should now appear in the Enter The Object Names To
Select text box, indicating that Windows XP Professional located User82 on the
computer and it is a valid user account. Click OK to close the Select Users Or
Groups dialog box.
9. User82 now appears in the Group Or User Name box in the Public Properties dialog box. Click User82 and note the assigned permissions.
10. Which permissions are assigned to User82?
11. Click Advanced.
12. In the Advanced Security Settings For Public dialog box, ensure that User82 is
selected, and then click Edit.
13. In the Permission Entry For Public dialog box (with User82 displayed in the Name
text box), in the Allow column, click Full Control.
14. Click OK to close the Permission Entry For Public dialog box.
15. Click OK to close the Advanced Security Settings For Public dialog box.
16. Click OK to close the Public Properties dialog box.
17. Close Explorer and log off Windows XP Professional.
8-20
Chapter 8
Securing Resources with NTFS Permissions
Exercise 5: Testing the New NTFS Permissions for the Folder
1. Log on as User82.
2. Start Windows Explorer.
3. Expand Local Disk (C:), and then expand the Public folder.
4. Attempt to perform the following tasks on the USER81 text document:
❑
Modify the file
❑
Delete the file
5. Which tasks were you able to record and why?
6. Close Windows Explorer and then log off Windows XP Professional.
Exercise 6: Testing NTFS Permissions
In this exercise, you create a file in a subfolder and test how NTFS permissions are
inherited through a folder hierarchy.
1. Log on as User81, and then start Windows Explorer.
2. In Windows Explorer, expand the Public\Library folder.
3. Create a text document named USER81 in the Library folder.
4. Log off Windows XP Professional.
5. Log on as User82, and then start Windows Explorer.
6. Expand the Public\Library folder.
7. Attempt to perform the following tasks on the USER81 file:
❑
Open the file
❑
Modify the file
❑
Delete the file
8. Which tasks were you able to perform and why?
9. Log off Windows XP Professional.
Lesson 2
Assigning NTFS Permissions and Special Permissions
8-21
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. By default, when you format a volume with NTFS, the ______________________
permission is assigned to the Everyone group. Fill in the blank.
2. When you assign permissions for public data folders, it is recommended that you
assign the ______________________ permission and the ____________________
permission to the Users group, and the ______________________ permission to
the CREATOR OWNER user. Fill in the blanks.
3. Which of the following users or groups can assign permissions to user accounts
and groups? Choose all that apply.
a. Administrators
b. Power Users
c. Users with the Full Control permission
d. Owners of files and folders
4. Which of the following tabs in the Properties dialog box for the file or folder do
you use to assign or modify NTFS permissions for a file or a folder? Choose the
correct answer.
a. Advanced
b. Permissions
c. Security
d. General
5. What is the purpose of the Traverse Folder/Execute File special permission?
6. What is the difference between the Delete permission and Delete Subfolder And
Files permission?
8-22
Chapter 8
Securing Resources with NTFS Permissions
Lesson Summary
■
To assign or modify NTFS permissions for a file or a folder, you use the Security
tab of the Properties dialog box for the file or folder.
■
You can use the Advanced Security Settings dialog box to configure specific permissions for a user or group.
■
The current owner or any user with Full Control permission can assign the Full
Control standard permission or the Take Ownership special access permission to
another user account or group, allowing the user account or a member of the
group to take ownership. You cannot assign anyone ownership of a file or folder;
you can only give them permission to take ownership.
■
By default, subfolders and files inherit permissions that you assign to their parent
folder. To stop subfolders and files from inheriting permissions that you assign to
their parent folder, clear the Inherit From Parent The Permission Entries That
Apply To Child Objects check box in the Advanced Security Settings dialog box.
■
Take the time to properly plan NTFS permissions following best-practice guidelines. A well-planned permission structure is easier to administer and causes fewer
problems.
Lesson 3
Supporting NTFS Permissions
8-23
Lesson 3: Supporting NTFS Permissions
When you assign or modify NTFS permissions to files and folders, problems might
arise. When you copy or move files and folders, the permissions you set on the files or
folders might change. Specific rules control how and when permissions change.
Understanding these rules helps you solve permissions problems. Troubleshooting
these problems is important to keep resources available for the appropriate users and
protected from unauthorized users.
After this lesson, you will be able to
■ Describe the effect on NTFS file and folder permissions when files and folders are copied
■ Describe the effect on NTFS file and folder permissions when files and folders are moved
■ Troubleshoot resource access problems
Estimated lesson time: 40 minutes
Effect on NTFS File and Folder Permissions When Files and Folders Are
Copied
When you copy files or folders from one folder to another or from one volume to
another, permissions change (as shown in Figure 8-7).
Copy
Permissions =
Full Control
Permissions =
Destination folder
C:/
NTFS volume
D:/
NTFS volume
Permissions =
Full Control
Copy
Permissions =
Destination folder
Copy
FAT volume
Write permission
Permissions
are lost.
F08us07
Figure 8-7
Copy files or folders between folders or volumes.
8-24
Chapter 8
Securing Resources with NTFS Permissions
When you copy a file within a single NTFS volume or between NTFS volumes, note the
following:
■
Windows XP Professional treats it as a new file. As a new file, it takes on the permissions of the destination folder.
■
You must have Write permission for the destination folder to copy files and folders.
■
You become the creator and owner.
Security Alert When you copy files or folders to FAT volumes, the folders and files lose
their NTFS permissions because FAT volumes do not support NTFS permissions.
Effect on NTFS File and Folder Permissions When Files and Folders Are
Moved
When you move a file or folder, permissions might or might not change, depending on
where you move the file or folder (see Figure 8-8).
Move
Permissions =
Full Control
Permissions =
Full Control
C:/
NTFS volume
Permissions =
Full Control
D:/
NTFS volume
Move
Permissions =
Destination folder
Move
FAT volume
Write, Modify permissions
Permissions
are lost.
F08us08
Figure 8-8 Move files or folders between folders or volumes.
Facts to Know About Moving Within a Single NTFS Volume
When you move a file or folder within a single NTFS volume, note the following
things:
Lesson 3
Supporting NTFS Permissions
8-25
■
The file or folder retains the original permissions.
■
You must have the Write permission for the destination folder to move files and
folders into it.
■
You must have the Modify permission for the source file or folder. The Modify permission is required to move a file or folder because Windows 2000 deletes the file
or folder from the source folder after it is copied to the destination folder.
■
You become the creator and owner.
Facts to Know About Moving Between NTFS Volumes
When you move a file or folder between NTFS volumes, note the following:
■
The file or folder inherits the permissions of the destination folder.
■
You must have the Write permission for the destination folder to move files and
folders into it.
■
You must have the Modify permission for the source file or folder. The Modify permission is required to move a file or folder because Windows XP Professional
deletes the file or folder from the source folder after it is copied to the destination
folder.
■
You become the creator and owner.
!
Security Alert
!
Exam Tip
When you move files or folders to FAT volumes, the folders and files lose
their NTFS permissions because FAT volumes do not support NTFS permissions.
When you move files or folders within an NTFS volume, permissions that have
been directly assigned to the file or folder carry over to the new location. In all other cases of
moving and copying, existing permissions are lost, and the object will inherit permissions
from the new parent. When moving to a FAT volume, permissions are lost entirely.
How to Troubleshoot Common Permissions Problems
Table 8-7 describes some common permissions problems that you might encounter
and provides solutions that you can use to try to resolve these problems.
8-26
Chapter 8
Securing Resources with NTFS Permissions
Table 8-7
Permissions Problems and Troubleshooting Solutions
Problem
Solution
A user cannot gain access to a
file or folder.
If the file or folder was copied or moved to another NTFS
volume, the permissions might have changed.
Check the permissions that are assigned to the user
account and to groups to which the user belongs. The user
might not have permission, or might be denied access
either individually or as a member of a group.
You add a user account to a
group to give that user access to a
file or folder, but the user still
cannot gain access.
For access permissions to be updated to include the new
group to which you have added the user account, the user
must either log off and then log on again, or close all network connections to the computer on which the file or
folder resides, and then make new connections.
A user with Full Control permission to a folder deletes a file in
the folder, although that user
does not have permission to
delete the file itself. You want to
stop the user from being able to
delete more files.
You have to clear the special access permission, the Delete
Subfolders And Files check box, for that folder to prevent
users with Full Control of the folder from being able to
delete files in it.
Practice: Managing NTFS Permissions
In this practice, you will observe the effects of taking ownership of a file. Then you will
determine the effects of permission and ownership when you copy or move files.
Finally, you will determine what happens when a user with Full Control permission to
a folder has been denied all access to a file in that folder but attempts to delete the file.
Complete the following two exercises, and answer any questions that are asked. You
can find answers to these questions in the “Questions and Answers” section at the end
of this chapter.
Important
To successfully complete this practice, you must have completed all exercises
in the Lesson 2 practice.
Exercise 1: Taking Ownership of a File
In this exercise, you observe the effects of taking ownership of a file. To do this, you
must determine permissions for a file, assign the Take Ownership permission to a user
account, and then take ownership as that user.
Lesson 3
Supporting NTFS Permissions
8-27
To determine the permissions for a file
1. Log on with a user account that is a member of the Administrators group, and then
start Windows Explorer.
2. In the Public folder, create a text document named OWNER.
3. Right-click OWNER, and then click Properties.
4. In the Owner Properties dialog box, click the Security tab. Note the permissions
for the OWNER file.
5. Click Advanced.
6. In the Advanced Security Settings For Owner dialog box, on the Owner tab, note
the current owner of the file.
7. Who is the current owner of the OWNER file?
To assign permission to a user to take ownership
1. In the Advanced Security Settings For Owner dialog box, on the Permissions tab,
click Add.
2. In the Select User Or Group dialog box, in the Enter The Object Names To Select
text box, type User81, and then click Check Names.
3. User81 should now appear in the Enter The Object Names To Select text box, indicating that Windows XP Professional located User81 on the computer and it is a
valid user account. Click OK.
4. In the Permission Entry For Owner dialog box, notice that all the permission
entries for User81 are blank.
5. Under Permissions, select the Allow check box next to Take Ownership, and then
click OK.
6. In the Advanced Security Settings For Owner dialog box, click OK to return to the
Owner Properties dialog box.
7. Click OK to apply your changes and close the Owner Properties dialog box.
8. Close Windows Explorer, and then log off Windows XP Professional.
To take ownership of a file
1. Log on as User81, and then start Windows Explorer.
2. Select the Public folder.
3. Right-click OWNER, and then click Properties.
8-28
Chapter 8
Securing Resources with NTFS Permissions
4. In the Owner Properties dialog box, on the Security tab, notice the permissions for
the OWNER folder. Click Advanced.
5. In the Advanced Security Settings For Owner dialog box, on the Owner tab, in the
Change Owner To list, select User81, and then click Apply.
6. Who is now the owner of the OWNER file?
7. Click OK to close the Advanced Security Settings For Owner dialog box.
8. Click OK to close the Owner Properties dialog box.
To test permissions for a file as the owner
1. While you are logged on as User81, assign User81 the Full Control permission for
the OWNER text document and click Apply.
2. Click Advanced and clear the Inherit From Parent The Permission Entries That
Apply To Child Objects check box.
3. In the Security dialog box, click Remove.
4. Click OK to close the Advanced Security Settings For Owner dialog box.
5. Click OK to close the Owner Properties dialog box.
6. Delete the OWNER text document.
Exercise 2: Copying and Moving Folders
In this exercise, you see the effects of permissions and ownership when you copy and
move folders.
To create a folder while logged on as a user
1. While you are logged on as User81, in Windows Explorer, in the root folder of
drive C, create a folder named Temp1.
2. What are the permissions that are assigned to the folder?
User or Group
Permissions
Lesson 3
Supporting NTFS Permissions
8-29
3. Who is the owner? Why?
4. Close all applications, and then log off Windows XP Professional.
To create a folder while logged on as a member of the Administrators group
1. Log on as Administrator, or as a user account that is a member of the Administrators group, and then start Windows Explorer.
2. In the root folder of drive C, create the folders Temp2 and Temp3.
3. What are the permissions for the Temp2 and Temp3 folders that you just created?
User or Group
Permissions
4. Who is the owner of the Temp2 and Temp3 folders? Why?
5. Assign the following permissions to the Temp2 and Temp3 folders. Clear the
Inherit From Parent The Permission Entries That Apply To Child Objects check
box. When prompted, click Remove to remove all permissions except those
explicitly set.
Folder
Assign These Permissions
Temp2
Administrators: Full Control
Users: Read & Execute
Temp3
Administrators: Full Control
Backup Operators: Read & Execute
Users: Full Control
8-30
Chapter 8
Securing Resources with NTFS Permissions
To copy a folder to another folder within a Windows XP Professional NTFS volume
1. While logged on with an account that is a member of the Administrators group, in
Windows Explorer, copy C:\Temp2 to C:\Temp1 by selecting C:\Temp2, holding
down CTRL, and then dragging C:\Temp2 to C:\Temp1.
!
Note
Because this is a copy, C:\Temp2 and C:\Temp1\Temp2 should both exist.
2. Select C:\Temp1\Temp2, and then compare its permissions and ownership with
those of C:\Temp2.
3. Who is the owner of C:\Temp1\Temp2 and what are the permissions? Why?
To move a folder within the same NTFS volume
1. Log on as User81.
2. In Windows Explorer, select C:\Temp3, and then move it to C:\Temp1.
3. What happens to the permissions and ownership for C:\Temp1\Temp3? Why?
4. Close all windows and log off.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Which of the following statements about copying a file or folder are correct?
Choose all that apply.
a. When you copy a file from one folder to another folder on the same volume,
the permissions on the file do not change.
b. When you copy a file from a folder on an NTFS volume to a folder on a FAT
volume, the permissions on the file do not change.
c. When you copy a file from a folder on an NTFS volume to a folder on another
NTFS volume, the permissions on the file match those of the destination folder.
d. When you copy a file from a folder on an NTFS volume to a folder on a FAT
volume, the permissions are lost.
Lesson 3
Supporting NTFS Permissions
8-31
2. Which of the following statements about moving a file or folder are correct?
Choose all answers that are correct.
a. When you move a file from one folder to another folder on the same volume,
the permissions on the file do not change.
b. When you move a file from a folder on an NTFS volume to a folder on a FAT
volume, the permissions on the file do not change.
c. When you move a file from a folder on an NTFS volume to a folder on
another NTFS volume, the permissions on the file match those of the destination folder.
d. When you move a file from a folder on an NTFS volume to a folder on the
same volume, the permissions on the file match those of the destination
folder.
3. When you assign NTFS permissions you should assign the _____________________
(least/most) restrictive permissions. Fill in the blank.
4. If you do not want a user or group to gain access to a particular folder or file,
should you deny access permissions to that folder or file?
Lesson Summary
■
When you copy or move files and folders, the permissions you set on the files or
folders might change. When you copy files or folders from one folder to another
or from one volume to another, the object takes on the permissions of the destination folder. You must have Write permission for the destination folder to copy
files and folders. When you copy a file, you become the creator and owner of the
file.
■
When you move a file or folder within a single NTFS volume, the file or folder
retains its original permissions. When you move a file or folder between NTFS volumes, the file or folder inherits the permissions of the destination folder.
■
There are a number of common problems associated with NTFS permissions that
you should learn to troubleshoot. In particular, you should make sure that the permissions are configured the way you think they are (particularly if the object has
been moved or copied). Also, if you have recently assigned permissions, a user
must log off and back on for the permissions to become effective.
8-32
Chapter 8
Securing Resources with NTFS Permissions
Case Scenario Exercise
In this exercise, you will read a scenario about applying NTFS permissions to folders
and files, and then answer the questions that follow. If you have difficulty completing
this work, review the material in this chapter before beginning the next chapter. You
can find answers to these questions in the “Questions and Answers” section at the end
of this chapter.
Scenario
You are an administrator working for a company named Fabrikam, Inc., a regional
advertising company with a headquarters office in Memphis, TN, and several branch
locations throughout the Southeast. Members of the company’s Accounting department, which is located in the main office, keep accounting information for the company’s clients on a file server located within the department. On that file server is a
folder named Client Accounts, to which all members of the Accounting department
need access. Due to confidentiality agreements, there are certain documents within the
Client Accounts folder that should be accessible only by employees, not by temporary
or contract workers.
You have configured the Client Accounts folder in the following manner:
■
You removed the Everyone group entirely.
■
You added the Users group and assigned that group Full Control.
In addition, you have performed the following actions:
■
You made all part-time employees members of a group named Part Time.
■
You made all contract workers members of a group named Contractors.
■
You assigned the Deny Full Control permission to the Part Time And Contractors
groups for the files that are protected by the confidentiality agreement.
Questions
1. Will users in the Part Time And Contractors group be able to open the files protected by the confidentiality agreement?
Troubleshooting Lab
8-33
2. Even if users of the Part Time And Contractors groups cannot access the file, there
is a risk that they will delete the file. Why?
3. How could you solve this problem by changing permissions on the Client
Accounts folder?
4. What would have been a better way to approach this problem from the beginning?
Troubleshooting Lab
Read the following troubleshooting scenario and then answer the questions that follow. You can use this lab to help determine whether you have learned enough to move
on to the next chapter. If you have difficulty completing this work, review the material
in this chapter before beginning the next chapter. You can find the answers to these
questions in the “Questions and Answers” section at the end of this chapter.
Scenario
You are an administrator for a company named Contoso, Ltd., and are working with
the Sales, Marketing, and Accounting departments to help set up permissions for folders that all departments use.
Both the Sales and Marketing departments access the Brochures folder. A group named
Sales contains users that are in the Sales department, and a group named Marketing
contains users that are in the Marketing department. Your boss gives you the following
tables. The first table shows the permissions assigned to the Sales group for the Brochures folder. The second table shows the permissions assigned to the Marketing
group for the Brochures folder. A user named David is a member of both the Sales and
Marketing groups.
8-34
Chapter 8
Securing Resources with NTFS Permissions
Permissions Assignments for Sales Group
Permission
Allow
Deny
Full Control
Modify
Read & Execute
X
List Folder Contents
X
Read
X
Write
Permissions Assignments for Marketing Group
Permission
Allow
Deny
Full Control
Modify
Read & Execute
List Folder Contents
Read
X
Write
Questions
1. Based on the information in tables that your boss gave you, what are David’s
effective permissions on the Brochures folder?
2. Your boss stops by and says, “Whoops, here is the other table I meant to give
you.” The table shows the permissions assigned to the Accounting group for the
Brochures folder. A user named Yvette is a member the Sales, Marketing, and
Accounting groups.
Permissions Assignments for Accounting Group
Permission
Allow
Deny
Full Control
Modify
Read & Execute
List Folder Contents
Read
Write
X
X
X
Chapter Summary
8-35
Based on the information in all the tables that you received, what are Yvette’s
effective permissions on the Brochures folder?
Chapter Summary
■
You use NTFS permissions to specify which users and groups can access files and
folders, and what they can do with the contents of the files or folders. NTFS permissions are available only on NTFS volumes. It is possible for multiple sets of
NTFS permissions to apply to a user for a particular resource. A user’s effective
permissions for a resource are the sum of the NTFS permissions that you assign to
the individual user account and to all of the groups to which the user belongs.
■
To assign or modify NTFS permissions for a file or a folder, you use the Security
tab of the Properties dialog box for the file or folder. You can use the Advanced
Security Settings dialog box to configure specific permissions for a user or group.
You should also note the following:
■
❑
You cannot assign a user ownership of a file or folder; you can only give a
user permission to take ownership.
❑
By default, subfolders and files inherit permissions that you assign to their
parent folder. You can prevent a folder from propagating permissions to subfolders and items in the folder. You can also prevent a file or subfolder from
inheriting permissions from its parent folder.
You should be aware of the following behaviors when you copy or move files and
folders to which NTFS permissions are applied:
❑
When you copy files or folders from one folder to another or from one volume to another, the object takes on the permissions of the destination folder.
❑
When you move a file or folder within a single NTFS volume, the file or folder
retains its original permissions.
❑
When you move a file or folder between NTFS volumes, the file or folder
inherits the permissions of the destination folder.
8-36
Chapter 8
Securing Resources with NTFS Permissions
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
To calculate effective NTFS permissions, first combine all allow permissions from
all sources. Next, determine any deny permissions the user has. Deny permissions
override allow permissions. The result is the user’s effective permissions for the
resource.
■
When you grant permissions, grant users the minimum permissions that they need
to get their jobs done. This is referred to as the principle of least privilege.
■
When you move files or folders within an NTFS volume, permissions that have
been directly assigned to the file or folder carry over to the new location. In all
other cases of moving and copying, existing permissions are lost, and the object
will inherit permissions from the new parent. When moving to a FAT volume, permissions are lost entirely.
Key Terms
access control entry (ACE) A specific entry on the ACL that grants or denies a user
or group access to a resource.
access control list (ACL) A list of all user accounts and groups that have been
assigned permissions for the file or folder, as well as the permissions that they
have been assigned.
effective permissions The permissions level that a user actually has, taking all permission sources into account.
NTFS permissions Assignments that specify which users and groups can access files
and folders and what they can do with the contents of the files or folders. NTFS
permissions are available only on NTFS volumes.
owner The user who created a file, folder, or printer.
permissions inheritance The process of a file or folder receiving permissions
based on the permissions assigned to the object’s parent folder.
Traverse Folder A permission that allows or denies moving through folders to
access other files or folders, even when the user has no permissions for the traversed folder (the folder that the user is moving through).
Questions and Answers
8-37
Questions and Answers
Lesson 1 Review
Page
8-6
1. Which of the following statements correctly describe NTFS file and folder permissions? Choose all that apply.
a. NTFS security is effective only when a user gains access to the file or folder
over the network.
b. NTFS security is effective when a user gains access to the file or folder on the
local computer.
c. NTFS permissions specify which users and groups can gain access to files and
folders and what they can do with the contents of the file or folder.
d. NTFS permissions can be used on all file systems available with Windows XP
Professional.
The correct answers are B and C. NTFS security is locally based and so affects all users
accessing a resource, whether those users are logged on locally or accessing the resource
from the network. A is not correct because NTFS security does not only apply to network users.
D is not correct because NTFS permissions can be used only on partitions formatted with
NTFS.
2. Which of the following NTFS folder permissions allow you to delete the folder?
Choose the correct answer.
a. Read
b. Read & Execute
c. Modify
d. Administer
The correct answer is C. A and B are not correct because these permissions do not allow you
to delete a folder. D is not correct because Administer is not a valid permission.
3. Which of the NTFS file permissions should you assign to a file if you want to allow
users to delete the file but do not want to allow users to take ownership of a file?
Modify
4. What is an access control list (ACL), and what is the difference between an ACL
and an access control entry (ACE)?
An ACL, which is stored with every file and folder on an NTFS volume, contains a list of all user
accounts or groups that have been assigned permissions to that file or folder. An ACE is an
entry in an ACL that contains the operations that a user or group is allowed or specifically
denied to perform on that file or folder.
8-38
Chapter 8
Securing Resources with NTFS Permissions
5. What are a user’s effective permissions for a resource?
A user’s effective permissions for a resource are the sum of the NTFS permissions assigned to
the individual user account and to all of the groups to which the user belongs. If there are any
Deny permissions set, they override all instances in which that permission is allowed and must
be removed from the user’s effective permissions.
6. By default, what inherits the permissions that you assign to the parent folder?
By default, the permissions that you assign to the parent folder are inherited by and propagated
to the subfolders and files that are contained in the parent folder.
Lesson 2 Practice: Planning and Assigning NTFS Permissions
Page
8-15
Exercise 2: Determining the Default NTFS Permissions for a Folder
6. What are the existing folder permissions?
The Administrators group has Full Control. The CREATOR OWNER has special permissions, Full
Control. The account that created the folder has special permissions, Full Control of subfolders
and files only. SYSTEM has Full Control. The Users group has Read & Execute, List Folder Contents, Read, and special permissions of Create Files/Write Data and Create Folders/Append
Data.
Exercise 3: Testing the Folder Permissions for the Public Folder
4. Were you successful? Why or why not?
Yes, because the Users group is assigned the special permissions of Create Files/Write Data
and Create Folders/Append Data for the Public folder.
6. Were you able to complete all of these tasks and why?
Yes, because the Users group is assigned the special permissions of Create Files/Write Data
and Create Folders/Append Data for the Public folder.
10. Which tasks were you able to perform and why?
You can open the file because the Users group has Read permission for the Public folder. When
you attempt to modify the file, you get an error message. You cannot modify the file because
the Users group does not have either Full Control or Modify permissions for the Public folder.
Users can create files and folders in the Public folders, and they have Full Control permission
for the file and folders that they created, but they cannot modify files and folders for which they
are not the creator or owner. You cannot delete the file because only the owner of a file and
members of the Administrators group have Full Control of the file by default.
Questions and Answers
8-39
Exercise 4: Assigning NTFS Permissions
1. Based on what you learned in Exercise 1, what changes in permission assignments
do you need to make to meet each of these four criteria? Why?
The first three criteria are met by the default permission assignments. To allow User82 the ability to modify or delete all files in the Public folder, you could change the special permission
assigned to User82 to Full Control.
2. You are currently logged on as User82. Can you change the permissions assigned
to User82 while logged on as User82? Why or why not?
No, you cannot change the permissions assigned User82 while logged on as User82 because
User82 is not a member of the Administrators group, is not the owner of the Public folder, and
does not have the Full Control permission for the Public folder. Only Administrators, the owners
of files or folders, and users with Full Control permission can assign NTFS permissions to
users and groups to control access to files and folders.
10. Which permissions are assigned to User82?
Read & Execute, List Folder Contents, and Read
Exercise 5: Testing the New NTFS Permissions for the Folder
5. Which tasks were you able to record and why?
User82 can open, modify, and delete the file because User82 has been assigned the Full Control permission for the Public folder.
Exercise 6: Testing NTFS Permissions
8. Which tasks were you able to perform and why?
User82 can open, modify, and delete the file because User82 has been assigned the Full Control permission for the Library folder. The Inherit From Parent The Permission Entries That Apply
To Child Objects check box is selected by default. Therefore, the Full Control permission was
inherited by the Library folder from the Public folder.
Lesson 2 Review
Page
8-21
1. By default, when you format a volume with NTFS, the ______________________
permission is assigned to the Everyone group. Fill in the blank.
Full Control
2. When you assign permissions for public data folders, it is recommended that you
assign the ______________________ permission and the ____________________
permission to the Users group, and the ______________________ permission to
the CREATOR OWNER user. Fill in the blanks.
Read & Execute; Write; Full Control
8-40
Chapter 8
Securing Resources with NTFS Permissions
3. Which of the following users can assign permissions to user accounts and groups?
Choose all that apply.
a. Administrators
b. Power users
c. Users with the Full Control permission
d. Owners of files and folders
The correct answers are A, C, and D. B is not correct because members of the Power users
group cannot assign permissions.
4. Which of the following tabs in the Properties dialog box for the file or folder do
you use to assign or modify NTFS permissions for a file or a folder? Choose the
correct answer.
a. Advanced
b. Permissions
c. Security
d. General
The correct answer is C. A, B, and D are incorrect because you use the Security tab to modify
NTFS permissions.
5. What is the purpose of the Traverse Folder/Execute File special permission?
Traverse Folder allows or denies moving through folders to access other files or folders, even
when the user has no permissions for the traversed folder. Execute File allows or denies running executable files (application files).
6. What is the difference between the Delete permission and Delete Subfolder And
Files permission?
Delete allows or denies the deleting of a file or folder. Even if a user does not have the Delete
permission for a file or folder, the user can still delete the file or folder if the Delete Subfolder
And Files permission has been granted to the user on the parent folder.
Lesson 3 Practice: Managing NTFS Permissions
Page
8-26
Exercise 1: Taking Ownership of a File
To determine the permissions for a file
7. Who is the current owner of the OWNER file?
The user account you used to log on to Windows XP.
To take ownership of a file
6. Who is now the owner of the OWNER file?
User81
Questions and Answers
8-41
Exercise 2: Copying and Moving Folders
To create a folder while logged on as a user
2. What are the permissions that are assigned to the folder?
User or Group
Permissions
Creator Owner
Special Permissions: Full control for subfolders and files only
System
Full Control
User81
Full Control
Users
Special Permissions: Traverse Folder/Execute File, List Folder/Read
Data, Read Attributes, Read Extended Attributes, Read Permissions,
Create Files/Write Data, and Create Folders/Append Data
3. Who is the owner? Why?
User81 is the owner because the person who creates a folder or file is the owner.
To create a folder while logged on as a member of the Administrators group
3. What are the permissions for the Temp2 and Temp3 folders that you just created?
User or Group
Permissions
Administrators
Full Control
Creator Owner
Special Permissions: Full control for subfolders and files
only
System
Full Control
the name of the user account
you used to create the folders
Special Permissions: Full control for this folder only
Users
Special Permissions: Traverse Folder/Execute File, List
Folder/Read Data, Read Attributes, Read Extended
Attributes, Read Permissions, Create Files/Write Data and
Create Folders/Append Data
4. Who is the owner of the Temp2 and Temp3 folders? Why?
The Administrators group or the name of the user account you used to create the folders (if you
did not log on as Administrator) is the owner because the person who creates a folder or file is
the owner. If the person is a member of the Administrators group, the Administrators group is
the owner.
To copy a folder to another folder within a Windows XP Professional NTFS volume
3. Who is the owner of C:\Temp1\Temp2 and what are the permissions? Why?
The owner of C:\Temp1\Temp2 is the user account that performed the copy. The permissions
for C:\Temp1\Temp2 are now the same as the permissions of Temp1. When you copy a folder
or file into another folder, the permissions assigned to it are always the same as the permissions on the destination folder.
8-42
Chapter 8
Securing Resources with NTFS Permissions
To move a folder within the same NTFS volume
3. What happens to the permissions and ownership for C:\Temp1\Temp3? Why?
Nothing; they do not change.
Lesson 3 Review
Page
8-30
1. Which of the following statements about copying a file or folder are correct?
Choose all that apply.
a. When you copy a file from one folder to another folder on the same volume,
the permissions on the file do not change.
b. When you copy a file from a folder on an NTFS volume to a folder on a FAT
volume, the permissions on the file do not change.
c. When you copy a file from a folder on an NTFS volume to a folder on another
NTFS volume, the permissions on the file match those of the destination
folder.
d. When you copy a file from a folder on an NTFS volume to a folder on a FAT
volume, the permissions are lost.
The correct answers are C and D. A is not correct because when you copy a file to a folder on
the same volume, the file inherits the permissions assigned to the target folder. B is not correct
because when you copy a file to a FAT volume, permissions are lost.
2. Which of the following statements about moving a file or folder are correct?
Choose all answers that are correct.
a. When you move a file from one folder to another folder on the same volume,
the permissions on the file do not change.
b. When you move a file from a folder on an NTFS volume to a folder on a FAT
volume, the permissions on the file do not change.
c. When you move a file from a folder on an NTFS volume to a folder on
another NTFS volume, the permissions on the file match those of the destination folder.
d. When you move a file from a folder on an NTFS volume to a folder on the
same volume, the permissions on the file match those of the destination
folder.
The correct answers are A and C. B is not correct because when you move a file to a FAT partition, all permissions are lost. D is not correct because when you move a file to a folder on the
same volume, the original permissions are retained.
3. When you assign NTFS permissions you should assign the _____________________
(least/most) restrictive permissions. Fill in the blank.
Most
Questions and Answers
8-43
4. If you do not want a user or group to gain access to a particular folder or file,
should you deny access permissions to that folder or file?
You should assign permissions to the folder or file rather than deny permission to access the
folder or file. Denying permissions should be an exception, not common practice.
Case Scenario Exercise
Page
8-32
1. Will users in the Part Time And Contractors group be able to open the files protected by the confidentiality agreement?
No. The Deny Full Control permission will prevent users from being able to access the file.
2. Even if users of the Part Time And Contractors groups cannot access the file, there
is a risk that they will delete the file. Why?
Full Control includes the Delete Subfolders And Files special permission for POSIX compliance.
This special permission allows a user to delete files in the root of a folder to which the user has
been assigned Full Control permission. This permission overrides the file permissions.
3. How could you solve this problem by changing permissions on the Client
Accounts folder?
Allow users all of the individual permissions, and then deny users the Delete Subfolders And
Files special permission.
4. What would have been a better way to approach this problem from the beginning?
It is better to not use Deny permissions unless absolutely necessary. The simplest and most
secure way to approach this problem would be to put the files that are protected by a confidentiality agreement into a separate folder from the Client Accounts folder. You could then grant
permissions on the separate folder only to users that need permissions.
Troubleshooting Lab
Page
8-33
1. Based on the information in tables that your boss gave you, what are David’s
effective permissions on the Brochures folder?
To determine David’s effective permissions, you must combine all the permissions that have
been assigned. Thus, David’s effective permissions on the Brochures folder are Read & Execute, List Folder Contents, and Read.
2. Your boss stops by and says, “Whoops, here is the other table I meant to give
you.” The table shows the permissions assigned to the Accounting group for the
Brochures folder. A user named Yvette is a member the Sales, Marketing, and
Accounting groups.
8-44
Chapter 8
Securing Resources with NTFS Permissions
Permissions Assignments for Accounting Group
Permission
Allow
Deny
Full Control
Modify
Read & Execute
List Folder Contents
Read
Write
X
X
X
Based on the information in all the tables that you received, what are Yvette’s
effective permissions on the Brochures folder?
To determine Yvette’s effective permissions, you must combine all the permissions that have
been granted. Yvette’s cumulative granted permissions are Read & Execute, List Folder Contents, and Read. You must then apply any denied permissions. Based on membership in the
Accounting group, Yvette is denied the List Folder Contents and Write permissions. Denying the
List Folder Contents permission effectively denies the Read & Execute permission (because
Read & Execute depends on List Folder Contents). This results in effective permissions of Read
for Yvette.
9 Administering Shared
Folders
Exam Objectives in this Chapter:
■
Manage and troubleshoot access to shared folders.
❑
Create and remove shared folders.
❑
Control access to shared folders by using permissions.
Why This Chapter Matters
In Chapter 8, “Securing Resources with NTFS Permissions,” you learned about
NTFS File System permissions for Microsoft Windows XP Professional. You use
NTFS permissions to specify which users and groups are allowed to access files
and folders and how NTFS permissions control what users are allowed to do with
the contents of the file or folder. Remember that NTFS permissions are available
only on NTFS volumes and that NTFS security is in effect whether a user gains
access to the file or folder at the local computer or over the network.
In this chapter, you will learn how to share folders and make the folders accessible over the network. You access a computer’s folders and their contents by first
sharing the folders, and then accessing the folders across the network from a
remote computer. Shared folders provide a way to restrict access to file resources
that are located on file allocation table (FAT) or FAT32 partitions. In this chapter,
you will learn how to share folders and how to restrict access to shared folders
by using permissions.
Lessons in this Chapter:
■
Lesson 1: Introduction to Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-2
■
Lesson 2: Combining Shared Folder Permissions and NTFS Permissions. . . . .9-20
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have Windows XP Professional installed on the computer.
9-1
9-2
Chapter 9
Administering Shared Folders
Lesson 1: Introduction to Shared Folders
You use shared folders to provide network users with access to file resources. When a
folder is shared, users with appropriate permissions can access the folder over the network.
After this lesson, you will be able to
■ Explain Simple File Sharing
■ Identify shared folder permissions
■ Identify the requirements for sharing a folder
■ Identify the characteristics of shared folder permissions
■ Share a folder
■ Assign shared folder permissions
■ Create multiple share names for a shared folder
■ Modify a shared folder
■ Connect to a shared folder
■ Explain the use of administrative shares
■ Manage shared folders by using the Computer Management utility
■ Explain guidelines for assigning shared folder permissions
Estimated lesson time: 60 minutes
Simple File Sharing
Simple File Sharing, as its name implies, is a simplified sharing model that allows
users to easily share folders and files with other local users on the same computer or
with users in a workgroup without configuring NTFS permissions and standard shared
folders. On computers running Windows XP Professional that are members of a workgroup, you can use Simple File Sharing or you can disable Simple File Sharing and use
shared folder permissions. On computers running Windows XP Professional that are
members of a domain, Simple File Sharing is not available.
!
Exam Tip
If you are not able to access the Security tab of a file or folder’s Properties dialog box or if you cannot assign shared folder permissions to a folder, Simple File Sharing is
probably enabled.
When Simple File Sharing is enabled, users have only one choice to make—whether a
folder is shared or not. When a user shares a folder, that folder is accessible to all network users. Also, with Simple File Sharing, the user cannot assign shared folder per-
Lesson 1
Introduction to Shared Folders
9-3
missions. To enable or disable Simple File Sharing, in any open folder, click Tools and
then click Folder Options. In the Folder Options dialog box, on the View tab, in the
Advanced Settings list, select or clear the Use Simple File Sharing (Recommended)
check box.
Note
The remainder of this chapter assumes that you are not using Simple File Sharing.
Shared Folder Permissions
When Simple File Sharing is disabled, you can control how users gain access to a
shared folder by assigning shared folder permissions. Shared folder permissions are
simpler than NTFS permissions. Table 9-1 explains what each of the shared folder permissions allows a user to do, presented from most restrictive to least restrictive.
Table 9-1
Shared Folder Permissions
This Shared Folder
Permission
Allows the User to
Read
Display folder names, file names, file data, and attributes; run program
files; and change folders within the shared folder
Change
Create folders, add files to folders, change data in files, append data to
files, change file attributes, and delete folders and files; also allows the
user to perform actions that are permitted by the Read permission
Full Control
Change file permissions, take ownership of files, and perform all tasks
that are permitted by the Change permission
You grant or deny shared folder permissions. Generally, it is best to grant permissions
to a group rather than to individual users. You should deny permissions only when it
is necessary to override permissions that are otherwise applied, for example, when it
is necessary to deny permission to a specific user who belongs to a group to which you
have granted the permission. If you deny a shared folder permission to a user, the user
will not have that permission. For example, to deny all remote access to a shared
folder, deny the Full Control permission.
Requirements for Sharing a Folder
To create shared folders on a computer running Windows XP Professional, you must
be a member of the Administrators or Power Users groups. Also, users who are granted
the Create Permanent Shared Objects user right are allowed to share folders. You can
share only folders; you cannot share individual files. If you need to provide users network access to files, you must share the folder that contains the files.
9-4
Chapter 9
!
Administering Shared Folders
Exam Tip
Users of the Administrators or Power Users groups can share a folder. Users
who have been assigned the Create Permanent Shared Objects user right can also share
folders.
Characteristics of Shared Folder Permissions
You can share any folder on a computer so that network users can access the folder.
The following are characteristics of shared folder permissions:
■
Shared folder permissions apply to folders, not individual files. Because you can
apply shared folder permissions only to the entire shared folder and not to individual files or subfolders in the shared folder, shared folder permissions provide
less detailed security than NTFS permissions.
■
Shared folder permissions do not restrict users who access the folder locally by
logging on to the computer. They apply only to users who connect to the folder
over the network.
■
Shared folder permissions are the only way to secure network resources on a FAT
volume, because NTFS permissions are not available on FAT volumes.
■
The default shared folder permission is Read, and it is assigned to the Everyone
group when you share the folder.
Security Alert
If you share a folder and do not change the default shared folder permissions (where the Everyone group is assigned the Read permission), the shared folder is effectively not protected from people reading the contents of the folder across the network. In this
case, restriction from reading the folder depends entirely on local NTFS permissions.
How to Share a Folder
When you share a folder, you can give it a share name, provide comments to describe
the folder and its content, control the number of users who have access to the folder,
assign permissions, and create multiple share names for the folder.
To share a folder, complete the following steps:
1. Log on with a user account that is able to share folders.
2. Right-click the folder that you want to share, and then click Properties.
3. On the Sharing tab of the Properties dialog box, click Share This Folder and configure the options shown in Figure 9-1 and described in Table 9-2.
Lesson 1
Introduction to Shared Folders
9-5
F09us01
Use the Sharing tab of a folder’s Properties dialog box to share a folder.
Figure 9-1
Table 9-2
Sharing Tab Options
Option
Description
Share Name
The name that users from remote locations use to connect to the shared folder.
You must enter a share name. By default, this is the same name as the folder.
You can type in a different name up to 80 characters long.
Comment
An optional description for the share name. The comment appears in addition
to the share name when users at client computers browse the server for shared
folders. This comment can be used to identify contents of the shared folder.
User Limit
The number of users who can concurrently connect to the shared folder. If
you click Maximum Allowed as the user limit, Windows XP Professional supports up to 10 connections.
Permissions
The shared folder permissions that apply only when the folder is accessed over
the network. By default, the Everyone group is assigned Read for all new
shared folders.
Caching
The settings to configure offline access to this shared folder. This feature is covered in Chapter 10, “Managing Data Storage.”
New Share
The settings to configure more than one share name and set of permissions for
this folder. This button appears only when the folder has already been shared.
You will learn how to create multiple shares in the section “How to Create Multiple Share Names for a Shared Folder.”
How to Assign Shared Folder Permissions
After you share a folder, the next step is to specify which users have access to the
shared folder by assigning shared folder permissions to selected user accounts and
9-6
Chapter 9
Administering Shared Folders
groups. To assign permissions to user accounts and groups for a shared folder, use the
following steps:
1. On the Sharing tab of the Properties dialog box of the shared folder, click Permissions.
2. In the Permissions dialog box for the folder, ensure that the Everyone group is
selected and then click Remove.
3. In the Permissions dialog box, click Add.
4. In the Select Users Or Groups dialog box (shown in Figure 9-2), in the Enter The
Object Names To Select text box, type the name of the user or group to which you
want to assign permissions. Repeat this step for all user accounts and groups to
which you want to assign permissions.
Tip
If you want to enter more than one user account or group at a time, separate the names
by a semicolon. If you want to ensure the names are correct, click Check Names.
F09us02
Figure 9-2 Select a user or a group to which to assign permissions.
5. Click OK.
6. In the Permissions dialog box for the shared folder, click the user account or
group, and then, under Permissions, select the Allow check box or the Deny
check box for the appropriate permissions for the user account or group.
How to Create Multiple Share Names for a Shared Folder
You might want to grant different permissions on a shared folder. You can create multiple share names for the same folder and assign each a different set of permissions. To
share a folder with multiple share names, open the folder’s Properties dialog box and
then click New Share. In the New Share dialog box (shown in Figure 9-3), you assign
a new share name, limit the number of connections to the share, and click Permissions
to grant the permissions for the shared folder.
Lesson 1
Introduction to Shared Folders
9-7
F09us03
Figure 9-3
Create an additional share name for a shared folder.
How to Modify a Shared Folder
For existing shared folders, you can stop sharing the folder, modify the share name,
and modify shared folder permissions.
To modify a shared folder, complete the following steps:
1. In the Properties dialog box of the shared folder, click the Sharing tab.
2. To complete the appropriate task, use the steps in Table 9-3.
Table 9-3
Steps to Modify a Shared Folder
To
Do This
Stop sharing a folder
Click Do Not Share This Folder.
Modify the share name
Click Do Not Share This Folder to stop sharing the folder, and
click Apply. Then click Share This Folder, and type the new
share name in the Share Name text box.
Modify shared folder
permissions
Click Permissions. In the Permissions dialog box, click Add to
add a user account or group so that you can specify permissions for a specific user or group, or click Remove to remove
a user account or group. In the Select Users, Computers, Or
Groups dialog box, click the user account or the group whose
permissions you want to modify, and then select Allow or
Deny for the appropriate permissions.
Caution
If you stop sharing a folder while a user has a file open, the user might lose data.
If you click Do Not Share This Folder and a user has an open connection to the shared folder,
Windows XP Professional displays a dialog box notifying you of that fact.
How to Connect to a Shared Folder
You can access a shared folder on another computer by using My Network Places, the
Add Network Place Wizard, or the Run command.
To connect to a shared folder using My Network Places, complete the following steps:
9-8
Chapter 9
Administering Shared Folders
1. Click Start, and then click Control Panel.
Note When you first use My Network Places, Windows XP Professional adds it to your Start
menu. If My Network Places is listed on your Start menu, click it and proceed to step 4.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, under See Also, click My Network Places.
4. Double-click the share you want to access.
Note
If the share you want to connect to is listed, when you double-click it, you are connected. If the share that you want to connect to is not listed, go to step 5.
5. If the share you want to connect to is not listed, click Add A Network Place.
The Welcome To The Add Network Place Wizard page is displayed.
6. Click Next.
7. On the Where Do You Want To Create This Network Place page, select Choose
Another Network Location, and then click Next.
8. On the What Is The Address Of This Network Place page, shown in Figure 9-4,
you can type a Universal Naming Convention (UNC) path to the folder (for example, \\computer_name\sharedfolder_name) and click Next.
F09us04
Figure 9-4 Type the UNC for the share that you want to access.
Tip
You can also use the Other Locations On Your Network page to make a network connection shortcut to a Web share (http://Webserver/share) or a File Transfer Protocol (FTP) site
(ftp://ftp.microsoft.com).
Lesson 1
Introduction to Shared Folders
9-9
9. On the What Do You Want To Name This Place page, type a friendly name for this
page and then click Next.
10. In the Completing The Add Network Place Wizard, click Finish.
To connect to a shared folder using the Run command, complete the following steps:
1. Click Start, click Run, type \\computer_name in the Open text box, and then
click OK.
Windows XP Professional displays shared folders for the computer.
2. Double-click the shared folder to which you want to connect.
What Are Administrative Shares?
Windows XP Professional automatically shares some folders for administrative purposes. These administrative shares are marked with a dollar sign ($) at the end of
the share name. Administrative shares are hidden from users who browse the computer. The root of each volume, the system root folder, and the location of the printer
drivers are hidden shared folders that you can access across the network by typing in
the exact name of the share.
Table 9-4 describes the purpose of the administrative shared folders that Windows XP
Professional automatically provides.
Table 9-4
Windows XP Professional Administrative Shared Folders
Share
Purpose
C$, D$, E$,
and so on
The root of each volume on a hard disk is automatically shared, and the share
name is the drive letter with a dollar sign ($). When you connect to this folder,
you have access to the entire volume. You use the administrative shares to
remotely connect to the computer to perform administrative tasks. Windows XP
Professional assigns the Full Control permission to the Administrators group.
Admin$
The system root folder, which is C:\Windows by default, is shared as Admin$.
Administrators can access this shared folder to administer Windows XP Professional without knowing in which folder it is installed. Only members of the
Administrators group have access to this share. Windows XP Professional assigns
the Full Control permission to the Administrators group.
Print$
When you install the first shared printer, the %systemroot%\System32\
Spool\Drivers folder is shared as Print$. This folder provides access to printer
driver files for clients. Only members of the Administrators and Power Users
groups have the Full Control permission. The Everyone group has the Read permission.
9-10
Chapter 9
Administering Shared Folders
Hidden shared folders are not limited to those that the system automatically creates.
You can share an additional hidden share by simple adding a dollar sign to the end
of the share name. Only users who know the folder name can access it if they also possess the proper permissions.
!
Exam Tip
You often can use the built-in administrative shares to access resources on a
computer when you cannot otherwise gain access. In particular, the Admin$ share is useful
because it allows you to access the system root folder of a computer. You can also type the
drive letter followed by a dollar sign (for example, C$) to access a particular drive.
How to Manage Shared Folders by Using Computer Management
You can also manage shared folders by using the Computer Management utility.
Available shared folder management options are as follows:
■
View a list of all folders that are currently shared
■
Create additional shared folders
■
View and edit the properties of shared folders
■
Stop sharing a folder
■
Manage users that are connected to shared folders
■
Remotely manage shared folders on other computers
How to View a List of Shared Folders in Computer Management
You can view all folders that are currently shared in a single location within Computer
Management. To view shared folders, follow these steps:
1. Start Computer Management, either by right-clicking My Computer and selecting
Manage, or from the Administrative Tools folder in Control Panel.
2. Expand the System Tools node.
3. Under the System Tools node, expand the Shared Folders node, and then select
the Shares folder. Shared folders are displayed in the details pane, as shown in Figure 9-5.
Lesson 1
Introduction to Shared Folders
9-11
F09us05
Figure 9-5 View shared folders in Computer Management.
How to Create Additional Shared Folders by Using Computer Management
You can easily share folders by using Computer Management. To share a folder, complete the following steps:
1. In Computer Management, right-click the Shares folder (in the Shared Folders
node) and select New File Share.
The Create A Shared Folder Wizard appears.
2. Click Next.
3. On the Set Up A Shared Folder page, type the path to be shared, the share name,
and the share description. Click Next to continue.
4. If the folder to be shared does not exist, Windows opens a dialog box asking
whether or not you want to create the folder. Click Yes to create the folder and
continue.
5. On the Shared Folder Permissions page, select the appropriate permissions option
and click Next.
6. Finally, click Finish to create the shared folder.
9-12
Chapter 9
Administering Shared Folders
View and Edit the Properties of Shared Folders by Using Computer Management
You can view and edit the properties of any shared folder through Computer Management by right-clicking the shared folder and selecting Properties. Figure 9-6 shows the
Properties dialog box of a shared folder named Public Files. On the Security tab of new
shares that you create, you can also manage the NTFS permissions of the folder.
F09us06
Figure 9-6 Use Computer Management to modify the properties of a shared folder.
How to Stop Sharing a Folder
You can also use Computer Management to stop sharing a folder (or a particular share
name for a folder). To stop sharing a folder in Computer Management, use the following steps:
1. Start Computer Management, either by right-clicking My Computer and selecting
Manage, or from the Administrative Tools folder in Control Panel.
2. Expand the System Tools node.
3. Under the System Tools node, expand the Shared Folders node, and then select
the Shares folder.
4. In the Details pane, right-click the share that you want to stop, and then click Stop
Sharing.
This action does not delete the folder; it merely stops sharing the folder under the
particular share name.
Lesson 1
Introduction to Shared Folders
9-13
Manage Users That Are Connected to Shared Folders
To view the users that are connected to the server, expand the Shared Folders node in
Computer Management and then select the Sessions folder. Occasionally, you might
need to disconnect users from the computer so that you can perform maintenance
tasks on hardware or software. To disconnect users from the server, do one of the following:
■
To disconnect a single user, right-click the user name in the Sessions folder, and
then select the Close Session option from the action menu.
■
To disconnect all users from the server, right-click the Sessions folder, and then
select the Disconnect All Sessions option from the action menu.
To view users that have shared files and folders open, under Shared Files, select the
Open Files option. The details pane displays the files and folders that are currently in
use on the server. This information is valuable if you are trying to work with a shared
folder or file and need to know who is currently accessing the resource so that you can
ask that person to disconnect.
Guidelines for Shared Folder Permissions
The following list provides some general guidelines for managing your shared folders
and assigning shared folder permissions:
■
Determine which groups need access to each resource and the level of access that
they require. Document the groups and their permissions for each resource.
■
Assign permissions to groups instead of user accounts to simplify access administration.
■
Assign to a resource the most restrictive permissions that still allow users to perform required tasks. This practice is known as the principle of least privilege.
For example, if users only need to read information in a folder and they will never
delete or create files, assign the Read permission.
■
Organize resources so that folders with the same security requirements are located
within a folder. For example, if users require Read permission for several application folders, store those folders within the same folder. Then share this folder
instead of sharing each individual application folder.
■
Use intuitive share names so that users can easily recognize and locate resources.
For example, for the Application folder, use Apps for the share name. You should
also use share names that all client operating systems can use.
Table 9-5 describes share and folder naming conventions for different client computer
operating systems.
9-14
Chapter 9
Table 9-5
Administering Shared Folders
Client Computer Operating Systems and Share Name Length
Operating System
Share Name Length
Windows 2000 and later
80 characters
Windows NT, Windows 98, and Windows 95
12 characters
MS-DOS, Windows 3.x, and Windows for Workgroups
8.3 characters
Windows XP Professional provides 8.3-character equivalent names, but the resulting
names might not be intuitive to users. For example, a Windows XP Professional folder
named Accountants Database would appear as Accoun~1 on client computers running
MS-DOS, Windows 3.x, and Windows for Workgroups.
Real World
Shared Folder Permissions on Large Networks
On small networks, you are likely to find that either Simple File Sharing or shared
folder permissions are used to control access to files and folders on the network.
Even when drives are formatted with the NTFS file system, most people on small
networks just do not use NTFS permissions.
On large company networks, you find just the opposite. Administrators typically
rely on NTFS permissions and leave the default shared folder permissions (or
remove the Everyone group and provide the Users group full access) in place
because NTFS permissions do a much better job of securing data. Because of the
way that shared folder permissions and NTFS permissions interact, NTFS permissions secure data for both local and network access. Adding shared folder permissions is really unnecessary and in fact complicates the permissions that
administrators must work with. The exception to this is on computers running
older versions of Windows (for example, Windows 98 or Windows Me) that do not
support the NTFS file system; these systems must use shared folder permissions if
their data is to be shared on the network.
Practice: Managing Shared Folders
In this practice, you will determine the effective shared permissions of users, share a
folder, create an additional share name for a shared folder, and stop the sharing of a
folder.
Exercise 1: Calculate Effective Shared Permissions
In the following exercise, User101 has been assigned permissions to access resources
as an individual and as a member of a group, as shown in Figure 9-7.
Lesson 1
1
Introduction to Shared Folders
9-15
FolderA
Group1
R
Group2
CP
?
User101
Group3
FC
2
FolderB
Full Control
Managers
CP
?
User102
Sales
FC
F09us07
Figure 9-7
Identify effective permissions.
Determine which effective permissions are assigned for User101 and User102.
1. User101 is a member of Group1, Group2, and Group3. Group1 has Read permission. Group2 has Full Control permission for FolderA, and Group3 has change
permissions assigned for FolderA. What are User101’s effective permissions for
FolderA?
2. User102 has been granted the Full Control shared folder permission for FolderB as
an individual user. User102 is a member of the Managers group, which has been
granted Change permission for FolderB, and a member of the Sales group, which
has been denied all access to FolderB. What are User102’s effective permissions
for FolderB?
9-16
Chapter 9
Administering Shared Folders
Exercise 2: Create a Shared Folder
1. Click Start, and then click My Documents.
2. In the My Documents window, click the File menu, point to New, and then click
Folder.
3. The new folder appears in the window with the name highlighted. Type Public
Files for the name of the folder.
4. Right-click the Public Files folder, and click Sharing and Security.
5. In the Public Files Properties dialog box, on the Sharing tab, click Share This
Folder, and then click Apply.
6. What new button appears on the dialog box after you click Apply?
7. Click Permissions.
8. In the Permissions for Public Files dialog box, in the Group Or User Names list,
click Everyone and then click Remove.
9. Click Add.
10. In the Select Users Or Groups dialog box, type Users and then click OK.
11. In the Permissions for Public Files dialog box, in the Group Or User Names list,
click Users.
12. In the Permissions for Users list, in the Allow column, select the Change check
box.
13. Click OK, and leave the Public Files dialog box open for the next exercise.
Exercise 3: Create an Additional Share Name for a Folder
1. In the Public Files dialog box, click New Share.
2. In the New Share dialog box, in the Share Name text box, type Public Files 2.
3. In the Comment text box, type Power Users.
4. Click Permissions.
5. In the Permissions for Public Files 2 dialog box, in the Group Or User Names list,
click Everyone and then click Remove.
6. Click Add.
7. In the Select Users Or Groups dialog box, type Power Users and then click OK.
Lesson 1
Introduction to Shared Folders
9-17
8. In the Permissions for Public Files dialog box, in the Group Or User Names list,
click Power Users.
9. In the Permissions for Users list, in the Allow column, select the Full Control check
box, and then click OK.
10. In the New Share dialog box, click OK.
11. What new button is added to the Public Files Properties dialog box?
12. Click OK.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Because you use NTFS permissions to specify which users and groups can access
files and folders and what these permissions allow users to do with the contents
of the file or folder, why do you need to share a folder or use shared folder permissions?
2. Which of the following permissions are shared folder permissions? (Choose all
that apply.)
a. Read
b. Write
c. Modify
d. Full Control
3. ______________________ (Denied /Allowed) permissions take precedence over
____________ (denied /allowed) permissions on a shared folder.
9-18
Chapter 9
Administering Shared Folders
4. When you copy a shared folder, the original folder is ___________________ (no
longer shared /still shared) and the copy is ______________________ (not shared /
shared).
5. When you move a shared folder, the folder is ______________________ (no longer
shared /still shared).
6. When you rename a shared folder, the folder is ______________________ (no
longer shared /still shared).
7. Windows XP Professional automatically shares folders for administrative purposes.
These shares are marked with a __________________, which hides them from
users who browse the computer.
8. The system root folder, which is C:\Windows by default, is shared as
____________. Administrators can access this shared folder to administer Windows
XP Professional without knowing in which folder it is installed. Only members of
the Administrators group have access to this share. Windows XP Professional
assigns the Full Control permission to the Administrators group.
Lesson Summary
■
Simple File Sharing is a simplified sharing model that allows users to share or not
share a folder instead of applying NTFS and shared folder permissions. Simple File
Sharing is enabled by default on computers running Windows XP Professional that
are members of a workgroup. Simple File Sharing is not available on computers
that are members of a domain.
■
The three shared folder permissions are Read, Change, and Full Control.
■
To share a folder, you must be a member of the Administrators or Power Users
groups, or have the Create Permanent Shared Objects user right assigned to your
account.
■
The characteristics of shared folder permissions include:
■
❑
Shared folder permissions apply to folders, not individual files.
❑
Shared folder permissions apply only to users who connect to the folder over
the network.
❑
Using shared folder permissions is the only way to secure file resources on
FAT volumes.
❑
The default shared folder permission is Read, and it is assigned to the Everyone group when you share the folder.
When you share a folder, you can give it a share name, provide comments to
describe the folder and its content, control the number of users who have access
to the folder, assign permissions, and share the same folder multiple times.
Lesson 1
Introduction to Shared Folders
9-19
■
After sharing a folder, control access to that folder by assigning shared folder permissions.
■
You can create multiple share names for a single folder and assign different permissions to each share name.
■
For existing shared folders, you can stop sharing the folder, modify the share
name, and modify shared folder permissions.
■
You can connect to a shared folder by using My Network Places, My Computer, or
the Run dialog box.
■
Windows XP Professional automatically shares folders for administrative purposes.
These shares are marked with a dollar sign ($), which hides them from users who
browse the computer.
■
You can use Computer Management to view, create, and modify shared folders, as
well as to view users that are connected to each share. You can also use Computer
Management to remotely manage shared folders on other computers.
■
You should practice the principle of least privilege when assigning shared folder
permissions by allowing users only the access they need to do their job. You
should grant permissions to groups rather than users. You should also try to
arrange folders so that resources with the same security requirements are grouped.
9-20
Chapter 9
Administering Shared Folders
Lesson 2: Combining Shared Folder Permissions and NTFS
Permissions
You share folders to provide network users with access to resources. If you are using
a FAT volume, the shared folder permissions are the only resource available to provide
security for the folders that you have shared and the folders and files they contain. If
you are using an NTFS volume, you can assign NTFS permissions to individual users
and groups to better control access to the files and subfolders in the shared folders.
When you combine shared folder permissions and NTFS permissions, the more restrictive permission is always the overriding permission.
After this lesson, you will be able to
■ Calculate effective permissions for folders that have shared folder and NTFS permis-
sions
■ Explain the rules when combining shared folder permissions and NTFS permissions
■ Combine shared folder permissions and NTFS permissions
Estimated lesson time: 15 minutes
How to Calculate Effective Permissions for Folders That Have Shared
Folder and NTFS Permissions
When users connect to shared folders that are located on NTFS volumes, share permissions and NTFS permissions will combine to control the actions that a user can perform. Determining effective permissions can be somewhat difficult when both NTFS
and shared permissions are involved.
Calculating effective permissions for resources within a shared folder on an NTFS partition is a three-step process.
1. Calculate the NTFS effective permissions for the user.
2. Calculate the shared folder effective permissions for the user.
3. Analyze the results of steps 1 and 2, and select the result that is the more restrictive
of the two. This will be the user’s effective permission for the shared folder.
Rules When Combining Shared Folder Permissions and
NTFS Permissions
When you use shared folder permissions on an NTFS volume, the following rules
apply:
Lesson 2
Combining Shared Folder Permissions and NTFS Permissions
9-21
■
You can apply NTFS permissions to files and subfolders in the shared folder. You
can apply different NTFS permissions to each file and subfolder contained in a
shared folder.
■
In addition to shared folder permissions, users must have NTFS permissions for
the files and subfolders contained in shared folders to access those files and subfolders. This is in contrast to FAT volumes, in which permissions for a shared
folder are the only permissions protecting files and subfolders in the shared folder.
■
When you combine shared folder permissions and NTFS permissions, the more
restrictive permission is always the overriding permission.
In Figure 9-8, the Users group has the shared folder Full Control permission for the
Public folder and the NTFS Read permission for FileA. The Everyone group’s effective
permission for FileA is the more restrictive Read permission. The effective permission
for FileB is Full Control because both the shared folder permission and the NTFS permission allow this level of access.
Public
FC
NTFS permission
Users
File A
R
NTFS permission
File B
CP
NTFS volume
• Apply NTFS permissions to files and subfolders.
• The most restrictive permission is the effective permission.
F09us08
Figure 9-8
Combine shared folder permissions and NTFS permissions.
Practice: Combining Permissions
Figure 9-9 shows examples of shared folders on NTFS volumes. These shared folders
contain subfolders that have also been assigned NTFS permissions. Determine a user’s
effective permissions for each example.
9-22
Chapter 9
1
Administering Shared Folders
Sales Group
Data
R
NTFS permission
Sales
FC
NTFS volume
2
Users Group
Users
FC
NTFS permission
User1
FC
NTFS permission
User2
User1
User2
FC
NTFS volume
F09us9
Figure 9-9 Combine permissions for each group.
1. In the first example, the Data folder is shared. The Sales group has the shared
folder Read permission for the Data folder and the NTFS Full Control permission
for the Sales subfolder. What are the Sales group’s effective permissions for the
Sales subfolder when they gain access to the Sales subfolder by making a connection to the Data shared folder?
2. In the second example, the Users folder contains user home folders. Each user
home folder contains data accessible only to the user for whom the folder is
named. The Users folder has been shared, and the Users group has the shared
folder Full Control permission for the Users folder. User1 and User2 have the NTFS
Full Control permission for their home folder only and no NTFS permissions for
other folders. These users are all members of the Users group. What permissions
does User1 have when he or she accesses the User1 subfolder by making a con-
Lesson 2
Combining Shared Folder Permissions and NTFS Permissions
9-23
nection to the Users shared folder? What are User1’s permissions for the User2
subfolder?
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. If you are using both shared folder and NTFS permissions, the ______________
(least/most) restrictive permission is always the overriding permission.
2. Which of the following statements about combining shared folder permissions and
NTFS permissions are true? (Choose all that apply.)
a. You can use shared folder permissions on all shared folders.
b. The Change shared folder permission is more restrictive than the Read NTFS
permission.
c. You can use NTFS permissions on all shared folders.
d. The Read NTFS permission is more restrictive than the Change shared folder
permission.
3. Which of the following statements about shared folder permissions and NTFS permissions are true? (Choose all that apply.)
a. NTFS permissions apply only when the resource is accessed over the network.
b. NTFS permissions apply whether the resource is accessed locally or over the
network.
c. Shared folder permissions apply only when the resource is accessed over the
network.
d. Shared folder permissions apply whether the resource is accessed locally or
over the network.
4. If needed, you can apply different ______________________ permissions to each
folder, file, and subfolder.
9-24
Chapter 9
Administering Shared Folders
Lesson Summary
■
To combine shared folder and NTFS permissions, you should take the following
steps:
a. Calculate the NTFS effective permissions for the user.
b. Calculate the shared folder effective permissions for the user.
c. Analyze the results of steps 1 and 2, and select the result that is the more
restrictive of the two. This will be the user’s effective permission for the
shared folder.
■
On a FAT volume, the shared folder permissions are the only available way to provide security for the folders you have shared and for the folders and files they contain. On an NTFS volume, you can assign NTFS permissions to individual users
and groups to better control access to the files and subfolders in the shared folders. On an NTFS volume, you can apply different NTFS permissions to each file
and subfolder in a shared folder.
Case Scenario Exercise
In this exercise, you will read a scenario about planning shared folders and then
answer the questions that follow. If you have difficulty completing this work, review
the material in this chapter before beginning the next chapter. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
Scenario
You are an administrator working for a company named Contoso, Ltd., a manufacturer
of telephone systems used in airplanes. You are planning how to share resources on
servers in the company’s main office. Record your decisions in the table at the end of
this exercise. Figure 9-10 illustrates a partial folder structure for the servers at the manufacturing company.
Lesson 2
Combining Shared Folder Permissions and NTFS Permissions
Server1
Server2
C:
C:
Users
9-25
Data
User_name
Customer service
Server3
Public
D:
D:
Applications
Spreadsheet
Word processing
Database
Customers
Management guidelines
Project management
F09us10
Figure 9-10
A partial folder structure for the servers at a manufacturing company
You need to make resources on these servers available to network users. To do this,
determine which folders to share and which permissions to assign to groups, including
the appropriate built-in groups. Base your planning decisions on the following criteria:
■
Members of the Managers group need to read and revise documents in the Management Guidelines folder. Nobody else should have access to this folder.
■
Administrators need complete access to all shared folders, except for Management
Guidelines.
■
The customer service department needs its own network location to store working
files. All customer service representatives are members of the Customer Service
group.
9-26
Chapter 9
Administering Shared Folders
■
All employees need a network location to share information with each other.
■
All employees need to use the spreadsheet, database, and word processing software.
■
Only members of the Managers group should have access to the project management software.
■
Members of the CustomerDBFull group need to read and update the customer
database.
■
Members of the CustomerDBRead group need to read only the customer database.
■
Each user needs a private network location to store files, which must be accessible
only to that user.
■
Share names must be accessible from computers running Windows 95 and later, as
well as from non-Windows-based platforms.
Questions
Record your answers in this table.
Folder Name and Location
Shared Name
Groups and Permissions
Example:
Management Guidelines
MgmtGd
Managers: Full Control
Troubleshooting Lab
You are an administrator for a company named Contoso, Ltd., which is a distributor of
high-end fabrics sold at custom furniture retailers across the United States. You are
working with Sandra, a manager in the Sales department. Sandra is trying to work with
a file named Winter Products, which is located in a shared folder named Brochures.
She can access the file in a shared folder, but cannot save the file after making changes.
Lesson 2
Combining Shared Folder Permissions and NTFS Permissions
9-27
Sandra is a member of the following groups:
■
Sales
■
Users
■
Sales Managers
NTFS permissions are configured as shown in Figure 9-11.Shared folder permissions
are configured as shown in Figure 9-12.
F09us11
Figure 9-11
Examine the NTFS permissions for the Brochures folder.
Figure 9-12
Examine the shared folder permissions for the Brochures folder.
F09us12
9-28
Chapter 9
Administering Shared Folders
Why can Sandra open the file but not save it in the shared folder? How would you
solve the problem?
Chapter Summary
■
■
Sharing a folder makes the folder available to users on the network. You should
understand the following points about shared folders:
❑
Simple File Sharing is enabled by default on computers running Windows XP
Professional that are members of a workgroup. Simple File Sharing is not
available on computers that are members of a domain.
❑
The three shared folder permissions are Read, Change, and Full Control.
❑
To share a folder, you must be a member of the Administrators or Power
Users groups, or have the Create Permanent Shared Objects user right
assigned to your account.
❑
You can share folders, but not individual files.
❑
You can share folders on NTFS or FAT volumes.
❑
You can create multiple share names for a single folder.
❑
Windows XP Professional automatically shares folders for administrative purposes. These shares are marked with a dollar sign ($), which hides them from
users who browse the computer.
❑
You can use Computer Management to view, create, and modify shared folders,
as well as to view users that are connected to each share. You can also use Computer Management to remotely manage shared folders on other computers.
When shared folder permissions and NTFS permissions exist on a folder, you can
calculate the overall effective permissions by calculating the effective shared
folder permissions, then calculating the effective NTFS permissions, and then
applying the more restrictive of those two.
Exam Highlights
9-29
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
If you cannot access the Security tab of a file or folder’s Properties dialog box or
if you cannot assign shared folder permissions to a folder, Simple File Sharing is
probably enabled.
■
Users of the Administrators or Power Users groups can share a folder. Users who
have been assigned the Create Permanent Shared Objects user right can also share
folders.
■
You often can use the built-in administrative shares to access resources on a computer when you cannot otherwise gain access. In particular, the Admin$ share is
useful because it allows you to access the system root folder of a computer. You
can also type the drive letter followed by a dollar sign (for example, C$) to access
a particular drive.
Key Terms
administrative share Hidden shares that Windows XP Professional creates automatically so that administrators can access resources on a computer.
Computer Management A console that provides access to a number of management utilities for administering a computer, including the ability to create, manage,
and monitor shared folders.
effective permissions The permissions level that a user actually has, taking all permission sources into account.
hidden share A method of preventing users who are browsing the network from
viewing the share. If you append the dollar sign ($) to a share name, it becomes
hidden. Built-in administrative shares are examples of hidden shares.
shared folder permissions Permissions assigned to shared folders that control
access to the folder over the network. Shared folder permissions include Read,
Change, and Full Control.
shared folders
Folders made accessible to users on the network.
Simple File Sharing A type of sharing that is used when a Windows XP computer
has not joined a domain or is running Windows XP Home Edition.
9-30
Chapter 9
Administering Shared Folders
Questions and Answers
Lesson 1 Practice: Exercise 1
Page
9-14
1. User101 is a member of Group1, Group2, and Group3. Group1 has Read permission. Group2 has Full Control permission for FolderA, and Group3 has change
permissions assigned for FolderA. What are User101’s effective permissions for
FolderA?
Because User101 is a member of Group1, Group2, and Group3, User101’s effective permission is Full Control, which includes all capabilities of the Read permission and the Change permission.
2. User102 has been granted the Full Control shared folder permission for FolderB as
an individual user. User102 is a member of the Managers group, which has been
granted Change permission for FolderB, and a member of the Sales group, which
has been denied all access to FolderB. What are User102’s effective permissions
for FolderB?
User102 has been granted Full Control to FolderB, but because User102 is a member of the
Managers group and the Sales group, User102’s effective permission is denied Full Control
access to FolderB. Denied permission overrides all other permissions.
Lesson 1 Practice: Exercise 2
Page
9-16
1. What new button appears on the dialog box after you click Apply?
A button named New Share appears in the Properties dialog box for a folder after you share the
folder for the first time. This button allows you to create additional shares.
Lesson 1 Practice: Exercise 3
Page
9-16
1. What new button is added to the Public Files Properties dialog box?
After creating an additional share, a button named Remove Share is added to the dialog box.
You can use this button to remove the additional share name.
Lesson 1 Review
Page
9-17
1. Because you use NTFS permissions to specify which users and groups can access
files and folders and what these permissions allow users to do with the contents
of the file or folder, why do you need to share a folder or use shared folder permissions?
Although NTFS security is effective whether a user gains access to the file or folder at the computer or over the network, NTFS permissions do not make folders available over the network.
Sharing folders is the only way to make folders and their contents available over the network.
Shared folder permissions provide another way to secure file resources. They can be used on
FAT or FAT32 partitions, as well as NTFS partitions, whereas NTFS permissions are available
only on NTFS volumes.
Questions and Answers
9-31
2. Which of the following permissions are shared folder permissions? (Choose all
that apply.)
a. Read
b. Write
c. Modify
d. Full Control
The correct answers are A and D. The available shared folder permissions are Read, Change,
and Full Control. B and C are not correct because Write and Modify are not valid shared folder
permissions.
3. ______________________ (Denied /Allowed) permissions take precedence over
____________ (denied /allowed) permissions on a shared folder.
Denied permissions take precedence over allowed permissions on a shared folder.
4. When you copy a shared folder, the original folder is ___________________ (no
longer shared /still shared) and the copy is ______________________ (not shared /
shared).
When you copy a folder, the original folder is still shared and the copy is not shared.
5. When you move a shared folder, the folder is ______________________ (no longer
shared /still shared).
When you move a shared folder, the folder is no longer shared.
6. When you rename a shared folder, the folder is ______________________ (no
longer shared /still shared).
When you rename a shared folder, the folder is no longer shared.
7. Windows XP Professional automatically shares folders for administrative purposes.
These shares are marked with a __________________, which hides them from
users who browse the computer.
Dollar sign ($)
8. The system root folder, which is C:\Windows by default, is shared as
____________. Administrators can access this shared folder to administer Windows
XP Professional without knowing in which folder it is installed. Only members of
the Administrators group have access to this share. Windows XP Professional
assigns the Full Control permission to the Administrators group.
Admin$
9-32
Chapter 9
Administering Shared Folders
Lesson 2 Practice: Combining Permissions
Page
9-21
1. In the first example, the Data folder is shared. The Sales group has the shared
folder Read permission for the Data folder and the NTFS Full Control permission
for the Sales subfolder. What are the Sales group’s effective permissions for the
Sales subfolder when they gain access to the Sales subfolder by making a connection to the Data shared folder?
The Sales group has the Read permission for the Sales subfolder because when shared folder
permissions are combined with NTFS permissions, the more restrictive permission applies.
2. In the second example, the Users folder contains user home folders. Each user
home folder contains data accessible only to the user for whom the folder is
named. The Users folder has been shared, and the Users group has the shared
folder Full Control permission for the Users folder. User1 and User2 have the NTFS
Full Control permission for their home folder only and no NTFS permissions for
other folders. These users are all members of the Users group. What permissions
does User1 have when he or she accesses the User1 subfolder by making a connection to the Users shared folder? What are User1’s permissions for the User2
subfolder?
User1 has the Full Control permission for the User1 subfolder because both the shared folder
permission and the NTFS permission allow Full Control. User1 cannot access the User2 subfolder because she or he has no NTFS permission to gain access to it.
Lesson 2 Review
Page
9-23
1. If you are using both shared folder and NTFS permissions, the ______________
(least/most) restrictive permission is always the overriding permission.
Most
2. Which of the following statements about combining shared folder permissions and
NTFS permissions are true? (Choose all that apply.)
a. You can use shared folder permissions on all shared folders.
b. The Change shared folder permission is more restrictive than the Read NTFS
permission.
c. You can use NTFS permissions on all shared folders.
d. The Read NTFS permission is more restrictive than the Change shared folder
permission.
The correct answers are A and D. B is not correct because the Read NTFS permission is more
restrictive than the Change shared folder permission. C is not correct because you can use
NTFS permissions only on volumes formatted with NTFS, whereas you can use shared folder
permissions on volumes formatted with NTFS or FAT.
Questions and Answers
9-33
3. Which of the following statements about shared folder permissions and NTFS permissions are true? (Choose all that apply.)
a. NTFS permissions apply only when the resource is accessed over the network.
b. NTFS permissions apply whether the resource is accessed locally or over the
network.
c. Shared folder permissions apply only when the resource is accessed over the
network.
d. Shared folder permissions apply whether the resource is accessed locally or
over the network.
The correct answers are B and C. A is not correct because NTFS permissions apply whether the
resource is accessed locally or over the network. D is not correct because shared folder permissions are applied only when a folder is accessed remotely over the network.
4. If needed, you can apply different ______________________ permissions to each
folder, file, and subfolder.
NTFS
Case Scenario Exercise Questions
Page
9-24
Folder Name and Location
Shared Name
Groups and Permissions
Example:
Management Guidelines
MgmtGd
Managers: Full Control
You have two choices for permissions: you can rely entirely on NTFS permissions and assign
Full Control for all shared folders to the Everyone group, or you can use shared folder permissions according to resource needs. The following suggested shared folders include required
permissions if you decide to assign shared folder permissions.
■
Share Management Guidelines as MgmtGd. Assign the Full Control permission to the Managers group.
■
Share Data as Data. Assign the Full Control permission to the Administrators built-in group.
9-34
Chapter 9
Administering Shared Folders
■
Share Data\Customer Service as CustServ. Assign the Change permission to the Customer
Service group.
■
Share Data\Public as Public. Assign the Change permission to the Users built-in group.
■
Share Applications as Apps. Assign the Read permission to the Users built-in group and the Full
Control permission to the Administrators built-in group.
■
Share Project Management as ProjMan. Assign the Change permission to the Managers group
and the Full Control permission to the Administrators built-in group.
■
Share Database\Customers as CustDB. Assign the Change permission to the CustomerDBFull
group, the Read permission to the CustomerDBRead group, and the Full Control permission to
the Administrators built-in group.
■
Share Users as Users. Create a folder for every employee below this folder. Assign the Full Control permission to each employee for his or her own folder. Preferably, have Windows XP Professional create the folder and assign permission automatically when you create each user
account
Troubleshooting Lab
Page
9-26
Why can Sandra open the file but cannot save it in the shared folder? How would you
solve the problem?
Sandra has the effective NTFS permissions necessary to open and save the file. The Sales
group has the Read & Execute, List Folder Contents, and Read permissions. The Sales Managers group has these permissions plus the Modify and Write permissions. To determine effective
NTFS permissions, combine permissions from all sources.
For shared folder permissions, both the Sales and Sales Managers groups have only the Read
permission. Because you choose the most restrictive permission when combining NTFS and
shared folder permissions, Sandra ends up being able to read—but not change—files in the
Brochures folder. To solve this problem, you should select the Change check box in the Allow
column of the Permissions for Sales Managers list (see Figure 9-12).
10 Managing Data Storage
Exam Objectives in this Chapter:
■
Monitor, manage, and troubleshoot access to files and folders
❑
Configure, manage, and troubleshoot file compression
❑
Optimize access to files and folders
■
Manage and troubleshoot access to and synchronization of offline files
■
Implement, manage, and troubleshoot disk devices
■
❑
Install, configure, and manage DVD and CD-ROM devices
❑
Monitor and configure disks
❑
Monitor, configure, and troubleshoot volumes
❑
Monitor and configure removable media, such as tape drives
Configure, manage, and troubleshoot the Encrypting File System (EFS)
Why This Chapter Matters
This chapter introduces data storage management on different types of volumes.
You will learn about the different types of disk devices and volumes, as well as
how to manage and troubleshoot them in Windows XP Professional. You will
learn about compression, which allows you to store more data on a disk, and you
will learn about disk quotas, which allow you to control how much space a user
can use on a disk. You will learn how you can increase the security of files and
folders on your computer by using the Microsoft Encrypting File System (EFS).
You will also learn about defragmenting a disk, which allows your system to
access and save files and folders more efficiently.
Lessons in this Chapter:
■
Lesson 1: Managing and Troubleshooting Disks and Volumes . . . . . . . . . . . .10-3
■
Lesson 2: Managing Compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-28
■
Lesson 3: Managing Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-39
■
Lesson 4: Increasing Security by Using EFS. . . . . . . . . . . . . . . . . . . . . . . . . 10-49
■
Lesson 5: Maintaining Disks with Disk Defragmenter,
Check Disk, and Disk Cleanup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-57
■
Lesson 6: Configuring Offline Folders and Files . . . . . . . . . . . . . . . . . . . . . 10-69
10-1
10-2
Chapter 10
Managing Data Storage
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have Windows XP Professional installed on the computer.
Lesson 1
Managing and Troubleshooting Disks and Volumes
10-3
Lesson 1: Managing and Troubleshooting Disks and
Volumes
Hard disks are fixed storage devices that are connected to a computer by Integrated
Device Electronics (IDE) or Small Computer System Interface (SCSI) controllers. Portable hard disks are also available, and they can be connected with universal serial bus
(USB) and Institute of Electrical and Electronics Engineers (IEEE) 1394 (also known as
FireWire) interfaces. Windows typically treats portable hard disks, CD-ROM drives, and
DVDs as removable storage devices. This lesson focuses on configuring and troubleshooting hard disks in Windows XP. You should also be able to use the tools that Windows XP provides for managing, maintaining, and troubleshooting hard disks.
After this lesson, you will be able to
■ Explain the use of basic and dynamic disks.
■ Manage hard disks by using the Disk Management tool.
■ Manage hard disks on a remote computer in Computer Management.
■ Manage disks from the command line by using the Diskpart command.
■ Troubleshoot disks and volumes.
■ Work with removable media.
Estimated lesson time: 70 minutes
Overview of Basic and Dynamic Disks
Windows XP Professional supports two types of hard disk storage on desktop computers: basic disks and dynamic disks. (You cannot use dynamic disks on portable computers.)
Basic Disks
Basic disks are the traditional type of storage that is available in earlier versions of
Microsoft Windows. Basic disks are also the default storage type in Windows XP, so all
hard disks begin as basic disks. Windows XP recognizes all disks as basic by default,
including all new installations and upgrades from previous versions of Windows. To
use a dynamic disk, you must convert a basic disk to a dynamic disk.
On a basic disk, you must create one or more partitions (also called basic volumes).
Partitions were covered in detail in Chapter 2, “Installing Windows XP Professional,”
but a brief review is in order.
You must configure a basic disk with at least one partition. In fact, most computers that
you will encounter have a single hard disk with one partition that takes up all the phys-
10-4
Chapter 10
Managing Data Storage
ical space on the disk. You can also divide a hard disk into multiple partitions for the
purpose of organizing file storage or supporting multiple operating systems on a single
computer. You can create the following three types of partitions on a basic hard disk:
Primary You can configure up to four primary partitions on a computer running
a Windows operating system (three partitions if you also have an extended partition on the disk). You can configure any primary partition as the active (or bootable) drive, but only one primary partition is active at a time. Other primary drives
are typically hidden from the operating system and are not assigned a drive letter.
Extended An extended partition provides a way to exceed the four primary partition limit. You cannot format an extended partition with any file system. Rather,
extended partitions serve as a shell in which you can create any number of logical
partitions.
Logical You can create any number of logical partitions inside an extended partition. Logical partitions are normally used for organizing files. All logical partitions
are visible, no matter which operating system is started.
Windows stores partition information for basic disks in the partition table, which is not
part of any operating system (it is an area of the drive that is accessible by all operating
systems). Other configuration options, such as drive letter assignments, are controlled
by the operating system and are stored in the Windows Registry.
Dynamic Disks
Windows XP Professional supports dynamic disks (except on portable computers).
Dynamic disks offer several advantages over basic disks:
■
You can divide a dynamic disk into many volumes. The basic disk concept of primary and extended partitions does not exist when using dynamic disks.
■
Windows stores configuration information for dynamic disks entirely on the disk.
If there are multiple dynamic disks, Windows replicates information to all other
disks so that each disk has a copy of the configuration information. This information is stored in the last 1 MB of the disk.
■
You can extend dynamic volumes by using contiguous or noncontiguous disk
space. Dynamic volumes can also be made up of areas of disk space on more than
one disk.
Lesson 1
Managing and Troubleshooting Disks and Volumes
10-5
Windows XP supports the following types of dynamic volumes
Simple volume A simple volume can contain disk space from a single disk and can
be extended if necessary.
Spanned volume A spanned volume can contain disk space from 2 or more (up to
a maximum of 32) disks. The amount of disk space from each disk can vary. You
will most often use spanned volumes when a simple volume is running low on
disk space and you need to extend the volume by using space on another hard
disk. You can continue to extend spanned volumes to include areas from additional hard disks as necessary. When Windows writes data to a spanned volume,
it writes data to the area on the first disk until the area is filled, and then writes
data to the area on the second disk, and so on. There is no fault tolerance in
spanned volumes. If any of the disks containing the spanned volume fail, you lose
all data in the entire spanned volume.
Striped volume A striped volume can contain disk space from 2 or more (up to a
maximum of 32) disks. Unlike spanned volumes, striped volumes require that you
use an identical amount of disk space from each disk. When Windows writes data
to a striped volume, it divides the data into 64 KB chunks and writes to the disks
in a fixed order. Thus, Windows will split a 128 KB file into two 64 KB chunks,
and then stores each chunk on a separate disk. Striped volumes provide increased
performance because it is faster to read or write two smaller pieces of a file on two
drives than to read or write the entire file on a single drive. However, you cannot
extend striped volumes, and they provide no fault tolerance. If any of the disks
that contain the striped volume fail, you lose all data on the volume. Striped volumes are also referred to as RAID-0.
!
Exam Tip
Windows XP Professional does not support fault-tolerant disk configurations.
Spanned volumes simply allow you to use different amounts of disk space from multiple hard
disks in a single volume. Striped volumes allow you use an identical amount of disk space
from multiple hard disks. The advantage of using striped volumes is that Windows can write
information to the disk more quickly.
10-6
Chapter 10
Managing Data Storage
Real World
Supporting Multiple Operating Systems
Basic disks are generally sufficient for a computer with a single hard disk. There
are really two situations in which you might want to use a dynamic disk. The first
is if you need to extend a volume to contain unallocated disk space that is not
contiguous (for example, if you have extra free space on the same disk, but not
directly adjacent to the volume you need to extend, or if you have free space on
another disk). The second reason is if you want to configure a striped volume to
increase read/write speed.
If you plan to use multiple operating systems on the same computer, your choice
of disk types will be limited by the operating systems you want to install.
Although multibooting is not used as much as it used to be, it continues to be a
useful feature if you are using Windows XP but occasionally need to replicate
older computing environments. (You will probably find an alternate solution such
as Microsoft Virtual PC more efficient and easy to configure.) If you decide to use
multibooting, you are limited in the following ways:
■
If you need to install Windows XP Professional along with any operating system other than Windows 2000 Professional, you must use a basic disk. You
should create a primary disk partition for each operating system.
■
If you have a single dynamic disk, you can install only one operating system:
Windows XP Professional or Windows 2000 Professional (the only desktop
operating systems that support dynamic disks).
■
If you have two or more hard disks installed in your computer, each dynamic
disk can contain one installation of Windows XP Professional or Windows
2000. No other operating systems can start from a dynamic disk. Windows
XP Home Edition does not support dynamic disks.
Managing Hard Disks by Using the Disk Management Tool
You will use the Disk Management tool to create and manage volumes on fixed and
removable disks. You access Disk Management from within the Computer Management window, as shown in Figure 10-1. You can access Computer Management by
using the Administrative Tools icon in Control Panel or by right-clicking My Computer
and selecting Manage.
Lesson 1
Managing and Troubleshooting Disks and Volumes
10-7
F10us01
Figure 10-1
Use the Disk Management tool to manage fixed and removable storage.
Working with Basic Disks
You make unallocated space on basic disks available to the operating system by creating a partition and then formatting that partition with the file system of your choice.
How to Create a Primary Partition
To create a primary partition, follow these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools menu, double-click Computer Management.
Tip
You can also open Computer Management by right-clicking the My Computer icon on the
desktop or Start menu, and then clicking Manage.
5. In the Computer Management window, expand the Storage container, and then
click Disk Management.
6. In Disk Management, right-click the unallocated space in which you want to create the primary partition, as shown in Figure 10-2, and then select New Partition.
10-8
Chapter 10
Managing Data Storage
F10us02fg
Figure 10-2
Create a partition on a basic disk.
7. On the Welcome page for the New Partition Wizard, click Next.
8. On the Select Partition Type page, shown in Figure 10-3, click Primary Partition
and click Next.
F10us03
Figure 10-3
Select a partition type on the basic disk.
9. On the Specify Partition Size page, enter the amount of disk space in megabytes
(MB) that you want to use for this partition, and then click Next.
10. On the Assign Drive Letter Or Path page, choose an available drive letter or a path
for a volume mount point, and then click Next.
Lesson 1
Managing and Troubleshooting Disks and Volumes
10-9
11. On the Format Partition page, click Format This Partition, select a file system, and
then assign a volume label. Click Next.
12. On the Completion page, click Finish to create and format the partition. Be
patient: Windows must perform a number of functions, which can take several
minutes.
How to Create Extended Partitions
steps:
To create an extended partition, follow these
1. In Disk Management, right-click the unallocated space in which you want to create the extended partition and select New Partition.
2. On the Welcome page for the Create Partition Wizard, click Next.
3. On the Select Partition Type page, click Extended Partition, and then click Next.
4. On the Specify Partition Size page, enter the amount of disk space in MB that you
want to use for this partition, and then click Next.
5. On the Completion page, click Finish to create the extended partition.
You are not prompted to assign a drive letter or to format an extended partition
because the extended partition serves only as a shell to contain logical drives. You will
format and assign drive letters to logical drives.
How to Create Logical Drives
follow these steps:
To create a logical drive inside an extended partition,
1. In Disk Management, right-click the free space in the extended partition in which
you want to create the logical drive, and then click New Logical Drive.
2. On the Welcome page for the Create Partition Wizard, click Next.
3. On the Select Partition Type page, click Logical Drive, and then click Next.
4. On the Specify Partition Size page, enter the amount of disk space in MB that you
want to use for this logical drive, and then click Next.
5. On the Assign Drive Letter Or Path page, choose an available drive letter, and then
click Next.
6. On the Format Partition page, click Format This Partition, select a file system, and
then assign a volume label. Click Next.
7. On the completion page, click Finish to create and format the logical drive.
10-10
Chapter 10
Managing Data Storage
Figure 10-4 shows an extended partition on Disk 1 that contains a 502 MB logical drive
and 612 MB of remaining free space.
F10us04
Figure 10-4
Viewing extended and logical partitions in Disk Management.
Formatting Volumes
Formatting a basic or dynamic volume with a file system prepares the volume to
accept data. Unformatted volumes contain no file system and are not accessible by
using Windows Explorer or any other application.
You can format volumes in the following ways:
■
By using Disk Management and formatting the new volume as it is being created
■
By using Disk Management, right-clicking an existing volume, and then selecting
Format
■
By using Windows Explorer, right-clicking the drive letter, and then selecting Format
■
By using a command prompt, using the Format.exe command, and selecting the
appropriate parameters
If you format an existing volume that contains data, all data is lost. Windows XP protects itself by preventing you from formatting the system and boot partition for the
operating system by using any of the built-in Windows utilities.
Formatting options, shown in Figure 10-5, include the following:
Volume Label The character name for a volume of up to 11 characters. This is the
name that is displayed in Disk Management and Windows Explorer. You should
choose a label that describes the type of information that is stored on the volume,
such as System for the volume that contains the operating system or Documents
for a volume that contains user documents.
Lesson 1
Managing and Troubleshooting Disks and Volumes 10-11
File System Allows you choose from the FAT (for FAT16), FAT32, or NTFS file systems (see Chapter 2 for more information on file systems).
Allocation Unit Size Allows you change the default cluster size for any of the file
systems. Microsoft recommends leaving this value at its default setting.
Perform A Quick Format Specifies that you want to format the drive without having Windows perform an exhaustive scan of the drive to check for bad sectors.
Select this option only if you have previously performed a full format and are certain that the disk is not damaged.
Enable File And Folder Compression Specifies that all files placed on the disk will
be compressed by default. Compression is always available on an NTFS volume,
and you can enable or disable it at any time through the properties of the files and
folders on the volume. File And Folder Compression is available only when you
format a volume with NTFS. Read Lesson 2, “Managing Compression,” for more
information.
F10us05
Figure 10-5 You can format a partition by using the Disk Management tool.
Drive Letters
When you create a basic or dynamic volume, you assign it a drive letter, such as C or
D. The drive letter is used to access the volume through Windows Explorer and other
applications. Floppy drives, CD-ROM and DVD drives, removable drives, and tape
devices are also assigned drive letters.
To change the currently assigned drive letter for a volume, right-click the volume in
Disk Management, select Change Drive Letter And Paths from the Action menu, and
then click Change. Note that you can change a volume only to a drive letter that is not
already being used.
Note
Windows XP Professional does not allow you to modify the drive letter for the system
and boot partitions.
10-12
Chapter 10
Managing Data Storage
Volume Mount Points
Windows XP also allows you to mount a volume by using a path instead of assigning
a drive letter. For example, you could create a folder named C:\Files. You could then
assign the C:\Files path to a new volume labeled Files. When you open the C:\Files
folder within Windows Explorer, you would actually see the information that is stored
on the Files volume. This type of volume is referred to as a mounted volume, and the
folder that the mounted volume is attached to is referred to as a volume mount point.
You can create multiple volume mount points for a single volume. You can dismount
and move a mounted volume to another volume mount point if necessary.
Mounted volumes provide a method of extending the perceived available space on an
existing volume without extending the volume’s actual size. Technically, a mounted
volume is a separate volume, but in the user’s eyes it appears to be an extension of an
existing volume. Therefore, you can use mounted volumes to increase the amount of
disk space that is available on a basic volume to include disk space on another hard
disk (remember that you cannot actually extend a basic volume to include space on
another disk). Also, mounted volumes provide a method for managing multiple volumes of information from the same drive letter.
Volume mount points are supported on NTFS volumes only. The volume that is being
mounted can be formatted with any supported file system.
To add a mounted volume to an existing volume, follow these steps:
1. In Windows Explorer, create a folder on an NTFS volume to serve as the volume
mount point.
2. In Disk Management, locate the volume for which you want to modify the drive
letter or path information.
3. Right-click the volume and select Change Drive Letter And Path from the Action
menu.
4. In the Change Drive Letter And Paths For New Volume dialog box, click Add to
create a new mounted volume.
5. In the Add Drive Letter Or Path dialog box, click Mount In The Following Empty
NTFS Folder and enter the path to the volume mount point, as shown in Figure 10-6.
F10us06
Figure 10-6
A mounted volume is actually a path on an existing volume.
Lesson 1
Managing and Troubleshooting Disks and Volumes 10-13
6. Click OK.
Mounted volume paths have a different icon in Windows Explorer, as shown in Figure
10-7, and are represented by the <JUNCTION> identifier when viewed at a command
prompt, as shown in Figure 10-8.
F10us07
Figure 10-7
Volume mount points look like drives in Windows Explorer.
Figure 10-8
Volume mount points are labeled <JUNCTION> at a command prompt.
F10us08
The following list contains some additional information about drive letters and paths:
■
You cannot assign multiple drive letters to a single volume.
■
You cannot assign the same drive letter to multiple volumes on the same computer.
■
You can mount a volume into multiple paths simultaneously.
■
A volume can exist without a drive letter or mount path assigned; however, the
volume will not be accessible by applications.
10-14
Chapter 10
Managing Data Storage
How to Convert a Basic Disk to a Dynamic Disk
All disks are basic disks by default. When you need to take advantage of the functionality that dynamic disks provide, you must convert the basic disks to dynamic disks.
You can convert a basic disk to a dynamic disk without losing existing data.
For the conversion to be successful, there must be at least 1 MB of free unpartitioned
space available on the basic disk. This 1 MB is necessary to store the dynamic disk
database, which tracks the configuration of all dynamic disks in the computer. If Windows XP Professional created the existing partitions, it will have automatically reserved
the 1 MB of space required for the conversion. If another operating system or a thirdparty utility program created the partitions prior to upgrading, there is a chance that no
free space is available. In that case, you will likely have to repartition the drive so that
1 MB of space is reserved as blank space.
During the conversion, all primary and extended partitions become simple dynamic
volumes, and the disk will join the local disk group and receive a copy of the dynamic
disk database.
To convert a basic disk to a dynamic disk, follow these steps:
1. In Disk Management, right-click the basic disk that you want to convert and select
Convert To Dynamic Disk, as shown in Figure 10-9. Make sure that you right-click
the actual disk (to the left of the partitions where the Disk number is located), not
one of the partitions on the disk.
F10us09
Figure 10-9
Use Disk Management to convert a basic disk to a dynamic disk.
2. In the Convert To Dynamic Disk box dialog box, verify the disks that you want to
convert, and then click OK.
3. In the Disks To Convert dialog box, click Convert, and then click Yes to confirm.
If you are warned that the file system must be dismounted, click Yes again.
Lesson 1
Managing and Troubleshooting Disks and Volumes 10-15
Windows returns you to the Disk Management tool and begins the conversion.
!
Note If the disk contains the system or boot volume or any part of the paging file, you will
have to restart the computer to complete the conversion process.
You can verify that Windows completed the conversion by viewing the disk type in
Disk Management, as shown in Figure 10-10.
F10us10
Figure 10-10
The dynamic disk type is displayed in Disk Management.
If you right-click the disk and do not see the Convert To Dynamic Disk option, one of
the following conditions might exist:
■
The disk has already been converted to dynamic.
■
You have right-clicked a volume instead of the disk.
■
The disk is in a portable computer. Portable computers do not support dynamic
disks.
■
There is not 1 MB of available space at the end of the disk to hold the dynamic
disk database.
■
The disk is a removable disk, such as a Zip disk or a detachable USB disk device.
Dynamic disks are not supported on removable disks.
■
The sector size on the disk is larger than 512 bytes. Windows XP Professional supports dynamic disks only on disks with a sector size of 512 bytes. The vast majority
of hard disks use this sector size.
How to Revert from a Dynamic Disk to a Basic Disk
To make a dynamic disk locally accessible by an operating system other than Windows
XP Professional (for example, to allow a computer running Windows 98 to access the
10-16
Chapter 10
Managing Data Storage
hard disk when you install the hard disk in that computer), you must convert the
dynamic disk back to a basic disk. Data is not preserved when reverting to a basic disk;
the downgrade process requires that all data be removed from the disk.
Note
Whether a disk is dynamic or basic has no effect on whether clients running any operating system can connect to shared folders on that disk remotely over the network. Computers running previous versions of Windows cannot locally access a dynamic disk when you
install the disk into the computer.
To revert from a dynamic disk back to a basic disk, follow these steps:
1. Back up all files and folders on the entire disk.
2. In Disk Management, delete all the volumes from the disk.
3. Right-click the dynamic disk you want to convert and select Convert To Basic
Disk.
4. Follow the on-screen instructions.
5. Create an appropriate partition scheme on the disk and format the newly created
drives.
6. Restore data as necessary.
!
Exam Tip When you convert a basic disk to a dynamic disk, data on the disk is preserved.
When you revert a dynamic disk to a basic disk, data on the disk is lost.
How to Create a Simple Dynamic Volume
A simple dynamic volume contains space on a single disk. Although similar to a primary basic volume, there are no limits to how many simple volumes you can create on
a single disk.
To create a simple volume, follow these steps:
1. In Disk Management, right-click the unallocated space on which you want to create the simple volume, and then select New Volume.
2. On the New Volume Wizard welcome page, click Next.
3. On the Select Volume Type page, click Simple, and then click Next.
4. On the Select Disks page, enter the desired size in MB, and then click Next.
Lesson 1
Managing and Troubleshooting Disks and Volumes 10-17
5. On the Assign A Drive Letter Or Path page, select a drive letter or enter a path for
a mounted volume, and then click Next.
6. On the Format Volume page, select the file system and enter a volume label. Click
Next.
7. On the Completion page, click Finish to create the volume.
How to Create a Striped Dynamic Volume
Striped volumes can contain from 2 to 32 disks. Data is written to and read from multiple disks simultaneously, increasing disk performance. Data is written (striped) in 64
KB blocks. Striped volumes do not provide any fault tolerance. If one or more of the
disks in a striped volume fails, all data on the entire volume is lost. Striped volumes are
also known as RAID 0.
To create a striped volume, complete the following steps:
1. In Disk Management, right-click the unallocated space on one of the disks on
which you want to create the striped volume, and then select New Volume.
2. On the New Volume Wizard welcome page, click Next.
3. On the Select Volume Type page, click Striped, and then click Next. Note that you
must have multiple dynamic disks with unallocated space for Striped to be an
option.
4. On the Select Disks page, select the disks to be included in the striped volume.
Adjust the size of the striped volume accordingly, and then click Next.
5. On the Assign Drive Letter Or Path page, select a drive letter or enter a path for a
mounted volume, and then click Next.
6. On the Format Volume page, select the file system and enter a volume label. Click
Next.
7. On the Completion page, click Finish to create the volume.
The amount of disk space that is consumed on each disk in the striped volume must be
equal. The disk with the smallest amount of available space limits the maximum
amount of space available on a striped volume. For example, assume that you have the
following drive configuration on your computer:
■
Disk 0—No space available
■
Disk 1—2 GB available
■
Disk 2—2 GB available
■
Disk 3—1 GB available
10-18
Chapter 10
Managing Data Storage
If you attempt to create a striped volume with Disks 1, 2, and 3, the maximum volume
size that you can create is 3 GB. Because Disk 3 has only 1 GB of space available, you
are limited to using only 1 GB from each of the disks in the set. However, if you create
a striped volume using only Disks 1 and 2, the maximum volume size you can create
is 4 GB because both disks have 2 GB of available space.
Extending Volumes
Windows XP Professional supports extending volumes on both basic and dynamic
disks. You extend volumes on basic disks by using the Diskpart command-line utility.
You can extend volumes on dynamic disks by using either the Disk Management utility
or the Diskpart command-line utility.
Extending Volumes on Basic Disks You can extend primary partitions and logical
drives on basic disks if the following conditions are met:
■
The volume to be extended is formatted with the NTFS file system.
■
The volume is extended into contiguous unallocated space (adjacent free space)
that follows the existing volume (as opposed to coming before it).
■
The volume is extended on the same hard disk. Volumes on basic disks cannot be
extended to include disk space on another hard disk.
■
The volume is not the system or boot volume. The system or boot volumes cannot
be extended.
You extend volumes by running the Diskpart utility from the command line, selecting
the appropriate volume, and then executing the following command:
extend [size=n] [noerr]
See Also
For further information on the use of Diskpart, refer to the section entitled “How
to Manage Disks from the Command Line by Using Diskpart” later in this chapter.
Extending Volumes on Dynamic Disks You can extend a simple volume as long as it
has been formatted with NTFS. You do this by attaching additional unallocated space
from the same disk, or from a different disk, to an existing simple volume. Disk space
that is used to extend a simple volume does not have to be contiguous. If the additional space comes from a different disk, the volume becomes a spanned volume.
Spanned volumes can contain disk space from 2 to 32 disks.
If the volume is not formatted with NTFS, you must convert the volume to NTFS before
you can extend it.
Lesson 1
Managing and Troubleshooting Disks and Volumes 10-19
You extend simple volumes by using Disk Management or the Diskpart command-line
utility. Perform extensions of simple volumes with Diskpart the same way that you perform extensions of basic volumes.
To extend a simple volume using Disk Management, follow these steps:
1. In Disk Management, right-click the simple volume that you want to extend, and
then click Extend Volume.
2. On the Extend Volume Wizard welcome page, click Next.
3. On the Select Disks page, select the disk(s) that contain free space that you want
to attach to this volume, enter the amount of space for each disk, and then click
Next.
4. On the Completion page, click Finish to extend the volume.
Figure 10-11 shows the Select Disks page on a single-drive system. In this case, the
maximum available space on the selected disk that you can use to extend the volume
is 2048 MB.
F10us11
Figure 10-11
Extend a simple dynamic volume in Disk Management.
You are not prompted for any information concerning drive lettering or formatting
because the added space assumes the same properties as the existing volume.
Moving Disks to Another Computer
If a computer fails but the hard disks are still functional, you can install the disks into
another computer to ensure that the data is still accessible. However, you need to consider the following issues that are associated with moving disks:
10-20
Chapter 10
Managing Data Storage
■
You cannot move dynamic disks to computers running Windows 95, Windows 98,
Windows Millennium Edition (Windows Me), Windows NT 4.0 or earlier, or Windows XP Home Edition because these operating systems do not support dynamic
disks. To move a disk to these operating systems, you must first convert it to a
basic disk.
■
When moving spanned or striped volumes, move all disks that are associated with
the volume at the same time. If one disk is missing from a spanned or striped volume, none of the data on the entire volume is accessible.
■
Windows XP Professional does not support volume sets or stripe sets that were
created in Windows NT 4.0. You must back up the data, delete the volumes, install
the disks into the Windows XP Professional computer, create new volumes, and
then restore the data. Alternatively, you can install the disks into a computer running Windows 2000 (which does support Windows NT volume and stripe sets),
convert the disks to dynamic disks (which converts volume sets to spanned volumes and stripe sets to striped volumes), and then install the disks into a computer
running Windows XP Professional.
After moving disks, the disks appear in Disk Management on the new computer. Basic
disks are immediately accessible. Dynamic disks initially appear as foreign disks and
need to be imported before you can access them.
How to Import Foreign Disks
All dynamic disks on a computer running Windows XP Professional are members of
the same disk group. Each disk in the group contains the dynamic disk database for the
entire group stored in the 1 MB reserved disk area at the end of the disk. When you
move a dynamic disk from one computer to another, Windows displays it as a foreign
disk because it does not belong to the local disk group. You must import foreign disks,
which merge the disk’s information into the dynamic disk database on the new computer and place a copy of the database on the newly installed disk.
To import a foreign disk, follow these steps:
1. In Disk Management, right-click the disk that is marked Foreign and click Import
Foreign Disks from the Action menu.
2. Select the disk group that you want to import. (There might be more than one foreign disk group if you have moved multiple disks from different computers into
the same computer running Windows XP Professional.)
3. In the Foreign Disk Volumes dialog box, review the information to ensure that
the condition for the volumes in the disk group being imported is displayed as
OK. If all the disks for a spanned or striped volume are not present, the condition
Lesson 1
Managing and Troubleshooting Disks and Volumes 10-21
is displayed as incomplete. You should resolve incomplete volume conditions
before continuing with the import.
4. If you are satisfied with the information that is in the Foreign Disk Volumes dialog
box, click OK to import the disks.
Removing Disks from the Dynamic Disk Database
If you remove a dynamic disk from a computer running Windows XP, Disk Management displays the disk as either Offline or Missing because the disk’s configuration is
still present in the dynamic disk database stored on the other disks on the computer.
You can remove the missing disk’s configuration from the dynamic disk database by
right-clicking the disk and selecting Remove Disk.
How to Manage Disks Remotely By Using Computer Management
You can perform disk functions on a remote computer by connecting to that computer
through Computer Management. To connect to a remote computer in Computer Management, follow these steps:
1. From the Start menu, right-click My Computer and select Manage to open the
Computer Management window.
2. In the Computer Management window, right-click Computer Management and
select Connect To Another Computer from the Action menu.
3. In the Select Computer dialog box, select the computer that you want to manage
remotely, and then click OK. Computer Management displays the remote computer’s information, and you can manage the disks on that computer by using the
Disk Management tool.
How to Manage Disks from the Command Line by Using Diskpart
You can use the Diskpart.exe command to execute disk-management tasks from a
command prompt and to create scripts for automating those tasks that you need to perform frequently or on multiple computers.
Executing Diskpart from a command prompt opens the Diskpart command interpreter.
When you are in the Diskpart command interpreter, the command prompt changes to
DISKPART>. You can view available commands for the Diskpart tool by typing commands at the Diskpart command prompt, as shown in Figure 10-12. Note that you type
exit to close the Diskpart command interpreter and return to the normal command
prompt.
10-22
Chapter 10
Managing Data Storage
F10us12
Figure 10-12
Viewing Diskpart command options.
One feature that is not available in Diskpart is the capability to format volumes. To format volumes, you must use the format.exe command from the standard command
prompt.
How to Troubleshoot Disks and Volumes
Disk Management displays the status of each disk and volume. If you refer to Figure
10-1, you notice that all disks are online and all volumes are showing the desired status
of Healthy.
Disk status types are as follows:
Online Displayed by basic and dynamic disks. The disk is accessible. No user action
is required.
Online (Errors) Displayed by dynamic disks only. The disk is accessible, but input/
output (I/O) errors have been detected. If the I/O errors are intermittent, rightclick the disk and select Reactivate Disk. This normally returns the disk to Online
status.
Offline Or Missing Displayed by dynamic disks only. This disk is not accessible.
Attempt to rescan the disks on the computer by selecting Rescan Disks from the
Action menu in Disk Management. If the scan is unsuccessful, look for a physical
reason for the drive failure (cables disconnected, no power to disk, failed disk). If
you must replace a failed drive, first delete all volumes on the disk, right-click the
disk, and select Remove Disk.
Foreign Displayed by dynamic disks only. The disk has been moved to this computer from another computer. Right-click the disk, and then select Import Foreign
Disk. If you do not want to keep the information on the disk, you can select Convert To Basic Disk, and all information on the disk will be lost.
Unreadable Displayed by basic and dynamic disks. The disk is not accessible. Disks
might show this status while they are initializing. If a disk continues to show this
Lesson 1
Managing and Troubleshooting Disks and Volumes 10-23
status, the disk might have failed entirely. Restart the computer to determine
whether the disk will become accessible. If it is a dynamic disk, attempt to repair
the disk by right-clicking it and selecting Rescan Disks.
Unrecognized
The disk is an unknown type, and Windows XP cannot recognize it.
No Media This status is on drives with removable media, such as a CD-ROM drive,
when the drive is empty.
Volume status types and the recommended action (if required) are as follows:
Healthy
The volume is accessible and has no detected problems.
Healthy (At Risk) If the disk status is Online (Errors), the volumes will be accessible,
but all volumes will display this status. Restoring the disk to Online will clear this
status from the volume.
Initializing The volume is in the process of initializing. No action is required. After
the initialization is complete, the volume should show a status of Healthy.
Removable Media
Windows XP contains built-in support for both CD-ROM and DVD-ROM devices. Windows XP also supports a number of other removable media types, such as tape drives
and memory storage. This section covers the monitoring and troubleshooting of
removable media.
CD-ROM and DVD Devices
Most CD-ROM and DVD-ROM devices are Plug and Play–compliant and therefore
require little configuration. To view the status and configuration of these types of
devices, access the device’s Properties dialog box through Device Manager. The General tab of the device’s Properties dialog box indicates whether the device is functioning properly within Windows.
If Device Manager indicates that the device is installed and functioning, yet the
device does not appear to be working properly, there might be a physical problem
with the device installation, or the device itself might be faulty. If the disk tray does
not eject properly, or if the power/usage light-emitting diode (LED) indicators are
not illuminated, open the computer and verify that all connections have been properly established.
If a CD or DVD device appears to read data correctly but does not play back audio,
there is most likely a device driver problem, or additional required components are not
currently configured. Always verify that the device is listed in the Windows Catalog.
Also, make sure that the latest version of the device driver and associated software is
installed.
10-24
Chapter 10
Managing Data Storage
To troubleshoot an audio playback problem, take the following additional steps:
■
Verify that the sound card is properly configured and functional.
■
Verify that the speakers are plugged in and turned on.
■
Verify that the sound has not been muted.
■
Verify that the audio cables connecting the CD/DVD to the sound card are properly connected.
■
Make sure that the CD is clean.
If the CD device supports it, you can enable the digital CD playback feature in the
drive’s Properties dialog box in Device Manager. On the Properties tab, select the
Enable Digital CD Audio For This CD-ROM Device check box. Digital CD playback
requires that CD devices support digital audio extraction (DAE), which older devices
might not support. When digital CD playback is enabled, the CD-ROM drive does not
have to be connected to the sound card, and audio output from the headphone jack on
the CD-ROM drive is disabled.
Removable Storage Media
Removable storage media consist of devices such as disks, tape, and optical media,
which are stored either online in the form of information libraries or offline on a shelf
or in a file drawer. These media are used primarily for backup of applications and data.
They are also used to archive data that is not accessed frequently.
Previous versions of Windows (pre–Windows 2000) did not provide strong support for
removable devices. Each application that required access to a removable device
needed a custom solution for accessing and managing removable storage media. Windows XP centralizes the management of these devices with Removable Storage technology. Removable Storage allows the operating system to manage removable media
centrally, and applications gain access to removable devices through the Removable
Storage interface. Devices with drivers that have been written to take advantage of
Removable Storage are easily accessible and sharable by both the operating system and
applications.
Removable Storage uses the concept of media pools to organize removable media.
Media pools group media by usage, allow media to be shared by multiple applications,
control media access, and provide for tracking of media usage. Other concepts of
removable storage include the following:
Media units The actual devices that store information, such as a CD-ROM, tape cartridge, or removable disk.
Lesson 1
Managing and Troubleshooting Disks and Volumes 10-25
Media libraries Encompass both online libraries and offline media physical locations. Online libraries, which include robotic libraries and stand-alone drives, are
data-storage devices that provide a method of reading and writing to media when
necessary. Offline media physical locations are holding places for media units that
are cataloged by Removable Storage, but are not currently immediately available
through an online library.
Work queues Hold library requests until resources become available. For example, a
robotic tape library has a fixed number of tape drives to access media. A request
submitted to the library is held in a work queue until a tape drive becomes available and the requested tape is mounted.
Operator (administrator) requests Hold requests for offline media. The operator
must make the media available before processing can continue. Other situations
that generate operator requests include the failure of a device or a device needing
to be cleaned when no cleaner cartridge is available. After a request is satisfied,
the administrator must inform Removable Storage so that processing can continue.
Note
Removable storage devices can contain primary partitions only, and those partitions
cannot be marked as active.
The Removable Storage Utility
You perform initial installation, configuration, and troubleshooting of removable storage devices by using the Add Hardware Wizard and Device Manager. After being recognized by the operating system, removable storage devices are available for
management through the Removable Storage utility. Access Removable Storage by
expanding the Storage node in the Computer Management window.
By using the Removable Storage utility, you can insert and eject removable media, control access to media, and manage the use of media by applications. Systems with standard, stand-alone, removable devices (such as a CD-ROM or DVD-ROM drive, Zip
drive, or tape drive) do not require management and configuration by using Removable Storage. Removable Storage is required for computers with more complex configurations, which can include tape or optical disk libraries, especially if multiple
applications will access those devices. You should always consult the documentation
for the removable device to determine how it is best managed.
See Also
Removable Storage devices that require management through the Remote Storage utility are most likely attached to Windows servers in a network environment. Further discussion of Removable Storage management is beyond the scope of this text. For more
information, see http://www.microsoft.com and search for “Removable Storage.”
10-26
Chapter 10
Managing Data Storage
Practice: Managing Hard Disks
In this practice, you will check the status of existing volumes on your computer by
using Disk Management and also change the drive letter for a volume.
Exercise 1: Check the status of existing volumes
1. From the Start menu, right-click My Computer, and then select Manage.
2. In the Computer Management window, click Disk Management.
3. After the Disk Management display initializes, record the description in the Status
column for each volume on your computer.
Exercise 2: Change the drive letter for a volume
1. From the Start menu, right-click My Computer, and then select Manage.
2. In the Computer Management window, click Disk Management.
3. Right-click a volume in the Disk Management display and select Change Drive Letter And Paths.
4. In the Change Drive Letter And Paths dialog box, click Change.
5. In the Change Drive Letter Or Path dialog box, select a new drive letter from the
Assign The Following Drive letter drop-down list, and then click OK.
6. When prompted to confirm, click Yes.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. On which types of computers can you use dynamic disks?
2. What actions must you take to revert from a dynamic disk to a basic disk? What
limitations does this process impose?
Lesson 1
Managing and Troubleshooting Disks and Volumes 10-27
Lesson Summary
■
Windows XP Professional supports two types of disk storage: basic disks and
dynamic disks. Portable computers support only basic disks. All disks are basic
disks by default. When you need to take advantage of the functionality that
dynamic disks provide, you must upgrade the basic disks to dynamic disks
(remember that this feature is available only in Windows XP Professional and Windows 2000 Professional). You can perform this operation with no loss of data.
■
Windows XP Professional provides the Disk Management utility to configure,
manage, and monitor hard disks and volumes. Using this utility, you can accomplish tasks such as the creation and formatting of volumes, moving disks from one
computer to another, and remote disk management.
■
You can manage disks on a remote computer by using Computer Management to
connect to that computer. After connecting to the remote computer, you can use
the Disk Management tool in the same way as on a local computer.
■
You can manage disks from the command line by using the Diskpart command.
■
Disk Management displays the status of disks and volumes. Using this status display, you can quickly determine whether disks are healthy, have errors, or are
offline or missing.
10-28
Chapter 10
Managing Data Storage
Lesson 2: Managing Compression
Windows XP Professional supports two types of compression: NTFS compression
and the Compressed Folders feature. NTFS compression enables you to compress
files, folders, or an entire drive. NTFS compressed files and folders occupy less space
on an NTFS-formatted volume, which enables you to store more data. Each file and
folder on an NTFS volume has a compression state, which is either compressed or
uncompressed. The Compressed Folders feature allows you to create a compressed
folder so that all files you store in that folder are automatically compressed.
After this lesson, you will be able to
■ Explain the purpose of compressed folders.
■ Compress files, folders, or volumes by using NTFS compression.
Estimated lesson time: 60 minutes
What Is the Compressed Folders Feature?
The Compressed Folders feature is new in Windows XP Professional and allows you to
compress folders, while retaining the ability to view and work with their contents.
To create a compressed folder, start Windows Explorer, click File, click New, and then
click Compressed (Zipped) Folder. This creates a compressed folder in the current folder.
You can drag and drop files into the compressed folder and the files are automatically
compressed. If you copy a file from the compressed folder to another that is not compressed, that file will no longer be compressed. A zipper icon is shown, marking compressed folders (see Figure 10-13), and these folders are labeled Compressed Folder.
Benefits of using compressed folders generated with the Compressed Folders feature
include the following:
■
You can create and use compressed files and folders on both file allocation table
(FAT) and NTFS volumes.
■
You can open files directly from the compressed folders and you can run some
programs directly from compressed folders.
■
You can move these compressed files and folders to any drive or folder on your
computer, the Internet, or your network and they are compatible with other zip
programs.
■
You can encrypt compressed folders that you created using this feature.
■
You can compress folders without decreasing performance.
■
You can compress individual files only by storing them in a compressed folder. If you
move or extract the files into an uncompressed folder, they will be uncompressed.
Lesson 2
Managing Compression 10-29
F10us13
Figure 10-13
Compressed folders are labeled with a zipper icon.
How to Compress Files, Folders, or Volumes by Using NTFS
Compression
Unlike compressed folders, NTFS compression is a function of the NTFS file system
and as such is available only on volumes formatted with NTFS. Files compressed with
NTFS compression can be read and written to by any Windows-based or MS-DOS–
based application without first being uncompressed by another program. When an
application or an operating system command requests access to a compressed file,
NTFS automatically uncompresses the file before making it available. When you close
or explicitly save a file, NTFS compresses it again.
Note
NTFS allocates disk space based on uncompressed file size. If you copy a compressed file to an NTFS volume with enough space for the compressed file, but not enough
space for the uncompressed file, you might get an error message stating that there is not
enough disk space for the file, and the file will not be copied to the volume.
How to Compress a Folder or File
You will use Windows Explorer to set the compression state of folders and files. To set
the compression state of a folder or file, right-click the folder or file in Windows
Explorer, click Properties, and then click Advanced. In the Advanced Attributes dialog
box, shown in Figure 10-14, select the Compress Contents To Save Disk Space check
box. Click OK, and then click Apply in the Properties dialog box.
10-30
Chapter 10
Managing Data Storage
Note NTFS encryption and compression are mutually exclusive. For that reason, if you select
the Encrypt Contents To Secure Data check box, you cannot compress the folder or file.
F10us14
Figure 10-14
Use the Advanced Attributes dialog box to compress a file or folder.
Important
To change the compression state for a file or folder, you must have Write permission for that file or folder.
The compression state for a folder does not reflect the compression state of the files
and subfolders in that folder. A folder can be compressed, yet all the files in that folder
can be uncompressed. Alternatively, an uncompressed folder can contain compressed
files. When you compress a folder that contains one or more files, folders, or both,
Windows XP Professional displays the Confirm Attribute Changes dialog box, shown in
Figure 10-15.
F10us15
Figure 10-15 Use the Confirm Attribute Changes dialog box to control what happens to files and
subfolders inside a folder you are compressing.
Lesson 2
Managing Compression 10-31
The Confirm Attribute Changes dialog box has the two additional options explained in
Table 10-1.
Table 10-1
Confirm Attribute Changes Dialog Box Options
Option
Description
Apply Changes To This Folder Only
Compresses only the folder that you have selected
Apply Changes To This Folder,
Subfolders, And Files
Compresses the folder and all subfolders and files that
are contained within it and subsequently added to it
How to Compress a Drive or Volume
You can also set the compression state of an entire NTFS drive or volume. To do so, in
Windows Explorer, right-click the drive or volume, and then click Properties. In the
Properties dialog box, select the Compress Drive To Save Disk Space check box, as
shown in Figure 10-16, and then click OK.
F10us16
Figure 10-16 Use the Properties dialog box of a drive or volume to apply compression to the entire
drive or volume.
How to Control Whether Windows Displays NTFS Compressed Files and Folders in
a Different Color
Windows Explorer makes it easy for you to see whether a file or folder is compressed.
By default, Windows displays the names of compressed files and folders in blue to distinguish them from those that are uncompressed.
To control whether Windows display compressed files and folders in a different color,
use the following steps:
10-32
Chapter 10
Managing Data Storage
1. In Windows Explorer, click the Tools menu, and then click Folder Options.
2. In the Folder Options dialog box, on the View tab, clear or select the Show
Encrypted Or Compressed Files In Color check box.
Note When you clear the Show Encrypted Or Compressed Files In Color check box, Windows will no longer show compressed or encrypted files in color. There is no way to disable
the color display of just-compressed or just-encrypted files.
Copying and Moving NTFS Compressed Files and Folders
There are rules that determine whether the compression state of files and folders is
retained when you copy or move them within and between NTFS and FAT volumes.
The following list describes how Windows XP Professional treats the compression state
of a file or folder when you copy or move a compressed file or folder within or
between NTFS volumes or between NTFS and FAT volumes.
Copying a file within an NTFS volume When you copy a file within an NTFS volume (shown as A in Figure 10-17), the file inherits the compression state of the target folder. For example, if you copy a compressed file to an uncompressed folder,
the file is automatically uncompressed.
Moving a file or folder within an NTFS volume When you move a file or folder
within an NTFS volume (shown as B in Figure 10-17), the file or folder retains its
original compression state. For example, if you move a compressed file to an
uncompressed folder, the file remains compressed.
Copying a file or folder between NTFS volumes When you copy a file or folder
between NTFS volumes (shown as C in Figure 10-17), the file or folder inherits the
compression state of the target folder.
Moving a file or folder between NTFS volumes When you move a file or folder
between NTFS volumes (shown as C in Figure 10-17), the file or folder inherits the
compression state of the target folder. Because Windows XP Professional treats a
move as a copy and a delete, the files inherit the compression state of the target
folder.
Moving or copying a file or folder to a FAT volume Windows XP Professional
supports compression only for NTFS files, so when you move or copy a compressed NTFS file or folder to a FAT volume, Windows XP Professional automatically uncompresses the file or folder.
Moving or copying a compressed file or folder to a floppy disk When you
move or copy a compressed NTFS file or folder to a floppy disk, Windows XP Professional automatically uncompresses the file or folder.
Lesson 2
A
Managing Compression 10-33
B
Copy
Move
Inherits
Retains
NTFS volume
NTFS volume
C
Move
Copy
NTFS volume
Inherits
NTFS volume
F10us17
Figure 10-17 Copying and moving compressed folders and files have different results.
Note
When you copy a compressed NTFS file, Windows XP Professional uncompresses the
file, copies the file, and then compresses the file again as a new file. This might take considerable time.
NTFS Compression Guidelines
The following list provides best practices for using compression on NTFS volumes:
■
Because some file types compress more than others, select file types to compress
based on the anticipated resulting file size. For example, because Windows bitmap files contain more redundant data than application executable files, this file
type compresses to a smaller size. Bitmaps often compress to less than 50 percent
of the original file size, whereas application files rarely compress to less than 75
percent of the original size.
■
Do not store compressed files, such as PKZIP files, in a compressed folder. Windows XP Professional will attempt to compress the file, wasting system time and
yielding no additional disk space.
■
Compress static data rather than data that changes frequently. Compressing and
uncompressing files incurs some system overhead. By choosing to compress files
that are infrequently accessed, you minimize the amount of system time dedicated
to compression and uncompression activities.
■
NTFS compression can cause performance degradation when you copy and move
files. When a compressed file is copied, it is uncompressed, copied, and then
compressed again as a new file. Compress data that is not copied or moved frequently.
10-34
Chapter 10
Managing Data Storage
Practice: Managing Compression
In this practice, you use NTFS compression to compress files and folders. You uncompress a file and test the effects that copying and moving files have on compression. In
the last portion of the practice, you create a compressed folder using the Compressed
Folders feature.
Important
In this practice, it is assumed that you installed Windows XP Professional on
the C drive, and that the C drive is formatted with NTFS. If you installed Windows XP Professional on a different partition and that partition is formatted with NTFS, use that drive letter
when the practice refers to drive C.
Exercise 1: Create Compressed Folders by Using the Compressed Folders Feature
1. Click Start, point to All Programs, point to Accessories, and then click Windows
Explorer.
2. In Windows Explorer, click File and then point to New.
Compressed Folder is an option on the New menu.
3. Click Compressed Folder.
4. Name the compressed folder My Compressed Files.
You have just created a compressed folder. Notice the zipper icon that identifies
compressed folders. You can drag and drop files into the compressed folder, and
they will automatically be compressed. If you copy a file from the compressed
folder to another that is not compressed, the file will no longer be compressed.
5. Close Windows Explorer.
Exercise 2: Compress a Folder by Using NTFS Compression
1. Click Start, point to All Programs, point to Accessories, and then click Windows
Explorer.
2. In Windows Explorer, click Local Disk (C:). If necessary, click Show The Contents
Of This Folder.
3. In Windows Explorer, click File, point to New, and then click Folder.
Windows creates a new folder and selects the name automatically so that you can
simply start typing to rename the folder
4. Type Compressed for the name of the new folder and press ENTER.
5. Double-click the Compressed folder to open it.
6. In the Compressed folder, create a new folder and name it Compressed2.
Lesson 2
Managing Compression 10-35
7. Click the Up button on the toolbar to return to viewing the C drive.
8. Right-click the Compressed folder, and then click Properties.
Windows XP Professional displays the Compressed Properties dialog box with the
General tab active.
9. On the General tab, click Advanced.
Windows XP Professional displays the Advanced Attributes dialog box.
10. Select the Compress Contents To Save Disk Space check box.
11. Click OK to return to the Compressed Properties dialog box.
12. Click Apply to apply your settings.
Windows XP Professional displays the Confirm Attribute Changes dialog box,
prompting you to specify whether to compress only this folder or this folder and
all subfolders.
13. Select the Apply Changes To This Folder, Subfolders, And Files check box, and
then click OK.
Windows XP Professional displays the Applying Attributes message box, indicating the progress of the operation, and the paths and names of folders and files as
they are compressed. Because there is no data in the folder, compression will
likely complete too quickly for you to view this dialog box.
14. Click OK to close the Properties dialog box.
15. What color is the name of the Compressed folder?
Exercise 3: Remove Compression from a Folder
1. In Windows Explorer, double-click the Compressed folder to open it.
2. Is the Compressed2 folder compressed or not compressed? Why?
3. Right-click the Compressed2 folder, and then click Properties.
Windows XP Professional displays the Compressed2 Properties dialog box with
the General tab active.
4. On the General tab, click Advanced.
Windows XP Professional displays the Advanced Attributes dialog box.
10-36
Chapter 10
Managing Data Storage
5. Clear the Compress Contents To Save Disk Space check box, and then click OK to
return to the Compressed2 Properties dialog box.
6. Click OK to apply settings and close the Compressed2 Properties dialog box.
Because the Compressed2 folder is empty, Windows XP Professional does not display the Confirm Attributes Changes dialog box that asks you to specify whether
to uncompress only this folder or this folder and all subfolders.
7. What indication do you have that the Compressed2 folder is no longer compressed?
Exercise 4: Copy and Move Files
In this exercise, you see the effects that copying and moving files has on compressed
files.
To create a compressed file
1. In Windows Explorer, double-click the Compressed folder to open it.
2. On the File menu, click New, and then click Text Document.
3. Type Text1.txt, and then press ENTER.
4. How can you verify that the Text1.txt file is compressed?
To copy a compressed file to an uncompressed folder
1. Copy (hold down CTRL and drag the file) the Text1.txt file to the Compressed2
folder.
2. Double-click the Compressed2 folder to open it.
3. Is the Text1.txt file in the Compressed2 folder compressed or uncompressed?
Why?
4. Delete the Text1.txt file in the Compressed2 folder by right-clicking it and then
clicking Delete.
To move a compressed file to an uncompressed folder
1. Click the Up button on the toolbar to return to the Compressed folder.
2. Is the Text1.txt file in the Compressed folder compressed or uncompressed?
Lesson 2
Managing Compression 10-37
3. Move Text1.txt to the Compressed2 folder by dragging it there.
4. Double-click the Compressed2 folder to open it.
5. Is the Text1.txt file in the Compressed2 folder compressed or uncompressed?
Why?
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. When Sandra tried to copy a compressed file from one NTFS volume to another,
the file was not copied, and she got an error message stating that there was not
enough disk space for the file. Before she attempted to copy the file, Sandra verified that there was enough room for the compressed bitmap on the destination
volume. Why did she get the error message?
2. When you move a file between NTFS volumes, does the file retain the compression state of the source folder, or does the file inherit the compression state of the
target folder? Why?
3. What does Windows XP Professional do when you try to copy a compressed file
to a floppy disk? Why?
10-38
Chapter 10
Managing Data Storage
4. Which of the following types of files or data are good candidates for NTFS compression? (Choose all that apply.)
a. Encrypted data
b. Frequently updated data
c. Bitmaps
d. Static data
Lesson Summary
■
A compressed folder created by the Compressed Folders feature appears in Windows Explorer as an icon of a zipper across a folder. You can drag and drop files
into a compressed folder created by using the Compressed Folders feature, and
the files are automatically compressed.
■
NTFS compression is a function of the NTFS file system that allows you to compress files, folders, or an entire volume. You cannot apply both compression and
encryption to a file or folder at the same time.
Lesson 3
Managing Disk Quotas 10-39
Lesson 3: Managing Disk Quotas
You use disk quotas to manage storage growth in distributed environments. Disk quotas allow you to allocate disk space to users based on the files and folders that they
own. You can set disk quotas, quota thresholds, and quota limits for all users and for
individual users. You can also monitor the amount of hard disk space that users have
used and the amount that they have left against their quota.
After this lesson, you will be able to
■ Describe the purpose of disk quotas
■ Set disk quotas for users
■ Determine the status of disk quotas
■ Monitor disk quotas
■ Identify guidelines for using disk quotas
Estimated lesson time: 30 minutes
Overview of Disk Quotas
Windows XP Professional tracks disk quotas and controls disk usage on a per-user, pervolume basis. Windows XP Professional tracks disk quotas for each volume, even if the
volumes are on the same hard disk. Because quotas are tracked on a per-user basis,
every user’s disk space is tracked regardless of the folder in which the user stores files.
Disk quotas can be applied only to Windows XP Professional NTFS volumes.
Table 10-2 describes the characteristics of Windows XP Professional disk quotas.
Table 10-2
Disk Quota Characteristics and Descriptions
Characteristic
Description
Disk usage is based on
file and folder ownership.
Windows XP Professional calculates disk space usage for users
based on the files and folders that they own. When a user copies
or saves a new file to an NTFS volume or takes ownership of a
file on an NTFS volume, Windows XP Professional charges the
disk space for the file against the user’s quota limit.
Disk quotas do not use
compression.
Windows XP Professional ignores compression when it calculates
hard disk space usage. Users are charged for each uncompressed
byte, regardless of how much hard disk space is actually used.
This is done partially because file compression produces different
degrees of compression for different types of files. Different
uncompressed file types that are the same size might end up
being very different sizes when they are compressed.
Free space for applications
is based on quota limit.
When you enable disk quotas, the free space that Windows XP
Professional reports to applications for the volume is the amount
of space remaining within the user’s disk quota limit.
10-40
Chapter 10
Managing Data Storage
You use disk quotas to monitor and control hard disk space usage. System administrators can do the following:
■
Set a disk quota limit to specify the amount of disk space for each user.
■
Set a disk quota warning to specify when Windows XP Professional should log an
event, indicating that the user is nearing his or her limit.
■
Enforce disk quota limits and deny users access if they exceed their limit, or allow
them continued access.
■
Log an event when a user exceeds a specified disk space threshold. The threshold
could be when users exceed their quota limit or when they exceed their warning
level.
After you enable disk quotas for a volume, Windows XP Professional collects disk
usage data for all users who own files and folders on the volume, which allows you to
monitor volume usage on a per-user basis. Even if you do not limit the disk space available to users, disk quotas provide an effective means of monitoring the disk space consumed by users.
By default, only members of the Administrators group can view and change quota settings. However, you can allow users to view quota settings.
How to Set Disk Quotas
You can enable disk quotas and enforce disk quota warnings and limits for all users
or for individual users. If you want to enable disk quotas, open the Properties dialog
box for a disk, click the Quota tab, and configure the options that are described in
Table 10-3 and displayed in Figure 10-18.
Table 10-3
Quota Tab Options
Option
Description
Enable Quota Management
Select this check box to enable disk quota management.
Deny Disk Space To Users
Exceeding Quota Limit
Select this check box so that when users exceed their hard disk
space allocation, they receive an Out Of Disk Space message
and cannot write to the volume.
Do Not Limit Disk Usage
Click this option when you do not want to limit the amount of
hard disk space for users.
Limit Disk Space To
Configure the amount of disk space that users can use.
Set Warning Level To
Configure the amount of disk space that users can fill before
Windows XP Professional logs an event, indicating that a user is
nearing his or her limit.
Lesson 3
Table 10-3
Managing Disk Quotas 10-41
Quota Tab Options
Option
Description
Log Event When A User
Exceeds Their Quota Limit
Select this option if you want Windows XP Professional to log
an event in the Security log every time a user exceeds his or her
quota limit.
Log Event When A User
Select this option if you want Windows XP Professional to log
Exceeds Their Warning Level an event in the Security log every time a user exceeds the warning level.
Quota Entries
Click this button to open the Quota Entries For window, in
which you can add a new entry, delete an entry, and view the
per-user quota information.
F10us18
Figure 10-18
Use the Quota tab of the Properties dialog box for a disk to set disk quotas for users.
To enforce identical quota limits for all users, follow these steps:
1. In Windows Explorer, right-click the volume on which you want to set disk quotas, and then click Properties.
Windows opens the Properties dialog box for the volume.
2. Click the Quota tab.
3. Select the Enable Quota Management check box.
4. Select the Deny Disk Space To Users Exceeding Quota Limit check box.
Windows XP Professional will monitor usage and will not allow users to create
files or folders on the volume when they exceed the limit.
10-42
Chapter 10
Managing Data Storage
5. Click Limit Disk Space To. In the Limit Disk Space To text box and in the Set Warning Level To text box, enter the values for the limit and warning levels that you
want to set.
6. Click OK.
To enforce different quota limits for one or more specific users, use these steps:
1. In Windows Explorer, right-click the volume on which you want to set disk quotas, and then click Properties.
Windows opens the Properties dialog box for the volume.
2. Click the Quota tab.
3. Select the Enable Quota Management check box.
4. Select the Deny Disk Space To Users Exceeding Quota Limit check box.
5. Click Quota Entries.
6. In the Quota Entries For window shown in Figure 10-19, click the Quota menu,
and then click New Quota Entry.
F10us19
Figure 10-19
Use the Quota Entries For dialog box to enter quotas for specific users.
7. In the Select Users dialog box, type the name of the user for which you want to
set a quota, and then click OK. (You can also click Advanced to search for a user.)
8. In the Add New Quota Entry dialog box shown in Figure 10-20, click Limit Disk
Space To, enter the limit and warning levels, and then click OK.
F10us20
Figure 10-20
Use the Add New Quota Entry dialog box to specify limits for a user.
Lesson 3
Managing Disk Quotas 10-43
How to Determine the Status of Disk Quotas
You can determine the status of disk quotas in the Properties dialog box for a disk by
checking status message to the right of the traffic light icon (refer to Figure 10-18). The
color shown on the traffic light icon indicates the status of disk quotas as follows:
■
A red traffic light indicates that disk quotas are disabled.
■
A yellow traffic light indicates that Windows XP Professional is rebuilding disk
quota information.
■
A green traffic light indicates that the disk quota system is active.
How to Monitor Disk Quotas
You use the Quota Entries For dialog box (refer to Figure 10-19) to monitor usage for
all users who have copied, saved, or taken ownership of files and folders on the volume. Windows XP Professional scans the volume and monitors the amount of disk
space in use by each user. Use the Quota Entries For dialog box to view the following:
■
The amount of hard disk space that each user uses
■
Users who are over their quota warning threshold, signified by a yellow triangle
■
Users who are over their quota limit, signified by a red circle
■
The warning threshold and the disk quota limit for each user
Guidelines for Using Disk Quotas
Use the following guidelines for using disk quotas:
■
If you enable disk quota settings on the volume where Windows XP Professional
is installed, and your user account has a disk quota limit, log on as Administrator
to install additional Windows XP Professional components and applications. In
this way, Windows XP Professional will not charge the disk space that you use to
install applications against the disk quota allowance for your user account.
■
You can monitor hard disk usage and generate hard disk usage information without preventing users from saving data. To do so, clear the Deny Disk Space To
Users Exceeding Quota Limit check box when you enable disk quotas.
■
Set more-restrictive default limits for all user accounts, and then modify the limits
to allow more disk space to users who work with large files.
■
If multiple users share computers running Windows XP Professional, set disk
quota limits on computer volumes so that disk space is shared by all users who
share the computer.
10-44
Chapter 10
Managing Data Storage
■
Generally, you should set disk quotas on shared volumes to limit storage for users.
Set disk quotas on public folders and network servers to ensure that users share
hard disk space appropriately. When storage resources are scarce, you might want
to set disk quotas on all shared hard disk space.
■
Delete disk quota entries for users who no longer store files on a volume. You can
delete quota entries for a user account only after all files that the user owns have
been removed from the volume or after another user has taken ownership of the
files.
Practice: Managing Disk Quotas
In this practice, you configure default quota management settings to limit the amount
of data users can store on drive C (their hard disk drive). Next, you configure a custom
quota setting for a user account. You increase the amount of data the user can store on
drive C to 10 MB with a warning level set to 6 MB. Finally, you turn off quota management for drive C.
!
Note
If you did not install Windows XP Professional on drive C, substitute the NTFS partition on which you did install Windows XP Professional whenever drive C is referred to in the
practice.
Exercise 1: Configure Quota Management Settings
In this exercise, you configure the quota management settings for drive C to limit the
data that users can store on the volume. You then configure custom quota settings for
a user account.
To configure default quota management settings
1. Log on with an account that is a member of the Administrators group.
2. Use the User Accounts tool in Control Panel to create a user account named User5
and assign it a Limited account type.
3. In Windows Explorer, right-click the drive C icon, and then click Properties.
Windows XP Professional displays the Local Disk (C:) Properties dialog box with
the General tab active.
4. Click the Quota tab.
Notice that disk quotas are disabled by default.
5. In the Quota tab, select the Enable Quota Management check box.
Notice that by default, the Do Not Limit Disk Usage option is selected.
Lesson 3
Managing Disk Quotas 10-45
6. Click Limit Disk Usage To.
7. What is the default disk space limit for new users?
8. Click Do Not Limit Disk Usage.
If you want to place the same quota limit on all users of this computer, you use the
Limit Disk Usage To option.
9. Select the Deny Disk Space To Users Exceeding Quota Limit check box.
10. Select the Log Event When A User Exceeds Their Quota Limit and Log Event When
A User Exceeds Their Warning Limit check boxes, and then click Apply.
Windows XP Professional displays the Disk Quota dialog box, telling you that you
should enable the quota system only if you will use quotas on this disk volume
and warning you that the volume will be rescanned to update disk usage statistics
if you enable quotas.
11. Click OK to enable disk quotas.
12. What happens to the quota status indicator?
To configure quota management settings for a user
1. In the Quota tab of the Local Disk (C:) Properties dialog box, click Quota Entries.
Windows XP Professional displays the Quota Entries For Local Disk (C:) dialog
box.
2. Are any user accounts listed? Why or why not?
3. On the Quota menu, click New Quota Entry.
Windows XP Professional displays the Select Users dialog box.
4. In the Name text box, type User5, and then click OK.
Windows XP Professional displays the Add New Quota Entry dialog box.
5. Click Limit Disk Space To. What are the default settings for the user you just set a
quota limit for?
10-46
Chapter 10
Managing Data Storage
6. Increase the amount of data that the user can store on drive C by changing the
Limit Disk Space To setting to 10 MB and the Set Warning Level To setting to 6 MB.
7. Click OK to return to the Quota Entries For Local Disk (C:) window.
8. Close the Quota Entries For Local Disk (C:) window.
9. Click OK to close the Local Disk (C:) Properties dialog box.
10. Log off.
11. Log on as User5.
12. Start Windows Explorer and create a User5 folder on drive C.
13. Insert the CD-ROM you used to install Windows XP Professional into your CDROM drive.
14. If a dialog box appears as a result of inserting the CD-ROM, close it.
15. Copy the i386 folder from your CD-ROM to the User5 folder.
Windows XP Professional begins copying files from the i386 folder on the CDROM to a new i386 folder in the User5 folder on drive C. After copying some files,
Windows XP Professional displays the Error Copying File Or Folder dialog box,
indicating that there is not enough room on the disk.
16. Why did you get this error message?
17. Click OK to close the dialog box.
18. Right-click the User5 folder, and then click Properties.
Notice that the Size On Disk value is slightly less than your quota limit of 10 MB.
19. Delete the User5 folder.
20. Close all open windows and log off.
Exercise 2: Disable Quota Management
1. Log on with an account that is a member of the Administrators group.
2. Start Windows Explorer.
3. Right-click the drive C icon, and then click Properties.
Windows XP Professional displays the Local Disk (C:) Properties dialog box with
the General tab active.
4. Click the Quota tab.
Lesson 3
Managing Disk Quotas 10-47
5. In the Quota tab, clear the Enable Quota Management check box.
All quota settings for drive C are no longer available.
6. Click Apply.
Windows XP Professional displays the Disk Quota dialog box, warning you that if
you disable quotas, the volume will be rescanned if you enable them later.
7. Click OK to close the Disk Quota dialog box.
8. Click OK to close the Local Disk (C:) Properties dialog box.
9. Close all windows and log off Windows XP Professional.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What is the purpose of disk quotas?
2. Which of the following statements about disk quotas in Windows XP Professional
is correct? (Choose the correct answer.)
a. Disk quotas track and control disk usage on a per-user, per-disk basis.
b. Disk quotas track and control disk usage on a per-group, per-volume basis.
c. Disk quotas track and control disk usage on a per-user, per-volume basis.
d. Disk quotas track and control disk usage on a per-group, per-disk basis.
3. Which of the following statements about disk quotas in Windows XP Professional
is correct? (Choose all that apply.)
a. Disk quotas can be applied only to Windows XP Professional NTFS volumes.
b. Disk quotas can be applied to any Windows XP Professional volume.
c. You must be logged on with the Administrator user account to configure
default quota management settings.
d. Members of the Administrators and Power Users groups can configure quota
management settings.
10-48
Chapter 10
Managing Data Storage
4. You get a call from an administrator who cannot delete a quota entry for a user
account. What would you tell the administrator to check?
Lesson Summary
■
Use Windows XP Professional disk quotas to allocate disk space usage to users.
Windows XP Professional disk quotas track and control disk usage on a per-user,
per-volume basis. You can set disk quotas, quota thresholds, and quota limits for
all users and for individual users. You can apply disk quotas only to Windows XP
Professional NTFS volumes.
■
You can set identical quotas for all users or you can configure different quotas for
individual users.
■
You can determine the basic status of the quota management system by looking at
the traffic light indicator and the status text display on the Quota tab of a volume’s
Properties dialog box.
■
You can monitor disk quotas by using the Quota Entries For dialog box, which
you access by clicking Quota Entries on the Quota tab of a volume’s Properties
dialog box.
■
There are a number of guidelines you should follow when using disk quotas. The
most important guideline is that installing applications can use up disk quotas rapidly, so you should log on as an administrator without quota limits to install applications.
Lesson 4
Increasing Security by Using EFS 10-49
Lesson 4: Increasing Security by Using EFS
Encryption is the process of making information indecipherable to protect it from unauthorized viewing or use. A key is required to decode the information. The Encrypting
File System (EFS) provides encryption for data in NTFS files stored on disk. This encryption is public key–based and runs as an integrated system service, making it easy to manage, difficult to attack, and transparent to the file owner. If a user who attempts to access
an encrypted NTFS file has the private key to that file (which is assigned when the user
logs on), the file can be decrypted so that the user can open the file and work with it
transparently as a normal document. A user without the private key is denied access.
Windows XP Professional also includes the Cipher command, which provides the
capability to encrypt and decrypt files and folders from a command prompt. Windows
XP Professional also provides a recovery agent, a specially designated user account
that can still recover encrypted files if the owner loses the private key.
After this lesson, you will be able to
■ Describe EFS.
■ Encrypt folders and files.
■ Decrypt folders and files.
■ Control encryption from the command line by using the Cipher command.
■ Create an EFS recovery agent.
Estimated lesson time: 40 minutes
Overview of EFS
EFS allows users to encrypt NTFS files by using a strong public key–based cryptographic scheme that encrypts all files in a folder. Users with roaming profiles can use
the same key with trusted remote systems. No administrative effort is needed to begin,
and most operations are transparent. Backups and copies of encrypted files are also
encrypted if they are in NTFS volumes. Files remain encrypted if you move or rename
them, and temporary files created during editing and left unencrypted in the paging file
or in a temporary file do not defeat encryption.
You can set policies to recover EFS-encrypted data when necessary. The recovery policy is integrated with overall Windows XP Professional security policy (see Chapter 16,
“Configuring Security Settings and Internet Options,” for more on security policy). Control of this policy can be delegated to individuals with recovery authority, and different
recovery policies can be configured for different parts of the enterprise. Data recovery
discloses only the recovered data, not the key that was used to encrypt the file. Several
protections ensure that data recovery is possible and that no data is lost in the case of
total system failure.
10-50
Chapter 10
Managing Data Storage
EFS is configured either from Windows Explorer or from the command line. It can be
enabled or disabled for a computer, domain, or organizational unit (OU) by resetting
recovery policy in the Group Policy console in Microsoft Management Console (MMC).
You can use EFS to encrypt and decrypt files on remote file servers but not to encrypt
data that is transferred over the network. Windows XP Professional provides network
protocols, such as Secure Sockets Layer (SSL) authentication, to encrypt data over the
network.
Table 10-4 lists the key features provided by Windows XP Professional EFS.
Table 10-4
EFS Features
Feature
Description
Transparent encryption In EFS, file encryption does not require the file owner to decrypt and
re-encrypt the file on each use. Decryption and encryption happen
transparently on file reads and writes to disk.
Strong protection of
encryption keys
Public key encryption resists all but the most sophisticated methods of
attack. Therefore, in EFS, the file encryption keys are encrypted by
using a public key from the user’s certificate. (Note that Windows XP
Professional and Windows 2000 use X.509 v3 certificates.) The list of
encrypted file encryption keys is stored with the encrypted file and is
unique to it. To decrypt the file encryption keys, the file owner supplies a private key, which only he or she has.
Integral data-recovery
system
If the owner’s private key is unavailable, the recovery agent can open
the file using his or her own private key. There can be more than one
recovery agent, each with a different public key, but at least one public recovery key must be present on the system to encrypt a file.
Secure temporary and
paging files
Many applications create temporary files while you edit a document,
and these temporary files can be left unencrypted on the disk. On
computers running Windows XP Professional, EFS can be implemented at the folder level, so any temporary copies of an encrypted
file are also encrypted, provided that all files are on NTFS volumes.
EFS resides in the Windows operating system kernel and uses the
nonpaged pool to store file encryption keys, ensuring that they are
never copied to the paging file.
Security Alert
Even when you encrypt files, an intruder who accesses your computer can
access those files if your user account is still logged on to the computer. Be sure to lock your
console when you are not using the computer, or configure a screensaver to require a password when the computer is activated. If the computer is configured to go to standby mode
when it is idle, you should require a password to bring the computer out of standby. These
precautions are particularly important on portable computers, which people are more likely to
leave unattended while the user is logged on.
Lesson 4
Increasing Security by Using EFS 10-51
How to Encrypt a Folder
The recommended method to encrypt files is to create an encrypted folder and place
files in that folder. To encrypt a folder, use these steps:
1. In Windows Explorer, right-click the folder and click Properties.
2. In the Properties dialog box for the folder, on the General tab, click Advanced.
3. In the Advanced Attributes dialog box (refer to Figure 10-14), select the Encrypt
Contents To Secure Data check box, and then click OK.
4. Click OK to close the Properties dialog box for the folder.
The folder is now marked for encryption, and all files placed in the folder are
encrypted. Folders that are marked for encryption are not actually encrypted; only the
files within the folder are encrypted.
!
Exam Tip
Compressed files cannot be encrypted, and encrypted files cannot be compressed with NTFS compression.
After you encrypt the folder, when you save a file in that folder, the file is encrypted
using file encryption keys, which are fast symmetric keys designed for bulk encryption.
The file is encrypted in blocks, with a different file encryption key for each block. All
the file encryption keys are stored and encrypted in the Data Decryption field (DDF)
and the Data Recovery field (DRF) in the file header.
Caution
If an administrator removes the password on a user account, the user account will
lose all EFS-encrypted files, personal certificates, and stored passwords for Web sites or network resources. Each user should make a password reset disk to avoid this situation. To create a password floppy disk, open User Accounts and, under Related Tasks, click Prevent A
Forgotten Password. The Forgotten Password Wizard steps you through creating the password
reset disk.
How to Decrypt a Folder
Decrypting a folder or file refers to clearing the Encrypt Contents To Secure Data check
box in a folder’s or file’s Advanced Attributes dialog box, which you access from the
folder’s or file’s Properties dialog box. Once decrypted, the file remains decrypted until
you select the Encrypt Contents To Secure Data check box. The only reason you might
want to decrypt a file is if other people need access to the folder or file—for example,
if you want to share the folder or make the file available across the network.
10-52
Chapter 10
Managing Data Storage
How to Control Encryption From the Command Line by Using the Cipher
Command
The Cipher command provides the capability to encrypt and decrypt files and folders
from a command prompt. The following example shows the available switches for the
Cipher command, which are described in Table 10-5:
cipher [/e | /d] [/s:folder_name] [/a] [/i] [/f] [/q] [/h] [/k] [file_name [...]]
Table 10-5
Cipher Command Switches
Switch
Description
/e
Encrypts the specified folders. Folders are marked so any files that are added later
are encrypted.
/d
Decrypts the specified folders. Folders are marked so any files that are added later
are not encrypted.
/s
Performs the specified operation on files in the given folder and all subfolders.
/a
Performs the specified operation on files as well as folders. Encrypted files could
be decrypted when modified if the parent folder is not encrypted. Encrypt the file
and the parent folder to avoid problems.
/i
Continues performing the specified operation even after errors have occurred. By
default, Cipher stops when an error is encountered.
/f
Forces the encryption operation on all specified files, even those that are already
encrypted. Files that are already encrypted are skipped by default.
/q
Reports only the most essential information.
/h
Displays files with the hidden or system attributes, which are not shown by
default.
/k
Creates a new file encryption key for the user running the Cipher command. Using
this option causes the Cipher command to ignore all other options.
file_name
Specifies a pattern, file, or folder.
If you run the Cipher command without parameters, it displays the encryption state of
the current folder and any files that it contains. You can specify multiple file names and
use wildcards. You must put spaces between multiple parameters.
How to Create an EFS Recovery Agent
If you lose your file encryption certificate and associated private key through disk failure or for any other reason, a user account designated as the recovery agent can open
the file using his or her own certificate and associated private key. If the recovery agent
is on another computer in the network, send the file to the recovery agent.
Lesson 4
Increasing Security by Using EFS 10-53
Security Alert
The recovery agent can bring his or her private key to the owner’s computer,
but it is never a good security practice to copy a private key onto another computer.
It is a good security practice to rotate recovery agents. However, if the agent designation changes, access to the file is denied. For this reason, you should keep recovery
certificates and private keys until all files that are encrypted with them have been
updated.
The person designated as the recovery agent has a special certificate and associated
private key that allow data recovery. To recover an encrypted file, the recovery agent
does the following:
■
Uses Backup or another backup tool to restore a user’s backup version of the
encrypted file or folder to the computer where his or her file recovery certificate
is located.
■
In Windows Explorer, opens the Properties dialog box for the file or folder, and in
the General tab, clicks Advanced.
■
Clears the Encrypt Contents To Secure Data check box.
■
Makes a backup version of the decrypted file or folder and returns the backup version to the user.
Practice: Increasing Security by Using EFS
In this practice, you log on as an administrator and encrypt a folder and its files. You
then log on using a different user account, and attempt to open an encrypted file and
disable encryption on the encrypted file.
1. In Windows Explorer, create a folder named Secret on the C drive.
2. In the Secret folder, create a text file named SecretFile.txt.
3. Right-click the Secret folder, and then click Properties.
Windows XP Professional displays the Secret Properties dialog box with the General tab active.
4. Click Advanced.
The Advanced Attributes dialog box appears.
5. Select the Encrypt Contents To Secure Data check box, and then click OK.
6. Click OK to close the Secret Properties dialog box.
The Confirm Attribute Change dialog box informs you that you are about to
encrypt a folder. You have two choices: You can encrypt only this folder, or you
can encrypt the folder and all subfolders and files in the folder.
10-54
Chapter 10
Managing Data Storage
7. Select the Apply Changes To This Folder, Subfolders And Files option, and then
click OK.
8. Open the Secret folder.
9. What color is the SecretFile.txt text file? Why?
10. In the Secret folder, right-click the SecretFile.txt text file, and then click Properties.
The SecretFile.txt Properties dialog box appears.
11. Click Advanced.
The Advanced Attributes dialog box appears. Notice that the Encrypt Contents To
Secure Data check box is selected.
12. Close the Advanced Attributes dialog box.
13. Close the Properties dialog box.
14. Close all windows and log off.
15. Log on as User5.
16. In Windows Explorer, locate and open the SecretFile.txt text file.
17. What happens?
18. Close Notepad.
19. Right-click the SecretFile.txt text file, and then click Properties.
20. Click Advanced.
21. Clear the Encrypt Contents To Secure Data check box, and then click OK.
22. Click OK to close the SecretFile.txt Properties dialog box.
The Error Applying Attributes dialog box appears and informs you that access to
the file is denied.
23. Click Cancel.
24. Close all open windows and dialog boxes.
25. Log off.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
Lesson 4
Increasing Security by Using EFS 10-55
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What is encryption and what is the EFS?
2. Which of the following files and folders does Windows XP Professional allow you
to encrypt? (Choose all that apply.)
a. A file on an NTFS volume
b. A folder on a FAT volume
c. A file stored on a floppy
d. A folder on an NTFS volume
3. How do you encrypt a folder? Is the folder actually encrypted?
4. If the private key belonging to the owner of an encrypted file is not available, how
can you decrypt the file?
5. By default, the recovery agent for a computer running Windows XP Professional
in a workgroup is ____________, and the recovery agent for a computer running
Windows XP Professional in a domain environment is _____________________.
Lesson Summary
■
EFS allows users to encrypt files and folder on an NTFS volume by using a strong
public key–based cryptographic scheme that encrypts all files in a folder. Backups
and copies of encrypted files are also encrypted if they are in NTFS volumes. Files
remain encrypted if you move or rename them, and encryption is not defeated by
leakage to paging files.
10-56
Chapter 10
Managing Data Storage
■
To encrypt a folder, select the Encrypt Contents To Secure Data check box in the
Advanced Attributes dialog box, which you can access by clicking Advanced on
the General tab of the folder’s Properties dialog box.
■
To decrypt a folder, clear the Encrypt Contents To Secure Data check box in the
Advanced Attributes dialog box.
■
You can control file and folder encryption from the command line using the
Cipher command.
■
Windows XP Professional also provides a recovery agent. If an owner loses the
private key, the recovery agent can still recover the encrypted file.
Lesson 5
Maintaining Disks with Disk Defragmenter, Check Disk, and Disk Cleanup 10-57
Lesson 5: Maintaining Disks with Disk Defragmenter,
Check Disk, and Disk Cleanup
Windows XP Professional saves files and folders in the first available space on a hard
disk and not necessarily in an area of contiguous space. The parts of the files and folders are scattered over the hard disk rather than being in a contiguous area. This scattering of files and folders across a hard disk is known as fragmentation. When your
hard disk contains numerous fragmented files and folders, your computer takes longer
to access them because it requires several additional disk reads to collect the various
pieces. Creating new files and folders also takes longer because the available free
space on the hard disk is scattered. Your computer must save a new file or folder in
various locations on the hard disk.
Temporary files, Internet cache files, and unnecessary programs also take up space on
your computer’s hard drive. Sometimes there are file system errors, and sometimes sectors on your hard disk go bad, which can cause you to lose data that you have stored
on your hard disk. This lesson introduces three Windows XP Professional tools—Disk
Defragmenter, Check Disk, and Disk Cleanup—that help you organize your hard
disks, recover readable information from damaged areas on your hard disk, and clean
up any temporary files and unnecessary programs taking up space on your hard drive.
After this lesson, you will be able to
■ Use Disk Defragmenter to organize your hard disks
■ Use Check Disk to search for and repair file system errors and to recover readable infor-
mation from bad sectors
■ Use Disk Cleanup to remove unnecessary files from your hard disks
Estimated lesson time: 60 minutes
How to Analyze and Defragment Disks with Disk Defragmenter
The process of finding and consolidating fragmented files and folders is called defragmenting. Disk Defragmenter locates fragmented files and folders, and then defragments them by moving the pieces of each file or folder to one location so that each
occupies a single contiguous space on the hard disk. Consequently, your system can
access and save files and folders more efficiently. By consolidating files and folders,
Disk Defragmenter also consolidates free space, making it less likely that new files will
be fragmented. Disk Defragmenter can defragment FAT, FAT32, and NTFS volumes.
You access Disk Defragmenter by selecting Start, pointing to All Programs, pointing to
Accessories, pointing to System Tools, and then clicking Disk Defragmenter. The Disk
Defragmenter dialog box is split into three areas, as shown in Figure 10-21.
10-58
Chapter 10
Managing Data Storage
F10us21
Figure 10-21
Use Disk Defragmenter to defragment a volume.
The upper portion of the dialog box lists the volumes that you can analyze and defragment. The middle portion provides a graphic representation of how fragmented the
selected volume is. The lower portion provides a dynamic representation of the volume that continuously updates during defragmentation. The display colors indicate the
condition of the volume as follows:
■
Red indicates fragmented files.
■
Blue indicates contiguous (nonfragmented) files.
■
Green indicates system files, which Disk Defragmenter cannot move.
■
White indicates free space on the volume.
By comparing the Analysis Display band to the Defragmentation Display band during
and after defragmentation, you can easily see the improvement in the volume.
You can also open Disk Defragmenter by selecting a drive you want to defragment in
Windows Explorer or My Computer. On the File menu, click Properties, click the Tools
tab, and click Defragment Now. Then select one of the options described in Table 10-6.
Table 10-6
Disk Defragmenter Options
Option
Description
Analyze
Click this button to analyze the disk for fragmentation. After the analysis, the
Analysis Display band provides a graphic representation of how fragmented the
volume is.
Defragment
Click this button to defragment the disk. Defragmenting automatically performs
an analysis. After defragmentation, the Defragmentation Display band provides a
graphic representation of the defragmented volume. Additionally, you can view
a report showing files that could not be defragmented.
Lesson 5
Maintaining Disks with Disk Defragmenter, Check Disk, and Disk Cleanup 10-59
Figure 10-22 shows the Disk Defragmenter dialog box after you have analyzed the C
drive. Windows XP Professional displays another Disk Defragmenter dialog box, indicating that you need to defragment the volume. You can view a report that shows more
details about the fragmentation on your volume, close the dialog box and run the
defragmenter at a later time, or defragment the volume now.
F10us22
Figure 10-22
Use the Disk Defragmenter window to analyze the fragmentation on a volume.
If there is not enough fragmentation to require you to defragment the volume, Windows XP Professional displays a Disk Defragmenter dialog box, indicating that there is
no need to defragment the volume at this time.
The following list provides some recommended guidelines for using Disk Defragmenter:
■
Run Disk Defragmenter when the computer will receive the least usage. During
defragmentation, data is moved around on the hard disk, and that process is
microprocessor-intensive. The defragmentation process will adversely affect
access time to other disk-based resources.
■
Educate users to defragment their local hard disks at least once a month to prevent
accumulation of fragmented files.
■
Analyze the target volume before you install large applications and defragment the
volume if necessary. Installations complete more quickly when the target media
has adequate contiguous free space. Additionally, accessing the application after
installation is faster.
■
When you delete a large number of files or folders, your hard disk might become
excessively fragmented, so be sure that you analyze it afterward. Generally, you
should defragment hard disks on busy file servers more often than those on single-user client computers.
10-60
Chapter 10
Managing Data Storage
Real World
When to Defragment
Windows XP actually uses volumes formatted with NTFS pretty efficiently, so the
need to routinely defragment a disk is not as great as it used to be. In fact, several
recent tests have shown that there is not really a significant improvement in computer performance after defragmenting even a very fragmented drive. Nonetheless, defragmentation is a quick safe process that, simply put, just makes users
feel better. Consider defragmenting drives two or three times per year. Better yet,
show users how to do it themselves. You can also use Scheduled Tasks to schedule Disk Defragmenter to run automatically. Just configure a task to run at the
desired times and launch the defrag.exe program located in the %systemroot%\system32 folder. After scheduling the task, open the advanced properties
for the task and add the drive you want to defragment to the command line. An
example command line would look something like %SystemRoot%\System32\Defrag.exe d. For more information on using Scheduled Tasks,
see Chapter 18, “Using Windows XP Tools.”
How to Scan a Hard Disk for Errors with Check Disk
Check Disk attempts to repair file system errors, locate bad sectors, and recover readable information from those bad sectors. All files must be closed for this program to
run. To access Check Disk, select the drive you want to check in Windows Explorer or
My Computer. Click the File menu, click Properties, click the Tools tab, and click Check
Now. Select one of the options on the Check Disk dialog box shown in Figure 10-23.
The options are explained in Table 10-7.
F10us23
Figure 10-23
Use Check Disk to analyze and fix the file structure on a volume.
Lesson 5
Table 10-7
Maintaining Disks with Disk Defragmenter, Check Disk, and Disk Cleanup 10-61
Check Disk Options
Check box
Description
Automatically Fix File
System Errors
Select this check box to have Windows XP Professional attempt to
repair file system errors found during disk checking. All files must
be closed for this program to run. If the drive is currently in use, a
message asks if you want to reschedule the disk-checking for the
next time you restart your computer. Your drive is not available to
run other tasks while the disk is being checked.
Scan For And Attempt
Recovery Of Bad Sectors
Select this check box to have Windows XP Professional attempt to
repair file system errors found during disk checking, locate bad sectors, and recover any readable information located in those bad
sectors. All files must be closed for this program to run. If the drive
is currently in use, a message asks if you want to reschedule the
disk-checking for the next time you restart your computer. Your
drive is not available to run other tasks while the disk is being
checked. If you select this check box, you do not need to select
Automatically Fix File System Errors because Windows XP Professional attempts to fix any errors on the disk.
Note
Check Disk runs in five phases: file verification, index verification, security descriptor
verification, file data verification, and free space verification.
You can also use the command-line version of Check Disk. The command-line syntax
for Chkdsk is as follows:
Chkdsk [volume[[path]filename]]] [/f] [/v] [/r] [/x] [/i] [/c] [/l[:size]]
The switches used by Chkdsk are explained in Table 10-8.
10-62
Chapter 10
Managing Data Storage
Table 10-8
Chkdsk Switches
Switch
Description
filename
Specifies the file or set of files to check for fragmentation. You can use the wildcards * and ?. This switch is valid only on volumes formatted with FAT12, FAT16,
and FAT32 file systems.
path
Specifies the location of a file or set of files within the folder structure of the volume. This switch is valid only on volumes formatted with FAT12, FAT16, and FAT32
file systems.
size
Changes the log file size. You must use the /l switch with this switch. This switch is
valid only on volumes formatted with NTFS.
volume
Specifies the drive letter (followed by a colon), mount point, or volume name. This
switch is valid only on volumes formatted with FAT12, FAT16, and FAT32 file systems.
/c
Skips the checking of cycles within the folder structure. This switch is valid only on
volumes formatted with NTFS.
/f
Fixes errors on the volume. If Chkdsk cannot lock the volume, you are prompted
to have Chkdsk check it the next time the computer starts.
/i
Performs a less-vigorous check of index entries. This switch is valid only on volumes formatted with NTFS.
/l
Displays the current size of the log file. This switch is valid only on volumes formatted with NTFS.
/r
Locates bad sectors and recovers readable information. If Chkdsk cannot lock the
volume, you are prompted to have Chkdsk check it the next time the computer
starts.
/v
On volumes formatted with FAT12, FAT16, or FAT32, displays the full path and
name of every file on the volume. On volumes formatted with NTFS, displays any
cleanup messages.
/s
Forces the volume to dismount first, if necessary.
/?
Displays this list of switches.
Used without parameters, Chkdsk displays the status of the disk in the current volume.
How to Free Up Disk Space with Disk Cleanup
You can use Disk Cleanup to free up disk space by deleting temporary files and uninstalling programs. Disk Cleanup lists the temporary files, Internet cache files, and
unnecessary programs that you can safely delete. To access Disk Cleanup, select the
drive you want to check in Windows Explorer or My Computer. On the File menu,
click Properties, and in the General tab, click Disk Cleanup. The Disk Cleanup dialog
box is shown in Figure 10-24, and its options are explained in Table 10-9.
Lesson 5
Maintaining Disks with Disk Defragmenter, Check Disk, and Disk Cleanup 10-63
F10us24
Figure 10-24
Table 10-9
Use Disk Cleanup to remove unnecessary files from a volume.
Disk Cleanup Deletion Options
Check box
Description
Downloaded
Program Files
Select this check box to have Windows XP Professional delete the
ActiveX controls and Java applets that have been downloaded automatically from the Internet when users viewed certain pages.
These files are temporarily stored in the Downloaded Program Files
folder on the computer’s hard disk.
Temporary
Internet Files
Select this check box to have Windows XP Professional delete the files in
the Temporary Internet Files folder on the computer’s hard drive.
These files are Web pages stored on the hard disk for quick viewing.
Users’ personalized settings for Web pages are not deleted.
Recycle Bin
Select this check box to have Windows XP Professional delete the files in
the Recycle bin.
When you delete a file from your computer, it is not permanently
removed from the computer until the Recycle Bin is emptied (by deleting the files contained in the Recycle Bin).
Temporary
Files
Select this check box to have Windows XP Professional delete any Temporary files on this volume.
Programs sometimes store temporary information in a Temp folder.
Before a program closes, it usually deletes this information. You can
safely delete temporary files that have not been modified in more than a
week.
10-64
Chapter 10
Managing Data Storage
Table 10-9
Disk Cleanup Deletion Options
Check box
Description
WebClient/Publisher
Temporary Files
Select this check box to have Windows XP Professional delete any temporary WebClient/Publisher files.
The WebClient/Publisher service maintains a cache of accessed files on
this disk. These files are kept locally for performance reasons only and
can be deleted safely.
Compress Old Files
Select this check box to compress files that have not been accessed in a
while.
No files are deleted and all files are still accessible.
Because files compress at different rates, the value displayed for the
amount of space you will recover is an approximation.
Catalog Files For
Select this check box to have Windows XP Professional delete any old
The Content Indexer catalog files left over from previous indexing operations.
The Indexing Service speeds up and enriches file searches by maintaining an index of the files on this disk.
There are additional ways to free up space on your hard disk using Disk Cleanup. Click
the More Options tab in the Disk Cleanup For dialog box (see Figure 10-25). The available options are explained in Table 10-10.
F10us25
Figure 10-25
tures.
Use the More Options tab of the Disk Cleanup For dialog box to access additional fea-
Lesson 5
Table 10-10
Maintaining Disks with Disk Defragmenter, Check Disk, and Disk Cleanup 10-65
Additional Features on the Disk Cleanup More Options Tab
Option
Description
Windows
Components
Click Clean Up under Windows Components to launch the Windows Components Wizard, which allows you to add and remove Windows components from your installation.
The Windows Components include Accessories and Utilities, Fax Services,
Indexing Services, Microsoft Internet Explorer, Internet Information Services
(IIS), Management and Monitoring Tools, Message Queuing, MSN Explorer,
Networking Services, Other Network File and Print Services, and Update
Root Certificates.
Installed Programs Click Clean Up under Installed Programs to launch Add Or Remove Programs, which allows you to install programs and to uninstall programs that
are no longer in use.
The list of programs available to be uninstalled depends on which programs are installed on your computer.
System Restore
Click Clean Up under System Restore to delete all but the most recent
restore points.
For more information about restore points and System Restore, see Chapter
4, “Modifying and Troubleshooting the Startup Process.”
Practice: Maintaining Disks
In this practice, you use the Disk Defragmenter to determine whether your hard disk
is fragmented. If it is, you will defragment your hard disk. You then use Check Disk to
examine your hard disk for file system errors, fix them, locate any bad sectors, and
recover any readable information from those bad sectors. Finally, you use Disk
Cleanup to free up disk space by deleting temporary files and uninstalling programs.
Note
If you started with a clean hard disk and installed Windows XP Professional in Chapter 2, these disk maintenance tools will probably not find much to clean up or repair.
Exercise 1: Defragment a Hard Drive
1. Click Start, point to All Programs, point to Accessories, point to System Tools, and
then click Disk Defragmenter.
Windows XP Professional displays the Disk Defragmenter dialog box.
2. If there are multiple volumes on your computer, select C, and then click Analyze.
3. If Windows XP Professional displays a dialog box, indicating that there is no need
to defragment your volume at this time, click Close, and then read through Steps
6 through 12.
10-66
Chapter 10
Managing Data Storage
4. If Windows XP Professional displays a Disk Defragmenter dialog box, indicating
that you need to defragment your volume now, click View Report.
5. In the Analysis Report dialog box, scroll through the Volume Information box.
6. Scroll through the Most Fragmented Files box, and then click Save As.
Windows XP Professional displays the Save Defragmentation Report dialog box.
Notice that the default title for the report is VolumeC, and the default location for
the report is in the My Documents folder.
7. Click Save to save the report as VolumeC in the My Documents folder.
You are returned to the Analysis Report dialog box.
8. Click Defragment.
Disk Defragmenter defragments the volume. This process could take a long
time to complete, depending on the size of the volume and the amount of fragmentation.
9. Compare the Analysis Display with the Defragmentation Display.
10. Close Disk Defragmenter.
Leave the Local Disk (C:) Properties dialog box open for the next exercise.
Exercise 2: Run Check Disk
In Exercise 2, you run Check Disk to examine your hard disk for file system errors. If
any errors are found, you fix them. You also locate any bad sectors and recover any
readable information from those bad sectors.
1. In the Local Disk (C:) Properties dialog box, click the Tools tab.
2. In the Tools tab, click Check Now.
Windows XP Professional displays the Check Disk Local Disk (C:) dialog box.
3. Select Scan For And Attempt Recovery Of Bad Sectors.
4. Click Start.
It might take a few minutes to complete all five phases.
5. When prompted that the Disk Check is complete, click OK.
Leave the Local Disk (C:) Properties dialog box open for the next exercise.
Exercise 3: Run Disk Cleanup
1. In the General tab of the Local Disk (C:) Properties dialog box, click Disk Cleanup.
A Disk Cleanup dialog box appears, indicating that it is calculating how much
space you can free on the C drive.
Lesson 5
Maintaining Disks with Disk Defragmenter, Check Disk, and Disk Cleanup 10-67
2. In the Files To Delete list box in the Disk Cleanup For (C:) dialog box, review the
files that Disk Cleanup is recommending you delete.
Security Alert
If you started with a clean hard disk and installed Windows XP Professional in Chapter 2, there might be few, if any, files that Disk Cleanup found to delete. If you
want to delete any files that Disk Cleanup recommends that you delete, make sure that the
files you want to delete are selected (a check mark is in the check box in front of the files),
and then click OK.
3. Click the More Options tab.
4. When would you use the options available in the More Options tab?
5. Click Cancel.
6. Close Disk Cleanup and all open windows.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What is fragmentation and what problems does it cause?
2. The process of finding and consolidating fragmented files and folders is called
_______________. The Windows XP Professional system tool that locates fragmented files and folders and arranges them in contiguous space is
_____________________.
10-68
Chapter 10
Managing Data Storage
3. Windows XP Professional provides a tool to locate fragmented files and folders
and arrange them in contiguous space on volumes formatted with which file
systems?
4. Which of the following functions does Check Disk perform? (Choose all that
apply.)
a. Locates fragmented files and folders and arranges contiguously
b. Locates and attempts to repair file system errors
c. Locates bad sectors and recovers readable information from those bad sectors
d. Deletes temporary files and offline files
Lesson Summary
■
Windows XP Professional saves files and folders in the first available space on a
hard disk and not necessarily in an area of contiguous space, which can lead to
file and folder fragmentation. Disk Defragmenter, a Windows XP Professional system tool, locates fragmented files and folders and defragments them, which
enables your system to access and save files and folders more efficiently.
■
Check Disk attempts to repair file system errors, locate bad sectors, and recover
readable information from those bad sectors.
■
Disk Cleanup frees up disk space by locating temporary files, Internet cache files,
and unnecessary programs that you can safely delete; and it also deletes temporary files and uninstalls programs.
Lesson 6
Configuring Offline Folders and Files 10-69
Lesson 6: Configuring Offline Folders and Files
When the network is unavailable, or when you are on the road and your laptop is
undocked, offline folders and files allow you to continue working on files that are
stored on shared folders on the network. These network files are cached on your local
disk so that they are available even if the network is not. When the network becomes
available or when you dock your laptop, your connection to the network is re-established. The Offline Files feature synchronizes the cached files and folders on your
local disk with those stored on the network.
After this lesson, you will be able to
■ Enable the Offline Files feature on your computer
■ Make folders and files available offline
■ Configure your computer to share folders for use offline
■ Synchronize offline folders and files
Estimated lesson time: 30 minutes
How to Enable the Offline Files Feature On Your Computer
Before you can use offline folders and files, you must configure your computer to use
them. You configure offline folders and files by using the Folder Options selection
located on the Tools menu of My Computer. In the Offline Files tab of Folder Options,
you must select the Enable Offline Files and the Synchronize All Offline Files Before
Logging Off check boxes (see Figure 10-26).
F10us26
Figure 10-26
Use the Offline Files tab in the Folder Options dialog box to enable offline files.
10-70
Chapter 10
Managing Data Storage
On the Offline Files tab, you can click Delete Files to delete the locally cached copy of
a network file. Click View Files to view the files stored in the Offline Files folder; these
are the locally cached files that you have stored on your system. Click Advanced to
configure how your computer responds when a network connection is lost. For example, when a network connection is lost, you can configure your computer to notify you
and allow you to begin working offline.
Note
To use Offline Files, you must disable the Fast User Switching feature in Windows. If
your computer is a member of a domain, Fast User Switching is already turned off, anyway. If
your computer is a member of a workgroup, you can disable Fast User Switching by opening
the User Accounts tool in Control Panel and clicking Change The Way Users Log On Or Off. For
more details on Fast User Switching, see Chapter 7, “Setting up and Managing User
Accounts.”
How to Make Folders and Files Available Offline
To make a specific file or folder available offline and enable automatic synchronization
with the network, follow these steps:
1. In My Network Places, right-click the shared folder or file that you want to make
available offline, and then select the Make Available Offline option.
2. In the Offline Files Wizard’s Welcome page, click Next.
3. Select the Automatically Synchronize The Offline Files When I Log On And Log
Off My Computer check box, and then click Next.
4. Optionally, you can enable reminders and create a shortcut to the Offline Files
folder on your desktop. Click Finish.
The files will be synchronized to your computer.
Files with extensions that are associated with certain database applications initially cannot be cached. By default, the following files types cannot be cached:
*.slm; *.mdb; *.ldb; *.mdw; *.mde; *.pst; *.db
When you make network resources available offline, Windows automatically copies them
to the computer’s local hard disk drive, along with a reference to the original network
path. Windows stores offline files and information about the files in a database in the
%systemroot%\CSC folder. (CSC is an acronym for client-side caching, which is another
name for offline files.) The database emulates the network resource when it is offline.
When a user works offline, she continues to access offline resources as if she were
connected to the network, but she is actually using the local copy of the file. When the
network share becomes available again, the client will switch from the local offline files
to the live files automatically, provided that the following conditions are met:
Lesson 6
Configuring Offline Folders and Files 10-71
■
The user does not have any files currently open from that network share.
■
Synchronization is not required for any offline files in the share.
■
The user is not connecting to the network over a slow link.
If any of these conditions are not met, the user will continue to work with the offline
version of the share until all files are closed and synchronization occurs.
Note
Users have the same permissions to the locally stored versions of offline files as they
do to the original network versions.
How to Configure Your Computer to Share Offline Folders and Files
Before other users on the network can use shared folders and files on your computer
offline, you must configure the resource to allow caching for offline use. You configure
offline folders and files through Windows Explorer or My Computer. Figure 10-27
shows the Allow Caching Of Files In This Shared Folder check box in Windows
Explorer.
F10us27
Figure 10-27
Configure shared files for offline use.
Windows XP Professional provides the following three settings for caching:
Manual Caching Of Documents The default setting. Users must manually specify
any files that they want available when they are working offline. To ensure proper
file sharing, the server version of the file is always open.
Automatic Caching Of Documents Every file a user opens is automatically downloaded and cached on the user’s hard drive so that it will be available offline. If an
earlier version of a file is already loaded on the user’s hard drive, it is automatically
replaced with the newer version. To ensure proper file sharing, the server version
of the file is always opened.
10-72
Chapter 10
Managing Data Storage
Automatic Caching Of Programs and Documents Opened files are automatically
downloaded and cached on the user’s hard drive so that they will be available
offline. If an earlier version of a file is already loaded on the user’s hard drive, it
is automatically replaced with the newer version. File sharing is not ensured.
How to Synchronize Offline Folders and Files
By default, synchronization of offline files is configured to happen at logoff when
offline files are initially made available on the client. File synchronization is straightforward if the copy of the file on the network does not change while you are editing a
cached version of the file. Your edits are incorporated into the copy on the network.
However, it is possible that another user could edit the network version of the file
while you are working offline. If both your cached offline copy of the file and the network copy of the file are edited, you must decide what to do. You are given a choice
of retaining your edited version and not updating the network copy with your edits, of
overwriting your cached version with the version on the network, or of keeping a copy
of both versions of the file. In the last case, you must rename your version of the file,
and both copies will exist on your hard disk and on the network.
You can reconfigure or manually launch synchronization by using Synchronization
Manager, which is available from the Items To Synchronize dialog box. You can access
the Items To Synchronize dialog box (see Figure 10-28) in the following ways:
■
From the Start menu, select All Programs, Accessories, and then Synchronize.
■
From the Tools menu in Windows Explorer, select Synchronize.
F10us28
Figure 10-28
Choose an item to synchronize manually.
Lesson 6
Configuring Offline Folders and Files 10-73
Notice that you can manually synchronize your offline files with those on the network
by clicking Synchronize. You can also configure the Synchronization Manager by clicking Setup.
When configuring the Synchronization Manager, you have three sets of options to configure synchronization. The first set of options is accessed through the Logon/Logoff
tab (see Figure 10-29). You can configure synchronization to occur when you log on,
when you log off, or both. You can also specify that you want to be prompted before
synchronization occurs. You can specify the items to be synchronized at log on or log
off, or both, and you can specify the network connection.
F10us29
Figure 10-29
Logon/Logoff tab of the Synchronization Settings dialog box.
The second set of options in configuring the Synchronization Manager is accessed
through the On Idle tab. The items configurable are similar to those configurable
through the Logon/Logoff tab. The following items are configurable through the On
Idle tab:
When I Am Using This Network Connection This option allows you to specify the
network connection and which items to synchronize.
Synchronize The Following Checked Items
which items you want to synchronize.
This option allows you to specify
Synchronize The Selected Items While My Computer Is Idle
you to turn synchronization off or on during idle time.
This option allows
10-74
Chapter 10
Managing Data Storage
Click Advanced on the On Idle tab to configure the following options: Automatically
Synchronize The Specified Items After My Computer Has Been Idle For X Minutes;
While My Computer Remains Idle, Repeat Synchronization Every X Minutes; and Prevent Synchronization When My Computer Is Running On Battery Power.
The third set of options for scheduling synchronization is accessed through the Scheduled tab. You can click Add to start the Scheduled Synchronization Wizard. After the
welcome page, the first page of the Scheduled Synchronization Wizard allows you to
specify the connection, specify the items to synchronize, and whether you want the
computer to automatically connect if you are not connected when the scheduled time
for synchronization arrives. The second page of the wizard is the Select The Time And
Day You Want The Synchronization To Start page. It allows you to configure the starting time and date for the synchronization. You can also configure the frequency of the
synchronization, which can be set for every day, every weekday, or at a specified interval measured in days. On the third page of the wizard, you assign a name to this scheduled synchronization, and on the final page, you review your settings.
Practice: Configuring Offline Folders and Files
In this practice, you configure your computer running Windows XP Professional just as
you would if it were a laptop computer running Windows XP Professional so that you
can use offline folders and files.
Exercise 1: Configure Offline Folders and Files
1. Log on with a user account that is a member of the Administrators group.
2. Click Start, right-click My Computer, and then click Open.
3. On the Tools menu, click Folder Options.
Windows XP Professional displays the Folder Options dialog box.
4. Click the Offline Files tab.
Important
If Fast User Switching is enabled, Offline Files cannot be enabled. Click Cancel
to close the Folder Options dialog box. Open User Accounts in Control Panel, and select
Change The Way Users Log On Or Off. Clear the Use Fast User Switching check box and click
Apply Options. Close User Accounts. In My Computer, on the Tools menu, click Folder Options,
and then click the Offline Files tab. Go to Step 5.
5. Select the Enable Offline Files check box.
6. Ensure that the Synchronize All Offline Files Before Logging Off check box is
selected, and then click OK.
Your computer is now configured so that you can use offline folders and files.
Lesson 6
Configuring Offline Folders and Files 10-75
7. Close the My Computer window.
Exercise 2: Configure Offline Folders for Sharing
In this exercise, you configure a network share on a computer running Windows XP
Professional so that users can access the files in the share and use them offline.
1. Ensure that you are still logged on as Administrator, and start Windows Explorer.
2. Create a folder on the C drive named Offline.
3. Right-click the Offline folder, and then click Sharing And Security.
Windows Explorer displays the Offline Properties dialog box with the Sharing tab
active.
4. Click Share This Folder, and then click Caching.
Windows Explorer displays the Caching Settings dialog box.
5. From the Setting list, ensure that Manual Caching Of Documents is selected, and
then click OK.
6. Click OK to close the Offline Properties dialog box.
Leave Windows Explorer open.
Exercise 3: Configure Synchronization Manager
1. Click Tools, and then click Synchronize.
Windows XP Professional displays the Items To Synchronize dialog box, which
allows you to specify which folders you want to synchronize.
2. If nothing is selected, click My Current Home Page, and then click Setup.
Windows XP Professional displays the Synchronization Settings dialog box with
the Logon/Logoff tab selected.
3. Review the options on the Logon/Logoff tab, and then review the options on the
On-Idle tab and the Scheduled tab.
4. On the Logon/Logoff tab, select My Current Home Page.
5. Ensure that both the When I Log On To My Computer and When I Log Off My
Computer check boxes are checked.
6. Select the Ask Me Before Synchronizing The Items check box, and then click OK.
7. Click Close to close the Items To Synchronize dialog box, and then close Windows
Explorer.
10-76
Chapter 10
Managing Data Storage
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. How do you configure your computer to use offline folders and files?
2. Which tools does Windows XP Professional provide for you to configure your
computer to provide offline files? What must you do to allow others to access files
on your computer?
3. What does Synchronization Manager do?
Lesson Summary
■
Before you can use offline files, you must use the Folders Options selection on the
Tools menu of My Computer or Windows Explorer to configure your computer to
use offline files.
■
After enabling the Offline Files feature, you can use My Network Places to make
any network-accessible folder for which offline caching is enabled available
offline.
■
To make shared folders on your own computer available for other users to use
offline, you must use the Sharing tab of the folder’s Properties dialog box to configure the offline caching for the folder. By default, shared folders are configured
for offline use.
■
Synchronization Manager allows you to configure synchronization to occur when
you log on, when you log off, or both; and you can specify that you want to be
asked before synchronization occurs.
Case Scenario Exercise 10-77
Case Scenario Exercise
In this exercise, you will read a scenario about working with data storage, and then
answer the questions that follow. If you have difficulty completing this work, review
the material in this chapter before beginning the next chapter. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
Scenario
You are an administrator working for a company named Fabrikam, Inc., a manufacturer of neon dyes used in safety clothing for various industries. You are working with
a user named Iris, who plans and oversees exhibits that the company puts on at trade
shows across the country. The company has just given Iris a new notebook computer,
which she will use when traveling.
Questions
1. Iris’ new notebook computer has a 16 GB hard disk that you want to configure as
a single volume. It is the only hard disk on the computer. Should you create a
basic or dynamic disk?
2. When she is running the exhibit booth at tradeshows, Iris’ attention is often
diverted, and she is worried that she cannot always keep an eye on her notebook
computer. The computer contains trade secrets that she does not want to see compromised. Iris wants to secure the files on her computer, even if the computer is
stolen. Can you configure encryption on her notebook computer? If so, what precautions should you take?
3. Iris’ notebook computer does not have the biggest hard drive. She often works on
large sales documents and also stores many picture files of the products she sells.
She wants to compress these files to save space. What should you tell Iris to do?
10-78
Chapter 10
Managing Data Storage
4. What utility should you teach Iris to use that might also help maximize the free
space on her hard disk?
5. You have configured Iris’ notebook computer to connect securely via the Internet
to the company network so that Iris can access the company e-mail server and file
servers. Iris also wants to be able to access certain shared files on the company
network when she cannot connect to the network. What should you do?
Troubleshooting Lab
You are an administrator for a company named Humongous Insurance, a provider of
group medical insurance policies throughout the Midwest. On Friday morning, you
receive a call from Jonas, a user in the claims department who has a workstation running Windows XP Professional. Jonas says that on his computer, he always stores documents on drive E. However, when he tried to transfer a large document to his local
computer and store it on drive E, he received an error message stating that the drive
could not be located. He checked My Computer, and the drive is not listed.
You use Computer Management to connect to Jonas’ computer, and then open the Disk
Management tool. You see the following configuration:
■
Disk 0 is configured as a basic disk and it contains one partition. The drive letter
for the partition is C, and the partition is labeled as the System partition. Disk Management reports the disk as online and the C partition as healthy.
■
Disk 1 is configured as a dynamic disk, but Disk Management reports the disk as
missing.
■
Disk 2 is configured as a CD-ROM drive with the drive letter D.
Chapter Summary 10-79
What do you suspect is the problem? What would you do to help Jonas?
Chapter Summary
■
Windows XP Professional supports two types of disk storage: basic disks and
dynamic disks. All disks are basic disks by default, but you can upgrade the basic
disks to dynamic disks with no loss of data. You can also downgrade a dynamic disk
to a basic disk, but all data on the disk is lost. Windows XP Professional provides the
Disk Management utility to configure, manage, and monitor hard disks and volumes.
You can also manage disks from the command line by using the Diskpart command.
■
Windows XP Professional provides two types of compression: Compressed Folders and NTFS compression. A compressed folder appears in Windows Explorer as
an icon of a zipper across a folder. NTFS compression is a function of the NTFS file
system that allows you to compress files, folders, or an entire volume.
■
Use Windows XP Professional disk quotas to allocate disk space usage to users.
Windows XP Professional disk quotas track and control disk usage on a per-user,
per-volume basis. You can set disk quotas, quota thresholds, and quota limits for
all users and for individual users. You can apply disk quotas only to Windows XP
Professional NTFS volumes.
■
EFS allows users to encrypt files and folder on an NTFS volume by using a strong
public key–based cryptographic scheme that encrypts all files in a folder. You cannot apply both compression and encryption to a file or folder at the same time.
Files remain encrypted if you move or rename them, or if you back them up.
■
Windows XP Professional provides three utilities for maintaining disks:
❑
Windows XP Professional saves files and folders in the first available space on
a hard disk and not necessarily in an area of contiguous space, which can lead
to file and folder fragmentation. Disk Defragmenter, a Windows XP Professional system tool, locates fragmented files and folders and defragments them,
enabling your system to access and save files and folders more efficiently.
10-80
Chapter 10
■
Managing Data Storage
❑
Check Disk attempts to repair file system errors, locate bad sectors, and
recover readable information from those bad sectors.
❑
Disk Cleanup frees up disk space by locating temporary files, Internet cache
files, and unnecessary programs that you can safely delete.
The Offline Files feature allows Windows to create a temporary copy of shared
files on the network so that you can use them when you are disconnected from
the network. Before you can use offline files, you must use the Folders Options
selection on the Tools menu of Windows Explorer to enable the feature. After
enabling Offline Files, you can use My Network Places to make any network
accessible folder for which offline caching is enabled available offline.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
Windows XP Professional does not support fault-tolerant disk configurations.
Spanned volumes simply allow you to use different amounts of disk space from
multiple hard disks in a single volume. Striped volumes allow you use an identical
amount of disk space from multiple hard disks. The advantage of using striped
volumes is that Windows can write information to the disk more quickly.
■
When you convert a basic disk to a dynamic disk, data on the disk is preserved.
When you revert a dynamic disk to a basic disk, data on the disk is lost.
■
Compressed files cannot be encrypted, and encrypted files cannot be compressed
with NTFS compression.
■
NTFS allocates disk space based on uncompressed file size. If you copy a compressed file to an NTFS volume with enough space for the compressed file, but
not enough space for the uncompressed file, you might get an error message that
states that there is not enough disk space for the file, and the file will not be copied to the volume.
Key Terms
basic disk A physical disk that can be accessed locally by MS-DOS and all Windowsbased operating systems. Basic disks can contain up to four primary partitions or
three primary partitions and an extended partition with multiple logical drives. If you
want to create partitions that span multiple disks, you must first convert the basic disk
to a dynamic disk using Disk Management or the Diskpart.exe command-line utility.
Note that whether a disk is basic or dynamic has no bearing on whether computers
running other operating systems can connect to shared folders on the disk.
Exam Highlights 10-81
Check Disk A command-line utility that verifies and repairs the integrity of the file
system on a volume.
Cipher A command-line utility that provides the capability to encrypt and decrypt
files and folders from a command prompt.
compressed folders A feature that allows you to compress folders on volumes formatted with NTFS or FAT. Compressed folders are compatible with other zip programs.
defragmentation The process of rearranging the various pieces of files and folders
on the disk into contiguous spaces, thereby improving performance.
Disk Cleanup A utility that calculates the amount of space that you can gain by deleting
certain types of files, such as temporary files and downloaded program files.
Disk Defragmenter
The program used in Windows XP to defragment a disk.
Disk Management The name of the Windows XP utility used to manage fixed and
removable disks, as well as to create and manage volumes and partitions.
disk quota A feature that allows you to allocate disk space to users based on the files
and folders that they own.
Diskpart A command used to execute disk-management tasks from a command
prompt and to create scripts for automating tasks that you need to perform frequently or on multiple computers.
drive letter Used to access the volume through Windows Explorer and other applications. Hard disks, floppy drives, CD-ROM and DVD drives, removable drives,
and tape devices are assigned drive letters.
dynamic disk A physical disk that can be accessed locally only by Windows 2000
and Windows XP. Dynamic disks provide features that basic disks do not, such as
support for volumes that span multiple disks. Dynamic disks use a hidden database to track information about dynamic volumes on the disk and other dynamic
disks in the computer. You convert basic disks to dynamic disks by using the Disk
Management snap-in or the Diskpart command-line utility. When you convert a
basic disk to a dynamic disk, all existing basic volumes become dynamic volumes.
Note that whether a disk is basic or dynamic has no bearing on whether computers running other operating systems can connect to shared folders on the disk.
Encrypting File System (EFS) A Windows XP Professional feature that provides
encryption for data in NTFS files stored on disk.
encryption The process of making information indecipherable to protect it from
unauthorized viewing or use.
extended partition A partition that provides a way to exceed the four primary partition
limit. You cannot format an extended partition with any file system. Rather, extended
partitions serve as a shell in which you can create any number of logical partitions.
fixed storage
A storage device that is not removable, such as a hard drive.
10-82
Chapter 10
Managing Data Storage
formatting Preparing a hard disk to accept data by creating a file system (such as
NTFS or FAT) on that disk.
fragmentation Occurs when files are frequently added and removed from the disk,
or when the disk begins to fill up. In both of these cases, it can be difficult for the
operating system to locate a contiguous area of the disk to write to, and data can
become fragmented.
logical partition A disk storage area that you create within an extended partition on
a basic Master Boot Record (MBR) disk. Logical drives are similar to primary partitions, except that you can create an unlimited number of logical drives per disk.
A logical drive can be formatted and assigned a drive letter.
mounted volume A volume to which you assign a path on an existing volume
rather than a drive letter.
NTFS compression A function of the NTFS file system that performs dynamic compression and decompression on folders and files marked with the compression
attribute.
Offline Files A feature of Windows XP Professional that makes temporary copies of
shared network files on a local computer so that you can access those files when
the local computer is disconnected from the network.
primary partition A partition that you can configure as the active, or bootable,
drive. You can configure up to four primary partitions on a computer running a
Windows operating system (three partitions if you also have an extended partition
on the disk).
recovery agent A user account that is given the capability to decrypt an encrypted
file or folder in case the owner of the resource loses the file encryption certificate
that allows decryption.
removable storage A storage device that allows you to remove either the device
itself or the storage media that the device uses.
simple volume A dynamic volume that contains disk space from a single disk and
can be extended if necessary.
spanned volume A dynamic volume that contains disk space from 2 or more (up to
a maximum of 32) disks. The amount of disk space from each disk can vary. There
is no fault tolerance in spanned volumes. If any of the disks containing the
spanned volume fail, you lose all data in the entire spanned volume.
striped volume A dynamic volume that contains disk space from 2 or more (up to
a maximum of 32) disks. Unlike spanned volumes, striped volumes require that
you use an identical amount of disk space from each disk. Striped volumes provide increased performance because it is faster to read or write two smaller pieces
of a file on two drives than to read or write the entire file on a single drive. However, you cannot extend striped volumes and they provide no fault tolerance.
Questions and Answers 10-83
Questions and Answers
Lesson 1 Review
Page
10-26
1. On which types of computers can you use dynamic disks?
To use a dynamic disk, you must be running Windows XP Professional or Windows 2000 Professional. Portable computers do not support dynamic disks.
2. What actions must you take to revert from a dynamic disk to a basic disk? What
limitations does this process impose?
By using Disk Management, you must delete all volumes on the disk. You must then right-click
the disk and select Revert To Basic Disk. All data is lost when reverting a dynamic disk to a
basic disk. You must repartition and reformat the basic disk following the conversion.
Lesson 2 Practice: Exercise 2
Page
10-34
1. What color is the name of the Compressed folder?
Blue. This is the default color used by Windows XP to denote a compressed folder.
Lesson 2 Practice: Exercise 3
Page
10-35
1. Is the Compressed2 folder compressed or not compressed? Why?
The Compressed2 folder is compressed because in Exercise 2, you specified that all subfolders and files should also be compressed.
7. What indication do you have that the Compressed2 folder is no longer compressed?
The folder name is now displayed in the original color (typically black).
Page
10-36
Lesson 2: Exercise 4
To create a compressed file
4. How can you verify that the Text1.txt file is compressed?
The folder name is displayed in blue.
To copy a compressed file to an uncompressed folder
3. Is the Text1.txt file in the Compressed2 folder compressed or uncompressed?
Why?
Uncompressed. A new file inherits the compression attribute of the folder in which it is created.
10-84
Chapter 10
Managing Data Storage
To move a compressed file to an uncompressed folder
2. Is the Text1.txt file in the Compressed folder compressed or uncompressed?
Uncompressed. A new file inherits the compression attribute of the folder in which it is created.
3. Is the Text1.txt file in the Compressed2 folder compressed or uncompressed?
Why?
Compressed. When a file is moved to a new folder on the same partition, its compression
attribute does not change.
Lesson 2 Review
Page
10-37
1. When Sandra tried to copy a compressed file from one NTFS volume to another,
the file was not copied, and she got an error message stating that there was not
enough disk space for the file. Before she attempted to copy the file, Sandra verified that there was enough room for the compressed bitmap on the destination
volume. Why did she get the error message?
If you copy a compressed file to an NTFS volume with enough space for the compressed file,
but not enough space for the uncompressed file, you might get an error message stating that
there is not enough disk space for the file. The file will not be copied to the volume.
2. When you move a file between NTFS volumes, does the file retain the compression state of the source folder, or does the file inherit the compression state of the
target folder? Why?
When you move a file or folder between NTFS volumes, the file or folder inherits the compression state of the target folder. Windows XP Professional treats a move as a copy and then a
delete, so the files inherit the compression state of the target folder.
3. What does Windows XP Professional do when you try to copy a compressed file
to a floppy disk? Why?
When you copy a compressed file to a floppy disk, Windows XP Professional automatically
uncompresses the file because floppy disks cannot be formatted with NTFS and cannot use
NTFS compression.
4. Which of the following types of files or data are good candidates for NTFS compression? (Choose all that apply.)
a. Encrypted data
b. Frequently updated data
c. Bitmaps
d. Static data
The correct answers are C and D. A is not correct because you cannot apply both compression
and encryption to a file. B is not correct because compression does add some overhead when
accessing files, so you should not use it on files that you access frequently.
Questions and Answers 10-85
Page
10-44
Lesson 3 Practice: Exercise 1
To configure default quota management settings
7. What is the default disk space limit for new users?
1 KB
12. What happens to the quota status indicator?
The traffic light indicator turns yellow momentarily, indicating that it is rebuilding the disk quotas for the disk.
To configure quota management settings for a user
2. Are any user accounts listed? Why or why not?
Yes. The accounts listed are those that have logged on and gained access to drive C.
5. Click Limit Disk Space To. What are the default settings for the user you just set a
quota limit for?
Limit Disk Space To 1 KB and Set The Warning Level To 1 KB are the default settings.
16. Why did you get this error message?
You have exceeded your quota limit, and because the Deny Disk Space To Users Exceeding
Quota Limit check box is selected, you cannot use more disk space after you exceed your quota
limit.
Lesson 3 Review
Page
10-47
1. What is the purpose of disk quotas?
Disk quotas allow you to allocate disk space to users and monitor the amount of hard disk
space that users have used and the amount that they have left against their quota.
2. Which of the following statements about disk quotas in Windows XP Professional
is correct? (Choose the correct answer.)
a. Disk quotas track and control disk usage on a per-user, per-disk basis.
b. Disk quotas track and control disk usage on a per-group, per-volume basis.
c. Disk quotas track and control disk usage on a per-user, per-volume basis.
d. Disk quotas track and control disk usage on a per-group, per-disk basis.
The correct answer is C. Answer A is not correct because disk quotas do not track usage on a
per-disk basis. Answers B and D are not correct because disk quotas track usage on a per-user
basis, not a per-group basis.
10-86
Chapter 10
Managing Data Storage
3. Which of the following statements about disk quotas in Windows XP Professional
is correct? (Choose all that apply.)
a. Disk quotas can be applied only to Windows XP Professional NTFS volumes.
b. Disk quotas can be applied to any Windows XP Professional volume.
c. You must be logged on with the Administrator user account to configure
default quota management settings.
d. Members of the Administrators and Power Users groups can configure quota
management settings.
The correct answers are A and C. B is not correct because the volume must be formatted with
NTFS. D is not correct because members of the Power Users group cannot configure quota
management settings.
4. You get a call from an administrator who cannot delete a quota entry for a user
account. What would you tell the administrator to check?
Tell the administrator to verify that all files owned by the user are removed or that another user
has taken ownership of the files. You cannot delete a quota entry for a user account if there are
files owned by that user on the volume.
Lesson 4 Practice: Increasing Security by Using EFS
Page
10-53
1. What color is the SecretFile.txt text file? Why?
Green. Windows displays the names of encrypted files and folders as green by default.
17. What happens?
A Notepad dialog box appears indicating that access is denied.
Lesson 4 Review
Page
10-54
1. What is encryption and what is the EFS?
Encryption makes information indecipherable to protect it from unauthorized viewing or use.
The EFS provides encryption for data in NTFS files stored on disk. This encryption is public key–
based and runs as an integrated system service, making it easy to manage, difficult to attack,
and transparent to the file owner.
2. Which of the following files and folders does Windows XP Professional allow you
to encrypt? (Choose all that apply.)
a. A file on an NTFS volume
b. A folder on a FAT volume
c. A file stored on a floppy
d. A folder on an NTFS volume
The correct answers are A and D. B is not correct because encryption is not available on volumes formatted with FAT. C is not correct because you cannot format a floppy disk with NTFS.
Questions and Answers 10-87
3. How do you encrypt a folder? Is the folder actually encrypted?
To encrypt a folder, in the Properties dialog box for the folder, click the General tab. In the General tab, click Advanced, and then select the Encrypt Contents To Secure Data check box. All
files placed in the folder are encrypted, and the folder is now marked for encryption. Folders
that are marked for encryption are not actually encrypted; only the files within the folder are
encrypted.
4. If the private key belonging to the owner of an encrypted file is not available, how
can you decrypt the file?
If the owner’s private key is unavailable, a recovery agent can open the file by using his or her
own private key.
5. By default, the recovery agent for a computer running Windows XP Professional
in a workgroup is ____________, and the recovery agent for a computer running
Windows XP Professional in a domain environment is _____________________.
The administrator of the local computer; the domain administrator.
Lesson 5 Practice: Exercise 3
Page
10-66
1. When would you use the options available in the More Options tab?
When running Disk Cleanup did not free up enough space on your hard drive, and you need to
find some additional space. The More Options tab allows you to delete Windows components,
installed programs, and saved system restore points to free up additional space.
Lesson 5 Review
Page
10-67
1. What is fragmentation and what problems does it cause?
Fragmentation is the scattering of the parts of a file over the disk rather than having all parts
of the file located in contiguous space. Over time, a hard disk will contain fragmented files and
folders that cause Windows XP Professional to take longer to access the files. Creating new
files and folders also takes longer because the available free space on the hard disk is scattered.
2. The process of finding and consolidating fragmented files and folders is called
_______________. The Windows XP Professional system tool that locates fragmented files and folders and arranges them in contiguous space is
_____________________.
Defragmenting or defragmentation; Disk Defragmenter
3. Windows XP Professional provides a tool to locate fragmented files and folders
and arrange them in contiguous space on volumes formatted with which file systems?
NTFS, FAT, and FAT32
10-88
Chapter 10
Managing Data Storage
4. Which of the following functions does Check Disk perform? (Choose all that apply.)
a. Locates fragmented files and folders and arranges contiguously
b. Locates and attempts to repair file system errors
c. Locates bad sectors and recovers readable information from those bad sectors
d. Deletes temporary files and offline files
The correct answers are B and C. A is not correct because this is a function of Disk Defragmenter. D is not correct because this is a function of Disk Cleanup.
Lesson 6 Review
Page
10-76
1. How do you configure your computer to use offline folders and files?
To configure your computer to use offline folders and files, on the Tools menu of My Computer,
click Folder Options. In the Offline Files tab of Folder Options, you enable the Enable Offline
Files and the Synchronize All Offline Files Before Logging Off check boxes.
2. Which tools does Windows XP Professional provide for you to configure your
computer to provide offline files? What must you do to allow others to access files
on your computer?
Windows Explorer and My Computer. You must share the folder containing the file.
3. What does Synchronization Manager do?
Synchronization Manager allows you to manually synchronize or schedule the synchronization
of the files on your computer with the ones on the network resource.
Case Scenario Exercise Questions
Page
10-77
1. Iris’ new notebook computer has a 16 GB hard disk that you want to configure as
a single volume. It is the only hard disk on the computer. Should you create a
basic or dynamic disk?
Windows XP Professional does not support dynamic disks on notebook computers, so you
must configure a basic disk. You should configure the basic disk with a single primary partition.
2. When she is running the exhibit booth at tradeshows, Iris’ attention is often
diverted, and she is worried that she cannot always keep an eye on her notebook
computer. The computer contains trade secrets that she does not want to see compromised. Iris wants to secure the files on her computer, even if the computer is
stolen. Can you configure encryption on her notebook computer? If so, what precautions should you take?
Iris can encrypt files on the notebook computer as long as the hard disk is formatted with
NTFS. Iris should designate an EFS Recovery Agent that can recover the files if she is unable to.
Iris should also be sure to lock her console when she is not using the computer, or configure
her screensaver to require a password when the computer is activated. If the computer is configured to go to standby mode when it is idle, Iris should require a password to bring the computer out of standby.
Questions and Answers 10-89
3. Iris’ notebook computer does not have the biggest hard drive. She often works on
large sales documents and also stores many picture files of the products she sells.
She wants to compress these files to save space. What should you tell Iris to do?
You should show Iris how to use the Compressed Folders feature in Windows XP Professional.
Although she could use NTFS compression on her notebook, she cannot use NTFS compression on the same files that she encrypts, so NTFS compression is not a good solution for Iris.
4. What utility should you teach Iris to use that might also help maximize the free
space on her hard disk?
You should teach Iris to use the Disk Cleanup utility to remove temporary and cached files from
her computer.
5. You have configured Iris’ notebook computer to connect securely via the Internet
to the company network so that Iris can access the company e-mail server and file
servers. Iris also wants to be able to access certain shared files on the company
network when she cannot connect to the network. What should you do?
You should enable the Offline Files feature on Iris’ notebook computer. While the computer is
connected to the network, you should show Iris how make a shared folder available offline. You
should also caution her that if she makes changes to a file while she is disconnected from the
network, and another user changes the same file in the actual network folder, there might be
a conflict when Iris’ notebook synchronizes her offline files.
Troubleshooting Lab
Page
10-78
What do you suspect is the problem? What would you do to help Jonas?
Disk Management reports dynamic disks as either Offline or Missing when it cannot detect the
disk. The cause of a missing dynamic disk can be an operating system error or a problem with
the drive itself. You should first have Windows attempt to find the missing disk by selecting
Rescan Disks from the Action menu of Disk Management. If that does not resolve the issue,
you should have Jonas restart his computer. If Disk Management continues to report the disk
as missing, you should check to make sure that the drive is properly connected in the computer. It is also possible that the drive has failed and must be replaced.
11 Setting Up, Configuring, and
Troubleshooting Printers
Exam Objectives in this Chapter:
■
Connect to local and network print devices.
■
Manage printers and print jobs.
■
Connect to an Internet printer.
■
Connect to a local print device.
Why This Chapter Matters
This chapter introduces you to setting up and configuring network printers so that
users can print over the network. You will also learn how to troubleshoot common printing problems associated with setting up network printers.
Lessons in this Chapter:
■
Lesson 1: Introduction to Windows XP Professional Printing
■
Lesson 2: Setting Up Network Printers
■
Lesson 3: Connecting to Network Printers
■
Lesson 4: Configuring Network Printers
■
Lesson 5: Troubleshooting Setup and Configuration Problems
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have
Microsoft Windows XP Professional installed on a computer on which you can make
changes.
Note
You do not need a printer to complete the exercises in this chapter.
11-1
11-2
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
Lesson 1: Introduction to Windows XP Professional Printing
With Windows XP Professional printing, you can easily configure and share printers
across an entire network. After a computer is shared on a computer running Windows
XP Professional, you can then set up client computers running Windows XP, Windows
2000 Professional, Windows NT 4.0, Windows Me, Windows 98, and Windows 95 to
use that shared printer.
After this lesson, you will be able to
■ Define Windows XP Professional printing terms.
■ Identify the requirements for network printing.
■ Develop a network-wide printing strategy.
Estimated lesson time: 15 minutes
Important Printing Terms
Before you start setting up printers, you should be familiar with some important Windows XP Professional printing terms that will help you understand how the different
printing components work together, as shown in Figure 11-1.
Printer
driver
Local printer
Network interface printer
Print server
F11us01
Figure 11-1
Several printing components work together to make printing happen.
The following list defines some Windows XP Professional printing terms:
Logical printer The logical printer is the software configuration that is created in
Windows XP and is represented by an icon in the Printers And Faxes window. It
controls the printer’s configuration and the way in which Windows sends documents to the printer.
Printer The printer is a hardware device that puts text or images on paper or on
other print media. You will encounter two types of printers:
❑
A local printer is connected to a physical port on the print server. A logical
printer created on the print server provides tools for managing and sharing
the printer.
Lesson 1
❑
Introduction to Windows XP Professional Printing
11-3
A network interface printer is connected directly to the network via an
internal network adapter. You create a logical printer on a print server that
you can use to manage and share the printer.
Note In previous versions of Windows, Microsoft made an important distinction between
the terms “printer” and “print device.” Prior to Windows XP, a “printer” was the software on
the computer that controlled printing, and a “print device” was the actual hardware device.
The two terms were not used interchangeably. In Windows XP, that terminology has changed.
The Windows XP documentation generally defines the “printer” as “a device that puts text or
images on paper or other print media,” and the “logical printer” as the “collection of software
components that interface between the operating system and the printer.” Thus, the printer is
the physical device connected to a computer, and the logical printer is the icon in the Printers
And Faxes window that represents the printer.
Printer port The printer port is a software interface through which a computer
communicates with a printer by means of a locally attached interface. For example, if a computer has a parallel port, the printer port configured in Windows
might be named LPT 1. Windows XP Professional supports the following interfaces: line printer (LPT), COM, universal serial bus (USB) 1.1 and 2.0, IEEE 1394
(FireWire), and network-attached devices such as HP JetDirect and Intel NetPort.
Print server The print server is the computer that manages a printer on a network.
The print server receives and processes documents from client computers. Note
that any computer (a laptop or a desktop) can act as a print server.
Printer driver The printer driver is a file or set of files containing information that
Windows XP Professional requires to convert print commands into a specific
printer language, such as Adobe PostScript. This conversion makes it possible for
a printer to print a document. A printer driver is specific to each printer model.
Print job A print job is a document that Windows has prepared for printing. Print
jobs wait in a printer’s print queue until it is their turn to be printed. While a print
job is waiting in the queue, users can manage or delete the print job.
Requirements for Network Printing
The requirements for setting up printing on a Windows network include the following:
■
At least one computer to act as the print server. If the print server is to manage
many heavily used printers, the task of printing documents can use 100 percent of
the computer’s processing or network capacity. This will slow down other services
running on the computer. Therefore, Microsoft recommends using a dedicated
11-4
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
print server if the server will be placed under a heavy load. The computer can run
almost every Windows operating system, including the following:
!
❑
Windows Server 2003, which can handle a large number of connections, and
supports Apple Macintosh and UNIX computers as well as Novell NetWare
clients.
❑
Windows XP Professional, which is limited to 10 concurrent connections from
other computers for file and print services. It does not support Macintosh
computers or NetWare clients but does support UNIX computers.
■
Sufficient random access memory (RAM) to process documents. If a print server
manages a large number of printers or many large documents, the server might
require additional RAM beyond what Windows XP Professional or Windows
Server 2003 requires for other tasks. If a print server does not have sufficient RAM
for its workload, printing performance deteriorates. Given the modern prevalence
of inexpensive memory, RAM is typically not an issue unless you expect a print
server to be heavily utilized. Even having 64 MB of RAM beyond what the computer requires for other tasks should be sufficient.
■
Sufficient disk space on the print server to ensure that the print server can store
documents that are sent to it until it sends the documents to the printer. This is critical when documents are large or likely to accumulate. For example, if 10 users
send large documents to print at the same time, the print server must have enough
disk space to hold all the documents until it can send them to the print device. If
there is not enough space to hold all the documents, users get error messages and
cannot print. As with memory, hard disk space really becomes an issue only on
heavily used print servers. Having an extra 500 MB to 1 GB of disk space (or, even
better, moving the print queue to a spare hard disk) ensures that disk space does
not become an issue when printing.
Exam Tip
Windows XP Professional supports up to 10 simultaneous network connections.
Windows XP Professional supports printing from the following clients: MS-DOS, Windows 3.1,
Windows 95, Windows 98, Windows Me, Windows NT, Windows 2000, Windows Server 2003,
Windows XP, and UNIX. Windows XP Professional does not support printing from NetWare or
older Macintosh clients. Clients using newer Macintosh operating systems can communicate
directly with Windows clients by using special built-in file and print services named Samba.
Guidelines for Developing a Network-wide Printing Strategy
Before you set up network printing, develop a network-wide printing strategy to meet
users’ printing needs without unnecessary duplication of resources or delays in printing. Table 11-1 provides some guidelines for developing such a strategy.
Lesson 1
Table 11-1
Introduction to Windows XP Professional Printing
11-5
Network Printing Environment Guidelines
Guideline
Explanation
Determine users’ printing Determine the number of users who print and the printing workload. For
requirements
example, 10 people in a billing department who print invoices continually
will have a larger printing workload and might require more printers and
possibly more print servers than 10 software developers who do all their
work online.
Determinecompany’sprintingDetermine the printing needs of your company, including the numberand
requirements
types of printers that are required. In addition, consider the type of workloadthateachprinterwillhandle. Do notuse a personalprinterfornetwork
printing.
Determine the number of Determinethenumberofprintserversthatyournetworkrequirestohandle
print servers required
the number and types of printers that your network will contain.
Determine where to
locate printers
Determine where to put the printers so that it is easy for users to pick up
their printed documents. Think about how the print servers will connect to
theprinters.Typically,itismorecost-effectivetochoosenetworkinterface
printers than to locate print servers physically close to each printer.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you are unable to answer a question, review the lesson
materials and try the question again. You can find answers to the questions in the
“Questions and Answers” section at the end of this chapter.
1. ______________________ are connected to a physical port on the print server. Fill
in the blank.
2. Do you have to have a computer running one of the Windows Server products to
have a print server on your network? Why or why not?
11-6
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
3. How many concurrent connections from other computers for file and print services can Windows XP Professional provide? Choose the correct answer.
a. 20
b. 10
c. Unlimited
d. 30
4. A(n) ______________________ is one file or a set of files containing information
that Windows XP Professional requires to convert print commands into a specific
printer language, such as PostScript. Fill in the blank.
5. Windows XP Professional printing supports which of the following types of computers? Choose all that apply.
a. Macintosh computers
b. UNIX computers
c. NetWare clients
d. Windows 98 computers
Lesson Summary
■
To work with printers in Windows XP Professional, you should know the following terms:
❑
A printer is a hardware device that puts text or images on paper or on other
print media.
❑
Local printers are connected to a physical port on the print server, and network interface printers are connected to a print server through the network.
❑
Network interface printers require their own network interface cards
(NICs) and have their own network address, or they are attached to an external network adapter.
❑
A printer driver is one file or a set of files containing information that Windows XP Professional requires to convert print commands into a specific
printer language.
■
The requirements for setting up printing on a network include at least one computer to operate as a printer server, sufficient RAM to process documents, and sufficient disk space to ensure that the print server can store documents until it sends
the documents to the printer.
■
Before you set up network printing, you should take the time to determine the
users’ and company’s printing requirements, the number of print servers needed,
and where to locate printers.
Lesson 2
Setting Up Network Printers
11-7
Lesson 2: Setting Up Network Printers
Setting up and sharing a network printer makes it possible for multiple users to utilize
it. You can set up a local printer that is connected directly to the print server, or you
can set up a network interface printer that is connected to the print server over the network. In larger organizations, most printers are network interface printers.
After this lesson, you will be able to
■ Add and share a local printer.
■ Add and share a network interface printer.
■ Add a Line Printer Remote (LPR) port.
■ Configure client computers to print to a network printer.
Estimated lesson time: 30 minutes
How to Add and Share a Local Printer
The steps for adding a local printer or a network interface printer are similar. You use
the following steps to add a local printer:
1. Log on as Administrator or with a user account that is a member of the Administrators group on the print server.
2. From the Start menu, click Printers And Faxes.
3. In the Printers And Faxes window, in the Printer Tasks section, click Add A Printer
to start the Add Printer Wizard.
4. On the Welcome To The Add Printer Wizard page, click Next.
5. On the Local Or Network Printer page, shown in Figure 11-2, select Local Printer
Attached To This Computer, and then click Next.
11-8
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
F11us02
Figure 11-2
!
Install a local printer using the Add Printer Wizard.
Exam Tip
Users running Windows XP Professional must be members of the Administrators
or Power Users group to install a printer, and must have permission to load and unload device
drivers.
The Add Printer Wizard guides you through the steps to add a printer that is connected
to the print server. The number of local printers that you can connect to a print server
through physical ports depends on your hardware configuration. Table 11-2 describes
the Add Printer Wizard pages and options for adding a local printer.
Table 11-2
Add Printer Wizard Pages and Options for a Local Printer
Page
Option
Local Or Network Local Printer Attached
Printer
To This Computer
Select A Printer
Port
Description
You are adding a printer to the computer at
which you are sitting, which is the print
server.
Automatically Detect
And Install My Plug
And Play Printer
A check box that allows you to specify
whether you want Windows XP Professional to automatically detect and install
the Plug and Play printer.
Use The Following
Port
The port on the print server to which you
attached the printer.
Lesson 2
Table 11-2
Setting Up Network Printers
Add Printer Wizard Pages and Options for a Local Printer
Page
Option
Description
Install Printer
Software
Manufacturer And
Printers
Select the appropriate manufacturer and
printer so that the correct printer driver for
the local printer will be installed. If your
printer is not on the list, you must provide
a printer driver from the manufacturer or
select a model that is similar enough so the
printer can use it.
Name Your
Printer
Printer Name
A name that identifies the printer to the
users. Some applications might not support
more than 31 characters in the server and
printer name combinations.
Do You Want To Use
This Printer As The
Default Printer?
Select Yes to make this printer the default
printer for all Windows-based applications
and so that users do not have to set a printer
for each application. This option does not
appear the first time that you add a printer to
the print server because the printer is automatically set as the default printer.
Printer Sharing
Share Name
Users (with the appropriate permissions) can
use the share name to connect to the printer
over the network. This name appears when
users browse for a printer or supply a path
to a printer. The share name must be compatible with the naming conventions for all
client computers on the network. By default,
the share name is the printer name truncated
to an 8.3-character file name.
Location And
Comment
Location
Describe the location of the printer.
Comment
Provide information that helps users determine whether the printer meets their needs.
If your computer is in a domain, users can
search the Active Directory service for the
information that you enter here.
Print Test Page
Do You Want To Print
A Test Page?
Select Yes to print a test page and verify that
you have installed the printer correctly.
Completing The
Add Printer
Wizard
Finish
If the information about how you configured the printer to be installed is correct,
click Finish.
11-9
11-10
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
Real World
Plug and Play Printers
If you have a Plug and Play printer that connects through a USB port, an IEEE
1394 interface, or any other port that allows you to attach or remove devices without having to shut down and restart your computer, you probably do not need to
use the Add Printer Wizard. If Windows has the drivers for your printer, you can
often connect the printer’s cable to your computer (or point the printer toward
your computer’s infrared port) and turn on the printer. Windows automatically
installs the printer for you.
However, you should always read the installation instructions provided by the manufacturer. With some printers, you must install the software provided by the manufacturer before you connect and turn on the printer. This process helps ensure that
Windows has the proper drivers available when it first detects the printer.
How to Add and Share a Network Interface Printer
In larger companies, most printers are network interface printers. These printers offer a
distinct advantage: Because you do not need to connect printers directly to the print
server, you can place printers where you need them instead of where the print server is.
To add a network interface printer, select Local Printer Attached To This Computer on the
Local Or Network Printer page of the Add Printer Wizard. The main difference between
adding a local printer and adding a network interface printer is that you provide additional port and network protocol information for a typical network interface printer.
The default network protocol for Windows XP Professional is Transmission Control Protocol/Internet Protocol (TCP/IP), which many network interface printers use. For TCP/IP,
you provide additional port information in the Add Standard TCP/IP Printer Port Wizard.
Figure 11-3 shows the Select A Printer Port page of the Add Printer Wizard, and Table 11-3
describes the options on this page that pertain to adding a network interface printer.
Table 11-3
Options on the Select A Printer Port Page That Affect Adding a Network
Interface Printer
Option
Description
Create A New Port
This selection starts the process of creating a new port for the print server
to which the network interface print device is connected. In this case, the
new port points to the network connection of the print device.
Type Of Port
This selection determines the network protocol to use for the connection.
If you select Standard TCP/IP, it starts the Add Standard TCP/IP Printer
Port Wizard.
Lesson 2
Setting Up Network Printers 11-11
F11us03
Figure 11-3 Configure the connection to the network printer on the Select A Printer Port page of the
Add Printer Wizard.
Figure 11-4 shows the Add Port page of the Add Standard TCP/IP Printer Port Wizard,
and Table 11-4 describes the options on this page.
F11us04
Figure 11-4 Enter the network printer’s information on the Add Port page of the Add Standard TCP/
IP Printer Port Wizard.
11-12
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
Table 11-4
Options on the Add Port Page That Affect Adding a Network Interface
Printer
Option
Description
Printer Name Or
IP Address
The network location of the printer. You must enter either the Internet Protocol (IP) address or a Domain Name System (DNS) name of the network
interface printer. If you provide an IP address, Windows XP Professional
automatically supplies a suggested port name for the print device in the
form IP_IPaddress. If Windows XP Professional cannot connect to and identify the network interface printer, you must supply additional information
about the type of printer. To enable automatic identification, make sure that
the printer is powered on and connected to the network.
Port Name
The name that Windows XP Professional assigns to the port that you created
and defined. You can enter a different name. After you create the port, Windows XP Professional displays it on the Select A Printer Port page of the
Add Printer Wizard.
Note
If your printer uses a network protocol other than TCP/IP, you must install that network protocol before you can add additional ports that use it. The tasks and setup information required to configure a printer port depend on the network protocol.
How to Add an LPR Port
The LPR port is designed for computers that need to communicate with UNIX or virtual
address extension (VAX) host computers in accordance with Request for Comments
(RFC) 1179. For computers that need to submit print jobs to host computers, the standard TCP/IP port should be used in most cases. A network-connected printer must
have a card that supports the Line Printer Daemon (LPD) for TCP/IP printing to work
properly.
If you want to add an LPR port, you must first install the optional networking component, Print Services For UNIX.
To install Print Services For UNIX, follow these steps:
1. From the Start menu, click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Network Connections.
4. On the Advanced menu, click Optional Networking Components.
5. In the Windows Optional Networking Components Wizard, on the Windows Components page, click the Other Network File And Print Services check box, and
then click Details.
Lesson 2
Setting Up Network Printers 11-13
6. In the Other Network File And Print Services dialog box, select the Print Services
For UNIX check box, and then click OK.
7. In the Windows Optional Networking Components Wizard, click Next.
8. When the installation completes, close the Network Connections window.
To connect to an LPR network printer, follow these steps:
1. From the Start menu, click Printers And Faxes.
2. In the Printers And Faxes window, click Add A Printer.
3. In the Add Printer Wizard, on the Welcome To The Add Printer Wizard page, click
Next.
4. On the Local Or Network Printer page, click Local Printer Attached To This Computer, and clear the Automatically Detect And Install My Plug And Play Printer
check box. Click Next.
5. On the Select A Printer Port page, click Create A New Port, and on the Type Of
Port drop-down list, select LPR Port. Click Next.
Note If LPR Port is not available, make sure that the optional networking component Print
Services For UNIX is installed. Click Cancel to exit the Add Printer Wizard.
6. In the Add LPR Compatible Printer dialog box, in the Name Or Address Of Server
Providing LPD text box, type the DNS name or IP address of the host of the printer
you are adding. In the Name Of Printer Or Print Queue On That Server text box,
type the name of the print queue. Click OK.
Note The host can be the direct-connect TCP/IP printing device or the UNIX computer to
which the printer is connected. The DNS name can be the name specified for the host in the
HOSTS file. LPD is a service on the print server that receives documents (print jobs) from the
LPR utilities running on client systems.
7. Follow the directions onscreen to complete the installation of the TCP/IP printer.
How to Configure Client Computers So Users Can Print
After you add and share a printer, you need to set up client computers so that users can
print. Although the tasks to set up client computers vary depending on which operating systems are running on the client computers, all client computers require installation of a printer driver. The following points summarize the installation of printer
drivers according to the computer’s operating system:
11-14
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
■
Windows XP Professional automatically downloads the printer drivers for client
computers running Windows 2000, Windows NT versions 4.0 and earlier, Windows ME, Windows 95, or Windows 98.
■
Client computers running other Microsoft operating systems require installation of
printer drivers.
■
Client computers running non-Microsoft operating systems require installation of
printer drivers. For clients using LPR, you must install Print Services For UNIX.
To Set Up Client Computers Running Windows 2000, Windows NT, Windows Me,
Windows 95, or Windows 98
Users of client computers running Windows XP Professional, Windows XP Home Edition, Windows 2000, Windows NT, Windows Me, Windows 98, and Windows 95 only
need to connect to the shared printer. The client computer automatically downloads
the appropriate printer driver, as long as there is a copy of it on the print server.
If your client computer is running Windows XP Professional and you want to connect
to the shared printer, start the Add Printer Wizard on the client computer. On the Local
Or Network Printer page (see Figure 11-2), select A Network Printer, Or A Printer
Attached To Another Computer, and then click Next. The Specify A Printer page
appears, as shown in Figure 11-5.
F11us05
Figure 11-5
Choose the shared printer to connect to.
If you are not sure what the name of the shared printer is, you can browse for it by
selecting the Browse For A Printer option, and then clicking Next. After you have
located the shared printer and selected it, click Next. You are then asked whether it
Lesson 2
Setting Up Network Printers 11-15
should be the default printer. If you want it to be the default printer, click Yes; otherwise, select No and click Next. The Completing The Add Printer Wizard page appears.
Check over the information and then click Finish. You have successfully made a connection from your client computer to the shared printer.
What You Must Do to Set Up Client Computers Running Other Microsoft Operating
Systems
To enable client computers running other Microsoft operating systems (such as Windows 3.1 or MS-DOS) to print to a shared printer on a computer running Windows XP
Professional, you must manually install a printer driver on the client computer. To do
this, you must get the appropriate printer driver for a Windows-based client computer
from the installation disks for that client computer or from the printer manufacturer.
Practice: Installing a Network Printer
In this practice, you use the Add Printer Wizard to install and share a local printer. Sharing the printer makes it available to other users on the network. You also take the
printer offline and then print a document, which loads the document into the print
queue. Complete the five exercises that follow.
Important
Before you can share a printer or a folder on a computer running Windows XP
Professional in a workgroup environment, you must run the Network Setup Wizard to properly
configure the network. You can learn more about setting up a network connection in Chapter
15, “Configuring Network and Internet Connections.”
Exercise 1: Adding a Local Printer
1. Log on as Administrator or with a user account that is a member of the Administrators group on the print server.
2. From the Start menu, click Printers And Faxes.
3. In the Printers And Faxes window, click Add A Printer to launch the Add Printer
Wizard.
4. On the Welcome To The Add Printer Wizard page, click Next.
5. On the Local Or Network Printer page, click Local Printer. Make sure that the
Automatically Detect And Install My Plug And Play Printer check box is cleared,
and then click Next.
6. On the Select A Printer Port page, in the Use The Following Port drop-down list,
select LPT1: (Recommended Printer Port), and then click Next.
11-16
Chapter 11
Note
Setting Up, Configuring, and Troubleshooting Printers
If you already have a printer connected to the LPT1 port, select LPT2: (Printer Port) in
step 6.
7. On the Install Printer Software page, in the Manufacturer list, select HP. In the
Printers list, select HP Color LaserJet 4550 PS printer. Click Next.
Note
The selected driver is digitally signed to ensure reliability and to protect your system.
Driver signing is covered in Chapter 6, “Installing, Managing, and Troubleshooting Hardware
Devices and Drivers.”
8. On the Name Your Printer page, in the Printer Name list box, the Add Printer Wizard suggests a printer name based on the printer model. For this exercise, do not
change this name.
9. If other printers are already installed, the wizard also asks whether you want to
make this the default printer. If the Add Printer Wizard displays the Do You Want
To Use This Printer As The Default Printer message, click Yes.
10. Click Next to continue.
11. On the Printer Sharing page, click Share Name.
12. In the Share Name box, type Printer1, and then click Next.
Note
The Add Printer Wizard suggests a share name that is a shortened version of the
printer name. The shared printer name is used to identify a printer on the network. Some
operating systems (such as Windows 3.1) recognize share names up to only 12 characters. If
such clients will connect to the printer, you should use a name that is 12 characters or fewer;
otherwise, you can use a longer name.
13. On the Location And Comment page, type second floor west and in the Comment text box type mail room–room 2624. Click Next.
Note
If your computer running Windows XP Professional is part of a domain, Windows
2000 displays the values that you enter for Location and Comment when a user searches
Active Directory for a printer. Entering this information is optional, but it can help users locate
the printer more easily.
14. On the Print Test Page page, you can specify whether to print a test page to confirm that your printer is set up properly. Because this exercise does not require that
you have a printer, click No, and then click Next. When you are actually setting up
a printer, you should print a test page to confirm that it is working properly.
Lesson 2
Setting Up Network Printers 11-17
15. On the Completing The Add Printer Wizard page, click Finish.
16. In the Printers And Faxes window, notice that there is a new icon for the shared
HP Color LaserJet 4550 PS printer. Windows XP Professional displays an open
hand on the printer icon to indicate that the printer is shared. The check mark just
above the printer indicates that printer as the default printer.
Exercise 2: Taking a Printer Offline
In this exercise, you take the printer that you created in Exercise 1 offline.
Note
Taking a printer offline causes documents that you send to this printer to be held on
the computer while the print device is not available. This process eliminates error messages
about unavailable printers in later exercises. Windows XP Professional displays such error
messages when it attempts to send documents to a printer that is not connected to the computer. When a printer is offline, Windows XP Professional dims the icon and changes the status of the printer from Ready to Offline to reflect that the printer is not available.
1. From the Start menu, click Printers And Faxes.
2. Right-click the HP Color LaserJet 4550 PS icon.
3. On the shortcut menu, click Use Printer Offline.
Exercise 3: Printing a Test Document
1. In the Printers And Faxes folder, double-click the HP Color LaserJet 4550 PS icon.
2. In the HP Color LaserJet 4550 PS–Use Printer Offline dialog box, notice that there
are no documents waiting to be printed.
3. Click Start, point to All Programs, point to Accessories, and then click Notepad.
4. In Notepad, type any text that you want.
5. Arrange the Notepad window and the HP Color LaserJet 4550 PS–Use Printer
Offline dialog box on the desktop so that you can see the contents of both.
6. In Notepad, on the File menu, click Print.
7. In the Print dialog box, notice that the location and comment information that you
entered when you created the printer are shown, and that the Status for the printer
shows that it is currently offline.
8. Make sure that the HP Color LaserJet 4550 PS is selected as the printer, and then
click Print.
11-18
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
9. Notepad briefly displays a message on your computer, stating that the document
is printing. On a fast computer, you might not be able to see this message. Close
Notepad and click No when prompted to save changes to your document.
10. In the HP Color LaserJet 4550 PS–Use Printer Offline dialog box, you will see the
document waiting to be sent to the printer. Windows XP Professional holds the
document because you took the printer offline. Otherwise, Windows XP Professional would have sent the document to the printer immediately.
11. Close the HP Color LaserJet 4550 PS–Use Printer Offline dialog box.
12. Close all open windows.
Exercise 4: Installing Print Services For UNIX
1. From the Start menu, click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Network Connections.
4. On the Advanced menu, click Optional Networking Components.
5. In the Windows Optional Networking Components Wizard, on the Windows Components page, click the Other Network File And Print Services check box, and
then click Details.
6. In the Other Network File And Print Services dialog box, click the Print Services
For UNIX check box, and then click OK.
7. In the Windows Optional Networking Components Wizard, click Next.
8. When the installation completes, close the Network Connections window.
Exercise 5: Installing an LPR Port
1. From the Start menu, click Printers And Faxes.
2. In the Printers And Faxes window, click Add A Printer.
3. In the Add Printer Wizard, on the Welcome To The Add Printer Wizard page, click
Next.
4. On the Local or Network Printer page, click Local Printer Attached To This Computer and clear the Automatically Detect And Install My Plug And Play Printer
check box. Click Next.
5. On the Select A Printer Port page, click Create A New Port; and on the Type Of
Port drop-down list, select LPR Port. Click Next.
Lesson 2
Setting Up Network Printers 11-19
6. In the Add LPR Compatible dialog box, in the Name Or Address Of Server Providing LPD text box, type the DNS name or IP address of the host of the printer you
are adding. Click OK.
7. On the Install Printer Software page, in the Manufacturer list, select HP. In the
Printers list, select HP Color LaserJet. Click Next.
8. On the Name Your Printer page, in the Printer Name list box, the Add Printer
Wizard suggests a printer name based on the printer model. For this exercise,
do not change this name. If other printers are already installed, the wizard also
asks whether you want to make this the default printer. If the Add Printer Wizard displays the Do You Want To Use This Printer As The Default Printer message, click Yes.
9. Click Next to continue.
10. On the Printer Sharing page, click Do Not Share This Printer, and then click Next.
11. On the Print Test Page page, click No, and then click Next.
12. On the Completing The Add Printer Wizard page, click Finish.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Which of the following tasks can you perform with the Add Printer Wizard?
Choose all that apply.
a. Taking a local printer offline
b. Printing multiple copies of a document
c. Adding an LPR port
d. Making a printer that is connected to your computer available to other network users
2. What is the default printer in Windows XP Professional?
11-20
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
3. After you get home from the store, you unpack your new computer and printer.
You install Windows XP Professional, and you want to install your printer. You
want to set up the printer as your default printer. During the installation, you are
not prompted to use the printer as your default printer for all Windows-based
applications. You know you have seen this option at work when you install local
printers. Why can you not see it on your home computer?
Lesson Summary
■
Local printers are directly connected to a print server. To install and share a local
printer, use the Add Printer Wizard on the print server. Sharing a local printer
makes it possible for multiple users on the network to utilize it.
■
In larger companies, most printers are network interface printers. To install a network interface printer, use the Add Printer Wizard and specify the port information for the printer (such as a network address).
■
The LPR port is designed for computers that need to communicate with UNIX or
VAX host computers. For computers that need to submit print jobs to host computers, the standard TCP/IP port should be used in most cases. To install an LPR
port, you must first install Print Services For UNIX.
■
Users of client computers running Windows XP Professional, Windows 2000, Windows Me, Windows NT, Windows 98, or Windows 95 only need to connect to the
shared printer to be able to print. To enable users of client computers that use the
LPR protocol to print, the print server must have Print Services For UNIX installed.
Lesson 3
Connecting to Network Printers 11-21
Lesson 3: Connecting to Network Printers
After you have installed and shared a printer on the print server, and installed appropriate drivers, users on client computers running Windows 95 and later can easily connect to the shared printer. For most Windows-based client computers, if the
appropriate printer drivers are on the print server, the client computer automatically
downloads the drivers when the user makes a connection to the printer. For information on how you can install additional drivers on a print server, see Lesson 4, “Configuring Network Printers,” later in this chapter.
When you add and share a printer, by default, all users can connect to that printer and
print documents. The method used to connect to a printer depends on the client computer. Client computers running Windows 95 and later can use the Add Printer Wizard.
Client computers running Windows XP Professional, Windows XP Home Edition, or
Windows 2000 can also use a Web browser to connect to the printer.
After this lesson, you will be able to
■ Identify the options available when using the Add Printer Wizard to connect to a network
printer.
■ Connect directly to a shared printer.
■ Connect to a network printer by using a Web browser.
■ Find a printer using the Search Assistant.
Estimated lesson time: 15 minutes
Add Printer Wizard Options
The Add Printer Wizard is one method that client computers running Windows XP Professional, Windows XP Home Edition, Windows 2000, Windows Me, Windows NT,
Windows 98, or Windows 95 can use to connect to a printer. This is the same wizard
that you use to add and share a printer. The options that are available in the Add
Printer Wizard that allow you to locate and connect to a printer vary depending on the
operating system that the client computer is running.
Options for Client Computers Running Windows 2000 and Later
By using the Add Printer Wizard on client computers running Windows 2000 and later,
you can connect to a printer through the following methods:
Use the Universal Naming Convention (UNC) name You can use the UNC name
(\\print_server\printer_name) to make connections by selecting Type The Printer
Name Or Click Next To Browse For A Printer on the Locate Your Printer page of
the Add Printer Wizard. If you know the UNC name, this is a quick method.
11-22
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
Browse the network You can also browse the network for the printer by selecting
Type The Printer Name Or Click Next To Browse For A Printer on the Locate Your
Printer page of the Add Printer Wizard, leaving the Name text box blank, and
clicking Next.
Use the Uniform Resource Locator (URL) name You can also connect to a printer on
the Internet or your intranet by selecting Connect To A Printer On The Internet Or On
Your Local Intranet on the Locate Your Printer page of the Add Printer Wizard.
Search Active Directory If your computer running Windows 2000 or later is a member of a domain, you can find the printer by using Microsoft Active Directory service search capabilities. You can search either the entire Active Directory or just a
portion of it. You can also narrow the search by providing features of the printer,
such as color printing.
Options for Client Computers Running Windows NT 4.0, Windows 95, or Windows 98
On client computers running Windows NT 4.0, Windows 95, or Windows 98, the Add
Printer Wizard allows you only to enter a UNC name or to browse Network Neighborhood to locate the printer.
Options for Client Computers Running Other Microsoft Operating Systems
Users at client computers running early versions of Windows—such as Windows 3.1,
Windows 3.5, and Windows for Workgroups—use Print Manager instead of the Add
Printer Wizard to make a connection to a printer.
How to Connect Directly to a Shared Printer
Instead of using the Add Printer Wizard, an often simpler way to connect to a shared
printer is to connect directly by using any of the following techniques:
Browse My Network Places or Network Neighborhood In Windows 95, Windows 98, and Windows NT, Network Neighborhood provides a way to browse
computers on the local network. In Windows 2000 and Windows XP, My Network
Places provides this same functionality. After browsing to the computer that shares
the printer, right-click the printer and click Connect to initiate a connection to the
printer. You can also drag the printer icon to the Printers And Faxes folder on the
client computer.
Use the Run dialog box Click Start and then click Run to open the Run dialog box.
Type the UNC of any printer (\\print_server\printer_name) into the Open text
box, and then click OK to initiate a connection to the printer. If the print server
does not have the appropriate drivers for the operating system running on the client, Windows asks you to provide the drivers.
Use the command prompt Users of any Windows-based client computer can connect to a network printer by typing net use lptx: \\print_server\printer_name,
Lesson 3
Connecting to Network Printers 11-23
where x is the number of the printer port. The Net Use command is also the only
method available for making a connection to a network printer from client computers running MS-DOS or IBM OS/2 with Microsoft LAN Manager client software
installed.
How to Use a Web Browser
If you are using a client computer running Windows XP Professional, Windows XP
Home Edition, or Windows 2000, you can connect to a printer through your corporate
intranet. You can type a URL in your Web browser, and you do not have to use the Add
Printer Wizard. In Windows XP Professional, you can use Microsoft Internet Explorer,
the Printers And Faxes folder, My Computer, or any other window or folder that has an
address bar. After you make a connection, Windows XP Professional copies the correct
printer drivers to the client computer automatically.
A Web designer can customize this Web page, for example, to display a floor plan that
shows the location of print devices to which users can connect. There are two ways to
connect to a printer using a Web browser:
■
If you do not know the printer’s name, type http://print_server/printers. The
Web page lists all the shared printers on the print server that you have permission
to use. The page provides information about the printers, including printer name,
status of print jobs, location, model, and any comments that were entered when
the printer was installed. This information helps you select the correct printer for
your needs. Click the printer that you want to use.
■
If you know the printer’s name, type http://print_server/printer_name. You
provide the intranet path for a specific printer. You must have permission to use
the printer.
Windows automatically copies the appropriate printer driver to your computer and the
icon appears in Printers And Faxes. When you have connected to a shared printer from
a Web browser, you can use the printer as if it were attached to your computer.
Note For Internet printing, you must have Internet Information Services (IIS) and the Internet Printing Windows component installed on the print server. You must use Internet Explorer
version 4.0 or later to connect to a printer.
How to Find a Printer Using the Search Assistant
In the Search Assistant, the Find Printers feature allows you to search for printers in
Active Directory when you are logged on to an Active Directory domain. To activate
the Search Assistant, click Start, and then click Search. When the Search Assistant has
started, click Find Printers. When you have located a printer using Find Printers, you
can double-click the printer; or you can right-click it, and then click Connect to make
11-24
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
a connection to the printer. The Find Printers dialog box has three tabs to help you
locate a printer (see Figure 11-6).
F11us06
Figure 11-6
Search for printers in Active Directory with the Find Printers dialog box.
The following list describes the three tabs of the Find Printers dialog box:
Printers tab Allows you to enter and search for specific information, such as the
name, location, and model of the printer.
Features tab Allows you to select from a prepared list of additional search options,
such as whether the printer can print double-sided copies or at a specific resolution.
Advanced tab Allows you to use custom fields and Boolean operators to define
complex searches, such as whether the printer supports collation and a specific
printer language such as PostScript.
If you want to search for all available printers, you can leave all search criteria blank
and click Find Now. All the printers in the domain will be listed.
Note
The Find Printers feature is not available in the Search Assistant unless you are
logged on to a Windows domain. If you are using a computer that is in a workgroup, the Find
Printers feature is not available.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
Lesson 3
Connecting to Network Printers 11-25
1. When you add and share a printer, who can connect to that printer by default?
2. Which of the following operating systems running on a client computer allow you
to connect to a network printer by using Active Directory search capabilities?
Choose all that apply.
a. Windows 2000
b. Windows Me
c. Windows NT 4.0
d. Windows XP Professional
3. You have a small workgroup consisting of five computers running Windows XP
Professional at your house. You are giving your friend, who has never seen Windows XP Professional, a tour around the operating system. You are demonstrating
how the Search Assistant works, but the Find Printers feature is missing. Why?
Lesson Summary
■
Client computers running Windows XP Professional, Windows XP Home Edition,
Windows 2000, Windows Me, Windows NT, Windows 98, or Windows 95 can use
the Add Printer Wizard to connect to a printer. On client computers running Windows NT 4.0, Windows 95, or Windows 98, the Add Printer Wizard only allows
you to enter a UNC name or to browse Network Neighborhood to locate the
printer. Users on client computers running early versions of Windows (such as
Windows 3.1, Windows 3.5, and Windows for Workgroups) use Print Manager to
connect to a printer.
■
You can also install a printer by connecting to it with My Network Places (or Network Neighborhood), the Run dialog box, or the command prompt.
■
If you are using a client computer running Windows XP Professional, Windows XP
Home Edition, or Windows 2000, you can connect to a printer through your corporate intranet by typing a URL in your Web browser.
■
On client computers running Windows XP Professional, Windows XP Home Edition, or Windows 2000 that are part of a Active Directory domain, you can connect
to a printer using Active Directory search capabilities.
11-26
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
Lesson 4: Configuring Network Printers
After you have set up and shared network printers, user and company printing needs
might require you to configure printer settings so that your printing resources better fit
these needs.
The five most common configuration changes you can make are as follows:
■
You can share an existing nonshared printer if your printing load increases.
■
You can download additional print drivers so that clients running other versions of
Windows can use the shared printer.
■
You can stop sharing an existing shared printer.
■
You can create a printer pool with multiple printers so that print jobs are automatically distributed to the first available printer. In this way, users do not have to
search for an available printer.
■
You can set priorities among printers so that critical documents always print
before noncritical documents.
After this lesson, you will be able to
■ Share an existing printer.
■ Install additional printer drivers.
■ Stop sharing a printer.
■ Create a printer pool.
■ Set priorities among printers.
Estimated lesson time: 25 minutes
How to Share an Existing Printer
If the printing demands on your network increase, and if your network has a printer
that is already installed as a local printer but not yet shared, you can share the printer
with the network.
When you share a printer, you need to assign the printer a share name, which
appears in My Network Places. Use an intuitive name to help users when they are
browsing for a printer. You can also add printer drivers for all versions of Windows
XP Professional, Windows XP Home Edition, Windows 2000, Windows NT, Windows
95, and Windows 98.
In the Properties dialog box for the printer, you can use the Sharing tab to share an
existing printer (see Figure 11-7).
Lesson 4
Configuring Network Printers 11-27
F11us07
Figure 11-7
Use the Sharing tab of a printer’s Properties dialog box to configure sharing.
You use the following steps to share an existing printer using the Sharing tab:
1. From the Start menu, click Printers And Faxes.
2. In the Printers And Faxes window, right-click the icon for the printer that you want
to share and click Sharing.
Note
If this is the first time you have shared a printer or a file on the computer, Windows XP
Professional prompts you to either run the Network Setup Wizard or just enable sharing. For
the purposes of this exercise, you should just enable sharing if Windows presents you with
the choice. For more information on using the Network Setup Wizard, see Chapter 15.
3. In the Properties dialog box for the printer, on the Sharing tab, click Share This
Printer.
4. In the Share Name text box, type in a share name, and then click OK.
After you have shared the printer, Windows XP Professional puts an open hand under
the printer icon, indicating that the printer is shared.
How to Install Additional Printer Drivers
If you expect network users of a shared printer to have computers that are running different versions of Windows, you can install different drivers so that they are automatically available to users who connect to the printer. Making drivers available prevents
users from having to find and install the drivers themselves. To verify which printer
drivers are downloaded or to download printer drivers to your print server, use the following steps:
11-28
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
1. On the print server, click Start, and then click Printers And Faxes.
2. In the Printers And Faxes window, right-click the shared printer you want to manage, and then click Sharing.
3. In the Properties dialog box for the printer, on the Sharing tab, click Additional
Drivers.
4. In the Additional Drivers dialog box, shown in Figure 11-8, select the check boxes
for any environments for which you want to make drivers available, and then click
OK.
F11us08
Figure 11-8
Install additional drivers by using the Sharing tab.
5. If you are prompted for the Windows XP Professional installation files, enter the
path to those files or insert the Windows XP Professional CD-ROM into the CDROM drive, and then click OK.
Note If Windows XP Professional does not have the necessary drivers, you will be prompted
to provide the drivers yourself.
6. The drivers are installed. Click OK to close the Properties dialog box for the
printer.
Lesson 4
Configuring Network Printers 11-29
How to Stop the Sharing of a Printer
If the printing demands on your network change, you can stop sharing an existing
shared printer. Use the Sharing tab of the Properties dialog box for that printer to stop
sharing it. The steps to stop sharing a printer are similar to those for sharing a printer.
However, in the steps to stop sharing a printer, in the Properties dialog box for the
printer, in the Sharing tab, click Do Not Share This Printer (refer to Figure 11-7), and
then click OK.
How to Create a Printer Pool
A printer pool consists of two or more identical printers that are connected to one
print server and are configured with a single logical printer. The printers can be local
or network interface printers. Although the printers should be identical, you can use
printers that are not identical but use the same printer driver. After you install a printer,
you can create a printer pool using the Ports tab of the Properties dialog box for that
printer. In the Ports tab, select the Enable Printer Pooling check box and select additional ports on the printer server (see Figure 11-9).
F11us09
Figure 11-9
Enable printer pooling using the Properties dialog box for the printer.
When you create a printer pool, users can print documents without checking to see
which printer is available. The document prints on the first available printer in the
printing pool.
11-30
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
Tip
When you set up a printer pool, you should place the printers in the same physical area
so that users can easily locate their documents.
A printing pool has the following advantages:
■
In a network with a high volume of printing, it decreases the time that documents
wait on the print server.
■
It simplifies administration because you can administer multiple printers simultaneously.
After connecting the printers to the print server, you can create a printing pool by completing the following steps:
1. Click Start, and then click Printers And Faxes.
2. In the Printers And Faxes window, right-click the printer icon and click Properties.
3. In the Properties dialog box for the printer, on the Ports tab, select the Enable
Printer Pooling check box.
4. Select the check box for each port to which a printer that you want to add to the
pool is connected, and then click OK.
How to Set Priorities Among Printers
Although creating a printer pool involves creating a single logical printer for multiple
printers, setting priorities involves creating multiple logical printers for a single printer.
The printer priority you set on each logical printer governs the order in which print
jobs are printed. For example, you could create a high-priority logical printer for some
users and a lower-priority logical printer for other users. All users would print to the
same printer, but some users would get to print first.
There are two things that you must do to set priorities among printers:
■
Add a printer and share it. Then add a second printer and point it to the same
physical printer or port. The port can be either a physical port on the print server
or a port that points to a network interface print device.
■
Set a different priority for each of the printers that is pointing to the physical printer
or hardware device. Have different groups of users print to different virtual printers,
or have users send different types of documents to different virtual printers.
For an example of printer priority, see Figure 11-10. User1 sends documents to a
printer with the lowest priority of 1, and User2 sends documents to a printer with the
highest priority of 99. In this example, User2’s documents always print before User1’s
documents.
Lesson 4
User1
Configuring Network Printers 11-31
Printer-Gen
Word.doc
User1
Priority 1
User2
Print server
User1
User2
Printer-Gen
Word.doc
User2
User1
Priority 99
F11us10
Figure 11-10
Logical printers with higher priorities print before logical printers with lower priorities.
Use the following steps to set the priority for a printer:
1. Click Start, and then click Printers And Faxes.
2. In the Printers And Faxes window, right-click the icon for the printer, and then
click Properties.
3. In the Properties dialog box for the printer, on the Advanced tab, adjust the Priority setting for the printer. This value for a printer can be set from 1 through 99—
the higher the number, the higher the priority of the printer.
4. Click OK.
!
Exam Tip
You can configure multiple logical printers for a single printer to control how the
printer is used in different circumstances or by different users. You can also create a printer
pool to configure multiple printers for a single logical printer.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What are two advantages of sharing a printer?
11-32
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
2. How do you share a printer?
3. Which of the following statements about a printing pool in Windows XP Professional are correct? Choose all that apply.
a. All printers in a printing pool must be network interface printers.
b. A printing pool consists of two or more identical printers that are connected
to one print server and act as a single printer.
c. If you use printers that are not identical, they must use the same printer
driver.
d. If you use printers that are not identical, you must install all the required
printer drivers on the print server.
4. Why would you create virtual printers and vary the priorities on them?
Lesson Summary
■
To share an existing printer, use the Sharing tab of the Properties dialog box for
the printer and select Share This Printer.
■
If you expect network users of a shared printer to have computers that are running
different versions of Windows, you can install different drivers so that they are
automatically available to users who connect to the printer.
■
To stop sharing a printer, in the Properties dialog box for the printer, on the Sharing tab, click Not Shared.
■
A printer pool consists of two or more identical printers that are connected to one
print server and act as a single printer.
■
Setting priorities on virtual printers makes it possible for users to send critical documents to a high-priority printer and noncritical documents to a lower-priority
printer, even when there is only one physical printer.
Lesson 5
Troubleshooting Setup and Configuration Problems 11-33
Lesson 5: Troubleshooting Setup and Configuration
Problems
During setup and configuration of a printer, problems can occur. This lesson introduces you to a few common problems that you might encounter and provides some
suggested solutions.
After this lesson, you will be able to
■ Troubleshoot a printer setup problem by using the Windows troubleshooters
■ Offer possible solutions to common troubleshooting scenarios
Estimated lesson time: 5 minutes
How to Use Windows Troubleshooters
Windows XP Professional helps you interactively troubleshoot problems you encounter. To troubleshoot problems with a printer, click Start, click Control Panel, and then
click Printers And Other Hardware. In the Printers And Other Hardware window,
under Troubleshooters, click Printing. The Help And Support Center window appears
with the printing troubleshooter displayed, as shown in Figure 11-11.
F11us11
Figure 11-11
Use Windows troubleshooters to troubleshoot printing problems.
Notice the series of questions on the page. As you respond to these questions, the troubleshooter asks additional questions and makes suggestions to resolve your problem
based on the answers you provide.
11-34
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
Possible Solutions to Common Troubleshooting Scenarios
Table 11-5 lists some of the common setup and configuration problems that you might
encounter. It also gives probable causes of the problems and possible solutions.
Table 11-5
Common Printer Problems and Possible Solutions
Problem
Probable Cause
Possible Solution
Test page does not print.
You have confirmed that
the printer is connected and
turned on.
The selected port is not
correct.
Configure the printer for the
correct port. For a printer that
uses a network interface printer,
make sure that the network
address is correct.
Test page or documents print The installed printer driver
incorrectly as garbled text.
is not correct.
Pages are only partially
printing.
Reinstall the printer with the
correct printer driver.
There might not be enough
Consider adding memory to the
memory to print the document. print server.
The printer might not have
enough toner.
Try replacing the printer’s toner
cartridge.
Users report an error
message that asks them to
install a printer driver when
they print to a print server
running Windows XP
Professional.
Printer drivers for the client
computers are not installed
on the print server.
On the print server, add the
appropriate printer drivers for the
client computers. Use the client
computer operating system CDROM or a printer driver from the
vendor.
Documents from one client
computer do not print, but
documents from other
client computers do.
The client computer is connected to the wrong printer.
On the client computer, remove
the printer, and then add the correct printer.
Documents print correctly
on some (but not all)
printers in a printer pool.
The printers in the printer
pool are not identical.
Verify that all printers in the
printer pool are identical or that
they use the same printer driver.
Remove inappropriate devices.
Printing is slow because the
print server is taking a long
time to render the job.
The print server’s disk could
be in need of defragmenting
or could be getting close to
capacity.
Try defragmenting the print
server’s disk and check that there
is adequate space for temporary
files on the hard disk.
If you are using a printing
Printing is slow, and print
jobs are taking a long time to pool, you might not have
reach the top of the queue. enough printers in the pool.
Add printers to the printing pool.
Documents do not print in
the right priority.
The printing priorities among Adjust the printing priorities for
printers are set incorrectly.
the printer associated with the
printers.
Lesson 5
Troubleshooting Setup and Configuration Problems 11-35
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. How do you access and use the printing troubleshooter?
2. What should you check if documents print correctly on some printers in a printing
pool, but not on all of them?
3. What should you check if printing is slow because the print server is taking a long
time to render the job?
4. What should you check if pages are only partially printing?
Lesson Summary
■
Windows XP Professional helps you interactively troubleshoot problems you
encounter. To troubleshoot printing problems, use the printing troubleshooter.
■
There are a number of common setup and configuration problems that you should
learn how to solve. The most common solutions include making sure that
❑
The proper port is selected.
❑
The proper printer driver is installed, as well as drivers for any clients running
other operating systems.
❑
The print server has enough memory.
❑
The printer has enough toner.
❑
The correct printer is being printed to.
11-36
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
Case Scenario Exercise
Read the following scenario and answer the associated questions. You can use this
exercise to help determine whether you have learned enough to move on to the next
chapter. If you have difficulty completing this work, review the material in this chapter
before beginning the next chapter. You can find answers to these questions in the
“Questions and Answers” section at the end of this chapter.
Scenario
You are an administrator for a company named Contoso, Ltd., which provides landscaping services for government-owned property. You are working with Jeff, a manager in the Marketing department who has just purchased 10 identical laser printers at
an auction. The printers all have a built-in network interface that uses TCP/IP. You
have verified that the printers are functional and have already attached each printer to
the network. Jeff wants to configure these printers so that they are all accessible to the
users in the department as a single printer, preventing users from having to install multiple printers.
Questions
1. What feature in Windows XP Professional allows you to configure all these printers so that users will have to install only one printer on their local computers.?
2. How will you configure this feature?
3. What steps will users have to take to connect to the printers?
Troubleshooting Lab 11-37
Troubleshooting Lab
Read the following troubleshooting scenario and then answer the question that follows. You can use this lab to help determine whether you have learned enough to
move on to the next chapter. If you have difficulty completing this work, review the
material in this chapter before beginning the next chapter. You can find the answer to
this question in the “Questions and Answers” section at the end of this chapter.
Scenario
You are working as an administrator for a company named Margie’s Travel, one of the
largest travel agents in the southeast United States. Angela, one of your users, has a
color laser printer that is connected to her computer running Windows XP Professional. Angela shares the printer with other users on the network. Sometimes, the other
users on the network print large documents that take a long time to print. Angela wants
to keep the printer available to other users because it is the only color printer available
in the department, but she often has important documents that need to be printed
before any long documents that are waiting to be printed.
Question
How would you solve Angela’s problem?
Chapter Summary
■
A printer is a hardware device that puts text or images on paper or on other print
media. Local printers are connected to a physical port on the print server, and network interface printers are connected to a print server through the network. Network interface printers require their own NICs and have their own network
address, or they are attached to an external network adapter. Before configuring a
print server, you should make sure that the computer has sufficient RAM to process documents and sufficient disk space to ensure that the print server can store
documents until it sends the documents to the printer.
11-38
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
■
To install and share a local printer, use the Add Printer Wizard on the print server.
Sharing a local printer makes it possible for multiple users on the network to utilize it. In larger companies, most printers are network interface printers. To install
a network interface printer, use the Add Printer Wizard and specify the port information for the printer (such as a network address).
■
Clients can connect to a shared printer by using the Add Printer Wizard, by connecting directly to the printer (using My Network Places, the Run dialog box, or
the Command Prompt), by using a Web browser, or by searching Active Directory.
■
To share an existing printer, use the Sharing tab of the Properties dialog box for
the printer and select Share This Printer. If you expect network users of a shared
printer to have computers that are running different versions of Windows, you can
install different drivers so that they are automatically available to users who connect to the printer. You can also create two advanced printer configurations:
■
❑
A printer pool consists of two or more identical printers that are connected to
one print server and act as a single printer.
❑
Setting priorities on virtual printers makes it possible for users to send critical
documents to a high-priority printer and noncritical documents to a lower-priority printer, even when there is only one physical printer.
Windows XP Professional helps you interactively troubleshoot problems you
encounter. To troubleshoot printing problems, you can use the printing troubleshooter. You should also learn to resolve common problems such as improper
printer drivers, improper ports, and low ink or toner.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
Windows XP Professional supports up to 10 simultaneous network connections.
Windows XP Professional supports printing from the following clients: MS-DOS,
Windows 3.1, Windows 95, Windows 98, Windows Me, Windows NT, Windows
2000, Windows Server 2003, Windows XP, and UNIX. Windows XP Professional
does not support printing from NetWare or Macintosh clients.
Exam Highlights 11-39
■
Users running Windows XP Professional must be members of the Administrators
or Power Users groups to install a printer.
■
You can configure multiple logical printers for a single printer to control how the
printer is used in different circumstances or by different users. You can also create
a printer pool to configure multiple printers for a single logical printer.
Key Terms
local printer
A printer that is connected to a physical port on the print server.
logical printer The software configuration that is created in Windows and displayed
in Printers And Faxes.
network interface printer A printer that is connected directly to the network via an
internal network adapter.
print job
A document that Windows has prepared for printing.
print server The computer or other remote device that has a network printer physically connected to it.
printer The physical device used for printing. This device is usually a standard
printer, but it can also be a fax device, a plotter, or a file. It might also refer to the
combination of the physical and logical printer.
printer driver A file or set of files containing information that Windows XP Professional requires to convert print commands into a specific printer language.
printer pool A printing option that permits you to attach two or more printers to a
single printer configuration.
printer port A software interface through which a computer communicates with a
printer by means of a locally attached interface.
printer priority Governs the order in which print jobs are printed relative to other
logical printers configured for the same printer.
11-40
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
Questions and Answers
Lesson 1 Review
Page
11-5
1. ______________________ are connected to a physical port on the print server. Fill
in the blank.
Local printers
2. Do you have to have a computer running one of the Windows Server products to
have a print server on your network? Why or why not?
No. A print server is a computer that manages one or more printers on a network. The print
server receives and processes documents from client computers. If you have a computer running Windows XP Professional and it has a shared printer attached to it, it is by definition a print
server. However, if the print server will manage many heavily used printers, Microsoft recommends a dedicated print server, and most dedicated print servers run one of the Windows
Server products.
3. How many concurrent connections from other computers for file and print services can Windows XP Professional provide? Choose the correct answer.
a. 20
b. 10
c. Unlimited
d. 30
B is the correct answer. Windows XP Professional allows 10 concurrent connections from network users.
4. A(n) ______________________ is one file or a set of files containing information
that Windows XP Professional requires to convert print commands into a specific
printer language, such as PostScript. Fill in the blank.
Printer driver
5. Windows XP Professional printing supports which of the following types of computers? Choose all that apply.
a. Macintosh computers
b. UNIX computers
c. NetWare clients
d. Windows 98 computers
The correct answers are B and D. A and C are not correct because Windows XP Professional
does not support printing from Macintosh or NetWare clients. Windows Server 2003 does support printing from these clients.
Questions and Answers 11-41
Lesson 2 Review
Page
11-19
1. Which of the following tasks can you perform with the Add Printer Wizard?
Choose all that apply.
a. Taking a local printer offline
b. Printing multiple copies of a document
c. Adding an LPR port
d. Making a printer that is connected to your computer available to other network users
The correct answers are C and D. A is not correct because you take a printer offline by right-clicking
the printer in the Printers And Faxes window and clicking Use Printer Offline. B is not correct
because you print documents from within applications and not during the installation of the printer.
2. What is the default printer in Windows XP Professional?
The default printer is the printer used for all Windows-based applications. You select this option
so that you do not have to set a printer for each application. The first time that you add a printer
to the print server, this option does not appear because the printer is automatically selected as
the default printer.
3. After you get home from the store, you unpack your new computer and printer.
You install Windows XP Professional, and you want to install your printer. You
want to set up the printer as your default printer. During the installation, you are
not prompted to use the printer as your default printer for all Windows-based
applications. You know you have seen this option at work when you install local
printers. Why can you not see it on your home computer?
The first time that you add a printer to a computer, this option does not appear. The printer is
automatically selected as the default printer.
Lesson 3 Review
Page
11-24
1. When you add and share a printer, who can connect to that printer by default?
By default, all users can connect to that printer.
2. Which of the following operating systems running on a client computer allow you
to connect to a network printer by using Active Directory search capabilities?
Choose all that apply.
a. Windows 2000
b. Windows Me
c. Windows NT 4.0
d. Windows XP Professional
The correct answers are A and D. B and C are not correct because Windows Me and Windows
NT 4.0 do not allow you to search for computers using Active Directory.
11-42
Chapter 11
Setting Up, Configuring, and Troubleshooting Printers
3. You have a small workgroup consisting of five computers running Windows XP
Professional at your house. You are giving your friend, who has never seen Windows XP Professional, a tour around the operating system. You are demonstrating
how the Search Assistant works, but the Find Printers feature is missing. Why?
The Find Printers feature is not available in the Search Assistant unless you are logged on to an
Active Directory domain. If you are using a stand-alone computer or one that is in a workgroup,
the Find Printers component is not available.
Lesson 4 Review
Page
11-31
1. What are two advantages of sharing a printer?
Sharing a printer allows other users on the network to use the printer. It also simplifies administration because you can administer printers remotely.
2. How do you share a printer?
In the Properties dialog box for the printer, in the Sharing tab, click Share This Printer and type
in a share name.
3. Which of the following statements about a printing pool in Windows XP Professional are correct? Choose all that apply.
a. All printers in a printing pool must be network interface printers.
b. A printing pool consists of two or more identical printers that are connected
to one print server and act as a single printer.
c. If you use printers that are not identical, they must use the same printer
driver.
d. If you use printers that are not identical, you must install all the required
printer drivers on the print server.
The correct answers are B and C. A is not correct because you can also include local printers
in a printer pool. D is not correct because you should use identical printers, but must at least
use printers that use the same driver.
4. Why would you create virtual printers and vary the priorities on them?
Creating virtual printers that print to the same physical printer and varying the printer priority
allows you to set priorities among groups of documents that all print on the same physical
printer. Users can send critical documents to a high-priority virtual printer and noncritical documents to a lower-priority virtual printer. The critical documents always print first, even if there is
only one physical printer.
Lesson 5 Review
Page
11-35
1. How do you access and use the printing troubleshooter?
Click Start, click Control Panel, and click Printers And Other Hardware. In the Printers And Other
Hardware window, under Troubleshooters, click Printers. The Help And Support Services window appears with the printing troubleshooter displayed.
Questions and Answers 11-43
2. What should you check if documents print correctly on some printers in a printing
pool, but not on all of them?
Verify that all print devices in the printer pool are identical or that they use the same printer
driver.
3. What should you check if printing is slow because the print server is taking a long
time to render the job?
Try defragmenting the print server’s disk and check that there is adequate space for temporary
files on the hard disk.
4. What should you check if pages are only partially printing?
There might not be enough memory to print the document, so consider adding memory to the
print server. The printer might not have enough toner, so try replacing the printer’s toner cartridge.
Case Scenario Exercise
Page
11-36
1. What feature in Windows XP Professional allows you to configure all these printers so that users will have to install only one printer on their local computers.?
Printer pooling
2. How will you configure this feature?
You must designate a computer to act as the print server. On this computer, you should install
a logical printer that is configured with the IP address of one of the printers. Once the printer
is installed, you should use the Ports tab of the printer’s Properties dialog box to enable printer
pooling. You should then add ports for the IP addresses of each of the other printers. Finally,
you should share the logical printer with the network and install any additional drivers the client
computers might need.
3. What steps will users have to take to connect to the printers?
After a printer pool is configured, users only need to connect to the single logical printer on the
print server to use the printer pool. If drivers are configured appropriately, the printer installation should happen automatically.
Troubleshooting Lab
Page
11-37
How would you solve Angela’s problem?
You should suggest that Angela configure two logical printers for the printer. She should assign
one of the logical printers a higher priority than the other printer. She should also name the logical printers to indicate their use. (For example, she might name the logical printer with the
lower priority “Long Document Printer” and name the printer with the higher priority “Normal
Use Printer.”) She should share each of the printers with the network and explain to the other
users on the network how the printers are configured.
12 Managing Printers
and Documents
Exam Objectives in this Chapter:
■
Connect to local and network print devices.
❑
Manage printers and print jobs.
❑
Control access to printers by using permissions.
Why This Chapter Matters
In Chapter 11, “Setting Up, Configuring, and Troubleshooting Printers,” you
learned how to install and configure printers. This chapter focuses on the management of printers and of documents waiting to print. You will learn how to
manage printers and documents, how to restrict access to printers by using permissions, and how to troubleshoot common printing problems.
Lessons in this Chapter:
■
Lesson 1: Introduction to Printer Administration
■
Lesson 2: Managing Printers
■
Lesson 3: Managing Documents
■
Lesson 4: Administering Printers by Using a Web Browser
■
Lesson 5: Troubleshooting Common Printing Problems
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have
Microsoft Windows XP Professional installed on a computer on which you can make
changes. To complete the practices in this chapter, you must have installed the drivers
for an HP Color LaserJet 4550 PS printer as directed in Chapter 11.
Note
You do not need a printer to complete the exercises in this chapter. You just need to
have installed the software for the HP Color LaserJet 4550 PS printer.
12-1
12-2
Chapter 12
Managing Printers and Documents
Lesson 1: Introduction to Printer Administration
After your printing network is set up, you will be responsible for administering it. You
can administer network printers at the print server or remotely over the network. This
lesson introduces you to the concepts involved in administering network printers:
managing printers, managing documents, troubleshooting printers, and performing
tasks that require the Manage Printers permission. You will also learn how to access
printers and how to control access by using print permissions.
After this lesson, you will be able to
■ Identify tasks involved in printer management.
■ Identify tasks involved in document management.
■ Identify common troubleshooting tasks.
■ Gain access to printers for administration.
■ Assign print permissions to user accounts and groups.
Estimated lesson time: 30 minutes
Printer Management Tasks
Managing printers, which is one of the most important aspects of printer administration, includes the following tasks:
■
Assigning forms to paper trays
■
Setting a separator page
■
Pausing, resuming, and canceling documents on a printer
■
Redirecting documents
■
Taking ownership of a printer
Document Management Tasks
A second major aspect of printer administration is managing documents, which
includes the following tasks:
■
Pausing and resuming a document
■
Setting notification, priority, and printing time
■
Restarting and deleting a document
Lesson 1
Introduction to Printer Administration
12-3
Common Printer Problems that Require Troubleshooting
Troubleshooting printers, which means identifying and resolving all printer problems,
is a third major aspect of printer administration. The types of problems you will commonly need to troubleshoot include the following:
■
Printers that are off or offline
■
Printers that are out of paper or out of ink
■
Printers that are incorrectly configured
■
Users who cannot print or cannot print correctly
■
Users who cannot access a printer
How to Access Printers
You can perform most administrative tasks for printers by using the Printers And Faxes
window. When you select a printer icon, Windows XP Professional displays many of
the common printer management and document management tasks for you in the
Printer Tasks list, as shown in Figure 12-1.
F12us01
Figure 12-1
Note
Manage printers and documents using the Printers And Faxes window.
These tasks, as well as some additional printer management and document management tasks, are covered in later lessons in this chapter.
12-4
Chapter 12
Managing Printers and Documents
To access printers by using the Printers And Faxes window, complete the following
steps:
1. From the Start menu, click Printers And Faxes.
2. In the Printers And Faxes window, click the appropriate printer icon to select it.
3. After you have selected a printer icon, you can do the following:
❑
Click any of the tasks in the Printer Tasks list.
❑
Click the File menu and then click Open (or just double-click the printer icon)
to open the printer window, which allows you to perform document management tasks.
❑
Click the File menu (or right-click the printer icon) and then click Properties
to open the Properties dialog box, which allows you to perform printer-management tasks such as changing print permissions or editing Microsoft Active
Directory service information about the printer.
Windows XP Professional Print Permissions
Windows XP Professional allows you to control printer usage and administration by
assigning print permissions. With print permissions, you can control who can use a
printer, who can manage the printer, and who can manage documents in the print
queue.
For security reasons, you might need to limit user access to certain printers. You can
also use print permissions to delegate responsibilities for specific printers to users who
are not administrators. Windows XP Professional provides three levels of print permissions: Print, Manage Documents, and Manage Printers. Table 12-1 lists the capabilities
of each level of permission.
!
Exam Tip
The Print permission offers the fewest rights, basically allowing users to print to
the printer and manage their own documents. The Manage Documents permission allows all
the rights offered by the Print permission and also allows users to manage other users’ documents. The Manage Printers permission includes all the rights offered by the Manage Documents permission and allows users to configure printer settings.
You can allow or deny print permissions. Denied permissions always override allowed
permissions. For example, if you select the Deny check box next to Manage Documents for the Everyone group, no one can manage documents, even if you grant this
permission to another user account or group because all user accounts are members of
the Everyone group.
Lesson 1
Introduction to Printer Administration
12-5
See Also For more information about using permissions, read Chapter 8, “Securing
Resources with NTFS Permissions.”
Table 12-1
Printing Capabilities of Windows XP Professional Print Permissions
Capabilities
Print documents
Pause, resume, restart, and cancel
the user’s own document
Connect to a printer
Control job settings for all documents
Pause, resume, restart, and cancel all
other users’ documents
Print
Permissions
Manage Documents
Manage Printer
✔
✔
✔
✔
✔
✔
✔
✔
✔
✔
✔
✔
✔
Cancel all documents
Share a printer
Change printer properties
Delete a printer
Change print permissions
✔
✔
✔
✔
✔
To Assign Print Permissions
By default, Windows XP Professional assigns the Print permission for each printer to
the built-in Everyone group, allowing all users to send documents to the printer. You
can also assign print permissions to users or groups.
Security Alert
Because the Everyone group includes all users, you should remove the
Everyone group from the list of groups with print permissions for a printer and instead use the
Users group to provide general network access to a printer.
To assign print permissions, complete the following steps:
1. Click Start, and then click Printers And Faxes.
2. In the Printers And Faxes window, right-click the appropriate printer icon, and
then click Properties.
3. Click the Security tab.
12-6
Chapter 12
Managing Printers and Documents
Note
If your computer running Windows XP Professional is in a workgroup environment and
you do not have a Security tab in your printer’s Properties dialog box, close the Properties dialog box. In the Printers And Faxes window or in Explorer on the Tool menu, click Folder Options
and click the View tab. Clear the Use Simple File Sharing (Recommended) check box, click
OK, and then display your Printer’s Properties dialog box.
4. In the Security tab, click Add.
5. In the Select Users, Groups, Or Computers dialog box, select the appropriate user
account or group, and then click OK. Repeat this step for all users or groups that
you are adding.
6. Click OK.
7. In the Security tab, shown in Figure 12-2, select a user account or group, and then
do one of the following:
❑
Select the permissions in the bottom part of the dialog box that you want to
assign.
❑
Click Advanced and assign additional print permissions that do not fit into the
predefined permissions in the Security tab, and then click OK.
The bottom part of the dialog box shows the permissions granted to the user or
group selected in the upper part.
8. Click OK to close the Properties dialog box.
F12us02
Figure 12-2 Assign print permissions on the Security tab of a printer’s Properties dialog box.
To Modify Print Permissions
You can change the default print permissions that Windows XP Professional assigned
or that you previously assigned for any user or group.
Lesson 1
Introduction to Printer Administration
12-7
To modify print permissions, complete the following steps:
1. In the Printers And Faxes window, right-click the appropriate printer icon, and
then click Properties.
2. In the Properties dialog box for the printer, on the Security tab, select the appropriate user account or group, and then do one of the following:
❑
Select the permissions that you want to change for the user or group.
❑
Click Advanced to modify additional print permissions that do not fit into the
predefined permissions in the Security tab.
3. Click OK.
Real World Encouraging Expert Users
In just about any size organization or department, you are likely to find users who
are more interested in computing than others, and you should take advantage of
these users when you find them. In larger companies in particular, users within a
department often have a better understanding of how the people in the department
use printing resources than the IT support staff. At the least, you should encourage
these people to participate when planning the location and access of printing
resources. You might also find that some users are willing to manage documents, or
even manage printers and use IT support as a backup. This practice offloads some
of the administrative overhead and can result in more efficient use of resources.
Practice: Changing the Default Permissions on a Printer
In this practice, you will change the default permissions on the HP Color LaserJet 4550 PS
printer that you installed in Chapter 11. If you have not yet installed that printer, follow
the instructions in Chapter 11 to install the printer before continuing with this practice.
Complete the following steps.
1. Click Start, and then click Printers And Faxes.
2. In the Printer And Faxes window, right-click the HP Color LaserJet 4550 PS printer
and click Properties.
3. In the HP Color LaserJet 4550 PS Properties dialog box, on the Security tab, in the
Group Or User Names list, click Everyone, and then click Remove.
4. Click Add.
5. In the Select Users Or Groups dialog box, click Advanced.
6. In the Select Users Or Groups dialog box, click Find Now.
12-8
Chapter 12
Managing Printers and Documents
7. In the list of Names that appears, click Users and then click OK. Click OK again to
close the Select Users Or Groups dialog box.
8. In the HP Color LaserJet 4550 PS Properties dialog box, in the Group Or User
Names list, click Users. Make sure that the Users group is assigned only the Print
permission.
9. Click OK.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What are the four major types of tasks involved with administering network printers?
2. Windows XP Professional allows you to control printer usage and administration
by assigning _________________. Fill in the blank.
3. Which level of print permissions provided by Windows XP Professional grants
users the ability to perform the most printing tasks? Choose the correct answer.
a. Manage Printers
b. Manage Documents
c. Print
d. Full Control
4. Which Windows XP Professional print permission allows users to pause, resume,
restart, and cancel all other users’ documents? Choose all that apply.
a. Print
b. Manage Printers
c. Full Control
d. Manage Documents
Lesson 1
Introduction to Printer Administration
12-9
Lesson Summary
■
Printer management involves assigning forms to paper trays, setting separator
pages, redirecting documents, and taking ownership of printers.
■
Document management involves pausing and resuming documents, configuring
notifications, and deleting documents from the print queue.
■
Troubleshooting printers involves identifying and resolving printer problems such
as offline printers, printers that are out of paper or ink, printers that are incorrectly
configured, and situations in which users are not using a printer properly.
■
You can gain access to printers for administration by using the Printers And Faxes
window accessed through Control Panel.
■
Windows XP Professional allows you to control printer usage and administration
by assigning permissions.
12-10
Chapter 12
Managing Printers and Documents
Lesson 2: Managing Printers
Managing printers includes assigning forms to paper trays and setting a separator page.
In addition, you can pause a printer so that it does not try to print documents while
you troubleshoot or make configuration changes. If a printer is faulty, or if you add
printers to your network, you might need to redirect documents to a different printer.
You might also need to change which users have administrative responsibility for printers, which involves changing ownership.
After this lesson, you will be able to
■ Assign forms to paper trays.
■ Set a separator page.
■ Pause and resume a printer, and cancel all documents on a printer.
■ Redirect documents to a different printer.
■ Select a different print processor.
■ Adjust print spooling settings.
■ Take ownership of a printer.
Estimated lesson time: 40 minutes
How to Assign Forms to Paper Trays
If a printer has multiple trays that regularly hold different paper sizes, you can assign
a form to a specific tray. A form defines a paper size. Users can then select the paper
size from within their application. When the user prints, Windows XP Professional
automatically selects the paper tray that holds the correct form. Examples of forms
include the following: Legal, A4, Envelopes #10, and Letter Small.
To assign a form to a paper tray, complete the following steps:
1. Click Start, and then click Printers And Faxes.
2. In the Printers And Faxes window, right-click the icon of the appropriate printer,
and then click Properties.
3. In the printer’s Properties dialog box, on the Device Settings tab, in the box next
to each paper tray, click the form for the paper type for the tray, as shown in Figure 12-3.
4. Click OK.
Lesson 2
Managing Printers 12-11
F12us03
Figure 12-3 Set forms for a printer to make paper selection automatic.
After you have set up a paper tray, users specify the paper size from within applications. Windows XP Professional knows in which paper tray the form is located.
How to Set Up a Separator Page
This section explains what a separator page is, describes its functions, lists separator
page files included in Windows XP Professional, and then describes how to set up a
separator page.
What Is a Separator Page?
A separator page is a file that contains print device commands. Separator pages have
two functions:
■
To identify and separate printed documents, making it easier for users to find their
documents on printers used by more than one person.
■
To switch a printer to a different print mode. Some printers support different print
modes that take advantage of different device features. You can use separator
pages to specify the correct page description language. For example, you can
specify PostScript or Printer Control Language (PCL) for a printer that can switch
between different print modes but cannot automatically detect which language a
print job uses.
Separator Page Files Included in Windows XP Professional
Windows XP Professional includes four separator page files, which are located in the
%systemroot%\System32 folder. Table 12-2 lists the file name and describes the function for each of the included separator page files.
12-12
!
Chapter 12
Managing Printers and Documents
Table 12-2
Separator Page Files
File Name
Function
Sysprint.sep
Prints a page before each document; compatible with PostScript print devices
Pcl.sep
Switches the print mode to PCL for HP-series print devices and prints a page
before each document
Pscript.sep
Switches the print mode to PostScript for HP-series print devices but does not
print a page before each document
Sysprtj.sep
A version of SYSPRINT.SEP that uses Japanese characters
Exam Tip
Separator pages identify and separate print jobs, and can also be used to switch
a printer to a different print mode. Windows XP includes four separator pages: sysprint.sep,
pcl.sep, pscript.sep, and sysprtj.sep. Sysprint.sep is the most commonly used page.
To Set Up a Separator Page
When you have decided to use a separator page and have chosen an appropriate one,
use the Advanced tab in the printer’s Properties dialog box to have the separator page
printed at the beginning of each print job.
To set up a separator page, complete the following steps:
1. In the Properties dialog box for the printer, on the Advanced tab (see Figure 12-4),
click Separator Page.
F12us04
Figure 12-4
dialog box.
Configure a separator page by using the Advanced tab of a printer’s Properties
2. In the Separator Page dialog box, type the name of or browse for the separator
page file.
Lesson 2
Managing Printers 12-13
3. Click OK to close the Separator Page box, and then click OK again to close the
printer’s Properties dialog box.
How to Pause a Printer and Cancel Documents
Pausing and resuming a printer or canceling all documents on a printer might be necessary if there is a printing problem. To pause or cancel all documents, right-click the
icon for the printer in the Printers And Faxes window, and then click the appropriate
command. To resume printing on a printer, right-click the printer and click Resume
Printing.
Table 12-3 describes the tasks that you might perform when you manage printers, lists
how to perform the tasks, and gives examples of situations in which you might perform these tasks.
Table 12-3
Managing Printer Tasks
Task
Action
Example
To pause printing
Click Pause Printing. The Pause
Printing command changes to
Resume Printing.
Pause the printer if there is a
problem with the printer until
you fix the problem.
To resume printing
Click Resume Printing. The Resume Resume printing after you fix a
problem with a printer.
Printing command changes to
Pause Printing.
To cancel all
documents
Click Cancel All Documents. All
documents are deleted from the
printer.
Cancel all documents when you
need to clear a print queue after
old documents that no longer
need to print have accumulated.
Tip
You can also pause a printer by taking the printer offline. To take a printer offline, open
the printer window, and on the Printer menu, click Use Printer Offline.
How to Redirect Documents to a Different Printer
You can redirect documents to a different printer. For example, if a printer is not working, you should redirect the documents so that users do not need to resubmit them.
You can redirect all print jobs for a printer, but you cannot redirect specific documents.
The new printer must use the same printer driver as the current printer.
To redirect documents to a different printer, complete the following steps:
1. Open the Printers And Faxes window, right-click the printer, and then click Properties.
2. In the Properties dialog box, on the Ports tab, click the Add Port button.
12-14
Chapter 12
Managing Printers and Documents
3. In the Available Port Types list, click Local Port, and then click the New Port button.
4. In the Port Name dialog box, in the Enter A Port Name text box, type the Universal
Naming Convention (UNC) name for the printer to which you are redirecting documents (for example, \\prntsrv6\HPCLJ4550), as shown in Figure 12-5.
F12us05
Figure 12-5
Redirect documents to another printer so users do not have to print again.
5. Click OK to accept the change and close the Port Name dialog box.
6. Click Close to close the Printer Ports dialog box.
7. Click OK to close the printer’s Properties dialog box.
If another printer is available for the current print server, you can redirect the documents to that printer. To redirect documents to another local or network printer that
uses the same printer driver, select the appropriate port on the print server and cancel
the selection of the current port.
!
Exam Tip
Remember that you can redirect all documents for a printer, but not individual
documents. Also, the new printer must use the same printer driver as the current printer.
Formats Supported by the WinPrint Print Processor
The print processor is software that is responsible for processing print documents into
a format that is suitable to be sent to the printer, and Windows XP contains only the WinPrint processor by default. The default print processor and data types are suitable for the
vast majority of printing, and you should not change them unless you have an application that specifies the need for a different print processor or additional data type.
The WinPrint print processor supports the following formats:
RAW RAW is a common data type for clients other than Windows. When using the
RAW format, the spooler does not modify the print data; data is sent directly to the
printer for processing. There are two additional versions of RAW:
❑
RAW [FF appended] is the same as the RAW format, except that a form feed
character is appended to the end of each print job, which is necessary for certain types of printers.
❑
RAW [FF auto] works like RAW [FF appended], except that the processor
checks to see if there is a form feed character at the end of a document and
if there is not one already, the processor adds one.
Lesson 2
Managing Printers 12-15
EMF Enhanced Metafile (EMF) is the default format used by WinPrint. The instructions for the print job are assembled on the client computer that prints the document when the spooler processes the print job.
Text Text is a standard ANSI text format that prints using only the printer’s default
font.
How to Configure Spooling Options
Spooling is the process of saving a print job to the hard disk before sending it to the
printer. The process increases user productivity because after the job has been
spooled, the application is released, and the user can continue working while the
printing process continues in the background. Print spooling also ensures that print
jobs will be saved in the event of a computer, application, or printer failure. In addition, when a client is printing to a printer on the network, print spooling also manages
the routing of the print job from the client to the appropriate print server.
On the Advanced tab of a printer’s Properties dialog box, select the Spool Print Documents So The Program Finishes Printing Faster option to enable printer spooling. Select
the Print Directly To The Printer option to disable spooling. If spooling is enabled, you
need to decide whether you want the document to be spooled in its entirety before printing (the best option for remote printers) or to start printing immediately upon receiving
the first page (the best option for local printers).
How to Move the Print Spool Folder
Windows XP uses the spool folder to store print jobs while they are waiting to be
sent to the printer. By default, Windows stores this file on the same partition as the
Windows system files, in %systemroot%\System32\spool\PRINTERS. Moving the
print spool folder to a partition different from the system partition increases free
space on the system partition.
To move the print spool folder, follow these steps:
1. From the Start menu, click Printers And Faxes.
2. In the Printers And Faxes window, click the File menu, and then click Server
Properties.
3. In the Print Server Properties dialog box, on the Advanced tab, in the Spool
Folder text box, type a new location for the print spool folder. This location
should be on a different partition from the Windows system files.
4. Click OK.
12-16
Chapter 12
Managing Printers and Documents
How to Take Ownership of a Printer
There might be times when the owner of a printer can no longer manage that printer
and you need to take ownership. Taking ownership of a printer enables you to change
administrative responsibility for it. By default, the user who installed the printer owns
it. If that user can no longer administer the printer, you should take ownership of it—
for example, if the current owner leaves the company.
This section describes which users can take ownership of a printer and then explains
how to do it.
Users Who Can Take Ownership of a Printer
The following users can take ownership of a printer:
■
A user or a member of a group who has the Manage Printers permission for the
printer.
■
Members of the Administrators and Power Users groups. By default, these groups
have the Manage Printers permission, which allows them to take ownership.
To Take Ownership of a Printer
To take ownership of a printer, complete the following steps:
1. In the Properties dialog box for the printer, on the Security tab, click Advanced.
2. In the Advanced Security Settings dialog box, on the Owner tab, click your user
account under Change Owner To, as shown in Figure 12-6.
F12us06
Figure 12-6
printer.
Take ownership of a printer when the current owner no longer manages the
Lesson 2
Managing Printers 12-17
3. Click OK to change ownership and to close the Advanced Security Settings dialog
box.
4. Click OK to close the Properties dialog box for the printer.
Practice: Managing Printers
In this practice, you perform three tasks that are part of managing printers. In the first
exercise, you assign forms to paper trays. In the second exercise, you set up a separator page. In the third exercise, you learn how to take ownership of a printer. Complete
the following exercises.
Exercise 1: Assigning Forms to Paper Trays
In this exercise, you assign a paper type (form) to a paper tray so that when users
print to a specified form, the print job is automatically routed to and adjusted for the
correct tray.
1. Log on with the user account you used to create the HP Color LaserJet 4550 PS
printer in Chapter 11 or with any user account that is a member of the Administrators group.
2. Click Start, and then click Printers And Faxes.
3. Right-click the HP Color LaserJet 4550 PS printer, and then click Properties.
4. In the HP Color LaserJet 4550 PS Properties dialog box, on the Device Settings tab,
click Tray 2, and then select Legal.
5. Click Apply and leave the HP Color LaserJet 4550 PS Properties dialog box open
for the next exercise.
Exercise 2: Setting Up Separator Pages
In this exercise, you set up a separator page to print between documents. You use the
Sysprint.sep separator page that ships with Windows XP Professional. This separator
page includes the user’s name and the date and time the document was printed.
1. On the Advanced tab of the HP Color LaserJet 4550 PS Properties dialog box, click
Separator Page.
2. In the Separator Page dialog box, click Browse.
3. Windows XP Professional displays a Separator Page dialog box that lists the contents of the System32 folder, which contains the separator pages that ship with
Windows XP Professional. This dialog box also allows you to search in additional
folders. Select Sysprint.sep, and then click Open.
4. Click OK. Windows XP Professional is now set to print a separator page between
print jobs.
5. Leave the Properties dialog box open for the next exercise.
12-18
Chapter 12
Managing Printers and Documents
Exercise 3: Taking Ownership of a Printer
In this exercise, you practice taking ownership of a printer.
1. On the Security tab of the Properties dialog box, click Advanced.
2. In the Advanced Security Settings For HP Color LaserJet 4550 dialog box, on the
Owner tab, in the Change Owner To list, click Administrators to become the
owner of the printer.
3. If you actually wanted to take ownership, you would click Apply, but for the purposes of this exercise, click Cancel and leave the ownership unchanged.
4. Click OK to close the Properties dialog box.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. If a printer has multiple trays that regularly hold different paper sizes, you can
assign a form to a specific tray. How do you assign a form to a paper tray?
2. A(n) _______________________ is a file that contains print device commands that
identify and separate printed documents. Fill in the blank.
3. Which of the following tabs do you use to redirect documents to a different
printer? Choose the correct answer.
a. Advanced tab of the Properties dialog box for the printer
b. Security tab of the Properties dialog box for the printer
c. Ports tab of the Properties dialog box for the printer
d. Device Settings tab of the Properties dialog box for the printer
4. Which of the following tabs do you use to take ownership of a printer? Choose the
correct answer.
a. Advanced tab of the Properties dialog box for the printer
b. Security tab of the Properties dialog box for the printer
c. Ports tab of the Properties dialog box for the printer
d. Permissions tab of the Properties dialog box for the printer
Lesson 2
Managing Printers 12-19
Lesson Summary
■
If a printer has multiple trays that regularly hold different paper sizes, you can
assign a form to a specific tray. A form defines a paper size.
■
A separator page is a file that contains print device commands. Separator pages
identify and separate printed documents, and they can be used to switch print
devices between print modes.
■
To pause a printer, cancel all documents, or to resume a paused printer, right-click
the icon for the printer in the Printers And Faxes window and then click the
appropriate command.
■
You can redirect all print jobs for a printer to a different printer that uses the same
printer driver. You cannot redirect specific documents in the print queue.
■
The print processor prepares a document for printing before it sends the document to the printer. The WinPrint processor is shipped with Windows and supports the following formats: RAW, EMF, and Text.
■
By default, print jobs are spooled to disk before the print processor sends them to
the printer. This allows users to access their applications again more quickly.
■
To take ownership of a printer, a user must have or be a member of a group that
has the Manage Printers permission for the printer. By default, members of the
Administrators and Power Users groups have the Manage Printers permission.
12-20
Chapter 12
Managing Printers and Documents
Lesson 3: Managing Documents
In addition to managing printers, you can use Windows XP Professional to manage documents that are in a printer’s print queue waiting to be printed. Managing documents
includes pausing, resuming, restarting, and canceling documents. In addition, you can
set users to be notified when a print job is finished, a priority that allows a critical document to print before other documents, and a specific time for a document to print.
After this lesson, you will be able to
■ Pause, resume, restart, and cancel the printing of a document.
■ Set a notification, priority, and printing time.
Estimated lesson time: 20 minutes
How to Pause, Restart, and Cancel a Document
If a printer problem occurs during the printing of a document, you can pause that document while you resolve the problem and then resume printing. If you suspect that the
printing problem is related to the document itself, you can restart or cancel the printing
of the document. You must have the Manage Documents permission for the appropriate printer to perform these actions. Because the creator of a document has the default
permissions to manage that document, users can perform any of these actions on their
own documents.
To manage a document, right-click the icon representing the printer for the document
in the Printers And Faxes window, and then click Open. Select the appropriate documents; click the Document menu; and then click the appropriate command to pause,
resume, and restart from the beginning, or cancel a document, as shown in Figure 12-7.
F12us07
Figure 12-7
Manage documents by opening the print queue window.
Lesson 3
Managing Documents 12-21
Table 12-4 describes the tasks that you might perform when you manage individual
documents, how to perform the tasks, and examples of situations in which you might
perform them.
Table 12-4
Document Management Tasks
Task
Action
Example
To pause printing of a Select the documents for which you Pause printing of a document
document
want to pause printing, and then
when there is a problem with the
click Pause. (The status changes to document.
Paused.)
To resume printing a
document
Select the documents for which you Resume printing of the docuwant to resume printing, and then ment after you fix the problem
click Resume. (The status changes with the paused document.
to Printing.)
To restart printing a
document
Select the documents for which you
want to restart printing, and then
click Restart. Restart causes printing
to start from the beginning of the
document.
Restart printing of a partially
printed document after you fix a
problem with the document or
the print device.
To cancel printing a
document
Select the documents for which you
want to cancel printing, and then
click Cancel. You can also cancel a
document by pressing the DELETE
key.
When a document has the wrong
printer settings or is no longer
needed, you can cancel it so it is
deleted before it prints.
How to Set Notification, Priority, and Printing Time
You can control print jobs by setting the notification, priority, and printing time. To
perform these document management tasks, you must have the Manage Documents
permission for the appropriate printer.
You can set the notification, priority, and printing time for a document in the General tab
of the Properties dialog box for the document, as shown in Figure 12-8. To open the Properties dialog box for one or more documents, first select the documents in the Printer window, click Document on the Printer window menu bar, and then click Properties.
12-22
Chapter 12
Managing Printers and Documents
F12us08
Figure 12-8
Set notification, priority, and printing time for a document.
Table 12-5 describes the tasks that you might perform when you control print jobs,
how to perform the tasks, and examples of situations in which you might perform
them.
Table 12-5
Setting a Notification, Changing Priority, and Scheduling Print Times
Task
Action
Example
Set a notification
In the Notify text box, type the logon
name of the user who should receive
the notification. By default, Windows XP Professional enters the
name of the user who printed the
document.
Change the print notification when
someone other than the user who
printed the document needs to
retrieve it.
Change a document priority
Move the Priority slider to the priority Change a priority so that a critical
level that you want. The highest pri- document prints before other documents.
ority is 99, and the lowest is 1.
Schedule print
times
To restrict print times, select Only
From in the Schedule section, and
then set the hours between which
you want the document to print.
Set the print time for a large document so that it prints during offhours, such as late at night.
Practice: Managing Documents
In this practice, you manage documents by printing a document, setting a notification
for a document, changing the priority for a document, and then canceling a document.
Complete the following exercises, and answer any questions that are asked. You can
find answers to these questions in the “Questions and Answers” section at the end of
this chapter. To complete this practice, you must have completed the exercises in
Chapter 11.
Lesson 3
Managing Documents 12-23
Exercise 1: Verifying that a Printer is Offline
1. Log on with the user account you used to create the HP Color LaserJet 4550 PS
printer in Chapter 11 or with any user account that is a member of the Administrators group.
2. Click Start, and then click Printers And Faxes.
3. In the Printers And Faxes window, click the HP Color LaserJet 4550 PS printer
icon. Do one of the following to verify that the printer is offline:
❑
On the File menu, verify that the Use Printer Online option is listed because
that indicates that the printer is currently offline.
❑
Right-click the printer icon and verify that the Use Printer Online command is
listed because that indicates that the printer is currently offline.
❑
If the Printers And Faxes window is displayed in Web view, verify that Use
Printer Offline is displayed in the left portion of the window.
4. Verify that a check mark appears above the printer icon indicating that it is the
default printer.
5. Minimize the Printers And Faxes window.
Note
Keep the printer offline so that documents enter the print queue, but are not sent to
the printer. This eliminates error messages in later exercises.
Exercise 2: Printing a Document
1. Click Start, point to All Programs, point to Accessories, and then click WordPad.
2. Type How big is big?, and then, on the File menu, click Save.
3. In the File Name text box, type big.rtf, and then click Save.
4. Click File, and then click Print.
5. In the Print dialog box, make sure that the file will be printed on the HP Color
LaserJet 4550 PS printer. Click Print, and then close WordPad.
Exercise 3: Setting a Notification
1. Restore the Printers And Faxes window that you minimized in Exercise 1.
2. Double-click HP Color LaserJet 4550 PS.
3. In the printer window, click the big document. On the Document menu, click
Properties.
Windows XP Professional displays the BIG Document Properties dialog box with
the General tab active.
12-24
Chapter 12
Managing Printers and Documents
4. Which user is specified in the Notify text box? Why?
5. In the Notify text box, type Fred, and then click Apply.
Exercise 4: Increasing the Priority of a Document
1. In the big.rtf Document Properties dialog box, on the General tab, notice the default
priority.
2. What is the current priority? Is it the lowest or highest priority?
3. Move the Priority slider to the right to increase the priority of the document to 38,
and then click OK.
Exercise 5: Canceling a Document
1. In the Printer window, select the big document.
2. On the Document menu, click Cancel.
3. In the Printers dialog box, click Yes to confirm the cancellation.
The big document is removed from the document list.
4. Notice that for larger documents, you might see the document status change to
Deleting for a period before the document is removed from the list.
Note
You can also cancel a document by selecting the document and pressing the DELETE key.
5. Close the Printer window, and then close the Printers And Faxes window.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What is the difference between resuming printing of a document and restarting
printing of a document?
Lesson 3
Managing Documents 12-25
2. Which of the following statements about the range of priorities for a document to
be printed is correct? Choose the correct answer.
a. Priorities for a document range from 1 to 10, with 1 being the highest priority.
b. Priorities for a document range from 1 to 10, with 10 being the highest priority.
c. Priorities for a document range from 1 to 99, with 1 being the highest priority.
d. Priorities for a document range from 1 to 99, with 99 being the highest priority.
3. You set the notification, priority, and printing time for a document on the
______________ tab of the Properties dialog box for the document. Fill in the
blank.
4. By default, Windows XP Professional enters which of the following user accounts
in the Notify text box of a document?
a. Administrator
b. Owner of the printer
c. All users with the Manage Documents permissions
d. Person who printed the document
Lesson Summary
■
Managing documents includes pausing, resuming, restarting, and canceling documents. You must have the Manage Documents permission for the appropriate
printer to perform these document-management tasks. The creator of a document
has the default permissions to manage that document, so users can perform any of
these actions on their own documents.
■
In the Notify text box for a document, you can set who is notified when the print
job is finished. Setting the document priority allows a critical document to print
before other documents. Setting a specific time for a document to print allows
large documents to print only during off-hours, such as late at night.
12-26
Chapter 12
Managing Printers and Documents
Lesson 4: Administering Printers by Using a Web Browser
You can use Windows XP Professional to manage printers from any computer running
a Web browser, regardless of whether the computer is running Windows XP Professional or has the correct printer driver installed. To access a printer using a Web
browser, a print server running Windows 2000 Server or Windows XP Professional
must have Microsoft Internet Information Services (IIS) installed. All management tasks
that you perform with Windows XP Professional management tools are the same when
you use a Web browser. The only difference in administering with a Web browser is
the interface, which is a Web-based interface.
See Also
For information about installing IIS, see Chapter 5, “Configuring Windows XP Pro-
fessional.”
After this lesson, you will be able to
■ Describe the advantages of administering printers using a Web browser.
■ Administer printers using a Web browser.
Estimated lesson time: 5 minutes
The Advantages of Using a Web Browser to Manage Printers
The following are the advantages of using a Web browser, such as Microsoft Internet
Explorer, to manage printers:
■
You can administer printers from any computer with a Web browser, regardless of
whether the computer is running Windows XP Professional or has the correct
printer driver installed.
■
You can customize the Web interface. For example, you can create your own Web
page containing a floor plan with the locations of the printers and the links to the
printers.
■
You can view a summary page that lists the status of all printers on a print server.
■
You can view real-time print device data, such as whether the print device is in
power-saving mode, if the printer driver makes such information available. This
information is not available in the Printers And Faxes window.
How to Access Printers Using a Web Browser
You can access all printers on a print server by using a Web browser or you can use
any of the windows or folders within the Windows XP Professional interface that has
an address bar, such as the Printers And Faxes window or Internet Explorer. In the
Lesson 4
Administering Printers by Using a Web Browser 12-27
Address text box, type http://print_server_name/printers. This command displays
a page listing all the printers on the print server, as shown in Figure 12-9. Click the
name of the printer that you want to use. When you are on that printer’s page, under
Printer Actions, click Connect to connect to the printer. Windows XP automatically
copies the appropriate printer drivers to your computer and adds an icon for the
printer to the Printers And Faxes window.
F12us09
Figure 12-9
Manage printers remotely using Internet Explorer.
If you want to gain access to a specific printer by using a Web browser, open the Web
browser, and then in the Address text box, type http://server_name/
printer_share_name. You are directed to that printer’s page. Under Printer Actions,
click Connect to connect to the printer.
From the printer’s URL page, you can view information about the printer, such as its
model, its location, and the number of documents waiting to print. You can manage
any document you have sent to the printer, and if you have the Manage Printers permission for the printer, you can also pause or resume operation of the printer.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. If you are using a computer running Windows XP Professional as your print
server, users can gain access to the printers on it by using a Web browser only if
the print server has ________________________________ installed. Fill in the
blank.
12-28
Chapter 12
Managing Printers and Documents
2. How can you gain access to all printers on a print server?
3. Can you pause and resume operation of a printer that you have used Internet
Explorer to connect to?
Lesson Summary
■
■
The advantages of managing printers from a Web browser are:
❑
It does not matter whether the print server is running Windows XP Professional.
❑
All management tasks that you perform with Windows XP Professional management tools are the same when you use a Web browser.
❑
You can customize the Web interface.
❑
You can view a summary page and real-time device information.
You can access all printers on a print server running IIS by typing http://
print_server_name/printers. You can access a particular printer by typing
http://print_server_name/printer_share_name.
Lesson 5
Troubleshooting Common Printing Problems 12-29
Lesson 5: Troubleshooting Common Printing Problems
In this lesson, you will learn about some common printing problems and how to troubleshoot them. This chapter also shows you to how to troubleshoot printer and document problems by using the built-in Printing Troubleshooter, which was introduced in
Chapter 11.
After this lesson, you will be able to
■ Examine a printing problem and know the appropriate troubleshooting questions to ask.
■ Identify and solve common printing problems.
■ Solve printing problems using the Printing Troubleshooter in Windows XP Professional.
Estimated lesson time: 10 minutes
ESTIMATED LESSON TIME: 10 MINUTES
Guidelines for Examining a Printing Problem
When you detect a printing problem, always verify that the printer is plugged in,
turned on, and connected to the print server. For a network interface printer, verify that
there is a network connection between the printer and the print server.
To determine the cause of a problem, first try printing from a different program to verify that the problem is with the printer, not with the program. If the problem is with the
printer, ask the following questions:
■
Can other users print normally? If so, the problem is most likely caused by insufficient permissions, no network connection, or client computer problems.
■
Does the print server use the correct printer driver for the printer? If not, you
should install the appropriate printer driver.
■
Is the print server operational, and is there enough disk space for spooling?
■
Does the client computer have the correct printer driver?
Solutions to Common Printing Problems
There are some printing problems that are common to most network printing environments. Table 12-6 describes some of these common printing problems, as well as some
possible causes and solutions.
12-30
Chapter 12
Managing Printers and Documents
Table 12-6
Common Printing Problems, Causes, and Solutions
Problem
Possible Cause
Solution
A user receives an Access
Denied message when trying
to configure a printer from an
application (for example,
from earlier versions of
Microsoft Excel).
The user does not have
the appropriate permission
to change printer
configurations.
Change the user’s permission
or configure the printer for
the user.
The document does not print
completely or comes out garbled.
The printer driver is incorrect Install the correct printer
(if it is the first time you have driver.
used the printer since installation or updating the driver).
A user has changed the
printer configuration or
placed the printer into a
separate mode.
Cancel the print job, reset the
printer, and resubmit the print
job.
Pages print only partially.
The printer is out of ink or
toner, or the print server is
low on memory. If specific
parts of a page do not print
and those parts are the same
each time you print, the
printer may not be able to
print a particular font, or the
margins of the document may
be outside the printable
range.
Replace the ink or toner cartridge. Check the memory on
the print server. Change the
font in a document or adjust
the margins of the document.
The hard disk starts working
too hard, the document does
not reach the print server, or
printing is very slow.
There is insufficient hard disk Create more free space on the
space for spooling.
hard disk, or move the print
spool folder to a different
partition.
There is a problem printing
graphics.
EMF format can occasionally
cause problems with printing,
especially with the printing
of graphics.
Consider disabling EMF
spooling on the Advanced tab
of the printer’s Properties dialog box by clearing the
Enable Advanced Printing
Features check box.
Lesson 5
Troubleshooting Common Printing Problems 12-31
How to Solve Printing Problems Using the Windows XP Professional
Printing Troubleshooter
Windows XP Professional has a built-in troubleshooter to help you resolve your printing problems. For example, in the Printers And Faxes window, you can click Troubleshoot Printing.
When you click Troubleshoot Printing, Windows XP Professional presents you with a
series of potential printing problems. After you make a selection from the list of potential problems and click Next, the troubleshooter takes you through a series of suggestions and questions to help you resolve the problem. You can also perform a search to
help resolve your problem or you can select the I Want The Troubleshooter To Investigate Settings On This Computer option.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. When you detect a printing problem, what three things should you always check
before you start troubleshooting the problem?
2. If a user reports to you that he or she cannot print, what are some of the areas you
should check?
Lesson Summary
■
When there is a printing problem, always verify that the printer is plugged in,
turned on, and connected to the print server. For a network interface print device,
verify that there is a network connection between the printer and the print server.
Ask questions to help determine whether the problem is with the application, the
document, or the printer.
12-32
Chapter 12
Managing Printers and Documents
■
There are a number of common printing problems that you should know how to
solve, including problems arising from printer configuration, printer drivers, and
print permissions.
■
You can access the Windows XP Professional built-in Printing Troubleshooter
from the Printers And Faxes window by clicking Troubleshoot Printing.
Case Scenario Exercise
In this exercise, you will read a scenario about a user who is trying to manage documents on a network printer, and then answer the questions that follow. If you have difficulty completing this work, review the material in this chapter before beginning the
next chapter. You can find answers to these questions in the “Questions and Answers”
section at the end of this chapter.
Scenario
You are working as an administrator for Fabrikam, Inc., a company that makes prebuilt
cabinetry that people can install in their own homes. Erin, a user from the Sales department, calls at 4:45 p.m. to tell you that one of the other people in her department has
printed a very long document to the department’s only color laser printer. The printer
is a network printer that is used by many people, and Erin does not think the long document has started printing yet.
Erin tells you that her manager, Jesper, has asked her to print several copies of an
important memo to distribute to other people in her department before 5:00 p.m. She
does not want to stop the long document from being printed because the person who
printed it has already left for the afternoon and will need the printed document in the
morning. Erin says that she has accessed the print server using her Web browser in the
past but cannot remember how she did it. You determine that the print server is named
SLS-PR1 and that the printer’s share name is ColorLaser.
Questions
1. What URL should Erin type into her Web browser to access the printer directly?
2. What action should Erin take to ensure that all printing on the printer stops while
she figures out what to do, but that no documents need to be reprinted?
3. What permission will Erin need to take this action?
Troubleshooting Lab 12-33
4. What action should Erin take to make sure that her document prints before the
long document?
5. How else could Erin handle this situation?
Troubleshooting Lab
In this lab, you will use the Printing Troubleshooter to simulate troubleshooting a printing
problem.
1. From the Start menu, click Control Panel.
2. In the Control Panel window, click Printers And Other Hardware.
3. In the Printers And Other Hardware window, in the Troubleshooters list, click
Printing.
4. In the Help And Support Center window, select Printed Text Or Graphics Are
Incomplete, and then click Next.
5. On the Are You Having Trouble Printing Text Or Graphics? page, click I Am Having Trouble With Graphics, and then click Next.
6. On the Are The Page Size And Orientation Settings Correct? page, you are asked,
“Does Adjusting Your Page Size And Orientation Settings Solve The Problem?”
Click No, My Page Size And Orientation Settings Are Correct, But Part Of My File
Still Does Not Print, and then click Next.
7. On the Are Your Printer Resolution Settings Correct? page, you are asked, “Does
Changing Your Printer Resolution Solve The Problem?” Click No, I Still Have A
Problem Printing Graphics, and then click Next.
8. On the Does The File Or Graphic That You Are Trying To Print Require Too Much
Memory? page, you are asked, “Does Freeing Memory On Your Computer Solve
The Problem?” Click No, I Still Have A Problem, and then click Next.
12-34
Chapter 12
Managing Printers and Documents
9. On the Does Your Printer Have Enough Memory? page, you are asked, “Do These
Suggestions Help You To Solve The Problem?” Click No, I Still Have A Problem,
and then click Next.
10. On the Is Your Graphic Damaged? page, you are asked, “Can You Print Your
Graphic In WordPad?” Click No, I Cannot Print My Graphic In WordPad, and then
click Next.
11. On the Is There A Problem With Your Printer Driver? page, you are asked, “Does
Reinstalling Or Updating Your Printer Driver Solve The Problem?” Click Yes, This
Solves The Problem, and then click Next.
12. Close Help And Support Center.
Chapter Summary
■
Printer management involves assigning forms to paper trays, setting separator
pages, redirecting documents, and taking ownership of printers. Document management involves pausing and resuming documents, configuring notifications, and
deleting documents from the print queue.
■
There are a number of tasks associated with managing printers, including the
following:
❑
If a printer has multiple trays that regularly hold different paper sizes, you can
assign a form to a specific tray. A form defines a paper size.
❑
A separator page is a file that contains print device commands. Separator
pages identify and separate printed documents, and they can be used to
switch print devices between print modes.
❑
To pause a printer, cancel all documents, or resume printing, right-click the
icon for the printer in the Printers And Faxes window, and then click the
appropriate command.
❑
You can redirect all print jobs for a printer to a different printer that uses the
same printer driver. You cannot redirect specific documents in the print queue.
❑
The print processor prepares a document for printing before it sends the document to the printer. The WinPrint processor is shipped with Windows and
supports the following formats: RAW, EMF, and Text.
❑
By default, print jobs are spooled to disk before the print processor sends them
to the printer. This allows users to access their applications again more quickly.
❑
To take ownership of a printer, a user must have or be a member of a group that
has the Manage Printers permission for the printer. By default, members of the
Administrators and Power Users groups have the Manage Printers permission.
Exam Highlights 12-35
■
Managing documents includes pausing, resuming, restarting, and canceling documents. You must have the Manage Documents permission for the appropriate
printer to perform these document management tasks. The creator of a document
has the default permissions to manage that document, so users can perform any of
these actions on their own documents.
■
You can also manage printers from a Web browser in Windows XP Professional.
The print server must be running IIS for Web management to work. You can
access all printers on a print server running IIS by typing http://
print_server_name/printers. You can access a particular printer by typing
http://print_server_name/printer_share_name.
■
When there is a printing problem, always verify that the printer is plugged in,
turned on, and connected to the print server. For a network interface print device,
verify that there is a network connection between the printer and the print server.
Ask questions that help determine whether the problem is with the application,
the document, or the printer.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
The general categories of print permissions are inclusive at progressive levels. The
Print permission offers the least number of rights, basically allowing users to print
to the printer and manage their own documents. The Manage Documents permission allows all the rights offered by the Print permission and also allows users to
manage other users’ documents. The Manage Printers permission includes all the
rights offered by the Manage Documents permission and allows users to configure
printer settings.
■
Separator pages identify and separate print jobs, and can also be used to switch a
printer to a different print mode. Windows XP includes four separator pages:
sysprint.sep, pcl.sep, pscript.sep, and sysprtj.sep. Sysprint.sep is the most commonly used separator page.
■
You can redirect all documents for a printer, but not individual documents. Also,
the new printer must use the same printer driver as the current printer.
12-36
Chapter 12
Managing Printers and Documents
Key Terms
print spooling The process of saving a print job to the hard disk before sending it
to the printer.
print permissions Permissions that enable you to control which users can access a
printer and which actions they can perform.
print processor Software that is responsible for processing print documents into a
format that is suitable to be sent to the printer. Windows XP contains only the WinPrint processor by default.
redirecting The process of sending a document to another printer. You can redirect
only all documents for a printer, not individual documents. Also, you can redirect
documents only to printers that use the same printer driver as the original printer.
separator page A file that contains print device commands. Separator pages identify
and separate print jobs and can also be used to switch a printer to a different print
mode.
Questions and Answers 12-37
Questions and Answers
Lesson 1 Review
Page
12-8
1. What are the four major types of tasks involved with administering network printers?
Managing printers, managing documents, troubleshooting printers, and performing tasks that
require the Manage Printers permission
2. Windows XP Professional allows you to control printer usage and administration
by assigning _________________. Fill in the blank.
permissions
3. Which level of print permissions provided by Windows XP Professional grants
users the ability to perform the most printing tasks? Choose the correct answer.
a. Manage Printers
b. Manage Documents
c. Print
d. Full Control
The correct answer is A. Granting the Manage Printers permission also allows users to manage
documents and print to the printer. B and C are not correct because these rights are included
in the Manage Printers permission. D is not correct because Full Control is not a permission
associated with printers.
4. Which Windows XP Professional print permission allows users to pause, resume,
restart, and cancel all other users’ documents? Choose all that apply.
a. Print
b. Manage Printers
c. Full Control
d. Manage Documents
The correct answers are B and D. Both the Manage Printers and Manage Documents permissions allow users to manage documents in the print queue. A is not correct because the Print
permission allows users to print to a printer and to manage their own documents, but not to
manage all documents in a printer queue. C is not correct because Full Control is not a permission associated with printers.
Lesson 2 Review
Page
12-18
1. If a printer has multiple trays that regularly hold different paper sizes, you can
assign a form to a specific tray. How do you assign a form to a paper tray?
In the Properties dialog box for the printer, click the Device Settings tab. In the box next to each
paper tray, select the form for the paper type you want to assign to that tray.
12-38
Chapter 12
Managing Printers and Documents
2. A(n) _______________________ is a file that contains print device commands that
identify and separate printed documents. Fill in the blank.
separator page
3. Which of the following tabs do you use to redirect documents to a different
printer? Choose the correct answer.
a. Advanced tab of the Properties dialog box for the printer
b. Security tab of the Properties dialog box for the printer
c. Ports tab of the Properties dialog box for the printer
d. Device Settings tab of the Properties dialog box for the printer
The correct answer is C. The Ports tab defines the port (or address) that the logical printer uses
to direct the document to the printer. A, B, and D are not correct because you do not use these
tabs to redirect documents.
4. Which of the following tabs do you use to take ownership of a printer? Choose the
correct answer.
a. Advanced tab of the Properties dialog box for the printer
b. Security tab of the Properties dialog box for the printer
c. Ports tab of the Properties dialog box for the printer
d. Permissions tab of the Properties dialog box for the printer
The correct answer is B. The Security tab defines the permissions associated with the printer,
so it is a logical place to change the owner of the printer. A, C, and D are not correct because
you do not use these tabs to take ownership of a printer.
Lesson 3 Practice: Exercise 3
Page
12-22
1. Which user is specified in the Notify text box? Why?
The user account that you are logged on with is specified because that is who created the print job.
Lesson 3 Practice: Exercise 4
2. What is the current priority? Is it the lowest or highest priority?
The current priority is 1, which is the lowest priority.
Lesson 3 Review
Page
12-24
1. What is the difference between resuming printing of a document and restarting
printing of a document?
When you restart a document, it begins printing again from the beginning of the document.
When you resume printing a document, it continues from where it left off printing.
Questions and Answers 12-39
2. Which of the following statements about the range of priorities for a document to
be printed is correct? Choose the correct answer.
a. Priorities for a document range from 1 to 10, with 1 being the highest priority.
b. Priorities for a document range from 1 to 10, with 10 being the highest priority.
c. Priorities for a document range from 1 to 99, with 1 being the highest priority.
d. Priorities for a document range from 1 to 99, with 99 being the highest priority.
The correct answer is D. You can set a priority from 1 to 99 for any document. 99 is the highest
priority; 1 is the lowest priority.
3. You set the notification, priority, and printing time for a document on the
____________ tab of the Properties dialog box for the document. Fill in the blank.
General
4. By default, Windows XP Professional enters which of the following user accounts
in the Notify text box of a document?
a. Administrator
b. Owner of the printer
c. All users with the Manage Documents permissions
d. Person who printed the document
The correct answer is D. By default, the person who printed the document is notified when the
document prints or fails to print.
Lesson 4 Review
Page
12-27
1. If you are using a computer running Windows XP Professional as your print
server, users can gain access to the printers on it by using a Web browser only if
the print server has ________________________________ installed. Fill in the
blank.
Internet Information Services (IIS)
2. How can you gain access to all printers on a print server?
In a Web browser or any of the windows or folders within the Windows XP Professional interface
that has an address bar, type http://print_server_name/printers.
3. Can you pause and resume operation of a printer that you have used Internet
Explorer to connect to?
Yes, if you have the Manage Printers permission for the printer, you can also pause or resume
operation of a printer that you used Internet Explorer to connect to.
12-40
Chapter 12
Managing Printers and Documents
Lesson 5 Review
Page
12-31
1. When you detect a printing problem, what three things should you always check
before you start troubleshooting the problem?
Always verify that the printer is plugged in, turned on, and connected to the print server or network.
2. If a user reports to you that he or she cannot print, what are some of the areas you
should check?
Answers may vary. Suggested questions to ask include the following: Can other users print normally? Is the print server operational, and is there enough disk space for spooling? Does the
client computer have the correct printer driver?
Case Scenario Exercise
Page
12-32
1. What URL should Erin type into her Web browser to access the printer directly?
http://SLS-PR1/ColorLaser
2. What action should Erin take to ensure that all printing on the printer stops while
she figures out what to do, but that no documents need to be reprinted?
She should either pause the printer or take it offline.
3. What permission will Erin need to take this action?
She will need the Manage Printer permission (or will need to be in a group that has that permission).
4. What action should Erin take to make sure that her document prints before the
long document?
She should first make sure that the long document has not started printing. She should then
open the Properties dialog box for her document and assign it a higher priority than the long
document. She should then resume the printer.
5. How else could Erin handle this situation?
Instead of pausing the printer itself, Erin could also pause the long document, which would
allow other documents (including hers) to continue printing. After her document printed, she
could resume printing of the long document. However, when talking a user through a situation
like this, it is usually easier to pause the printer while the user gets her bearings.
13 Supporting TCP/IP
Exam Objectives in this Chapter:
■
Configure and troubleshoot the TCP/IP protocol.
Why This Chapter Matters
A protocol is a set of rules and conventions for sending information over a network. Microsoft Windows XP Professional relies on the Transmission Control
Protocol/Internet Protocol (TCP/IP) for logon, file, and print services; network
and Internet access; and other common functions. This chapter presents the skills
and knowledge necessary to configure and troubleshoot TCP/IP. The chapter also
discusses Domain Name System (DNS), how Windows XP Professional performs
name resolution, and how to configure a computer running Windows XP Professional as a DNS client.
Lessons in this Chapter:
■
Lesson 1: Configuring and Troubleshooting TCP/IP . . . . . . . . . . . . . . . . . . .13-2
■
Lesson 2: Understanding the Domain Name System . . . . . . . . . . . . . . . . . . 13-26
■
Lesson 3: Overview of Name Resolution. . . . . . . . . . . . . . . . . . . . . . . . . . . 13-33
■
Lesson 4: Configuring a DNS Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-38
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have Windows XP Professional installed on a computer on which you can make changes.
13-1
13-2
Chapter 13
Supporting TCP/IP
Lesson 1: Configuring and Troubleshooting TCP/IP
On a TCP/IP network, each device (computer, router, or other device with a connection to the network) is referred to as a host. Each TCP/IP host is identified by a logical
IP address that identifies a computer’s location on the network in much the same way
as a street address identifies a house on a street. Microsoft’s implementation of TCP/IP
enables a TCP/IP host to use a static Internet Protocol (IP) address or to obtain an IP
address automatically from a Dynamic Host Configuration Protocol (DHCP) server.
For simple network configurations based on local area networks (LANs), Windows XP
also supports automatic assignment of IP addresses. Windows XP Professional includes
many tools that you can use to troubleshoot TCP/IP and test connectivity.
After this lesson, you will be able to
■ Explain the use of IP addresses.
■ Configure TCP/IP to use a static IP address.
■ Configure TCP/IP to obtain an IP address automatically.
■ Explain the use of Automatic Private IP Addressing.
■ Specify an alternate TCP/IP configuration for a computer running Windows XP Profes-
sional.
■ Use TCP/IP tools to troubleshoot a connection.
Estimated lesson time: 60 minutes
What Is an IP Address?
Every interface on a TCP/IP network is given a unique IP address that identifies it on
that network. IP handles this addressing, defining how the addresses are constructed
and how packets are routed using those addresses.
An IP address consists of a set of four numbers, each of which can range from 0 to 255.
Each of these numbers is separated from the others by a decimal point, so a typical IP
address in decimal form might look something like 192.168.1.102. The reason that each
number ranges only up to 255 is that each number is actually based on a binary octet,
or an eight-digit binary number. The IP address 192.168.1.102 represented in binary
form is 11000000 10101000 00000001 01100110. Computers work with the binary format, but it is much easier for people to work with the decimal representation.
An IP address consists of two distinct portions:
■
The network ID is a portion of the IP address starting from the left that identifies
the network segment on which a host is located. Using the example 192.168.1.102,
the portion 192.168.1 might be the network ID. When representing a network ID,
it is customary to fill in the missing octets with zeroes. So, the proper network ID
would be 192.168.1.0.
Lesson 1
■
Configuring and Troubleshooting TCP/IP
13-3
The host ID is the portion of the IP address that identifies a particular host on a
network segment. The host ID for each host must be unique within the network
ID. Continuing the example of the IP address 192.168.1.102 (where 192.168.1.0 is
the network ID), the host ID is 102.
Two computers with different network IDs can have the same host ID. However, the
combination of the network ID and the host ID must be unique to all computers in
communication with each other.
Hosts depend on a second number called a subnet mask to help determine which
portion of an IP address is the network ID and which portion is the host ID. The subnet
mask defines where the network ID stops and the host ID starts. It is easier to see why
this works if you step away from the decimal representation for a moment and look at
the numbers in their binary format.
Figure 13-1 depicts a single IP address shown in both decimal and binary format. A
subnet mask is also shown in both formats. In binary format, a subnet mask always
represents a string of unbroken ones followed by a string of unbroken zeroes. The
position of the change from ones to zeroes indicates the division of network ID and
host ID in an IP address.
Decimal
Binary
135.109.15.42
10000111 01101101 00001111 00101010
Subnet Mask
255.255.0.0
11111111 11111111 00000000 00000000
Network ID
135.109.0.0
10000111 01101101 00000000 00000000
0.0.15.42
00000000 00000000 00001111 00101010
IP Address
Host ID
F13us01
Figure 13-1
The subnet mask separates the host ID and the network ID.
Classful IP Addressing
IP addresses are organized into classes that help define the size of the network being
addressed, a system referred to as classful IP addressing. Five different classes of IP
addresses define different-sized networks that are capable of holding varying numbers
of hosts.
Classful IP addressing is based on the structure of the IP address and provides a systematic way to differentiate network IDs from host IDs. As you learned earlier, there
are four numerical segments of an IP address, ranging from 0 to 255. Here, those segments are represented as w.x.y.z. Based on the value of the first octet (w), IP addresses
are categorized into the five address classes listed in Table 13-1.
13-4
Chapter 13
Table 13-1
Supporting TCP/IP
IP Address Classes
Number of
Available Network Number of
Segments
Available Hosts
Subnet Mask
Class
Network ID
Range of
First Octet
A
w.0.0.0
1–126
126
16,777,214
255.0.0.0
B
w.x.0.0
128–191
16,384
65,534
255.255.0.0
C
w.x.y.0
192–223
2,097,152
254
255.255.255.0
D
N/A
224–239
N/A
N/A
N/A
E
N/A
240–255
N/A
N/A
N/A
Classes A, B, and C are available for registration by public organizations. Actually, most
of these addresses were snapped up long ago by major companies and Internet service
providers (ISPs), so the actual assignment of an IP address to your organization will
likely come from your chosen ISP. Classes D and E are reserved for special use.
The address class determines the subnet mask used, and therefore determines the division between the network ID and the host ID. For class A, the network ID is the first
octet in the IP address (for example, the 98 in the address 98.162.102.53 is the network
ID). For class B, it is the first two octets; and for class C, it is the first three octets. The
remaining octets not used by the network ID identify the host ID.
!
Exam Tip
Remember the IP address ranges that fall into each class and the default subnet mask for each class. This information not only helps to determine how a classful IP
addressing scheme will apply to a situation, but also how to customize a scheme using the
classless method (discussed next).
Classless Interdomain Routing (CIDR)
In the classful method of IP addressing, the number of networks and hosts available for
a specific address class is predetermined by the default subnet mask for the class. As a
result, an organization that is allocated a network ID has a single fixed network ID and
a specific number of hosts. With the single network ID, the organization can have only
one network connecting its allocated number of hosts. If the number of hosts is large,
the network cannot perform efficiently. To solve this problem, the concept of classless
interdomain routing (CIDR) was introduced.
CIDR allows a single classful network ID to be divided into smaller network IDs. The
idea is that you take the default subnet mask used for the class to which your IP
address range belongs, and then borrow some of the bits used for the host ID to use
as an extension to the network ID, creating a custom subnet mask.
Lesson 1
Configuring and Troubleshooting TCP/IP
13-5
A custom subnet mask is not restricted by the same rules used in the classful method.
Remember that a subnet mask consists of a set of four numbers, similar to an IP
address. Consider the default subnet mask for a class B network (255.255.0.0), which
in binary format would be the following:
11111111 11111111 00000000 00000000
This mask specifies that the first 16 bits of an IP address are to be used for the network
ID and the second 16 bits are to be used for the host ID. To create a custom subnet
mask, you would just extend the mask into the host ID portion. However, you must
extend this by adding ones from left to right. Remember that a subnet mask must be an
unbroken string of ones followed by an unbroken string of zeroes. For example, a custom subnet mask might look like this:
11111111 11111111 11111000 00000000
The value 11111000 in decimal format would be 248, making this IP address
255.255.248.0. Table 13-2 shows the possible values for an octet in a custom subnet
mask.
Table 13-2
Custom Subnet Mask Values
Binary Value
Decimal Value
10000000
128
11000000
192
11100000
224
11110000
240
11111000
248
11111100
252
11111110
254
In the classful method, each of the four numbers in a subnet mask can be only the
maximum value 255 or the minimum value 0. The four numbers are then arranged as
contiguous octets of 255, followed by contiguous octets of 0. For example, 255.255.0.0
is a valid subnet mask, whereas 255.0.255.0 is not. The 255 octets identify the network
ID, and the 0 octets identify the host ID. For example, the subnet mask 255.255.0.0
identifies the network ID as the first two numbers in the IP address.
When subnetting an existing network ID to create additional subnets, you can use any
of the preceding subnet masks with any IP address or network ID. So the IP address
184.12.102.20 could have the subnet mask 255.255.255.0 and network ID 184.12.102.0,
as opposed to the default subnet mask 255.255.0.0 with the network ID 184.12.0.0. This
allows an organization to subnet an existing class B network ID of 184.12.0.0 into
smaller subnets to match the actual configuration of their network.
13-6
Chapter 13
Supporting TCP/IP
Real World
Classful Addressing and CIDR
Although classful IP addressing is important to understand, it is primarily interesting only from a historical perspective. Most modern networks that use public
class A or B addresses are no longer organized by using the traditional classful
subnet mask. Originally, routers and routing protocols did not separately track
network IDs and subnet masks because memory for these devices was scarce and
expensive. Instead, classful routing was necessary because devices had to assume
the subnet mask based on the first octet. Today, memory is cheap, and every
router (and routing protocol) stores both network IDs and subnet masks in the
routing tables.
Private Addressing
Every network interface that is connected directly to the Internet must have an IP
address registered with the Internet Assigned Numbers Authority (IANA), which prevents IP address conflicts between devices. If you are configuring a private network
that is not connected to the Internet or one that exists behind a firewall or proxy server,
you can configure devices on your network with private addresses and have only the
public address configured on the interface that is visible to the Internet.
Each address class has a range of private addresses available for general use:
■
Class A: 10.0.0.0 through 10.255.255.255
■
Class B: 172.16.0.0 through 172.31.255.255
■
Class C: 192.168.0.0 through 192.168.255.255
You can choose whichever range you like to use for your network and implement custom subnets as you see fit. None of these addresses is ever officially assigned to a publicly accessible Internet host.
On the CD At this point, you should view three multimedia presentations: “Components of
an IP Address,” “How IP Addresses are Wasted,” and “How Subnet Masks Work.” These presentations are available in the Multimedia folder on the CD-ROM accompanying this book.
Together, these presentations will strengthen your understanding of how IP addresses and
subnet masks work.
How to Configure TCP/IP to Use a Static IP Address
By default, client computers running Windows 95 and later are configured to obtain
TCP/IP configuration information automatically. Automatic TCP/IP information is provided on a network using a DHCP server. When a client computer starts, it sends a
broadcast message to the network looking for a DHCP server that can provide IP
Lesson 1
Configuring and Troubleshooting TCP/IP
13-7
addressing information. Typically, most computers on a network should be configured
to obtain IP addresses automatically because automatic addressing eliminates most of
the errors and administrative overhead associated with assigning static IP addresses to
clients. However, even in a DHCP-enabled environment, you should assign a static IP
address to selected network computers. For example, the computer running the DHCP
Service cannot be a DHCP client, so it must have a static IP address. If the DHCP Service is not available, you can also configure TCP/IP to use a static IP address. For each
network adapter card that uses TCP/IP in a computer, you can configure an IP address,
subnet mask, and default gateway, as shown in Figure 13-2.
F13us02
Configuring a static TCP/IP address in Windows XP Professional
Figure 13-2
Table 13-3 describes the options used in configuring a static TCP/IP address.
Table 13-3
Options for Configuring a Static TCP/IP Address
Option
Description
IP address
A logical 32-bit address that identifies a TCP/IP host. Each network adapter
card in a computer running TCP/IP requires a unique IP address.
Subnet mask
Subnets divide a large network into multiple physical networks connected
with routers. A subnet mask blocks out part of the IP address so that TCP/IP
can distinguish the network ID from the host ID. When TCP/IP hosts try to
communicate, the subnet mask determines whether the destination host is on
a local or remote network. To communicate on a local network, computers
must have the same subnet mask.
Default gateway The router (also known as a gateway) on the local network. The router is
responsible for forwarding traffic to and from remote networks.
To configure TCP/IP to use a static IP address, complete the following steps:
1. Click Start, and then click Control Panel.
13-8
Chapter 13
Supporting TCP/IP
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Network Connections,
double-click Local Area Connection, and then click Properties.
4. In the Local Area Connection Properties dialog box, click Internet Protocol (TCP/IP),
verify that the check box to its left is selected, and then click Properties.
5. In the Internet Protocol (TCP/IP) Properties dialog box, in the General tab, click
Use The Following IP Address, type the TCP/IP configuration parameters, and
then click OK.
6. Click OK to close the Local Area Connection Properties dialog box, and then close
the Network And Dial-Up Connections window.
Caution
IP communications can fail if duplicate IP addresses exist on a network. Therefore, you should always check with the network administrator to obtain a valid static IP
address.
How to Configure TCP/IP to Obtain an IP Address Automatically
If a server running the DHCP Service is available on the network, it can automatically
assign TCP/IP configuration information to the DHCP client, as shown in Figure 13-3.
You can then configure any clients running Windows 95 and later to obtain TCP/IP
configuration information automatically from the DHCP Service. This can simplify
administration and ensure correct configuration information.
Note Windows XP Professional does not include the DHCP Service; it can act only as a
DHCP client. Only the Windows 2000 Server products provide the DHCP Service.
Server running the
DHCP Service
1 Request
2 IP address
F13us03
Figure 13-3
A server running the DHCP Service assigns TCP/IP addresses.
Lesson 1
Configuring and Troubleshooting TCP/IP
13-9
You can use the DHCP Service to provide clients with TCP/IP configuration information automatically. However, you must configure a computer as a DHCP client before
it can interact with the DHCP Service.
To configure a computer running Windows XP Professional to obtain an IP address
automatically, complete the following steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Network Connections,
double-click Local Area Connection, and then click Properties.
4. In the Local Area Connection Properties dialog box, click Internet Protocol (TCP/IP),
verify that the check box to its left is selected, and then click Properties.
5. In the Internet Protocol (TCP/IP) Properties dialog box, in the General tab, click
Obtain An IP Address Automatically.
6. Click OK to close the Local Area Connection Properties dialog box, and then close
the Network And Dial-Up Connections window.
On the CD
At this point, you should view the multimedia presentation “The Role of DHCP
in the Network Infrastructure,” which is available in the Multimedia folder on the CD-ROM
accompanying this book. This presentation provides valuable insight into how DHCP works on
a network.
What Is Automatic Private IP Addressing?
The Windows XP Professional implementation of TCP/IP supports automatic assignment of IP addresses for simple LAN-based network configurations. This addressing
mechanism is an extension of dynamic IP address assignment for LAN adapters,
enabling configuration of IP addresses without using static IP address assignment or
using a DHCP server. Automatic Private IP Addressing (APIPA) is enabled by default
in Windows XP Professional so that home users and small business users can create a
functioning, single-subnet, TCP/IP-based network without having to configure the
TCP/IP protocol manually or set up a DHCP server.
Note
The IANA has reserved 169.254.0.0 through 169.254.255.255 for APIPA. As a
result, APIPA provides an address that is guaranteed not to conflict with routable addresses.
APIPA assigns an IP address and subnet mask only, and configures no additional
parameters. This service is very useful in smaller, single-network environments in
13-10
Chapter 13
Supporting TCP/IP
which there is no need for connectivity to other networks. APIPA provides a very simple way to configure TCP/IP; the network administrator does not need any knowledge
of the necessary configuration parameters. However, if connectivity to other networks
is required, or if the client requires name-resolution services, APIPA is not sufficient.
APIPA does not provide a default gateway or name server address to the client.
The process for the APIPA feature, shown in Figure 13-4, is explained in the following
steps:
1. Windows XP Professional TCP/IP attempts to find a DHCP server on the attached
network to obtain a dynamically assigned IP address.
2. In the absence of a DHCP server during startup (for example, if the server is down
for maintenance or repairs), the client cannot obtain an IP address.
3. APIPA generates an IP address in the form of 169.254.x.y (where x.y is the client’s
randomly generated unique identifier) and a subnet mask of 255.255.0.0.
Server running the
DHCP Service is unavailable
2 No IP address returned
1 Request
3 Automatic Private IP Addressing
IP address
F13us04
Figure 13-4
APIPA assigns IP addresses automatically.
After the computer generates the address, it broadcasts to this address, and then
assigns the address to itself if no other computer responds. The computer continues to
use this address until it detects and receives configuration information from a DHCP
server. This allows two computers to be plugged into a LAN hub to restart without any
IP address configuration and to use TCP/IP for local network access.
If the computer is a DHCP client that has previously obtained a lease from a DHCP
server and the lease has not expired at boot time, the sequence of events is slightly different. The client tries to renew its lease with the DHCP server. If the client cannot
locate a DHCP server during the renewal attempt, it attempts to ping the default gateway listed in the lease.
Lesson 1
Configuring and Troubleshooting TCP/IP 13-11
If pinging the default gateway succeeds, the DHCP client assumes that it is still on the
same network in which it obtained its current lease, so it continues to use the lease. By
default, the client attempts to renew its lease when 50 percent of its assigned lease time
has expired. If pinging the default gateway fails, the client assumes that it has been
moved to a network that has no DHCP services currently available and it autoconfigures itself, as previously described. After being automatically configured, the client
continues to try to locate a DHCP server every five minutes.
APIPA can assign a TCP/IP address to DHCP clients automatically. However, APIPA
does not generate all the information that typically is provided by DHCP, such as the
address of a default gateway. Consequently, computers enabled with APIPA can communicate only with computers on the same subnet that also have addresses of the form
169.254.x.y.
!
Exam Tip
If you are troubleshooting a network problem and discover that a client computer
has an IP address on the 169.254.0.0 network, the computer has assigned itself that
address using APIPA because the computer could not locate a DHCP server.
By default, the APIPA feature is enabled. However, you can disable it by specifying an
alternate configuration to use if a DHCP server cannot be located (see Figure 13-5), as
discussed in the next section.
F13us05
Figure 13-5
Specify an alternate TCP/IP configuration.
How to Specify an Alternate Configuration for TCP/IP
A feature in Windows XP Professional named Auto-Configuration For Multiple Networks Connectivity provides easy access to network devices and the Internet. It also
13-12
Chapter 13
Supporting TCP/IP
allows a mobile computer user to seamlessly operate both office and home networks
without having to manually reconfigure TCP/IP settings.
You specify an alternate configuration for TCP/IP if a DHCP server is not found. The
alternate configuration is useful when a computer is used on multiple networks, one of
which does not have a DHCP server and does not use an automatic private IP addressing configuration.
To configure Auto-Configuration For Multiple Networks Connectivity, use these steps:
1. Click Start and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Network Connections,
and then click Local Area Connection.
4. Click Change Settings Of This Connection.
Windows XP Professional displays the Local Area Connection Properties dialog
box.
5. Click Internet Protocol (TCP/IP), and then click Properties.
Windows XP Professional displays the Internet Protocol (TCP/IP) Properties dialog
box with the General tab active.
6. Click Alternate Configuration.
7. Specify the alternate TCP/IP configuration (refer to Figure 13-5).
How to Use TCP/IP Tools to Troubleshoot a Connection
Windows XP provides a number of TCP/IP tools for troubleshooting network connectivity problems. You should be familiar with the following tools:
■
Ping
■
Ipconfig
■
Net View
■
Tracert
■
Pathping
Ping
When the problem appears to be with TCP/IP, start the troubleshooting process with
the Ping command, which allows you to check for connectivity between devices on a
network.
Lesson 1
Configuring and Troubleshooting TCP/IP 13-13
When you use the Ping command, you ping from the inside out. You want to find out
where the communication and connection fail. For example, you ping the loopback
address first, then a local computer on the same network, then a DNS or DHCP server
on the local subnet if one exists, then the default gateway, then a remote computer on
another network, and finally a resource on the Internet. You should be able to find out
where the breakdown occurs by compiling the results of these checks.
Note
When using the Ping command, you can use either the computer name or the computer’s IP address.
Pinging the Loopback Address The loopback address (127.0.0.1) is the first thing
you should check when a TCP/IP problem appears. If this check fails, the TCP/IP configuration for the local machine is not correct. To ping the loopback address, follow
these steps:
1. From the Start menu, point to All Programs, point to Accessories, and select Command Prompt.
2. Type ping 127.0.0.1. A successful ping to a loopback address is shown in Figure
13-6.
F13us07
Figure 13-6 Ping the loopback address to verify that TCP/IP is configured correctly.
If pinging the loopback address fails, check the configuration of TCP/IP by following
these steps:
1. Open the Network Connections window, right-click the configured connection,
and choose Properties.
13-14
Chapter 13
Supporting TCP/IP
2. Select Internet Protocol (TCP/IP), and click Properties to view the configuration. If
a static address is configured and a DHCP server is available, select Obtain An IP
Address Automatically. If Obtain An IP Address Automatically is selected but a
static IP address is necessary, select Use The Following IP Address; then enter the
address, subnet mask, and gateway to use. If the configuration is correct, you
might have to reset TCP/IP.
3. Click OK in the Properties dialog box and OK in the connection’s Properties dialog box. Reboot the computer if prompted.
Pinging Other Resources To ping any other computer on the network, simply replace
the loopback address with the TCP/IP address of the resource on the network. Ping a
local computer on the same subnet first, and then ping the gateway address. If you can
ping the loopback address (a local computer on the same subnet), but the Ping command to the gateway fails, you probably found the problem. In this case, check the
configuration on the local computer for the gateway address and verify that the gateway (or router) is operational.
If the ping to the gateway address is successful, continue to ping outward until you
find the problem. For instance, ping a computer on a remote subnet and verify that the
DNS server is operational.
Note
Although pinging remote computers is a useful troubleshooting technique, many
hosts and routers filter out incoming Internet Control Message Protocol (ICMP) echo requests
(which are the basis of ping). Such hosts do not respond to a ping request, making it appear
that the host cannot be reached. By default, computers protected with Windows Firewall also
filter out such requests to protect the computers from intruders that would use ICMP-based
denial of service (DoS) attacks or use ICMP to map a remote network.
Using Ipconfig
You can use the Ipconfig command-line utility to view current TCP/IP configuration
information for a computer. To use Ipconfig, open the command prompt window and
type Ipconfig to view basic TCP/IP parameters, Ipconfig /all to view the complete
TCP/IP configuration (as shown in Figure 13-7), or Ipconfig /? to view additional
options.
Lesson 1
Configuring and Troubleshooting TCP/IP 13-15
F13us08
Use the Ipconfig /all command to display a complete TCP/IP configuration.
Figure 13-7
Note
You must run Ipconfig from a command prompt. If you try to execute it by using the
Run command on the Start menu, the command window will close before you have a chance
to read the information that is displayed.
Additional Ipconfig options include the following:
/release
/renew
Releases DHCP-supplied configuration information
Renews DHCP-supplied configuration information
/flushdns Purges the local DNS cache (the area of memory that stores recently
resolved names so that the client does not have to contact the DNS server each
time)
/registerdns Renews DHCP-supplied configuration information and registers the
DNS name to IP address information with DNS
/displaydns
Displays the contents of the local DNS cache
/setclassid Provides for the configuration of DHCP user classes, which can control
the way IP addresses are assigned
!
Exam Tip
Understand the various options available with the Ipconfig command. In particular, you should remember what /renew, /release, and /flushdns do.
13-16
Chapter 13
Supporting TCP/IP
Using Net View
The Net View command is another command that you can use to test TCP/IP connections. To use the command, log on with the proper credentials that are required to
view shares on a remote or local computer, open a command prompt, and type net
view \\ComputerName or net view \\IP Address. The resulting report lists the file
and print shares on the computer. If there are no file or print shares on the computer,
you see the message There Are No Entries In The List.
If the Net View command fails, check the following:
■
The computer name in the System Properties dialog box
■
The gateway or router address in the TCP/IP Properties dialog box
■
The gateway or router status
■
The remote computer is running the File And Printer Sharing For Microsoft Networks Service (this service can be added in the TCP/IP Properties dialog box)
Using Tracert
When a route breaks down on the way from the destination computer to its target computer, communication fails. The Tracert command-line utility can help you figure out
exactly where along the route the breakdown happened. Sometimes the connection
breaks down at the gateway on the local network and sometimes at a router on an
external network.
To use Tracert, at the command prompt type tracert followed by the IP address of the
remote computer. The resulting report shows where the packets were lost. You can use
this information to uncover the source of the problem.
Using Pathping
The Ping command is used to test communication between one computer and another;
Tracert is used to follow a particular route from one computer to another. The Pathping command is a combination of both Ping and Tracert, displaying information
about packet loss at every router between the host computer and the remote one. The
Pathping command provides information about data loss between the source and the
destination, allowing you to determine which particular router or subnet might be having network problems. To use the Pathping command, at the command prompt, type
pathping followed by the target name or IP address.
Note
The Windows Help And Support Center offers a list of all of the commands that you
can perform by using the command line. Search for Command-Line Reference A–Z. Each command reference includes a description of the command and how to use it.
Lesson 1
Configuring and Troubleshooting TCP/IP 13-17
The TCP/IP Protocol Suite
The TCP/IP suite of protocols provides a set of standards for how operating systems and applications communicate and how networks are interconnected. The
TCP/IP suite of protocols maps to a four-layer conceptual model known as the
Department of Defense (DoD) model. The four layers are as follows:
■
Network access layer The network access layer is responsible for placing
data on the network medium and receiving data off the network medium.
This layer contains physical devices such as network cables and network
adapters.
■
Internet layer The Internet layer is responsible for addressing, packaging,
and routing the data that is handed down to it from the transport layer. There
are four core protocols in this layer: IP, Address Resolution Protocol (ARP),
Internet Control Message Protocol (ICMP), and Internet Group Management
Protocol (IGMP).
■
Transport layer The transport layer protocols provide communication
sessions between computers. The desired method of data delivery determines the transport protocol. The two transport layer protocols are TCP and
User Datagram Protocol (UDP).
■
Application layer At the top of the model is the application layer, in
which applications gain access to the network. There are many standard
TCP/IP tools and services in the application layer, such as File Transfer Protocol (FTP), Telnet, Simple Network Management Protocol (SNMP), DNS,
and so on.
The purpose of this layering is to provide a level of abstraction between an application or protocol in one layer and the functioning of the entire network. For
example, an application in the application layer needs to know only where to
pass information into the transport layer (and how to format that information); it
does not need to take into account any specific network configuration beyond
that point. Packets of data are passed down the layers on the sending host and
back up the layers on the receiving host.
If you are interested in learning more about how layering works, you should view
two multimedia presentations: “OSI Model” and “TCP/IP Protocol Suite.” Both
presentations are available in the Multimedia folder on the CD-ROM accompanying this book.
13-18
Chapter 13
Supporting TCP/IP
Practice: Configuring and Troubleshooting TCP/IP
In this practice, you will use two TCP/IP tools to verify your computer’s configuration.
Then you will configure your computer to use a static IP address and verify your computer’s new configuration. Next, you will configure your computer to use a DHCP server
to automatically assign an IP address to your computer (whether or not there is a DHCP
server available on your network). Finally, you will test the APIPA feature in Windows XP
Professional by disabling the DHCP server, if there is one on your network.
If your computer is part of an existing network, use the following table to record the
IP address, subnet mask, and default gateway that your network administrator provides
for you to use during this practice. Ask your network administrator whether there is
another computer that you can use to test your computer’s connectivity and record the
IP address of that computer as well. If you are not on a network, you can use the suggested values.
Variable Value
Suggested Value
Static IP address
192.168.1.201
Subnet mask
255.255.0.0
Default gateway (if required)
None
Computer to test connectivity
N/A
Your Value
Exercise 1: Verify a Computer’s TCP/IP Configuration
In this exercise, you will use two TCP/IP tools, Ipconfig and Ping, to verify your computer’s configuration.
Tip As you complete the exercises in this practice, you will use the command prompt and
Network Connections windows frequently. For the sake of efficiency, open the windows one
time, and then minimize and restore them as necessary.
1. Click Start, point to All Programs, point to Accessories, and then click Command
Prompt.
2. At the command prompt, type ipconfig /all, and then press ENTER.
The Windows XP Professional IP Configuration tool displays the TCP/IP configuration of the physical and logical adapters configured on your computer.
3. Use the information displayed to complete as much of the following table as
possible.
Lesson 1
Local Area Connection Setting
Configuring and Troubleshooting TCP/IP 13-19
Value
Host name
Primary DNS suffix
Connection-specific DNS suffix description
Physical address
DHCP enabled
Autoconfiguration enabled
Autoconfiguration IP address
Subnet mask
Default gateway
4. To verify that the IP address is working and configured for your adapter, type
ping 127.0.0.1, and then press ENTER.
A response similar to the following indicates a successful ping:
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Ping statistics for 127.0.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 <0% loss>,
Approximate round trip times in milliseconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
5. Minimize the Command Prompt window.
Exercise 2: Configure TCP/IP to Use a Static IP Address
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Network Connections,
and then click Local Area Connection.
4. Under Network Tasks, click Change Settings Of This Connection (you can also
right-click the connection and then click Properties).
The Local Area Connection Properties dialog box appears, displaying the network
adapter in use and the network components used in this connection.
5. Click Internet Protocol (TCP/IP), and then verify that the check box to the left of
the entry is selected.
13-20
Chapter 13
Supporting TCP/IP
6. Click Properties.
The Internet Protocol (TCP/IP) Properties dialog box appears.
7. Click Use The Following IP Address.
Important
In the next step, if the computer you are using is on a network, enter the IP
address, subnet mask, and default gateway values you recorded in the table in Exercise 1. If
you are on a stand-alone computer, complete the next step as it is written.
8. In the IP Address text box, type 198.168.1.201; in the Subnet Mask text box, type
255.255.255.0.
Important
Be careful when entering IP configuration settings manually, especially numeric
addresses. The most frequent cause of TCP/IP connection problems is incorrectly entered IP
address information.
9. Click OK to return to the Local Area Connection Properties dialog box.
10. Click Close to close the Local Area Connection Properties dialog box and return to
the Network Connections window.
11. Minimize the Network Connections window.
12. Restore the command prompt.
13. At the command prompt, type ipconfig /all and then press Enter.
The Windows XP Professional IP Configuration tool displays the physical and logical adapters configured on your computer.
14. Record the current TCP/IP configuration settings for your local area connection in
the following table.
Setting
Value
IP address
Subnet mask
15. To verify that the IP address is working and configured for your adapter, type
ping 127.0.0.1, and then press ENTER.
If the address is working and configured, you receive the following result:
Reply
Reply
Reply
Reply
from
from
from
from
127.0.0.1:
127.0.0.1:
127.0.0.1:
127.0.0.1:
bytes=32
bytes=32
bytes=32
bytes=32
time<1ms
time<1ms
time<1ms
time<1ms
TTL=128
TTL=128
TTL=128
TTL=128
Lesson 1
Configuring and Troubleshooting TCP/IP 13-21
16. If you have a computer that you are using to test connectivity, type ping
ip_address (where ip_address is the IP address of the computer you are using to
test connectivity), and then press ENTER. Minimize the command prompt.
Exercise 3: Configure TCP/IP to Automatically Obtain an IP Address
In this exercise, you will configure TCP/IP to automatically obtain an IP address, and
then test the configuration to verify that the DHCP Service has provided the appropriate IP addressing information. Be sure to perform the first part of this exercise even if
you have no DHCP server because these settings are also used in Exercise 4.
1. Restore the Network Connections window, right-click Local Area Connection, and
then click Properties.
The Local Area Connection Properties dialog box appears.
2. Click Internet Protocol (TCP/IP) and verify that the check box to the left of the
entry is selected.
3. Click Properties.
The Internet Protocol (TCP/IP) Properties dialog box appears.
4. Click Obtain An IP Address Automatically, and then click Obtain DNS Server
Address Automatically.
5. Click OK to close the Internet Protocol (TCP/IP) Properties dialog box.
6. Click Close to close the Local Area Connection Properties dialog box.
7. Minimize the Network Connections window.
Note
If there is not an available server running the DHCP Service to provide an IP address,
skip the remainder of this exercise and continue with Exercise 4.
8. Restore the command prompt, type ipconfig /release, and then press ENTER.
9. At the command prompt, type ipconfig /renew, and then press ENTER.
10. At the command prompt, type ipconfig, and then press ENTER.
11. Record the current TCP/IP configuration settings for your local area connection in
the following table.
Setting
IP address
Subnet mask
Default gateway
Value
13-22
Chapter 13
Supporting TCP/IP
12. To test that TCP/IP is working and bound to your adapter, type ping 127.0.0.1,
and then press ENTER.
The internal loopback test displays four replies if TCP/IP is bound to the adapter.
Exercise 4: Obtaining an IP Address Using APIPA
In this exercise, if you have a server running the DHCP Service, you need to disable it
on that server so that a DHCP server is not available to provide an IP address for your
computer (you can also disconnect the networking cable from your computer). Without a DHCP server available to provide an IP address, the Windows XP Professional
APIPA feature provides unique IP addresses for your computer.
1. At the command prompt, type ipconfig /release, and then press ENTER.
2. At the command prompt, type ipconfig /renew, and then press ENTER.
There is a pause while Windows XP Professional attempts to locate a DHCP server
on the network.
3. Which message appears, and what does it indicate?
4. Click OK to close the dialog box.
5. At the command prompt, type ipconfig, and then press ENTER.
6. Record the current TCP/IP settings for your local area connection in the following
table.
Setting
Value
IP address
Subnet mask
Default gateway
7. Is this the same IP address assigned to your computer in Exercise 3? Why or why
not?
Lesson 1
Configuring and Troubleshooting TCP/IP 13-23
8. To verify that TCP/IP is working, type ping 127.0.0.1, and then press ENTER. The
internal loopback test displays four replies if TCP/IP is bound to the adapter.
9. If you have a computer to test TCP/IP connectivity with your computer, type ping
ip_address (where ip_address is the IP address of the computer that you are
using to test connectivity), and then press ENTER. If you do not have a computer
to test connectivity, skip this step and proceed to Exercise 5.
10. Were you successful? Why or why not?
Exercise 5: Obtain an IP Address by Using DHCP
Before you begin this exercise, you will need to enable the DHCP Service running on
the computer that is acting as a DHCP server (or reconnect your network cable if you
disconnected it in Exercise 4). In this exercise, your computer obtains IP addressing
information from the DHCP server.
Note
If there is not an available server running the DHCP Service to provide an IP address,
skip this exercise.
1. At the command prompt, type ipconfig /release, and then press ENTER.
2. At the command prompt, type ipconfig /renew, and then press ENTER.
After a short wait, a message box indicates that a new IP address was assigned.
3. Click OK to close the message box.
4. At the command prompt, type ipconfig /all, and then press ENTER.
Verify that the DHCP server has assigned an IP address to your computer.
5. Close the command prompt.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
13-24
Chapter 13
Supporting TCP/IP
1. Why would you assign a computer a static IP address?
2. Which of the following statements correctly describe IP addresses? (Choose all that
apply.)
a. IP addresses are logical 64-bit addresses that identify a TCP/IP host.
b. Each network adapter card in a computer running TCP/IP requires a unique
IP address.
c. 192.168.0.108 is an example of a class C IP address.
d. The host ID in an IP address is always the last two octets in the address.
3. What is the purpose of a subnet mask?
4. By default, client computers running Windows XP Professional, Windows 95, or
Windows 98 obtain TCP/IP configuration information automatically from the
DHCP Service: True or false?
5. Your computer running Windows XP Professional was configured manually for
TCP/IP. You can connect to any host on your own subnet, but you cannot connect
to or even ping any host on a remote subnet. What is the likely cause of the problem and how would you fix it?
6. Your computer’s Computer Name is Pro1, and you ping Pro1. The local address
for Pro1 is returned as 169.254.128.71. What does this tell you?
Lesson 1
Configuring and Troubleshooting TCP/IP 13-25
Lesson Summary
■
Each TCP/IP host is identified by a logical IP address that identifies a computer’s
location on the network. The IP address is composed of a network ID and a host
ID. A subnet mask determines which portion of the IP address is the network ID
and which portion is the host ID.
■
A static IP address is a manually entered address. You should assign a static IP
address to selected network computers, such as the computer running the DHCP
Service.
■
Windows XP Professional can obtain an IP address automatically from a DHCP
server on the network. Using automatic addressing reduces the likelihood of
errors being introduced when configuring static addresses.
■
Windows XP Professional can assign itself an IP address using APIPA if a DHCP
server is not available. Computers enabled with APIPA can communicate only with
computers on the same subnet that also have addresses of the form 169.254.x.y.
■
Specifying an alternate TCP/IP configuration is useful when a computer is used on
multiple networks, one of which does not have a DHCP server and does not use
an automatic private IP addressing configuration.
■
Windows XP Professional includes a number of tools that you can use to troubleshoot TCP/IP configurations. These tools include the following:
❑
Ping
❑
Ipconfig
❑
Net View
❑
Tracert
❑
Pathping
13-26
Chapter 13
Supporting TCP/IP
Lesson 2: Understanding the Domain Name System
The Domain Name System (DNS) is used on the Internet and on many private networks. Private networks using Microsoft Active Directory directory service use DNS
extensively to resolve computer names and to locate computers within their local networks and the Internet. In fact, networks based on Windows 2000 Server and Windows
Server 2003 use DNS as a primary means of locating resources in Active Directory
(which you will learn about in Chapter 14, “Overview of Active Directory Service”).
After this lesson, you will be able to
■ Explain how the domain namespace works.
■ Identify domain-naming guidelines.
■ Explain the purpose of zones.
■ Explain the purpose of name servers.
Estimated lesson time: 20 minutes
What Is the Domain Namespace?
The domain namespace is the naming scheme that provides the hierarchical structure
for the DNS database. Each node, referred to as a domain, represents a partition of the
DNS database.
The DNS database is indexed by name, so each domain must have a name. As you add
domains to the hierarchy, the name of the parent domain is added to its child domain
(called a subdomain). Consequently, a domain’s name identifies its position in the hierarchy. For example, in Figure 13-8, the domain name sales.microsoft.com identifies the
sales domain as a subdomain of the microsoft.com domain and microsoft as a subdomain of the com domain.
The hierarchical structure of the domain namespace consists of a root domain, toplevel domains, second-level domains, and host names.
Note
The term domain, in the context of DNS, does not correlate precisely to the term as
used on the Active Directory network. A Windows domain is a grouping of computers and
devices that are administered as a unit.
Lesson 2
Understanding the Domain Name System 13-27
“.”
edu
com
expedia
Root domain
org
gov
microsoft
sales.microsoft.com.
congress
Top-level domains
au
Second-level domains
sales
Computer1.sales.microsoft.com.
Computer1
F13us09
Figure 13-8
The domain namespace is hierarchical in structure.
Root Domain
At the top of the DNS hierarchy, there is a single domain called the root domain, which
is represented by a single period.
Top-Level Domains
Top-level domains are two-, three-, or four-character name codes. Top-level domains
are grouped by organization type or geographic location. Top-level domains are controlled by the Internet Architecture Board (IAB), an Internet authority controlling the
assignment of domain names, among other things. Table 13-4 provides some examples
of top-level domain names.
Table 13-4
Top-Level Domains
Top-Level Domain
Description
gov
Government organizations
com
Commercial organizations
edu
Educational institutions
org
Noncommercial organizations
au
Country code of Australia
Top-level domains can contain second-level domains and host names.
13-28
Chapter 13
Supporting TCP/IP
Second-Level Domains
Anyone can register a second-level domain name. Second-level domain names are registered to individuals and organizations by a number of different domain registry companies. A second-level name has two name parts: a top-level name and a unique
second-level name. Table 13-5 provides some examples of second-level domains. After
registering a second-level domain name, you can create as many subdomains of that
domain name as you want. For example, if you registered the domain name contoso.com, you could create subdomains such as north.contoso.com, south.contoso.com, and so on.
Table 13-5
Second-Level Domains
Second-Level Domain
Description
ed.gov
United States Department of Education
Microsoft.com
Microsoft Corporation
Stanford.edu
Stanford University
w3.org
World Wide Web Consortium
pm.gov.au
Prime Minister of Australia
Host Names
Host names refer to specific computers on the Internet or a private network. For example, in Figure 13-8, Computer1 is a host name. A host name is the leftmost portion of
a fully qualified domain name (FQDN), which describes the exact position of a host
within the domain hierarchy. In Figure 13-8, Computer1.sales.microsoft.com. (including the end period, which represents the root domain) is an FQDN.
DNS uses a host’s FQDN to resolve a name to an IP address.
Note
The host name does not have to be the same as the computer name. By default,
TCP/IP setup uses the computer name for the host name, replacing illegal characters, such
as the underscore (_), with a hyphen (-).
On the CD At this point, you should view the multimedia presentation “Role of DNS,” which
is available in the Multimedia folder on the CD-ROM accompanying this book. This presentation provides valuable insight into how DNS works on a network.
Lesson 2
Understanding the Domain Name System 13-29
Domain-Naming Guidelines
When you create a domain namespace, consider the following domain guidelines and
standard naming conventions:
■
Limit the number of domain levels. Typically, DNS host entries should be three or
four levels down the DNS hierarchy and no more than five levels down the hierarchy. The numbers of levels increase the administrative tasks.
■
Use unique names. Each subdomain must have a unique name within its parent
domain to ensure that the name is unique throughout the DNS namespace.
■
Use simple names. Simple and precise domain names are easier for users to
remember. They also enable users to search intuitively and locate Web sites or
other computers on the Internet or an intranet.
■
Avoid lengthy domain names. Domain names can be up to 63 characters, including periods. The total length of an FQDN cannot exceed 255 characters. Casesensitive naming is not supported.
■
Use standard DNS characters and Unicode characters.
■
Windows 2000 Server and Windows Server 2003 support the following standard
DNS characters: a–z, 0–9, and the hyphen (-), as defined in RFC 1035.
■
The DNS Service also supports the Unicode character set. The Unicode character
set includes additional characters not found in the American Standard Code for
Information Interchange (ASCII) character set; these additional characters are
required for languages such as French, German, and Spanish.
Note
Use Unicode characters only if all servers running the DNS Service in your environment support Unicode. For more information about the Unicode character set, read RFC 2044
by searching for “RFC 2044” with your Web browser.
What Are Zones?
A zone represents a discrete portion of the domain namespace. Zones provide a way
to partition the domain namespace into manageable sections, and they provide the following functions:
■
Multiple zones in a domain namespace are used to distribute administrative tasks
to different groups. For example, Figure 13-9 depicts the microsoft.com domain
namespace divided into two zones. These zones allow one administrator to manage the microsoft and sales domains, and another administrator to manage the
development domain.
13-30
Chapter 13
■
Supporting TCP/IP
A zone must encompass a contiguous domain namespace. For example, in Figure 13-9, you cannot create a zone that consists of only the sales.microsoft.com
and development.microsoft.com domains because these two domains are not
contiguous.
Note
For more information about contiguous namespaces, see Chapter 14.
com
Zone1
database
file
Zone2
database
file
microsoft
sales
development
Zone1
Zone2
F13us10
Figure 13-9
A domain namespace is divided into zones.
The name-to-IP address mappings for a zone are stored in the zone database file. Each
zone is anchored to a specific domain, referred to as the zone’s root domain. The zone
database file does not necessarily contain information for all subdomains of the zone’s
root domain, only those subdomains within the zone.
In Figure 13-9, the root domain for Zone1 is microsoft.com, and its zone file contains
the name-to-IP address mappings for the microsoft and sales domains. The root
domain for Zone2 is development, and its zone file contains the name-to-IP address
mappings only for the development domain. The zone file for Zone1 does not contain
the name-to-IP address mappings for the development domain, although development
is a subdomain of the microsoft domain.
What Are Name Servers?
A DNS name server stores the zone database file. Name servers can store data for one
zone or multiple zones. A name server is said to have authority for the domain name
space that the zone encompasses.
One name server contains the master zone database file, referred to as the primary
zone database file, for the specified zone. As a result, there must be at least one name
server for a zone. Changes to a zone, such as adding domains or hosts, are performed
on the server that contains the primary zone database file.
Lesson 2
Understanding the Domain Name System 13-31
Multiple name servers act as a backup to the name server containing the primary zone
database file. Multiple name servers provide the following advantages:
■
They perform zone transfers. The additional name servers obtain a copy of the
zone database file from the name server that contains the primary database zone
file. This process is called a zone transfer. These name servers periodically query
the name server containing the primary zone database file for updated zone data.
■
They provide redundancy. If the name server containing the primary zone database file fails, the additional name servers can provide service.
■
They improve access speed for remote locations. If there are a number of clients
in remote locations, use additional name servers to reduce query traffic across
slow wide area network (WAN) links.
■
They reduce the load on the name server containing the primary zone database
file.
Real World Active Directory and DNS
Active Directory and DNS are tightly integrated—they even share a common
namespace. It is essential, therefore, that you understand how each system works
and how they work together.
DNS is the locator service used by Active Directory (and by many other Windows
components). Active Directory makes its services available to the network by
publishing them in DNS. When a domain controller is installed (or when services
are added to it), the domain controller uses dynamic updates to register its services as SRV records in DNS. Clients can then locate services through simple DNS
queries. The Microsoft DNS Service runs on every Windows Server 2003 domain
controller by default.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. What is DNS and what is it used for?
13-32
Chapter 13
Supporting TCP/IP
2. Which of the following statements correctly describes DNS root domains? (Choose
all that apply.)
a. The root domain is at the top of the hierarchy.
b. The root domain is at the bottom of the hierarchy.
c. The root domain is represented by a two- or three-character name code.
d. The root domain is represented by a period (.).
3. Which of the following are second-level domain names? (Choose all that apply.)
a. gov
b. Microsoft.com
c. au
d. ed.gov
4. ________________ provide a way to partition the domain namespace into manageable sections, and each ________________ represents a discrete portion of the
domain namespace.
Lesson Summary
■
The DNS database is indexed by name, so each domain (node) must have a name.
The hierarchical structure of the domain namespace consists of a root domain,
top-level domains, second-level domains, and host names.
■
When creating a domain namespace, you should use certain guidelines, such as
limiting the number of domain levels and using unique and simple names.
■
Zones provide a way to partition the domain namespace into smaller sections, so
a zone represents a discrete portion of the domain namespace.
■
A DNS name server stores the zone database file. Name servers can store data for
one zone or multiple zones. A name server is said to have authority for the domain
namespace that the zone encompasses.
Lesson 3
Overview of Name Resolution 13-33
Lesson 3: Overview of Name Resolution
Name resolution is the process of resolving names to IP addresses. It is similar to looking up a name in a telephone book, in which the name is associated with a telephone
number. For example, when you connect to the Microsoft Web site, you use the name
www.microsoft.com. DNS resolves www.microsoft.com to its associated IP address.
The mapping of names to IP addresses is stored in the DNS distributed database.
DNS name servers resolve forward and reverse lookup queries. A forward lookup
query resolves a name to an IP address, and a reverse lookup query resolves an IP
address to a name. A name server can resolve a query only for a zone for which it has
authority. If a name server cannot resolve the query, it passes the query to other name
servers that can resolve it. The name server caches the query results to reduce the DNS
traffic on the network.
After this lesson, you will be able to
■ Explain how a forward lookup query works.
■ Explain the purpose of name server caching.
■ Explain how a reverse lookup query works.
Estimated lesson time: 10 minutes
How a Forward Lookup Query Works
The DNS Service uses a client/server model for name resolution. To resolve a forward
lookup query, which resolves a name to an IP address, a client passes a query to a
local name server. The local name server either resolves the query and provides an IP
address or queries another name server for resolution.
Figure 13-10 represents a client querying the name server for an IP address of
www.microsoft.com.
13-34
Chapter 13
Supporting TCP/IP
2
Local
name server
Root
name server
3
1
Com
name server
5
4
Microsoft
name server
Client
6
The Web
F13us11
Figure 13-10
A forward lookup query resolves a name to an IP address.
The numbers in Figure 13-10 depict the following activities:
1. The client passes a forward lookup query for www.microsoft.com to its local name
server.
2. The local name server checks its zone database file to determine whether it contains the name-to-IP address mapping for the client query. The local name server
does not have authority for the microsoft.com domain, so it passes the query to
one of the DNS root servers, requesting resolution of the host name. The root
name server sends back a referral to the com name server.
3. The local name server sends a request to a com name server, which responds with
a referral to the Microsoft name server.
4. The local name server sends a request to the Microsoft name server. Because the
Microsoft name server has authority for that portion of the domain namespace,
when it receives the request, it returns the IP address for www.microsoft.com to
the local name server.
5. The local name server sends the IP address for www.microsoft.com to the client.
6. The name resolution is complete, and the client can access www.microsoft.com.
What Is Name Server Caching?
When a name server is processing a query, it might be required to send out several
queries to find the answer. With each query, the name server discovers other name
servers that have authority for a portion of the domain namespace. The name server
caches these query results to reduce network traffic.
Lesson 3
Overview of Name Resolution 13-35
When a name server receives a query result, the following process takes place (see Figure 13-11):
1. The name server caches the query result for a specified amount of time, which is
referred to as Time to Live (TTL).
Note
The zone that provided the query results specifies the TTL. The default value is 60
minutes.
2. After the name server caches the query result, TTL starts counting down from its
original value.
3. When TTL expires, the name server deletes the query result from its cache.
Caching query results enables the name server to resolve other queries to the same
portion of the domain namespace quickly.
Name
server
Query
TTL
Result
Name
server
Result
TTL
Cache
F13us12
Figure 13-11
Names servers can cache query results for quicker subsequent access.
Note Shorter TTL values ensure that data about the domain namespace is more current
across the network. However, shorter TTL values cause the cached values to expire sooner
and increase the DNS traffic. A longer TTL value causes the cached values to be retained
longer, which decreases the DNS traffic but increases the risk of the entries becoming stale.
If a change does occur, the client does not receive the updated information until the TTL
expires and a new query to that portion of the domain namespace is resolved.
How a Reverse Lookup Query Works
A reverse lookup query maps an IP address to a name. Troubleshooting tools, such as
the nslookup command-line tool, use reverse lookup queries to report back host
names. Additionally, certain applications implement security based on the capability to
connect to names, not IP addresses.
13-36
Chapter 13
Supporting TCP/IP
Because the DNS distributed database is indexed by name and not by IP address, a
reverse lookup query would require an exhaustive search of every domain name. To
solve this problem, in-addr.arpa was created. This special second-level domain follows
the same hierarchical naming scheme as the rest of the domain namespace; however,
it is based on IP addresses, not domain names, as follows:
■
Subdomains are named after the numbers in the dotted-decimal representation of
IP addresses.
■
The order of the IP address octets is reversed.
■
Companies administer subdomains of the in-addr.arpa domain based on their
assigned IP addresses and subnet mask.
For example, Figure 13-12 shows a dotted-decimal representation of the IP address
192.168.16.200. A company that has an assigned IP address range of 192.168.16.0 to
192.168.16.255 with a subnet mask of 255.255.255.0 has authority over the
16.168.192.in-addr.arpa domain.
“.”
arpa
In-addr
0
192
0
0
255
168
255
16
0
255
200
255
F13us13
Figure 13-12
The in-addr.arpa domain is used in reverse lookup queries.
On the CD
At this point, you should view the multimedia presentation “The Name Resolution Process,” which is available in the Multimedia folder on the CD-ROM accompanying this
book. This presentation will give you a deeper understanding of the name resolution process.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
Lesson 3
Overview of Name Resolution 13-37
1. What is a forward lookup query and how is it resolved?
2. In DNS name resolution, which of the following statements about TTL are correct?
(Choose all that apply.)
a. TTL is the length of time a query can exist before it is discarded.
b. Shorter TTL values help ensure that data about the domain namespace is
more current across the network.
c. Longer TTL values increase the amount of DNS traffic.
d. Longer TTL values cause the cached values to be retained longer.
3. Which of the following statements about DNS name and address resolution are
correct? (Choose all that apply.)
a. The DNS distributed database is indexed by both names and IP addresses.
b. The top-level domain in-addr.arpa is used for both forward and reverse queries.
c. In the in-addr.arpa domain, the order of the IP address octets is reversed.
d. Troubleshooting tools, such as the nslookup command-line tool, use reverse
lookup queries to report back host names.
Lesson Summary
■
A forward lookup query resolves a name to an IP address, and a reverse lookup
query resolves an IP address to a name.
■
Name servers cache query results to reduce DNS traffic on the network.
■
The DNS distributed database is indexed by name, not by IP address, so inaddr.arpa (a special second-level domain) was created. It is based on IP addresses
instead of domain names.
13-38
Chapter 13
Supporting TCP/IP
Lesson 4: Configuring a DNS Client
There are several methods available for configuring TCP/IP name resolution on Windows XP Professional clients. The method covered in this lesson uses DNS to provide
name resolution. A second method is to use a HOSTS file. For networks without access
to a DNS name server, creating a HOSTS file, which is a manually maintained local file,
can provide host-to-IP address name resolution for applications and services. HOSTS
files can also be used in environments in which name servers are available, but not all
hosts are registered, perhaps because some hosts are only available to a limited number of clients.
If there is a computer on your network that is running Windows 2000 Server or Windows Server 2003 and has the DNS Service installed and configured on it, you should
use DNS for name resolution. This lesson shows you how to configure your computer
as a DNS client.
After this lesson, you will be able to
■ Configure DNS server addresses on a computer running Windows XP Professional.
■ Configure DNS query settings.
Estimated lesson time: 25 minutes
How to Configure DNS Server Addresses
Because DNS is a distributed database that is used in TCP/IP networks to translate
computer names to IP addresses, you must first ensure that TCP/IP is enabled on a client running Windows XP Professional. Internet Protocol (TCP/IP) is enabled by default
during Windows XP Professional installation. After you have confirmed that TCP/IP is
enabled on your client, you are ready to configure your computer as a DNS client.
To configure your computer as a DNS client, use the following steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Network Connections.
4. Right-click Local Area Connection, and then click Properties.
Windows XP Professional displays the Local Area Connection Properties dialog
box.
5. Click Internet Protocol (TCP/IP), and then click Properties.
Windows XP Professional displays the Internet Protocol (TCP/IP) Properties dialog
box (see Figure 13-13).
Lesson 4
Configuring a DNS Client 13-39
F13us14
Figure 13-13 Configure DNS server addresses on a client computer.
6. Select one of the two following options:
❑
Obtain DNS Server Address Automatically. If you select this option, you
must have a DHCP server available on your network to provide the IP
address of a DNS server.
❑
Use The Following DNS Server Addresses. If you select this option, you
must type in the IP addresses of the DNS servers you want this client to use.
You can enter a Preferred DNS Server address and an Alternate DNS Server
address.
In the Internet Protocol (TCP/IP) Properties dialog box, you can also click Advanced to
open the Advanced TCP/IP Settings dialog box. Click the DNS tab, on which you can
set additional configurations for DNS (see Figure 13-14). Additional options include the
following:
■
Click Add to enter additional DNS server addresses to the list of servers that service this computer to resolve DNS domain names.
■
Click Edit to modify the addresses listed (for example, to correct an error you
made in entering an IP address).
■
Click Remove to delete the address of a DNS server from the list.
■
Click the up-pointing arrow or down-pointing arrow to change the order of the
servers listed. These arrows work like the up-pointing and down-pointing arrows
you use to change the binding order. The order in which the addresses are listed
is the order in which the servers are used. If you use the up-pointing arrow to
move an address higher on the list, that server is used before all the servers listed
after it. Conversely, using the down-pointing arrow to move a server lower on the
list causes all servers that are listed above it to be used first to resolve DNS domain
names.
13-40
Chapter 13
Supporting TCP/IP
F13us15
Figure 13-14
options.
Use the Advanced TCP/IP Settings dialog box to configure additional DNS
How to Configure DNS Query Settings
In the Advanced TCP/IP Settings dialog box, you can also configure the way suffixes
are added to queries.
Append Primary And Connection Specific DNS Suffixes Option
By default, the Append Primary And Connection Specific DNS Suffixes option (refer to
Figure 13-14) is selected. This option causes the DNS resolver to append the client
name to the primary domain name, as well as the domain name defined in the DNS
Domain Name field of each network connection. The resolver then queries for that
FQDN. If this query fails and you have specified a connection-specific DNS suffix in
the DNS Suffix For This Connection text box, it causes the DNS resolver to append the
client name to the name you specified there.
For example, assume that an organization’s domain name is contoso.com. Querying for
the FQDN of a specific computer in the domain (say, client1.contoso.com) would
resolve that computer’s IP address. If you were to configure the contoso.com suffix to
be appended to queries, a user could query for an unqualified name (for example, by
typing client1 into the Internet Explorer address box). The computer would automatically append the suffix contoso.com to the query, creating the FQDN client1.contoso.com.
If a DHCP server configures this connection, and you do not specify a DNS suffix, a
DNS suffix for the connection is assigned by an appropriately configured DHCP server.
If you specify a DNS suffix, it is used instead of one assigned by a DHCP server.
Lesson 4
Configuring a DNS Client 13-41
The Append Parent Suffixes Of The Primary DNS Suffix check box is also selected by
default. If it is selected, the DNS resolver strips off the leftmost portion of the primary
DNS suffix and attempts the resulting domain name. If this fails, it continues stripping off
the leftmost label and attempting the resulting domain name until only two labels remain.
For example, assume again that an organization uses the domain name north.contoso.com, and that the Append Primary And Connection Specific DNS Suffixes option
is enabled. Normally, the suffix north.contoso.com would be added to unqualified
queries, so that a user typing in client1 would have the query appended to
client1.north.contoso.com. If you enable the Append Parent Suffixes Of The Primary
DNS Suffix option, DNS first uses the suffix north.contoso.com in the normal way. If
that did not resolve, DNS would use the parent suffix contoso.com, and finally the parent suffix of that: .com. So when the user types client1, DNS would first try
client1.north.contoso.com, then client1.contoso.com, and finally client1.com.
Append These DNS Suffixes (In Order) Option
By default, the Append Primary And Connection Specific DNS Suffixes option is
selected, so the Append These DNS Suffixes (In Order) option is not selected; only one
of these two options can be selected at one time. This option allows you to specify a
list of domains to try. The DNS resolver adds each one of these suffixes one at a time
and in the order you specified. Queries for unqualified names that are used on this
computer are limited to the domains that you listed in Append These DNS Suffixes (In
Order). Continuing the example from the previous section, you could specify that DNS
suffixes be appended in the order .com, then contoso.com, and then north.contoso.com.
Register This Connection’s Addresses In DNS Option
Selecting the Register This Connection’s Addresses In DNS check box causes the computer to attempt to dynamically register the IP addresses (through DNS) of this computer
with its full computer name. To view the computer name for this computer, click Start,
click My Computer, click View System Information, and click the Computer Name tab.
Use This Connection’s DNS Suffix In DNS Registration Option
Selecting the Use This Connection’s DNS Suffix In DNS Registration check box causes
the computer to use DNS dynamic updates to register the IP addresses and the connection-specific domain name of the connection. The connection-specific name of this
DNS connection is the computer name, which is the first label of the full computer
name specified in the Computer Name tab located in View System Information, and the
DNS suffix of this connection. If the Register This Connection’s Addresses In DNS
check box is selected, this registration is in addition to the DNS registration of the full
computer name.
13-42
Chapter 13
Supporting TCP/IP
Practice: Configuring a DNS Client
After completing this practice, you will be able to configure computers running Windows XP Professional as DNS clients.
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. Click Network Connections.
4. Right-click Local Area Connection, and then click Properties.
5. Click Internet Protocol (TCP/IP), and then click Properties.
6. In the Internet Protocol (TCP/IP) Properties dialog box, click Use The Following
DNS Server Addresses.
7. In the Preferred DNS Server text box, type the IP address of the primary name
server for this client.
Note If you are on a network, ask your network administrator the IP address of a primary
and secondary DNS server you can use, and then type that address in the Preferred DNS
Server text box. If you are not on a network, or if you do not have a DNS server on your network, type 192.168.1.203 as the Preferred DNS Server IP address and type 192.168.1.205
as the Alternate DNS Server IP address.
8. If there is a second name server available for this client, in the Alternate DNS
Server text box, type the IP address of the second name server for this client.
A client attempts to send its query requests to the preferred name server. If that
name server is not responding, the client sends the query request to the alternate
name server.
9. Click Advanced, and then in the Advanced TCP/IP Settings dialog box, click the
DNS tab.
10. Under DNS Server Addresses, In Order Of Use, click Add.
11. If there is a third name server available for this client, in the TCP/IP DNS Server
text box, type the IP address of the third available name server for this client.
Note
If you are on a network, ask your network administrator for the IP address of a third
DNS server you can use and type that address in the TCP/IP DNS Server text box. If you are
not on a network or if you do not have a DNS server on your network, you can type
192.168.1.207 as an additional DNS Server IP address.
Lesson 4
Configuring a DNS Client 13-43
12. Click Add to add the third DNS server address and to close the TCP/IP DNS Server
dialog box.
There are now three addresses in the DNS Server Addresses, In Order Of Use list
box.
13. Click OK to close the Advanced TCP/IP Settings dialog box.
14. Click OK to close the Internet Protocol (TCP/IP) Properties dialog box.
15. Click Close to close the Local Connection Properties dialog box.
16. Close the Network Connections window.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. What is a HOSTS file, and when would you create one?
2. Which of the following functions do you perform by using the Advanced TCP/IP
Settings dialog box? (Choose all that apply.)
a. Edit the IP address of a DNS server.
b. Delete the IP address of a DNS server.
c. Enter additional IP addresses for other available DNS servers.
d. Edit the IP addresses of the DHCP servers on the network.
3. What does selecting the Append These DNS Suffixes (In Order) option do?
13-44
Chapter 13
Supporting TCP/IP
Lesson Summary
■
When configuring a DNS client in an environment in which there are DNS name
servers, you can configure the client to obtain the address of the DNS server automatically from a DHCP server or you can manually enter multiple addresses for
DNS servers.
■
In the Advanced TCP/IP Settings dialog box, you can configure the way suffixes
are added to queries.
Case Scenario Exercise
In this exercise, you will read a scenario about configuring TCP/IP on a client computer running Windows XP Professional, and then answer the questions that follow. If
you have difficulty completing this work, review the material in this chapter before
beginning the next chapter. You can find answers to these questions in the “Questions
and Answers” section at the end of this chapter.
Scenario
You are working as an administrator for a company named Adventure Works, a leading
supplier of skiing and snowboarding equipment. You are working with Andrew, a
manager in the Engineering department who has recently made the decision to work
several days each week from home. The company has provided Andrew with a new
notebook computer that is running Windows XP Professional.
Questions
1. Andrew’s notebook has a network adapter built-in. When he is at work, Andrew
will connect the notebook to the company network. The company uses a DHCP
server to provide IP addresses to computers on the network. How should you
configure Andrew’s computer to connect to the company network?
2. When Andrew is at home, he will connect his notebook computer to a digital subscriber line (DSL) modem supplied by his ISP. The ISP has issued Andrew a static
IP address. How should you configure Andrew’s computer so that it will use the
static IP address when he is at home without interfering with the DHCP service on
the company network?
Troubleshooting Lab 13-45
Troubleshooting Lab
You are working as an administrator for a company named Coho Vineyard, a national
distributor of wines. Diane, a user in the Sales department, calls you on Tuesday morning
to report that she cannot connect to any resources on the local network or on the Internet. After verifying that other users in her department can connect to the network, you
visit Diane’s computer, open the Command Prompt window, and type ipconfig /all.
You get the following results:
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix
Description . . . . . . . . . . . : Intel(R) PRO/1000 CT
Physical Address. . . . . . . . . : 1D-03-D2-E2-1A-2C
DHCP Enabled. . . . . . . . . . . : Yes
IP Address. . . . . . . . . . . . : 169.254.103.52
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . . . :
DNS Servers . . . . . . . . . . . :
1. What do these results tell you?
13-46
Chapter 13
Supporting TCP/IP
2. What would be your first troubleshooting step? What should you do if that first
step does not work?
Chapter Summary
■
Microsoft’s implementation of TCP/IP provides a robust, scalable, cross-platform
client/server framework that is supported by most large networks, including the
Internet. The TCP/IP suite of protocols maps to a four-layer conceptual model that
includes the following layers: network access, Internet, transport, and application.
■
Each TCP/IP host is identified by a logical IP address that identifies a computer’s
location on the network. The IP address is composed of a network ID and a host
ID. A subnet mask determines which portion of the IP address is the network ID
and which portion is the host ID. You can configure Windows XP to use a static
IP address or to obtain an IP address automatically. When configured to obtain an
address automatically, Windows first attempts to lease an IP address from a DHCP
server. If a DHCP server is unavailable, Windows XP assigns itself an IP address
using APIPA.
■
The DNS database is indexed by name, so each domain (node) must have a name.
The hierarchical structure of the domain namespace consists of a root domain,
top-level domains, second-level domains, and host names.
■
DNS name servers resolve forward and reverse lookup queries. A forward lookup
query resolves a name to an IP address, and a reverse lookup query resolves an IP
address to a name. A name server can resolve a query only for a zone for which
it has authority. If a name server cannot resolve the query, it passes the query to
other name servers that can resolve it. The name server caches the query results to
reduce the DNS traffic on the network.
■
When configuring a DNS client in an environment in which there are DNS name
servers, you can configure the client to obtain the address of the DNS server automatically from a DHCP server or you can manually enter multiple addresses for
DNS servers.
Exam Highlights 13-47
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
Learn the IP address ranges that fall into each of the major classes (A, B, and C)
and the default subnet mask for each class. This information will not only help
determine how a classful IP addressing scheme will apply to a situation, but also
how to customize a scheme using the classless method.
■
If you are troubleshooting a network problem and discover that a client computer
has an IP address on the 169.254.0.0 network, the computer has assigned itself
that address using APIPA because the computer could not locate a DHCP server.
■
Understand the various options available with the Ipconfig command. In particular, you should remember the following: /renew causes the computer to release
and then attempt to renew an IP address lease from a DHCP server; /release
causes the computer to release its IP address lease and not attempt to renew that
lease; and /flushdns purges the local DNS cache.
Key Terms
Automatic Private IP Addressing (APIPA) A feature that allows Windows XP Professional to assign itself an IP address should the computer not be able to locate
a DHCP server. Addresses in the range 169.254.0.0 through 169.254.255.255 are
reserved for APIPA.
Domain Name System (DNS)
A service that resolves domain names to IP addresses.
Dynamic Host Configuration Protocol (DHCP) A protocol for assigning IP
addresses automatically to hosts on a TCP/IP network.
host ID The portion of an IP address that identifies the network segment on which
a host is located.
IP address A 32-bit binary address (usually represented as four decimal numbers
ranging from 0 to 255) that uniquely identifies a network interface on a TCP/IP
network.
Ipconfig A command-line tool that allows you to view current TCP/IP configuration
information for a computer.
loopback address
A special reserved IP address that represents the local computer.
network ID The portion of the IP address that identifies a particular host on a network segment.
13-48
Chapter 13
Supporting TCP/IP
Pathping A command-line tool that is a combination of both Ping and Tracert, which
displays information about packet loss at every router between the host computer
and the remote one.
Ping A TCP/IP tool that allows you to check for connectivity between devices on a
network.
subnet mask A number similar to an IP address in a structure that defines which
portion of an IP address is the network ID and which portion is the host ID.
Tracert
A command-line tool that shows the route that data moves along a network.
Transmission Control Protocol/Internet Protocol (TCP/IP) The network protocol used on Windows networks and the Internet for communications between
computers and other devices.
Questions and Answers 13-49
Questions and Answers
Lesson 1 Practice: Exercise 4
Page
13-18
1. Which message appears, and what does it indicate?
The message is as follows: An Error Occurred While Renewing Interface Local Area Connection:
The Semaphore Timeout Period Has Expired. This error message indicates that Windows XP
Professional could not renew the TCP/IP configuration.
7. Is this the same IP address assigned to your computer in Exercise 3? Why or why
not?
No, this is not the same IP address assigned to the computer in Exercise 3. It is not the same
address because this address is assigned by the Windows XP Professional APIPA.
10. Were you successful? Why or why not?
No, you would not be successful. Your computer has an address assigned by APIPA, and the
test computer is on a different subnet.
Lesson 1 Review
Page
13-23
1. Why would you assign a computer a static IP address?
You can assign static IP addresses if there are no DHCP servers on the network, or you can use
the APIPA feature. You should assign a static IP address to selected network computers, such
as the computer running the DHCP Service. The computer running the DHCP Service cannot be
a DHCP client, so it must have a static IP address.
2. Which of the following statements correctly describe IP addresses? (Choose all that
apply.)
a. IP addresses are logical 64-bit addresses that identify a TCP/IP host.
b. Each network adapter card in a computer running TCP/IP requires a unique
IP address.
c. 192.168.0.108 is an example of a class C IP address.
d. The host ID in an IP address is always the last two octets in the address.
The correct answers are B and C. A is not correct because IP addresses are 32-bit, not 64-bit
addresses. D is not correct because the host ID in an IP address is determined by the subnet
mask and is not always a fixed number of octets.
3. What is the purpose of a subnet mask?
A subnet mask blocks out part of the IP address so that TCP/IP can distinguish the network ID
from the host ID.
13-50
Chapter 13
Supporting TCP/IP
4. By default, client computers running Windows XP Professional, Windows 95, or
Windows 98 obtain TCP/IP configuration information automatically from the
DHCP Service: True or false?
True
5. Your computer running Windows XP Professional was configured manually for
TCP/IP. You can connect to any host on your own subnet, but you cannot connect
to or even ping any host on a remote subnet. What is the likely cause of the problem and how would you fix it?
The default gateway might be missing or incorrect. You specify the default gateway in the Internet Protocol (TCP/IP) Properties dialog box (in the Network And Internet Connections dialog box
under Network Connections). Other possibilities are that the default gateway is offline or the
subnet mask is incorrect.
6. Your computer’s Computer Name is Pro1, and you ping Pro1. The local address
for Pro1 is returned as 169.254.128.71. What does this tell you?
APIPA of Windows XP Professional has assigned your computer Pro1. This means that the local
DHCP server is not configured properly or cannot be reached from your computer.
Lesson 2 Review
Page
13-31
1. What is DNS and what is it used for?
DNS is a naming system that is used in TCP/IP networks to translate computer names to IP
addresses. DNS makes it easy to locate computers and other resources on IP-based networks.
2. Which of the following statements correctly describes DNS root domains? (Choose
all that apply.)
a. The root domain is at the top of the hierarchy.
b. The root domain is at the bottom of the hierarchy.
c. The root domain is represented by a two- or three-character name code.
d. The root domain is represented by a period (.).
The correct answers are A and D. B is not correct because the root domain is at the top of the
hierarchy. C is not correct because the root domain is represented by a period (.); top-level
domains are represented by a two- or three-character name code.
3. Which of the following are second-level domain names? (Choose all that apply.)
a. gov
b. Microsoft.com
c. au
d. ed.gov
The correct answers are B and D. A and C are not correct because these are representative of
second-level domains.
Questions and Answers 13-51
4. ________________ provide a way to partition the domain namespace into manageable sections, and each ________________ represents a discrete portion of the
domain namespace.
Zones; zone
Lesson 3 Review
Page
13-36
1. What is a forward lookup query and how is it resolved?
A forward lookup query is the resolving of a user-friendly DNS domain name to an IP address.
To resolve a forward lookup query, a client passes a lookup query to its local name server. If the
local name server can resolve the query, it returns the IP address for the name so the client can
contact it. If the local name server cannot resolve the query, it passes the query on to one of
the DNS root servers. The DNS root server sends back a referral to a name server that can
resolve the request. The local name server sends the request to the name server it was
referred to by the DNS root server. An IP address is returned to the local name server and the
local name server sends the IP address to the client.
2. In DNS name resolution, which of the following statements about TTL are correct?
(Choose all that apply.)
a. TTL is the length of time a query can exist before it is discarded.
b. Shorter TTL values help ensure that data about the domain namespace is
more current across the network.
c. Longer TTL values increase the amount of DNS traffic.
d. Longer TTL values cause the cached values to be retained longer.
The correct answers are A, B, and D. C is not correct because longer TTL values do not increase
DNS traffic, but shorter TTL values can increase it.
3. Which of the following statements about DNS name and address resolution are
correct? (Choose all that apply.)
a. The DNS distributed database is indexed by both names and IP addresses.
b. The top-level domain in-addr.arpa is used for both forward and reverse queries.
c. In the in-addr.arpa domain, the order of the IP address octets is reversed.
d. Troubleshooting tools, such as the nslookup command-line tool, use reverse
lookup queries to report back host names.
The correct answers are C and D. A is not correct because the DNS database is indexed by
name, not by IP address. B is not correct because the top-level domain in-addr.arpa is used for
reverse lookup queries, but not for forward lookup queries.
13-52
Chapter 13
Supporting TCP/IP
Lesson 4 Review
Page
13-43
1. What is a HOSTS file, and when would you create one?
A HOSTS file is a manually maintained local file that provides host-to-IP address resolution. You
use a HOSTS file for networks without access to a DNS name server to provide host-to-IP
address and NetBIOS-to-IP name resolution for applications and services.
2. Which of the following functions do you perform by using the Advanced TCP/IP
Settings dialog box? (Choose all that apply.)
a. Edit the IP address of a DNS server.
b. Delete the IP address of a DNS server.
c. Enter additional IP addresses for other available DNS servers.
d. Edit the IP addresses of the DHCP servers on the network.
The correct answers are A, B, and C. D is not correct because you do not configure addresses
for DHCP servers by using the Advanced TCP/IP Settings dialog box.
3. What does selecting the Append These DNS Suffixes (In Order) option do?
This option allows you to specify a list of domains to try when there is a query for an unqualified
name. Queries are limited to the domains that you listed.
Case Scenario Exercise
Page
13-44
1. Andrew’s notebook has a network adapter built-in. When he is at work, Andrew
will connect the notebook to the company network. The company uses a DHCP
server to provide IP addresses to computers on the network. How should you
configure Andrew’s computer to connect to the company network?
You should configure Andrew’s computer to obtain an IP address automatically. You can do this
by opening the Properties dialog box for the LAN connection, opening the Properties dialog box
for the TCP/IP protocol, and then selecting the Obtain IP Address Automatically option.
2. When Andrew is at home, he will connect his notebook computer to a digital subscriber line (DSL) modem supplied by his ISP. The ISP has issued Andrew a static
IP address. How should you configure Andrew’s computer so that it will use the
static IP address when he is at home without interfering with the DHCP service on
the company network?
You should configure an alternate TCP/IP configuration on Andrew’s computer. To do this, you
must first make sure that his computer is configured to use automatic IP addressing as its primary configuration method. You can do this by opening the Properties dialog box for the LAN
connection, opening the Properties dialog box for the TCP/IP protocol, and then selecting the
Obtain IP Address Automatically option. When Windows XP Professional is configured to obtain
an address automatically, an Alternate Configuration tab becomes available in the Internet Protocol (TCP/IP) Properties dialog box. On this tab, select the User Configured option and enter
the appropriate IP address, subnet mask, default gateway, and DNS server addresses provided
by the ISP.
Questions and Answers 13-53
Troubleshooting Lab
Page
13-45
1. What do these results tell you?
The computer is configured to connect to a DHCP server. However, the computer is not getting
an IP address from a DHCP server successfully. You know this because the IP address is in the
range assigned by APIPA.
2. What would be your first troubleshooting step? What should you do if that first
step does not work?
You should type ipconfig /renew at the command prompt to force the computer to attempt to
renew its lease with an available DHCP server. If the command is successful and the computer
obtains a valid IP address, you have solved the problem. If the computer cannot obtain a valid
IP address, you should first verify that the DHCP server is working. (It is likely that the DHCP is
working because other users on the network can access the network.) If DHCP is functioning
properly, you should check to make sure that the network cable is connected to the network
adapter and that the network adapter is functioning properly.
14 Overview of Active
Directory Service
Exam Objectives in this Chapter:
■
This chapter does not cover any specific exam objectives. It is intended to introduce you to Active Directory directory service.
Why This Chapter Matters
A directory service uniquely defines users and resources on a network. Directory
services based on Active Directory technology in Microsoft Windows 2000
Server or Windows Server 2003 provide a single point of network management,
allowing you to add, remove, and relocate users and resources easily. This chapter introduces you to the Active Directory directory service.
Lessons in this Chapter:
■
Lesson 1: Overview of Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-2
■
Lesson 2: Important Active Directory Concepts . . . . . . . . . . . . . . . . . . . . . . 14-14
Note Active Directory is not a service that you can run on a computer running Windows XP
Professional. Active Directory runs on a computer running Windows 2000 Server or Windows
Server 2003 that is part of a domain. After the Active Directory service is installed on a
server, that server becomes a domain controller. Computers running Windows XP Professional can become members of the domain.
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have Windows XP Professional installed on your computer. You do not need access to an Active
Directory domain in order to complete this chapter.
14-1
14-2
Chapter 14
Overview of Active Directory Service
Lesson 1: Overview of Active Directory
Most computers running Windows XP Professional on large networks are clients in an
Active Directory domain running Windows 2000 Server or Windows Server 2003. Much
like a phone book acts as a directory of people’s phone numbers and street addresses,
Active Directory acts as a directory for resources on a network. Active Directory catalogs information about all the objects on a network, including users, computers, and
printers, and makes that information available throughout a network. Active Directory
provides a consistent way to name, find, manage, and secure information about these
resources.
After this lesson, you will be able to
■ Identify the advantages of Active Directory
■ Describe the logical structure of Active Directory
■ Describe the physical structure of Active Directory
■ Describe replication within an Active Directory site
Estimated lesson time: 15 minutes
The Advantages of Active Directory
In a workgroup environment, each computer running Windows XP Professional is
responsible for maintaining its own security database. Local user accounts are used to
log on to the computer and to control access to resources on the computer. Security
and administration in a workgroup are distributed. You must create local user accounts
on each computer, and although you can often manage a computer remotely, you must
manage each computer separately. The larger the network you are working with, the
more overhead this distributed management creates.
Active Directory simplifies the security and administration of resources throughout a
network (including the computers that are part of the network) by providing a single
point of administration for all objects on the network. Active Directory organizes
resources hierarchically in domains, which are logical groupings of servers and other
network resources. Each domain includes one or more domain controllers. A domain
controller is a computer running Windows 2000 Server or Windows Server 2003 on
which Active Directory is installed. The domain controller stores a complete replica of
the domain directory. To simplify administration, all domain controllers in the domain
are peers. You can make changes to any domain controller, and the updates are replicated to all other domain controllers in the domain.
Lesson 1
Overview of Active Directory
14-3
One big advantage that Active Directory provides is a single logon point for all network
resources, so a user can log on to the network with a single user name and password,
and then access any resources to which the user account is granted access. An administrator can log on to one computer and administer objects on any computer in the network.
Windows XP Professional provides a wide range of security settings that you can
enforce (you will learn all about them in Chapter 16, “Configuring Security Settings and
Internet Options”). You can enforce these settings locally by configuring them on each
computer (and that is the way you have to do it in a workgroup environment). In an
Active Directory environment, you can use a feature named Group Policy to enforce
settings on all computers on the network. This allows the network administrator to
make changes faster and improve network functionality without requiring user intervention to invoke changes.
On the CD
To learn more about how Active Directory provides single logon for network
users, view the multimedia presentation “How Active Directory Enables a Single Sign-On,”
which is included in the Multimedia folder on the CD accompanying this book.
Logical Structure of Active Directory
What makes Active Directory so configurable and so scalable is that it separates the
logical structure of the administrative hierarchy—which is made up of domains,
trees, forests, organizational units (OUs), and objects—from the physical structure of
the network itself. The logical structure of Active Directory does not rely on the physical location of servers or the network connectivity throughout the domain. This
abstraction of the logical structure from the physical structure provides the powerful
ability to structure domains according to your administrative and organizational needs.
Because Active Directory separates the logical structure of network resources from the
physical structure of the network itself, it is useful to break the discussion of Active
Directory along those same lines. The logical components of the Active Directory structure include the following (see Figure 14-1):
■
Objects
■
Organizational units
■
Domains
■
Trees
■
Forests
14-4
Chapter 14
Overview of Active Directory Service
Domain
OU
Domain
OU
Domain
Domain
OU
Tree
OU
Domain
OU
Domain OU
OU
OU
OU
Forest
OU
F14us01
Figure 14-1
Resources are organized in a logical, hierarchical structure.
Objects
An object is a distinct named set of attributes that represents a network resource.
Object attributes are characteristics of objects in the directory. For example, the
attributes of a user account might include the user’s first and last names, department,
and e-mail address (see Figure 14-2). Objects are stored in the Active Directory in a
hierarchical structure of containers and subcontainers, making the objects easier to
find, access, and manage—much like organizing files in a set of Windows folders.
In Active Directory, you can organize objects in classes, which are logical groupings of
objects. Object classes help organize objects by their similarities. For example, all user
objects fall under the object class Users. When you create a new object, it automatically
inherits attributes from its class. When you create a new user account, the information
you can enter about that user account (its attributes) are derived from the object class
Users. Microsoft defines a default set of object classes (and the attributes they define)
used by Active Directory. Of course, because Active Directory is extensible, administrators and applications can modify the object classes available and the attributes that
those classes define.
The classes and the attributes that they define are collectively referred to as the Active
Directory schema—in database terms, a schema is the structure of the tables and
fields and how they are related to one another. You can think of the Active Directory
schema as a collection of data (object classes) that defines how the real data of the
directory (the attributes of an object) is organized and stored.
Lesson 1
Overview of Active Directory
14-5
Active Directory
Computers
Objects
Comp1
Attributes
Computer name
Description
Computers
Comp2
Comp3
Attributes
First name
Last name
Logon name
Users
Users
Attribute
value
Jane Doe
John Doe
F14us02
Figure 14-2
Each Active Directory object is defined by its attributes.
Note
Some objects, known as containers, can contain other objects. For example, a
domain is a container object.
Organizational Units
Enterprises often have thousands of computers, groups, and users. If you had several
thousand computers in a single list, it would be very difficult to identify all the computers belonging to, say, the Accounting department, or located within the Boston
office. Enterprises need a way to organize these objects. An organizational unit (OU)
is a container used to organize objects within a domain into logical administrative
groups. OUs provide a way to create administrative boundaries within a domain,
allowing you to delegate administrative tasks within the domain. An OU can contain
objects such as user accounts, groups, computers, printers, applications, file shares,
and other OUs (refer to Figure 14-1).
The OU hierarchy within a domain is independent of the OU hierarchy structure of
other domains—each domain can implement its own OU hierarchy. There are no
restrictions on the depth of the OU hierarchy. However, a shallow hierarchy performs better than a deep one, so you should not create an OU hierarchy any deeper
than necessary.
14-6
Chapter 14
!
Overview of Active Directory Service
Exam Tip
You can delegate administrative tasks by assigning permissions to OUs. OUs
provide a way to structure the administrative needs of an organization without using excessive numbers of domains.
Domains
The core unit of logical structure in Active Directory is the domain. Using domains
allows administrators to divide the network into manageable boundaries. In addition,
administrators from different domains can establish their own security models (including password complexity and password-length requirements); security from one
domain can then be isolated so that other domains’ security models are not affected.
Primarily, domains provide a way to logically partition a network along the same
administrative lines as an organization. Organizations that are large enough to have
more than one domain usually have divisions that are responsible for maintaining and
securing their own resources. Grouping objects into one or more domains enables
your network to reflect your company’s organization. Domains share the following
characteristics:
■
All network objects exist within a domain, and each domain stores information
only about the objects that it contains. Theoretically, a domain directory can contain up to 10 million objects, but 1 million objects per domain is a more practical
amount.
■
A domain is a administrative boundary. Access control lists (ACLs) control access
to domain objects. ACLs contain the permissions associated with objects that control which users can gain access to an object and what type of access users can
gain. In Active Directory, objects include files, folders, shares, printers, and Active
Directory objects. All security policies and settings—such as administrative rights,
security policies, and ACLs—do not cross from one domain to another.
Trees
A tree is a hierarchical arrangement of one or more domains that share a common
schema and a contiguous namespace. In the example shown in Figure 14-3, all the
domains in the tree under the microsoft.com root domain share the namespace
microsoft.com.
Lesson 1
Overview of Active Directory
14-7
microsoft.com
uk.microsoft.com
us.microsoft.com
sis.uk.microsoft.com
F14us03
Figure 14-3 A domain tree is a hierarchical grouping of domains that share a contiguous
namespace.
The first domain you create in a tree is called the root domain. The next domain that
you add becomes a child domain of that root. Trees have the following characteristics:
■
Following DNS standards, the domain name of a child domain is the relative name
of that child domain appended with the name of the parent domain.
■
All domains within a single tree share a common schema, which is a formal definition of all object types that you can store in an Active Directory deployment.
■
All domains within a single tree share a common Global Catalog, which is the central repository of information about objects in a tree.
Forests
A forest is a grouping or hierarchical arrangement of one or more domain trees that
form a disjointed namespace, but might share a common schema and Global Catalog
(see Figure 14-4). In the example shown in Figure 14-4, the namespace microsoft.com
is represented in one tree, and the namespace msn.com is represented in another.
There is always at least one forest on a network, and it is created when the first Active
Directory–enabled computer (domain controller) on a network is installed. This first
domain in a forest, called the forest root domain, is special because it holds the schema
and controls domain naming for the entire forest. It cannot be removed from the forest
without removing the entire forest itself. Also, no other domain can ever be created
above the forest root domain in the forest domain hierarchy.
14-8
Chapter 14
Overview of Active Directory Service
microsoft.com
msn.com
us.microsoft.com
uk.microsoft.com
us.msn.com
uk.msn.com
sis.uk.microsoft.com
sis.uk.msn.com
F14us04
Figure 14-4
A forest is a group of one or more domain trees.
Forests have the following characteristics:
■
All trees in a forest share a common schema.
■
Trees in a forest have different naming structures, according to their domains.
■
All domains in a forest share a common Global Catalog.
■
Domains in a forest operate independently, but the forest enables communication
across the entire organization.
A forest is the outermost boundary of Active Directory; the directory cannot be larger
than the forest. However, you can create multiple forests and then create trust relationships between specific domains in those forests; this process would let you grant
access to resources and accounts that are outside of a particular forest.
On the CD
At this point, you should view the multimedia presentation “The Logical Structure of Active Directory,” which is included in the Multimedia folder on the CD accompanying
this book. This presentation will help deepen your understanding of Active Directory.
Real World
Using a Simple Structure
What with domains, trees, forests, and OUs, you can see how enticing it could be
to try to use all these components to organize your Active Directory implementation. However, you are best served by keeping your design as simple as your
organizational needs allow. The details involved in designing and implementing
an Active Directory setup are challenging enough without unnecessary complication. If you can work with a single domain and a couple of OUs to help organize
administrative tasks, then do it. The whole purpose of Active Directory is to ease
the burden of administration. A simple, well-thought-out design goes a long way
toward achieving this purpose.
Lesson 1
Overview of Active Directory
14-9
Physical Structure of Active Directory
The physical components of Active Directory, domain controllers and sites, are used to
mirror the physical structure of an organization.
Domain Controllers
A domain controller is a computer running Windows 2000 Server or Windows Server
2003 that stores a replica of the domain directory (local domain database). You can create any number of domain controllers in a domain. Each domain controller in a given
domain has a complete replica of that domain’s directory partition. Domain controllers
locally resolve queries for information about objects in their domain and refer queries
regarding information they do not hold to domain controllers in other domains.
Domain controllers also manage changes to directory information and are responsible
for replicating those changes to other domain controllers.
Because each domain controller holds a full replica of the directory partition for their
domain, domain controllers follow what is known as a multimaster model: Every
domain controller holds a master copy of the partition that can be used to modify that
information.
The functions of domain controllers include the following:
■
Each domain controller stores a complete copy of all Active Directory information
for that domain, manages changes to that information, and replicates those
changes to other domain controllers in the same domain.
■
Domain controllers in a domain automatically replicate all objects in the domain to
each other. When you perform an action that causes an update to Active Directory, you are actually making the change at one of the domain controllers. That
domain controller then replicates the change to all other domain controllers within
the domain. You can control replication of traffic between domain controllers in
the network by specifying how often replication occurs and the amount of data
that Active Directory replicates at one time.
■
Domain controllers immediately replicate certain important updates, such as the
disabling of a user account.
■
Active Directory uses multimaster replication, in which no one domain controller
is the master domain controller. Instead, all domain controllers within a domain
are peers, and each domain controller contains a copy of the directory database
that can be written to. Domain controllers can hold different information for short
periods of time until all domain controllers have synchronized changes to Active
Directory.
14-10
Chapter 14
Overview of Active Directory Service
■
Domain controllers detect collisions, which can occur when an attribute is modified on a domain controller before a change to the same attribute on another
domain controller is completely propagated. Collisions are detected by comparing
each attribute’s property version number, a number specific to an attribute that is
initialized on creation of the attribute. Active Directory resolves the collision by
replicating the changed attribute with the higher property version number.
■
Having more than one domain controller in a domain provides fault tolerance. If
one domain controller is offline, another domain controller can provide all
required functions, such as recording changes to Active Directory.
■
Domain controllers manage all aspects of user domain interaction, such as locating Active Directory objects and validating user logon attempts.
In general, there should be at least one domain controller for each domain in each site
for authentication purposes. However, authentication requirements for your organization determine the number of domain controllers and their locations.
Sites
A site is a combination of one or more Internet Protocol (IP) subnets connected by a
highly reliable, fast link to localize as much network traffic as possible. Typically, a site
has the same boundaries as a local area network (LAN). When you group subnets on
your network, you should combine only those subnets that have fast, cheap, and reliable network connections with one another. Fast network connections are at least 512
kilobits per second (Kbps). An available bandwidth of 128 Kbps and higher is sufficient.
With Active Directory, sites are not part of the namespace. When you browse the logical namespace, you see computers and users grouped into domains and OUs, not
sites. Sites contain only computer objects and connection objects used to configure
replication between sites.
Note
A single domain can span multiple geographical sites, and a single site can include
user accounts and computers belonging to multiple domains.
On the CD
At this point, you should view the multimedia presentation “The Physical Structure of Active Directory,” which is included in the Multimedia folder on the CD accompanying
this book.
Lesson 1
Overview of Active Directory 14-11
Replication Within an Active Directory Site
Active Directory also includes a replication feature. Replication ensures that changes
to a domain controller are reflected in all domain controllers within a domain. To
understand replication, you must understand domain controllers. A domain controller
stores a replica of the domain directory. Each domain can contain one or more domain
controllers.
Within a site, Active Directory automatically generates a ring topology for replication
among domain controllers in the same domain. The topology defines the path for
directory updates to flow from one domain controller to another until all receive the
directory updates (see Figure 14-5).
Replication topology links
DC
DC
DC
DC
DC
F14us05
Figure 14-5
Within a site, replication between domain controllers happens automatically.
The ring structure ensures that there are at least two replication paths from one domain
controller to another. Therefore, if one domain controller is down temporarily, replication still continues to all other domain controllers.
Active Directory periodically analyzes the replication topology within a site to ensure
that it is still efficient. If you add or remove a domain controller from the network or a
site, Active Directory reconfigures the topology to reflect the change.
On the CD
At this point, please view the multimedia presentation “Replication Within
Sites,” which is included in the Multimedia folder on the CD accompanying this book.
14-12
Chapter 14
Overview of Active Directory Service
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. In Active Directory, you organize resources in a logical structure. What advantage
does this provide?
2. A(n) _____________ is a distinct, named set of attributes that represents a network
resource.
3. What component do you use to organize objects into logical administrative
groups? (Choose the correct answer.)
a. Site
b. Tree
c. Domain
d. OU
4. A(n) ____________ is a grouping or hierarchical arrangement of one or more
___________________ that form a disjointed namespace.
5. The physical components of Active Directory are ______________________ and
________________.
Lesson Summary
■
The logical structure of Active Directory is made up of domains, trees, forests,
OUs, and objects. The logical structure is separated from the physical structure of
the network itself, and does not rely on the physical location of servers or the network connectivity throughout the domain. The major components of the logical
structure include the following:
❑
The core unit of logical structure in Active Directory is the domain. All network objects exist within a domain, and each domain stores information only
about the objects that it contains.
Lesson 1
■
■
Overview of Active Directory 14-13
❑
An OU is a container used to organize objects within a domain into logical
administrative groups. An OU can contain objects such as user accounts,
groups, computers, printers, applications, file shares, and other OUs.
❑
A tree is a grouping or hierarchical arrangement of one or more Active Directory domains that share a contiguous namespace.
❑
A forest is a grouping or hierarchical arrangement of one or more trees that
forms a disjointed namespace.
The physical structure of Active Directory is based the underlying network. Major
components of the physical structure include the following:
❑
A domain controller is a computer running Windows 2000 Server or Windows
Server 2003 that stores a replica of the domain directory (local domain database). You can create any number of domain controllers in a domain. Each
domain controller in a given domain has a complete replica of that domain’s
directory partition.
❑
A site is a combination of one or more IP subnets connected by a high-speed
link.
Within a site, Active Directory automatically generates a ring topology for replication among domain controllers in the same domain. The ring structure ensures
that there are at least two replication paths from one domain controller to another;
if one domain controller is down temporarily, replication continues to all other
domain controllers.
14-14
Chapter 14
Overview of Active Directory Service
Lesson 2: Important Active Directory Concepts
There are several new concepts introduced with Active Directory. It is important that
you understand their meaning as applied to Active Directory.
After this lesson, you will be able to
■ Describe the purpose of the Active Directory schema
■ Describe the purpose of a Global Catalog
■ Explain the concept of a namespace
■ Identify naming conventions used in Active Directory
Estimated lesson time: 30 minutes
What Is the Active Directory Schema?
The Active Directory schema defines objects that can be stored in Active Directory. The
schema is a list of definitions that determines the kinds of objects and the type of information about those objects that can be stored in Active Directory.
The schema contains two types of definition objects: schema class objects and schema
attribute objects. Class objects and attribute objects are defined in separate lists within
the schema (see Figure 14-6). Schema class and attribute objects are also referred to as
schema objects.
Partial list of schema
class objects
Partial list of schema
attribute objects
Computer class
object definition
Computer
Group
Users
Description
Common name
X.500 OID
Class type
Category
categoryID attribute
object definition
accountExpires
accountNameHistory
aCSAggregateTokenRatePerUser
catalogs
categories
categoryID
Description
Common name
X.500 OID
Syntax
Range limits
F14us06
Figure 14-6
The schema is made up of class objects and attribute objects.
Lesson 2
Important Active Directory Concepts 14-15
Schema class objects describe the possible Active Directory objects that can be created.
Each schema class is a collection of schema attribute objects. For each object class, the
schema defines which attributes an instance of the class must have, which additional
attributes it can have, and which object class can be a parent of the current object class.
Every object in Active Directory is an instance of a schema class object.
Schema attribute objects define the schema class objects with which they are associated. Each schema attribute is defined only once and can be used in multiple schema
classes. Because the schema definitions are themselves stored as objects in Active
Directory, they can be administered in the same manner as the rest of the objects in
Active Directory.
Installing Active Directory on the first domain controller in a network creates a default
schema that contains a set of basic schema class attributes. The default schema also
contains definitions of objects and properties that Active Directory uses internally to
function.
The Active Directory schema is extensible, which means that you can define new directory object types and attributes and new attributes for existing objects. For example,
Microsoft Exchange Server extends the schema to add e-mail properties to user
account information in Active Directory. You can also extend the schema directly by
using the Schema Manager snap-in or the Active Directory Service Interface (ADSI).
Only experienced developers or network administrators should dynamically extend
the schema by defining new classes and attributes for existing classes.
The schema is implemented and stored within Active Directory itself (in the Global Catalog), and it can be updated dynamically. As a result, an application can extend the
schema with new attributes and classes and use the extensions immediately.
Note
Write access to the schema is limited to members of the Schema Admins group by
default.
What Is the Global Catalog?
Active Directory allows users and administrators to find objects (such as files, printers,
or users) in their own domain. However, finding objects outside of the domain and
across the enterprise requires a mechanism that allows the domains to act as one
entity. A catalog service contains selected information about every object in all
domains in the directory, which is useful for performing searches across an enterprise.
The catalog service provided by Active Directory services is called the Global Catalog.
The Global Catalog is the central repository of information about objects in a tree or
forest, as shown in Figure 14-7. By default, a Global Catalog is created automatically on
14-16
Chapter 14
Overview of Active Directory Service
the first domain controller in the first domain in the forest, and the domain controller
containing the Global Catalog is known as the Global Catalog server. Using Active
Directory service’s multimaster replication, the Global Catalog information is replicated
between Global Catalog servers in other domains.
Domain B
DC3
DC1
DC2
Global
Catalog
Server
Global
Catalog
F14us07
Figure 14-7
The Global Catalog is the central repository of information about objects in a forest.
By default, the attributes stored in the Global Catalog are those most frequently used in
search operations (such as a user’s first and last name, logon name, and so forth) and
those necessary to locate a full replica of the object. As a result, you can use the Global
Catalog to locate objects anywhere in the network without replication of all domain
information between domain controllers.
Note
You use the Schema Manager snap-in to define which attributes are included in the
Global Catalog replication process.
You can designate additional domain controllers as Global Catalog servers by using the
Active Directory Sites and Services Management snap-in. When considering which
domain controllers to designate as Global Catalog servers, base your decision on the
capability of your network structure to handle replication and query traffic. The more
Global Catalog servers you have, the greater is the replication traffic. However, the
availability of additional servers can provide quicker responses to user inquiries. Every
major site in your enterprise should have a Global Catalog server.
On the CD
At this point, please view the multimedia presentation “The Role of Universal
Groups in the Logon Process,” which is included in the Multimedia folder on the CD accompanying this book. This presentation will help you understand better how Global Catalog servers
are used in Active Directory.
Important Active Directory Concepts 14-17
Lesson 2
What Is a Namespace?
Active Directory, like all directory services, is primarily a namespace, which is any
bounded area in which a name can be resolved. Name resolution is the process of
translating a name into some object or information that the name represents. The
Active Directory namespace is based on the DNS naming scheme, which allows for
interoperability with Internet technologies. An example namespace is shown in Figure 14-8.
microsoft.com
div1.microsoft.com
dept1.div1.microsoft.com
div2.microsoft.com
dept1.div2.microsoft.com
dept2.div1.microsoft.com
dept2.div2.microsoft.com
F14us08
Figure 14-8
A namespace is a bounded area in which a name can be resolved.
Using a common namespace allows you to unify and manage multiple hardware and
software environments in your network. There are two types of namespaces:
Contiguous namespace The name of the child object in an object hierarchy always
contains the name of the parent domain. A tree is a contiguous namespace.
Disjointed namespace The names of a parent object and a child of the same parent
object are not directly related to one another. A forest is a disjointed namespace.
!
Exam Tip
The word namespace is often used. Remember that, at its simplest, a
namespace is a structure (often a database) in which all objects are named similarly but are
still uniquely identified.
Naming Conventions
Every object in Active Directory is identified by a name. Active Directory uses a variety
of naming conventions: distinguished names, relative distinguished names, globally
unique identifiers, and user principal names.
14-18
Chapter 14
Overview of Active Directory Service
Distinguished Name
Every object in Active Directory has a distinguished name (DN), which uniquely
identifies an object and contains sufficient information for a client to retrieve the object
from the directory. The DN includes the name of the domain that holds the object, as
well as the complete path through the container hierarchy to the object.
For example, the following DN identifies the Firstname Lastname user object in the
microsoft.com domain (where Firstname and Lastname represent the actual first and
last names of a user account):
/DC=COM/DC=microsoft/OU=dev/CN=Users/CN=Firstname Lastname
Table 14-1 describes the attributes in the example.
Table 14-1
Distinguished Name Attributes
Attribute
Description
DC
The DC, or DomainComponentName, indicates the domain in which the object is
defined.
OU
The OU, or OrganizationalUnitName, indicates the organizational unit in which
the object exists.
CN
The CN, or CommonName, is the actual name of the object.
DNs must be unique because Active Directory does not allow duplicate DNs.
Relative Distinguished Name
Active Directory supports querying by attributes, so you can locate an object even if
the exact DN is unknown or has changed. The relative distinguished name (RDN) of
an object is the part of the name that is an attribute of the object itself. In the preceding
example, the RDN of the Firstname Lastname user object is Firstname Lastname. The
RDN of the parent object is Users.
You can have duplicate RDNs for Active Directory objects, but you cannot have two
objects with the same RDN in the same OU. For example, if a user account is named
Jane Doe, you cannot have another user account called Jane Doe in the same OU.
However, objects with duplicate RDNs can exist in separate OUs because they have
different DNs (see Figure 14-9).
Lesson 2
Important Active Directory Concepts 14-19
Distinguished name (DN)
Relative distinguished name (RDN)
Domain_name / Users / Sales / Managers / Jane Doe
Domain_name
Users OU
Sales OU
Managers OU
Jane Doe
e
Jane Doe
• DN must be unique
in the Directory.
• RDN must be unique
in an OU.
F14us09
Figure 14-9
DNs must be unique to a directory, whereas RDNs are unique within an OU.
Globally Unique Identifier
A globally unique identifier (GUID) is a 128-bit number that is guaranteed to be
unique. GUIDs are assigned to objects when they are created. The GUID never
changes, even if you move or rename the object. Applications can store the GUID of
an object and use it to retrieve that object regardless of its current DN.
User Principal Name
User accounts have a “friendly” name, the user principal name (UPN). The UPN is
composed of a “shorthand” name for the user account and the DNS name of the tree
in which the user account object resides. For example, user Firstname Lastname (substitute the first and last names of an actual user) in the microsoft.com tree might have
a UPN of FirstnameL@microsoft.com (using the full first name and the first letter of the
last name).
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
14-20
Chapter 14
Overview of Active Directory Service
1. What is the Active Directory schema?
2. Which of the following statements are correct for Active Directory Global Catalogs? (Choose all that apply.)
a. The Global Catalog is the central repository of information about objects in a
tree or forest.
b. By default, a Global Catalog is created automatically on the first domain controller in the first domain in the forest.
c. The Global Catalog is a list of definitions that determines the kinds of objects
and the type of information about those objects that can be stored in Active
Directory.
d. You can have only one Global Catalog server in each domain.
3. Every object in Active Directory has a(n) _______________________________ that
uniquely identifies an object and contains sufficient information for a client to
retrieve the object from the Directory.
4. A(n) _________________________________ is a 128-bit number that is assigned to
an object when it is created and is guaranteed to be unique.
5. What is the difference between a contiguous namespace and a disjointed
namespace? Give an example of each type of namespace.
Lesson Summary
■
The schema contains a formal definition of the contents and structure of Active
Directory, including all classes and attributes. Installing Active Directory on the
first domain controller in a network creates a default schema.
Case Scenario Exercise 14-21
■
The Global Catalog contains selected information about every object in all
domains in the directory.
■
In a contiguous namespace, the name of the child object in an object hierarchy
always contains the name of the parent domain. A tree is an example of a contiguous namespace. In a disjointed namespace, the names of a parent object and of
a child of the same parent object are not directly related to one another. A forest
is an example of a disjointed namespace.
■
Every object in Active Directory is identified by a name. Active Directory uses a
variety of naming conventions: DNs, RDNs, GUIDs, and UPNs.
Case Scenario Exercise
In this exercise, you will read a scenario about Active Directory concepts and then
answer the questions that follow. If you have difficulty completing this work, review
the material in this chapter before beginning the next chapter. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
Scenario
You are an administrator who has just been hired by a small company named Fabrikam, Inc., a marketing company with its headquarters in Memphis, TN, and one
branch office in Chicago, IL. The company is building its network from scratch and has
already decided on the following:
■
Because the Memphis headquarters is located in a single building, the company
will deploy a single high-speed LAN.
■
It will deploy another single high-speed LAN in the branch office in Chicago.
■
The two LANs will be connected by a high-speed, dedicated wide area network
(WAN) connection.
■
The main IT staff will be located in Memphis. A smaller IT staff will be located in
Chicago and will need administrative authority over the Chicago network.
■
The company has acquired the domain name fabrikam.com and wants to use that
name throughout its implementation in both Memphis and Chicago.
■
Users should be able to log on easily anywhere within the company (both locations) without having to specify where they are logging on.
14-22
Chapter 14
Overview of Active Directory Service
Questions
1. Would you suggest a single domain or multiple domains for this organization?
Why?
2. How many sites should you suggest? Why?
3. Which logical Active Directory structure would allow you to group objects in the
Chicago location so that local administrators could manage those objects?
4. How many Global Catalog servers should you suggest and where would you
place them?
Troubleshooting Lab
You are working as an administrator for a company named Contoso, Ltd., which produces specialized product-labeling machines for large manufacturing companies. You
are working with a group of administrators and managers who are trying to determine
the best Active Directory structure for a new network. The company is structured in the
following manner:
■
Contoso, Ltd. has a main office in Dallas, TX, and a branch office in Houston, TX.
■
Contoso, Ltd. has recently acquired another company named Litware, Inc. Litware
is located in Austin, TX.
Chapter Summary 14-23
Contoso, Ltd. has registered the domain name contoso.com and wants to use it for the
main and branch office (in Dallas and Houston). However, they want the domain structure to reflect the different locations.
The company also owns the domain name litware.com and wants to continue using
that name in the domain structure to reflect the acquired company, so that the acquired
company maintains its own identity.
1. One of the managers has proposed a model that uses a single domain tree with
two domains. Why would this type of model not meet the requirements?
2. Using what you have learned in this chapter, sketch a diagram of a domain structure that meets these requirements.
Chapter Summary
■
Active Directory is the directory service included in the Windows 2000 Server and
Windows Server 2003 networks. A directory service is a network service that identifies all resources on a network and makes them accessible to users and applications. Active Directory offers simplified administration, scalability, and open
standards support.
■
The logical structure of Active Directory is made up of domains, trees, forests,
OUs, and objects. The logical structure is separated from the physical structure
of the network itself, and does not rely on the physical location of servers or the
network connectivity throughout the domain. The physical structure of Active
Directory is based on the underlying network and is made up of domain controllers and sites.
14-24
Chapter 14
■
Overview of Active Directory Service
There are a number of concepts important to your understanding of Active Directory. These concepts include:
❑
The schema contains a formal definition of the contents and structure of
Active Directory, including all classes and attributes. Installing Active Directory on the first domain controller in a network creates a default schema.
❑
The Global Catalog contains selected information about every object in all
domains in the directory.
❑
In a contiguous namespace, the name of the child object in an object hierarchy always contains the name of the parent domain. A tree is an example of
a contiguous namespace. In a disjointed namespace, the names of a parent
object and of a child of the same parent object are not directly related to one
another. A forest is an example of a disjointed namespace.
❑
Every object in Active Directory is identified by a name. Active Directory uses
a variety of naming conventions: distinguished names, relative distinguished
names, globally unique identifiers, and user principal names.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
You can delegate administrative tasks by assigning permissions to OUs, which
provide a way to structure the administrative needs of an organization without
using excessive numbers of domains.
■
At its simplest, a namespace is a structure in which all objects are named similarly,
but are still uniquely identified.
Key Terms
Active Directory The directory service included in Windows 2000 Server and Windows Server 2003 that identifies all resources on a network and makes them accessible to users and applications.
Active Directory schema The structure of the tables and fields and how they are
related to one another. In Active Directory, the schema is a collection of data
(object classes) that defines how the real data of the directory (the attributes of an
object) is organized and stored.
Exam Highlights 14-25
distinguished name (DN) A name that uniquely identifies an object within Active
Directory and contains sufficient information for a client to retrieve the object from
the directory.
domain A logical grouping of servers and other network resources under a single
domain name. The domain is the basic unit of replication and security in an Active
Directory network.
domain controller A computer running Windows 2000 Server or Windows Server
2003 on which the Active Directory service is installed. The domain controller
stores a complete replica of the domain directory.
forest A grouping or hierarchical arrangement of one or more domain trees that form
a disjointed namespace but can share a common schema and Global Catalog.
Global Catalog
est.
The central repository of information about objects in a tree or for-
globally unique identifier (GUID) A 128-bit number, guaranteed to be unique, that
is assigned to an object created in Active Directory.
logical structure The administrative structure of Active Directory that includes
domains, trees, organizational units, and objects.
namespace
object
Any bounded area in which a name can be resolved.
A distinct named set of attributes that represents a network resource.
organizational unit (OU) A container used to organize objects within a domain into
logical administrative groups. OUs provide a way to create administrative boundaries within a domain.
relative distinguished name (RDN)
within a particular OU.
A name that uniquely identifies an object
replication The process of copying information from one location to another. In
Active Directory, replication of directory information happens automatically
between domain controllers in the same site.
site
A combination of one or more IP subnets connected by a highly reliable and fast
link to localize as much network traffic as possible.
tree
A hierarchical arrangement of one or more domains that share a common
schema and a contiguous namespace.
user principal name (UPN) A “shorthand” name representing the user account and
the DNS name of the tree where the user account object resides.
14-26
Chapter 14
Overview of Active Directory Service
Questions and Answers
Lesson 1 Review
Page
14-12
1. In Active Directory, you organize resources in a logical structure. What advantage
does this provide?
Grouping resources logically enables you to find a resource by its name rather than its physical
location. Because you group resources logically, Active Directory makes the network’s physical
structure transparent to users.
2. A(n) _____________ is a distinct, named set of attributes that represents a network
resource.
object
3. What component do you use to organize objects into logical administrative
groups? (Choose the correct answer.)
a. Site
b. Tree
c. Domain
d. OU
The correct answer is D. OUs are user-created containers used to organize resources for administration. A is not correct because a site is a physical structure that relies on the underlying network architecture. B is not correct because a tree is a hierarchical grouping of domains that
share a contiguous namespace. C is not correct because a domain represents computers,
users, and other objects that share a common security database.
4. A(n) ____________ is a grouping or hierarchical arrangement of one or more
___________________ that form a disjointed namespace.
Forest; domain trees
5. The physical components of Active Directory are ______________________ and
________________.
Domain controllers; sites
Lesson 2 Review
Page
14-19
1. What is the Active Directory schema?
The Active Directory schema defines objects that can be stored in Active Directory. The schema
is a list of definitions that determines the kinds of objects and the type of information about
those objects that can be stored in Active Directory.
Questions and Answers 14-27
2. Which of the following statements are correct for Active Directory Global Catalogs? (Choose all that apply.)
a. The Global Catalog is the central repository of information about objects in a
tree or forest.
b. By default, a Global Catalog is created automatically on the first domain controller in the first domain in the forest.
c. The Global Catalog is a list of definitions that determines the kinds of objects
and the type of information about those objects that can be stored in Active
Directory.
d. You can have only one Global Catalog server in each domain.
The correct answers are A and B. C is not correct because this statement describes the Active
Directory schema, not a Global Catalog. D is not correct because you can have multiple Global
Catalog servers in a domain.
3. Every object in Active Directory has a(n) _______________________________ that
uniquely identifies an object and contains sufficient information for a client to
retrieve the object from the Directory.
DN
4. A(n) _________________________________ is a 128-bit number that is assigned to
an object when it is created and is guaranteed to be unique.
GUID
5. What is the difference between a contiguous namespace and a disjointed
namespace? Give an example of each type of namespace.
In a contiguous namespace, the name of the child object in an object hierarchy always contains
the name of the parent domain. A tree is a contiguous namespace. In a disjointed namespace,
the names of a parent object and of a child of the same parent object are not directly related
to one another. A forest is a disjointed namespace.
Case Scenario Exercise Questions
Page
14-22
1. Would you suggest a single domain or multiple domains for this organization?
Why?
You should suggest a single domain for the company. Because the company is relatively small
and is connected by a high-speed, dedicated link there is no real need to use separate domains
for the locations. Also, the company wants users to be able to log on anywhere in the company
without specifying a logon location, which requires a single domain. With two domains, users
would sometimes need to specify the domain to which they were logging on.
14-28
Chapter 14
Overview of Active Directory Service
2. How many sites should you suggest? Why?
You should suggest that this company create two sites: one for the Memphis network and one
for the Chicago network. Sites are based on the underlying network structure. Because there
are two distinct high-speed LANs, it would be best to create a site for each.
3. Which logical Active Directory structure would allow you to group objects in the
Chicago location so that local administrators could manage those objects?
OUs would allow you to create administrative boundaries for each location.
4. How many Global Catalog servers should you suggest and where would you
place them?
At a minimum, you should place one Global Catalog server in each site so that users can
access the Global Catalog even if the link between the two sites is down.
Troubleshooting Lab
Page
14-22
1. One of the managers has proposed a model that uses a single domain tree with
two domains. Why would this type of model not meet the requirements?
The company wants to maintain two distinct namespaces (contoso.com and litware.com).
Because all domains in a single tree must share a contiguous namespace, the manager’s
model will not work.
2. Using what you have learned in this chapter, sketch a diagram of a domain structure that meets these requirements.
Because there are two distinct namespaces (contoso.com and litware.com), you must use a
separate tree to represent each namespace. Within the litware.com tree, you could create a
single domain named litware.com. Within the contoso.com tree, you could create a root
domain named contoso.com, and then create child domains named dallas.contoso.com and
houston.contoso.com. This would satisfy the requirement that the domain structure represent the different locations of the Dallas and Houston offices. An example sketch is shown
in Figure 14-10.
contoso.com
dallas.contoso.com
litware.com
houston.contoso.com
F14us10
Figure 14-10
A disjointed namespace requires multiple domain trees.
15 Configuring Network and
Internet Connections
Exam Objectives in this Chapter:
■
■
■
Implement, manage, and troubleshoot input and output (I/O) devices.
❑
Implement, configure, and manage modems.
❑
Install, configure, and manage wireless devices.
❑
Install, configure, and manage network adapters.
Connect to computers by using dial-up networking.
❑
Connect to computers by using a virtual private network (VPN)
connection.
❑
Create a dial-up connection to connect to a remote access server.
❑
Connect to the Internet by using dial-up networking.
❑
Configure and troubleshoot Internet Connection Sharing (ICS).
Configure, manage, and troubleshoot an Internet Connection Firewall.
Note
Internet Connection Firewall is the software firewall built into versions of Windows XP
Professional prior to applying the Service Pack 2 update. After installing Service Pack 2, the
firewall is updated to the new (and much more robust) Windows Firewall. This chapter focuses
on Windows Firewall, and the exam has been updated for Windows Firewall, as well. However,
the official objectives still list Internet Connection Firewall.
Why This Chapter Matters
Microsoft Windows XP Professional provides many new features to simplify the
configuration of network and Internet connections for home and small business
environments. In this chapter, you learn how to configure local area network
(LAN), dial-up, and wireless connections. You also learn about Windows Firewall, which protects your computer from unwanted traffic, and Internet Connection Sharing (ICS), which allows you to share one connection to the Internet
with all computers on your network.
15-1
15-2
Chapter 15
Configuring Network and Internet Connections
Lessons in this Chapter:
■
Lesson 1: Configuring Local Area Network (LAN) Connections . . . . . . . . . . . 15-3
■
Lesson 2: Configuring Dial-Up Connections . . . . . . . . . . . . . . . . . . . . . . . . 15-19
■
Lesson 3: Configuring Wireless Connections . . . . . . . . . . . . . . . . . . . . . . . 15-30
■
Lesson 4: Configuring Internet Connection Sharing (ICS) . . . . . . . . . . . . . . 15-42
■
Lesson 5: Configuring Windows Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . 15-46
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have
installed Microsoft Windows XP Professional on the computer and have a network
adapter and modem installed.
Lesson 1
Configuring Local Area Network (LAN) Connections
15-3
Lesson 1: Configuring Local Area Network (LAN)
Connections
Windows XP Professional makes configuring LAN connections easy. When you install
a network adapter, Windows creates a LAN connection automatically; it is just up to
you to configure it. This lesson shows you how to view the LAN connections on a computer and how to configure those connections.
After this lesson, you will be able to
■ View LAN connections on a computer running Windows XP Professional.
■ Configure a LAN connection.
■ Troubleshoot a LAN connection.
■ Use the New Connection Wizard to configure a connection.
Estimated lesson time: 60 minutes
Viewing LAN Connections
Windows XP Professional provides a central location for viewing and configuring network connections: the Network Connections window, shown in Figure 15-1. You can
open the Network Connections window in several ways, including the following:
■
In Control Panel, click Network And Internet Connections, and then click Network
Connections.
■
In the Start menu or the desktop (if it is displayed), right-click My Network Places,
and then select Properties.
■
Directly from the Start menu if you first configure the Start menu to display the
Network Connections folder.
The icons that are used for each connection provide visual clues for the type and status
of the connection. These visual clues include the following:
■
Dial-up connections (such as the Contoso.com connection in Figure 15-1) have a
small picture of a phone and modem.
■
LAN or high-speed Internet connections (such as the Local Area Connection in
Figure 15-1) have a small picture meant to represent a network cable connection.
■
Disabled or disconnected connections (such as the Contoso.com connection in
Figure 15-1) are dimmed to show that they are disabled or disconnected.
■
Connections that are protected with Windows Firewall have a small picture of a
lock (such as the Contoso.com connection in Figure 15-1). You will learn more
about Windows Firewall in Lesson 5, “Configuring Windows Firewall.”
15-4
Chapter 15
Configuring Network and Internet Connections
F15us01.bmp
Figure 15-1
The Network Connections window shows LAN and dial-up connections.
Configuring a LAN Connection
Much of the configuration of a LAN connection happens in the Network Connections
window. Right-clicking a particular connection provides a shortcut menu with commands for working with the connection.
How to View the Status of a Connection
To view the current status of a connection, right-click the connection, and then click
Status. This action opens the Local Area Connection Status dialog box. The General tab
of this dialog box (see Figure 15-2) shows the connection status and the activity on the
connection since it was last enabled (the number of data packets sent and received
over the connection).
The Support tab of the Local Area Connection Status dialog box (see Figure 15-3)
shows you the Transmission Control Protocol/Internet Protocol (TCP/IP) configuration
information (Internet Protocol [IP] address, subnet mask, and so on) for the connection. Click Details to view extended TCP/IP information, including the physical address
of the network adapter, Dynamic Host Configuration Protocol (DHCP) server and lease
information, and Domain Name System (DNS) server addresses.
Tip As you learned in Chapter 13, “Supporting TCP/IP,” you can also view the TCP/IP information for connections using the ipconfig command-line utility. The advantage of using ipconfig is
that by typing ipconfig /all at the command prompt, you can view information for all connections
on the computer at once. See Chapter 13 for more information on using this command.
Lesson 1
Configuring Local Area Network (LAN) Connections
15-5
F15us02.bmp
Figure 15-2
View the current status of a connection.
Figure 15-3
View the TCP/IP information for a connection.
F15us03.bmp
How to Rename a Local Area Connection
If you have more than one network adapter installed, Windows names the first connection Local Area Connection, the second connection Local Area Connection 2, and so
on. For clarity, consider using a naming scheme that makes it easy to identify what the
15-6
Chapter 15
Configuring Network and Internet Connections
different connections are for. To rename a connection, use these steps:
1. In the Network Connections window, right-click the connection, and then click
Rename.
2. Type the new name for the connection, and then press ENTER.
How to Disable and Enable a Local Area Connection
There might be cases in which you will want to temporarily disable a connection without
deleting it. To disable and enable a connection, use these steps:
1. In the Network Connections window, right-click the connection, and then click
Disable.
Windows disables the connection. The icon for the connection appears dimmed in
the Network Connections window.
2. To enable a connection, right-click the connection, and then click Enable.
How to Bridge a Connection
The Network Bridge feature allows you to connect network segments (groups of networked computers) without having to use a router or bridge. The feature essentially
turns the computer running Windows XP Professional into a router by allowing it to
pass data between network adapters installed on the computer, each of which is
attached to a different network segment. Network Bridge allows you to connect different types of network media. Before Network Bridge, if you were using more than one
media type, you needed a different subnet for each media type. Packet forwarding
would be required because different protocols are used on different media types. Network Bridge automates the configuration that is required to forward information from
one media type to another.
To configure Network Bridge, do the following:
1. In the Network Connections window, select each of the network connections that
you want to make part of the bridge.
2. Right-click one of the selected network connections, and then click Bridge
Connections.
The following are important Network Bridge considerations:
■
Only Ethernet adapters, IEEE-1394 adapters, or Ethernet-compatible adapters,
such as wireless or home phone network adapter (HPNA), can be part of the
Network Bridge.
■
Adapters that have Windows Firewall or ICS enabled cannot be included in the
Network Bridge.
Lesson 1
Configuring Local Area Network (LAN) Connections
15-7
■
You can add connections to the Network Bridge after it has been created by using
the Add To Bridge menu command.
■
Only one bridge can exist on a Windows XP Professional computer, but it can be
used to connect as many different media types as the computer can physically
accommodate.
■
You cannot create a bridge connection on computers running Windows 2000 or
earlier.
How to Repair a Connection
Sometimes LAN connections stop working. This problem can happen for many reasons, including problems with the configuration of the network connection. When you
are troubleshooting a networking problem, a good place to start is by using the Repair
function provided by Windows XP Professional.
To repair a LAN connection, in the Network Connections window, right-click the
connection, and then click Repair. When you use the Repair command, Windows takes
the following actions:
1. Attempts to renew the connections DHCP lease, which is equivalent to using the
ipconfig /renew command at the command prompt.
2. Flushes the Address Resolution Protocol (ARP) cache, which is equivalent to using
the arp -d command at the command prompt.
3. Reloads the NetBIOS name cache, which is equivalent to using the nbtstat -R command at the command prompt. A NetBIOS name update is also sent, which is
equivalent to using the nbtstat –RR command.
4. Flushes the Domain Name System (DNS) cache, which is equivalent to using the
ipconfig /flushdns command at the command prompt.
5. Registers the computer’s DNS name, which is equivalent to using the ipconfig
/registerdns command at the command prompt.
See Also
For more information on the way the actions taken by the Repair command work,
see Chapter 13.
6. Restarts IEEE 802.1x Authentication (which you will learn more about in the
section “Authentication,” later in this chapter).
!
Exam Tip
For the exam, be aware of the actions that happen when you repair a network
connection. In particular, know that repairing a connection (or using ipconfig /renew at the
command prompt) forces the computer to release its current IP address and attempt to renew
its lease with a DHCP server.
15-8
Chapter 15
Configuring Network and Internet Connections
Setting Options for a Connection
To configure options for LAN connection, you will open the Properties dialog box for
that connection, shown in Figure 15-4. To do so, in the Network Connections window,
right-click a connection, and then click Properties. The Connect Using section shows
the network adapter associated with the LAN connection. Click the Configure button to
open the Properties dialog box for the adapter; this is the same Properties dialog box
you see if you view the properties for the network adapter through Device Manager
(which is covered in Chapter 6, “Installing, Managing, and Troubleshooting Hardware
Devices and Drivers”).
F15us04.bmp
Figure 15-4
Configure a connection by using its Properties dialog box.
The Local Area Network Connection Properties dialog box also lists networking components installed on the computer. The components listed are available to all connections. Uninstalling a component makes the component unavailable to any network
connection. Clearing the check box next to a component disables that component for
only the connection you are viewing. The following networking components are
installed by default for all LAN connections:
■
Client For Microsoft Networks
access a Microsoft-based network.
This component provides the capability to
■
File And Printer Sharing for Microsoft Networks This component provides the
capability to share files and printers on the local computer with network users that
access the computer through the given connection. If you have multiple connections
on a computer, you can select or clear this check box for each connection individually, thus controlling the connections on which File And Printer Sharing is enabled.
Lesson 1
Configuring Local Area Network (LAN) Connections
15-9
■
QoS Packet Scheduler Quality of service (QoS) is a set of standards and mechanisms that improves quality data transmission for QoS-enabled programs by
smoothing bursts and peaks in network traffic to an even flow and prioritizing
more-important traffic over less-important traffic.
■
Internet Protocol (TCP/IP) This component indicates that the TCP/IP protocol
is installed for the connection. You cannot uninstall TCP/IP for a LAN connection,
but you can disable the protocol. Select the protocol and click Properties to open
the Internet Protocol (TCP/IP) Properties dialog box, which you can use to configure the TCP/IP settings for the connection. You can learn more configuring
TCP/IP settings in Chapter 13.
How to Install, Disable, and Uninstall Network Components You can install and remove
network components, such as additional network clients and protocols, by using the
properties box of the network connection. You can have multiple clients, services, and
protocols loaded and functioning simultaneously on a single connection.
To install a network component, follow these steps:
1. Open the Properties dialog box for the network connection.
2. Click Install. The Select Network Component Type dialog box appears, as shown
in Figure 15-5.
F15us05.bmp
Figure 15-5 Choose network components to install.
3. Select the type of network component that you want to install, and then click Add.
4. In the dialog box that appears, select the desired component and click OK, or
click Have Disk to install a component that does not appear on the list.
When you install a network component, the component becomes available to all connections automatically. You should disable components that are not used by a particular network connection. This process reduces the amount of network traffic generated
on the connection, therefore increasing overall performance. To disable a component
without uninstalling it, open the Properties dialog box for the network connection and
clear the check box.
15-10
Chapter 15
Configuring Network and Internet Connections
When a component is no longer required by any connection, you can uninstall it.
Uninstalling a component removes it from all connections.
To uninstall a network component, follow these steps:
1. Open the Properties dialog box of the network connection.
2. Select the network component that you want to remove.
3. Click Uninstall, and then click Yes to confirm the uninstall operation.
Authentication The Authentication tab of the Local Area Connection Properties dialog
box, shown in Figure 15-6, allows you to configure IEEE 802.1x authentication for
a connection. The IEEE 802.1x standard allows authentication and access to 802.11
wireless networks and wired Ethernet networks. When a user wants access to services
through a particular LAN connection, the connection adopts one of two roles: authenticator or supplicant. As an authenticator, the connection enforces user authentication
before it allows user access. As a supplicant, the connection requests access to the services that the user wants access to. An authentication server checks the supplicant’s
credentials, and then lets the authenticator know if the supplicant is authorized to
access the authenticator’s services.
F15us06.bmp
Figure 15-6
Configure IEEE 802.1x authentication.
The Authentication tab provides the following options:
■
Enable IEEE 802.1x Authentication For This Network Select this check box to
enable authentication. If you clear this check box, the rest of the options on this tab
Lesson 1
Configuring Local Area Network (LAN) Connections 15-11
become unavailable. When authentication is enabled, you can choose from three
types of authentication (referred to as EAP, or Extensible Authentication Protocol):
❑
Smart Card Or Other Certificate
❑
MD5-Challenge
❑
Protected EAP (PEAP)
■
Authenticate As Computer When Computer Information Is Available This
option specifies whether the computer attempts authentication within an Active
Directory domain environment when a user is not logged on. This option requires
that a computer account for the computer exists in the domain.
■
Authenticate As Guest When User Or Computer Information Is
Unavailable If a user account or computer account does not exist within a
domain, this option allows the computer to attempt authentication as a guest. If
you authenticate as a guest, the network infrastructure might limit the number of
computers on the network that you can communicate with.
Note
The Advanced tab of the of the Local Area Connection Properties dialog box allows
you to configure Windows Firewall and ICS. These options are the focus of Lesson 4,
“Configuring Internet Connection Sharing (ICS),” and Lesson 5 “Configuring Windows Firewall.”
The New Connection Wizard
Although it is not hard to configure a network connection in Windows XP Professional
manually, Windows does offer a wizard (the New Connection Wizard) that can perform much of the work of configuring a network connection for different uses. Understanding the options found in this wizard will help you configure connections
efficiently. You can start the New Connection Wizard from the Network Connections
window by clicking Create A New Connection.
You can configure four types of connections by using the New Connection Wizard:
■
Connect To The Internet
■
Connect To The Network At My Workplace
■
Set Up A Home Or Small Office Network
■
Set Up An Advanced Connection
Note
This section covers the following options: Connect To The Internet, Connect To The
Network At My Workplace, and Set Up An Advanced Connection. Selecting Set Up A Home Or
Small Office Network allows you to configure ICS, which is covered in Lesson 4.
15-12
Chapter 15
Configuring Network and Internet Connections
Connect To The Internet
To set up an Internet connection, start the New Connection Wizard, and then click
Next to skip the Welcome page. The next page you see is Network Connection Type
(see Figure 15-7).
F15us07.bmp
Figure 15-7
to create.
Use the Network Connection Type page to select the type of network connection
Select Connect To The Internet on the Network Connection Type page and click Next.
The New Connection Wizard displays the Getting Ready page, which has the following
three options:
■
Choose From A List Of Internet Service Providers (ISPs)
■
Set Up My Connection Manually
■
Use The CD I Got From An ISP
Choose From A List Of Internet Service Providers (ISPs) If you select Choose From A
List Of Internet Service Providers (ISPs) on the Getting Ready page, and then click
Next, the New Connection Wizard displays the Completing The New Connection Wizard page. You can select Get Online With MSN or Select From A List Of Other ISPs.
When you have made your selection, click Finish.
Set Up My Connection Manually If you select Set Up My Connection Manually on the
Getting Ready page, and then click Next, the New Connection Wizard displays the
Internet Connection page. The following three options are available in the Internet
Connection page:
■
Connect Using A Dial-Up Modem
Lesson 1
Configuring Local Area Network (LAN) Connections 15-13
Select this option if your connection uses a modem and a regular or Integrated Services Digital Network (ISDN) phone line. If you select Connect Using A Dial-Up
Modem and click Next, you are prompted to enter the information in Table 15-1.
Table 15-1
Connect Using A Dial-Up Modem
New Connection
Wizard Page
Description
Connection Name
The name of your ISP is typically used as the connection name
for dial-up connections to the Internet.
Phone Number
To Dial
The phone number you use to connect to your ISP.
Internet Account
Information
You will be prompted to enter the ISP account name and password. You can select or clear the following two check boxes:
■ Use This Account Name And Password When Anyone
Connects To The Internet From This Computer
■ Make This The Default Internet Connection
Note The New Connection Wizard automatically enables Windows Firewall for all new
connections. See Lesson 5 for more information.
When you have entered the information on each of the pages listed in Table 15-1, the
New Connection Wizard displays the Completing The New Connection Wizard page,
which displays a summary of the information you entered to manually create a connection
to the Internet. If you want a shortcut to appear on your desktop, select the Add A Shortcut To This Connection To My Desktop check box. Click Finish to create the connection.
■
Connect Using A Broadband Connection That Requires A User And Password
Select this option if your high-speed connection uses either a digital subscriber
line (DSL) or cable modem. This type of connection is also known as Point-toPoint Protocol over Ethernet (PPPoE). If you select Connect Using A Broadband
Connection That Requires A User And Password and click Next, you are also
prompted to enter the information in Table 15-1.
■
Connect Using A Broadband Connection That Is Always On
Select this option if your high-speed connection uses a cable modem, DSL, or LAN
connection. If you select Connect Using A Broadband Connection That Is Always
On, the New Connection Wizard displays the Completing The New Connection
Wizard page because the connection should already be configured and working.
Use The CD I Got From An ISP If you select Use The CD I Got From An ISP on the
Getting Ready page, and then click Next, the New Connection Wizard displays the
Completing The New Connection Wizard page. You are instructed to click Finish and
15-14
Chapter 15
Configuring Network and Internet Connections
then insert the CD-ROM you received from your ISP. The Setup program on the CDROM should start automatically to assist you in connecting to the Internet.
Connect to a Private Network at Your Workplace
If you want to connect to a private network, select Connect To The Network At My
Workplace on the Network Connection Type page (refer to Figure 15-7) and click Next.
The New Connection Wizard displays the Network Connection page, which has the
following two options:
■
Dial-Up Connection
■
Virtual Private Network Connection
Dial-Up Connection Select this option if you want to connect to the network at your
office using a modem and phone line or an ISDN phone line. If you select Dial-Up
Connection and click Next, you are prompted to enter the information in Table 15-2.
Table 15-2
Dial-Up Connection Information
New Connection
Wizard Page
Description
Connection Name
The name of your company or the name of the server to which
you will be connecting is typically used as the connection name for
dial-up connections when you are connecting to a private network.
Phone Number To Dial
The phone number used to make the connection.
When you have entered the information on each of the pages listed in Table 15-2, the
New Connection Wizard displays the Completing The New Connection Wizard page,
which displays a summary of the information you entered to create the connection. If
you want a shortcut to appear on your desktop, select the Add A Shortcut To The Connection To My Desktop check box. Click Finish to create the connection.
Virtual Private Network Connection Select this option if you want to connect to the
network at your office using a virtual private network (VPN) connection over the Internet. If you select Virtual Private Network Connection and click Next, you are prompted
to enter the information in Table 15-3.
Table 15-3
Virtual Private Network Connection Information
New Connection
Wizard Page
Description
Connection Name
The name of your company or the name of the server to which you
will be connecting is typically used as the connection name.
VPN Server Selection
The host name or IP address of the VPN server to which you are
connecting.
Lesson 1
Configuring Local Area Network (LAN) Connections 15-15
When you have entered the information on each of the pages listed in Table 15-3, the
New Connection Wizard displays the Completing The New Connection Wizard page,
which displays a summary of the information you entered to create the connection. If
you want a shortcut to appear on your desktop, select the Add A Shortcut To The Connection To My Desktop check box. Click Finish to create the connection.
Set Up An Advanced Connection
If you want to connect directly to another computer using a serial, parallel, or infrared
port or to set up this computer so that other computers can connect to it, select Set Up
An Advanced Connection on the Network Connection Type page (refer to Figure 15-7).
The New Connection Wizard displays the Advanced Connection Options page, which
offers two options:
■
Accept Incoming Connections This option allows you to configure and
administer inbound connections on a computer running Windows XP Professional. For more information about this option, see Lesson 2, “Configuring Dial-Up
Connections,” later in this chapter.
■
Connect Directly To Another Computer This option allows you to create a
direct cable connection to another computer. If you select this option and click
Next, you must provide the information in Table 15-4.
Table 15-4
Connect Directly To Another Computer
New Connection
Wizard Page
Description
Host Or Guest
Select Host if your computer contains information that other computers will access; select Guest if your computer will be accessing information on a computer configured as a host.
Connection
Device
Select the device you want to use to make this connection. Possible
choices include Direct Parallel (LPT1), Communications Port (COM1),
and Communications Port (COM2).
User Permissions
Select the users who can connect to this computer.
When you have entered the information on each of the pages listed in Table 15-4, the
New Connection Wizard displays the Completing The New Connection Wizard page,
which displays a summary of the information you entered to create the connection.
If you want a shortcut to appear on your desktop, select the Add A Shortcut To The
Connection To My Desktop check box. Click Finish to create the connection.
Practice: Configuring a LAN Connection
In this practice, you use the New Connection Wizard to configure an outbound connection to a private network.
15-16
Chapter 15
Configuring Network and Internet Connections
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Network Connections.
4. In the Network Connections window, click Create A New Connection.
Windows XP Professional starts the New Connection Wizard.
5. On the Welcome To The New Connection Wizard page, click Next.
The New Connection Wizard displays the Network Connection Type page.
6. Click Connect To The Network At My Workplace, and then click Next.
The New Connection Wizard displays the Network Connection page.
7. Click Virtual Private Network Connection, and then click Next.
The New Connection Wizard displays the Connection Name page.
8. In the Company Name text box, type Work, and then click Next.
The New Connection Wizard displays the Public Network page.
9. Click Do Not Dial The Initial Connection, and then click Next.
The New Connection Wizard displays the VPN Server Selection page.
10. In the Host Name Or IP Address text box, type 192.168.1.202, and then click Next.
Note
If your computer is on a network and there is a valid address that you can use to test
your outbound connection, use that address instead of 192.168.1.202.
The New Connection Wizard displays the Completing The New Connection
Wizard page.
11. Review the information summary, and then click Finish.
Windows XP Professional displays the Connect Work dialog box.
12. In the User Name text box, type Administrator and type password for the password.
Note If your computer is on a network and you entered a valid IP address in Step 8, enter a
valid user name and password in Step 12.
13. Click Connect.
Lesson 1
Configuring Local Area Network (LAN) Connections 15-17
Note
If your computer is a stand-alone computer, this operation will fail. If your computer is
on a network and you entered a valid address in Step 8 and a valid user name and password
in Step 11, a message will be displayed indicating that a connection has been made.
14. If your connection failed, in the Error Connecting to Work dialog box, click Cancel. If you connected successfully to another computer, double-click the connection icon in the notification area, click Disconnect, and then click Yes.
15. Close all windows and log off.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What are the four outbound connection types that you can configure using the
New Connection Wizard?
2. In which two ways can you force a network connection to attempt to renew its
DHCP lease?
3. How can you tell the duration that a network connection has been successfully
connected?
15-18
Chapter 15
Configuring Network and Internet Connections
Lesson Summary
■
You can view all network connections configured on a computer in the Network
Connections window, which you can access through Control Panel.
■
In the Network Connections window, you can right-click a connection to access a
command for working with the connection. These commands include the following:
■
❑
Viewing the status of a connection
❑
Renaming a connection
❑
Disabling or enabling a connection
❑
Bridging connections
❑
Repairing a connection
❑
Setting options for a connection
The New Connection Wizard can configure a network connection for different
uses. You can use the wizard to configure a connection for connecting to the Internet, connecting to a private network, setting up a home or small office network,
or configuring an advanced connection.
Lesson 2
Configuring Dial-Up Connections 15-19
Lesson 2: Configuring Dial-Up Connections
A dial-up connection connects you to a private network or the Internet by using a
device that transfers data over a public telephone network. This device can be a
modem that uses a standard phone line, an ISDN card with a high-speed ISDN line, or
a DSL modem that requires a dial-up connection. In this lesson, you learn to configure
a modem in Windows XP Professional and create a dial-up connection. You also learn
to configure Windows XP Professional to allow an incoming connection.
After this lesson, you will be able to
■ Configure a modem in Windows XP Professional.
■ Create a dial-up connection.
■ Configure Windows XP Professional to allow incoming connections.
Estimated lesson time: 30 minutes
Configuring Modems
The most common dial-up connection uses a standard analog telephone line and a
modem. Standard analog phone lines are available worldwide and meet most requirements of a mobile user. Standard analog phone lines are also referred to as a Public
Switched Telephone Network (PSTN) or Plain Old Telephone Service (POTS).
Windows automatically detects and installs most modern modems that are Plug and
Play–compliant. For the most part, users can create a dial-up connection that uses a
modem without ever having to configure the modem itself. There are times, however,
when you might need to configure or troubleshoot a modem. You will do so by using
the Modems tab of the Phone And Modem Options dialog box, shown in Figure 15-8.
To open this dialog box, use the following steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Printers And Other Hardware.
3. In the Printers And Other Hardware window, click Phone And Modem Options. If
prompted, provide your location information.
4. Click the Modems tab.
The Modems tab shows a list of modems installed on the computer. Select a modem,
and then click Properties to open the Properties dialog box for the modem, shown in
Figure 15-9. This is the same Properties dialog box that you see when you open the
properties for a modem in Device Manager.
15-20
Chapter 15
Configuring Network and Internet Connections
F15us08.bmp
Figure 15-8
modems.
The Modems tab of the Phone And Modem Options dialog box shows installed
F15us09.bmp
Figure 15-9 Use the Properties dialog box for a modem to configure and troubleshoot the modem.
The Properties dialog box for a modem always contains the following tabs (though you
may see additional tabs depending on the type of modem you have installed):
■
General The General tab shows basic information about the modem, whether
Windows reports the modem as working or not, and whether the modem is enabled.
■
Modem The Modem tab lets you control the speaker volume for the modem or
turn the sound off. Many users prefer not to hear the modem each time it dials,
although some users rely on hearing that sound to feel sure that their modem is
working properly. The Modem tab also lets you control the maximum port speed
for the modem, although because Windows negotiates the speed of the port you
should not need to alter the default setting. The final option on the Modem tab lets
Lesson 2
Configuring Dial-Up Connections 15-21
you specify whether Windows should wait for a dial tone before dialing numbers.
Users in some locations might find that their modem does not recognize the dial
tone used in that area, or users might need to dial the phone manually.
■
Diagnostics The Diagnostics tab lets you issue a query to the modem to determine whether it is receiving and sending commands properly. Click Query
Modem and wait a few moments to see the result. This command is the single
most useful modem troubleshooting tool in Windows because it helps you determine whether a modem is working properly. If the query returns an error stating
that it cannot communicate with the modem, you know you must troubleshoot the
modem itself. If the query returns results, you know the modem is working and
the problem lies elsewhere—most likely in the dial-up connection configuration
or in the application trying to make the connection. The Diagnostics tab also lets
you enable logging for the modem.
■
Advanced The Advanced tab lets you configure initialization commands for the
modem—commands that control how the modem sends and receives data.
Mostly, you do not need to worry about using extra initialization commands
because the most common uses for these commands (such as waiting for a dial
tone, dialing 9 to get an outside line, or using a code to disable call waiting) are
all configurable options within Windows.
■
Driver The Driver tab displays version information about the modem driver;
and provides tools for updating, rolling back, and uninstalling drivers. For more
information about using the options on this tab, see Chapter 6.
Note
Many modems are compatible with Windows XP. However, many difficult-to-detect problems are the result of older, incompatible modems. Plug and Play modems are cheap enough
these days that it is usually easier and more cost-effective to replace an old modem than
troubleshoot it. To find hardware that is supported by Windows operating systems, visit the
Windows Catalog on the Microsoft Web site.
Configuring a Dial-Up Connection
Dial-up connections work much like LAN connections, but have additional options
that let you control when the connection is dialed, the number for the connection,
and other criteria for use. To create a dial-up connection, you use the New Connection
Wizard (which was covered in Lesson 1, “Configuring Local Area Network (LAN)
Connections”) to create a connection to the Internet or to a private network.
After the dial-up connection is created, you can view the connection in the Network
Connections window, as shown in Figure 15-10. Right-clicking a particular connection
provides a shortcut menu with commands for working with the connection.
15-22
Chapter 15
Configuring Network and Internet Connections
F15us10.bmp
Figure 15-10
Dial-up connections are shown in the Network Connections window.
Setting Options for a Dial-Up Connection
To configure options for a dial-up connection, right-click the connection and click
Properties. The Properties dialog box for the connection, shown in Figure 15-11, contains the following tabs:
■
General The General tab shows the modem associated with the connection.
Click Configure to open a Modem Configuration dialog box that allows you to set
the maximum port speed, configure hardware options for the modem, and enable
or disable the modem speaker (although not control the volume level). The General tab also allows you to configure the phone number for the connection. Configuring the phone number entails the following:
❑
Typing the phone number itself. You can also click Alternates to open an
Alternate Phone Numbers dialog box that lets you enter additional phone
numbers for the connection to try if the primary number is busy. The Phone
Number text box is the only option available in the Phone Number section
unless you enable dialing rules.
❑
Enabling dialing rules. When you select the Use Dialing Rules check box, the
other options in the Phone Number section become available. Click the Dialing Rules button to create new dialing locations. Each location you configure
can use an entirely different set of dialing rules, such as area code, number
dialed for access to an outside line, and even calling card information.
❑
Selecting an area code. The list of area codes available is derived from the
dialing locations you configure.
❑
Selecting a country/region code.
Lesson 2
Configuring Dial-Up Connections 15-23
F15us11.bmp
Figure 15-11 General options for a dial-up connection include modem configuration, phone
number, and dialing rules.
■
Options The Options tab, shown in Figure 15-12, provides access to dialing and
redialing options. You can configure Windows to display a dialog box during dialing
so that you can see the dialing status. You can also have Windows prompt you for
a user name and password each time it dials, include a Windows domain text box
so that you can log on to a domain when you connect to a private network, and
even prompt you for the phone number instead of automatically displaying it. The
Options tab also lets you configure how many times Windows should attempt to
redial a number if it is busy, how long to wait between dialing attempts, and the
number of minutes after which Windows should disconnect if no network traffic is
transmitted over the connection.
■
Security The Security tab allows you to configure authentication settings for the
dial-up connection, which are used when dialing in to a private network.
■
Networking The Networking tab displays the type of dial-up server being
dialed and the networking components enabled for the connection. This tab
works just like the General tab of a LAN connection (refer to Figure 15-4).
■
Advanced The Advanced tab allows you to enable Windows Firewall and ICS,
which are covered in Lessons 4 and 5.
15-24
Chapter 15
Configuring Network and Internet Connections
F15us12.bmp
Figure 15-12 The Options tab for a dial-up connection allows you to configure numerous
dialing options.
How to Connect by using a Dial-Up Connection
After creating and configuring a dial-up connection, you can establish the connection by
double-clicking the connection in the Network Connections window (or by right-clicking
the connection and then clicking Connect). This action opens the Connect dialog box, as
shown in Figure 15-13. The options you see here (such as entering a domain name)
depend on how you configured the dial-up connection, as does the information (such as
the user name and password) that is already filled in. Click Dial to establish the connection.
F15us13.bmp
Figure 15-13
Establish a dial-up connection.
Lesson 2
Configuring Dial-Up Connections 15-25
Allowing Incoming Dial-Up Connections
To configure and administer incoming connections on a computer running Windows
XP Professional, you use the New Connection Wizard (which was discussed in detail in
Lesson 1). On the Network Connection Type page (refer to Figure 15-7), click Set Up
An Advanced Connection, and then click Next. The New Connection Wizard displays
the Advanced Connection Options page (see Figure 15-14).
F15us14.bmp
Figure 15-14
Use the Advanced Connection Options page to set up an inbound connection.
On the Advanced Connection Options page, click Accept Incoming Connections, and
then click Next to display the Devices For Incoming Connection page.
Configuring Devices for Incoming Connections
The Devices For Incoming Connections page allows you to choose one of the available
devices on your computer to accept incoming calls. If the device you select is configurable, click Properties to configure it. For example, if you have selected a modem, the
possible options to configure in the device’s Properties dialog box include port speed,
error correction, use of compression, and the type flow control. The Advanced tab contains additional configurable options, which might include the number of data bits, the
parity, the number of stop bits, and the modulation type.
Allowing VPN Connections
When you are finished configuring the device, click OK to close the Properties dialog box,
and then click Next in the Devices For Incoming Connection page (see Figure 15-15).
The New Connection Wizard displays the Incoming Virtual Private Network (VPN) Connection page. If you click Allow Virtual Private Connections, Windows XP Professional
15-26
Chapter 15
Configuring Network and Internet Connections
modifies Windows Firewall so that your computer can send and receive VPN traffic.
Select the option either to allow or not allow VPN connections, and then click Next.
F15us15.bmp
Figure 15-15
Configure the device that the incoming connection will use.
Specifying User Permissions and Callback Options
You must specify which users can use this inbound connection in the User Permissions
page. After you select a user, click Properties. In the user-name Properties dialog box,
click the Callback tab to set the callback options. You can choose Do Not Allow Callback, Allow The Caller To Set The Callback Number, or Always Use The Following
Callback Number. Enabling callback causes the remote server, in this case your computer, to disconnect from the client calling in, and then to call the client computer
back. By using callback, you can have the bill for the phone call charged to the office
phone number rather than to the phone number of the user who called in. Callback
can also be used to increase security because if you specify the callback number you
do not have to worry about someone trying to break in. Even if an unauthorized user
calls in, the system calls back at the number you specified, not the number of the unauthorized user.
Selecting Networking Software
After you specify the callback options, click Next. The New Connection Wizard displays the Networking Software page. You can choose the networking software you
want to enable for incoming connections. You can also install additional networking
software by clicking Install. Click Finish to create the connection.
Lesson 2
Configuring Dial-Up Connections 15-27
Practice: Configuring an Inbound Connection
In this practice, you use the New Connection Wizard to configure an inbound connection.
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Network Connections.
4. In the Network Connections window, click Create A New Connection.
Windows XP Professional starts the New Connection Wizard.
5. On the Welcome To The New Connection Wizard page, click Next.
The New Connection Wizard displays the Network Connection Type page.
6. Click Set Up An Advanced Connection, and then click Next.
The New Connection Wizard displays the Advanced Connection Options page.
7. Ensure that Accept Incoming Connections is selected, and then click Next.
The New Connection Wizard displays the Devices For Incoming Connections
page.
8. Select the modem device option for your computer in the Connection Devices list,
and then click Next.
Note
If you do not have a modem, select Direct Parallel.
The New Connection Wizard displays the Incoming Virtual Private Network (VPN)
Connection page.
9. Ensure that Do Not Allow Virtual Private Connections is selected, and then
click Next.
The New Connection Wizard displays the User Permissions page.
10. Select Administrator, and then click Properties.
The New Connection Wizard displays the Administrator Properties dialog box with
the General tab selected.
11. Click the Callback tab.
The New Connection Wizard displays the Callback tab of the Administrator Properties dialog box.
12. Review the callback options, leave the default setting of Do Not Allow Callback,
and then click OK.
15-28
Chapter 15
Configuring Network and Internet Connections
13. In the User Permissions page, click Next.
The New Connection Wizard displays the Networking Software page.
14. Review the available networking components, click Internet Protocol (TCP/IP),
and then click Properties.
The New Connection Wizard displays the Incoming TCP/IP dialog box.
15. Select Specify TCP/IP Addresses.
16. In the From text box, type 192.168.1.201, in the To text box, type 192.168.1.205,
and then click OK.
17. On the Networking Software page, click Next.
The New Connection Wizard displays the Completing The New Connection Wizard page. The name assigned to the connection is Incoming Connections.
18. Click Finish.
Notice that an Incoming Connections icon now appears in the Network Connections window.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. A user complains to you that she does not want to hear her modem each time
she connects to the company network from her portable computer. What should
you do?
2. Other than allowing VPN connections, what does Windows XP Professional do
when you configure a new connection to allow virtual private connections?
Lesson 2
Configuring Dial-Up Connections 15-29
3. What is callback and why would you enable it?
Lesson Summary
■
You can access a list of installed modems by using the Modems tab of the Phone
And Modem Options dialog box, which is available in Control Panel. From the list
of modems, you can open the Properties dialog box for any modem. You can use
a modem’s Properties dialog box to configure speaker and port options and to
perform diagnostics on the modem.
■
Dial-up connections work much like LAN connections, but have additional
options that let you control when the connection is dialed, the number for the
connection, and other criteria for use. To create a dial-up connection, you use the
New Connection Wizard.
■
You can configure Windows XP Professional to accept incoming dial-up connections over a modem or by using VPN. You can choose which of the available
devices on your computer you will allow to accept incoming calls. You can also
specify which user accounts can use the incoming connections.
15-30
Chapter 15
Configuring Network and Internet Connections
Lesson 3: Configuring Wireless Connections
Wireless networking offers a degree of freedom—freedom for users of portable and
handheld computers to roam where they will and freedom for companies to place
computers in new locations without having to run network cabling. With that freedom,
however, comes increased vulnerability. Because wireless networking does not share
the same physical security of a wired network, understanding the security options for
a wireless network is of paramount importance. This lesson introduces you to the standards, implementations, and security options for wireless networks. This lesson also
shows you how to configure a computer running Windows XP Professional to participate as a client in a wireless network.
After this lesson, you will be able to
■ Identify the standards used in wireless networking.
■ Explain the basic architecture of wireless networks.
■ Identify the security concerns and options of wireless networks.
■ Configure a computer running Windows XP Professional as a wireless networking client.
Estimated lesson time: 30 minutes
Introduction to Wireless Networking Standards
The primary wireless networking standard is known as 802.11. This standard is developed and maintained by the Institute of Electrical and Electronics Engineers (IEEE), so
you will often see the standard referred to as IEEE 802.11.
The original 802.11 specification defines data rates of 1 Mbps and 2 Mbps, and uses a
radio frequency of 2.45 GHz. 802.11 provides the foundation for a number of variations
of the standard that IEEE has developed over the years, and it is these variations you
will see implemented in wireless devices on the market today. These variations include
the following:
■
802.11b The first real standard to market, which is called 802.11b, was originally
developed in 1999, although it is still in wide use today. 802.11b supports additional
data rates of 5.5 Mbps and 11 Mbps (comparable to the rated speed of traditional
Ethernet) and still uses the 2.45 GHz radio frequency. The advantages of 802.11b
over other standards are that it is typically available at a lower cost and it has the
best overall signal range. However, 802.11b also has the lowest data transfer rate of
the available standards.
Lesson 3
Configuring Wireless Connections 15-31
■
802.11a 802.11a was developed around the same time as 802.11b, but 802.11b was
adopted by hardware manufacturers much faster than 802.11a. As a result, most manufacturers did not start providing wireless devices using 802.11a until 2003. 802.11a
boasts a data transfer rate of 54 Mbps and operates in the 5.8 GHz radio frequency.
802.11a also provides greater resistance to electrical interference than 802.11b.
Advantages of 802.11a are that it provides the highest speed of the available
standards and also supports more simultaneous users in the same area than 802.11b.
Disadvantages are that 802.11a devices have the highest cost and a shorter range than
other standards. Also, 802.11a devices are not compatible with 802.11b devices.
■
802.11g The development of 802.11g was finalized in 2002. 802.11g supports
data transfer rates up to 54 Mbps and operated in the 2.4 GHz radio frequency.
802.11g devices are compatible with 802.11b devices, but that compatibility comes
at a price. If a network uses only 802.11g devices, all wireless devices can operate
at up to 54 Mbps. If a network has even a single 802.11b device, 802.11g devices
must operate in mixed mode, which lowers the data transfer for 802.11g devices
by about 30 percent.
Note Some manufacturers make hybrid devices that support both 802.11a and 802.11g,
and such devices can connect to networks using any of the three standards mentioned here.
Real World Rated Speeds
Although the standards covered in this lesson have rated speeds (up to 11 Mbps
for 802.11b and up to 54 Mbps for 802.11a and 802.11g), these are mostly theoretical values. In practice, you will never actually get that kind of data transfer rate.
Typical throughput for 802.11b products, for example, tops out around 4–5 Mbps.
The 802.11g products have an actual capacity of about 20 Mbps, and 802.11a
products have a capacity of 22 Mbps. In addition, even these more realistic transfer rates are often further limited in the real world by interference from electrical
devices and materials in building structures.
Introduction to Wireless Networking Architecture
The 802.11 standard defines a number of main architectural components. These components include the following:
■
Station (STA) A station (STA) is a client device on a wireless network—typically
a computer that has a wireless network adapter installed.
15-32
Chapter 15
Configuring Network and Internet Connections
■
Access point (AP) An access point (AP) provides an interface with which stations
can communicate. APs are the bridge between the wireless stations and an existing
network backbone, allowing wireless clients to communicate with the network. APs
can be stand-alone devices, but are often combined with other network devices
such as routers.
■
Independent Basic Service Set (IBSS) An independent basic service set (IBSS)
represents a wireless network that consists of two or more stations, but does not
have an AP. This type of network, shown in Figure 15-16, is often referred to as an
ad-hoc wireless network. Ad-hoc networks offer the advantage of being able to
spontaneously create wireless network connections between stations with little
configuration required. However, ad-hoc networks are considerably less secure
and configurable than basic service set networks that include an AP.
Station
Station
F15us16.bmp
Figure 15-16
■
An IBSS, or ad-hoc wireless network, has wireless stations but no AP.
Basic Service Set A basic service set (BSS) represents a network that allows stations
to communicate through an AP, as shown in Figure 15-17. This type of network is often
referred to as an infrastructure wireless network. In a BSS, all stations communicate through the AP. The AP provides connectivity to the wired LAN and provides
bridging functionality when one station initiates communication to another station.
Basic Service Set
Station
Station
Access Point
F15us17.bmp
Figure 15-17 A BSS, or infrastructure wireless network, has wireless stations that
communicate through an AP.
Lesson 3
■
Configuring Wireless Connections 15-33
Extended Service Set An extended service set (ESS) represents a network in
which multiple APs (and thus multiple BSSs) are used, as shown in Figure 15-18.
This allows for increased mobility because stations can move from one BSS to
another. APs can be interconnected with or without network cable (although most
of the time they are connected to one another with cables).
Extended Service Set
Basic Service Set
Station
Basic Service Set
Station
Station
Station
DS
Access Point
Access Point
F15us18.bmp
Figure 15-18 An ESS is a connection of multiple BSSs, the DS serving as the logical link
between BSSs.
■
!
Distribution System The distribution system (DS) is a logical component used
to interconnect BSSs in an ESS. The DS provides distribution services to allow for
the roaming of STAs between BSSs.
Exam Tip
Although the architectural elements of 802.11 networking sound a bit intimidating, it is important to understand the underlying components of the two modes in which you
can configure a wireless client to operate: ad-hoc mode, in which there is no AP, and infrastructure mode, in which an AP is used. An ad-hoc network offers fewer configuration options
and is sometimes used in small workgroup environments. An infrastructure network provides
greater security and configurability and is the most common mode for wireless networking.
Introduction to Wireless Networking Security
When a wireless network is used, security becomes of greater concern. On traditional
wired networks, there is a certain level of security to be had simply because you can
physically protect the networking cables. On a wireless network, you cannot physically
protect the radio frequencies used and so must rely on logical protection in the form
of authentication and encryption.
15-34
Chapter 15
Configuring Network and Internet Connections
One of the biggest threats to wireless networks is that operating systems such as Windows XP Professional make it very easy to locate and connect to wireless networks—
so easy, in fact, that people often connect to unsecured wireless networks without
even realizing that it has happened. There are also more deliberate threats to wireless
networks. Attackers can gain access to unsecured (or improperly secured) networks by
connecting with their wireless stations, or even by installing unauthorized APs on an
existing wired network. Once connected, attackers can inspect, modify, or damage
vital resources.
Fortunately, there are a number of ways to secure a wireless network against such
threats. These methods are the focus of the next few sections.
MAC Address Filtering
A very basic way to protect an infrastructure wireless network is to implement media
access control (MAC) filtering. Every network adapter (wireless network adapters
included) contains an address known as a MAC address. An administrator can configure an AP so that it accepts communications only from specified MAC addresses.
Although MAC filtering does offer some level of protection from casual intrusion, it is
far from useful as a single security solution. Following are some concerns about using
MAC filtering:
■
It is relatively easy to spoof a MAC address. Many software products exist that let
an intruder modify the MAC address on a wireless network adapter.
■
Most APs require that you manually enter MAC addresses. For networks with large
numbers of wireless clients, this means a lot of work for administrators. In addition, most APs have a limit to the number of MAC addresses you can authorize.
■
MAC filtering can stop an unauthorized computer, but not an unauthorized user. If
an intruder gains access to a computer that has an approved MAC address, the
intruder can gain access to the wireless network.
Service Set Identifier (SSID) Broadcasting
Every infrastructure network is named with a service set identifier (SSID). This name
distinguishes the network from other wireless networks. By default, most APs broadcast their SSID so that wireless clients can easily locate and connect to the network.
SSID broadcasting provides a great deal of convenience because wireless clients (especially those that roam among different wireless networks) can easily detect networks
without requiring much configuration from the user.
You can disable SSID broadcasting on most APs, which can prevent casual intruders
from discovering a network. However, intruders who are looking for your network will
likely be able to find it anyway. Several software programs exist that can scan for wireless networks and identify the SSID of a network, even if SSID broadcasting is disabled.
Lesson 3
Configuring Wireless Connections 15-35
Typically, the convenience of using SSID broadcasting outweighs the slight security
advantage that disabling broadcasting offers.
Note
Several tools exist that can help users locate wireless networks, even if SSID broadcasting is turned off. As an administrator, you can use these tools to help evaluate the security of your own wireless network and identify rogue wireless networks in your organization.
Two popular tools include NetStumbler, which you can find at http://www.netstumbler.com,
and AirSnare, which you can find at http://home.comcast.net/~jay.deboer/airsnare.
Wired Equivalent Privacy (WEP)
Wired networks normally require a physical connection in order to be compromised.
In wireless networks, because the data is broadcast using radio, intruders can intercept
the signals. If those signals are not encrypted, intruders can view the data being transmitted. Wired Equivalent Privacy (WEP) is one of two wireless encryption standards
supported by Windows XP Professional (the other being Wi-Fi Protected Access, which
is covered in the next section). WEP is the encryption standard that is specified by the
IEEE 802.11 standard.
WEP provides encryption services to protect authorized users of a wireless LAN from
eavesdroppers. WEP functions by using a shared key to encrypt packets of data before
transmitting them over a wireless network. This shared key is generated by using
40-bit or 64-bit secret key encryption, and then adding a 24-bit initialization vector (IV)
to the end of that key. The shared key is set in place for a network, but a new IV is generated randomly for each packet of data that is transmitted over the network.
Unfortunately, WEP is not as strong as its designers had hoped. There are two basic
shortcomings in the standard WEP protocol:
■
Most networks do not change the shared key often because the basic WEP standard does not provide a way to dynamically assign the shared key to APs and stations. Instead, administrators must manually enter the shared key.
Note To make cracking WEP more difficult, most AP vendors avoid using a handful of
known-weak IVs that cracking tools specifically look for. When these IVs are disabled (by
default for most up-to-date APs) and 128 bit encryption is used, WEP is actually a very secure
encryption protocol. A newer implementation of WEP, known as Dynamic WEP, is designed to
address the problem with manual entry of the shared key. Although Dynamic WEP is much
more secure than WEP, the newer and stronger WPA standard and the bad reputation that WEP
has gained probably means that Dynamic WEP will not gain wide acceptance.
15-36
Chapter 15
■
Configuring Network and Internet Connections
The random IV is only 24 bits and is reused. On large networks, APs and stations
reuse the IV pretty frequently (even as often as every hour). Many programs exist
that can capture network traffic and examine the details of the data packets being
transmitted, including details about the IV.
Wi-Fi Protected Access
To help address the security limitations of WEP, a group of wireless equipment known
as the Wi-Fi Alliance developed a new encryption standard named Wi-Fi Protected
Access (WPA). WPA builds upon the security in WEP in two main ways:
■
WPA provides stronger data encryption. WPA uses Temporal Key Integrity Protocol (TKIP), a protocol that provides per-packet key mixing, a message integrity
check, and a stronger IV with keys that are not reused for longer periods of time.
■
WPA requires 802.1x authentication to ensure that only authorized users or computers are allowed to connect to a wireless network. 802.1x authentication is
optional with WEP.
Configuring Wireless Networking in Windows XP Professional
Windows XP Professional includes a feature called Zero Client Configuration that eases
the detection of and connection to wireless networks, and also makes transitions from
one wireless network to another more transparent to users. Windows XP Professional
supports both ad-hoc and infrastructure wireless networking, and also supports both
WEP and WPA encryption.
Note When Windows XP Professional first shipped, it did not include support for WPA. Support
was provided later via the Windows WPA Client Update, available at http://support.microsoft
.com/Default.aspx?kbid=815485. However, WPA support is also included with Windows XP
Service Pack 2 without needing to use this client update.
How to Connect to a Wireless Network
After installing a wireless network adapter, Windows XP Professional attempts to locate
wireless networks in the area automatically. When Windows locates a network, it displays an icon in the notification area (a picture of a computer with wireless “waves”
coming out of it). Windows also displays a ScreenTip (a pop-up notification balloon)
above that icon, letting you know that it has detected wireless networks.
To connect to a wireless network, use these steps:
1. Right-click the wireless connection icon in the notification area, and then click
View Available Wireless Networks.
Lesson 3
Configuring Wireless Connections 15-37
Windows displays the Wireless Network Connection dialog box, shown in Figure 15-19. This dialog box shows you each network Windows XP has detected
and also the security status of the network (whether it is unsecured or secured).
F15us19.bmp
Figure 15-19 The Wireless Network Connections dialog box shows whether detected
networks are secured or unsecured.
2. Click the wireless network to which you want to connect, and then click Connect.
If the network to which you are connecting is unsecured (which means unencrypted), Windows displays a warning to that effect and asks whether you are sure
you want to connect.
3. Click Yes.
Windows refreshes the Wireless Network Connection window to show that you
are now connected to the wireless network. Proceed to Step 5.
If the wireless network to which you want to connect is secure, Windows displays
a dialog box asking you to type the appropriate network key.
4. Type and confirm the network key, and then click Connect.
Windows refreshes the Wireless Network Connection window to show that you
are now connected to the wireless network.
5. Close the Wireless Network Connection window.
After making the connection to a network, you can right-click the connection icon
in the notification area to disable or repair the connection, or to view open network
connections.
15-38
Chapter 15
Configuring Network and Internet Connections
Wireless Connection Options
In the Wireless Network Connection dialog box (refer to Figure 15-19), you can click
Change Advanced Settings to bring up the Properties dialog box for the wireless connection, shown in Figure 15-20. You can also open the Properties dialog box for a
wireless connection the same way you would for a local area connection: by opening
the Network Connections window (via Control Panel), right-clicking the connection,
and choosing Properties.
F15us20.bmp
Figure 15-20
connection.
The Properties dialog box for a wireless connection works much like that of a LAN
For the most part, this dialog box works the same way in which the Properties dialog
box for local area connections works. On the General tab, you can control whether
components are enabled or disabled for the connection. You can also configure TCP/IP
options. On the Advanced tab, you can control Windows Firewall settings. However,
ICS is not available for wireless connections.
On the Wireless Network tab, shown in Figure 15-21, you can click View Wireless Networks to return to the Wireless Network Connection window. The Preferred Networks
shows you networks to which you have successfully connected. Windows automatically tries to connect to networks in the order in which they are listed, although you
can adjust that order.
Lesson 3
Configuring Wireless Connections 15-39
F15us21.bmp
Figure 15-21 The Wireless Networking tab shows wireless networks to which you
have connected.
To configure a specific network, click the network, and then click Properties. You can
use the Properties dialog box for a network, shown in Figure 15-22, to configure the
following:
■
On the Association tab (see Figure 15-22), you can change the SSID for the network connection, and change the wireless network key options used for network
security. These options include settings for both data encryption and network
authentication. For authentication, choose WPA or WPA-PSK if you are using WPA.
If you are using WEP, you should use open authentication. Because WEP uses the
same key for authentication and encryption, using open authentication is actually
stronger than using WEP for authentication because an attacker that has cracked
the WEP key would be able to access authentication information. For data encryption, select the type of encryption that matches the encryption used on your
network.
■
On the Authentication tab, you can enable 802.1x authentication for the network.
■
On the Connection tab, you can specify whether Windows should connect to the
wireless network when within range to do so.
15-40
Chapter 15
Configuring Network and Internet Connections
F15us22.bmp
Figure 15-22 The Wireless Networking tab shows wireless networks to which you have connected.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Which two modes of networking are available for connecting to a wireless network in Windows XP Professional?
2. What are four ways to protect a wireless network?
3. When you configure 802.1x authentication for wireless networking in Windows
XP Professional, all wireless connections use the same authentication settings.
(True/False)
Lesson 3
Configuring Wireless Connections 15-41
Lesson Summary
■
■
■
■
802.11 standards include the following:
❑
802.11b, which offers data transfer rates of 5.5 Mbps and 11 Mbps, and operates in the 2.45 GHz radio frequency.
❑
802.11a, which offers data transfer rates up to 54 Mbps and operates in the
5.8 GHz frequency.
❑
802.11g, which offers data transfer rates up to 54 Mbps and operates in the
2.4 GHz frequency.
Windows XP Professional can operate in two wireless networking modes:
❑
Ad-hoc wireless networking, in which there are multiple stations but no AP.
Ad-hoc wireless networks are technically known as independent basic service
sets.
❑
Infrastructure wireless networking, in which stations connect to an AP. Infrastructure wireless networks are technically known as basic service sets. Basic
service sets can be network together to create extended service sets.
You can protect wireless networks in the following ways:
❑
By filtering MAC addresses so that only specified computers can connect to
an AP.
❑
By disabling SSID broadcasts so that casual intruders cannot detect the wireless network.
❑
By using WEP encryption, which is widely supported but also has widely recognized flaws.
❑
By using WPA encryption, which provides stronger encryption than WEP.
Windows XP Professional supports Zero Client Configuration, which means that
Windows can automatically detect and connect to wireless networks. For secured
networks, you must configure the client to access the network properly, but connection after that configuration is also automatic.
15-42
Chapter 15
Configuring Network and Internet Connections
Lesson 4: Configuring Internet Connection Sharing (ICS)
ICS offers a simple way to configure computers in a small home office network to
share a single Internet connection. For small networks, ICS offers a cost-effective way
to provide Internet access to multiple computers.
After this lesson, you will be able to
■ Configure ICS.
■ Identify the limitations of ICS.
■ Troubleshoot ICS on a computer running Windows XP Professional.
Estimated lesson time: 10 minutes
Introducing Internet Connection Sharing (ICS)
When you set up ICS on a network, the computer with the physical connection to the
Internet (whether that is a modem, cable, or other type of connection) is designated as
the ICS host. Other computers on the network connect to the Internet through the ICS
host, as shown in Figure 15-23. In addition to providing Internet access, the ICS host
computer also dynamically allocates IP addresses to the clients on the network, provides name resolution, and serves as the gateway for the other computers.
Internet
Modem
ICS Host
ICS Clients
F15us23r.bmp
Figure 15-23 The ICS host has a shared Internet connection and acts as a DHCP server for
network clients that obtain their IP addresses automatically.
Lesson 4
Configuring Internet Connection Sharing (ICS) 15-43
Setting up ICS on a small network consists of the following general steps:
1. Make sure that the computer that will become the ICS computer is properly connected to the Internet.
2. Make sure that the ICS computer and the other computers are properly connected
to one another via a local network.
3. On the ICS computer, enable Internet Connection Sharing on the network connection for the Internet.. This is done by selecting the Allow Other Network Users To
Connect Through This Computer’s Internet Connection option on the Advanced
tab of the network connection’s Properties dialog box. When you enable ICS, the
ICS computer configures itself with the IP address 192.168.0.1 and also becomes a
DHCP server for the network, so that it can provide IP addressing information to
other computers.
4. Configure the remaining computers to obtain their IP address and DNS server
information automatically and restart the computers. When each computer
restarts, it will obtain addressing information from the ICS computer and should
be able to connect to the Internet. IP addresses of the computers will fall in the
range 192.168.0.2–192.168.0.254.
ICS Limitations
Because of what ICS does for a network (IP address allocation, name resolution, and
acting as the network’s gateway), and because the IP address the host computer uses
is always 192.168.0.1 with a subnet mask of 255.255.255.0, several conditions must be
met while ICS is used:
■
The IP addresses of the computers on the network must also be in the 192.168.0.x
range, and the subnet mask must always be 255.255.255.0. If network computers
cannot use these addresses, ICS does not work properly.
■
Windows 2000 Server or Windows Server 2003 servers configured as domain controllers, DNS servers, gateways, and DHCP servers cannot be used on the network.
ICS is intended for use only in a workgroup environment.
■
Computers with static IP addresses that do not fall in the ICS range do not work
with ICS.
■
If more than one network adapter is available, and if two or more LAN connections are configured and all of them connect to computers on the network, those
connections need to be bridged. Bridging a connection is as simple as right-clicking
the connection and selecting Bridge Connections.
■
ICS must be enabled from the dial-up, VPN, broadband, or other connection to the
Internet.
15-44
Chapter 15
Configuring Network and Internet Connections
Problems can also occur with ICS if the host computer originally had a static IP address
on the network or if the address 192.168.0.1 is being used by another computer on the
network.
Note
If you are having problems with an ICS configuration, check the items in the preceding
bulleted list. Make the appropriate changes to the network to resolve the problem.
Troubleshooting ICS
Although you can troubleshoot ICS by using many of the connectivity troubleshooting
methods already covered in this chapter, if the network is small (10 or fewer computers), it is generally easiest to start over with ICS than to troubleshoot it. After you know
that you have removed any offending DHCP or DNS servers or any computers with
static IP addresses, simply reconfigure ICS on the host computer, and then reconfigure
and restart the other computers on the network.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. A user has set up ICS on a host computer that runs Windows XP Professional, but
is experiencing problems with clients being able to connect to both the Internet
and other computers on the network. Which of the following items could be the
cause of the problems? Choose all that apply.
a. There is a DHCP server on the network.
b. There is a DNS server on the network.
c. There are computers on the network with static IP addresses.
d. There is a Windows 2000 server on the network.
2. What IP address is assigned to the ICS host?
3. After enabling ICS on the host computer, how should you configure other computers in the workgroup to connect to the Internet through the ICS computer?
Lesson 4
Configuring Internet Connection Sharing (ICS) 15-45
Lesson Summary
■
ICS lets one computer with an Internet connection share that connection with
other computers on the network. The computer running ICS always configures
itself with the IP address 192.168.0.1. That computer also acts as a DHCP server
and gives other computers on the network addresses in the 192.168.0.2 through
192.168.0.254 range.
■
ICS is intended for workgroup environments. Windows 2000 Server or Windows
Server 2003 servers configured as domain controllers, DNS servers, gateways, and
DHCP servers cannot be used on the network. Also, computers with static IP
addresses that do not fall in the ICS range do not work with ICS.
■
ICS does not provide many troubleshooting options (although you can perform
basic network connectivity troubleshooting on the network). The best option is
almost always to reconfigure ICS on the network.
15-46
Chapter 15
Configuring Network and Internet Connections
Lesson 5: Configuring Windows Firewall
A firewall protects a computer from the outside world (specifically, the Internet) by
blocking all network traffic except that which you specifically configure the firewall to
allow through. This section introduces firewalls and looks at the software-based firewall that is included with Windows XP Professional: Windows Firewall.
After this lesson, you will be able to
■ Explain how firewalls protect computers.
■ Enable or disable Windows Firewall for all network connections.
■ Enable or disable Windows Firewall for a specific network connection.
■ Configure advanced options for Windows Firewall.
■ Troubleshoot connectivity problems that are associated with Windows Firewall.
Estimated lesson time: 40 minutes
Introducing Windows Firewall
A firewall acts as a security system that creates a border between the computer or network and the Internet. This border determines what traffic is allowed in the local network or computer. Firewalls help keep hackers, viruses, and other malicious activity
from infiltrating the computer and network. A network-based firewall is a device
that protects an entire network. A host-based firewall is a program that protects a
single computer. Windows XP Professional includes a software firewall named Windows Firewall.
Windows Firewall is installed when you install Windows XP Service Pack 2, and is an
updated version of the Internet Connection Firewall found on versions of Windows XP
with Service Pack 1 and previous. Windows Firewall is a stateful, host-based firewall
that drops all incoming traffic that does not meet one of the following conditions:
■
Solicited traffic (valid traffic that is sent in response to a request by the computer)
is allowed through the firewall.
■
Expected traffic (valid traffic that you have specifically configured the firewall to
accept) is allowed through the firewall.
Windows Firewall has the following characteristics:
■
Is enabled by default for all network connections. This differs from Internet Connection Firewall, which was not enabled by default.
Lesson 5
Configuring Windows Firewall 15-47
■
Limits the network traffic that comes into a computer by blocking transmission
over all ports except those specifically configured to allow traffic to reach the
computer. When you allow a specific type of traffic into a computer through Windows Firewall, this is called creating an exception. You can create exceptions by
specifying the file name of an application or by configuring specified ports for
which to allow traffic. Windows Firewall lets you create exceptions for each network connection. This differs from Internet Connection Firewall, which only
allowed you to create global exceptions that affected all connections.
■
Can restrict traffic by IP address (or IP address range), meaning that only traffic
from computers with valid IP addresses is allowed through the firewall.
■
Allows you to enable or disable Windows Firewall on each connection configured
on a computer running Windows XP Professional, whether that connection is a
LAN connection, dial-up connection, or wireless connection. You can also set global configurations that affect all connections. This differs from Internet Connection
Firewall, which only allowed you to enable or disable the firewall globally for all
connections.
■
Allows you to keep a security log of blocked traffic so that you can view firewall
activity.
■
Performs stateful packet filtering during startup, so that the computer can perform
basic network tasks (such as contacting DHCP and DNS servers) and still be protected. This differs from Internet Connection Firewall, which did not perform any
filtering during startup.
How to Enable or Disable Windows Firewall for all Network
Connections
The only users who can make changes to Windows Firewall settings are those who log
on to the computer with a user account that is a member of the local Administrators
group. To enable or disable Windows Firewall for all network connections, use these
steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Windows Firewall.
4. On the General tab of the Windows Firewall dialog box, shown in Figure 15-24,
click On (Recommended) to enable the firewall for all connections. Click Off (Not
Recommended) to disable the firewall for all connections.
5. Click OK.
15-48
Chapter 15
Configuring Network and Internet Connections
F15us24r.bmp
Figure 15-24
Enable or disable Windows Firewall for all network connections.
How to Enable or Disable Windows Firewall for a Specific
Network Connection
In addition to begin able to enable or disable Windows Firewall for all connections, you
can control whether Windows Firewall is enabled on each connection on a computer. To
enable or disable Windows Firewall for a specific network connection, use these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Windows Firewall.
4. In the Windows Firewall dialog box, click the Advanced tab, shown in Figure 15-25.
F15us25r.bmp
Figure 15-25
Enable or disable Windows Firewall for specific network connections.
Lesson 5
Configuring Windows Firewall 15-49
5. To enable Windows Firewall for a connection, select the check box for that connection. To disable Windows Firewall for a connection, clear the check box for
that connection.
6. Click OK to close the Windows Firewall dialog box.
7. Click OK to close the Properties dialog box for the network connection.
Windows Firewall Advanced Options
After enabling Windows Firewall, you might need to configure it for a specific situation. You have several options for configuring Windows Firewall options, including the
following:
■
Enabling Windows Firewall logging to log network activity
■
Creating an exception for a service or application to allow traffic through the
firewall
■
Creating a custom service definition when a built-in exception does not suit your
needs
■
Creating an Internet Control Message Protocol (ICMP) exception so that the computer responds to traffic from certain network utilities
How to Enable Windows Firewall Logging
You can configure Windows Firewall to log network activity, including any dropped
packets or successful connections to the computer. Security logging is not enabled by
default for Windows Firewall. To enable security logging for Windows Firewall, use
these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Windows Firewall.
4. In the Windows Firewall dialog box, on the Advanced tab, in the Security Logging
section, click Settings.
Windows displays the Log Settings dialog box, shown in Figure 15-26.
5. In the Logging Options section, select one or both of the following check boxes:
❑
Log Dropped Packets. Logs all dropped packets originating from the local
network or the Internet.
❑
Log Successful Connections. Logs all successful connections originating from
the network or the Internet.
15-50
Chapter 15
Configuring Network and Internet Connections
F15us26r.bmp
Figure 15-26
Enable security logging for Windows Firewall.
6. Note the location of the security log. By default, the log file is named pfirewall.log
and is located in the %systemroot% folder. Click OK to close the Log Settings dialog box. Click OK again to close the Windows Firewall dialog box.
How to Access the Windows Firewall Log File
After you enable logging, you can access the log file by browsing to its location and
opening the file. Log entries provide insight about which packets have been successful
in getting into the network and which have been rejected. There are two sections of
the log: the header and the body. The header includes information about the version
of Windows Firewall, the full name of the Windows Firewall, where the time stamp on
the log learned of the time, and the field names used by the body of the log entry to
display data. The body details the log data.
There are 16 data entries per logged item, which include information about the date and
time the log was written and information about the data that passed. This information
tells which types of packets were opened, closed, dropped, and lost; which protocol
was used in the data transmission; the destination IP address of the data; the port used
by the sending computer; the port of the destination computer; and the size of the
packet logged.
To locate and open the Windows Firewall log file, use these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Windows Firewall.
4. In the Windows Firewall dialog box, on the Advanced tab, in the Security Logging
section, click Settings.
5. In the Log Settings dialog box, in the Log File Options section, click Save As.
6. In the Browse dialog box, right-click the pfirewall.txt file, and then click Open.
Lesson 5
Configuring Windows Firewall 15-51
7. After reviewing the firewall log, close the Notepad window, click OK to exit the Log
Settings dialog box, and then click OK again to close the Windows Firewall dialog box.
!
Exam Tip
You should know where Windows Firewall log files are stored, whether logging is
available, and what kind of information you can learn from log files.
How to Create an Exception for a Service or Application
By default, Windows Firewall blocks all unsolicited traffic. You can create exceptions
so that particular types of unsolicited traffic are allowed through the firewall. For example, if you want to allow sharing of files and printers on a local computer, you must
enable the File And Printer Sharing exception in Windows Firewall so that requests for
the shared resources are allowed to reach the computer.
Windows Firewall includes a number of common exceptions, such as Remote Assistance, Remote Desktop, File And Printer Sharing, and Windows Messenger. Windows
Firewall also automatically extends the exceptions available for you to enable according to the programs installed on a computer. You can manually add exceptions to the
list by browsing for program files.
To create a global exception that applies to all network connections for which Windows Firewall is enabled, use these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Windows Firewall.
4. In the Windows Firewall dialog box, click the Exceptions tab, shown in Figure 15-27.
F15us27r.bmp
Figure 15-27 Create a global exception for all connections in Windows Firewall.
15-52
Chapter 15
Configuring Network and Internet Connections
5. In the Programs And Services list, select the check box for the service you want to
allow. If you need to add an exception for an installed program that does not
appear on the list, click Add Program to locate the executable file for the program,
and then enable the exception after the program is added to the list.
6. Click OK to close the Windows Firewall dialog box.
How to Create an Exception for a Particular Port
If Windows Firewall does not include an exception for the traffic you need to allow,
and adding an executable file to the list does not produce the results you need, you
can also create an exception by unblocking traffic for a particular port.
To create a global exception for a port that applies to all network connections for
which Windows Firewall is enabled, use these steps.
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Windows Firewall.
4. In the Windows Firewall dialog box, on the Exceptions tab, click Add Port.
Windows displays the Add A Port dialog box. To create an exception based on a
Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number, you must know the proper port number used by an application or service to
use this option.
5. Type a name for the exception, type the port number you want to allow access
for, and then select whether the port is a TCP or UDP port.
You can also change the scope to which the exception applies. Your options are
to have the exception apply to any computer (including computers on the Internet), the local network only, or a custom list of IP addresses.
6. To change the scope of the exception, click Change Scope to open the Change
Scope dialog box, where you can configure the scope options. Click OK to return
to the Add A Port dialog box.
7. Click OK again to add the exception and return to the Windows Firewall dialog
box.
After you have added the exception, it appears in the Programs And Services list
on the Exceptions tab of the Windows Firewall dialog box.
8. Select the check box for the exception to enable it.
9. Click OK to close the Windows Firewall dialog box.
Lesson 5
Configuring Windows Firewall 15-53
To create a service exception for a particular network connection for which Windows
Firewall is enabled, use these steps.
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Windows Firewall.
4. In the Windows Firewall dialog box, on the Advanced tab, in the Network Connection Settings section, click the connection for which you want to configure an
exception, and then click Settings.
Windows displays the Advanced Settings dialog box, shown in Figure 15-28.
F15us28r.bmp
Figure 15-28 Create an exception for a particular network connection in Windows Firewall.
5. On the Services tab, click Add.
Windows displays the Service Settings dialog box.
6. Type a description of the service.
7. If the computer on which you are configuring Windows Firewall is an ICS host,
you can configure Windows Firewall to forward traffic for the port to a particular
computer on the network by typing that computer’s IP address. If the computer is
not an ICS host, you should enter the IP address for the local computer.
Tip
Instead of entering the IP address for the local computer, you can also use the loopback address 127.0.0.1, which always refers to the local computer. This is useful should the
IP address of the local computer change.
15-54
Chapter 15
Configuring Network and Internet Connections
8. Enter the port information for the service.
9. Click OK to close the Service Settings dialog box. Click OK to close the Advanced
Settings dialog box. Click OK again to close the Windows Firewall dialog box.
ICMP Exceptions
ICMP allows routers and host computers to swap basic error and configuration information. The information includes whether or not the data sent reaches its final destination, whether it can or cannot be forwarded by a specific router, and what the best
route for the data is. ICMP tools such as Pathping, Ping, and Tracert are often used to
troubleshoot network connectivity.
ICMP troubleshooting tools and their resulting messages are helpful when used by a
network administrator, but harmful when used by an attacker. For instance, a network
administrator sends a ping request in the form of an ICMP packet that contains an echo
request message to the IP address that is being tested. The reply to that echo request
message allows the administrator to verify that the computer is reachable. An attacker,
on the other hand, can send a storm of specially formed pings that can overload a
computer so that it cannot respond to legitimate traffic. Attackers can also use ping
commands to determine the IP addresses of computers on a network. By configuring
ICMP, you can control how a system responds (or does not respond) to such ping
requests. By default, Windows Firewall blocks all ICMP messages.
Table 15-5 provides details about ICMP exceptions you can enable in Windows
Firewall.
Table 15-5
ICMP Options
ICMP Option
Description
Allow Incoming
Echo Request
Controls whether a remote computer can ask for and receive a
response from the computer. Ping is a command that requires
you to enable this option. When enabled (as with other options),
attackers can see and contact the host computer.
Allow Incoming Timestamp
Request
Sends a reply to another computer, stating that an incoming
message was received and includes time and date data.
Allow Incoming Mask
Request
Provides the sender with the subnet mask for the network of
which the computer is a member. The sender already has the
IP address; giving the subnet mask is all an administrator (or
attacker) needs to obtain the remaining network information
about the computer’s network.
Allow Incoming Router
Request
Provides information about the routes the computer recognizes
and passes on information it has about any routers to which it is
connected.
Lesson 5
Table 15-5
Configuring Windows Firewall 15-55
ICMP Options
ICMP Option
Description
Allow Outgoing
Destination Unreachable
The computer sends a Destination Unreachable error message to
clients who attempt to send packets through the computer to a
remote network for which there is no route.
Allow Outgoing Source
Quench
Offers information to routers about the rate at which data is
received; tells routers to slow down if too much data is being
sent and it cannot be received fast enough to keep up.
Allow Outgoing
Parameter Problem
The computer sends a Bad Header error message when the computer discards data it has received that has a problematic header.
This message allows the sender to understand that the host
exists, but that there were unknown problems with the message
itself.
Allow Outgoing
Time Exceeded
The computer sends the sender a Time Expired message when
the computer must discard messages because the messages
timed out.
Allow Redirect
Data that is sent from this computer will be rerouted if the path
changes.
Security Alert
Generally, you should enable ICMP exceptions only when you need them for
troubleshooting, and then disable them after you have completed troubleshooting. Make sure
that you do not allow or enable these options without a full understanding of them and of the
consequences and risks involved.
How to Enable ICMP Exceptions
To enable a global ICMP exception for all connections on a computer, use these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Windows Firewall.
4. In the Windows Firewall dialog box, click the Advanced tab.
5. In the ICMP section, click Settings.
6. Select the check box for the exception you want to enable.
7. Click OK to close the ICMP Settings dialog box. Click OK again to close the Windows Firewall dialog box.
15-56
Chapter 15
Configuring Network and Internet Connections
To enable an ICMP exception for a network connection, use these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network And Internet Connections window, click Windows Firewall.
4. In the Windows Firewall dialog box, click the Advanced tab.
5. In the Network Connection Settings section, click the connection for which you
want to configure an exception, and then click Settings.
6. In the Advanced Settings dialog box, click the ICMP tab, shown in Figure 15-29.
F15us29r.bmp
Figure 15-29
Create an ICMP exception for a connection.
7. Select the check box for the exception you want to enable.
8. Click OK to close the Advanced Settings dialog box. Click OK again to close the
Windows Firewall dialog box.
Troubleshooting Windows Firewall
There are a few fairly common problems that end users encounter when using Windows Firewall, including the inability to enable or disable Windows Firewall on a connection, problems with file and print sharing, a network user’s inability to access a
server on the network (such as a Web server), problems with Remote Assistance, and
problems running Internet programs.
When troubleshooting Windows Firewall, make sure that you remember to check
the obvious first. The following are some basic rules that you must follow, and any
Lesson 5
Configuring Windows Firewall 15-57
deviation from them can cause many of the common problems that are encountered
when using Windows Firewall:
■
Windows Firewall can be enabled or disabled only by administrators. ICF can
be enabled or disabled by a Local Security Policy or Group Policy, as well—
sometimes preventing access even by a local administrator.
■
To share printers and files on a local computer that is running Windows Firewall,
you must enable the File And Printer Sharing exception.
■
If the local computer is running a service, such as a Web server, FTP server, or
other service, network users cannot connect to these services unless you create
the proper exceptions in Windows Firewall.
■
Windows Firewall blocks Remote Assistance and Remote Desktop traffic by
default. You must enable the Remote Desktop exception for remote users to be
able to connect to a local computer with Remote Desktop or Remote Assistance.
Practice: Configure Windows Firewall
In this practice, you will ensure that Windows Firewall is enabled on all connections on
your computer. You will disable and then re-enable Windows Firewall on your LAN
connection only. You will then enable an exception in Windows Firewall for all connections. The practices in this exercise require that you have a properly configured
LAN connection.
Exercise 1: Ensure that Windows Firewall is Enabled For All Network Connections
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Network And Internet Connections.
3. In the Network Connections window, right-click your LAN connection, and then
click Properties.
4. In the Local Area Connection Properties dialog box, on the Advanced tab, in the
Windows Firewall section, click Settings.
5. In the Windows Firewall dialog box, ensure that On (Recommended) is selected.
Also ensure that the Don’t Allow Exceptions check box is cleared.
Leave both the Windows Firewall dialog box and the Local Area Connection Properties dialog box open for the next exercise.
Exercise 2: Disable and Re-Enable Windows Firewall on Your Local Area
Connection Only
1. In the Windows Firewall dialog box, click the Advanced tab.
2. In the Network Connection Settings section, in the list of connections, clear the
check box next to Local Area Connection, and then click OK.
15-58
Chapter 15
Configuring Network and Internet Connections
Windows Firewall is now disabled for the local area connection. A bubble appears
in the notification area informing you that your computer is at risk because the
firewall is disabled.
3. In the Network Connections window, right-click Local Area Connection, and then
click Properties. In the Local Area Connection Properties dialog box, click the
Advanced tab. In the Windows Firewall section, click Settings.
4. In the Windows Firewall dialog box, on the Advanced tab, select the check box
next to Local Area Connection, and then click OK.
Windows Firewall is now enabled for the local area connection. Leave the Local
Area Connection Properties dialog box open for the next exercise.
Exercise 3: Enable an Exception in Windows Firewall for all Connections
1. In the Local Area Connection Properties dialog box, on the Advanced tab, in the
Windows Firewall section, click Settings.
2. In the Windows Firewall dialog box, on the Exceptions tab, select the File And
Printer Sharing check box.
3. Click OK.
Windows Firewall is now configured to allow file and printer sharing traffic into
your computer.
4. Click OK again to close the Local Area Connection Properties dialog box.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. You are troubleshooting a network connection and need to use the Ping command to see if a computer is reachable. Which ICMP exception must you enable
on that computer? Choose the correct answer.
a. Allow Incoming Router Request
b. Allow Incoming Echo Request
c. Allow Outgoing Source Quench
d. Allow Redirect
Lesson 5
Configuring Windows Firewall 15-59
2. By default, what two types of traffic does Windows Firewall allow into a
computer?
3. Windows Firewall protects a computer running Windows XP Professional even
while the computer is starting up. (True/False)
Lesson Summary
■
Windows Firewall is a software-based firewall built into Windows XP Professional.
Windows Firewall blocks all incoming network traffic except for solicited traffic
and excepted traffic.
■
You can enable or disable Windows Firewall globally for all network connections
on a computer, including LAN, dial-up, and wireless connections.
■
You can also enable or disable Windows Firewall selectively for each network
connection on a computer.
■
Windows Firewall allows you to configure a number of advanced options, including the following:
■
❑
Enabling Windows Firewall logging to log network activity
❑
Creating an exception for a service or application to allow traffic through the
firewall
❑
Creating a custom service definition when a built-in exception does not suit
your needs
❑
Creating an ICMP exception so that the computer responds to traffic from certain network utilities
Troubleshooting Windows Firewall typically involves enabling or disabling Windows Firewall and creating exceptions so that specific network traffic is allowed
into the computer.
15-60
Chapter 15
Configuring Network and Internet Connections
Case Scenario Exercise
In this exercise, you will read a scenario about configuring network connections and
then answer the questions that follow. If you have difficulty completing this work,
review the material in this chapter before beginning the next chapter. You can find
answers to these questions in the “Questions and Answers” section at the end of this
chapter.
Scenario
You are an administrator working for a company named Contoso, Ltd., a developer of
custom networking applications based in Houston. Greta, a user in the Sales department, has contacted you for help in setting up a demonstration of one of the company’s applications at a seminar in a hotel in Las Vegas. The hotel has provided a
conference room with broadband Internet access via an Ethernet cable, but your staff
must configure their own network when they get there. The company is sending five
notebook computers running Windows XP Professional. Each computer has a built-in
Ethernet network adapter and a built-in wireless network adapter, but none has been
configured for networking.
All five of the computers will be used in demonstrations and must be networked
together. In addition, all the computers will need access to the Internet. Because all the
computers are running Windows XP Professional, you have configured each computer
so that it is a member of a workgroup named Contoso.
Questions
1. Because each of the computers has a wireless network adapter, you have decided
to create a wireless network to connect the computers. However, the company
did not send any wireless networking devices. Can you create a wireless network
without additional hardware? If so, what kind of wireless network can you create?
2. You want to secure the wireless network. What kind of security could you implement on the type of wireless network you can create?
3. Because there is only one Internet connection, and each computer must have
Internet access, you have decided to use ICS to share Internet access among the
computers. The connection you have been provided requires that the computer
Case Scenario Exercise 15-61
be configured to accept a leased IP address from a DHCP server. How would you
configure this?
4. After successfully establishing the Internet connection for the selected notebook
computer, how would you enable ICS on the host computer?
5. After enabling Internet Connection Sharing, what IP address will the host computer assign itself for the wireless network connection on the private network?
6. How should you configure the other notebook computers to connect to the host
computer?
7. What range of IP addresses would you expect to see for the wireless network connections on the other notebook computers?
8. After configuring the other notebook computers, all but one can connect to the
Internet successfully. However, one of the computers does not connect. What two
15-62
Chapter 15
Configuring Network and Internet Connections
methods could you use to determine the IP address assigned to that computer’s
wireless network connection?
9. You determine that the computer’s wireless connection has been assigned the IP
address 169.254.003.322, which indicates that the computer has assigned itself
an IP address rather than obtaining an address from the ICS host computer. In
what two ways could you force the computer to attempt to obtain an IP address
again?
Troubleshooting Lab
You are an administrator for a company named Contoso, Ltd., and are still working
with Greta at her sales seminar. You have successfully configured the network so that
all computers can connect to one another and to the Internet. Greta is now trying to
demonstrate one of the company’s custom networking applications. One notebook
computer is running the custom application and is trying to connect to another notebook computer. The target computer does not need to have the application installed.
However, the application cannot connect.
1. What do you suspect might be interfering with the network traffic from the custom
application?
2. How would you solve this problem?
Exam Highlights 15-63
Chapter Summary
■
You can view all network connections configured on a computer in the Network
Connections window, which you can access through Control Panel. In the Network Connections window, you can right-click a connection to access command
for renaming, disabling, and repairing a connection. You can also open a connection’s Properties dialog box to configure advanced options.
■
Dial-up connections work much like LAN connections, but they have additional
options that let you control when the connection is dialed, the number for the
connection, and other criteria for use. To create a dial-up connection, you use the
New Connection Wizard. You can also configure Windows XP Professional to
allow incoming dial-up connections.
■
Windows XP Professional can operate in two wireless modes: ad-hoc wireless networking, in which there are multiple stations but no AP, and infrastructure wireless
networking, in which stations connect to an AP. You can secure wireless networks
in the following ways:
❑
By filtering MAC addresses so that only specified computers can connect to
an AP
❑
By disabling SSID broadcasts so that casual intruders will not detect the wireless network
❑
By using WEP encryption, which is widely supported but also has widely recognized flaws
❑
By using WPA encryption, which provides stronger encryption than WEP
■
ICS lets one computer with an Internet connection share that connection with
other computers on the network. The computer running ICS always configures
itself with the IP address 192.168.0.1. That computer also acts as a DHCP server
and gives other computers on the network addresses in the 192.168.0.2 through
192.168.0.254 range.
■
Windows Firewall is a software-based firewall built into Windows XP Professional.
Windows Firewall blocks all incoming network traffic except for solicited traffic
and excepted traffic. You can enable or disable Windows Firewall globally for all
network connections on a computer, or enable and disable it on individual connections.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
15-64
Chapter 15
Configuring Network and Internet Connections
Key Points
■
Repairing a network connection forces several actions, the most important of
which include renewing an IP address lease (which you can also do by typing
ipconfig /renew at the command prompt) and flushing the DNS cache (which
you can also do by typing ipconfig /flushdns at the command prompt).
■
You can configure a wireless client to operate in two modes: ad-hoc mode, in
which there is no AP, and infrastructure mode, in which an AP is used. An ad-hoc
network offers little security or configurability, and is sometimes used in small
workgroup environments. An infrastructure network, which provides greater security and configurability, is the most common mode for wireless networking.
■
You should know where Windows Firewall log files are stored, whether logging is
available, and what kind of information you can learn from log files.
Key Terms
ad-hoc wireless network A wireless network mode in which multiple wireless stations can connect without requiring an AP.
dial-up connection A connection that connects you to a private network or the
Internet by using a device that transfers data over a public telephone network.
exception Unsolicited network traffic that you have specifically configured Windows Firewall to allow.
IEEE 802.1x authentication
Authenticates users and computers for access to
802.11 wireless networks and wired Ethernet networks.
infrastructure wireless network A wireless network mode in which multiple
wireless stations communicate through an AP.
Internet Connection Sharing (ICS) A feature of Windows XP Professional that allows
you to share one connection to the Internet with all computers on your network.
Network Bridge A feature that allows Windows XP Professional to connect network
segments (groups of networked computers) without having to use a router or bridge.
New Connection Wizard A wizard in Windows XP Professional that can perform
much of the work of configuring a network connection for different situations.
Wi-Fi Protected Access (WPA) A wireless encryption standard available in Windows XP Professional that provides increased security over the WEP standard—
the other encryption standard supported by Windows XP Professional.
Windows Firewall
Professional.
A stateful, host-based firewall provided with Windows XP
Wired Equivalent Privacy (WEP) One of two wireless encryption standards available in Windows XP Professional. WEP is the encryption standard that is specified
by the IEEE 802.11 standard. The other encryption standard available is WPA.
Questions and Answers 15-65
Questions and Answers
Lesson 1 Review
Page
15-17
1. What are the four outbound connection types that you can configure using the
New Connection Wizard?
Connect To The Internet, Connect To The Network At My Workplace, Set Up A Home Or Small
Office Network, and Set Up An Advanced Connection
2. In which two ways can you force a network connection to attempt to renew its
DHCP lease?
You can type the ipconfig /renew command at the command prompt; or you can right-click a
network connection in the Network Connections window, and then click Repair.
3. How can you tell the duration that a network connection has been successfully
connected?
Right-click the network connection in the Network Connections window, and then click Status to
open the Local Area Connection Status dialog box. The General tab shows the current connection status, including whether the connection is connected, the duration of the connection, the
rated speed of the connection, and activity on the connection.
Lesson 2 Review
Page
15-28
1. A user complains to you that she does not want to hear her modem each time
she connects to the company network from her portable computer. What should
you do?
On the Modem tab of the modem’s Properties dialog box, reduce the volume or disable the
modem speaker entirely.
2. Other than allowing VPN connections, what does Windows XP Professional do
when you configure a new connection to allow virtual private connections?
If you choose to allow VPN connections, Windows XP Professional configures Windows Firewall
so that your computer can send and receive VPN traffic.
3. What is callback and why would you enable it?
Callback forces the remote server (in this case, your computer) to disconnect from the client
calling in, and then call the client computer back. You would use callback to have the bill for a
phone call charged to your phone number rather than to the phone number of the user who
called in. You could also use callback to increase security because you can specify the number
that the system calls back. If an unauthorized user calls in, the callback feature prevents the
unauthorized user from accessing the system.
15-66
Chapter 15
Configuring Network and Internet Connections
Lesson 3 Review
Page
15-40
1. Which two modes of networking are available for connecting to a wireless network in Windows XP Professional?
Ad-hoc wireless networking, in which there are multiple stations but no AP, and infrastructure
wireless networking, in which stations connect to an AP.
2. What are four ways to protect a wireless network?
MAC address filtering, disabling SSID broadcasting, using WEP encryption, and using WPA
encryption.
3. When you configure 802.1x authentication for wireless networking in Windows
XP Professional, all wireless connections use the same authentication settings.
(True/False)
False. Windows XP Professional allows you to configure 802.1x authentication on a per-connection basis.
Lesson 4 Review
Page
15-44
1. A user has set up ICS on a host computer that runs Windows XP Professional, but
is experiencing problems with clients being able to connect to both the Internet
and other computers on the network. Which of the following items could be the
cause of the problems? Choose all that apply.
a. There is a DHCP server on the network.
b. There is a DNS server on the network.
c. There are computers on the network with static IP addresses.
d. There is a Windows 2000 server on the network.
A, B, and C are correct. DHCP and DNS servers as well as computers with static IP addresses
all cause problems for ICS. D is not correct because Windows 2000 servers can be members
of workgroups and work with ICS as long as they are not also domain controllers that provide
DHCP or DNS services.
2. What IP address is assigned to the ICS host?
192.168.0.1
3. After enabling ICS on the host computer, how should you configure other computers in the workgroup to connect to the Internet through the ICS computer?
You should configure other computers to obtain an IP address automatically. The ICS host acts
as DHCP server, assigning IP addresses in the range 192.168.0.2 through 192.168.0.254 to
other computers on the network.
Questions and Answers 15-67
Lesson 5 Review
Page
15-58
1. You are troubleshooting a network connection and need to use the Ping command to see if a computer is reachable. Which ICMP exception must you enable
on that computer? Choose the correct answer.
a. Allow Incoming Router Request
b. Allow Incoming Echo Request
c. Allow Outgoing Source Quench
d. Allow Redirect
The correct answer is B. The Allow Incoming Echo Request exception allows a computer to
respond to ping requests. A is incorrect because this option provides information about connected routers and the flow of traffic from the computer. C is incorrect because this option
allows the computer to send a message to slow the flow of data. D is incorrect because this
option allows routers to redirect data to more favorable routes.
2. By default, what two types of traffic does Windows Firewall allow into a
computer?
Solicited traffic, which is sent in response to a request by the local computer, and excepted
traffic, which is unsolicited traffic that you have specifically configured the firewall to allow.
3. Windows Firewall protects a computer running Windows XP Professional even
while the computer is starting up. (True/False)
True. Windows Firewall performs stateful packet filtering during startup so that the computer
can perform basic network tasks and still be protected.
Case Scenario Exercise
Page
15-60
1. Because each of the computers has a wireless network adapter, you have decided
to create a wireless network to connect the computers. However, the company did
not send any wireless networking devices. Can you create a wireless network
without additional hardware? If so, what kind of wireless network can you create?
Yes, you can create an ad-hoc network that does not require an AP.
2. You want to secure the wireless network. What kind of security could you implement on the type of wireless network you can create?
Because you are creating an ad-hoc network, you cannot configure the kind of security you
could have if you had an AP, such as filtering MAC addresses or disabling SSID broadcasts.
However, you can secure an ad-hoc network using WEP.
3. Because there is only one Internet connection, and each computer must have
Internet access, you have decided to use ICS to share Internet access among the
computers. The connection you have been provided requires that the computer
be configured to accept a leased IP address from a DHCP server. How would you
configure this?
15-68
Chapter 15
Configuring Network and Internet Connections
You should designate one notebook computer to have the Internet connection. On that computer, you should connect the Ethernet cable to the built-in network adapter. You should then
open the Properties dialog box for the LAN connection. In the Local Area Connection Properties
dialog box, on the General tab, you should select the Internet Protocol (TCP/IP) component,
and then click Properties to open the Internet Protocol (TCP/IP) Properties dialog box. You
should configure the computer to obtain an IP address automatically.
4. After successfully establishing the Internet connection for the selected notebook
computer, how would you enable ICS on the host computer?
You would open the Properties dialog box for the local area connection that represents the
Internet connection. On the Advanced tab of the Properties dialog box, you should select the
Allow Other Network Users To Connect Through This Computer’s Internet Connection check box.
5. After enabling Internet Connection Sharing, what IP address will the host computer assign itself for the wireless network connection on the private network?
192.168.0.1.
6. How should you configure the other notebook computers to connect to the host
computer?
You should open the Properties dialog box for the wireless connection on each of the other
notebook computers and ensure that the connection is configured to obtain an IP address automatically. The computers will obtain IP addresses from the host computer.
7. What range of IP addresses would you expect to see for the wireless network connections on the other notebook computers?
ICS assigns IP addresses in the 192.168.0.2 through 192.168.0.254 range.
8. After configuring the other notebook computers, all but one can connect to the
Internet successfully. However, one of the computers does not connect. What two
methods could you use to determine the IP address assigned to that computer’s
wireless network connection?
You could use the ipconfig command at the command prompt or you could right-click that connection in the Network Connections window and then click Status. The Support tab of the connection’s Status dialog box indicates the IP address.
9. You determine that the computer’s wireless connection has been assigned the IP
address 169.254.003.322, which indicates that the computer has assigned itself an
IP address rather than obtaining an address from the ICS host computer. In what
two ways could you force the computer to attempt to obtain an IP address again?
You could use the ipconfig /renew command at the command prompt or you could right-click the
connection in the Network Connections window, and then click Repair.
Questions and Answers 15-69
Troubleshooting Lab
Page
15-62
1. What do you suspect might be interfering with the network traffic from the custom
application?
Most likely, it is Windows Firewall that is interfering because it drops all unsolicited traffic by
default unless you create an exception.
2. How would you solve this problem?
Although it would be tempting to disable Windows Firewall for the demonstration, a better solution is to create an exception on the target computer that allows the custom application to connect. This solution has the added advantage of showing Greta’s customers how the application
can work even when Windows Firewall is enabled. Because the application is not installed on
the target computer, you must create an exception on the computer that allows the traffic on
the particular port used by the application. To do this, you must know the port or ports that the
application uses.
16 Configuring Security
Settings and Internet
Options
Exam Objectives in this Chapter:
■
Configure, manage, and troubleshoot a security configuration and local security
policy.
■
Configure, manage, and troubleshoot local user and group accounts.
❑
Configure, manage, and troubleshoot auditing.
❑
Configure, manage, and troubleshoot account policy.
❑
Configure, manage, and troubleshoot user and group rights.
■
Configure, manage, and troubleshoot Internet Explorer security settings.
■
Connect to resources by using Internet Explorer.
Why This Chapter Matters
A security policy is a combination of settings that affect a computer or a user. Policies that affect a computer also affect any user who logs on to that computer. Policies that affect a user affect that user no matter what computer the user logs on to.
In this chapter, you learn how Group Policy and Local Security Policy are applied to a
computer running Windows XP Professional. You learn how to configure Local Security Policy and about the various settings that are available for configuration. In this
chapter, you also learn how to configure Internet Options in Internet Explorer to view
Internet resources and how to enhance security and privacy in Internet Explorer.
Lessons in this Chapter:
■
Lesson 1: Overview of Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-3
■
Lesson 2: Configuring Account Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-16
■
Lesson 3: Configuring User Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-24
■
Lesson 4: Configuring Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-31
■
Lesson 5: Implementing an Audit Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-36
■
Lesson 6: Configuring Internet Explorer Options. . . . . . . . . . . . . . . . . . . . . 16-46
16-1
16-2
Chapter 16
Configuring Security Settings and Internet Options
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have
Microsoft Windows XP Professional installed on a computer on which you can make
changes.
Lesson 1
Overview of Security Policy
16-3
Lesson 1: Overview of Security Policy
Security Policy in Windows XP Professional refers to two types of policies: Local Security Policy and Group Policy. Local Security Policy is applied to a specific computer,
and is the only type of security policy you can use on computers that are members of
a workgroup. The specific local policy that you create is referred to as a Local Group
Policy Object (LGPO).
Group Policy is applied to sites, domains, and OUs in an Active Directory environment,
and affects all computers or users that are members of the container to which the Group
Policy is assigned. In a domain environment, administrators typically rely on Group Policy to apply security settings to computers, but Local Security Policy can also apply. The
specific group policy that you create is referred to as a Group Policy Object (GPO).
After this lesson, you will be able to
■ Configure Local Security Policy on a computer running Windows XP Professional.
■ Describe how Group Policy affects a computer running Windows XP Professional.
■ View policies that are in effect on a computer running Windows XP Professional.
Estimated lesson time: 40 minutes
How to Configure Local Security Policy
By using Local Security Policy, you can implement numerous security-relevant settings
on a local computer, such as group membership, permissions and rights, password
requirements, desktop settings, and much more. For computers in a workgroup environment, Local Security Policy offers a way to apply consistent restrictions across those
computers.
What You Can Configure with Local Security Policy
Windows XP Professional allows you to configure security settings in the following
areas by using Local Security Policy:
Account policies Account policies include password policies, such as minimum
password length and account lockout settings. You will learn about the account
policies available for configuration in Lesson 2, “Configuring Account Policies.”
Local policies
❑
Local policies include three categories of policies, as follows:
Auditing policies allow you to track the activities of users and the access of
resources on a computer. Event log settings are used to configure auditing for
security events, such as successful and failed logon attempts. You will learn
about auditing in detail in Lesson 5, “Implementing an Audit Policy.”
16-4
Chapter 16
Configuring Security Settings and Internet Options
❑
User rights assignments allow you to control the basic system functions that
a user can perform. You will learn about user rights in detail in Lesson 3,
“Configuring User Rights.”
❑
Security options allow you to control various security settings in Windows
XP Professional. You will learn about security options in detail in Lesson 4,
“Configuring Security Options.”
Public key policies Public key policies are used to configure encrypted data recovery agents and trusted certificate authorities.
Software restriction policies Software restriction policies allow you to prevent
unwanted applications from running.
IP security policy IP security policy is used to configure network Internet Protocol
(IP) security.
System services System services settings are used to configure and manage security
settings for areas such as network services, file and print services, and Internet services.
Registry Registry settings are used to manage the security descriptors on Registry
subkeys and entries.
File system File system settings are used to configure and manage security settings
on the local file system.
See Also
This chapter focuses on using Local Security Policy to configure account policies
(Lesson 2), user rights (Lesson 3), security options (Lesson 4), and auditing (Lesson 5). For
more information on configuring other available settings, refer to Chapter 16 of the Microsoft
Windows XP Professional Resource Kit Documentation, available at http://
www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/
prork_overview.asp.
How to Modify Local Security Policy
To modify Local Security Policy, you use the Local Security Policy console (see
Figure 16-1), which is found in the Administrative Tools folder. The Local Security Policy console provides a standard two-paned console window. The tree in the left pane
shows the categories of policies you can assign. This chapter covers settings in the
Account Policies folder, which allows you to configure password policy and account
lockout policy; and the Local Polices folder, which allows you to configure audit policy, user rights assignments, and security options.
Lesson 1
Overview of Security Policy
16-5
F16us01
Figure 16-1
Use the Local Security Policy tool to set local policies.
When you select a policy folder (for example, the Password Policy folder), the right
pane displays the available policies you can set, as shown in Figure 16-2. For each policy, the current setting is also shown.
F16us02
Figure 16-2
The Local Security Policy tool shows available policies and the current settings.
To change a policy with the Local Security Settings tool, use the following steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools window, double-click Local Security Policy.
5. In the Local Security Policy window, select the folder containing the policy you
want to edit.
16-6
Chapter 16
Configuring Security Settings and Internet Options
6. In the right pane, double-click the policy you want to edit.
Windows displays the dialog box for the policy, as shown in Figure 16-3.
F16us03
Figure 16-3
Change the settings for the policy.
7. Configure the settings for the policy, and then click OK.
Caution
Settings you configure using the Local Security Policy tool occur immediately; you
are not required to save the policy changes. Most of the settings that you make will take
effect the next time a user logs on to the computer.
Security Templates
Windows XP Professional provides a number of predefined security templates that
you can use as a starting point when configuring Local Security Policy. Each template
is a collection of settings designed for a particular environment. You can use these templates as they come or you can customize them to suit your needs. There are two
advantages of using administrative templates. The first advantage is that you can rely
on preconfigured settings instead of having to configure all the settings yourself. The
second advantage is that after you have configured a security template to suit your
needs, you can use that template to quickly apply settings to other computers, saving
you from having to configure the Local Security Policy yourself on each computer.
Predefined Security Templates By default, the predefined security templates are
stored in the %systemroot%\Security\Templates folder. The predefined templates
available include the following:
Setup Security (Setup Security.inf) This template defines the default level of security applied to all new installations of Windows XP Professional on an NTFS File
System partition. This template is also intended for resetting security levels back to
their default in disaster recovery situations.
Lesson 1
Overview of Security Policy
16-7
Compatible (Compatws.inf) This template provides a higher level of security than
Setup Security, but still ensures that standard applications will run successfully. By
default, this template allows all users to run Windows-certified applications, but
allows only power users to run noncertified applications.
Secure (Securews.inf) This template adds an additional layer of security to the
Compatible level and can restrict some applications from functioning properly.
High Secure (Hisecws.inf) This template provides a maximum level of security for
network traffic and communication protocols without regard for application compatibility. The High Secure templates impose greater restrictions on the levels of
encryption and signing required for authentication.
Root Directory Permissions (Rootsec.inf) This template specifies the default Windows XP Professional permissions for the root of the system partition. You can use
this template to reset the file permissions for the system partition root in disaster
recovery situations.
!
Exam Tip
The Setup Security template (Setup Security.inf) defines the default level of
security applied to all new installations of Windows XP Professional on an NTFS partition. This
template is useful resetting security levels back to their defaults.
How to Customize a Predefined Security Template
rity template, use these steps:
To customize a predefined secu-
1. Click Start, and then click Run.
2. In the Run dialog box, type mmc, and then click OK.
Windows opens the Microsoft Management Console (MMC) with a blank console
window named Console1.
3. In the console, click File, and then click Add/Remove Snap-In.
4. In the Add/Remove Snap-In dialog box, click Add.
5. In the Add Standalone Snap-Ins dialog box, click Security Templates, and then
click Add.
6. Click Close, and then click OK.
In the console window, Windows displays the Security Templates add-in, as
shown in Figure 16-4.
16-8
Chapter 16
Configuring Security Settings and Internet Options
F16us04
Figure 16-4
Add the Security Templates snap-in to a console.
7. Right-click the predefined template you want to customize, and then click Save As.
8. In the Save As dialog box, type a new name for your customized template, and
then click OK.
Windows adds the new template to the console window.
9. In the console window, expand the new template you just added.
10. Configure the policies the way you want them in your new template.
Note To configure a policy, double-click it, and then use the dialog box that opens to adjust
settings. You will learn more about the settings you can adjust in the other lessons in this
chapter.
How to Apply a Security Template After creating a customized template, you must
apply it to a computer for the template to take effect. You will do this by using a tool
named Security Configuration And Analysis.
To apply a security template, use these steps:
1. Click Start, and then click Run.
2. In the Run dialog box, type mmc, and then click OK.
Windows opens the MMC with a blank console window named Console1.
3. In the console, click File, and then click Add/Remove Snap-In.
4. In the Add/Remove Snap-In dialog box, click Add.
5. In the Add Standalone Snap-Ins dialog box, click Security Configuration And Analysis, and then click Add.
6. Click Close, and then click OK.
Lesson 1
Overview of Security Policy
16-9
In the console window, Windows displays the Security Configuration And Analysis, as shown in Figure 16-5.
F16us05
Figure 16-5 Add the Security Configuration And Analysis snap-in to a console.
7. In the console tree, right-click Security Configuration And Analysis, and then click
Open Database.
8. In the Open Database dialog box, type the name of a database to create, and then
click Open.
Windows displays the Import Template dialog box.
9. In the Import Template dialog box, select the customized template you have created, and then click Open.
Windows returns you to the console window. At this point, you can do two things
with the template you have imported:
❑
Right-click Security Configuration And Analysis, and then click Configure Computer Now to apply the settings in the template to your computer. You are
asked to specify a location for an error log file (which contains any errors
encountered during the configuration), and then Windows applies the settings.
❑
Right-click Security Configuration And Analysis, and then click Analyze Computer Now to have Windows compare the current settings on your computer
against the settings specified in the template. You can use this option to test
your computer for weaknesses or security violations. After the analysis, you can
browse through the policies in the Security Configuration And Analysis window
to view the database setting and the computer setting for each policy.
What Is Group Policy?
Group Policy differs from Local Security Policy mainly in the way it is applied. Group
Policy is available only in an Active Directory environment. When you create a GPO,
you associate that object with a site, domain, or OU in Active Directory. All computers
or users in that site, domain, or OU then have that policy applied to them.
16-10
Chapter 16
Configuring Security Settings and Internet Options
Note
This chapter does not cover how to create and apply GPOs because this topic is out
of scope for this book and the exam it covers. Instead, this chapter covers how GPOs interact
with and affect LGPOs.
Additional Settings That You Can Configure by Using Group Policy
You can use Group Policy to configure any of the settings that you can configure with
Local Security Policy. In addition, you can also use Group Policy to do the following:
■
Install software and software updates on desktop computers throughout an Active
Directory network.
■
Redirect special folders (such as users’ My Documents folders) to a network location.
■
Configure Remote Installation Services (RIS) options.
How Multiple Policies Are Combined
In an Active Directory environment, GPOs can come from different sources to apply to
a single user or computer. For example, a computer might be a member of a domain,
a site, and two levels of OUs. Each of them might have a GPO associated with it, meaning that four GPOs would affect the computer. In addition, the computer might have an
LGPO in effect. There must be a way of determining how those GPOs and LGPOs are
combined. GPOs and LGPOs are processed in the following order on a computer running Windows XP Professional.
1. The LGPO on the computer is processed, and all settings specified in that LGPO
are applied.
2. Any GPOs that have been linked with the site in which the computer resides are
processed. Settings made at this level override any conflicting settings made at the
preceding level. For example, if the local GPO specifies that a computer does not
have access to a printer, and a site GPO specifies that the computer does have
access, the site GPO “wins.”
3. GPOs linked to the domain in which the computer resides are processed, and any
settings are applied. Settings made at the domain level override conflicting settings
applied at the local or site level.
4. GPOs linked to any OUs that contain the user or computer object are processed.
Settings made at the OU level override conflicting settings applied at the domain,
local, or site level. It is possible for a single object to be in multiple OUs. In this
case, GPOs linked to the highest level OU in the Active Directory hierarchy are
processed first, followed by the next-highest level OU, and so on. If multiple
GPOs are linked to a single OU, the administrator gets to specify the order in
which they are processed.
Lesson 1
!
Overview of Security Policy 16-11
Exam Tip
An easy way to remember the order in which GPOs are processed is that first the
local GPO is processed, and then Active Directory GPOs are processed. Active Directory GPOs
are processed starting with the farthest structure from the user (the site), then the next
closer structure to the user (the domain), and finally the closest structure (the OU). You can
also use the acronym LSDOU (local, site, domain, organizational unit) to help you remember.
Note
Administrators can configure the order in which GPOs are applied if multiple GPOs
exist for a site, domain, or OU. In addition, administrators can control whether GPOs from
higher levels are overridden or not, which might affect how GPOs are processed.
How Group Policy Is Applied
Obviously, processing policies when a user logs on is a pretty complicated endeavor.
After all, a large number of GPOs might be linked (either directly or through inheritance) to the computer that a user is logging on to and to the user account being logged
on with. The following steps describe how Group Policy is applied when a computer
that is part of Active Directory starts and a user logs on.
1. During startup, the computer obtains an ordered list of GPOs, based on whether
the computer is a member of Active Directory or not. If not, only the local GPO is
processed. If the computer is a member of Active Directory, the list of GPOs to
process is based on the Active Directory structure and inheritance, as discussed in
the preceding sections.
2. If the GPOs linked to the computer have not changed since the last time the computer started, no processing is done. If the GPOs have changed, they are all processed again.
3. The computer applies any Computer Configuration settings, which occurs in the
familiar order: local, site, domain, OU.
4. Startup scripts specified by any GPOs now run. Each script must complete or time
out before the next script begins.
5. The logon screen is displayed to the user. The user presses CTRL+ALT+DEL and
enters credentials to log on to the network.
6. Once the user is authenticated, the computer loads the user profile (which is governed by the GPOs in effect).
7. The computer receives an ordered list of GPOs that are linked to the user. Again,
if no GPOs have changed since the last time the user logged on, no processing is
done. If the GPOs have changed, they are all processed again.
16-12
Chapter 16
Configuring Security Settings and Internet Options
8. The computer applies any User Configuration settings in this order: local, site,
domain, OU.
9. The computer runs any logon scripts associated with GPOs, and then the desktop
appears.
How to View Policies That Are in Effect On a Computer Running
Windows XP Professional
Fortunately, Windows XP Professional provides ways to determine the policies that are
in effect on a computer and to view the settings that result from those policies. Troubleshooting end user Group Policy is largely a matter of understanding how different
policies are applied and how different levels of policy affect one another. You must
take into consideration how multiple GPOs that affect the same computer or user are
resolved and how GPO inheritance works.
Resultant Set of Policy Tool
The Resultant Set of Policy (RSoP) tool, which is new to Windows XP Professional,
provides a way for you to simulate and test policy settings applied to computers or
users. It shows you the policies applied to the object and order in which they are
applied. This tool makes testing complicated policy structures much easier.
You can run RSoP in two modes:
Planning mode Lets you query the existing GPOs for all policy settings that you can
apply. Planning mode is available only on computers that are members of an
Active Directory domain. This is helpful when you want to simulate the effect of
implementing a new policy, simulate the effect of a slow network connection or
a loopback, or test policy precedence when you plan to move a user or computer
object to a new location.
Logging mode Lets you review existing policy settings applied to computer and user
objects. This mode is helpful for determining an existing structure, ferreting out
problems with inheritance, or testing how security groups affect policy settings.
To start the RSoP tool, use these steps:
1. Click Start, and then click Run.
2. In the Run dialog box, type mmc, and then click OK.
Windows opens the MMC with a blank console window named Console1.
3. In the console, click File, and then click Add/Remove Snap-In.
4. In the Add/Remove Snap-In dialog box, click Add.
Lesson 1
Overview of Security Policy 16-13
5. In the Available Standalone Snap-Ins dialog box, click Resultant Set Of Policy, and
then click Add.
6. Click Close, and then click OK.
In the console window, Windows displays the Resultant Set Of Policy, as shown
in Figure 16-6.
F16us06
Figure 16-6 Use RSoP to view the settings in effect on a computer.
7. Right-click Resultant Set of Policy, and then click Generate RSoP Data.
Windows opens the Resultant Set Of Policy Wizard.
8. On the Welcome page, click Next to continue.
9. On the Mode Selection page, ensure that Logging Mode is selected, and then click
Next.
10. On the Computer Selection page, choose whether you want to display policy settings for This Computer or for Another Computer. If you want to view settings for
a remote computer, you must enter the name of the remote computer. Click Next
to continue.
11. On the User Selection page, choose whether you want to display policy settings
for the Current User or Another User. Click Next to continue.
12. On the Summary Of Selections page, click Next to proceed.
Windows analyzes the policy settings in effect, and then displays the Completing
The Resultant Set Of Policy Wizard page.
13. Click Finish.
14. In the console window, browse the policy settings to determine the current computer settings and their source GPOs.
16-14
Chapter 16
Configuring Security Settings and Internet Options
Group Policy Result Tool
Windows XP Professional also supplies a tool named Group Policy Result Tool,
which is a command-line utility that helps you determine which policies are actually
applied to a computer. You can start this tool by typing Gpresult.exe at the command
prompt. The results, shown in Figure 16-7, show the policies in effect on the computer.
Use the command Gpresult.exe /? to get information on other uses for this tool.
F16us07
Figure 16-7
Use the Group Policy Result Tool to view polices in effect on a computer.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. ______________________ is used to control settings on computers in a workgroup
environment.
2. When multiple GPOs and the LGPO affecting a computer are combined, in what
order are the policies resolved?
Lesson 1
Overview of Security Policy 16-15
3. You would use the ______________________ tool to view the actual settings
affecting a computer and the source of those settings.
Lesson Summary
■
Local Security Policy is applied to a specific computer and is the only type of security policy you can use on computers that are members of a workgroup. You manage Local Security Policy by using the Local Security Policy tool found in the
Administrative Tools folder.
■
Group Policy is applied to sites, domains, and OUs in an Active Directory environment, and affects all computers or users that are members of the container to
which the Group Policy is assigned. When a computer running Windows XP Professional is affected by Local Security Policy and Group Policy, those policies are
applied in the following order:
a. The LGPO is processed first.
b. GPOs linked to the site are processed.
c. GPOs linked to the domain are processed.
d. GPOs linked to the OU are processed.
■
Windows XP Professional provides two tools that help you work with policies.
The RSoP tool lets you view the actual settings in effect on a computer and the
source GPO of those settings. The Group Policy Result tool is a command-line utility that shows you the GPOs affecting a computer.
16-16
Chapter 16
Configuring Security Settings and Internet Options
Lesson 2: Configuring Account Policies
In Chapter 7, “Setting Up and Managing User Accounts,” you learned about assigning
user account passwords and how to unlock an account that was locked by the system.
In this lesson, you learn how to improve the security of your user’s passwords and how
to control when the system locks out a user account.
After this lesson, you will be able to
■ Configure Password Policy.
■ Configure Account Lockout Policy.
Estimated lesson time: 15 minutes
How to Configure Password Policy
Password Policy allows you to improve security on your computer by controlling
how passwords are created and managed. You can specify the maximum length of
time a password can be used before the user must change it. Changing passwords
decreases the chances of an unauthorized person breaking into your computer. If an
unauthorized user has discovered a user account and password combination for your
computer, forcing users to change passwords regularly will cause the user account
and password combination to eventually fail and lock the unauthorized user out of
the system.
Other Password Policy options are available to improve a computer’s security. For
example, you can specify a minimum password length. The longer the password, the
more difficult it is to discover. Another example is maintaining a history of the passwords used. If you also require passwords to be changed regularly, this prevents a user
from having two passwords and alternating between them.
You can configure Password Policy on a computer running Windows XP Professional
by using the Local Security Settings tool. To configure Password Policy, use these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools window, double-click Local Security Policy.
5. In the Local Security Settings window, expand Account Policies, and then click
Password Policy.
6. Select the setting you want to configure, and then on the Action menu, click Properties.
Lesson 2
Configuring Account Policies 16-17
The console displays the current Password Policy settings in the details pane, as
shown in Figure 16-8.
F16us08
Figure 16-8 Configure Password Policy settings in the Local Security Settings window.
Table 16-1 explains the available Password Policy settings.
Table 16-1
Password Policy Settings
Setting
Description
Enforce Password History
The value you enter for this setting indicates the number of passwords to be kept in a password history. The default value of 0
indicates that no password history is being kept. You can set the
value from 0 to 24, indicating the number of passwords to be kept
in password history. This value indicates the number of new passwords that a user must use before he or she can reuse an old password.
Maximum Password Age
The value you enter for this setting is the number of days a user
can use a password before he or she is required to change it. A
value of 0 indicates that the password will not expire. The default
value is 42 days, and the range of values is 0 to 999 days.
Minimum Password Age
The value you enter for this setting is the number of days a user
must keep a password before he or she can change it. The default
value of 0 indicates that the password can be changed immediately. If you are enforcing password history, this value should not
be set to 0. The minimum password age must be less than the
maximum password age.
You can set the range of values from 0 to 999 days. This value
indicates how long the user must wait before changing his or her
password again. Use this value to prevent a user who was forced
by the system to change his or her password from immediately
changing it back to the old password.
16-18
Chapter 16
Configuring Security Settings and Internet Options
Table 16-1
Password Policy Settings
Setting
Description
Minimum Password Length The value you enter for this setting is the minimum number of
characters required in a password. The value can range from 0 to
14 characters inclusive. The default value of 0 indicates that no
password is required.
Passwords Must Meet
Complexity Requirements
The options are Enabled or Disabled (the default). If enabled, all
passwords must meet or exceed the specified minimum password
length (or be at least 6 characters if no minimum length is otherwise enforced); must comply with the password history settings;
must contain capitals, numerals, or punctuation; and cannot contain the user’s account or full name.
Store Password Using
Reversible Encryption For
All Users In The Domain
The options are Enabled or Disabled (the default). This setting
enables Windows XP Professional to store a reversibly encrypted
password for all users in the domain. This option is only applicable if your computer running Windows XP Professional is in a
domain.
How to Configure Account Lockout Policy
The Account Lockout Policy settings also allow you to specify that a user account be
locked out after a certain number of unsuccessful logon attempts. While the idea behind
this feature is to prevent unauthorized users from trying to break into a computer by
repeatedly typing passwords, account lockout actually can be abused by attackers that
try to perform denial of service (DoS) attacks (where the intent is to get Windows to lock
accounts). For this reason, Microsoft recommends that you to not enable account lockouts. Nonetheless, you should understand how account lockout works.
You access the Account Lockout Policy settings using the Local Security Settings window, just as you did to configure the Password Policy settings. The console displaying
the current Account Lockout Policy settings in the details pane is shown in Figure 16-9.
F16us09
Figure 16-9
Configure Account Lockout Policy settings in the Local Security Settings window.
Lesson 2
Configuring Account Policies 16-19
Table 16-2 explains the settings available in Account Lockout Policy.
Table 16-2
Account Lockout Policy Settings
Setting
Description
Account Lockout
Duration
The value you enter for this setting indicates the number of minutes that
the account is locked out. A value of 0 indicates that the user account is
locked out indefinitely until an administrator unlocks the user account.
You can set the value from 0 to 99,999 minutes. (The maximum value of
99,999 minutes is approximately 69.4 days.)
Account Lockout
Threshold
The value you enter for this setting is the number of invalid logon
attempts before the user account is locked out from logging on to the
computer. A value of 0 indicates that the account will not be locked out,
no matter how many invalid logon attempts are made. You can set the
range of values from 0 to 999 attempts.
Reset Lockout
Counter After
The value you enter for this setting is the number of minutes to wait
before resetting the account lockout counter. You can set the range of
values from 1 to 99,999 minutes.
Practice: Configuring Account Policies
In this practice you configure the Account Policy settings for your computer, and then
test them to make sure that you set them correctly.
Exercise 1: Configure Minimum Password Length
In this exercise, you configure the minimum password length, one of the Account Policy settings for your computer. You then test the minimum password length to confirm
that it was correctly configured.
1. Log on with an account that is a member of the Administrators group.
2. Click Start, and then click Control Panel.
3. In the Control Panel window, click Performance And Maintenance.
4. In the Performance And Maintenance window, click Administrative Tools.
5. In the Administrative Tools window, double-click Local Security Policy.
6. In the Local Security Settings window, expand Account Policies, and then click
Password Policy.
7. In the details pane, right-click Minimum Password Length, and then click Properties.
Windows XP Professional displays the Minimum Password Length Properties dialog box.
16-20
Chapter 16
Configuring Security Settings and Internet Options
8. Type 8 to set the minimum password length to 8 characters, and then click OK.
9. Click File, and then click Exit to close Local Security Settings window.
10. Click Start, and then click Control Panel.
11. Click User Accounts, and then click Create A New Account.
12. In the Type A Name For The New Account text box, type User13, and then click
Next.
13. Click Limited, and then click Create Account.
14. Click User13, and then click Change The Password.
15. In the Type A New Password and the Type The New Password Again To Confirm
text boxes, type water.
16. Click Change Password.
A User Accounts message box appears, indicating that your new password does
not meet the password policy requirements. This test proves that you correctly
configured the minimum password length account policy to eight characters.
17. Click OK to close the User Accounts message box.
18. Click Cancel to close the Change User13’s Password window.
19. Close the User Accounts window, and then close Control Panel.
Exercise 2: Configure and Test Additional Account Policy Settings
In this exercise, you configure and test some additional Account Policy settings.
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools window, double-click Local Security Policy.
5. Use the Local Security Settings window to configure the following Account Policy
settings:
❑
A user should have at least five different passwords before using a previously
used password.
❑
After changing a password, a user must wait 24 hours before he or she can
change it again.
❑
A user should change his or her password every three weeks.
Lesson 2
Configuring Account Policies 16-21
6. What settings did you use for each of the three listed items?
7. Close the Local Security Settings window.
8. Log on as User13 with no password.
Windows XP Professional displays a Logon Message message box, indicating that
you must change your password at first logon.
9. Click OK to close the message box.
10. Press TAB to move to the New Password text box and leave the Old Password text
box blank.
11. In the New Password and Confirm New Password text boxes, type hotwater, and
then click OK.
Windows XP Professional displays a Change Password message box, indicating
that your password was successfully changed.
12. Click OK to close the Change Password message box.
13. Click Start, and then click Control Panel.
14. Click User Accounts, and then click Change My Password.
15. In the Type Your Current Password text box, type hotwater.
16. In the Type A New Password and Type The New Password Again To Confirm text
boxes, type chocolate.
17. Click Change Password.
18. Were you successful? Why or why not?
19. Close any open dialog boxes and windows and log off.
16-22
Chapter 16
Configuring Security Settings and Internet Options
Exercise 3: Configure Account Lockout Policy
In this exercise, you configure Account Lockout Policy settings, and then test them to
make sure they are set up correctly.
1. Log on to your computer with a user account that is a member of the Administrators group.
2. Click Start, and then click Control Panel.
3. In the Control Panel window, click Performance And Maintenance.
4. In the Performance And Maintenance window, click Administrative Tools.
5. In the Administrative Tools window, double-click Local Security Policy.
6. In the Local Security Settings window, expand Account Policies, and then click
Account Lockout Policy.
7. Use Account Lockout Policy settings to do the following:
❑
Lock out a user account after four failed logon attempts.
❑
Lock out user accounts until an administrator unlocks the user account.
Note
If a Suggested Value Changes dialog box appears, click OK, and then verify that your
settings are correct.
8. What Account Lockout Policy settings did you use for each of the two conditions?
9. Log off Windows XP Professional.
10. Try to log on as User13 with a password of chocolate four times.
11. Try to log on as User13 with a password of chocolate again and a dialog box
appears, indicating that the account is locked out.
12. Click OK, and then log on as a user that is a member of the Administrators group.
Lesson 2
Configuring Account Policies 16-23
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. What is the range of values Windows XP Professional allows you to set for the
Enforce Password History setting, and what do those values mean?
2. The range of values Windows XP Professional allows you to set for the Maximum
Password Age setting is ______ to ______ days. The default value is ______ days.
3. Which of the following selections are requirements for a password if the Passwords Must Meet Complexity Requirements setting is enabled? (Choose all that
apply.)
a. All passwords must exceed six characters in length.
b. All passwords must comply with the password history settings.
c. No passwords can contain capitals or punctuation.
d. No passwords can contain the user’s account or full name.
4. What is Account Lockout Duration, and what is the range of values?
Lesson Summary
■
Password Policy allows you to manage the passwords used on your computer. For
example, you can force users to change passwords on a regular basis and you can
control the minimum length of a password.
■
Account Lockout Policy allows you determine the number of invalid logon
attempts before a user account is locked out of the computer.
16-24
Chapter 16
Configuring Security Settings and Internet Options
Lesson 3: Configuring User Rights
In the Local Security Settings window, under the Local Policies folder, there are three
categories of local policies available: Audit Policy, User Rights Assignment, and Security Options. Audit Policy and Security Options are covered in later lessons in this
chapter. In this lesson, you learn how to assign user rights.
After this lesson, you will be able to
■ Configure user rights.
Estimated lesson time: 30 minutes
How to Configure User Rights
You can assign specific rights to groups or individual user accounts. To simplify the
administration of user rights, Microsoft recommends that you assign user rights only to
groups, not to individual user accounts. Each user right allows the members of the
group or the individual users assigned the right to perform a specific action, such as
backing up files or changing the system time. If a user is a member of more than one
group, the user rights applied to that user are cumulative, so the user has all the user
rights assigned to all the groups of which he or she is a member.
To configure user rights on a computer running Windows XP Professional, use these
steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools window, double-click Local Security Policy.
5. In the Local Security Settings window, expand Local Policies, and then click User
Right Assignments.
6. In the details pane, click the user right you want to configure, and then on the
Action menu, click Properties.
The console displays the current groups and user accounts that have this user right
assigned, as shown in Figure 16-10. To add groups or user accounts, click Add
User Or Group. To remove a group or user, select the group or user, and then
click Remove.
Lesson 3
Configuring User Rights 16-25
F16us10
Figure 16-10 Assign user rights to a group or user account.
There are two types of user rights: privileges and logon rights.
What Are Privileges?
A privilege is a user right that allows the members of the group to which it is assigned
to perform a specific task, usually one that affects an entire computer system rather
than one object. Table 16-3 explains privileges you can assign in Windows XP Professional of which you should be aware.
Table 16-3
Privileges Available in Windows XP Professional
Privilege
Description
Act As Part Of The
Operating System
Allows a process to authenticate like a user and thus gain access to the
same resources as a user. Do not grant this privilege unless you are certain it is needed. Only low-level authentication services should require
this privilege. Processes that require this privilege should use the LocalSystem account because it already has this privilege assigned.
A separate user account with this privilege allows a user or process to
build an access token, granting them more rights than they should have,
and does not provide a primary identity for tracking events in the audit
log.
Add Workstations
To Domain
Allows a user to add a computer to a domain. The user specifies the
domain being added on the computer, and an object is created in the
Computer container of Active Directory in that domain.
For this privilege to be effective, it must be assigned as part of the default
domain controller policy for the domain.
16-26
Chapter 16
Configuring Security Settings and Internet Options
Table 16-3
Privileges Available in Windows XP Professional
Privilege
Description
Back Up Files
And Directories
Allows a user to back up the system without being assigned permissions
to access all files and folders on the system.
By default, members of the Administrators and Backup Operators groups
have this privilege on workstations, member servers, and domain controllers. On domain controllers, members of the Server Operators group have
this privilege.
Bypass Traverse
Checking
Allows a user to move through folders that he or she has no permission to
access. This privilege does not allow the user to view the contents of a
folder, just to move through the folder.
By default, members of the Administrators, Backup Operators, Power
Users, Users, and Everyone groups have this privilege on workstations
and member servers.
Change The System Allows a user to set the time for the internal clock of the computer. By
default, members of the Administrators and Power Users groups, as well
Time
as the LocalSystem and NetworkService accounts, have this privilege on
workstations and member servers. By default, members of the Administrators and Server Operators groups, as well as the LocalSystem and NetworkService accounts, have this privilege on domain controllers.
Create A Pagefile
Allows a user to create a pagefile and modify the size of existing pagefiles. By default, members of the Administrators group have this privilege
on workstations, member servers, and domain controllers.
Debug Programs
Allows a user to attach a debugger on any process. This privilege provides powerful access to sensitive and critical system operating components.
By default, members of the Administrators group have this privilege on
workstations, member servers, and domain controllers.
Enable Computer
And User Accounts
To Be Trusted For
Delegation
Allows the user to set the Trusted For Delegation setting on a user or
computer object. A server process running on a computer that is trusted
for delegation or run by a user who is trusted for delegation can access
resources on another computer.
Do not assign this privilege unless you understand that this privilege and
the Trusted For Delegation setting can open your network to attacks from
Trojan horse programs that impersonate incoming clients and use their
credentials to access network resources.
This privilege is not assigned to anyone on workstations or member servers. On domain controllers, it is assigned by default to the members of the
Administrators group.
Force Shutdown
From A Remote
System
Allows a user to shut down a computer from a remote computer on the
network. By default, members of the Administrators group have this privilege on workstations and member servers. By default, members of the
Administrators and Server Operators groups have this privilege on
domain controllers.
Lesson 3
Table 16-3
Configuring User Rights 16-27
Privileges Available in Windows XP Professional
Privilege
Description
Load And Unload
Device Drivers
Allows a user to install and uninstall Plug and Play device drivers. NonPlug and Play device drivers are not affected by this privilege.
By default, only Administrators have this privilege. Exercise caution when
granting this privilege. Device drivers run as trusted programs, and only
device drivers with correct digital signatures should be installed. By
default, members of the Administrators group have this privilege on
workstations, member servers, and domain controllers.
Manage Auditing
And Security Log
Allows a user to specify object access auditing options for individual
resources such as files, Active Directory objects, and Registry keys. A user
with this privilege can also view and clear the security log from the Event
Viewer.
By default, members of the Administrators group have this privilege on
workstations, member servers, and domain controllers. Be careful who
you assign this privilege to because they have the power to cover their
tracks by clearing the Security event log.
Modify Firmware
Environment
Values
Allows a user to use the System Properties program to modify system
environment variables. Allows a process to use an API to modify the system environment variables.
Perform Volume
Maintenance
Tasks
Allows users to run disk tools such as Disk Cleanup or Disk Defragmenter.
By default, members of the Administrators group have this privilege on
workstations, member servers, and domain controllers.
Profile Single
Process
Allows a user to use performance-monitoring tools to monitor the performance of nonsystem processes. By default, on workstations and member
servers, Administrators and Power Users have this privilege. On domain
controllers, only Administrators have this privilege.
Profile System
Performance
Allows a user to use performance-monitoring tools to monitor the performance of system processes. By default, members of the Administrators
group have this privilege on workstations, member servers, and domain
controllers.
Remove Computer
From Docking
Station
Allows a user to undock a portable computer. By default, members of the
Administrators, Power Users, and Users groups have this privilege on
workstations and member servers.
Restore Files
And Directories
Allows a user to restore backed up files and directories without being
assigned the appropriate file and folder permissions, and allows a user to
set any valid security principal as the owner of the object. By default,
members of the Administrators and Backup Operators groups have this
privilege on workstations, member servers, and domain controllers. On
domain controllers, members of the Server Operators group also have this
privilege.
16-28
Chapter 16
Configuring Security Settings and Internet Options
Table 16-3
Privileges Available in Windows XP Professional
Privilege
Description
Shut Down The
System
Allows a user to shut down the local computer. By default, members of
the Administrators, Backup Operators, Power Users, and Users groups
have this privilege on workstations.
Take Ownership Of Allows a user to take ownership of objects in the system, including Active
Directory objects, files and folders, printers, Registry keys, processes, and
Files Or Other
threads. By default, members of the Administrators group have this priviObjects
lege on workstations, member servers, and domain controllers.
What Are Logon Rights?
A logon right is a user right assigned to a group or an individual user account. Logon
rights control the way users can log on to a system. Table 16-4 explains the logon rights
you can assign in Windows XP Professional.
Table 16-4
Logon Rights Available in Windows XP Professional
Logon right
Description
Access This Computer
From The Network
Allows a user to connect to the computer over the network. By
default, members of the Administrators, Backup Operators, Power
Users, Users, and Everyone groups are granted this logon right on
workstations, member servers, and domain controllers.
Deny Access To This Com- Prevents a user from connecting to the computer over the network.
puter From The Network By default, this right is not granted to anyone.
Log On As A Batch Job
Allows a user to log on using a batch-queue facility. By default,
members of the Administrators group are granted this logon right
on workstations, member servers, and domain controllers.
If Internet Information Services (IIS) is installed, the right is automatically assigned to the built-in account for anonymous access to
IIS.
Deny Logon As A
Batch Job
Prevents a user from logging on using a batch-queue facility. By
default, this right is not granted to anyone.
Log On As A Service
Allows a security principal (an account holder such as a user, computer, or service) to log on as a service. Services can be configured
to run under the LocalSystem, LocalService, or NetworkService
accounts, which have the right to log on as a service. Any service
that runs under a separate account must be granted this right. By
default, this right is not granted to anyone.
Deny Logon As A Service
Prevents a security principal from logging on as a service. By
default, this right is not granted to anyone.
Lesson 3
Table 16-4
!
Configuring User Rights 16-29
Logon Rights Available in Windows XP Professional
Logon right
Description
Log On Locally
Allows a user to log on at the computer’s keyboard. By default,
members of the Administrators, Account Operators, Backup Operators, Print Operators, and Server Operators groups are granted this
logon right.
Deny Logon Locally
Prevents a user from logging on at the computer’s keyboard. By
default, this right is not granted to anyone.
Allow Logon Through
Terminal Services
Allows a user to log on using Remote Desktop (also known as Terminal Services). By default, members of the Administrators and
Remote Desktop Users groups are granted this logon right on
workstations and member servers. On domain controllers, only
Administrators are granted this logon right.
Deny Logon Through
Terminal Services
Prevents a user from logging on using Remote Desktop. By default,
this right is not granted to anyone.
Exam Tip
For the exam, you should understand the user rights available and the default
groups that are assigned the rights.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. Which of the following statements about user rights are correct? (Choose all that
apply.)
a. Microsoft recommends that you assign user rights to individual user accounts.
b. Microsoft recommends that you assign user rights to groups rather than individual user accounts.
c. User rights allow users assigned the right to perform a specific action, such as
backing up files and directories.
d. There are two types of user rights: privileges and logon rights.
16-30
Chapter 16
Configuring Security Settings and Internet Options
2. If your computer running Windows XP Professional is part of a domain environment and you configure the Local Security Policies on your computer so that you
assign yourself the Add Workstation To A Domain user right, can you add additional workstations to the domain? Why or why not?
3. What benefit does the Back Up Files And Directories user right provide?
4. What are logon rights and what do they do?
Lesson Summary
■
User rights allow a user or group to perform a specific action, such as backing up
files or changing the system time. There are two types of user rights:
❑
A privilege is a user right that allows users to perform a specific task, usually
one that affects an entire computer system rather than one object.
❑
Logon rights are user rights assigned to a group or an individual user account
to control the way users can log on to a computer. Logon rights control
whether or not a user can connect to a computer over the network or sitting
at the computer’s keyboard.
Lesson 4
Configuring Security Options 16-31
Lesson 4: Configuring Security Options
In the Local Security Settings window, under the Local Policies folder, there is a Security Options folder. There are close to 60 additional security options grouped into the
following categories: accounts, audit, devices, domain controller, domain member,
interactive logon, Microsoft network client, network access, network security, recovery
console, shutdown, system cryptography, and system objects. In this lesson, you learn
about some of the more important security options available.
After this lesson, you will be able to
■ Configure security options.
Estimated lesson time: 15 minutes
How to Configure Security Options
To configure security options, use the Local Security Settings window to locate and
select the Security Options node. In the details pane, double-click the option you want
to configure and use the dialog box for the option to change settings.
Table 16-5 lists important security options you should be aware of.
Table 16-5
Important Security Options in Windows XP Professional
Security Option
Description
Accounts: Administrator
Account Status
Enables or disables the Administrator account under normal
operation. Under safe mode boot, the Administrator account is
always enabled, regardless of this setting.
Accounts: Guest
Account Status
Enables or disables the Guest account.
Accounts: Limit Local
Use Of Blank Passwords
To Console Logon
Only
Determines whether remote interactive logons by network services (such as Remote Desktop, Telnet, and File Transfer Protocol) are allowed for local accounts that have blank passwords. If
this setting is enabled, a local account must have a nonblank
password to be used to perform an interactive or network logon
from a remote client.
Accounts: Rename
Administrator Account
Specifies a different account name to be associated with the
Administrator account. You should use a name that does not
identify it as the Administrator account to make it difficult for
unauthorized users to break into the account.
Accounts: Rename
Guest Account
Specifies a different account name to be associated with the
Guest account.
16-32
Chapter 16
Configuring Security Settings and Internet Options
Table 16-5
Important Security Options in Windows XP Professional
Security Option
Description
Audit: Audit The Use Of
Backup And Restore
Privilege
Determines whether to audit the use of all user privileges, including Backup and Restore, when the Audit privilege use setting is in
effect. Enabling both policies generates an audit event for every
file that is backed up or restored. See Lesson 5 for more information on auditing.
Devices: Prevent Users
From Installing Printer
Drivers
Enabling this setting allows only Administrators and Power
Users to install a printer driver as part of adding a network
printer. Disabling this setting allows any user to install a printer
driver as part of adding a network printer.
Devices: Restrict
CD-Rom Access To
Locally Logged On
User Only
Determines whether a CD-ROM is accessible to both local and
remote users simultaneously. Enabling this setting allows only
the interactively logged-on user to access removable CD-ROM
media. If this setting is enabled and no one is logged on interactively, the CD-ROM can be accessed over the network.
Devices: Restrict Floppy
Access To Locally
Logged On User Only
Determines whether removable floppy media are accessible to
both local and remote users simultaneously.
Devices: Unsigned Driver
Installation Behavior
Determines what happens when an attempt is made to install a
device driver that has not been digitally signed. You can configure Windows to allow unsigned drivers, to allow unsigned drivers but warn the user, or to not allow unsigned drivers.
Interactive Logon: Do Not
Display Last User Name
Determines whether the Log On To Windows dialog box displays the name of the last user to log on to the computer.
Interactive Logon: Do Not
Require CTRL+ALT+DEL
Determines whether pressing CTRL+ALT+DEL is required before a
user can log on.
Interactive Logon: Message
Text For Users Attempting
To Log On
Specifies a text message displayed to users when they log on.
Interactive Logon: Prompt
User To Change Password
Before Expiration
Determines how many days in advance users are warned that
their password is about to expire.
Network Access: Let
Everyone Permissions
Apply To Anonymous Users
Determines whether anonymous users receive the same permissions to resources that are assigned to the Everyone group.
Network Access: Shares
That Can Be Accessed
Anonymously
Determines which network shares anonymous users can access.
When you enable this option, you generate the list of shares that
are accessible.
Recovery Console: Allow
Automatic Administrative
Logon
Determines whether the Administrator account password must
be given before access to the computer is granted in Recovery
Console. Enabling this setting automatically logs on to the system in Recovery Console without requiring a password.
Lesson 4
Table 16-5
Configuring Security Options 16-33
Important Security Options in Windows XP Professional
Security Option
Description
Shutdown: Allow System
To Be Shut Down Without
Having To Log On
Determines whether a computer can be shut down without having to log on to Windows. Enabling this setting makes the Shut
Down command available on the Windows logon screen.
Shutdown: Clear Virtual
Memory Page File
Determines whether the virtual memory paging file is cleared
when the system is shut down. This setting is especially useful
on computers configured to allow booting to other operating
systems, ensuring that sensitive information from process memory that might go into the paging file is not available to an unauthorized user.
Practice: Configuring Security Settings
In this practice, you configure the security setting that automatically renames the Guest
account on your computer.
1. Log on with an account that is a member of the Administrators group.
2. Click Start, and then click Control Panel.
3. In the Control Panel window, click Performance And Maintenance.
4. In the Performance And Maintenance window, click Administrative Tools.
5. In the Administrative Tools window, double-click Local Security Policy.
6. In the Local Security Settings window, expand Local Policies, and then click Security Options.
7. In the right-hand pane, right-click Accounts: Rename Guest Account, and then
click Properties.
8. In the Accounts: Rename Guest Account Properties dialog box, type Fox, and
then click OK. Close the Local Security Settings window.
9. Click Start, and then click Control Panel.
10. In the Control Panel window, click User Accounts.
11. What is the name of the Guest account?
12. Close the User Accounts window and the Control Panel window.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
16-34
Chapter 16
Configuring Security Settings and Internet Options
1. How can you require a user to be logged on to the computer to shut it down? (Discuss using the Welcome screen and using CTRL+ALT+DELETE to log on.)
2. By default, Windows XP Professional does not clear the virtual memory pagefile
when the system is shut down. Why can this be considered a security breach and
what can you do to resolve it?
3. Why does forcing users to press CTRL+ALT+DELETE improve security on your computer?
4. By default, Windows XP Professional displays the last user name to log on to the
computer in the Windows Security dialog box. Why is this considered a security
risk, and what can you do to resolve it?
Lesson 4
Configuring Security Options 16-35
Lesson Summary
■
Security Options represent many different categories of settings related to Windows XP Professional security. A few important security options you can configure
are the following:
❑
You can prevent an unauthorized user from shutting down your computer by
forcing users to log on before they can shut down the computer.
❑
You can force users to press CTRL+ALT+DELETE before they can log on to prevent a Trojan horse application from stealing user passwords.
❑
You can increase security by not displaying a valid user name for the last user
account that logged on in the Windows Security dialog box.
16-36
Chapter 16
Configuring Security Settings and Internet Options
Lesson 5: Implementing an Audit Policy
Auditing allows you to track both user activities and Windows XP Professional events
on a computer. Through auditing, you can specify that Windows XP Professional
records activities and events to a security log, which maintains a record of valid and
invalid logon attempts and events related to creating, opening, or deleting files or other
objects. An audit entry in the security log contains the following information:
■
The action that was performed
■
The user who performed the action
■
The success or failure of the event and when the event occurred
After this lesson, you will be able to
■ Describe the purpose of auditing.
■ Determine what you should audit.
■ Configure an audit policy.
■ Enable auditing for files and folder.
■ Enable auditing for printers.
Estimated lesson time: 60 minutes
Overview of Auditing
An audit policy defines the types of security events that Windows XP Professional
records in the security log on each computer. The security log allows you to track the
events that you specify.
Windows XP Professional writes events to the security log on the computer on which
the event occurs. For example, you can configure auditing so that anytime someone
tries to log on and the logon attempt fails, Windows XP Professional writes an event to
the security log on that computer.
You can set up an audit policy for a computer to do the following:
■
Track the success and failure of events, such as logon attempts by users, an
attempt by a particular user to read a specific file, changes to a user account or to
group memberships, and changes to your security settings
■
Eliminate or minimize the risk of unauthorized use of resources
You use Event Viewer to view events that Windows XP Professional has recorded in
the security log. You can also archive log files to track trends over time—for example,
to determine the use of printers or files or to verify attempts at unauthorized use of
resources. This lesson covers configuring an audit policy and enabling auditing of var-
Lesson 5
Implementing an Audit Policy 16-37
ious resources and events. You will learn more about using Event Viewer in Chapter
18, “Using Windows XP Tools.”
The requirements to set up and administer auditing are as follows:
■
You must have the Manage Auditing And Security Log user right for the computer
on which you want to configure an audit policy or review an audit log. By default,
Windows XP Professional grants these rights to the Administrators group.
■
The files and folders to be audited must be on NTFS volumes.
Setting up auditing for objects (files, folders, and printers) is a two-part process:
1. Set the audit policy. The audit policy enables auditing of objects but does not
activate auditing of specific objects.
2. Enable auditing of specific resources. You designate the specific events to
audit for files, folders, printers, and Active Directory objects. Windows XP Professional then tracks and logs the specified events.
What Should You Audit?
When you plan an audit policy, you must determine what you want to audit and the
computers on which to set up auditing. Auditing is turned off by default. As you determine which computers to audit, you must also plan what to audit on each one. Windows XP Professional records audited events on each computer separately.
The types of events that you can audit include the following:
■
Accessing files and folders
■
Logging on and off
■
Shutting down a computer running Windows XP Professional
■
Starting a computer running Windows XP Professional
■
Changing user accounts and groups
After you have determined the types of events to audit, you must also determine
whether to audit the success of events, the failure of events, or both. Tracking successful events can tell you how often Windows XP Professional or users access specific
files, printers, or other objects, and you can use this information for resource planning.
Tracking failed events can alert you to possible security breaches. For example, if you
notice several failed logon attempts by a certain user account, especially if they are
occurring outside normal business hours, you might conclude that an unauthorized
person is attempting to break into your system.
Other guidelines in determining your audit policy include the following:
16-38
Chapter 16
Configuring Security Settings and Internet Options
Determine how long you need to retain audit logs Plan to archive event logs so
that you can look back and determine when compromises occurred. Often,
administrators do not realize that security has been breached for weeks or months,
and important events may no longer be accessible in the log.
Review security logs frequently You should set a schedule and regularly review security logs because configuring auditing alone does not alert you to security breaches.
Define an audit policy that is useful and manageable Always audit sensitive and
confidential data. Audit only those events that will provide you with meaningful
information about your network environment, which minimizes usage of the computer’s resources and makes essential information easier to locate. Auditing too
many types of events can create excess overhead for Windows XP Professional.
How to Configure an Audit Policy
The first step in implementing an audit policy is selecting the types of events for Windows XP Professional to audit. For each event that you can audit, the configuration settings indicate whether to track successful or failed attempts. You set audit policies for
a local computer in the Local Security Settings window. Under the Local Policies node,
click Audit Policy to display a list of available audit policies.
Table 16-6 describes the types of events that Windows XP Professional can audit.
Table 16-6
Types of Events Audited by Windows XP Professional
Event
Description
Account
Management
An administrator created, changed, or deleted a user account or group. A
user account was renamed, disabled, or enabled; or a password was set or
changed.
Logon Events
A user logged on or logged off, or a user made or canceled a network
connection to the computer.
Object Access
A user gained access to a file, folder, or printer. You must configure specific files, folders, or printers for auditing. Object access is auditing a user’s
access to files, folders, and printers.
Policy Change
A change was made to the user security options, user rights, or audit
policies.
Privilege Use
A user exercised a right, such as changing the system time (does not
include rights that are related to logging on and logging off).
Process Tracking
A program performed an action. This information is generally useful only
for programmers who want to track details of program execution.
System Events
A user restarted or shut down the computer, or an event occurred that
affected Windows XP Professional security or the security log. (For
example, the audit log is full and Windows XP Professional starts
discarding entries.)
Lesson 5
Implementing an Audit Policy 16-39
To set an audit policy on a computer that is running Windows XP Professional, use
these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools window, double-click Local Security Policy.
5. In the Local Security Policy window, expand Local Policies, and then click Audit
Policy.
The console displays the current audit policy settings in the details pane, as shown
in Figure 16-11.
F16us11
Figure 16-11 Select events that Windows XP Professional should audit.
6. Click the type of event to audit, and then, on the Action menu, click Properties.
For example, if you select Audit Logon Events and on the Action menu you click
Properties, the Audit Account Logon Events Properties dialog box appears, as
shown in Figure 16-12.
16-40
Chapter 16
Configuring Security Settings and Internet Options
F16us12
Figure 16-12
Enable the Audit Account Logon Events policy.
7. Select the Success check box, the Failure check box, or both.
A check mark in the Success check box indicates that auditing is in effect for successful attempts. A check mark in the Failure check box indicates that auditing is
in effect for failed attempts.
8. Click OK.
9. Restart your computer.
After you have set the audit policy, remember that the changes that you make to your
computer’s audit policy do not take effect immediately unless you restart your computer.
How to Enable Auditing for Files and Folders
If you have confidential files that you need to monitor, you can set up auditing for files
and folders on NTFS partitions. To audit user access to files and folders, you must first
set your audit policy to audit object access, which includes files and folders.
When you set your audit policy to audit object access, you enable auditing for files,
folders, and printers. However, you must also enable auditing on the specific resources
you want to audit.
To enable auditing for specific files and folders, use these steps:
1. Click Start, right-click My Computer, and then click Explore.
2. Right-click the file or folder for which you want to enable auditing and click Properties.
Lesson 5
Implementing an Audit Policy 16-41
3. In the Properties dialog box for the file or folder, on the Security tab, click
Advanced.
Tip
If you do not have a Security tab on the Properties dialog box for your files and folders,
you should first check to make sure that files and folders are located on a partition formatted
as NTFS. You should also make sure that if your computer is not a member of a domain, you
have turned off Simple File Sharing. To stop using Simple File Sharing, click Start, right-click
My Computer, and then click Explore. On the Tools menu, click Folder Options. Click the View
tab, clear Use Simple File Sharing (Recommended), and click OK.
4. In Advanced Security Settings For dialog box for the file or folder, click the Auditing tab. Click Add, select the users for whom you want to audit file and folder
access, and then click OK.
5. In the Auditing Entry For dialog box for the file or folder, select the Successful
check box, the Failed check box, or both for the events that you want to audit.
For a list of the events that can be audited for folders, see Figure 16-13. Table 167 describes the user activity that triggers these events so you can determine when
you should audit these events.
F16us13
Figure 16-13 Select events to be audited.
16-42
Chapter 16
Configuring Security Settings and Internet Options
Table 16-7
User Events and What Triggers Them
Event
User Activity That Triggers the Event
Traverse Folder/Execute File
Running a program or gaining access to a folder to
change directories
List Folder/Read Data
Displaying the contents of a file or a folder
Read Attributes And Read
Extended Attributes
Displaying the attributes of a file or folder
Create Files/Write Data
Changing the contents of a file or creating new files in
a folder
Create Folders/Append Data
Creating folders in a folder
Write Attributes and Write
Extended Attributes
Changing attributes of a file or folder
Delete Subfolders And Files
Deleting a file or subfolder in a folder
Delete
Deleting a file or folder
Read Permissions
Viewing permissions for the file owner for a file or
folder
Change Permissions
Changing permissions for a file or folder
Take Ownership
Taking ownership of a file or folder
6. Click OK to return to the Advanced Security Settings For dialog box for the file or
folder.
By default, any auditing changes that you make to a parent folder also apply to all
child folders and all files in the parent and child folders.
7. To prevent changes that are made to a parent folder from applying to the currently
selected file or folder, clear the Inherit From Parent The Auditing Entries That
Apply To Child Objects check box.
8. Click OK twice.
How to Enable Auditing for Printers
Audit access to printers to track access to sensitive printers. To audit access to printers,
set your audit policy to audit object access, which includes printers. Enable auditing for
specific printers, and specify which types of access to audit and which users will have
access. After you select the printer, you use the same steps that you use to set up auditing on files and folders, as follows:
1. Click Start, click Control Panel, and then click Printers And Other Hardware.
2. Click Printers And Faxes, right-click the printer you want to audit, and then click
Properties.
3. In the Properties dialog box for the printer, click the Security tab, and then click
Advanced.
Lesson 5
Implementing an Audit Policy 16-43
The Advanced Security Settings dialog box appears.
4. In the Auditing tab, click Add, select the appropriate users or groups for whom
you want to audit printer access, and then click OK.
5. In the Apply Onto box in the Auditing Entry dialog box, select where the auditing
setting applies.
The options in the Apply Onto box for a printer are This Printer Only, Documents,
and This Printer And Documents.
6. Under Access, select the Successful check box, the Failed check box, or both for
the events that you want to audit (see Figure 16-14).
7. Click OK in the appropriate dialog boxes to exit.
F16us14
Figure 16-14 Select printer events to be audited.
Table 16-8 describes audit events for printers and explains which user action triggers
the event.
Table 16-8
Printer Events and What Triggers Them
Event
User Activity That Triggers the Event
Print
Printing a file
Manage Printers
Changing printer settings, pausing a printer, sharing a printer, or
removing a printer
Manage Documents
Changing job settings; pausing, restarting, moving, or deleting
documents; sharing a printer; or changing printer properties
Read Permissions
Viewing printer permissions
Change Permissions
Changing printer permissions
Take Ownership
Taking printer ownership
16-44
Chapter 16
Configuring Security Settings and Internet Options
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. What is auditing?
2. What is an audit policy?
3. When you are auditing events on a computer running Windows XP Professional,
where are the audited events being recorded?
4. What are the requirements to set up and administer auditing?
5. What are the two steps in setting up auditing?
6. By default, any auditing changes that you make to a parent folder
________________ (are inherited/are not inherited) by all child folders and all files
in the parent and child folders.
Lesson Summary
■
On a computer running Windows XP Professional, auditing helps ensure that your
network is secure by tracking user activities and system-wide events. You must
have the Manage Auditing And Security Log user right for the computer on which
you want to configure an audit policy or review an audit log. By default, Windows
XP Professional grants these rights to the Administrators group.
Lesson 5
■
Implementing an Audit Policy 16-45
You can audit the following types of events:
❑
Accessing files and folders
❑
Logging on and off
❑
Shutting down a computer running Windows XP Professional
❑
Starting a computer running Windows XP Professional
❑
Changing user accounts and groups
❑
Attempting to make changes to Active Directory objects (only if your Windows XP Professional computer is part of a domain)
■
You set up an audit policy using the Local Security Settings window to specify
which events to record. You can audit the success of events, the failure of events,
or both.
■
After enabling the Audit Object Access policy, you must configure particular files
and folders to be audited. To do so, click the Advanced button on the Security tab
of a file or folder’s Properties dialog box. On the Auditing tab of the Advanced
Security Settings dialog box for the file or folder, select the users and groups you
want to audit, as well as the types of events to audit.
■
If you enable the Audit Object Access policy, you can also configure auditing for
specific printers. Configuring auditing for a printer follows the same procedure for
configuring auditing for a file or folder.
16-46
Chapter 16
Configuring Security Settings and Internet Options
Lesson 6: Configuring Internet Explorer Options
There are a number of options that you can configure in Internet Explorer, some of
which deal with security, others of which deal with privacy, content, and how Internet
Explorer connects to the Internet. You will configure these options using the Internet
Options dialog box, which you can access in one of two ways:
■
In the Control Panel window, click Network And Internet Connections. In the Network And Internet Connections window, click Internet Options. This method
allows you to configure Internet Explorer options without running Internet
Explorer.
■
While Internet Explorer is running, on the Tools menu, click Internet Options.
After this lesson, you will be able to
■ Configure Internet Explorer general options.
■ Configure Internet Explorer security options.
■ Configure Internet Explorer privacy options.
■ Configure Internet Explorer content options.
■ Configure Internet Explorer connection options.
■ Configure Internet Explorer programs options.
■ Configure Internet Explorer advanced options.
Estimated lesson time: 40 minutes
General Options
The General tab of the Internet Properties dialog box, shown in Figure 16-15, allows
you to configure the following:
■
The home page that Internet Explorer opens when you start the program. This is
also the page you are returned to each time you click the Home icon on the toolbar.
■
How Internet Explorer stores temporary files during browsing sessions. Internet
Explorer automatically stores (or caches) copies of Web pages that you access to
a folder on the local hard disk. These copies are called temporary Internet files.
The next time you access the same page, Internet Explorer can load the page from
the local cache rather than having to connect to the Web server and download it
again. You can delete temporary Internet files by clicking the Delete Files button
on the General tab of the Internet Options dialog box. You might want to delete
temporary Internet files to make it more difficult for other users of the same computer to identify the Web sites you visited.
Lesson 6
■
Configuring Internet Explorer Options 16-47
How long Internet Explorer tracks the history of Web pages you have visited. The
History section of the General tab of the Internet Options dialog box allows you
to manage how long Internet Explorer stores recent links. Use the Days To Keep
Pages In History option to specify the number of days the history is maintained.
The default value is 20 days. Setting this value to 0 disables the History feature.
Use the Clear History button to clear the current history list. Similar to deleting
temporary Internet files, clearing the history is an excellent way to improve your
privacy.
The General tab also allows you to configure the colors, fonts, languages, and accessibility options used.
F16us15
Figure 16-15
Configure general options in Internet Explorer.
How to Configure Security Options
The Security tab of the Internet Options dialog box (see Figure 16-16) allows you to
assign Web sites to security zones and customize the security for each zone. The four
zones provided are as follows:
■
Internet
Contains all Web sites that you have not placed in other zones.
■
Local Intranet Contains all Web sites that are on the local network. By default,
this zone includes all sites that bypass the proxy server (if a proxy server is being
used) and all local network paths. You can add additional sites to this zone by
selecting the zone and clicking Sites.
16-48
Chapter 16
Configuring Security Settings and Internet Options
■
Trusted Sites Contains Web sites that are believed to be safe. There are no sites
in this zone by default. You can add sites to this zone as you see fit by selecting
the zone and clicking Sites.
■
Restricted Sites Contains Web sites that could potentially be harmful. There are
no sites in this zone by default. You can add sites to this zone as you see fit by
selecting the zone and clicking Sites.
F16us16
Figure 16-16
Configure security options in Internet Explorer.
The security levels that you can configure are as follows:
■
■
■
High, which is appropriate for sites that might have harmful content. The
Restricted Sites zone has a High security level.
❑
Less-secure features are disabled.
❑
The safest way to browse, but functionality is potentially lost.
Medium, which is appropriate for most Internet sites. The Internet and Local Intranet zones have a Medium security level.
❑
Prompts before downloading potentially unsafe content.
❑
Unsigned ActiveX controls are not downloaded.
Medium-Low, which is appropriate for local sites.
❑
Most content is run without prompts.
❑
Unsigned ActiveX controls are not downloaded.
Lesson 6
■
Configuring Internet Explorer Options 16-49
Low, which is appropriate for sites that are trusted. The Trusted Sites zone has a
Low security level.
❑
Minimal safeguards and warning prompts are provided.
❑
Most content is downloaded and runs without prompts.
❑
All ActiveX content can run.
The Security Level For This Zone section allows you to customize the security settings
for each zone. To customize a zone’s security level, click the zone and then click Custom Level. Windows XP Professional displays the Security Settings dialog box (see Figure 16-17), in which you can control what gets loaded onto your computer from the
Internet. For example, for Download Signed ActiveX Controls you can choose one of
the following three options:
■
Enable
Allows you to download signed ActiveX controls
■
Disable
Disables the downloading of ActiveX controls
■
Prompt
Prompts you each time a page has an ActiveX control
F16us17
Figure 16-17 Use the Security Settings dialog box to control security settings for a zone.
Other settings on the Security Settings dialog box include the following:
■
File Download
■
Font Download
16-50
Chapter 16
Configuring Security Settings and Internet Options
■
Access Data Sources Across Domains
■
Allow META REFRESH
■
Display Mixed Content
■
Don’t Prompt For Client Certificate Selection When No Certificates Or Only One
Certificate Exists
■
Drag And Drop Or Copy And Paste Files
■
Installation Of Desktop Items
■
Launching Programs And Files In An IFRAME
■
Navigate Sub-Frames Across Different Domains
■
Submit Nonencrypted Form Data
■
User Data Persistence
■
Active Scripting
■
Allow Paste Operations Via Script
■
Scripting Of Java Applets
■
User Authentication Logon
Note
Internet Explorer 6.0 and Windows XP Professional do not contain the Sun Microsystems Java Virtual Machine (JVM). The first time you connect to a Web site that requires JVM
support, you must download JVM.
How to Configure Privacy Options
The Privacy tab of the Internet Options dialog box allows you to control how Internet
Explorer handles cookies, which are small text files stored on your computer by Web
sites. Web sites use cookies to store user preferences for personalized sites, and cookies often contain personal information used to identify the user to the Web site.
Cookies can be either persistent (they remain after Internet Explorer is closed and can
be reused) or temporary (they are deleted when Internet Explorer is closed). Also,
there are first-party and third-party cookies. First-party cookies originate from the Web
site that you are currently viewing. Third-party cookies originate from a site different
from the one that you are currently viewing but are somehow related to the current
Web site. For example, many sites use advertising from third-party sites that commonly
use cookies to track your Web site usage for advertising purposes. Third-party cookies
might compromise your privacy because advertisers can use them to track your Web
site usage across multiple Web sites.
Lesson 6
Configuring Internet Explorer Options 16-51
Table 16-9 explains the available privacy settings for handling cookies.
Table 16-9
Privacy Tab Settings
Setting
Description
Block All Cookies
Blocks cookies from all Web sites and makes existing cookies on your
computer unreadable by Web sites.
High
Blocks cookies that do not have a compact privacy policy and those that
use personally identifiable information without your explicit consent.
Medium High
Blocks third-party cookies that do not have a compact privacy policy
and those that use personally identifiable information without your
explicit consent. It also blocks first-party cookies that use personally
identifiable information without your implicit consent.
Medium
Blocks third-party cookies that do not have a compact privacy policy
and those that use personally identifiable information without your
implicit consent. It also restricts first-party cookies that use personally
identifiable information without your implicit consent.
Low
Restricts third-party cookies that do not have a compact privacy policy
and those that use personally identifiable information without your
implicit consent.
Accept All Cookies
Allows all cookies to be saved on the computer. Existing cookies on this
computer can be read by the Web sites that created them.
Tip You can also click Advanced to override automatic cookie handling and manually define
whether to accept, block, or prompt first-party and third-party cookies.
In addition to helping protect you from errant cookies, the Privacy tab also lets you
enable Internet Explorer’s built-in Pop-Up Blocker, which helps prevent Web pages
from opening unexpected (and unwanted) pop-up windows. To enable the Pop-Up
Blocker, select the Block Pop-Ups check box. After enabling the feature, click Settings
to configure how the Pop-Up Blocker works. You can enter the names of sites for
which you want to allow pop-ups, as well as have Internet Explorer play sounds when
a pop-up is blocked. You can also control whether Internet Explorer announces
blocked pop-up windows in its Information Bar.
Internet Explorer displays the Information Bar just below the address bar when certain
activities occur, such as file downloads, blocked pop-up windows, and other alerts.
How to Configure Content Options
The Content tab of the Internet Options dialog box gives you access to the Content
Advisor, which controls the display of Web sites based on rating levels defined by the
16-52
Chapter 16
Configuring Security Settings and Internet Options
Recreational Software Advisory Council on the Internet (RSACi). The most common
use for Content Advisor is on a home computer on which parents want to control the
Web sites that their children can view. You can control access based on language,
nudity, sex, and violence. Ratings for Web sites are based on voluntary ratings by Web
site creators. However, by default, Content Advisor does not allow you to open sites
that have not been rated. You can also create a list of Web sites that are always viewable or never viewable, no matter how they are rated.
How to Configure Connections Options
The Connections tab of the Internet Options dialog box, shown in Figure 16-18, allows
you to control how Internet Explorer connects to the Internet. If the computer uses a
dial-up or virtual private network (VPN) connection to connect to the Internet, those
connections are shown in the Dial-Up And Virtual Private Network Settings section.
Click Add to start the New Connection Wizard, which you use to configure networking
connections (and which you learn more about in Chapter 15, “Configuring Network
and Internet Connections”). When you select one of the displayed connections, you
can also configure the following options for that connection:
Never Dial A Connection Requires that you manually establish a connection before
opening Internet Explorer.
Dial Whenever A Network Connection Is Not Present Causes Internet Explorer
to use the current default connection if it detects that there is no existing connection to the Internet.
Always Dial My Default Connection
current default connection.
Causes Internet Explorer to always dial the
F16us18
Figure 16-18
Configure the way Internet Explorer connects to the Internet.
Lesson 6
Configuring Internet Explorer Options 16-53
To configure the default connection, select a connection from the list and click Set
Default.
You can also use the Connections tab to configure proxy server settings. A proxy server
is a centralized network device that provides Internet access to the client computers on
the network, as shown in Figure 16-19. Proxy servers are used to centralize Internet
connection settings, increase security by controlling which resources a client can
access, and speed up Internet access by caching Web pages to the server. After you
configure Internet Explorer to use a proxy server, Internet Explorer requests Internet
content from the proxy server, which in turn connects to the actual Internet resource
on the client’s behalf, retrieves the information, and forwards it to the client.
Proxy server contacts
Internet servers on
clients' behalf
Internet
Clients contact proxy
server with request
F16us19
Figure 16-19
A proxy server enhances security and speeds up Internet access.
To configure Internet Explorer to use a proxy server for dial-up and VPN connections,
select the connection, and then click Settings. To configure Internet Explorer to use a
proxy server for local area network (LAN) connections, click LAN Settings.
Figure 16-20 shows the available proxy server configuration options, which are as follows:
Automatically Detect Settings Allows the client to automatically receive proxy
server configuration from a properly configured Dynamic Host Configuration Protocol (DHCP) or Domain Name System (DNS) server.
Use Automatic Configuration Script Specifies the path to a configuration script
containing proxy server information.
Use A Proxy Server For This Connection Allows you to enter the address of the
proxy server and the port that Internet Explorer should use to connect to the
proxy server.
Bypass Proxy Server For Local Addresses Allows the client to connect directly to
address on the local network (such as an internal company Web server) instead of
connecting to the proxy server.
16-54
Chapter 16
Configuring Security Settings and Internet Options
F16us19
Figure 16-20
Configure proxy server settings.
How to Configure Programs Options
The Programs tab of the Internet Options dialog box, shown in Figure 16-21, allows
you to configure the programs that are associated with particular services. For example, if a user is browsing a Web site and selects an e-mail address link, Internet
Explorer must launch the appropriate e-mail program. Other configurable services
include the HTML editor, the newsgroup client, the program to be used to establish a
call across the Internet, and the programs to access the user’s calendar and contact list.
F15us21
Figure 16-21
Configure programs associated with certain services.
At the bottom of the Programs tab, you find an option named Internet Explorer Should
Check To See Whether It Is The Default Browser. When you enable this option, Internet Explorer checks to see whether it is configured as the default browser each time
Lesson 6
Configuring Internet Explorer Options 16-55
you open the program. Windows XP opens the default browser when you open favorites from your desktop or from within e-mail messages.
How to Configure Advanced Options
The Advanced tab allows you to fine-tune accessibility, browsing, HTTP 1.1 settings,
multimedia functionality, and security. Accessibility provides the following two check
boxes:
Always Expand ALT Text For Images Specifies whether the image size should
expand to fit all the alternate text when the Show Pictures text box is cleared.
Move System Caret With Focus/Selection Changes Specifies whether to move the
system caret whenever the focus or selection changes. Some accessibility aids,
such as screen readers or screen magnifiers, use the system caret to determine
which area of the screen to read or magnify.
Browsing provides many options that allow control browsing, including the following
check boxes:
Always Send URLs As UTF-8 Specifies whether to use UTF-8, a standard that defines
characters so they are readable in any language. This enables you to exchange
Internet addresses (URLs) that contain characters from another language. This
option is selected by default.
Enable Folder View For FTP Sites Specifies that FTP sites be shown in folder view.
This feature might not work with certain types of proxy connections. If you clear
this check box, FTP sites will display their contents in a Hypertext Markup Language (HTML)-based layout. This option is selected by default.
Enable Install On Demand (Other) Specifies to automatically download and install
Web components if a Web page needs them to display the page properly or perform a particular task. This option is selected by default.
The Multimedia section provides many options including the following check boxes:
Play Animations In Web Pages Specifies whether animations can play when pages
are displayed. Pages that contain animations display very slowly. To display pages
faster, clear this check box. You can still play an individual animation even when
this check box is not selected if you right-click the icon that represents the animation, and then click Show Picture. This option is selected by default.
Play Sounds In Web Pages Specifies whether music and other sounds can play
when pages are displayed. Some pages that contain sounds download very
slowly. Clear this check box to speed up the downloading of these pages. This
option is selected by default.
16-56
Chapter 16
Configuring Security Settings and Internet Options
Show Pictures Specifies whether graphical images should be included when pages
are displayed. Pages that contain several graphical images can display very slowly.
Clear this check box to speed up the downloading of these pages. You can still
view an individual image even when this check box is not selected if you rightclick the icon that represents the graphic, and then click Show Picture. This option
is selected by default.
The Printing settings allow you to specify whether you want to print background colors
and images.
The Security settings (see Figure 16-22) allow you to fine-tune your security settings.
F16us21
Figure 16-22
Configure advanced options in Internet Explorer.
The Security section provides many options, including the following check boxes:
Empty Temporary Internet Files Folder When Browser Is Closed Specifies
whether you want to empty the Internet Temporary Files folder when the browser
is closed. This option is not selected by default.
Use SSL 2.0 Controls whether you want to send and receive secured information
through Secure Sockets Layer Level 2 (SSL 2.0), the standard protocol for secure
transmissions. All Web sites support this protocol. This option is selected by
default.
Use SSL 3.0 Specifies whether you want to send and receive secured information
through Secure Sockets Layer Level 3 (SSL 3.0), which is designed to be more
secure than SSL 2.0. Some Web sites might not support SSL 3.0. This option is
selected by default.
Lesson 6
Configuring Internet Explorer Options 16-57
Warn About Invalid Site Certificates Specifies whether Internet Explorer should
warn you if the address (URL) in a Web site’s security certificate is not valid. This
option is selected by default.
Warn If Changing Between Secure And Not Secure Mode Specifies whether Internet Explorer should warn you if you are switching between Internet sites that are
secure and sites that are not secure.
Note
For information about any of the other check boxes located in the Advanced tab of the
Internet Properties dialog box, click the question mark in the upper-right corner of the dialog
box, and then click the check box.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. What is a cookie? How can you delete all the cookies that are stored on your computer?
2. How can you control which cookies are stored on your computer?
3. As a concerned parent, how can you help protect your children from adult material found on the Internet?
16-58
Chapter 16
Configuring Security Settings and Internet Options
4. How can you have the Internet Temporary Files folder emptied each time you
close your browser?
Lesson Summary
■
Use the General tab of the Internet Options dialog box to configure your home
page, temporary Internet file settings, history settings, and Internet Explorer
appearance.
■
Use the Security tab of the Internet Options dialog box to configure settings for the
four security zones Internet Explorer uses to categorize sites: Internet, Local Intranet, Trusted Sites, and Restricted Sites. Web sites are placed into the Internet zone
unless you place them into another zone.
■
Use the Privacy tab of the Internet Options dialog box to configure how Internet
Explorer handles cookies and to enable the Pop-Up Blocker.
■
Use the Content tab of the Internet Options dialog box to configure the Content
Advisor, which blocks Web sites based on their content.
■
Use the Connections tab of the Internet Options dialog box to configure the connections that Internet Explorer uses to connect to the Internet. You can also use
this tab to configure a proxy server.
■
Use the Programs tab of the Internet Options dialog box to configure the programs
that Internet Explorer uses by default for e-mail messages, newsgroups, contacts,
and so on.
■
Use the Advanced tab of the Internet Options dialog box to configure additional
settings that govern the browsing experience.
Case Scenario Exercise
In this exercise, you will read a scenario about configuring Local Security Policy and
then answer the questions that follow. If you have difficulty completing this work,
review the material in this chapter before beginning the next chapter. You can find
answers to these questions in the “Questions and Answers” section at the end of this
chapter.
Case Scenario Exercise 16-59
Scenario
You are working as an administrator for a company named Fourth Coffee, a distributor of
gourmet coffees based in San Francisco. You are working with users in the Sales department who have 20 computers running Windows XP Professional in a workgroup environment. Your supervisor has given you the task of increasing security within the workgroup.
Specifically, you have been asked to do the following:
■
Ensure that the following password requirements are enforced:
❑
Passwords should be eight characters or more.
❑
Passwords should be complex.
❑
Users should be forced to change passwords after 30 days.
■
Users should be able to back up but not restore their own computers.
■
Users should be able to install device drivers for new devices.
■
The Administrator account on each computer should be renamed to CoffeeAdmin.
■
The Guest account should be disabled.
■
Computers should not display the last user name used to log on to a computer on
the Welcome screen.
Questions
1. Although you could log on to each computer in person and use Local Security Policy to configure the settings for the computer, what would be an easier way to
configure all computers in the workgroup?
2. List the specific policies you should configure to meet the requirements listed and
how you would configure them.
You should configure the following policies:
16-60
Chapter 16
Configuring Security Settings and Internet Options
3. After importing the custom template to a computer and restarting the computer,
how could you verify that the appropriate settings were made?
Troubleshooting Lab
In this troubleshooting lab, you will import a template to your computer that simulates
a troubleshooting environment by enforcing certain security settings. You will then
read a scenario and answer questions. If you have difficulty completing this work,
review the material in this chapter before beginning the next chapter. You can find
answers to these questions in the “Questions and Answers” section at the end of this
chapter.
Caution Performing this procedure will import security settings to your computer that might
result in loss of network connectivity to your computer. You should perform this procedure
only on your test computer. The computer should be a member of a workgroup and not a
domain.
To set up your computer for this troubleshooting lab, use these steps.
1. In Windows Explorer, open the Labs folder on the CD-ROM that accompanies this
book, locate the 270template.inf file, and copy the file to your desktop.
2. Click Start, and then click Run.
3. In the Run dialog box, type mmc, and then click OK.
4. In the Console1 window that opens, maximize the Console Root window.
5. Click File, and then click Add/Remove Snap-In.
6. In the Add/Remove Snap-In dialog box, click Add.
7. In the Add Standalone Snap-Ins dialog box, click Security Configuration And Analysis, and then click Add.
8. Click Close, and then click OK.
9. In the console tree, right-click Security Configuration And Analysis, and then click
Open Database.
10. In the Open Database dialog box, in the File Name text box, type 270.sdb, and
then click Open.
Troubleshooting Lab 16-61
11. In the Import Template dialog box that opens, in the Look In drop-down list, click
Desktop.
12. Click 270template.inf, and then click Open.
13. In the Console1 window, right-click Security Configuration And Analysis, and then
click Configure Computer Now.
Windows displays the Configure System dialog box.
14. What is the default error log file path?
C:\Documents and Settings\username\My Documents\Security\Logs\270.log
15. Click OK.
16. Close the Console 1 window.
Windows displays the Microsoft Management Console dialog box, asking whether
you want to save changes to the console.
17. Click Yes.
18. In the Save As dialog box, in the File Name text box, type Security Configuration
And Analysis.msc, and then click Save.
Scenario
You are working as an administrator for Contoso, Ltd., a manufacturer of linen products. Tibor, a user in the Production department, is having trouble with his computer
running Windows XP Professional. He has shared a folder named Bath Towels so that
other users in the department can access the files he is working on for a new project,
and he is pretty sure he shared the folder correctly. However, other users report that
they cannot connect to his computer to access the shared folder. When they try, they
see the following error message: Logon Failure: The User Has Not Been Granted The
Requested Logon Type At This Computer.
You confirm that Tibor has shared the folder correctly and has granted the appropriate
access to the Users group.
Questions
1. Given the error message that users are seeing when they try to access Tibor’s computer, what do you suspect might be the problem?
16-62
Chapter 16
Configuring Security Settings and Internet Options
2. Using the Local Security Settings window, list the users or groups that are granted
the Access This Computer From The Network user right.
3. Recalling what you have learned in this chapter, does the list of groups that have
been granted the Access This Computer From The Network user right seem like
the default setting for a workstation? What groups should be granted this right on
a workstation?
4. Open the Command Prompt window and at the command prompt, type
gpresult.exe. Are there any group policies applied to this computer?
5. Open your Administrative Tools folder (in Control Panel) and then open the Security Configuration And Analysis console that you saved when setting up this lab.
Use the following steps:
a. Right-click Security Configuration And Analysis, and then click Import Template.
b. In the Import Template window, browse to the %systemroot%\security\templates folder, click setup security.inf, and then click Open.
c. Right-click Security Configuration And Analysis, and then click Analyze Computer Now. When asked, save the error log in the default location.
d. After the analysis is done, expand the Local Policies node and click User
Rights Assignment.
e. For the Access This Computer From The Network user right, what are the
database settings and what are the computer settings?
Chapter Summary 16-63
6. What other user rights are different from those in the Security Setup template?
Note To restore your computer to the default settings after you finish this lab, right-click
Security Configuration And Analysis, and then click Configure Computer Now. Save the error
log in the default location. This action restores the default Windows user rights settings from
the Security Setup template you have loaded.
Chapter Summary
■
Local Security Policy is applied to a specific computer, and is the only type of
security policy you can use on computers that are members of a workgroup. You
manage Local Security Policy by using the Local Security Policy tool found in the
Administrative Tools folder. Group Policy, which is applied to sites, domains, and
OUs in an Active Directory environment, affects all computers or users that are
members of the container to which the Group Policy is assigned.
■
Windows XP Professional provides two types of account policies: Password Policy, which allows you to manage the passwords used on your computer, and
Account Lockout Policy, which allows you determine the number of invalid logon
attempts before a user account is locked out of the computer.
■
User rights allow a user or group to perform a specific action, such as backing up
files or changing the system time. There are two types of user rights: privileges,
which allow users to perform a specific task, and logon rights, which control the
way users can log on to a computer.
■
Security Options represent many different categories of settings related to Windows XP Professional security.
■
On a computer running Windows XP Professional, auditing helps to ensure that
your network is secure by tracking user activities and system-wide events. You set
up an audit policy by using the Local Security Settings window to specify which
events to record. You can audit the success of events, the failure of events, or both.
■
You can configure security and privacy options in Internet Explorer by using the
Internet Options dialog box. You can also use this dialog box to configure how
Internet Explorer connects to the Internet, manages temporary Internet files, and
many other options.
16-64
Chapter 16
Configuring Security Settings and Internet Options
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
The Setup Security template (Setup Security.inf) defines the default level of security applied to all new installations of Windows XP Professional on an NTFS partition. This template is useful for resetting security levels back to their default in
disaster-recovery situations.
■
The order in which GPOs are processed is that first the local GPO is processed,
and then Active Directory GPOs are processed. Active Directory GPOs are processed starting with the farthest structure from the user (the site), then the next
closer structure to the user (the domain), and finally the closest structure (the OU).
■
Auditing resource access on a computer running Windows XP Professional is a
two-step process. First, you must configure the Audit Object Access Policy. Then,
you must enable auditing for specific objects (such as files, folders, and printers).
Key Terms
account policy A policy that enforces password restrictions and account lockout policy.
auditing A process that tracks both user activities and Windows XP Professional
activities on a computer and records these events in the security log.
auditing policies Policies that allow you to track the activities of users and the
access of resources on a computer.
Local Security Policy
local computer.
A combination of settings, applied during startup, that affect a
logon right A user right assigned to a group or an individual user account that controls the way users can log on to a system.
Group Policy Combinations of security settings that are applied to users or computers based on membership in sites, domains, or OUs.
Group Policy Result Tool A command-line utility that helps you determine which
policies are actually applied to a computer.
privilege A user right that allows the members of the group to which it is assigned
to perform a specific task, usually one that affects an entire computer system
rather than one object.
Resultant Set of Policy (RSoP) A tool that provides a way for you to simulate and
test policy settings applied to computers or users. It shows you the policies
applied to the object and order in which they are applied.
Exam Highlights 16-65
security options Policies that allow you to control various security settings in Windows XP Professional.
security templates Preconfigured combinations of security settings that you can
apply to computers or customize to suit your needs.
security zones Categories of Web sites that Internet Explorer uses to allow or block
access to particular types of activities. Zones include Internet, Local Intranet,
Trusted Sites, and Restricted Sites.
user right Allows the members of the group or the individual users assigned the
right to perform a specific action, such as backing up files or changing the system
time. User rights include privileges and logon rights.
16-66
Chapter 16
Configuring Security Settings and Internet Options
Questions and Answers
Lesson 1 Review
Page
16-14
1. ______________________ is used to control settings on computers in a workgroup
environment.
Local Security Policy
2. When multiple GPOs and the LGPO affecting a computer are combined, in what
order are the policies resolved?
First, the LGPO on the computer is processed and all settings specified in that LGPO are
applied. Next, any GPOs that have been linked with the site in which the computer resides are
processed. Then, GPOs linked to the domain in which the computer resides are processed and
any settings are applied. Finally, GPOs linked to any OUs that contain the user or computer
object are processed. Settings made at each level override any conflicting settings made at the
preceding levels.
3. You would use the ______________________ tool to view the actual settings
affecting a computer and the source of those settings.
RSoP or Gpresult.exe.
Lesson 2 Practice: Exercise 2
Page
16-20
1. What settings did you use for each of the three listed items?
You should configure the Set Enforce Password History setting to 5 so that users must have at
least 5 different passwords before they use a previously used password. Set Minimum Password Age to 1 day so that a user must wait 24 hours before he or she can change it again. Set
Maximum Password Age to 21 days so that a user must change his or her password every three
weeks.
18. Were you successful? Why or why not?
No, because you must wait 24 hours (one day) before you can change your password a second
time. A Change Password dialog box appears, indicating that you cannot change the password
at this time.
Lesson 2 Practice: Exercise 3
Page
16-22
1. What Account Lockout Policy settings did you use for each of the two conditions?
Set the account lockout threshold to 4 to lock out a user account after 4 failed logon attempts.
When you set one of the three Account Lockout options and the other two options have not
been set, a dialog box appears, indicating that the other two options will be set to default values. Set the account lockout duration to 0 to ensure that locked accounts remain locked until
an administrator unlocks them.
Questions and Answers 16-67
Lesson 2 Review
Page
16-23
1. What is the range of values Windows XP Professional allows you to set for the
Enforce Password History setting, and what do those values mean?
You can set the value from 0 to 24. A value of 0 indicates that no password history is being
kept. All values indicate the number of new passwords that a user must use before he or she
can reuse an old password.
2. The range of values Windows XP Professional allows you to set for the Maximum
Password Age setting is ______ to ______ days. The default value is ______ days.
0; 999; 42
3. Which of the following selections are requirements for a password if the Passwords Must Meet Complexity Requirements setting is enabled? (Choose all that
apply.)
a. All passwords must exceed six characters in length.
b. All passwords must comply with the password history settings.
c. No passwords can contain capitals or punctuation.
d. No passwords can contain the user’s account or full name.
The correct answers are A and D. Password complexity requires that all passwords be at least
six characters in length, no password contain the user’s account or full name, and that the
password contain upper and lowercase letters, numerals, and symbols. B is not correct
because setting complexity requirements does not affect password history settings. C is not
correct because these are not complexity requirements.
4. What is Account Lockout Duration, and what is the range of values?
This value indicates the number of minutes that the system will prevent the user account from
logging on to Windows XP Professional. You can set the value from 0 to 99,999 minutes.
Lesson 3 Review
Page
16-29
1. Which of the following statements about user rights are correct? (Choose all that
apply.)
a. Microsoft recommends that you assign user rights to individual user accounts.
b. Microsoft recommends that you assign user rights to groups rather than individual user accounts.
c. User rights allow users assigned the right to perform a specific action, such as
backing up files and directories.
d. There are two types of user rights: privileges and logon rights.
The correct answers are B, C, and D. A is not correct because Microsoft recommends that you
assign user rights to groups, not to individual user accounts.
16-68
Chapter 16
Configuring Security Settings and Internet Options
2. If your computer running Windows XP Professional is part of a domain environment and you configure the Local Security Policies on your computer so that you
assign yourself the Add Workstation To A Domain user right, can you add additional workstations to the domain? Why or why not?
For the Add Workstation To A Domain privilege to be effective, it must be assigned as part of
the default domain controller policy for the domain, not the Local Security Policy on your computer running Windows XP Professional.
3. What benefit does the Back Up Files And Directories user right provide?
The Back Up Files And Directories user right improves the security on your system. It allows a
user to back up the system without being assigned file and folder permissions to access all
files and folders on the system. In other words, the person backing up the files can back up
secure files without being able to read them.
4. What are logon rights and what do they do?
A logon right is a user right assigned to a group or individual user account. Logon rights control
the way users can log on to a system.
Lesson 4 Practice
Page
16-33
1. What is the name of the Guest account?
The Guest account is now named Fox.
Lesson 4 Review
Page
16-33
1. How can you require a user to be logged on to the computer to shut it down? (Discuss using the Welcome screen and using CTRL+ALT+DELETE to log on.)
If Windows XP Professional is configured to use the Welcome screen or CTRL+ALT+DELETE to log
on, by default you do not have to log on to shut down the computer. In the console tree, expand
Local Policies, and then click Security Options. In the details pane, right-click Shutdown: Allow
System To Be Shut Down Without Having To Log On, and then click Properties and click Disabled.
2. By default, Windows XP Professional does not clear the virtual memory pagefile
when the system is shut down. Why can this be considered a security breach and
what can you do to resolve it?
The data in the pagefile might be accessible to users who are not authorized to view that information. To clear the pagefile each time the system is shut down, in the Local Security Settings
window, expand Local Policies and click Security Options. Right-click Shutdown: Clear Virtual
Memory Pagefile, and then click Properties. Select Enabled.
Questions and Answers 16-69
3. Why does forcing users to press CTRL+ALT+DELETE improve security on your
computer?
Requiring users to press CTRL+ALT+DELETE to log on to the computer increases security on your
computer because you are forcing users to use a key combination recognized only by Windows.
Using this key combination ensures that users are giving the password only to Windows, not to
a program waiting to capture user passwords.
4. By default, Windows XP Professional displays the last user name to log on to the
computer in the Windows Security dialog box. Why is this considered a security
risk, and what can you do to resolve it?
In some situations, displaying the last user name is considered a security risk because an
unauthorized user can see a valid user account displayed onscreen, which makes it much easier to break into the computer. To resolve this security problem, in the Local Security Settings
window, expand the Local Policies node, and then click Security Options. In the details pane,
right-click Interactive Logon: Do Not Display Last User Name, click Properties, and select
Enabled.
Lesson 5 Review
Page
16-44
1. What is auditing?
Auditing is a process that tracks both user activities and Windows XP Professional activities on
a computer and records these events in the security log.
2. What is an audit policy?
An audit policy defines the types of security events that Windows XP Professional records in the
security log on each computer.
3. When you are auditing events on a computer running Windows XP Professional,
where are the audited events being recorded?
Windows XP Professional writes events to the security log on the computer on which the event
occurs.
4. What are the requirements to set up and administer auditing?
You must have the Manage Auditing And Security Log user right for the computer for which you
want to configure an audit policy or review an audit log. The files and folders you want to audit
must be on an NTFS volume.
5. What are the two steps in setting up auditing?
Setting the audit policy and enabling auditing of specific resources
6. By default, any auditing changes that you make to a parent folder
________________ (are inherited/are not inherited) by all child folders and all files
in the parent and child folders.
Are inherited
16-70
Chapter 16
Configuring Security Settings and Internet Options
Lesson 6 Review
Page
16-57
1. What is a cookie? How can you delete all the cookies that are stored on your computer?
A cookie is a file created by a Web site; the cookie stores information about you on your computer. In the Temporary Internet Files section in the General tab, click Delete Cookies to delete
all cookies now.
2. How can you control which cookies are stored on your computer?
The Privacy tab of the Internet Properties dialog box allows you to determine how cookies will
be handled on your computer.
3. As a concerned parent, how can you help protect your children from adult material found on the Internet?
The Content tab gives you access to the Content Advisor, which allows you to control what can
be viewed on the Internet. You can control access to Web sites based on language, nudity, sex,
and violence based on voluntary ratings by Web site creators. By default, Content Advisor does
not allow access to sites that have not been rated. You can also create a list of Web sites that
are never viewable, no matter how they are rated.
4. How can you have the Internet Temporary Files folder emptied each time you
close your browser?
In the Security section of the Advanced tab in the Internet Properties dialog box, you can select
the Empty Internet Temporary Files Folder When Browser Is Closed check box. Selecting this
check box specifies that you want to empty the Internet Temporary Files folder when the
browser is closed. This option is not selected by default.
Case Scenario Exercise
Page
16-58
1. Although you could log on to each computer in person and use Local Security Policy to configure the settings for the computer, what would be an easier way to
configure all computers in the workgroup?
You could customize an administrative template with the required settings, save the template,
and then export it on each computer in the workgroup.
2. List the specific policies you should configure to meet the requirements listed and
how you would configure them.
You should configure the following policies:
❑
Configure the Minimum Password Length policy with a value of 8.
❑
Enable the Passwords Must Meet Complexity Requirements policy.
❑
Configure the Maximum Password Age with a value of 30.
Questions and Answers 16-71
❑
Add the Users group to the Back Up Files And Directories user right.
❑
Add the Users group to the Load And Unload Device Drivers user right.
❑
Configure the Accounts: Rename Administrator Account security option with the name CoffeeAdmin.
❑
Configure the Accounts: Guest Account Status security option as Disabled.
❑
Configure the Interactive Logon: Do Not Display Last User Name security option as
Enabled.
3. After importing the custom template to a computer and restarting the computer,
how could you verify that the appropriate settings were made?
You could use the Security Configuration And Analysis tool to analyze the computer against the
template. The results would show you the security settings in effect on the computer and the
setting specified in the template.
Troubleshooting Lab
Page
16-60
1. Given the error message that users are seeing when they try to access Tibor’s computer, what do you suspect might be the problem?
The problem is likely that the Access This Computer From The Network user right is not configured to allow network access by the appropriate groups.
2. Using the Local Security Settings window, list the users or groups that are granted
the Access This Computer From The Network user right.
Only the following groups are granted the Access This Computer From The Network user right:
Administrators, Power Users, and Backup Operators.
3. Recalling what you have learned in this chapter, does the list of groups that have
been granted the Access This Computer From The Network user right seem like
the default setting for a workstation? What groups should be granted this right on
a workstation?
No. The default groups that are granted this right are Administrators, Backup Operators, Power
Users, Users, and Everyone.
4. Open the Command Prompt window and at the command prompt, type
gpresult.exe. Are there any group policies applied to this computer?
Yes, the Local Group Policy. This computer should be a member of a workgroup, so no domain
group policies are applied. If you are running the exercise on a computer that is connected to
a domain, you might see group policies in effect. In addition, those policies might override the
Local Security Policy you used to set up this lab.
16-72
Chapter 16
Configuring Security Settings and Internet Options
5. Open your Administrative Tools folder (in Control Panel) and then open the Security Configuration And Analysis console that you saved when setting up this lab.
Use the following steps:
a. Right-click Security Configuration And Analysis, and then click Import Template.
b. In the Import Template window, browse to the %systemroot%\security\templates folder, click setup security.inf, and then click Open.
c. Right-click Security Configuration And Analysis, and then click Analyze Computer Now. When asked, save the error log in the default location.
d. After the analysis is done, expand the Local Policies node and click User
Rights Assignment.
e. For the Access This Computer From The Network user right, what are the
database settings and what are the computer settings?
The database settings (the default Windows settings from the Security Setup template) include
these groups: Administrators, Backup Operators, Power Users, Users, and Everyone. The computer settings (which were applied when you set up the lab) include these groups: Backup Operators, Power Users, and Administrators.
6. What other user rights are different from those in the Security Setup template?
Change The System Time, Deny Access To This Computer From The Network, Deny Logon
Locally, Load And Unload Device Drivers, Logon Locally, and Shut Down The System.
17 Monitoring and Managing
Shared Folders by Using
Computer Management
Exam Objectives in this Chapter:
■
Manage and troubleshoot access to shared folders
■
Create and remove shared folders
Why This Chapter Matters
This chapter prepares you to monitor network resources. You learn about using
the Computer Management window to view and create shares. You also learn
how to use view sessions, open files, and disconnect users from shared folders.
Lessons in this Chapter:
■
Lesson 1: Monitoring Access to Shared Folders . . . . . . . . . . . . . . . . . . . . . . .17-2
■
Lesson 2: Creating and Sharing Local and Remote Folders. . . . . . . . . . . . . . 17-10
■
Lesson 3: Monitoring Network Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-15
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have
Microsoft Windows XP Professional installed on a computer on which you can make
changes.
17-1
17-2
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
Lesson 1: Monitoring Access to Shared Folders
Windows XP Professional includes the Shared Folders snap-in, which allows you to
easily monitor access to network resources and send administrative messages to users.
The Shared Folders snap-in is included in Computer Management, and you can also
add the snap-in to your own custom console. You monitor access to network resources
to assess and manage current usage on network servers. You monitor access to shared
folders to determine how many users currently have a connection to each folder. You
can also monitor open files to determine which users are accessing the files, and you
can disconnect users from one open file or from all open files.
After this lesson, you will be able to
■ Identify reasons for monitoring access to network resources
■ Identify which users can monitor access to network resources
■ View and monitor the shared folders on a computer
■ Monitor open files on a computer
■ Disconnect users from one or all open files
Estimated lesson time: 30 minutes
Reasons for Monitoring Network Resources
It is important that you understand why you should monitor the network resources in
your computer environment. Some of the reasons why it is important to assess and
manage network resources are included in the following list:
Maintenance You should determine which users are currently using a resource so
that you can notify them before making the resource temporarily or permanently
unavailable. Additionally, you might be able to detect current or impending problems.
Security You should monitor user access to resources that are confidential or need to
be secure to verify that only authorized users are accessing them.
Planning You should determine which resources are being used and how much
they are being used so that you can plan for future system growth.
You can use Computer Management to monitor the resources on the local computer or
a remote computer.
Lesson 1
Monitoring Access to Shared Folders
17-3
Who Can Monitor Access to Network Resources?
Not all users can monitor access to network resources. Table 17-1 lists the group membership requirements for monitoring access to network resources using Computer
Management.
Table 17-1
!
Groups That Can Access Network Resources
A Member of These Groups…
Can Monitor…
Domain Administrators or Server Operators
for the domain
All computers in the domain
Administrators or Power Users for a member
server or a computer running Windows XP
Professional
Local or remote computers in the workgroup
Exam Tip
Members of the Domain Administrators or Server Operators domain groups can
use Computer Management to monitor any computer that is a member of the domain. Members of the Administrators or Power Users local group can monitor a local computer, whether
that computer is in a workgroup or domain.
How to Use the Shares Folder to View and Monitor Shared Folders
You use the Shares folder in Computer Management (located within System
Tools\Shared Folders) to view a list of all shared folders on the computer and to determine how many users have a connection to each folder. In Figure 17-1, the Shares
folder has been selected in the Computer Management console tree, and all the shared
folders on that computer are shown in the details pane.
F17us01
Figure 17-1
Use the Shares folder to view the status of all shared folders on a computer.
17-4
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
Table 17-2 explains the information provided in the details pane shown in Figure 17-1.
Table 17-2
Fields in the Details Pane of the Shares Folder
Column Name
Description
Shared Folder
The shared folders on the computer. This is the name that was given
to the folder when it was shared.
Shared Path
The path to the shared folder.
Type
The type of network connection: Windows, Novell NetWare, or Apple
Macintosh.
# Client Connections
The number of clients who have made a remote connection to the
shared folder.
Comment
Descriptive text about the folder. This comment was provided when
the folder was shared.
Note
Windows XP Professional does not update the list of shared folders, open files, and
user sessions automatically. To update these lists, on the Action menu, click Refresh.
Real World
Monitoring Multiple Remote Computers Easily
The Microsoft Management Console (MMC) allows you to add multiple snap-ins
that can connect to different remote computers. If you routinely monitor shared
folders and users on several different remote computers, you can create a custom
console that lets you switch between those computers easily. To create a custom
console for monitoring multiple remote computers, follow these steps:
1. Click Start, and then click Run.
2. In the Run dialog box, type mmc, and then click OK.
Windows XP displays an empty MMC console named Console 1.
3. Click File, and then click Add/Remove Snap-In.
4. In the Add/Remove Snap-In dialog box, click Add.
5. In the Add Standalone Snap-In dialog box, in the Available Standalone SnapIns list, click Shared Folders, and then click Add.
6. In the Shared Folders dialog box, click Another Computer, and then type the
name of the remote computer (or click Browse to locate the computer on the
network).
7. Repeat Steps 5 and 6 for each computer you want to add to the console.
Lesson 1
Monitoring Access to Shared Folders
17-5
8. Click Close to close the Add Standalone Snap-In dialog box.
9. Click OK to close the Add/Remove Snap-In dialog box,
10. Click File, and then click Save to save the custom console.
One thing to keep in mind as you set up a console for monitoring remote computers is that Windows Firewall prevents remote management in its default configuration. For information on allowing remote management in Windows
Firewall, see the Knowledge Base article, “How to troubleshoot WMI-related
issues in Windows XP SP2,” available at http://support.micr osoft.com/
Default.aspx?kbid=875605.
How to Specify the Maximum Concurrent Users Who can Access a Shared Folder
You can use Computer Management to specify the maximum number of users who are
permitted to access a shared folder. To specify the maximum number of users, follow
these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools folder, double-click Computer Management.
5. In the Computer Management window, expand the System Tools node, and then
the Shared Folders node.
6. Click Shares.
7. In the right pane, right-click the shared folder for which you want to determine
the maximum number of concurrent users, and then click Properties.
Windows XP displays the Properties dialog box for the shared folder, with the
General tab active. By default, the User Limit is set to Maximum Allowed, which in
Windows XP Professional is 10 concurrent connections.
8. Click Allow This Number Of Users and specify the number of users (up to 10) that
you want to be able to connect to the shared folder.
!
Exam Tip
When troubleshooting connectivity problems when a user cannot connect to a
share, do not forget to check the number of connections to the share and the maximum connections allowed on the share. If the maximum number of connections has already been
made, the user cannot connect to the shared resource.
17-6
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
Shared Folder Properties
You can modify existing shared folders, including shared folder permissions, from the
Shares folder. To change a shared folder’s properties, right-click the shared folder, and
then click Properties. The General tab of the Properties dialog box shows you the share
name, the path to the shared folder, and any comment that has been entered. The General tab also allows you to view and set a user limit for accessing the shared folder. The
Share Permissions tab lets you change the users and groups that have access to the
shared folder and the permissions each user or group is assigned. The Security tab
allows you to view and change the NTFS folder permissions for the folder that the
shared folder is based on. (See Chapter 8, “Securing Resources with NTFS Permissions,” for more on using the NTFS permissions. See Chapter 9, “Administering Shared
Folders,” for more on configuring shared folder permissions.)
How to Use the Open Files Folder to Monitor Files
Use the Open Files folder in Computer Management to view a list of open files that
are located in shared folders and the users who have a current connection to each file.
You can use this information when you need to contact users to notify them that you
are shutting down the system. Additionally, you can determine which users have a current connection and should be contacted when another user is trying to access a file
that is in use.
Table 17-3 describes the information that is available in the Open Files folder.
Table 17-3
Information Available in the Open Files Folder
Column Name Description
Open File
The name of the open files on the computer.
Accessed By
The logon name of the user who has the file open.
Type
The operating system running on the computer in which the user is
logged on.
# Locks
The number of locks on the file. Programs can request the operating system
to lock a file to gain exclusive access and prevent other programs from making changes to the file.
Open Mode
The type of access that the user’s application requested when it opened the
file, such as Read or Write.
How to Disconnect Users from Open Files
You can disconnect users from one open file or from all open files. If you make
changes to the NTFS File System permissions for a file that is currently opened by a
user, the new permissions will not affect the user until he or she closes and then
attempts to reopen the file.
Lesson 1
Monitoring Access to Shared Folders
17-7
You can force these changes to take place immediately by doing either of the following:
Disconnect all users from all open files To disconnect all users from all open
files, in Computer Management, click Open Files; on the Action menu, click Disconnect All Open Files.
Disconnect all users from one open file To disconnect users from one open file,
in Computer Management, click Open Files. In the details pane, select the open
file; on the Action menu, click Close Open File.
Caution
Disconnecting users from open files can result in data loss. You should disconnect users only when absolutely necessary and you should try to warn users first.
Practice: Monitoring Shared Folders
In this practice, you use Computer Management to view the shared folders and open
files on your server. If there are any open files on your server and you want to disconnect them, use the Disconnect All Open Files selection. This selection will disconnect
all users from all open files.
Exercise 1: View the Shared Folders on Your Computer
1. Log on with a user account that is a member of the Administrators group.
2. Click Start, point to All Programs, point to Administrative Tools, and then click
Computer Management.
Windows XP Professional displays Computer Management.
3. In the Computer Management window, expand the System Tools node, and then
expand the Shared Folders node.
4. Under Shared Folders, click Shares.
Notice that the details pane shows a list of the existing shared folders on your
computer.
5. What information is displayed about each shared folder?
Exercise 2: View the Open Files on Your Computer
1. In the Computer Management window, under Shared Folders, click Open Files.
17-8
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
If you are working on a computer that is not connected to a network, there are not
any open files because the open files show only connections from a remote computer to a share on your computer.
2. If there are any open files and you want to disconnect all of them, on the Action
menu, click Disconnect All Open Files.
3. Leave Computer Management open and remain logged on for the next practice.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. Why is it important to manage network resources?
2. On a computer running Windows XP Professional, members of the
___________________________ and _________________________ groups can use
Computer Management to monitor network resources.
3. How can you determine which files are open on a computer running Windows XP
Professional?
4. Which of the following statements about monitoring network resources are correct? (Choose all that apply.)
a. You can use Computer Management to disconnect all users from all open
files.
b. You can use Computer Management to disconnect one user from one file.
c. If you change the NTFS permissions for an open file, the changes affect all
users who have the file open immediately.
d. If you make changes to the NTFS permissions for an open file, the changes
do not affect the user who has that file opened until he or she closes and
reopens the file.
Lesson 1
Monitoring Access to Shared Folders
17-9
Lesson Summary
■
Monitoring network resources helps you determine whether a network resource is
still needed and whether it is secure, and it helps you plan for future growth. Use
Computer Management to monitor access to network resources on local or remote
computers.
■
In a workgroup, only members of the Administrators group or the Power Users
group can monitor resources. In a domain, only members of the Administrators
group or the Server Operators group for the domain can monitor resources on all
the computers in the domain.
■
Use the Shares folder in Computer Management to manage shared folders and
open files on a computer.
■
Use the Open Files folder to view currently open files on a computer.
■
You can disconnect all users from a currently open file or you can disconnect all
users from all open files. You cannot disconnect a single user from a single file.
17-10
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
Lesson 2: Creating and Sharing Local and Remote Folders
You can use Computer Management to share an existing folder or to create a new
folder and share it on the local computer or on a remote computer. You can also modify the shared folder and NTFS permissions when you share the folder. Remember that
to share folders on a computer on which Windows Firewall is running, you must
enable the File And Printer Sharing exception (refer to Chapter 9 for details on how to
do this).
After this lesson, you will be able to
■ Create a new folder and share it by using Shared Folders
■ Share a folder on a remote computer by using Shared Folders
■ Stop sharing a folder
Estimated lesson time: 20 minutes
How to Create a New Folder and Share It by Using Shared Folders
From the Computer Management window, you can run the Create A Shared Folder
Wizard to create a new folder and share it. To run the Create A Shared Folder Wizard,
follow these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools folder, double-click Computer Management.
5. Expand the System Tools node, and then expand the Shared Folders node.
6. Under Shared Folders, click Shares.
7. On the Action menu, click New File Share.
The Create A Shared Folder Wizard starts and displays the Welcome page.
8. Click Next to proceed.
Windows displays the Set Up A Shared Folder page.
9. In the Folder To Share text box, type the path for the folder you want to share, or
click the Browse button to locate an existing folder. If you type the name of a
folder that does not already exist, Windows will display a dialog box asking
whether you want to create the folder. You can create a new folder and share it in
one process.
Lesson 2
Creating and Sharing Local and Remote Folders 17-11
10. In the Share Name text box, type the share name of the folder. Optionally, you can
also type a description for the folder.
11. Click Next to proceed.
If you typed the name of a folder that does not exist in the Folder To Share text
box, a dialog box appears that asks you if you want to create the new folder. If it
does, click Yes.
The Create A Shared Folder Wizard displays the Shared Folder Permissions page,
which offers the options shown in Table 17-4.
12. Select the kind of permission you want to use for the shared folder, and then click
Next.
13. Click Finish.
Table 17-4
Basic Share Permissions
Option
Description
All Users Have Read-Only Access The Create A Shared Folder Wizard assigns the Full Control
share permission to the Everyone group.
Administrators Have Full Control; The Create A Shared Folder Wizard assigns the Full Control
share permission to the Administrators group and the Read
Other Users Have Read-Only
share permission to the Everyone group.
Access
Administrators Have Full Control; The Create A Shared Folder Wizard assigns the Full Control
Other Users Have No Access
share permission to the Administrators group.
Customize Permissions
Select this option to create your own custom share permissions and NTFS permissions.
How to Share a Folder on a Remote Computer by Using Shared Folders
If you want to share a folder on a remote computer, you use the Computer Management window to connect to the remote computer.
Note
Using Computer Management (or the Shared Folders snap-in) is the only way to share
a folder on a remote computer. Otherwise, you need to be physically located at the computer
where the folder resides to share it.
To share a folder on a remote computer, use these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
17-12
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
4. In the Administrative Tools folder, double-click Computer Management.
5. In the Computer Management window, click Computer Management (Local).
6. Click Action, and then click Connect To Another Computer.
Windows XP displays the Select Computer dialog box.
7. Type the Universal Naming Convention (UNC) of the computer to which you want
to connect or click Browse to locate the computer on the network. Click OK when
you have specified the computer.
8. Use the Create A Shared Folder Wizard (described in the previous section) to create a new folder and share it.
Note If you want to create and manage shared folders on remote computers and you are
not in a domain, you must create the same user account with the same password on each
computer. In workgroups, you do not have a central database that contains all user accounts.
Instead, each computer in the workgroup has its own local security database. For more information on local security databases, see Chapter 7, “Setting Up and Managing User
Accounts.”
How to Stop Sharing a Folder by Using Shared Folders
You can also use the Shared Folders node in Computer Management to stop sharing a
folder. To stop sharing a folder, follow these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools folder, double-click Computer Management.
5. Expand the System Tools node, and then expand the Shared Folders node.
6. Under Shared Folders, click Shares.
7. In the right-hand pane, right-click the folder you want to stop sharing and then
click Stop Sharing.
Windows displays a Shared Folders dialog box, asking whether you are sure you
want to stop sharing the folder.
8. Click Yes.
Lesson 2
Creating and Sharing Local and Remote Folders 17-13
Practice: Creating a Shared Folder
In this practice, you use Computer Management to create a new folder and share that
folder on a local computer by using the Shared Folders node in Comptuer Management. You also use Shared Folders to stop sharing the folder.
Exercise 1: Create a Folder on a Local Computer and Share it by Using Shared
Folders
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools folder, double-click Computer Management.
5. Expand the System Tools node, and then expand the Shared Folders node.
6. Under Shared Folders, click Shares.
7. On the Action menu, click New File Share.
The Create A Shared Folder Wizard starts.
8. On the Create A Shared Folder Wizard page, in the Folder To Share text box, type
C:\Library.
9. In the Share Name text box, type Library.
10. Click Next.
A message box appears, asking you if you want to create C:\Library.
11. Click Yes.
A message box appears, informing you that C:\Library has been created.
12. Click OK.
The Create A Shared Folder Wizard displays a final page of three basic share permission options and a customizable permissions option, as described in Table
17-4. You can use one of the three basic permissions or you can choose Customize
Share And Folder Permissions to create your own permissions.
13. Click Finish to accept the default permissions option All Users Have Full Control.
The Create A Shared Folder Wizard displays a message box, telling you that the
folder has been successfully shared and asking if you want to create another
shared folder.
14. Click No.
Leave the Computer Management window open for the next exercise.
17-14
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
Exercise 2: Stop Sharing a Folder
1. Under Shared Folders, click Shares.
2. Select the Library folder in the right pane.
3. On the Action menu, click Stop Sharing.
Windows XP Professional displays a message box, asking if you are sure you want
to stop sharing Library.
4. Click Yes.
The Library share disappears from the list of shared folders.
Caution
If you stop sharing a folder while a user has a file open, the user might lose data.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. Which of the following tools can you use to create a shared folder on a remote
computer? (Choose all that apply.)
a. Windows Explorer
b. Computer Management
c. Administrative Tools
d. Shared Folders snap-in
2. How do you create and share a folder on a remote computer?
Lesson Summary
■
You can use Computer Management (or the Shared Folders snap-in in a custom
console) to share an existing folder or to create and share a new folder on the
local computer.
■
You can also use Computer Management to create a shared folder on a remote
computer.
Lesson 3
Monitoring Network Users 17-15
Lesson 3: Monitoring Network Users
You can use Computer Management to monitor the users who are currently accessing
shared folder resources on a server from a remote computer, and you can also view the
resources to which the users have connections. You can disconnect users and send
administrative messages to computers and users, including those not currently accessing network resources.
After this lesson, you will be able to
■ Monitor user sessions
■ Disconnect a specific user from his or her network connection
■ Send administrative messages to users
Estimated lesson time: 20 minutes
How to Monitor User Sessions
You can use Computer Management to view the users who have a connection to open
files on a server and the files to which they have a connection. This information
enables you to determine which users you should contact when you need to stop sharing a folder or shut down the server on which the shared folder resides. You can disconnect one or more users to free idle connections to the shared folder, to prepare for
a backup or restore operation, to shut down a server, or to change group membership
and permissions for the shared folder.
You use the Sessions folder in the Computer Management window to view a list of
the users with a current network connection to the computer that you are monitoring
(see Figure 17-2).
F17us02
Figure 17-2
computer.
Use the Sessions folder to see a list of users with a current network connection to the
Table 17-5 describes the information that is available in the Sessions folder.
17-16
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
Table 17-5
Information Available in the Sessions Folder
Column Name
Description
User
The users with a current network connection to this computer
Computer
The name of the user’s computer
Type
The operating system running on the user’s computer
# Open Files
The number of files that the user has open on this computer
Connected Time
The time that has elapsed since the user established the current session
Idle Time
The time that has elapsed since the user last accessed a resource on this
computer
Guest
Whether this computer authenticated the user as a member of the built-in
Guest account
How to Disconnect Users
You can disconnect one or all users with a network connection to a computer so that
you can do any of the following:
■
Have changes to shared folder and NTFS permissions take effect immediately. A
user retains all permissions for a shared resource that Windows XP Professional
assigned when the user connected to it. Windows XP Professional evaluates the
permissions again the next time a connection is made.
■
Free idle connections on a computer so that other users can make a connection
when the maximum number of connections has been reached. User connections
to resources might remain active for several minutes after a user finishes accessing
a resource.
■
Shut down a server.
Note
After you disconnect a user, he or she can immediately make a new connection. If the
user gains access to a shared folder from a Windows-based client computer, the client computer automatically re-establishes the connection with the shared folder. This connection is
established without user intervention unless you change the permissions to prevent the user
from accessing the shared folder or you stop sharing the folder to prevent all users from
accessing it.
To disconnect a specific user, use these steps:
1. In the Computer Management window, under Shared Folders, click Sessions.
2. In the list of users in the details pane, select the user that you want to disconnect,
and on the Action menu, click Close Session.
Lesson 3
Monitoring Network Users 17-17
Note If you want to disconnect all users, click Sessions in the console tree, and then, on
the Action menu, click Disconnect All Sessions.
To prevent data loss, you should always notify users who are accessing shared folders
or files that you are ready to stop sharing a folder or shut down the computer.
How to Send Administrative Messages to Users
You can send administrative messages to one or more users or computers. Send them
to users with a current connection to a computer on which network resources are
shared to notify them when there will be a disruption to the computer or resource
availability. Some common reasons for sending administrative messages are to notify
users when you intend to do any of the following:
■
Perform a backup or restore operation
■
Disconnect users from a resource
■
Upgrade software or hardware
■
Shut down the computer
Note Computers running Windows XP Professional can receive console messages only if
the Messenger service is running on the computer. If a computer has Windows XP Service
Pack 2 installed, the Messenger service is disabled by default. To enable the service, use the
Services tool in the Administrative Tools folder.
To send an administrative message to one or more computers, follow these steps:
1. In the Computer Management window, right-click Shared Folders, point to All
Tasks, and then click Send Console Message.
Windows XP displays the Send Console Message dialog box.
2. In the Send Console Message dialog box, click Add.
Windows XP displays the Select Computer dialog box.
3. In the Select Computer dialog box, type the names of the computers to which you
want to send a message, and then click OK. (You can also click Advanced to
browse through a list of available computers.)
Tip In Computer Management, you can determine the name of the computer that a user is
logged on to by clicking the Sessions folder.
17-18
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
4. In the Send Console Message dialog box, in the Message box, type the message
that you want to send.
5. Click Send to send the console message to the selected computers.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. How can you determine which users have a connection to open files on a computer and the files to which they have a connection?
2. How can you disconnect a specific user from a file?
3. Why would you send an administrative message to users with current connections?
4. What can you do to prevent a user from re-establishing a network connection after
you have disconnected that user from a shared folder?
Lesson Summary
■
Use the Sessions folder in the Computer Management window to view which
users have a connection to open files on a computer and the files to which they
have a connection.
Case Scenario Exercise 17-19
■
You can also use the Sessions folder to disconnect a specific user or all users with
a network connection to a computer.
■
You can also use the Computer Management window to send administrative messages to the users on one or more computers.
Case Scenario Exercise
In this exercise, you will read a scenario about monitoring shared folders and then
answer the questions that follow. If you have difficulty completing this work, review
the material in this chapter before beginning the next chapter. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
Scenario
You are working as an administrator for a company named Contoso, Ltd, a manufacturer of crystal glassware. You are working with Ray, a user in the Marketing department who has several shared folders on his computer running Windows XP
Professional. One of these folders, Brochures, is used by many users in the department.
Often, other users complain to Ray that they cannot gain access to the Brochures
folder. Ray is aware that his computer supports only 10 concurrent connections, but he
is sure that on many occasions, fewer than 10 people are actually using the files in the
Brochures folder.
Questions
1. What misconception does Ray have about the connections to his computer?
2. Ray wants to be able to determine how many users are connecting to the Brochures folder at any given time. How could he do this? What requirements must he
meet?
17-20
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
3. Ray also wants to be able to determine which users are connected to his computer. How could he do this?
4. Concerned that more than 10 users might need to connect to the shared folders on
his computer at a time, Ray asks for your opinion. What should you tell him?
Troubleshooting Lab
You are working as an administrator for a company named Lucerne Publishing, a publisher of electronic reference materials for government contracting firms. Sofia, one of
the managing editors, calls to tell you that she is having trouble connecting to a shared
folder on the network. The folder is located on a computer running Windows XP Professional that belongs to one of her junior editors, Kevin. Kevin is out of town for the
week, and Sofia needs several files from Kevin’s computer. You confirm that both Sofia’s
and Kevin’s computers are both operational and are successfully connected to the network. Sofia is a member of the following groups: Users, Editors, and Managing Editors.
1. How can you confirm that Kevin’s computer actually has a shared folder available?
2. After confirming that the shared folder is indeed on Kevin’s computer, how can
you ensure that Sofia has the appropriate permissions to access the shared folder?
Exam Highlights 17-21
3. After confirming that Sofia has the appropriate permissions to access the resource,
you use Computer Management and discover that six users are currently accessing
the computer, four of whom are connected to the resource that Sofia needs to
access. You attempt to open the folder yourself and receive an error message, stating that there are too many connections to the folder. What should you suspect is
the problem? How would you solve this problem?
Chapter Summary
■
Monitoring network resources helps you determine whether a network resource is
still needed and whether it is secure, and it helps you plan for future growth. Use
Computer Management to monitor access to network resources on local or remote
computers.
■
You can use Computer Management (or the Shared Folders snap-in in a custom
console) to share an existing folder or to create and share a new folder on a local
or remote computer.
■
Use the Sessions folder in the Computer Management window to view which
users have a connection to open files on a computer and the files to which they
have a connection. You can also use the Sessions folder to disconnect a specific
user or all users with a network connection to a computer.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
Members of the Domain Administrators or Server Operators domain groups can
use Computer Management to monitor any computer that is a member of the
domain. Members of the Administrators or Power Users local group can monitor a
local computer, whether that computer is in a workgroup or domain.
■
There is a quick and easy way to troubleshoot connectivity problems when a user
cannot connect to a share. Determine the number of connections to the share and
the maximum connections allowed. If the maximum number of connections has
already been made, the user cannot connect to the shared resource.
17-22
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
Key Terms
Open Files folder A folder in Computer Management that allows you to view a list
of open files that are located in shared folders and the users who have a current
connection to each file.
Sessions folder A folder in Computer Management that allows you to view a list of
the users with a current network connection to the computer that you are monitoring.
Shared Folders snap-in An MMC snap-in that allows you to easily monitor access
to network resources and send administrative messages to users
Shares folder A folder in Computer Management that allows you to view a list of all
shared folders on the computer and to determine how many users have a connection to each folder.
Questions and Answers 17-23
Questions and Answers
Lesson 1 Practice: Exercise 1
Page
17-7
1. What information is displayed about each shared folder?
The name of the share, the path to the folder that is being shared, the type of share, the number of client computers currently connected to the share, and any comment entered about the
share.
Lesson 1 Review
Page
17-8
1. Why is it important to manage network resources?
You need to know which users access a network resource so that you can notify them if a
resource becomes temporarily or permanently unavailable. You monitor confidential resources
to verify that only authorized users are accessing them. You determine how much all resources
are being used to help you plan for future system growth.
2. On a computer running Windows XP Professional, members of the
___________________________ and _________________________ groups can use
Computer Management to monitor network resources.
Administrators and Power Users
3. How can you determine which files are open on a computer running Windows XP
Professional?
Use the Open Files folder in Computer Management to view a list of open files and the users
who have a current connection to each file.
4. Which of the following statements about monitoring network resources are correct? (Choose all that apply.)
a. You can use Computer Management to disconnect all users from all open
files.
b. You can use Computer Management to disconnect one user from one file.
c. If you change the NTFS permissions for an open file, the changes affect all
users who have the file open immediately.
d. If you make changes to the NTFS permissions for an open file, the changes
do not affect the user who has that file opened until he or she closes and
reopens the file.
The correct answers are A and D. B is not correct because you cannot disconnect a single user
from a file. You must disconnect all users from a file or disconnect all users from all files. C is
not correct because if you change NTFS permissions for an open file, the changes are not
applied until the next time the user logs on.
17-24
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
Lesson 2 Review
Page
17-14
1. Which of the following tools can you use to create a shared folder on a remote
computer? (Choose all that apply.)
a. Windows Explorer
b. Computer Management
c. Administrative Tools
d. Shared Folders snap-in
The correct answers are B and D. A is not correct because you cannot use Windows Explorer to
create a shared folder on a remote computer—only on the local computer. C is not correct
because Administrative Tools is a folder that provides access to several different tools.
2. How do you create and share a folder on a remote computer?
You can create and share a folder on a remote computer by using Computer Management (or
the Shared Folders snap-in), and connecting to the remote computer on which you want to manage shares.
Lesson 3 Review
Page
17-18
1. How can you determine which users have a connection to open files on a computer and the files to which they have a connection?
The Sessions folder in Computer Management shows you a list of all users with a connection
to an open file and the files to which they have a connection.
2. How can you disconnect a specific user from a file?
In Computer Management, click Sessions. Select the user that you want to disconnect in the
details pane. On the Action menu, click Close Session.
3. Why would you send an administrative message to users with current connections?
To inform the users that you are about to disconnect them from the resource they are connected to so that you can perform a backup or restore operation, upgrade software or hardware, or shut down the computer.
4. What can you do to prevent a user from re-establishing a network connection after
you have disconnected that user from a shared folder?
To prevent all users from reconnecting, stop sharing the folder. To prevent only one user from
re-establishing a connection, change the permissions for the folder so that the user no longer
has access, and then disconnect the user from the shared folder.
Questions and Answers 17-25
Case Scenario Exercise Questions
Page
17-19
1. What misconception does Ray have about the connections to his computer?
Ray is under the impression that 10 people can connect to the Brochures folder at a time. Actually, up to 10 people can connect to Ray’s computer at a time, which includes connections to
all shared folders (or printers) on the computer.
2. Ray wants to be able to determine how many users are connecting to the Brochures folder at any given time. How could he do this? What requirements must he
meet?
Ray can use the Shares folder in the Computer Management window to determine the status of
any shared folder on his computer, including the number of connections currently being made
to the folder. To manage shared folders through Computer Management, Ray must be a member of the Administrators or Power Users local groups.
3. Ray also wants to be able to determine which users are connected to his computer. How could he do this?
Ray should use the Sessions folder in the Computer Management window, which shows all
open connections to his computer.
4. Concerned that more than 10 users might need to connect to the shared folders on
his computer at a time, Ray asks for your opinion. What should you tell him?
Ray should consider moving the shared folders to a computer running Windows Server 2003,
which can support more than 10 concurrent connections. If he cannot do this (or if he is a
member of a workgroup that does not contain a server), he should consider distributing the
shared folders to other computers running Windows XP Professional.
Troubleshooting Lab
Page
17-20
1. How can you confirm that Kevin’s computer actually has a shared folder available?
The easiest way to confirm this is to use Computer Management to connect remotely to Kevin’s
computer, and then use the Shares folder to determine what folders are shared.
2. After confirming that the shared folder is indeed on Kevin’s computer, how can
you ensure that Sofia has the appropriate permissions to access the shared folder?
You should right-click the share in the Shares folder, and then click Properties to open the Properties dialog box for the shared folder. Use the Share Permissions tab to make sure that Sofia
is assigned the appropriate shared folder permissions to access the folder from the network
(by permissions granted to a group that she is a member of or directly to her account). You
should also use the Security tab to make sure that Sofia has the appropriate NTFS permissions
to access the folder.
17-26
Chapter 17
Monitoring and Managing Shared Folders by Using Computer Management
3. After confirming that Sofia has the appropriate permissions to access the resource,
you use Computer Management and discover that six users are currently accessing
the computer, four of whom are connected to the resource that Sofia needs to
access. You attempt to open the folder yourself and receive an error message, stating that there are too many connections to the folder. What should you suspect is
the problem? How would you solve this problem?
The problem is likely that Kevin has limited the number of connections that can access the
folder to four. You could use Computer Management to disconnect current users or you could
use the Properties dialog box for the shared folder to increase the number of connections
allowed.
18 Using Windows XP Tools
Exam Objectives in this Chapter:
■
Monitor, optimize, and troubleshoot performance of the Microsoft Windows XP
Professional desktop.
❑
■
Configure, manage, and troubleshoot Scheduled Tasks.
Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.
Why This Chapter Matters
In this chapter, you will learn about several of the tools available in Windows XP
for configuring and troubleshooting the operating system. You will learn how to
work with services, which are programs or processes that run in the background
on a computer to perform particular system functions for other programs. You
will also learn to use Event Viewer to monitor the events that Windows XP Professional records in various logs. You will learn to schedule tasks, and to use System Restore to save and restore system check points. Finally, you will learn to
configure Remote Desktop, which allows you to control a computer from a
remote location, and Remote Assistance, which allows a user to invite an
administrator or other expert user to provide help remotely.
Lessons in this Chapter:
■
Lesson 1: Working with Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-2
■
Lesson 2: Using Event Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-12
■
Lesson 3: Using Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-19
■
Lesson 4: Using System Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-25
■
Lesson 5: Using Remote Desktop and Remote Assitance . . . . . . . . . . . . . . . 18-32
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have
Microsoft Windows XP Professional installed on a computer on which you can make
changes.
18-1
18-2
Chapter 18
Using Windows XP Tools
Lesson 1: Working with Services
Services are programs or processes that start with Windows XP Professional and run in
the background, providing necessary functions to other programs and operating system components. Services start prior to user logon, so a service can begin providing its
functions without a user having to log on. Some services depend on other services,
meaning that the other services must be running first for the dependent service to run.
Windows XP Professional uses these dependencies to determine the order in which it
starts services. You can disable services temporarily or even prevent services from running when Windows starts up by using the System Configuration Utility and the Services console.
After this lesson, you will be able to
■ Manage services by using the Services console.
■ Disable and enable services by using the System Configuration Utility.
Estimated lesson time: 40 minutes
How to Manage Services by Using the Services Console
The Services console is the primary method for managing services on a computer running Windows XP Professional. You can access the Services console in the following
ways:
■
Open the Administrative Tools folder (from Control Panel) and double-click Services.
■
Open the Computer Management window, expand the Services And Applications
node, and then click Services.
■
Create a custom Microsoft Management Console (MMC) console and add the Services console.
No matter which way you open the Services console, shown in Figure 18-1, the interface is the same. In the right pane, you will see a long list of the available services
along with a description, the current status of the service (Stopped or Started), the
Startup Type (Automatic, Manual, or Disabled), and how the service logs on to the
computer.
When you select a service (such as the DNS Client service selected in Figure 18-1), you
are shown a detailed description that tells you what the service does. Some of these
descriptions also tell you what happens if you stop or disable the service.
Lesson 1
Working with Services
18-3
F18us01
Figure 18-1
fessional.
The Services console is the primary method for managing services in Windows XP Pro-
How to Stop, Start, Pause, Resume, and Restart a Service
After selecting a service in the Services console, you can control the service in the following ways:
Stop a service When you stop a service, the service becomes unavailable. The service does not restart until you start the service again or until the next time Windows starts up (if the service is configured to start automatically during startup).
The Services console does not let you stop a service on which other services
depend. You must stop services in the correct order of dependency. To stop a service, click the service, and then click the Stop button (or right-click the service,
and then click Stop).
Start a service You can start a service that you have stopped or a service that is
enabled, but for which the startup type is set to Manual. To start a service, click
the service, and then click the Start button (or right-click the service, and then
click Start).
Pause a service Only some services can be paused. When you pause a service, the
service refuses any new connections but does not disconnect existing connections
to the service. An example of such a service is the World Wide Web Publishing service, which is the component of Internet Information Services (IIS) that allows
users to connect to a Web site hosted on the local computer. When you pause this
service, IIS no longer allows users to connect to any local Web sites, but it does
not disconnect existing users from the Web site. Pausing a service allows you to
shut down a service gracefully, without interrupting users or other services. After
the users or services that are using a service stop using it, you can then stop the
18-4
Chapter 18
Using Windows XP Tools
service. To pause a service, click the service, and then click the Pause button (or
right-click the service, and then click Pause).
Resume a service When you pause a service, the Resume command lets you resume
the service without restarting it. To resume a paused service, click the service and
the click the Resume button (or right-click the service, and then click Resume).
Restart a service Restarting a service works just like stopping a service and then
starting it again. To restart a service, click the service, and then click the Restart
button (or right-click the service, and then click Restart). You might choose to
restart a service during troubleshooting or when you need to immediately apply
changed configuration settings.
How to Change the Startup Type of a Service
Aside from basic commands like starting and stopping a service, most configuration of
a service happens by using the service’s Properties dialog box. To open the Properties
dialog box for a service, right-click the service and click Properties. The General tab of
a service’s Properties dialog box (see Figure 18-2) shows you information about the
service, such as the service name, display name (what you see in the Services console),
description, and path to the executable file for the service.
F18us02
Figure 18-2
Use a service’s Properties dialog box to control advanced options for a service.
You can use the Startup Type drop-down list on the General tab to configure a service
for one of the following startup types:
Automatic
The service starts automatically during Windows startup.
Manual The service is enabled, but does not start automatically during Windows
startup. You must start the service by using the Services console or by using one
of the other methods described later in this lesson.
Lesson 1
Working with Services
18-5
Disabled The service does not start automatically during Windows startup. In addition, the service cannot be started manually or by another service or program. You
must set the service to the Automatic or Manual startup type before it can be
started. You should disable unnecessary services to prevent them from accidentally starting and potentially introducing a security vulnerability.
!
Exam Tip
When a service is disabled, you cannot start the service manually, and applications or other services cannot start the service programmatically. If you want a service not to
run automatically when Windows starts, but need the service to be able to be started, set the
service’s startup type to Manual.
How to Change the Logon Properties of a Service
To start prior to user logon and to be able to access the system resources needed to
perform its function, a service must be able to log on to a computer. Some services are
configured by default to log on to the Local System account, which is a powerful
account that has full access to a computer. Other services are configured to log on to
LocalService or NetworkService accounts, which are special built-in accounts that are
similar to authenticated user accounts. These accounts have the same level of access to
resources and objects as members of the Users groups. Using this more limited access
helps enhance security.
Most services running in Windows XP Professional log on using the Local System
account, though a few use the Network Service account. For the most part, you will
leave services configured to log on with the default account used for the service. If you
need to specify a different account, use the Log On tab of the service’s Properties dialog box, shown in Figure 18-3. Click This Account, and then type in the account name
and password.
F18us03
Figure 18-3
Use the Log On tab to specify the account under which a service logs on.
18-6
Chapter 18
Using Windows XP Tools
If you have more than one hardware profile configured on a computer (see Chapter 6,
“Installing, Managing, and Troubleshooting Hardware Devices and Drivers,” for more
on hardware profiles), you can also use the Log On tab to control whether a service is
enabled or disabled for a particular profile. Click a profile, and then click Enable or
Disable.
How to Change the Recovery Options for a Service
By default, when a service fails to start, Windows XP Professional records an error in
the System log file (see Lesson 2, “Using Event Viewer,” for more about this), but takes
no further action. Services that are dependent on the failed service also fail to start. You
can configure certain recovery actions to occur when a service fails to start, though.
To set up recovery actions to take place when a service fails, use these steps:
1. In the Services console, right-click the service, and then click Properties.
2. In the Properties dialog box for the service, click the Recovery tab.
The Recovery tab (see Figure 18-4) lets you configure an action to take on the first
failure, the second failure, and on all subsequent failures. The actions you can
configure include the following:
❑
Take No Action. This is the default choice.
❑
Restart The Service. Windows attempts to restart the service if the service
does not start.
❑
Run A Program. Windows runs a custom program, which you can use to log
error details or even send a notification of the failure. When you select this
action, the options in the Run Program section of the Recovery tab become
available. Type the path for the program and any command-line parameters
you want to use, and indicate whether you want Windows to add the fail
count (the number of times the service has failed) to the end of the command.
❑
Restart The Computer. Windows restarts the computer. This option provides a good last resort for recovery on important services. Often, a service
does not start because services on which it is dependent failed. You should
use this setting only on server computers. If a client computer automatically
restarted, it could disturb the user’s work.
3. Click OK.
!
Exam Tip
For the exam, remember the actions you can have Windows take should a service
fail: Take No Action, Restart The Service, Run A Program, and Restart The Computer. Typically,
you should have Windows attempt to restart the service on the first or second failure. You
should have Windows attempt to restart the computer only when a service fails that is vital to
the computer’s role and when restarting will not interfere with the desktop environment.
Lesson 1
Working with Services
18-7
F18us04
Figure 18-4 Use the Recovery tab to specify the action Windows takes when a service fails.
How to Determine Service Dependency
Many services depend on other services, which means that the other services must start
successfully for the services that depend on them to start. You can view the service
dependency of any service by using the Dependencies tab of the service’s Properties
dialog box, shown in Figure 18-5.
F18us05
Figure 18-5 Use the Dependencies tab to view services that a service depends on and that
depend on it.
The top list shows the services on which the current service depends. The bottom list
shows the services that depend on the current service. For the IIS Admin service (the
example shown in Figure 18-5), the service depends directly on the remote procedure
call (RPC) service and the Security Accounts Manager service (which itself depends on
the RPC service). The IIS Admin also has its own dependents: the Simple Mail Transfer
Protocol (SMTP) and World Wide Web Publishing services.
18-8
Chapter 18
Using Windows XP Tools
How to Disable and Enable Services by Using the System Configuration
Utility
The System Configuration Utility (which you can also use to control other startup
parameters) allows you to disable system services individually or several at a time.
To disable a service by using the System Configuration Utility, use these steps:
1. Click Start, and then click Run.
2. In the Run dialog box, type msconfig, and then click OK.
Windows displays the System Configuration Utility window. The Services tab,
shown in Figure 18-6, displays a list of services on the computer along with the
current status (Running, Stopped, or Paused) of each service.
3. To disable a service, clear the check box for the service. To enable a service, select
the check box for the service.
Windows displays the System Configuration dialog box, asking whether you want
to restart your computer.
4. Click OK. When prompted, click Restart.
When Windows restarts, the changes you have made take effect.
F18us06
Figure 18-6
Use the System Configuration Utility to enable or disable services.
Lesson 1
Working with Services
18-9
Note If you change any startup setting by using the System Configuration Utility, Windows
XP Professional prompts you to return to normal operations the next time you log on. A
prompt and the System Configuration Utility appear each time you log on until you restore the
original startup settings by clicking Normal Startup under Startup Selection on the General
tab or until you tell Windows to not show you the dialog box any more. To permanently change
a startup setting, use Control Panel, change a Group Policy setting, or uninstall the application that added the service.
Practice: Working with Services
In this practice, you will use the Services console to change, stop, and start a service.
You will also change the startup type for a service. You will then use the System Configuration Utility to enable a service.
Exercise 1: Stop and Start a Service
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools window, double-click Services.
5. In the Services window, click Error Reporting Service.
6. What is the description provided for the Error Reporting Service?
7. Click the Stop toolbar button.
8. What do you see in the Status column for the Error Reporting Service?
9. Click the Start toolbar button.
Leave the Services window open for the next exercise.
18-10
Chapter 18
Using Windows XP Tools
Exercise 2: Change the Startup Type of a Service
1. Right-click Error Reporting Service, and then click Properties.
2. In the Error Reporting Services Properties dialog box, on the General tab, on the
Startup Type drop-down list, click Disabled.
3. Click OK.
4. In the Services window, is the service enabled or disabled? Is the service stopped
or started?
5. Click Stop.
6. Close the Services window.
Exercise 3: Enable a Service with the System Configuration Utility
1. Click Start, and then click Run.
2. In the Run dialog box, type msconfig, and then click OK.
3. In the System Configuration Utility dialog box, on the Services tab, clear the check
box next to the Computer Browser service.
4. Click OK.
5. In the System Configuration dialog box, click Restart.
Windows restarts. After restarting, Windows displays the System Configuration
Utility dialog box, warning you that Windows is running in Selective or Diagnostic
mode.
6. Click OK.
7. On the Services tab, is the Computer Browser service stopped or started?
8. Select the check box next to the Computer Browser service, and then click OK.
9. In the System Configuration dialog box, click Restart.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
Lesson 1
Working with Services 18-11
1. What is a service?
2. What happens by default when a service fails? How can you change the default
behavior?
3. What two tools does Windows XP Professional provide for enabling and disabling
services?
Lesson Summary
■
The Services console allows you to perform basic commands on services such as
stopping, starting, pausing, resuming, and restarting services. You can also use the
Services console to configure options for services such as the startup type, the user
account under which the service logs on, and recovery options.
■
You can also use the System Configuration Utility to enable and disable services.
18-12
Chapter 18
Using Windows XP Tools
Lesson 2: Using Event Viewer
You use Event Viewer to perform a variety of tasks, including viewing the contents of
log files, finding specific events within log files, and viewing the audit logs that are
generated as a result of setting the audit policy and auditing events (which is covered
in Chapter 16, “Configuring Security Settings and Internet Options”).
After this lesson, you will be able to
■ Identify the Windows XP Professional logs.
■ View event logs by using Event Viewer.
■ View an event.
■ Locate events in a log.
■ Configure logging options.
■ Save and open logs.
Estimated lesson time: 30 minutes
Overview of Windows XP Professional Logs
You use Event Viewer to view information contained in Windows XP Professional logs.
By default, Event Viewer has three logs available to view, as described in Table 18-1.
Table 18-1
!
Logs Maintained by Windows XP Professional
Log
Description
Application log
Contains errors, warnings, or information that programs (such as a database
program or an e-mail program) generate. The program developer presets
which events to record.
Security log
Contains information about the success or failure of audited events. The
events that Windows XP Professional records are a result of your audit policy.
System log
Contains errors, warnings, and information that Windows XP Professional
generates. Windows XP Professional presets which events to record.
Exam Tip
For the exam, be sure you know that the three default logs in Windows XP Professional and the types of events recorded to each log.
How to View Event Logs by Using Event Viewer
To open Event Viewer and view a log, use these steps:
1. Click Start, and then click Control Panel.
Lesson 2
Using Event Viewer 18-13
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
4. In the Administrative Tools window, double-click Event Viewer.
5. In the left pane, click the log you want to view.
Windows displays the events in the log file in the right window, as shown in Figure 18-7.
F18us07
Figure 18-7 Use Event Viewer to view information contained in Windows XP Professional logs.
You will encounter five types of events in the logs you view in Event Viewer. A unique
icon identifies each event type so that you can easily distinguish between entries. The
five types of events you will encounter are as follows:
Error This type of entry, indicated by an icon with a red X, means that a significant
problem has occurred, such as a service that might not have started properly.
Warning This type of entry, indicated by an icon with a yellow exclamation point,
means that an event has occurred that is not currently detrimental to the system
but might indicate a possible future problem.
Information This type of entry, indicated by an icon with a blue “i,” means that a
successful operation has occurred. For example, a service starting successfully
might trigger this type of event.
Audit Success This type of entry, indicated by a key icon, means that an audited
security access attempt—for example, a successful logon to the system—was successful.
Audit Failure This type of entry, indicated by a lock icon, means that an audited
security access attempt—for example, a failed attempt to open an audited file or
directory—was not successful.
18-14
Chapter 18
Using Windows XP Tools
How to View an Event
Double-click any event in the right pane of Event Viewer to open the Event Properties
dialog box (see Figure 18-8), which shows a description of the event. The up and
down arrow buttons let you move through the events in the log without having to
close the Event Properties dialog box and then reopen it for each event you want to
view. The Copy button (showing the Copy icon) copies the information about the
event to the Windows Clipboard.
F18us08
Figure 18-8
Open an event’s Properties dialog box to see a description of the event.
The Event Properties dialog box contains the following information to help you identify an event:
Date and Time
Type
The date and time that the event occurred.
The type of event (Information, Warning, and so on).
User The user with which the event is associated. Many events do not have an associated user.
Computer
Source
The computer on which the event occurred.
The service that experienced the event.
Category The category associated with the event. Most events, particularly in the
System log, do not have categories. Some application developers specify a category for events that concern the application, so you will see some events in the
Application log that have an associated category. In the Security log, the category
indicates the type of event that was audited.
Lesson 2
Using Event Viewer 18-15
Event ID The Event ID number associated with the event. Microsoft keeps track of
Event IDs and often makes solutions to problems available in the Microsoft
Knowledge Base. To find out more about an event, use the Event ID as a keyword
search in the Knowledge Base.
Description A description of the event. The description often includes information on other services affected by the event and a link for finding out more
information.
How to Locate Events In a Log
When you first start Event Viewer, it automatically displays all events that are recorded
in the selected log. Because many events occur on a computer running Windows XP
Professional, the number of events displayed can make it difficult to find the events
you are looking for. To change what appears in the log, you can locate selected events
by using the Filter command. You can also search for specific events by using the Find
command.
To filter or find events, start Event Viewer, and then on the View menu, click Filter or
click Find. The options provided by Filter and Find are almost identical. Figure 18-9
shows the options available on the Filter tab.
F18us09
Figure 18-9
You can apply a filter to make it easier to locate certain types of events.
Table 18-2 describes the options for using the Filter tab to filter events and the Find
command to find events.
18-16
Chapter 18
Using Windows XP Tools
Table 18-2
Options for Filtering and Finding Events
Option
Description
Event Types
The types of events to view
Event Source
The software or component driver that logged the event
Category
The type of event, such as a logon or logoff attempt or a system event
Event ID
An event number to identify the event. This number helps product support representatives track events.
User
A user logon name
Computer
A computer name
From And To
The date ranges for which to view events (Filter dialog box only)
Restore Defaults
Clears any changes in this tab and restores all defaults
Description
The text that is in the description of the event (Find dialog box only)
Search Direction
The direction (up or down) in which to search the log (Find dialog box
only)
Find Next
Finds and displays the next occurrence defined by the Find Settings (Find
dialog box only)
Logging Options
You can configure the properties of each individual log. To configure the settings for
logs, right-click the log in Event Viewer, and then click Properties to display the Properties dialog box for the log.
Use the Properties dialog box for each type of audit log to control the following:
■
The maximum size of each log, which can be from 64 KB to 4,194,240 KB (4 GB).
The default size is 512 KB.
■
The action that Windows XP Professional takes when the log fills up. To control
this action, click one of the options described in Table 18-3.
Table 18-3
Options for Handling Full Audit Log Files
Option
Description
Overwrite Events As
Needed
You might lose information if the log becomes full before you archive
it. However, this setting requires no maintenance.
Overwrite Events Older You might lose information if the log becomes full before you archive
Than X Days
it, but Windows XP Professional will lose only information that is at
least x days old. Enter the number of days for this option. The default
is seven days.
Do Not Overwrite
Events
This option requires you to clear the log manually. When the log
becomes full, Windows XP Professional will stop, but no security log
entries will be overwritten.
Lesson 2
Using Event Viewer 18-17
How to Save and Open Logs
Saving logs allows you to maintain a history of events. Many companies have policies
on archiving logs for a specified period—especially auditing-related events in the Security log.
To work with a log, right-click the log you want to configure in Event Viewer, and then
click one of the options described in Table 18-4.
Table 18-4
Options to Archive, Clear, or View a Log File
To
Do this
Save the log
Click Save Log File As, and then type a filename.
Clear the log
Click Clear All Events to clear the log. Windows XP Professional creates
a security log entry, stating that the log was cleared.
Open a saved log
Click Open Log File.
Open a new log
view
Click New Log View to create a second view of the selected log. By
default, this view is named the same as the original view with a copy
number appended in parentheses. For example, if you create a new
view of the System log, the default name for the new view is System
(2). Right-click the new view and click Rename to change the name.
You can use different views to look at log files filtered different ways
or to open saved logs.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. What are the three Windows XP Professional logs you can view with Event
Viewer, and what is the purpose of each log?
18-18
Chapter 18
Using Windows XP Tools
2. The two ways that Event Viewer provides for locating specific events are the
_____________ command and the _____________ command. What does each of
the commands allow you to do?
3. The size of each log can be from ____ KB to ____ GB, and the default size is ____
KB.
4. If you select the Do Not Overwrite Events option, what happens when the log
becomes full?
Lesson Summary
■
Windows XP Professional has the following three logs by default: the application
log, the security log, and the system log.
■
You use Event Viewer to view the contents of the Windows XP Professional logs.
■
Viewing the Event Properties dialog box shows you the date and time the event
occurred, the user and service associated with the event, an Event ID that you can
use to find more information about the event, and a detailed description of the
event.
■
You can use the Filter and Find commands in Event Viewer to easily locate specific
events or types of events.
■
For each log in Windows XP Professional, you can control the maximum size the
log is allowed to reach and the action that Windows XP Professional takes when
the log fills up.
■
You can archive the Windows XP logs so that you keep an historical record of
events and track trends over time.
Lesson 3
Using Scheduled Tasks 18-19
Lesson 3: Using Scheduled Tasks
Use Scheduled Tasks to identify programs and batch files you want to run once, at
regular intervals, or at specific times. You can schedule any script, program, or document to start at a specified time and interval, or when certain operating system events
occur. This feature can complete many administrative tasks for you.
After this lesson, you will be able to
■ Identify tasks that you can schedule.
■ Schedule a task.
■ Configure advanced options for a scheduled task.
■ Troubleshoot scheduled tasks.
Estimated lesson time: 25 minutes
Overview of Scheduled Tasks
Windows XP Professional saves scheduled tasks in the Scheduled Tasks folder (see Figure 18-10), which you can access through the Control Panel under Performance And
Maintenance. In addition, you can access Scheduled Tasks on another computer by
browsing that computer’s resources using My Network Places, which allows you to
move tasks from one computer to another. For example, you can create task files for
maintenance, and then add them to a user’s computer as needed.
F18us10
Figure 18-10
Schedule a task to run when you need it to.
Use Scheduled Tasks to perform the following tasks:
18-20
Chapter 18
Using Windows XP Tools
■
Run maintenance programs at specific intervals.
■
Run programs at a time when there is less demand for computer resources.
How to Schedule a Task
Use the Scheduled Task Wizard to schedule tasks. You access the wizard in the Scheduled Tasks folder by double-clicking Add Scheduled Task. Table 18-5 describes the
options that you can configure in the Scheduled Task Wizard.
Table 18-5
Scheduled Task Wizard Options
Option
Description
Application
The applications to schedule. Select from a list of applications that are
registered with Windows XP Professional, or click Browse to specify any
program or batch file.
Name
A descriptive name for the task.
Perform This Task
How often Windows XP Professional will perform the task. You can
select Daily, Weekly, Monthly, One Time Only, When My Computer
Starts, or When I Log On.
Start Time
The start time for the task to occur.
Start Date
The start date for the task.
User Name And
Password
A user name and password. You can enter your user name and password or another user name and password to have the application run
under the security settings for that user account. If the user account that
you used to log on does not have the rights required by the scheduled
task, you can use another user account that does have the required
rights. For example, you can run a scheduled backup by using a user
account that has the required rights to back up data but does not have
other administrative privileges.
Advanced Properties
Select this check box if you want the wizard to display the Advanced
Properties dialog box so that you can configure additional properties
after you click Finish. Advanced Properties are covered in the next section.
How to Configure Advanced Options for a Scheduled Task
In addition to the options that are available in the Scheduled Task Wizard, you can set
several additional options for tasks. You can change options that you set with the
Scheduled Task Wizard or set additional advanced options by configuring advanced
properties for the task.
Lesson 3
Using Scheduled Tasks 18-21
Table 18-6 describes the tabs in the Advanced Properties dialog box for the scheduled
task.
Table 18-6
Scheduled Task Wizard Advanced Options
Tab
Description
Task
Change the scheduled task or change the user account that is used to run the task.
You can also turn the task on and off.
Schedule
Set and display multiple schedules for the same task. You can set the date, time,
and number of repeat occurrences for the task. For example, you can set up a task
to run every Friday at 10:00 p.m.
Settings
Set options that affect when a task starts or stops, such as how long a backup can
take, if the computer can be in use, or if the computer can be running on batteries
when it runs the task.
Security
Change the list of users and groups that have permission to perform the task, or
change the permissions for a specific user or group. This tab is available only if
you have simple file sharing disabled.
How to Troubleshoot Scheduled Tasks
In general, troubleshooting the Scheduled Tasks involves checking the parameters that
you have set up. In the Scheduled Tasks window, switch the view to Details view. Two
columns, Status and Last Result, are useful in determining whether a task was successful or not.
The Advanced menu provides a few options to help you with troubleshooting. When
you open Scheduled Tasks and click Advanced, the first option on the Advanced menu
allows you to stop and start the Task Scheduler Service, and the selection is either Stop
Using Task Scheduler or Start Using Task Scheduler. If your scheduled tasks are not
starting, you can check this option to be sure that the Task Scheduler Service is running; if it is not, you can start it. The second option is similar to the first, only it pauses
and continues the service. If the service is paused, scheduled tasks do not start.
The third option on the Advanced menu, Notify Me Of Missed Tasks, causes the system
to send you a message when a scheduled task does not occur. The next option on the
Advanced menu is the AT Service Account, which allows you to change the account
being used from the System account. The next option, View Log, allows you to view a
log of when the Task Scheduler Service started, stopped, paused, and continued. It also
logs the name of each scheduled task, the application or task that started, and the time
and date the task was started. The final option, View Hidden Tasks, allows you to view
tasks created by Windows and applications that hide the tasks by default.
18-22
Chapter 18
Using Windows XP Tools
Practice: Using Task Scheduler
In this practice, you schedule Address Book to start at a predetermined time. You can
use this as a reminder to review address information. You also configure Task Scheduler options.
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Scheduled Tasks.
Windows XP Professional opens the Scheduled Tasks folder.
4. Double-click Add Scheduled Task.
The Scheduled Task Wizard appears.
5. Click Next.
Windows XP Professional displays a list of currently installed programs. To schedule a program that is not registered with Windows XP Professional, click Browse
to locate the program.
6. Click Browse.
Windows XP Professional displays the Select Program To Schedule dialog box.
7. Double-click Program Files, and then double-click Windows NT.
8. Double-click Accessories, and then double-click WordPad.
9. Type Launch WordPad in the Type A Name For This Task text box.
The Type A Name For This Task text box allows you to enter a description that is
more intuitive than the program name. Windows XP Professional displays this
name in the Scheduled Tasks folder when you finish the wizard.
10. Click One Time Only, and then click Next.
11. In the Start Time box, set the time to 4 minutes after the current system time and
make a note of this time.
To confirm the current system time, look at the Windows taskbar. Do not change
the entry in the Start Date text box.
12. Click Next.
The wizard requires you to enter the name and password of a user account. When
Task Scheduler runs the scheduled task, the program receives all the rights and
permissions of the user account that you enter here. The program is also bound by
any restrictions on the user account. Notice that the user name you are currently
using is already filled in as the default. You must type the correct password for the
user account in both password boxes before you can continue.
18-23
You will schedule the console to run with your administrative privileges.
13. In both the Enter The Password text box and the Confirm Password text box, type
your password.
14. Click Next.
Do not select the Open Advanced Properties For This Task When I Click Finish
check box. You will review the Advanced properties in the next procedure.
15. Click Finish.
Notice that the wizard added the task to the list of scheduled tasks.
Note
The account that will run the task must have the Log On As A Batch Job user right in
order to run a scheduled task. This right is normally added automatically when you create a
scheduled task. If it is not, you should add the right to that account. See Chapter 16 for more
information on user rights.
16. To confirm that you scheduled the task successfully, wait for the time that you
configured in Step 11, and WordPad will start.
17. Close WordPad.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. How can Scheduled Tasks help you monitor, manage, and maintain network
resources?
2. Which of the following are valid choices for the frequency with which Scheduled
Tasks schedules programs to run? (Choose all that apply.)
a. Daily
b. One time only
c. When the computer shuts down
d. When a user logs off
18-24
Chapter 18
Using Windows XP Tools
3. Why do you have to assign a user account and password for each task that you
schedule using the Scheduled Task Wizard?
4. If none of your scheduled tasks is starting, what is one thing that you need to
check?
Lesson Summary
■
You can use Scheduled Tasks to schedule programs and batch files to run once, at
regular intervals, at specific times, or when certain operating system events occur.
■
Windows XP Professional saves scheduled tasks in the Scheduled Tasks folder,
which can be accessed through Performance And Maintenance in Control Panel.
■
After you have scheduled a task to run, you can still modify any of the options or
advanced features for the task, including the program to be run.
■
You can access Scheduled Tasks on another computer by browsing that computer’s resources using My Network Places, so you can move tasks from one computer to another.
Lesson 4
Using System Restore 18-25
Lesson 4: Using System Restore
System Restore is a feature that monitors changes to certain system and application
files. System Restore functions like an “undo” feature for Windows XP Professional
configuration changes, allowing you to recover from problems caused by incorrect system settings, faulty drivers, and incompatible applications. Windows XP Professional
creates restore points automatically, and you can also create a restore point manually.
After this lesson, you will be able to
■ Explain System Restore.
■ Enable or disable System Restore.
■ Create a restore point.
■ Restore a restore point.
Estimated lesson time: 30 minutes
Overview of System Restore
System Restore works by creating restore points that contain a snapshot of the Registry (which includes user account, application, and hardware configuration) and a
copy of certain system files that Windows XP Professional requires for startup, including those in the %systemroot% directory and boot files on the system partition. You can
restore your computer to a particular restore point at any time.
By default, System Restore creates restore points when the following events occur:
■
Every 24 hours if the computer is turned on or if it has been 24 hours since the
computer was last turned on
■
When you install an unsigned device driver
■
When System Restore–compliant applications are installed
■
When updates are installed through Automatic Updates or Windows Update
■
When you restore data from backup media using Windows Backup
■
When you restore a restore point
■
When certain system or application files are changed
■
When you create a restore point manually
System Restore also monitors file operations for a core set of system and application
files. These files are specified in %systemroot%\System32\Restore\Filelist.xml. System
Restore records changes to these file and sometimes copies them to a hidden archive
before allowing the files to be overwritten, deleted, or changed.
18-26
Chapter 18
Using Windows XP Tools
System Restore does not monitor the following files and folders:
■
The virtual memory paging file
■
Personal user data, such as files in My Documents, Favorites, Recycle Bin, Temporary Internet Files, History, and Temp folders
■
Image and graphics files, such as those with .bmp, .jpg, and .eps extensions
■
Application data files with extensions not listed in systemroot\System32\Restore\
Filelist.xml, such as .doc, .xls, .mdb, and .pst
Restore point information is saved to a hidden folder on the volume in which a monitored file is located. The archive collects multiple restore points, each representing
individual system states. The files, Registry snapshots, and logs associated with older
restore points are purged on a first in, first out (FIFO) basis, optimizing System Restore
disk space and making room for new restore points.
Real World Changing System Restore Options in the
Windows Registry
In most situations, the default System Restore operation is satisfactory. However,
there might be situations in which you need to change how System Restore functions. There are four settings that you can change in the Windows Registry that
affect the intervals System Restore uses when creating automatic restore points
and the disk space it uses.
Each of these settings is located in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore subkey. These settings include the following:
■
RPSessionInterval This setting specifies the intervals, in seconds,
between scheduled restore-point creations during an active user session. The
default value is 0 seconds (disabled).
■
RPGlobalInterval This setting specifies the time interval, in seconds, at
which scheduled restore points are created (regardless of whether or not
there is an active user session). The default value is 86,400 seconds (24
hours).
■
RPLifeInterval This setting specifies the time interval, in seconds, for
which restore points are kept. System Restore deletes restore points older
than the specified value. The default value is 7,776,000 seconds (90 days).
■
DiskPercent This setting specifies the maximum amount of disk space on
each drive that System Restore can use. This value is specified as a percentage of the total drive space. The default value is 12 percent.
Lesson 4
!
Using System Restore 18-27
Exam Tip
Restoring to a restore point affects the Windows Registry and certain system
and application files. The restoration does not affect user-created documents and data.
Restoring to a restore point provides a safe means to reset the Windows configuration to an
earlier time.
How to Enable or Disable System Restore
System Restore is enabled by default in Windows XP Professional to monitor all drives
on the computer. You can disable System Restore entirely or you can disable it on any
particular drive. The one exception to this is that you cannot disable System Restore on
the system drive without disabling it on all drives.
To turn off System Restore for all drives, use these steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click System.
4. In the System Properties dialog box, on the System Restore tab (see Figure 18-11),
select the Turn Off System Restore On All Drives check box.
F18us11
Figure 18-11 Turn off System Restore for all drives.
To turn off System Restore for a particular drive or to change the disk space that System
Restore uses for a drive, use these steps:
1. In the System Properties dialog box, on the System Restore tab, in the Available
Drives list, click the drive you want to configure, and then click Settings.
18-28
Chapter 18
Using Windows XP Tools
2. In the Settings dialog box for the drive, check the Turn Off System Restore On
This Drive check box to disable file monitoring for that drive.
3. Use the Disk Space To Use slider to control how much disk space System Restore
uses to save restore points on the drive.
4. Click OK.
How to Create a Restore Point
System Restore creates restore points automatically based on criteria you learned about
earlier in this lesson. However, you should create a restore point manually if you are
about to perform any major action, such as installing or removing an application,
installing a new hardware device, or troubleshooting a problem.
To create a restore point, use these steps:
1. Click Start, point to All Programs, point to Accessories, point to System Tools, and
then click System Restore.
Windows displays the System Restore window, as shown in Figure 8-12.
2. Click Create A Restore Point, and then click Next.
3. In the Restore Point Description text box, type a name that describes the restore
point, and then click Create.
4. Click Close.
F18us12
Figure 18-12
Create a restore point before making any major changes.
Lesson 4
Using System Restore 18-29
How to Restore a Restore Point
If you experience a problem in Windows, you can often solve that problem by restoring to an earlier restore point. You can also restore to a restore point to undo configuration changes that a user might not remember the details of. For example, if a user
installs incompatible software that causes problems or makes changes to the Windows
configuration, you can restore to a restore point created before the problem occurred.
To restore a restore point, use these steps:
1. Click Start, point to All Programs, point to Accessories, point to System Tools, and
then click System Restore.
2. Click Restore My Computer To An Earlier Time, and then click Next.
Windows displays the Select A Restore Point page (see Figure 8-13), which presents a simple, calendar-based way to browse available restore points. Dates in
bold represent days when a restore point was created.
3. Click any date that is listed in bold, and then click a restore point on that day.
F18us13
Figure 18-13 Browse available restore points by date.
4. Click Next to continue.
Windows displays the Confirm Restore Point Selection page, which warns you that
the computer will be shut down during the restoration process.
18-30
Chapter 18
Using Windows XP Tools
5. Click Next.
Windows closes all open programs and logs off all users. Windows then restores
the restore point and restarts.
6. Log on to Windows .
After you log on, Windows displays the Restoration Complete page.
7. Click OK.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. When does System Restore create restore points automatically?
2. Will System Restore recover a document that you accidentally delete from the My
Documents folder?
3. How can you prevent System Restore from monitoring particular drives?
Lesson 4
Using System Restore 18-31
Lesson Summary
■
System Restore works by creating restore points that contain a snapshot of the
Registry (which includes user account, application, and hardware configuration)
and a copy of certain system files that Windows XP Professional requires for startup. System Restore creates restore points automatically when certain events
occur, and you can also create restore points manually.
■
System Restore is enabled by default in Windows XP Professional to monitor all
drives on the computer. You can disable System Restore entirely or you can disable it on any particular drive. You cannot disable System Restore on the system
drive without disabling it on all drives.
■
You should create a restore point manually if you are about to perform any major
action, such as installing or removing an application, installing a new hardware
device, or troubleshooting a problem.
■
Windows provides access to restore points in a convenient date-based display.
When you restore to a restore point, Windows must restart so that it can apply
configuration changes.
18-32
Chapter 18
Using Windows XP Tools
Lesson 5: Using Remote Desktop and Remote Assistance
Remote Assistance and Remote Desktop are both Windows XP Professional features
that allow remote access to a computer. Remote Desktop provides a user with a way to
control a computer running Windows XP Professional from a remote location. Remote
Assistance allows a user to invite an expert user in a remote location to assist with
problems.
After this lesson, you will be able to
■ Configure and use Remote Desktop.
■ Configure and use Remote Assistance.
Estimated lesson time: 30 minutes
How to Configure and Use Remote Desktop
Remote Desktop is designed to allow users to remotely gain access to a Windows XP
Professional desktop from another computer on the network. After connecting to the
remote desktop, a user sees the remote desktop in a window and can access files, folders, and applications on the remote computer. After a connection is established, the
local desktop is locked for security reasons, preventing anyone from viewing the tasks
that are being performed remotely.
Remote Desktop is designed to allow a user to have full control over a Windows XP
Professional desktop from another computer on the network or even from the Internet.
This is useful when a user is working from home, another office, or another site and
requires access to information or programs on a primary office computer. While a user
is remotely accessing a computer, local access by another user is not permitted. An
exception to this is an administrator; administrators are permitted to log on locally
while another user is connected remotely, but the remote session is then terminated.
When you are connected to a computer via Remote Desktop, many of the resources on
the host computer are available on the client computer. These resources include the
following:
File System While you are connected to the remote host, the file system on the client
computer can be made available. If you open My Computer on the host computer,
you will see the hard drives for the client computer. This feature allows you to
copy information between the host and client computer.
Audio Audio generated on the host computer plays through the client computer’s
sound system.
Lesson 5
Port
Using Remote Desktop and Remote Assistance 18-33
The applications running within the session can have access to the ports on the
client computer, which allows them to access and manipulate printers, scanners,
and other peripheral devices.
Printer The default local or network printer for the client computer becomes the
default printing device for the Remote Desktop session. You print a document on
the host computer to the printer connected to the client.
Clipboard The Remote Desktop host and the client computer share a Clipboard,
which allows data to be copied between applications running on the remote computer and applications running on the client computer.
Remote Desktop Requirements
Remote Desktop requires the following:
■
A remote computer that is running Windows XP Professional and that is connected
to a local area network (LAN) or the Internet. This is the computer to which you
want to gain access remotely.
■
A client computer with access to the host computer through a LAN, dial-up, or virtual private network (VPN) connection that has the Remote Desktop Connection
program or the Terminal Services Client installed. A version of the Remote Desktop Connection program is available for most versions of Windows. Just insert the
Windows XP Professional installation CD-ROM on the client computer and select
the option to install the Remote Desktop Connection software.
■
A user account with appropriate permissions. The user must be an administrator
or a member of the Remote Users group, and have a password.
How to Configure a Computer to Accept Remote Desktop Connections
Remote Desktop configuration is a two-part process. First, you must configure the host
computer to allow Remote Desktop connections. Then, you must configure the client
computer with the Remote Desktop Connection client software.
To configure a computer running Windows XP Professional to allow Remote Desktop
connections, follow these steps:
1. From the Start menu (or from the desktop or in Windows Explorer), right-click My
Computer and select Properties.
2. On the Remote tab, in the Remote Desktop section, select Allow Users To Connect
Remotely To This Computer, as shown in Figure 18-14.
18-34
Chapter 18
Using Windows XP Tools
F18us14
Figure 18-14
Enable Remote Desktop on a computer running Windows XP Professional.
3. If the user account to be used to connect remotely is not a member of the Administrators group, click Select Remote Users, add the appropriate user account, and
then click OK.
4. Click OK again.
Verify that the user account to be used to connect remotely has a password assigned.
User accounts used for remote connections must have passwords.
Note
If you are using Windows Firewall, you must configure it to allow Remote Desktop connections. If you are using another software firewall, or if there is a hardware firewall on your
network, you must enable inbound connections on TCP port 3389 to support Remote Desktop
connections. You can also change the port on which Remote Desktop accepts connections. For
more information on changing this port number, read the Knowledge Base article, “How to
change the listening port for Remote Desktop,” available at http://support.microsoft.com/
kb/306759.
How to Connect to a Remote Computer
After a computer running Windows XP Professional is configured to allow Remote
Desktop connections, you can connect to that computer by using the Remote Desktop
Connection client software on another computer. From the Start menu, select All Programs, then Accessories, then Communications, and then Remote Desktop Connection.
In the Remote Desktop Connection dialog box, click the Options button to display
Lesson 5
Using Remote Desktop and Remote Assistance 18-35
configurable options, as shown in Figure 18-15. The only information that you must
enter to establish a connection is the name or IP address of the computer. Other configurable options include the following:
■
General options, including the user name, password, and domain name used for
authentication and the ability to save connection settings
■
Display options, including the configuration of the size of the remote connection
display (all the way up to full screen) and color settings
■
Local Resources options, including sound and keyboard configuration, and which
local devices to connect to when logged on the remote computer
■
Programs options, which provide the ability to automatically launch a program
when a connection is established
■
Experience options, which allow the configuration of the connection speed to
optimize performance, and provide the ability to control the display of the desktop background, themes, menu and windows animation, and other items that can
affect performance
F18us15
Figure 18-15 Configure options for connecting to a remote computer.
To use the Remote Desktop Connections client, use these steps:
1. From the Start menu, select All Programs, then Accessories, then Communications,
and then Remote Desktop Connection.
2. In the Remote Desktop Connection dialog box, depicted in Figure 18-16, enter the
name or IP address of the remote computer and click Connect.
18-36
Chapter 18
Using Windows XP Tools
F18us16
Figure 18-16
Establish a Remote Desktop session.
3. When prompted, enter the appropriate user account and password, and then click
OK.
4. If another user is currently logged on to the remote system, a Logon Message dialog box appears, indicating that in order to continue, that user must be logged off
and any unsaved data will be lost. If this occurs, click Yes to continue.
5. The Remote Desktop session is established. Figure 18-17 displays a remote connection window.
F18us17
Figure 18-17
After connecting, you have complete control of the remote computer.
Key Combinations
After connecting to a remote desktop, you have complete control of the remote computer. However, there are certain key combinations that still affect the client computer
instead of the host computer. For example, when you press CTRL+ALT+DELETE during a
Remote Desktop session, either Task Manager or the Windows Security dialog box for
the client computer appears—not for the host computer. There are key combinations
Lesson 5
Using Remote Desktop and Remote Assistance 18-37
you can use on the client computer to simulate special key combinations on the host
computer. Table 18-7 describes the key combinations in a Remote Desktop Session.
Table 18-7
Key Combinations in Remote Desktop
Windows Key
Combination
Equivalent Key
Combination In Remote
Desktop
ALT+TAB
ALT+PAGE UP
Switches between programs from left to
right.
ALT+SHIFT+TAB
ALT+PAGE DOWN
Switches between programs from right to
left.
ALT+ESC
ALT+INSERT
Cycles through the programs in the order
they were started.
CTRL+ESC
ALT+HOME
Displays the Windows menu.
ALT+PRTSCN
CTRL+ALT+MINUS (–) symbol Places a snapshot of the active window in
the Remote Desktop session on the Clipon the numeric keypad
board.
PRTSCN
CTRL+ALT+PLUS (+) symbol
on the numeric keypad
Places a snapshot of the entire Remote
Desktop session window on the Clipboard.
CTRL+ALT+DEL
CTRL+ALT+END
Displays the Task Manager or Windows
Security dialog box.
Description
How to End a Remote Session
There are two ways to end a remote session:
■
Log off from the remote computer normally, which closes all programs, logs the
user off, and then closes the Remote Desktop connection.
■
Disconnect by either closing the Remote Desktop window or selecting Disconnect
from the Start menu. Disconnecting leaves the user logged on at the remote computer, and all programs continue processing. The user will be reconnected to the
same session the next time the user connects.
How to Configure and Use Remote Assistance
The Remote Assistance feature allows a user to request help from an expert user.
Unlike with Remote Desktop, in Remote Assistance, the user needing help must issue
an invitation to the other user and the other user must accept the invitation. After the
connection is established, the expert user can take shared control of the user’s desktop,
chat with the user, and send and receive files. Taking shared control of the desktop
requires the user’s permission. Remote Assistance can minimize or eliminate the need
to physically visit a remote computer to solve a problem.
18-38
Chapter 18
Using Windows XP Tools
How to Establish a Remote Assistance Session
A Remote Assistance session requires that both the user needing help and the expert
user actively participate in establishing the connection. The session is established in the
following phases:
1. The user that needs help sends a Remote Assistance invitation to the expert user.
2. The expert user responds to the invitation.
3. The user accepts the expert user’s assistance.
To send a Remote Assistance invitation, use these steps:
1. From the Start menu, select Help And Support.
2. In the Help And Support Center, under Ask For Assistance, select Invite A Friend
To Connect To Your Computer With Remote Assistance, and then select Invite
Someone To Help You.
3. Select the method that you want to use to create the invitation, as shown in Figure
18-18. You can send invitations directly by using Windows Messenger, by using an
e-mail attachment, or by saving an invitation file and transmitting it to the helper
user (for example, you could save the file to a shared folder on the network).
F18us18
Figure 18-18
Choose the method to create an invitation.
4. When prompted, enter the requested information, including your name, a message, when the invitation should expire, and (optionally) a password to be used to
establish the connection.
5. Click Send Invitation.
Lesson 5
Using Remote Desktop and Remote Assistance 18-39
Note When an invitation is sent through an e-mail attachment or saved as a file, the file
has a .MsRcIndicent extension.
An expert user must respond to an invitation to continue the process. If the invitation
is by using Windows Messenger, you must accept the invitation that is presented in the
Messenger pop-up window. If the invitation is sent by e-mail, you must open the
attached invitation. If the invitation file is transmitted in some other fashion, you must
access and open it. If a password is required, you must enter the password in the
Remote Assistance dialog box.
Tip
Using Windows Messenger to establish a Remote Assistance connection is the easiest method because the Windows Messenger connection can usually be established
regardless of whether there are firewalls on either the user’s or the expert helper’s network.
If you use another method of establishing a Remote Assistance session, you must configure a firewall to allow the connection. Like Remote Desktop, Remote Assistance uses TCP
port 3389 by default.
Windows then notifies the user requiring assistance that the request has been accepted.
The user must click Yes in the Remote Assistance dialog box as a final indication of
acceptance, and Remote Assistance then establishes the connection.
Remote Assistance Console
After the Remote Assistance connection is established, the user needing help sees a
User Console, and the expert user sees a Helper Console. The User Console has the following functionality:
Chat History and Message Entry windows
Used for online chatting.
Connection Status window Displays the helper who has connected and the connection’s capabilities (Screen View Only or In Control),
Stop Control (ESC) Permits the user to regain control if the expert user has taken
control (this can also be accomplished by pressing the ESC key).
Send A File Sends a file from the user’s computer or a network share to the helper’s
computer.
Start Talking
Settings
Enables the user to adjust sound quality.
Disconnect
Help
Enables voice communication on computers with voice capabilities.
Ends the Remote Assistance connection.
Provides access to Remote Assistance help features.
18-40
Chapter 18
Using Windows XP Tools
The Helper Console also provides Chat History and Message Entry windows for online
chatting. The user’s desktop is displayed on the right side of the display. The controls for
the Helper Console are found across the top of the screen and include the following:
Take Control/Release Control Sends a request to the user to take shared control of
the user’s desktop. The user must accept the request and can cancel it at any time
by clicking Disconnect on the User Console or by pressing ESC.
Send A File Sends a file from the helper’s computer or a network share to the user’s
computer.
Start Talking
Settings
Enables the user to adjust sound quality and console size.
Disconnect
Help
Enables voice communication on computers with voice capabilities.
Ends the Remote Assistance connection.
Provides access to Remote Assistance help features.
How to Take Shared Control of the User’s Computer
To take shared control, the expert user sends a request to the user by clicking Take
Control. The user must accept the request and can cancel it at any time by clicking Disconnect on the User Console or by pressing ESC.
When the expert user establishes shared control of the user’s system, the expert user
can fully manipulate the computer, including loading and unloading drivers, starting
applications, and viewing event logs. However, the expert user cannot copy files from
the user’s hard disk. The only way for the expert user to get a file from the user’s computer is for the user to send it.
When shared control is established, both users can manipulate the mouse and keyboard simultaneously, so consider using the chat or voice communication functions to
coordinate input device usage and minimize overlap. Also, the expert user must be
careful not to do anything that might affect the network connection, or else the Remote
Assistance connection might be disconnected.
Lesson Review
The following questions are intended to reinforce key information presented in this
lesson. If you are unable to answer a question, review the lesson materials and try the
question again. You can find answers to the questions in the “Questions and Answers”
section at the end of this chapter.
1. What are the requirements for running Remote Desktop?
Case Scenario Exercise 18-41
2. How can you install the Remote Desktop Connection software on computers that
are not running Windows XP Professional?
3. What is the difference between Remote Desktop and Remote Assistance?
Lesson Summary
■
Remote Desktop allows users that are members of the Administrators or Remote
Users groups to remotely gain access to a computer running Windows XP Professional. After a connection is established, the local desktop is locked for security
reasons, preventing anyone from viewing the tasks that are being performed
remotely.
■
In Remote Assistance, the user needing help must issue an invitation to the other
user, and the other user must accept the invitation. After the connection is established, the expert user can take shared control of the user’s desktop, chat with the
user, and send and receive files.
Case Scenario Exercise
In this exercise, you will read a scenario about using Windows XP tools, and then
answer the questions that follow. If you have difficulty completing this work, review
the material in this chapter before beginning the next chapter. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
Scenario
You are working as an administrator for a company named Alpine Ski House, which
owns a series of ski resorts in the Midwest. You work in the company headquarters in
Boulder, Colorado. You are working with Ken, a supervising manager of a resort in
18-42
Chapter 18
Using Windows XP Tools
Jackson Hole, Wyoming. Ken has recently installed a non-Microsoft backup program
on his computer running Windows XP Professional and is having some problems. He
says that during the installation of the program, he was asked whether he wanted to
install the backup program as a service or as a command-line utility. Not knowing what
to choose, he installed the program as a service. Now, whenever he starts his computer, he gets an error message stating that one or more services failed to start. When
he tries to run the new backup program, he receives an error message, and the program does not start. Ken wants to use the backup program because it is supposed to
back up files to backup media in their original folder and file format, instead of backing up to a single proprietary-format file. This makes it easier for Ken to locate files in
the backup location and restore them.
Questions
1. Ken is not an expert user and he wants you to help him solve his problem. He
would also like to watch while you help him. What feature could you use to help
Ken remotely while he watches?
2. After connecting to Ken’s computer, you want to determine what service or services are failing to start. How would you do this?
3. You have determined that only one service is failing to start, and that service is
related to Ken’s backup program. You decide to use the Add/Remove Programs
utility to remove the backup program from Ken’s computer. After removing the
program, Windows displays a message stating that some parts of the program
could not be installed because they are running and that it needs to you restart the
computer to finish the removal. When the computer restarts, you still see the error
message stating that a service has failed to load, and the program is still listed in
the Add/Remove Programs dialog box as being installed. What should you do?
4. After taking care of the service, you use Add/Remove Programs again to try to
uninstall the program. However, the Add/Remove Programs utility tells you that
the uninstallation file could not be found and that the removal process cannot
continue. You suspect that during the previous removal attempt, the uninstallation
Troubleshooting Lab 18-43
file was deleted. You decide that you need to restore Ken’s computer to a configuration from before he installed the program. How can you do this?
5. You have managed to restore Ken’s computer to a previous configuration. You no
longer receive error messages about services not starting and are satisfied that the
program has been removed from the computer. However, Ken still wants to use the
backup program. After researching the program, you find that Ken was right about
being able to install it as a command-line utility. When you perform this type of
installation, no service is installed. You install Ken’s program in this fashion. Ken is
not familiar with using the command prompt, though, and wants to have the program back up his computer automatically each night. How can you set this up?
Troubleshooting Lab
In this troubleshooting lab, you will read a scenario and answer questions. If you have
difficulty completing this work, review the material in this chapter before beginning
the next chapter. You can find answers to these questions in the “Questions and
Answers” section at the end of this chapter.
Scenario
You are working as an administrator for Contoso, Ltd., a manufacturer of laboratory
equipment. Rebecca, an administrative assistant in the Production department, is having trouble with her computer running Windows XP Professional. When her computer
starts, she sees the following message: At Least One Service Or Driver Failed During
System Startup. Use Event Viewer To Examine The Event Log For Details.
Rebecca tells you that the last time the error message happened was at around 5:00
p.m. Central Time (US & Canada) on November 16, 2004. You walk Rebecca through
the steps of opening Event Viewer and saving her System log as a file named RebeccaSystem.evt. You then ask her to e-mail you the saved log file. When you receive the
file, you save it to your desktop.
18-44
Chapter 18
Using Windows XP Tools
On the CD
In the Labs folder of the CD-ROM accompanying this book, you will find a file
named RebeccaSystem.evt. Copy this file to your desktop.
Using what you have learned in this chapter, perform the following actions:
1. In Event Viewer, create a new log view based on the System log.
2. Open the saved log named RebeccaSystem.evt in the new log view.
Questions
1. Given the date and time of the last error message that Rebecca saw, look through
Rebecca’s System log and use the following table to list the error events by their
source name, time, and error ID. List only error events that occurred within 5 minutes of 5:00 p.m Central Time, and sort the list from oldest to newest. If you are
not in the Central Time (US & Canada) time zone, change your computer’s time
zone to (GMT-06:00) Central Time (US & Canada).
Time
Source Name
Error ID
2. Examine the details of each of the error events. Using the following table of
Sources and Event IDs, provide a brief description of each error and what (if any)
service did not start as a result of the error.
Chapter Summary 18-45
Source and ID
Description
Service Not Started
W32Time–17
W32Time–29
NetBT–4321
Netlogon–3095
Server–2505
Service Control
Manager–7024
3. Looking through these events, what do you suspect is the problem? How would
you correct it?
Chapter Summary
■
Services are programs or processes that start with Windows XP Professional and
run in the background, providing necessary functions to other programs and operating system components. The Services console allows you to perform basic com-
18-46
Chapter 18
Using Windows XP Tools
mands on services such as stopping, starting, pausing, resuming, and restarting
services. You can also use the Services console to configure options for services
such as the startup type, the user account under which the service logs on, and
recovery options. You can also use the System Configuration Utility to enable and
disable services.
■
You use Event Viewer to view the contents of Windows XP Professional log files.
By default, Windows keeps three log files: Application, which records events generated by programs; Security, which records audit events; and System, which
records events generated by Windows services.
■
You can use Scheduled Tasks to schedule programs and batch files to run once, at
regular intervals, at specific times, or when certain operating system events occur.
Windows XP Professional saves scheduled tasks in the Scheduled Tasks folder,
which can be accessed through Performance and Maintenance in Control Panel.
■
System Restore works by creating restore points that contain a snapshot of the
Registry (which includes user account, application, and hardware configuration)
and a copy of certain system files that Windows XP Professional requires for startup. System Restore creates restore points automatically when certain events
occur, and you can also create restore points manually.
■
Remote Desktop allows users that are members of the Administrators or Remote
Users groups to remotely gain access to a computer running Windows XP Professional. Remote Assistance allows a user who needs help to invite an expert user to
connect to the user’s computer. After the connection is established, the expert user
can take shared control of the user’s desktop, chat with the user, and send and
receive files.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
When a service is disabled, you cannot start the service manually, and applications
or other services cannot start the service programmatically. If you want a service
not to run automatically when Windows starts, but need the service to be able to
be started, set the service’s startup type to Manual.
■
When a service fails, you can have Windows take the following actions: Take No
Action, Restart The Service, Run A Program, and Restart The Computer. Typically,
you should have Windows attempt to restart the service on the first or second failure. You should have Windows attempt to restart the computer only when a service fails that is vital to the computer’s role.
Exam Highlights 18-47
■
Windows XP Professional records events in three logs by default: Application,
which records events generated by programs; Security, which records audit
events; and System, which records events generated by Windows services.
■
Restoring to a restore point affects the Windows Registry and certain system and
application files. The restoration does not affect user-created documents and data.
This provides a safe means to reset the Windows configuration to an earlier time.
Key Terms
Event Viewer A utility that allows you to monitor the events that Windows XP Professional records in various logs.
Remote Assistance A utility that allows a user to invite an administrator or other
expert user to provide help remotely.
Remote Desktop
tion.
A utility that allows you to control a computer from a remote loca-
restore points A saved snapshot of the Registry and important system and application files that is created using the System Restore utility.
Scheduled Tasks A feature of Windows XP Professional that lets you schedule programs, scripts, batch files, or documents to run once, at regular intervals, or at specific times.
service A program or process that runs in the background on a computer to perform
particular system functions for other programs.
service dependency The other services that must be running for a service to start, as
well as the services that cannot start until the service in question starts.
System Restore A utility that monitors changes to certain system and application
files and creates automatic restore points that contain a snapshot of the Registry
and a copy of certain system files that Windows XP Professional requires for startup. You can also create restore points manually and restore the computer to any
restore point.
18-48
Chapter 18
Using Windows XP Tools
Questions and Answers
Lesson 1 Practice: Exercise 1
Page
18-9
6. What is the description provided for the Error Reporting Service?
Allows Error Reporting For Services And Applications Running In Non-Standard Environments.
8. What do you see in the Status column for the Error Reporting Service?
The Status column is blank, indicating that the service is not started.
Lesson 1 Practice: Exercise 2
Page
18-10
1. In the Services window, is the service enabled or disabled? Is the service stopped
or started?
The service is disabled but is still started.
Lesson 1 Practice: Exercise 3
Page
18-10
1. On the Services tab, is the Computer Browser service stopped or started?
Stopped.
Lesson 1 Review
Page
18-10
1. What is a service?
A service is a program or process that runs in the background and provides functions to other
programs and services.
2. What happens by default when a service fails? How can you change the default
behavior?
By default, Windows takes no action when a service fails. However, any services that depend
on that service will also fail to start. You can use the Recovery tab of a service’s Properties dialog box to change the action that Windows takes when a service fails the first time, the second
time, and on subsequent failures.
3. What two tools does Windows XP Professional provide for enabling and disabling
services?
The System Configuration Utility and the Services console.
Lesson 2 Review
Page
18-17
1. What are the three Windows XP Professional logs you can view with Event
Viewer, and what is the purpose of each log?
Questions and Answers 18-49
The application log contains errors, warnings, or information that programs such as database
programs or e-mail programs generate. The program developer presets which events to record.
The security log contains information about the success or failure of audited events. The
events that Windows XP Professional records are a result of your audit policy. The system log
contains errors, warnings, and information that Windows XP Professional generates. Windows
XP Professional presets which events to record.
2. The two ways that Event Viewer provides for locating specific events are the
_____________ command and the _____________ command. What does each of
the commands allow you to do?
Filter; Find
The Filter command allows you to change what appears in the log. The Find command allows
you to search for specific events.
3. The size of each log can be from ____ KB to ____ GB, and the default size is ____
KB.
64; 4; 512
4. If you select the Do Not Overwrite Events option, what happens when the log
becomes full?
If you select the Do Not Overwrite Events option, you must clear the log manually. When the log
becomes full, Windows XP Professional stops. However, no security log entries are overwritten.
Lesson 3 Review
Page
18-23
1. How can Scheduled Tasks help you monitor, manage, and maintain network
resources?
Scheduled Tasks can be used to automatically launch any script, program, or document to start
at a specified time and interval, or when certain operating system events occur. You can use
Scheduled Tasks to complete many administrative tasks for you, run maintenance programs at
specific intervals on the local or remote computers, and run programs when there is less
demand for computer resources.
2. Which of the following are valid choices for the frequency with which Scheduled
Tasks schedules programs to run? (Choose all that apply.)
a. Daily
b. One time only
c. When the computer shuts down
d. When a user logs off
The correct answers are A and B. C and D are not correct because you cannot configure a
scheduled task to run when the computer shuts down or when a user logs off.
18-50
Chapter 18
Using Windows XP Tools
3. Why do you have to assign a user account and password for each task that you
schedule using the Scheduled Task Wizard?
You enter a user name and password to have the task run under the security settings for that
user account. For example, you can run a scheduled backup by using a user account that has
the required rights to back up data but does not have other administrative privileges. The
default is to use the user name of the person scheduling the task.
4. If none of your scheduled tasks is starting, what is one thing that you need to
check?
If none of your scheduled tasks is starting, open the Task Scheduler and click Advanced to
make sure that the Task Scheduler Service is running. If it is not running, you can use the
Advanced menu to start it.
Lesson 4 Review
Page
18-30
1. When does System Restore create restore points automatically?
Every 24 hours (or if it has been 24 hours since the computer was last turned on), when you
install an unsigned device driver, when System Restore-compliant applications are installed,
when updates are installed through Automatic Updates or Windows Update, when you restore
data from backup media using Windows Backup, when it detects changes to certain files, and
when you restore a restore point.
2. Will System Restore recover a document that you accidentally delete from the My
Documents folder?
No. System Restore does not monitor personal user data, such as files in My Documents,
Favorites, Recycle Bin, Temporary Internet Files, History, and Temp folders.
3. How can you prevent System Restore from monitoring particular drives?
To turn off System Restore for a particular drive, in the System Properties dialog box, on the
System Restore tab, in the Available Drives list, click the drive you want to configure, and then
click Settings. Note that you cannot disable System Restore on the system drive without disabling it on all drives.
Lesson 5 Review
Page
18-32
1. What are the requirements for running Remote Desktop?
The remote computer must be running Windows XP Professional. After enabling Remote Desktop on this computer, you must make sure that the user who will connect remotely is a member
of either the Administrators or Remote Users group.
2. How can you install the Remote Desktop Connection software on computers that
are not running Windows XP Professional?
You can install the Remote Desktop Connection software by inserting the Windows XP Professional installation CD-ROM on the client computer. There is a version of the Remote Desktop
Connection software for most Windows versions.
Questions and Answers 18-51
3. What is the difference between Remote Desktop and Remote Assistance?
Remote Desktop is designed to allow a user to have full control over a Windows XP Professional
desktop from another computer on the network. Remote Desktop requires that a user be a
member of the Administrators or Remote Users group on the host computer. Remote Assistance is designed to let a user request help from another user. To establish a Remote Assistance session, a user must send an invitation. When using Remote Assistance, both users can
see the host computer’s display.
Case Scenario Exercise
Page
18-41
1. Ken is not an expert user and he wants you to help him solve his problem. He
would also like to watch while you help him. What feature could you use to help
Ken remotely while he watches?
You could use Remote Assistance to help Ken. While you are connected to Ken’s computer, you
can take control of his desktop while he watches.
2. After connecting to Ken’s computer, you want to determine what service or services are failing to start. How would you do this?
You should open Event Viewer and view the System log. Events marking services that fail to
start are marked with a red icon that has an X.
3. You have determined that only one service is failing to start, and that service is
related to Ken’s backup program. You decide to use the Add/Remove Programs
utility to remove the backup program from Ken’s computer. After removing the
program, Windows displays a message stating that some parts of the program
could not be installed because they are running and that it needs to you restart the
computer to finish the removal. When the computer restarts, you still see the error
message stating that a service has failed to load, and the program is still listed in
the Add/Remove Programs dialog box as being installed. What should you do?
You should stop the service and disable it. You can do this by using the Services console. Stopping the service should allow you to remove the program. Disabling the service will prevent it
from running at startup in case the program needs to restart to finish the installation.
4. After taking care of the service, you use Add/Remove Programs again to try to
uninstall the program. However, the Add/Remove Programs utility tells you that
the uninstallation file could not be found and that the removal process cannot
continue. You suspect that during the previous removal attempt, the uninstallation
file was deleted. You decide that you need to restore Ken’s computer to a configuration from before he installed the program. How can you do this?
You should use System Restore. Most likely, Ken did not create a manual restore point, and it
is also unlikely that the setup program for the backup utility created one. You should find the
most recent automatic restore point and restore the computer to that point.
18-52
Chapter 18
Using Windows XP Tools
5. You have managed to restore Ken’s computer to a previous configuration. You no
longer receive error messages about services not starting and are satisfied that the
program has been removed from the computer. However, Ken still wants to use
the backup program. After researching the program, you find that Ken was right
about being able to install it as a command-line utility. When you perform this
type of installation, no service is installed. You install Ken’s program in this fashion. Ken is not familiar with using the command prompt, though, and wants to
have the program back up his computer automatically each night. How can you
set this up?
You should create a scheduled task that runs the executable command at the desired time
each night. After creating the task, you can use the Properties dialog box for the task to specify
the necessary command-line options for running the program.
Troubleshooting Lab
Page
18-43
1. Given the date and time of the last error message that Rebecca saw, look through
Rebecca’s System log and use the following table to list the error events by their
source name, time, and error ID. List only error events that occurred within 5 minutes of 5:00 p.m Central Time, and sort the list from oldest to newest. If you are
not in the Central Time (US & Canada) time zone, change your computer’s time
zone to (GMT-06:00) Central Time (US & Canada).
Time
Source Name
Error ID
4:55:14 PM
W32Time
17
4:55:14 PM
W32Time
29
4:55:14 PM
NetBT
4321
4:55:29 PM
W32Time
17
4:55:29 PM
W32Time
29
5:00:00 PM
NetBT
4321
5:00:01 PM
Netlogon
3095
5:00:01 PM
NetBT
4321
5:00:01 PM
Server
2505
5:00:03 PM
Service Control Manager
7024
5:00:17 PM
W32Time
17
5:00:17 PM
W32Time
29
5:00:33 PM
W32Time
17
5:00:33 PM
W32Time
29
Questions and Answers 18-53
2. Examine the details of each of the error events. Using the following table of
Sources and Event IDs, provide a brief description of each error and what (if any)
service did not start as a result of the error.
Source and ID
Description
Service Not Started
W32Time–17
Windows could not resolve a DNS lookup for a
time server and will try again in 15 minutes.
W32Time–29
Windows could not access a time server.
NetBT–4321
The computer could not claim the name
“Client1” because another computer on the
network already has that name.
Netlogon–3095
This computer is configured as a member
of a workgroup, not as a member of a
domain. The Netlogon service does not need
to run in this configuration.
Netlogon service
did not start.
Server–2505
The server could not bind to the transport
\Device\NetBT_Tcpip_{DA411120-47FB4F38-AC72-67AFC5649900} because
another computer on the network has
the same name.
Server service did
not start.
Service Control
Manager–7024
The Messenger service terminated with
service-specific error 2270.
Messenger service
did not start.
3. Looking through these events, what do you suspect is the problem? How would
you correct it?
The problem is that Rebecca’s computer has been given the same name as another computer
on the network. When Rebecca’s computer starts, the computer cannot claim its assigned
name and as a result, neither the Messenger service nor Server service can start. To fix the
problem, you should rename Rebecca’s computer.
19 Monitoring and Optimizing
System Performance
Exam Objectives in this Chapter:
■
■
Monitor, optimize, and troubleshoot performance of the Microsoft Windows XP
Professional desktop.
❑
Optimize and troubleshoot memory performance.
❑
Optimize and troubleshoot processor utilization.
❑
Optimize and troubleshoot disk performance.
❑
Optimize and troubleshoot application performance.
Monitor and configure multiprocessor computers.
Why This Chapter Matters
One of your responsibilities as an administrator is to help users keep their computer running well and to troubleshoot performance problems when they occur.
This chapter covers the two major tools that Windows XP Professional provides
for monitoring and troubleshooting performance: Task Manager and the Performance console.
Lessons in this Chapter:
■
Lesson 1: Using Task Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19-2
■
Lesson 2: Using the Performance Console . . . . . . . . . . . . . . . . . . . . . . . . . 19-13
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have
Microsoft Windows XP Professional installed on the computer.
19-1
19-2
Chapter 19
Monitoring and Optimizing System Performance
Lesson 1: Using Task Manager
Task Manager provides information about the programs and processes running on
your computer and the performance of your computer. You can use Task Manager to
start programs, to stop programs and processes, and to see a current view of your computer’s performance.
After this lesson, you will be able to
■ Monitor programs by using Task Manager
■ Monitor processes by using Task Manager
■ Monitor system performance by using Task Manager
■ Monitor networking by using Task Manager
Estimated lesson time: 25 minutes
How to Monitor Programs
Task Manager allows you to monitor applications and processes that are currently running on your computer. It also provides information about the processes, including the
memory usage of each one. It provides statistics about the memory and processor performance and network usage. You start Task Manager in any of the following ways:
■
Press CTRL+SHIFT+ESC
■
Right-click the Windows taskbar, and then click Task Manager
■
Press CTRL+ALT+DELETE
Note Provided your computer running Windows XP Professional is in a domain environment,
you can start Task Manager by pressing CTRL+ALT+DELETE. However, if your computer is in a
workgroup environment, you might need to start Task Manager by selecting it, depending on
how the logon and logoff options are configured.
The Task Manager dialog box shown in Figure 19-1 has four tabs: Applications, Processes, Performance, and Networking.
Lesson 1
Using Task Manager
19-3
F19us01
Figure 19-1
The Applications tab shows running applications and lets you terminate them.
You can use the buttons on the Applications tab of the Task Manager dialog box to
stop a program from running (End Task), to switch to a program and bring the program into the foreground (Switch To), and to start a program (New Task). At the bottom of the display, Task Manager shows you the number of processes that are currently
running, the CPU usage, and the memory usage.
How to Monitor Processes
The Processes tab in the Task Manager dialog box (see Figure 19-2) lists each process
that is currently running on your computer that runs in its own address space, including
all applications and system services. Task Manager also allows you to end processes.
F19us02
Figure 19-2
You can select the columns that appear on the Processes tab.
19-4
Chapter 19
Monitoring and Optimizing System Performance
By default, the Processes tab shows you the processes, the users running each process,
and the CPU and memory usage for each process that is running. You can add additional performance measures to those that are shown by default on the Processes tab.
To add performance measures, on the View menu, click Select Columns (refer to Figure 19-2). Table 19-1 describes the columns that are displayed in Task Manager by
default and some of the columns that can be added to the Processes tab.
Table 19-1
Processes Tab Columns
Column
Description
Image Name
The name of the process, displayed by default.
PID (Process Identifier)
The numeric identifier assigned to the process while it is running.
User Name
The name of the user that the process is running under, displayed by
default.
CPU Usage
The percentage of time the threads of the process used the processor
since the last update, displayed by default. If a process is consuming
a large amount of processor time over a long period (other than
when an application is first starting or is performing a particularly
intensive task), the process might be having trouble. Try closing the
application (by using the Applications tab).
CPU Time
The total processor time (in seconds) used by the process since it was
started.
Memory Usage
The amount of memory (in kilobytes) used by the process, displayed
by default. This column is particularly useful for determining which
applications are using memory because it displays the total amount of
physical and virtual memory used by an application. If an application
seems to be using too much memory, there might be a problem with
the application. Try closing the application and restarting it (or
restarting your computer and then restarting the application).
Base Priority
The order in which threads are scheduled for the processor. The base
priority is not set by the operating system; it is set by the code. You
can use Task Manager to change the base priority of processes. To
change the base priority of a process, right-click the process and click
Set Priority.
Non-paged Pool
The amount of memory (in kilobytes) that is used by a process; operating system memory that is never paged (moved from memory) to
disk.
Paged Pool
The amount of system-allocated virtual memory (in kilobytes) used
by a process; virtual memory that can be paged to disk. Paging is the
moving of infrequently used data from RAM to the paging file on the
hard disk.
Lesson 1
Table 19-1
!
Using Task Manager
19-5
Processes Tab Columns
Column
Description
Page Faults
The number of times that data had to be retrieved from the page file
on the hard disk for this process because it had been paged out of
physical memory. Windows XP Professional uses a page file stored
on the hard disk to augment physical memory. When the physical
memory is full, Windows swaps older information in physical memory to the swap file to make room for newer information. Too many
page faults often indicate that you need more physical memory.
Peak Memory Usage
The maximum amount of physical memory resident in a process
since it started.
Thread Count
The number of threads running in the process. This column can be
useful for troubleshooting multithreaded applications.
Exam Tip
For the exam, remember that Task Manager can show real-time information
about the CPU, RAM, and virtual memory, but the measurements are fairly limited. To collect
more detailed information, use the Performance console. The Performance console also
allows you to collect performance data over a longer period.
How to Change the Base Priority of a Running Process
Changing the base priority of a process determines how much processor time Windows XP Professional devotes to the process compared with other processes. By
default, most processes run at a base priority of Normal. However, you can change the
base priority for a process by using the following steps:
1. In Task Manager, on the Processes tab, click the View menu and then click Select
Columns.
2. In the Select Columns dialog box, select Base Priority and then click OK.
The Base Priority column now appears in the Task Manager window.
3. Right-click the process for which you would like to change the base priority.
4. On the shortcut menu that appears, point to Set Priority, and then select one of the
following commands:
❑
Realtime
❑
High
❑
AboveNormal
❑
Normal
❑
BelowNormal
❑
Low
19-6
Chapter 19
Monitoring and Optimizing System Performance
Caution
You should change the priority of processes only when there is a process that
needs priority over (or is less important than) other running processes; even then, you should
try to use only the AboveNormal, Normal, and BelowNormal levels. Setting a process at too
high a base priority (such as RealTime) can consume enough system resources that other
vital processes cannot function properly.
How to Set Processor Affinity
Windows XP Professional can support two processors running on the same computer.
When two processors are installed, Windows XP Professional does a good job of
assigning processes to processors based on need. However, you can assign a particular
process to a specific processor. (This is referred to as assigning processor affinity to
a process; of course, it is available only on computers with two processors or on computers with a hyperthreaded processor in which multiple processes can run simultaneously on one processor.)
To assign a process to a processor, use the following steps:
1. In Task Manager, on the Processes tab, right-click a process and then click Set
Affinity.
2. In the Processor Affinity dialog box, select the processors on which the process
should be allowed to run. By default, both processors (CPU 0 and CPU 1) are
selected for a processor.
Caution
Controlling processor affinity can improve performance by reducing the number of
processor cache flushes that occur as threads move from one processor to another. This
might be a good option for dedicated file servers. However, be aware that dedicating a program to a particular processor might not allow other program threads to migrate to the leastbusy processor.
How to Monitor System Performance
You can use the Performance tab in the Task Manager dialog box (see Figure 19-3) to
see a current overview of system performance that includes information about the CPU
(or CPUs on a computer with two processors), physical memory, and virtual memory.
Lesson 1
Using Task Manager
19-7
F19us03
Figure 19-3 The Performance tab provides real-time performance data about the CPU, RAM, and
virtual memory.
Table 19-2 describes the fields that are displayed by default on the Performance tab in
Task Manager.
Table 19-2
Performance Tab Fields
Field
Description
CPU Usage
The percentage of time that the processor is busy. If this graph displays a
high percentage continuously (and not when there is an obvious reason,
such as a big application), your processor might be overloaded. If your
computer has two processors, two graphs are shown. If this value runs
continuously over 80 percent, you probably see a noticeable improvement in performance if you upgrade your processor.
CPU Usage History
The percentage of time that the processor is running a thread other than
the idle thread shown over time. You can use the Update Speed command on the View menu to specify how often the values are refreshed.
The High value updates about twice per second; Normal value updates
once every two seconds; Low value updates once every four seconds.
You can also pause the updates and update the view manually by pressing F5. This is a useful method if you want to monitor some specific
activity. Note that Task Manager itself uses processor time. The more frequently you update the display, the more processor time it uses, which
throws off the accuracy of whatever you are analyzing.
PF Usage
The amount of virtual memory used (in MB).
Page File Usage
History
The amount of virtual memory used, shown over time. Values set using
the Update Speed command affect this history as well.
19-8
Chapter 19
Table 19-2
Monitoring and Optimizing System Performance
Performance Tab Fields
Field
Description
Total: Handles
The number of object handles in the tables of all processes. A handle
represents a specific input/output (I/O) instance of a thread.
Threads
The number of running threads, including one idle thread per processor.
A thread is an object within a process that runs program instructions.
Processes
The number of active processes, including the idle process. A process
can have multiple threads, each of which in turn can have multiple handles.
Physical Memory (K): The amount of physical RAM installed in the computer.
Total
Available
The amount of physical memory available to processes.
System Cache
The amount of physical memory released to the file cache on demand.
Commit Charge:
Total
The size of virtual memory in use by all processes.
Limit
The amount of virtual memory that can be committed to all processes
without enlarging the paging file.
Peak
The maximum amount of virtual memory used in the session.
Paged
The size of the paged pool allocated to the operating system. The paged
pool is data in physical memory that can be written to the page file if
Windows needs to make space in physical memory for other data.
Nonpaged
The size of the nonpaged pool allocated to the operating system. Windows cannot page all memory to a page file. In particular, many threads
created by the Windows kernel cannot be paged.
Kernel Memory (K): The sum of the paged and nonpaged memory.
Total
Note
When Task Manager is running, Windows XP Professional displays an accurate miniature CPU usage icon on the taskbar. If you point to the icon, Task Manager displays the percentage of processor usage in text format.
How to Monitor Networking
The Networking tab in Task Manager, shown in Figure 19-4, displays a visual interpretation of the current network traffic on various network connections on the computer.
Although it is possible to get an idea about network performance from this tab, it is
actually more useful for giving you a quick snapshot of network availability on each
connection configured on your computer.
Lesson 1
Using Task Manager
19-9
F19us04
Figure 19-4
The Networking tab of Task Manager shows current network activity.
By default, the graph of network activity for each connection scales dynamically to
show how much network utilization there is when compared with the theoretical maximum for the connection. For example, on a 100 Mbps connection, when there is no
network activity on a connection, the vertical scale on the graph shows the values 0
percent, .5 percent, and 1 percent of the theoretical maximum. As network activity
increases, the graph scales to show a greater percentage—up to 100 percent, indicating
the full 100 Mbps potential. Because most people use this tab not to measure the exact
network throughput, but rather to see whether there is network throughput (and sometimes what the maximum value is), this scale can be rather confusing. Fortunately, you
have two options for controlling the way Task Manager displays the graph:
■
On the Options menu, click Show Scale to turn the vertical display of the scale on
and off.
■
On the Options menu, click Auto Scale to turn the automatic scaling on and off.
When the Auto Scale option is turned off, the graph always shows a range of 0 to
100 percent. This is usually a more useful view, unless you are trying to see very
small amounts of network utilization.
The detailed information at the bottom of the tab displays current percent of network
utilization and the theoretical link speed for each enabled adapter. When viewing the
current percent of network utilization, you should keep the following in mind:
■
On wired Ethernet connections, you can usually expect to see a peak utilization
value of 60 to 80 percent.
■
On wireless connections, you can expect to see peak utilizations of 30 to 50 percent, depending mostly on position of the wireless access point and structural
interference (such as walls, heating ducts, or other devices).
19-10
Chapter 19
Monitoring and Optimizing System Performance
When viewing network utilization and trying to figure out whether your connection is
living up to its capacity, do not expect to see 100 percent utilization, even on the best
of connections. However, if you see utilization considerably below the peak values
listed previously, you should investigate the connection for potential problems.
Practice: Using Task Manager
In this practice, you use Task Manager to monitor programs, processes, and system
performance. You use Task Manager to start a program and to stop a program. Finally,
you add new columns to the Processes tab.
1. If necessary, log on with a user account that is a member of the Administrators
group.
2. Press Ctrl+Shift+Esc to launch Task Manager.
3. Click the Applications tab. Which programs are currently running on your computer?
4. Click New Task.
Windows XP Professional displays a Create New Task dialog box.
5. In the Open text box, type wordpad.exe and click OK.
WordPad should start and be listed as a running application.
6. Click the Processes tab.
7. How many processes are running?
8. On the View menu, click Select Columns.
The Select Columns dialog box appears.
9. Click Peak Memory Usage, and then click Page Faults. Click OK.
Two new columns, Peak Memory Usage and Page Faults, are added to the Processes tab display. You might need to maximize Task Manager to see all columns.
10. Click the Performance tab.
11. What percentage of your CPU’s capacity is being used?
12. Do you think that your CPU could be slowing down the performance on your
computer?
13. Click the Applications tab.
Lesson 1
Using Task Manager 19-11
14. Click WordPad, and then click End Task.
WordPad closes and is removed from the list of running applications.
15. Close Task Manager.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Which of the following methods can you use to start Task Manager? (Choose all
that apply.)
a. Press CTRL+ALT+ESC
b. Right-click the Desktop, and then click Task Manager
c. Press CTRL+SHIFT+ESC
d. Press CTRL+ALT+DELETE, and if necessary, click Task Manager
2. Which of the following tabs can be found in Task Manager? (Choose all that
apply.)
a. Networking tab
b. Programs tab
c. Processes tab
d. General tab
3. What are page faults? Do you think a larger or smaller number of page faults indicates better system performance? Why?
4. What does CPU usage represent? In general, is system performance better with a
high CPU usage value or a low value?
19-12
Chapter 19
Monitoring and Optimizing System Performance
Lesson Summary
■
Use the Applications tab of Task Manager to stop a program, switch to a program,
and start a program.
■
Use the Processes tab of Task Manager to view running processes. You can also
end processes from the Processes tab.
■
Use the Performance tab of Task Manager to view real-time performance information about your CPU, RAM, and virtual memory.
■
Use the Networking tab of Task Manager to view current network traffic on various network connections on the computer.
Lesson 2
Using the Performance Console 19-13
Lesson 2: Using the Performance Console
Windows XP Professional provides two tools for monitoring resource usage: the System Monitor snap-in and the Performance Logs And Alerts snap-in. Both of these
snap-ins are contained in the Performance console. You use the System Monitor snapin to track resource use and network throughput. You use the Performance Logs And
Alerts snap-in to collect performance data over time from the local or a remote computer or to have Windows XP alert you when a particular performance threshold is
crossed.
After this lesson, you will be able to
■ Use System Monitor to monitor resource usage
■ Add counters to System Monitor
■ Use Performance Logs And Alerts to track a computer’s performance
■ Establish a baseline for performance data
■ Identify and resolve bottlenecks
Estimated lesson time: 30 minutes
How to Use System Monitor
To access the Performance console, click Start, click Control Panel, click Performance
And Maintenance, click Administrative Tools, and then double-click the Performance
shortcut. The Performance console contains the System Monitor snap-in and the Performance Logs And Alerts snap-in (see Figure 19-5).
F19us05
Figure 19-5
The System Monitor snap-in displays counter values in a graph by default.
19-14
Chapter 19
Monitoring and Optimizing System Performance
You use System Monitor to collect and view real-time data about memory, disk, processor, network, and other activity on your computer or on remote computers. You can
view this data in a graph, a histogram, or a report. To change the display, you can click
the appropriate icon, as shown in Figure 19-5, or use the following key combinations:
Ctrl+G for the graph, Ctrl+B for the histogram, and Ctrl+R for the report.
Note A histogram is a chart that consists of horizontal or vertical bars. The widths or
heights of these bars represent the values of certain data.
Monitoring resources on your computer and overall system performance can help you
to do the following:
■
Evaluate how well your computer is currently performing
■
Detect and eliminate bottlenecks to improve performance
■
Look for trends to plan for future growth and upgrades
■
Evaluate the effects of tuning and configuration changes on your computer
The Performance tool classifies information in the following areas:
Object An object represents a major system component (hardware or software) of
the computer or operating system. Examples of objects include physical disks, processor, and memory.
Instance Each occurrence of an object is considered an instance. For example, if
there are two processors on a computer, there are two processor instances. If there are
three hard disks on a computer, each disk is represented by a separate instance. Not all
objects have multiple instances. If there is only one instance, the Performance snap-in
shows a dash for the Instance value.
Counter A counter is a particular aspect of an object that System Monitor can measure. For example, the physical disk object contains the following counters:
❑
Percentage Disk Read Time
❑
Average Disk Bytes Per Read
❑
Disk Reads Per Second
System Monitor helps you gauge a computer’s efficiency and locate and resolve current
or potential problems. You monitor resources on your computer by selecting objects in
System Monitor. A set of counters exists for each object; Table 19-3 describes some of
the available objects.
Lesson 2
Table 19-3
Using the Performance Console 19-15
Partial List of Available Objects in System Monitor
Object
Description
Cache
Used to monitor the file system cache used to buffer physical device data
Memory
Used to monitor the physical and virtual memory on the computer
PhysicalDisk
Used to monitor a hard disk as a whole
Processor
Used to monitor CPUs
When you first start the Performance tool, the graph displays three counters by default:
Pages/sec Represents the rate at which pages are read from or written to disk during
virtual memory operations. Consistently high values can indicate that not enough
memory is present on a computer.
Avg. Disk Queue Length Represents the average number of read and write requests
queued for the selected disk. Consistent values above 0 means that requests are backing up, which might indicate not enough memory or a slow disk system.
%Processor Time Represents the percentage of elapsed time that the processor
spends executing nonidle tasks. Consistently high values (exceeding approximately 80
percent) might indicate that the processor is slowing down your computer.
How to Add Counters
Adding counters to an object (such as those described in Table 19-3) allows you to
track certain aspects of the object. The three default counters loaded with System Monitor actually do a very good job of representing the basic aspects of a computer’s performance. Of course, they are only three of the hundreds of counters that are available.
The counters that you monitor depend on whether you are trying to collect general
baseline information, troubleshoot a performance problem, diagnose an issue with an
application, and so on. The following steps allow you to add counters to an object in
System Monitor:
1. At the bottom of the Performance console, right-click Counter and click Add
Counters.
The Add Counters dialog box appears.
2. In the Performance Object list box, select the object for which you want to add
counters.
3. Ensure that Select Counters From List is selected.
You can add all counters, but that usually provides more information than you
need or can interpret.
4. Select a counter from the list, and click Add.
19-16
Chapter 19
Monitoring and Optimizing System Performance
For an explanation of a counter, select it and then click Explain.
Tip
If you want to add several counters at the same time, you can hold down Ctrl to select
individual counters from the list. You can hold down Shift if you want to select several
counters in a row, and click the first in the list you want and then click the last in the list that
you want to select. All counters listed between the first and last you clicked are automatically
selected.
5. When you have completed your selection of objects and counters, click Close to
return to the Performance console.
Table 19-4 explains a few of the counters that you might find useful for evaluating your
computer’s performance.
Table 19-4
Partial List of Counters That Are Available in System Monitor
Counter
Description
Under Processor,
choose %Processor Time
Indicates the percentage of time that the processor spends executing a nonidle thread, which is the percentage of time that the processor is active. During some operations this might reach 100
percent. Periods of 100 percent activity should occur only occasionally. This counter is the primary indicator of processor activity. Sustained values over 80 percent indicate a potential processor
bottleneck.
Under Processor,
choose %Interrupt Time
Indicates the time that the processor spends receiving and servicing
hardware interrupts during sample intervals. This value is an indicator of the activity of devices that generate interrupts (such as the
system clock, mouse, and disk drivers). Devices like these typically
interrupt the processor when they complete a task or require the
processor’s attention. If the %Processor Time value is greater than
90 percent, and the %Interrupt Time value is greater than 15 percent, this processor is probably in need of assistance to handle the
interrupt load.
Under Processor,
choose % DPC Time
Indicates how much time the processor is spending processing
DPCs. DPCs are software interrupts or tasks that require immediate
processing, causing other tasks to be handled at a lower priority.
DPCs represent further processing of client requests.
Under System, choose
Processor Queue Length
Indicates the number of threads in the processor queue. There is a
single queue for processor time, even on computers with multiple
processors. A sustained processor queue of greater than two
threads usually indicates that the processor is slowing down the
overall system performance.
Lesson 2
Table 19-4
!
Using the Performance Console 19-17
Partial List of Counters That Are Available in System Monitor
Counter
Description
Under Memory, choose
Pages/sec
Indicates the number of pages that were either read from disk or
written to disk to make room in physical memory for other pages.
This counter is the primary indicator of whether the computer has
sufficient memory. An average value in excess of 20 can indicate
insufficient memory in the computer.
Under Memory, choose
Available Bytes
Indicates the amount of physical memory that is unallocated in the
computer. Does not include any memory that is allocated to working sets or file system cache.
Under Paging File,
choose %Usage
Indicates the percentage of the paging file that is currently in use.
Under Paging File,
choose %Usage Peak
Indicates the peak percentage of the paging file in use.
Under Cache, choose
Copy Read Hits %
Indicates the percentage of time that information was found in the
file system cache and did not have to be read from disk during a
file read operation (typically used by file systems and during small
network transfers). A low value (lower than 70 percent) indicates
that Windows might not have enough physical memory to keep up
with the demands.
Under Logical Disk,
choose %Free Space
Indicates the ratio of free disk space that is available to total usable
disk space on a particular logical disk.
Under Physical Disk,
choose %Disk Time
Indicates the percentage of time that the selected physical disk is
busy servicing read or write requests. If this value is consistently
over 50 percent, the hard disk is having trouble keeping up with
the load that is being placed on it.
Under Physical Disk,
choose Avg. Disk Queue
Length
Indicates the average number of both read and write requests that
are queued for the selected disk. If this value averages 2 or more,
the disk is a bottleneck.
Exam Tip
Memorize the counters mentioned in this chapter, and understand the values of
each counter that indicate a potential problem. In particular, you should remember the three
default counters used in System Monitor: Pages/sec, Avg. Disk Queue Length, and %Processor Time.
How to Use Performance Logs And Alerts
Performance Logs And Alerts allows you to log counter information to a file and to trigger alerts that are based on configured events. You can automatically collect performance data from the local computer or from remote computers. You can view the
19-18
Chapter 19
Monitoring and Optimizing System Performance
logged data from System Monitor, or you can export it to a spreadsheet program or a
database, such as Structured Query Language (SQL).
The Performance Logs And Alerts node in the Performance console (see Figure 19-6)
contains three subsections:
Counter Logs
Trace Logs
Log activity for selected counters at regular intervals
Log activity for selected counters when a particular event occurs
Alerts Log activity and can notify a user when a particular counter exceeds a certain
threshold
F19us06
Figure 19-6 Use the Performance Logs And Alerts snap-in to track performance over time or alert
you to performance problems.
How to Enable Performance Logging
To enable performance logging, use these steps:
1. In the Performance window, expand Performance Logs And Alerts.
2. Right-click Counter Logs, and select New Log Settings.
3. In the New Log Setting dialog box, enter the name for the log and click OK.
4. On the General tab, add the counters that you want to log. Modify the sampling
interval if necessary.
5. On the Log Files tab, you can modify the name and location of the log file, as well
as the type of file if desired.
6. On the Schedule tab, configure the start and stop times for logging. You can manually stop and start logging, or you can configure logging to start and stop at specified times.
7. Click OK to save the log configuration.
Lesson 2
Using the Performance Console 19-19
Real World Capture Performance Data from a Remote Computer
To get a real picture of the performance of a computer, it is best if you use a different computer to monitor performance than the computer that is being monitored. The reason for this is that the Performance console itself uses some system
resources. To use System Monitor or Performance Logs And Alerts to monitor a
remote computer, all you have to do is select the remote computer when you add
counters. In the Add Counters dialog box, click Select Counters From Computer,
and then select the computer from the drop-down list (or type the UNC path for
the computer).
How to View Performance Data from a Log
After you create a log, you can load the log into the Performance console and view it
the same way that you would view real-time performance data. To view a performance
log, follow these steps:
1. In the Performance console, click System Monitor, right-click the data display, and
then select Properties.
2. In the System Monitor Properties dialog box, on the Source tab, select Log Files.
Click Add, and enter the name of the log file that you want to view. Click OK to
continue.
3. Right-click the data display, and then select Add Counters.
4. Add the counters that you want to view, and then click OK. The available counters
are limited to those that are present in the log.
How to Configure an Alert
In addition to using other monitoring techniques, you can use alerts to notify users or
administrators when conditions exceed preset criteria. For example, you can configure
an alert to send a message to the administrator when processor utilization exceeds 80
percent.
When an alert is triggered, you can perform the following actions:
■
Log an entry in the application event log. This option is enabled by default.
■
Send a network message to a particular user.
■
Start a performance log that can further monitor the alert condition.
■
Run a program that can be used to launch any application program. You can use
this option to launch a script that would send e-mail to the administrator.
19-20
Chapter 19
Monitoring and Optimizing System Performance
To configure an alert, follow these steps:
1. In the Performance console, expand Performance Logs And Alerts.
2. Right-click the Alerts folder, and select New Alert Settings.
3. Enter a name for the alert, and click OK.
4. On the General tab, add the counter or counters and the alert value.
5. On the Action tab, configure the action or actions to be performed when an alert
is triggered.
6. On the Schedule tab, configure the start and stop times for when the alert should
be scanned. You can turn scanning on and off manually or configure scanning to
occur on a schedule.
7. Click OK to create the alert.
How to Establish a Baseline for Performance Data
When you are ready to begin monitoring the resources on your computer, the first
thing you need to do is establish a baseline. A baseline is a measurement derived from
collecting data over an extended period of time. The data should reflect typical types
of workloads and user connections but should also include any unusual activity that
might occur. The baseline represents resource usage under normal conditions.
After you collect data on performance over an extended period of time, with data
reflecting periods of low, average, and high usage, you can determine what is acceptable performance for your computer, and that determination becomes your baseline.
You use the baseline to determine when bottlenecks are developing or to watch for
changes in usage patterns. Determining bottlenecks will help you in troubleshooting
problems that might arise. Watching for changes in usage patterns will help you plan
for the future.
On the CD
At this point, you should watch the multimedia presentation “Creating a Performance Baseline” included in the Multimedia folder on the CD accompanying this book.
How to Identify and Resolve Bottlenecks
Deviations from your baseline are good indicators of performance problems. A bottleneck exists if a particular component’s limitation is slowing the entire system performance. Even if one component in your computer is heavily used, if the other
components or the system as a whole are not slowed down, there is no bottleneck.
Lesson 2
Using the Performance Console 19-21
If you discover a bottleneck on your computer, here are some basic suggestions to help
you solve the problem:
■
If paging values are high (meaning that Windows is transferring pages of information from physical memory to disk more than you would expect), identify processes that are using the most memory. To do this, use the Processes tab of Task
Manager and sort by the Mem Usage column. Stop any unnecessary applications
or processes, and consider disabling the underlying service. For example, if a program running in the background uses a lot of memory and it is a program you do
not really need, disable the program from starting with Windows.
■
If you see high processor utilization, see if you can determine which applications
are consuming the most processor time. To do this, use the Processes tab of Task
Manager and sort by the CPU column. If you do not need an application that is
consuming processor time, close the application. If an application seems to be
consuming too much processor time for a long period (in other words, not just
when the program is starting up or performing an intensive process), there might
be a problem with the application. Stop the application and start it again, or restart
the computer and then restart the application. If the application continues to consume excessive amounts of processor time, there might be a problem with the
application.
■
If you continue to see high processor utilization, and the programs consuming the
most processor time are programs you use regularly, you should consider upgrading to a faster processor.
■
If you have programs consuming processor time that are multithreaded programs,
consider installing a second processor. You can often gain more effective speed
with a dual processor configuration than with a faster single processor.
■
If you see high processor utilization, but do not discover that programs are consuming too much processor time, you should use System Monitor to check the %
Interrupts value. It is possible that a malfunctioning piece of hardware is trying too
often to interrupt the processor.
■
If you see a high disk queue value, but do not see high paging file use, the bottleneck is more likely a slow hard disk than low memory. Consider adding a faster
disk.
■
Never make more than one change at a time when trying to resolve a bottleneck,
and always repeat monitoring to verify that the change you made actually
improved the situation.
19-22
Chapter 19
Monitoring and Optimizing System Performance
Practice: Using System Monitor
In this practice, you use System Monitor to monitor system resources. You add objects
and counters to control what is being monitored, and you then view the three views—
graph, histogram, and report—for output.
1. Click Start, click Control Panel, and then click Performance And Maintenance.
2. Click Administrative Tools, and then double-click the Performance shortcut.
Windows XP Professional starts the Performance console with the System Monitor
selected.
3. What objects and counters are monitored by default?
4. Under the graph, right-click Counter, and then click Add Counters.
Windows XP Professional displays the Add Counters dialog box.
5. Which performance object and counter are selected by default?
6. In the Select Counters From list, select Interrupts/Sec, and then click Explain.
Windows XP Professional displays an Explain Text dialog box indicating that
Interrupts/Sec is the average number of hardware interrupts that the processor
receives and services each second.
7. Close the Explain Text window.
8. Click Add to add the Interrupts/Sec counter to the Processor object.
9. In the Performance Object list box, select Paging File.
10. Under Select Counters From List, ensure that %Usage is selected, and then click
Add to add the Paging File object with the %Usage counter.
11. Close the Add Counters dialog box.
12. Press Ctrl+B to view a histogram.
13. Press Ctrl+R to view a report.
14. Press Ctrl+G to return to a graph.
15. Close the Performance console.
Lesson 2
Using the Performance Console 19-23
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. Which of the following monitoring tools are included in the Performance console?
(Choose all answers that are correct.)
a. System Monitor snap-in
b. Task Manager snap-in
c. Performance Logs And Alerts snap-in
d. Task Scheduler
2. Why should you monitor resources and overall system performance?
3. What is a baseline, and what is a bottleneck?
4. Why do you need to determine a baseline when you monitor system resources
and system performance?
Lesson Summary
■
The Performance console contains the System Monitor snap-in and the Performance Logs And Alerts snap-in. The System Monitor snap-in allows you to monitor the performance of your computer or other computers on the network.
19-24
Chapter 19
Monitoring and Optimizing System Performance
■
The System Monitor snap-in provides performance objects that consist of counters
for collecting data. You can add any of hundreds of counters, each of which measures a particular aspect of system performance.
■
The Performance Logs And Alerts snap-in records performance data and system
alerts on your local computer or from remote computers.
■
A baseline is a measurement derived from collecting data over an extended period
of time that represents resource usage under normal conditions.
■
A bottleneck is any component that slows down the entire system’s performance.
Case Scenario Exercise
In this exercise, you will read a scenario about using System Monitor to measure system performance, and then answer the question that follows. If you have difficulty
completing this work, review the material in this chapter before beginning the next
chapter. You can find answers to these questions in the “Questions and Answers” section at the end of this chapter.
Scenario
You are an administrator working for a company named Fabrikam, Inc., a regional
public relations firm with its headquarters in Dallas, Texas, and several branch locations throughout the country. You are working with Pat, a user in the company’s
accounting department (which is located in the main office). Pat recently noticed that
her computer’s performance has decreased, and it is functioning at unacceptably slow
levels when running resource-intensive applications. The computer is configured as
follows:
■
Processor: Pentium 4 2.8 GHz
■
RAM: 256 MB
■
Hard disk: 12 GB
Questions
1. You want to monitor memory, processor, and disk usage over the course of a normal day’s activity on Pat’s computer. Which tool should you use to do this?
Troubleshooting Lab 19-25
2. What objects and counters would you select?
3. At the end of the day, you use System Monitor to view the log created on Pat’s
computer. You note the following key average counter values:
❑
Memory, Pages/sec: 92
❑
Processor, %Processor Time: 35 percent
❑
Physical Disk, %Disk Time: 73 percent
What do you suspect is causing the performance problem? How would you
resolve it?
Troubleshooting Lab
In this lab, you will create a performance log on your own computer and then read the
results.
To create a performance log, use the following steps:
1. Click Start, and then click Control Panel.
2. In the Control Panel window, click Performance And Maintenance.
3. In the Performance And Maintenance window, click Administrative Tools.
19-26
Chapter 19
Monitoring and Optimizing System Performance
4. In the Administrative Tools window, double-click Performance.
5. In the Performance window, expand Performance Logs And Alerts.
6. Right-click Counter Logs, and select New Log Settings.
7. In the New Log Setting dialog box, type My Performance for the name for the
log and click OK.
8. In the My Performance dialog box, on the General tab, use the Add Counters button to add the following counters:
❑
Memory: Pages/sec
❑
Paging File (_Total): %Usage
❑
Processor: %Processor Time
❑
System: Processor Queue Length
❑
Physical Disk: Disk Reads/sec
❑
Physical Disk: Disk Writes/sec
❑
Physical Disk: Avg. Disk Queue Length
9. On the Schedule tab, configure the start time for five minutes in the future. In the
Stop Log section, click After, and then set the stop time for one hour from now.
10. Click OK to save the log configuration.
Windows displays a dialog box asking whether you want to create the new log
file.
11. Click Yes.
12. In the Performance window, under Performance Logs And Alerts, click Counter
Logs.
13. In the right-hand pane, what do you notice about the My Performance log?
14. While the log is recording, you should continue to use your computer as you normally would. Be sure to run multiple applications (you can even play pinball—a
fairly resource-hungry program).
15. After one hour has elapsed, return to the Performance window.
The My Performance log icon should now be red, indicating that the log is
stopped.
Lesson 2
Using the Performance Console 19-27
16. Click System Monitor.
17. Press CTRL+L (or click the View Log Data button) to open the System Monitor
Properties dialog box with the Source tab showing.
18. Click Log Files.
19. Click Add.
20. Locate the My Performance log file. The default location for log files is C:\PerfLogs.
Click OK.
21. In the Performance window, add each of the counters that you configured the log
to monitor.
22. Click the View Report button (or press CTRL+R).
23. Record the values for each counter in the following table.
Object: Counter
Value
Memory: Pages/sec
Paging File (_Total): %Usage
Processor: %Processor Time
System: Processor Queue Length
Physical Disk: Disk Reads/sec
Physical Disk: Disk Writes/sec
Physical Disk: Avg. Disk Queue
Length
24. Do you notice any values that indicate a bottleneck? If so, list the values and
explain what you would do to troubleshoot the problem.
25. Close the Performance window.
19-28
Chapter 19
Monitoring and Optimizing System Performance
Chapter Summary
■
■
Task Manager provides information about the programs and processes running on
your computer and the performance of your computer. You can use Task Manager
to start programs, to stop programs and processes, and to see a current view of
your computer’s performance. Task Manager contains four tabs:
❑
The Applications tab lets you view and terminate running applications.
❑
The Processes tab lets you view and terminate running processes. You can
also assign process priority and processor affinity on this tab.
❑
The Performance tab provides a real-time view of CPU, RAM, and virtual
memory performance.
❑
The Networking tab indicates the current network traffic on various network
connections on the computer.
The Performance console consists of two tools: the System Monitor snap-in, which
tracks resource use and network throughput in real time, and the Performance
Logs And Alerts snap-in, which collects performance data over time and can have
Windows XP alert you when a particular performance threshold is crossed.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
Task Manager can show real-time information about the CPU, RAM, and virtual
memory, but the measurements are fairly limited. To collect more detailed information, use the Performance console. The Performance console also allows you to
collect performance data over a longer period.
■
Changing the base priority of an application can be useful on application or file
servers, but you should use caution when changing priorities on a desktop computer. Setting the base priority too high can result in unstable system performance
or loss of data.
■
Memorize the counters mentioned in this chapter, and understand the values of
each counter that indicate a potential problem. In particular, you should remember the three default counters used in System Monitor: Pages/sec, Avg. Disk
Queue Length, and %Processor Time.
Exam Highlights 19-29
Key Terms
base priority A setting made in Task Manager that determines how much processor
time Windows XP Professional devotes to the process when compared with other
processes.
counter
instance
A particular aspect of an object that System Monitor can measure.
A particular occurrence of an object.
object A representation of a major system component (hardware or software) of the
computer or operating system.
Performance console A tool that is used to monitor resource usage on a computer
running Windows XP Professional. The Performance console provides access to
two snap-ins: System Monitor and Performance Logs And Alerts.
Performance Logs And Alerts A snap-in that collects performance data over time
from the local or a remote computer, or has Windows XP alert you when a particular performance threshold is crossed.
process An operating system object that consists of an executable program, a set of
virtual memory addresses, and one or more threads. When a program runs, a process is created.
processor affinity A setting made in Task Manager that determines on which processors (on a multiple-processor computer) a process can run.
System Monitor A snap-in that tracks resource use and network throughput in real
time through the use of objects and counters.
Task Manager A tool that provides information about the programs and processes
running on your computer and the performance of your computer.
19-30
Chapter 19
Monitoring and Optimizing System Performance
Questions and Answers
Lesson 1 Practice: Using Task Manager
Page
19-10
3. Click the Applications tab. Which programs are currently running on your computer?
Answers will vary, but no programs might be running.
7. How many processes are running?
Answers will vary.
11. What percentage of your CPU’s capacity is being used?
Answers will vary but should be low.
12. Do you think that your CPU could be slowing down the performance on your
computer?
Answers might vary, but if the CPU is barely being utilized (such as when WordPad is the only
running application), the CPU does not slow down the performance of the computer.
Lesson 1 Review
Page
19-11
1. Which of the following methods can you use to start Task Manager? (Choose all
that apply.)
a. Press CTRL+ALT+ESC
b. Right-click the Desktop, and then click Task Manager
c. Press CTRL+SHIFT+ESC
d. Press CTRL+ALT+DELETE, and if necessary, click Task Manager
The correct answers are C and D. A and B are not correct because you cannot launch Task Manager by using these methods.
2. Which of the following tabs can be found in Task Manager? (Choose all that
apply.)
a. Networking tab
b. Programs tab
c. Processes tab
d. General tab
The correct answers are A and C. B is not correct because there is no Programs tab in Task
Manager; programs are managed by using the Applications tab. D is not correct because there
is no General tab in Task Manager.
Questions and Answers 19-31
3. What are page faults? Do you think a larger or smaller number of page faults indicates better system performance? Why?
Each time data has to be retrieved from the page file on the hard disk for a process, the data
has been paged out of physical memory. This is known as a page fault. A smaller number of
page faults indicates better system performance because it is faster to retrieve data from RAM
than from a paging file on the hard drive.
4. What does CPU usage represent? In general, is system performance better with a
high CPU usage value or a low value?
CPU usage is the percentage of time that the processor is running a thread other than the idle
thread. You do not want the CPU to be a bottleneck to the computer. If the CPU usage is too
high, it could indicate that the CPU is limiting system performance.
Lesson 2 Practice: Using System Monitor
Page
19-22
1. What objects and counters are monitored by default?
The objects and counters monitored by default are: Memory with the Pages/Sec counter; PhysicalDisk with the Average Disk Queue Length counter; and Processor with the %Processor Time
counter.
5. Which performance object and counter are selected by default?
By default, the Processor object and the %Processor Time counter are selected.
Lesson 2 Review
Page
19-23
1. Which of the following monitoring tools are included in the Performance console?
(Choose all answers that are correct.)
a. System Monitor snap-in
b. Task Manager snap-in
c. Performance Logs And Alerts snap-in
d. Task Scheduler
The correct answers are A and C. B is not correct because Task Manager is a stand-alone tool
(not a snap-in) and is not part of the Performance console. D is not correct because Task
Scheduler is a stand-alone tool and is not part of the Performance console.
2. Why should you monitor resources and overall system performance?
Monitoring resources and overall system performance helps you determine how well your computer is currently performing, detect and eliminate bottlenecks, recognize trends so that you
can plan for future growth and upgrades, and evaluate the effects of tuning and configuration
changes on your computer.
3. What is a baseline, and what is a bottleneck?
A baseline is a measurement derived from collecting data over an extended period of time that
represents resource usage under normal conditions. A bottleneck is any component that slows
down the performance of the entire system.
19-32
Chapter 19
Monitoring and Optimizing System Performance
4. Why do you need to determine a baseline when you monitor system resources
and system performance?
When you monitor system performance, you compare the current performance of the system
with the baseline. If the current system performance is worse than the baseline, you need to
check for bottlenecks. After you have resolved the problem, you again monitor system performance so that you can verify that the action you took actually resolved the bottleneck and
improved system performance.
Case Scenario Exercise
Page
19-24
1. You want to monitor memory, processor, and disk usage over the course of a normal day’s activity on Pat’s computer. Which tool should you use to do this?
You should use the Performance Logs And Alerts snap-in. You should configure a performance
log by using key objects and counters. Ideally, you should configure the Performance Logs And
Alerts snap-in on a different computer from Pat’s and monitor her computer remotely. After completing the log, you can view the results using System Monitor.
2. What objects and counters would you select?
Answers may vary, but you should consider monitoring at least the following objects and
counters: Processor: %Processor Time; Processor: %Interrupts; System: Processor Queue
Length; Memory: Pages/sec; Physical Disk: %Disk Time; and Physical Disk: Avg. Disk Queue
Length.
3. At the end of the day, you use System Monitor to view the log created on Pat’s
computer. You note the following key average counter values:
❑
Memory, Pages/sec: 92
❑
Processor, %Processor Time: 35 percent
❑
Physical Disk, %Disk Time: 73 percent
What do you suspect is causing the performance problem? How would you
resolve it?
These values indicate that the computer is experiencing a shortage of memory. The acceptable
level of Pages/sec is under 20. At the current average rate of 92 Pages/sec, the operating system is spending too much time moving data in and out of physical memory and the paging file.
Also, the %Disk Time statistic indicates a potential hard disk performance issue (73 percent,
and the acceptable maximum value is 50 percent). The hard disk could be a problem, but it is
more likely that the increased paging is causing the hard disk to work much harder than it has
to. Increasing the amount of memory in the computer decreases the amount of paging
required, which in turn decreases the load on the hard disk, which will most likely cause the
%Disk Time counter to drop below the acceptable threshold.
Troubleshooting Lab
Page
19-25
1. Do you notice any values that indicate a bottleneck? If so, list the values and
explain what you would do to troubleshoot the problem.
Answers will vary.
20 Backing Up and
Restoring Data
Exam Objectives in this Chapter:
■
Restore and back up the operating system, System State data, and other user data.
❑
Recover System State data and user data by using Windows Backup.
❑
Recover System State data and user data by using the Recovery Console.
Why This Chapter Matters
Now that you have learned to install Microsoft Windows XP Professional and configure a network, it is important that you ensure that data is not lost. Windows XP
Professional provides the Backup Or Restore Wizard to allow you to back up
data. This chapter introduces you to backing up and restoring data, including
Automated System Recovery.
Lessons in this Chapter:
■
Lesson 1: Using the Backup Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20-2
■
Lesson 2: Backing Up Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-14
■
Lesson 3: Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-26
■
Lesson 4: Using the Automated System Recovery Wizard . . . . . . . . . . . . . . 20-32
Before You Begin
To complete this chapter, you must have a computer that meets the minimum hardware requirements listed in the preface, “About This Book.” You must also have
Microsoft Windows XP Professional installed on the computer.
20-1
20-2
Chapter 20
Backing Up and Restoring Data
Lesson 1: Using the Backup Utility
The efficient recovery of lost data is the end goal of all backup jobs. A backup job is
a single process of backing up data. Regularly backing up the data on server hard disks
and client computer hard disks prevents data loss caused by disk drive failures, power
outages, virus infections, and other such incidents. If data loss occurs, and you have
carefully planned and performed regular backups, you can restore the lost data,
whether it is a single file or an entire hard disk.
After this lesson, you will be able to
■ Describe the Backup utility that is provided in Windows XP Professional
■ Identify the permissions and rights that are required to back up and restore data
■ Plan a backup
■ Select a type of backup operation
■ Change the default backup options in Windows XP Professional
Estimated lesson time: 30 minutes
What Is the Backup Utility?
The Windows Backup utility provides a simple interface for backing up and restoring
data. To access the Backup Or Restore Wizard, on the Start menu, point to All Programs, point to Accessories, point to System Tools, and then click Backup. Alternatively, on the Start menu, you can click Run, type ntbackup, and then click OK.
You can use Backup in two modes:
Wizard mode In Wizard mode, Backup steps you through the process of backing up
or restoring your data.
Advanced mode In Advanced mode, Backup presents a more traditional backup
interface for selecting files and backup locations.
The Backup Or Restore Wizard
In Wizard mode, you will use the Backup Or Restore Wizard, shown in Figure 20-1, to
back up or restore data. By default, Backup launches the Backup Or Restore Wizard
when you launch the utility. You can use the Backup Or Restore Wizard to back up
data manually or to schedule unattended backup jobs on a regular basis. You can back
up data to a file or to a tape. Files can be stored on hard disks, in shared folders on a
network, or on drives with removable media (such as Iomega Zip and Jaz drives or
tape drives).
Lesson 1
Using the Backup Utility
20-3
Note Windows Backup does not support writing directly to a CD-ROM or DVD during the
backup process. However, you can back up to a hard drive and then manually copy the backup
file to optical media.
F20us01
Figure 20-1
Use the Backup Or Restore Wizard to easily back up data.
On the Welcome To The Backup Or Restore Wizard page, click Next. The Backup Or
Restore page allows you to specify whether you want to back up files and settings or
restore files and settings.
Advanced Mode
You can also use the Backup utility in Advanced mode, shown in Figure 20-2, by clicking Advanced Mode on the Backup Or Restore Wizard’s Welcome page. If you want to
have Backup start in Advanced mode each time you start the program, clear the Always
Start In Wizard Mode check box on the Welcome Page before clicking Advanced Mode.
As you will learn in Lesson 2, “Backing Up Data,” Advanced mode provides access to
a number of options that you cannot access by using the Backup Or Restore Wizard.
20-4
Chapter 20
Backing Up and Restoring Data
F20us02
Figure 20-2
Use Advanced mode for a more traditional approach to backing up and restoring data.
Who Can Back Up and Restore Data?
To successfully back up and restore data on a computer running Windows XP Professional, you must have the appropriate permissions and user rights, as described in the
following list:
!
■
All users can back up their own files and folders. They can also back up files for
which they have the Read, Read and Execute, Modify, or Full Control permission.
■
All users can restore files and folders for which they have the Write, Modify, or Full
Control permission.
■
Any user who is assigned the Backup Files and Directories right can back up data.
Any user who is assigned the Restore Files And Directories user right can restore
backed up data.
■
Members of the Administrators and Backup Operators groups can back up and
restore all files (regardless of the assigned permissions). By default, members of
these groups have the Backup Files And Directories and Restore Files And Directories user rights.
Exam Tip
To back up all data on a computer regardless of the assigned permissions to
that data, you must use a user account that has the Backup Files And Directories user right
assigned. To restore data, you must use a user account that has the Restore Files And Directories user right assigned. Members of the Administrators and Backup Operators local groups
have these rights by default.
Lesson 1
Using the Backup Utility
20-5
How to Plan a Backup
You should plan your backup jobs to fit the needs of your company. The primary goal
of backing up data is to be able to restore that data if necessary, so any backup plan
that you develop should incorporate how you restore data. You should be able to
quickly and successfully restore critical lost data. There is no single correct backup
plan for all networks.
Consider the following guidelines in formulating your backup plan.
Determine What to Back Up
Always back up critical files and folders, such as user-created documents, sales and
financial records, and the System State (the Windows Registry and a number of critical
configurations). Also, identify application settings and documents that will be required
to restore a user’s desktop environment, including bookmarks, browser cookies, templates, and application settings.
Determine How Often to Back Up
If data is critical for company operations, back it up daily. If users create or modify
reports once a week, backing up the reports weekly is sufficient. You need to back up
data only as often as it changes. For example, there is no need to do daily backups on
files that rarely change, such as monthly reports or the Windows XP Professional operating system files.
In summary, you should choose your backup frequency by thinking about how much
data you can lose in the event of a hard disk failure. If you do not mind losing a week’s
worth of data, you can back up your data once per week. In environments in which
data is extremely valuable, files can be backed up multiple times per day.
Determine Which Target Media to Use for Storing Backup Data
With the Backup Utility, you can back up to the following:
File
You can back up data to a backup file, which Backup can write to a hard drive,
removable media drive (such as an Iomega Zip drive), or network location (such
as a file server). The file that is created has the .bkf extension and contains the files
and folders that you have selected to back up.
20-6
Chapter 20
Backing Up and Restoring Data
Tape In the past, tape proved to be a more convenient and less expensive backup
medium for large backup jobs because tapes had a high storage capacity and relatively low cost compared with other media. Today, with the higher capacity and
lower cost of hard disks, a disk-based backup system is usually a more efficient
and more cost-effective solution. Many networks use removable hard drive solutions instead of tape backup systems so that they can store backups offsite and
create rotating backup systems. In addition to costing more than modern hard
disks, tapes have a limited life and can deteriorate.
Note
If you use a removable media device to back up and restore data, be sure that you
verify that the device is supported in the Windows Catalog.
Determine Whether to Perform Network or Local Backup Jobs
A network backup can contain data from multiple computers on the network. This
allows you to consolidate backup data from multiple computers to a single location. A
network backup also allows one administrator to back up the entire network. Whether
you perform a network or local backup job depends on the data that must be backed
up. For example, you can back up the System State data only at the computer where
you are performing the backup.
!
Exam Tip
Backup allows you to back up data from or to shared folders on remote computers. Backup cannot write backup files directly to a CD-ROM or DVD.
If you decide to perform local backups, you must perform a local backup at each client
computer. There are several issues to consider when performing local backups. First,
you must move from computer to computer so that you can perform a backup at each
computer, rely on users to back up their own computers, or schedule automated backups. Most users fail to back up their data on a regular basis.
A second consideration with local backups is the storage location. It is impractical to
install removable storage media devices on every client computer, so backing up to a
file server is often more appropriate. If you use removable storage media devices, such
as tape drives, you must have one for each computer, or you must move the tape drive
from computer to computer so that you can perform a local backup on each computer.
Lesson 1
Using the Backup Utility
20-7
You might also choose to use a combination of network and local backup jobs. Do this
when critical data resides on client computers and servers and you do not have a
removable storage media device for each computer. In this situation, users should perform a local backup and store their backup files on a server. You then back up the
server.
Real World Backups on Large Networks
If you are working for a company with a large network, it is likely that a sophisticated backup infrastructure is already in place. More than likely, users store their
important documents on file servers rather than on their local computers, and
those file servers are backed up daily. Make sure you understand the backup system that exists on a network before you create a backup plan of your own.
On large networks, you are more likely to use the Backup utility as a precaution
before troubleshooting users’ computers—an extra step to make sure that you
can restore the computer should troubleshooting go wrong. On smaller networks,
it may still be advantageous to centralize user documents on a file server, but
more likely users will store documents on their own computers. In this case, you
should consider backing up client computers to a file server daily and also backing up the data on the file server to a removable storage medium.
Another challenge of backing up large networks is planning for notebook computers. Notebook users often disconnect their computer from the network to take
their computers home at night or on trips with them. As a result, notebooks do
not always fit into the same backup scheme as desktop computers. Although
notebook users can connect to the network and initiate a more traditional backup
to a network server, you should consider planning for a backup system that notebook users can use while they are disconnected from the main network. Depending on the amount of data that a notebook user stores, you might consider
providing users with an external hard drive or a CD writer, or even have them
connect to the company network (or an Internet backup location) periodically to
back up data. If notebook users have small numbers of files that they work on
while away, they can even back data up by e-mail.
Types of Backup Operations
The Backup Utility provides five types of backup operations that define which data
is backed up, such as only those files that have changed since the last backup (see
Figure 20-3).
20-8
Chapter 20
Backing Up and Restoring Data
F20us03
Figure 20-3
Choose one of the available backup types.
Some backup types use backup markers, also known as archive attributes, which
mark a file as having changed. When a file changes, an attribute is set on the file that
indicates that the file has changed since the last backup. When you back up the file,
this clears or resets the attribute. Types of backups include the following:
Normal During a normal backup, all the selected files and folders are backed up.
A normal backup does not rely on markers to determine which files to back up.
During a normal backup, any existing markers are cleared and each file is marked
as having been backed up. Normal backups speed up the restore process because
the backup files are the most current, and you do not need to restore multiple
backup jobs.
Copy During a copy backup, all the selected files and folders are backed up. A copy
backup neither looks for nor clears markers. If you do not want to clear markers
and affect other backup types, use a copy backup. For example, use a copy
backup between a normal and an incremental backup to create an archival snapshot of network data.
Incremental During an incremental backup, only the selected files and folders
that have a marker are backed up, and then the backup clears markers. Because
an incremental backup clears markers, if you did two consecutive incremental
backups on a file and nothing changed in the file, the file would not be backed up
the second time.
Differential During a differential backup, only the selected files and folders that
have a marker are backed up, but the backup does not clear markers. Because a
differential backup does not clear markers, if you did two consecutive differential
backups on a file and nothing changed in the file, the entire file would be backed
up each time.
Lesson 1
Using the Backup Utility
20-9
Daily During a daily backup, all the selected files and folders that have changed during the day are backed up. This backup neither looks for nor clears markers. If
you want to back up all files and folders that change during the day, use a daily
backup.
Combining Backup Types
An effective backup strategy is likely to combine different backup types. Some backup
types require more time to back up data but less time to restore data. Conversely, other
backup types require less time to back up data but more time to restore data. If you
combine backup types, markers are critical. Incremental and differential backups
check for and rely on the markers.
The following are some examples of combining different backup types:
Normal and differential backups On Monday, a normal backup is performed; on
Tuesday through Friday, differential backups are performed. Differential backups
do not clear markers, which means that each backup includes all changes since
Monday. If data becomes corrupt on Friday, you need only to restore the normal
backup from Monday and the differential backup from Thursday. This strategy
takes more time to back up but less time to restore.
Normal and incremental backups On Monday, a normal backup is performed; on
Tuesday through Friday, incremental backups are performed. Incremental backups clear markers, which means that each backup includes only the files that
changed since the previous backup. If data becomes corrupt on Friday, you need
to restore the normal backup from Monday and all incremental backups, from
Tuesday through Friday. This strategy takes less time to back up but more time to
restore.
Off the Record Although you should remember for the exam that differential backups have
the quickest restore time, and incremental backups have the quickest backup time, this is
sometimes not true in practice. Because users tend to work on the same files each day for
extended periods (particular documents or spreadsheets for a project, for example), differential and incremental backups end up backing up the same files. If this is the case for a particular user, you might as well save time during the restore and simply use differential backups.
Normal, differential, and copy backups This strategy is the same as the first example that used normal and differential backups except that on Wednesday you perform a copy backup. Copy backups include all selected files and do not clear
markers or interrupt the usual backup schedule. Therefore, each differential backup
includes all changes since Monday. The copy backup done on Wednesday is not
part of the Friday restore. Copy backups are helpful when you need to create a
snapshot of your data and do not want to interrupt the normal backup routine.
20-10
Chapter 20
!
Backing Up and Restoring Data
Exam Tip
Performing regular normal backups takes the most time during the backup
phase but the least time and effort during the restore phase. Using a normal backup and
incremental backups takes the least time during the backup phase but takes the most time
and effort during the restore phase. Using a normal backup plus differential backups takes
more time to back up than using incremental backups (although less than using only normal
backups) but takes less time during the restore phase than using incremental backups.
How to Change Default Backup Options
Backup allows you to change the default settings for all backup-and-restore jobs.
These default settings are on the tabs in the Options dialog box. To access the Options
dialog box, on the Welcome To The Backup Or Restore Wizard page, click Advanced
Mode; then, on the Tools menu, click Options.
The following list provides an overview of the settings for the Backup Utility:
General tab These settings affect data verification, the status information for
backup-and-restore jobs, alert messages, and what is backed up. Figure 20-4
shows the default settings for the options on the General tab. You should select
the Verify Data After The Backup Completes check box because it is critical that
your backup data not be corrupt.
F20us04
Figure 20-4
Change backup options on the General tab of the Options dialog box.
Lesson 1
Using the Backup Utility 20-11
Restore tab These settings affect what happens when the file to restore is identical
to an existing file. Figure 20-5 shows the available settings; the default setting is
selected.
F20us05
Figure 20-5 Change restore options on the Restore tab of the Options dialog box.
Backup Type tab These settings affect the default backup type when you perform a
backup job. The settings that you select depend on how often you back up, how
quickly you want to restore, and how much storage space you have. The backup
types are Normal (which is the default), Copy, Differential, Incremental, and Daily.
Backup Log tab These settings affect the amount of information that is included in
the backup log. The default setting is Summary, which logs key operations such as
loading the tape, starting the backup, or failing to open a file. Two additional settings are available: Detailed, which logs all information, including the names of
the files and folders; and None, which turns off logging.
Exclude Files tab
These settings affect which files are excluded from backup jobs.
You can modify some default settings in the Backup Or Restore Wizard for a specific
backup job. For example, the default backup type is normal, but you can change it to
another backup type in the Backup Or Restore Wizard. However, the next time that
you run the Backup Or Restore Wizard, the default backup type (normal) is selected.
20-12
Chapter 20
Backing Up and Restoring Data
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. How do you access the Backup Or Restore Wizard?
2. What two operations can you perform using the Backup Or Restore Wizard?
3. What is the primary goal of backing up data?
4. If you want to perform a backup but do not want to clear markers or affect other
backup types, you should perform a(n) ____________ backup.
5. During a(n) ____________ backup, only selected files and folders that have a
marker are backed up, but the backup does not clear markers. If you performed
two of these backups in a row on a file and nothing changed in the file, the entire
file would be backed up each time.
6. How can you change the default settings for backup-and-restores for all backupand-restore operations by using the Backup Utility?
7. You performed a normal backup on Monday. For the remaining days of the week,
you want to back up only files and folders that have changed since the previous
day. Which backup type do you select? Why?
Lesson 1
Using the Backup Utility 20-13
Lesson Summary
■
The Backup utility offers two modes: Wizard mode, which steps you through a
backup or restore, and Advanced mode, which provides a more traditional
backup interface and access to more options.
■
To back up or restore data, you must have the appropriate rights and permissions.
All users can back up files for which they have at least Read permissions and
restore files for which they have at least Write permissions. Any user who is
assigned the Backup Files and Directories right can back up data regardless of the
assigned permissions. Any user who is assigned the Restore Files And Directories
user right can restore backed up data. By default, members of the Administrators
and Backup Operators groups have these rights.
■
Planning backups includes determining what to back up, how often to back it up,
and where the backup file is written.
■
The Backup utility provides five types of backup: normal, copy, differential, incremental, and daily.
■
The Backup Utility has default settings that apply to all backup-and-restore operations. The tabs in the Options dialog box for the Backup Utility allow you to
change the default settings for the Backup Utility.
20-14
Chapter 20
Backing Up and Restoring Data
Lesson 2: Backing Up Data
After you have planned your backup, including planning the type of backup to use and
when to perform backup jobs, the next step is to prepare to back up your data. You
must complete certain preliminary tasks before you can back up your data. After completing these tasks, you can perform a backup or schedule an unattended backup.
After this lesson, you will be able to
■ Identify preliminary tasks to accomplish prior to backing up
■ Select files and folders to back up
■ Specify a backup destination, media settings, and advanced settings
■ Schedule a backup job
Estimated lesson time: 50 minutes
Preliminary Tasks
An important part of each backup job is performing the preliminary tasks, which
includes ensuring that the files that you want to back up are closed. You should notify
users to close files before you begin backing up data. You can use e-mail or the Send
Console Message dialog box in the Computer Management snap-in to send administrative messages to users.
You can send a console message as follows:
1. On the Start menu, right-click My Computer, and then click Manage.
2. On the Action menu, click All Tasks, and then click Send Console Message.
The Send Console Message dialog box appears (see Figure 20-6).
F20us06
Figure 20-6
Use the Send Console Message dialog box to notify users before backing up.
Lesson 2
Backing Up Data 20-15
1. Type the desired message in the Message text box. Note the recipients in the
Recipients box. You can add or remove recipients.
2. Click Send to send the message to the listed recipients.
Note Sending a console message requires that the Messenger service be running on the
computer that receives the message. In Windows XP with Service Pack 2, the Messenger service is disabled by default. You must enable the service on a computer before that computer
can receive messages.
If you back up to a removable media device, make sure that the following preliminary
tasks are complete:
■
The backup device is attached to a computer on the network and is turned on. If
you are backing up to tape, you must attach the tape device to the computer on
which you run the Backup Utility.
■
The media device is listed in the Windows Catalog.
■
The media is loaded in the media device and properly prepared. For example, if
you are using a tape drive, ensure that a tape is loaded in the tape drive. You
might need to format a tape before backing up.
How to Select Files and Folders to Back Up
After you complete the preliminary tasks, you are ready to perform the backup. You can
use the Backup Or Restore Wizard (refer to Figure 20-1). To start the Backup Or Restore
Wizard, click Start, point to All Programs, point to Accessories, point to System Tools, and
then click Backup. Click Next to close the Welcome To The Backup Or Restore Wizard
page. On the Backup Or Restore page, ensure that Back Up Files And Settings is selected,
and click Next to display the What To Back Up page, as shown in Figure 20-7.
Specify what to back up by choosing one of the following options:
My Documents And Settings Backs up the My Documents folder, along with the
Favorites folder, desktop, and cookies of the current user. This is the default
selection.
Everyone’s Documents And Settings Backs up the My Documents folder, along
with the Favorites folders, desktop, and cookies of all users.
All Information On This Computer Backs up all files on the computer on which
you are running the Backup Utility except those files that the Backup Utility
excludes by default, such as certain power management files. Selecting this option
also backs up the System State data, which includes the Windows Registry and
important configuration files. Selecting this option also creates a system recovery
20-16
Chapter 20
Backing Up and Restoring Data
disk that you can use to restore Windows in the case of a major failure. Read Lesson 4, “Using the Automated System Recovery Wizard,” for more information
about system recovery disks.
Let Me Choose What To Back Up Backs up selected files and folders. This includes
files and folders on the computer where you run the Backup Utility and any
shared file or folder on the network. When you click this option, the Backup Or
Restore Wizard provides a hierarchical view of the computer and the network
(through My Network Places).
F20us07
Figure 20-7
Select files and folders on the What To Back Up page.
How to Specify Backup Destination, Media Settings, and Advanced
Settings
After you select what you want to back up, you must provide information about
backup media. Table 20-1 describes the information that you must provide on the
Backup Type, Destination, And Name page.
Table 20-1
Backup Type, Destination, And Name Page Options
Option
Description
Select The Backup Type
The target medium to use, such as a tape or file. A file can be
located on any disk-based media, including a hard disk, a shared
network folder, or a removable disk, such as an Iomega Zip drive.
Choose A Place To Save
Your Backup
The location where the Backup Utility will store the data. For a tape,
enter the tape name. For a file, enter the path for the backup file.
Type A Name For This
Backup
The name of the backup. If it is a file name, the extension .bkf is
appended automatically.
Lesson 2
Backing Up Data 20-17
After you provide the media information, the Backup Or Restore Wizard displays the
Completing The Backup Or Restore Wizard page, and you have the opportunity to do
either of the following:
Start the backup If you click Finish, during the backup process, the Backup Or
Restore Wizard displays status information about the backup job in the Backup
Progress dialog box.
Specify advanced backup options If you click Advanced, the Backup Or Restore
Wizard allows you to select the advanced backup settings listed in Table 20-2.
Table 20-2
Advanced Backup Settings
Advanced option
Description
Select The Type Of Backup
Allows you to choose the backup type that is used for this
backup job. Select one of the following types: normal,
copy, incremental, differential, or daily.
Verify Data After
Backup
Confirms that files are correctly backed up. The Backup
Utility compares the backup data and the source data to
verify that they are the same. This option is recommended.
Use Hardware
Compression,
If Available
Enables hardware compression for tape devices that support it. If your tape device does not support hardware compression, this option is unavailable.
Disable Volume Shadow Copy
Allows files to be backed up even though they are in the
process of being written to. By default, the Backup Utility
will use volume shadow copies because this check box is
cleared.
If The Archive Media Already
Contains Backups:
Append This Backup To The
Existing Backups
Choose this option to store multiple backup jobs on a
storage device.
or
Replace The Existing Backups
Choose this option if you do not need to save previous
backup jobs and you want to save only the most recent
backup data.
Allow Only The Owner And The
Administrator Access To The
Backup Data And Any Backups
Appended To This Medium
Allows you to restrict who can gain access to the completed backup file or tape. This option is available only if
you choose to replace an existing backup on a backup
medium, rather than appending to the backup medium. If
you back up the Registry or Active Directory directory services, click this option to prevent others from getting copies of the backup job.
When To Backup
Allows you to specify Now or Later. If you select Later, you
specify the job name and the start date. You can also set
the schedule.
20-18
Chapter 20
Backing Up and Restoring Data
When you specify advanced backup settings that cover the backup media and characteristics of the backup job, you are changing the default backup settings for only the
current backup job.
Depending on whether you chose to back up now or later, the Backup Or Restore Wizard provides you with the opportunity to do either of the following:
■
If you chose to finish the backup process, the Backup Or Restore Wizard displays
the Completing The Backup Or Restore Wizard page and then presents the option
to finish and immediately start the backup. During the backup, the wizard displays
status information about the backup job.
■
If you chose to back up later, you are shown additional dialog boxes to schedule
the backup process to occur later, as described in the next section.
Note
When the backup process is complete, you can choose to review the backup log, a
text file that records backup operations. The backup log is stored on the hard disk of the computer on which you are running the Backup Utility.
How to Schedule Backup Jobs
Scheduling a backup job means that you can have an unattended backup job occur on
a regular basis (or even occur just once at a later time). To enable this, Windows XP
Professional integrates the Backup Utility with the Task Scheduler service. (See Chapter
18, “Using Windows XP Tools,” for more on Task Scheduler.)
You can schedule a backup as follows:
1. Click Later on the When To Back Up page of the Backup Or Restore Wizard.
Task Scheduler presents the Set Account Information dialog box, prompting you
for your password. The user account must have the appropriate user rights and
permissions to perform backup jobs on the selected data.
2. Enter your password in the Password text box and Confirm Password text box,
and then click OK.
Task Scheduler displays the When To Back Up page. You must provide a name for
the backup job, and by default, the wizard displays the current date and time for
the start date.
3. Type an appropriate name in the Job Name text box.
4. Click Set Schedule to set a different start date and time. This selection causes Task
Scheduler to display the Schedule Job dialog box.
Lesson 2
Backing Up Data 20-19
In the Schedule Job dialog box, you can set the date, time, and number of occurrences for the backup job to repeat, such as every Friday at 10:00 P.M. You can
also display all of the scheduled tasks for the computer by selecting the Show Multiple Schedules check box. This helps prevent you from scheduling multiple tasks
on the same computer at the same time.
You can also click Advanced to schedule how long the backup can last and for how
many days, weeks, months, or years you want this schedule to continue.
After you schedule the backup job and complete the Backup Or Restore Wizard, the
Backup Utility places the backup job on the calendar on the Schedule Jobs tab in Windows Backup. The backup job automatically starts at the time that you specified.
Offsite Backups
As you are learning in this chapter, backing up your data is a critical part of ensuring that you can recover from disaster. On many networks, administrators tend to
leave backed up data close to the location where backups are created. Administrators might leave data on a network drive, assuming that because the data exists
in two separate locations (in the original location and on drive where it is backed
up), it is safe. Even when a removable backup medium is used, all too often
administrators leave that medium in the same room as the backup server—tapes
on a shelf or in a locking cabinet, for example.
Although this practice provides a certain level of assurance that you can recover
data if a user’s computer (or even the backup server itself) crashes, you should
take the extra measure of keeping a copy of backed up data in an offsite storage
location. It is best to keep a copy of data in a fire-resistant safe in a completely
different building from your network. Keeping offsite backups requires more
effort, but in the event of a true catastrophe (such as a fire or natural disaster), an
offsite backup can be a real life saver.
Practice: Backing Up Data
In this practice, you use the Backup Or Restore Wizard to back up some files to your
hard disk. You then create a backup job to perform a backup operation at a later time
by using Task Scheduler.
Exercise 1: Back Up Files by Using the Backup Or Restore Wizard
1. Log on with an account that is a member of the Administrators or Backup Operators group or that has the Backup Files and Directories user right.
2. Click Start, point to All Programs, point to Accessories, point to System Tools, and
then click Backup.
20-20
Chapter 20
Backing Up and Restoring Data
3. On the Welcome To The Backup Or Restore Wizard page, click Next.
The Backup Or Restore Wizard displays the Backup Or Restore page.
4. Ensure that Back Up Files And Settings is selected, and click Next.
The Backup Or Restore Wizard displays the What To Back Up page, prompting
you to choose the scope of the backup job.
5. Click Let Me Choose What To Back Up, and then click Next to continue.
The Backup Or Restore Wizard displays the Items To Back Up page, prompting
you to select the local and network drives, folders, and files to be backed up.
6. Click the plus sign in front of My Computer to expand it, and then click drive C.
Do not select the check box next to drive C. Selecting this check box would back
up the entire drive.
7. In the details pane, select the check box next to the Autoexec.bat file.
There should be a check mark in the check box in front of the file name
Autoexec.bat.
8. Click Next to continue.
The Backup Or Restore Wizard displays the Backup Type, Destination, And Name
page.
Note
If no tape drive is connected to your computer, Select The Backup Type is set to File
and is unavailable for you to change.
9. Ensure that Select The Backup Type is set to File.
The Choose A Place To Save Your Backup box is set to 3½ Floppy (A:) by default.
The Type A Name For This Backup box is set to Backup by default.
10. For the Choose A Place To Save Your Backup box, click Browse.
11. If there is no floppy disk in drive A, Windows displays an Insert Disk dialog box
asking you to insert a disk. Click Cancel.
12. In the Save As dialog box, click the down-pointing arrow at the end of the Save In
text box and click Local Disk (C:).
13. In the File Name text box, type backup1 and click Save.
Note
You would not normally back up files from a drive to a file on that same drive, as is
done in this exercise, unless you planned to transfer that file to another location.
14. Click Next to continue.
Lesson 2
Backing Up Data 20-21
The Backup Or Restore Wizard displays the Completing The Backup Or Restore
Wizard page, prompting you to finish the wizard and begin the backup job or to
specify advanced options.
15. Click Advanced to specify additional backup options.
The Backup Or Restore Wizard displays the Type Of Backup page, prompting you
to select a backup type for this backup job.
16. Ensure that Normal is selected in the Select The Type Of Backup list box, and click
Next.
The Backup Or Restore Wizard displays the How To Back Up page.
17. Select the Verify Data After Backup check box to confirm that the files are correctly backed up.
Note
If the Use Hardware Compression, If Available check box is unavailable, either you do
not have a tape drive or your tape device does not support hardware compression.
18. Click Next.
The Backup Or Restore Wizard displays the Backup Options page.
19. Click Replace The Existing Backups.
20. Ensure that the Allow Only The Owner And The Administrator Access To The
Backup Data And To Any Backups Appended To This Media check box is not
selected, and then click Next.
The Backup Or Restore Wizard displays the When To Back Up page.
21. Make sure that Now is selected, and then click Next.
The Backup Or Restore Wizard displays the Completing The Backup Or Restore
Wizard page.
22. Review the options and settings that you selected for this backup job, and then
click Finish to start the backup job.
The Backup Utility briefly displays the Selection Information dialog box, indicating the estimated amount of data for, and the time to complete, the backup job.
Because of the speed of your computer and the small number of files to back up,
you might not see this dialog box. In the Backup Progress dialog box, the Backup
Utility displays the status of the backup operation, statistics on the estimated and
actual amount of data being processed, the time that has elapsed, and the estimated time that remains for the backup operation.
20-22
Chapter 20
Backing Up and Restoring Data
Exercise 2: Viewing a Backup Report
1. When the Backup Progress dialog box indicates that the backup is complete, click
Report.
Notepad starts, displaying the backup report. The backup report contains key
details about the backup operation, such as the time that it started and how many
files were backed up.
2. Examine the report, and when you are finished, quit Notepad.
3. In the Backup Progress dialog box, click Close.
Exercise 3: Creating and Running an Unattended Backup Job
1. Click Start, point to All Programs, point to Accessories, point to System Tools, and
then click Backup.
2. On the Welcome To The Backup Or Restore Wizard page, click Next.
3. On the Backup Or Restore page, ensure that Back Up Files And Settings is
selected, and click Next.
4. On the What To Back Up page, click Let Me Choose What To Back Up, and then
click Next to continue.
5. On the Items To Back Up page, expand My Computer, expand drive C, and then
select the System Volume Information check box.
6. Click Next to continue.
7. On the Backup Type, Destination, And Name page, in the Choose A Place To Save
Your Backup list box, click Browse.
8. If there is no floppy disk in drive A, Windows displays an Insert Disk dialog box
asking you to insert a disk. Click Cancel.
9. In the Save As dialog box, click the down-pointing arrow at the end of the Save In
text box, and click Local Disk (C:).
10. In the File Name text box, type backup2 and click Save.
11. Click Next.
12. On the Completing The Backup Or Restore Wizard page, click Advanced to specify additional backup options.
13. On the Type Of Backup page, ensure that Normal is selected in the Select The
Type Of Backup list box, and then click Next.
Lesson 2
Backing Up Data 20-23
14. On the How To Back Up page, select the Verify Data After Backup check box, and
then click Next.
15. On the Backup Options page, click Replace The Existing Backups.
16. Ensure that the Allow Only The Owner And The Administrator Access To The
Backup Data And To Any Backups Appended To This Medium check box is not
selected, and then click Next.
17. On the When To Backup page, click Later.
The Backup Or Restore Wizard makes the Schedule Entry box available.
18. In the Job Name text box, type SysVol Info Backup and then click Set Schedule.
The Backup Or Restore Wizard displays the Schedule Job dialog box, prompting
you to select the start time and schedule options for the backup job.
19. In the Schedule Task box, ensure that Once is selected, and in the Start Time text
box, enter a time three minutes from the present time, and then click OK.
20. In the When To Back Up dialog box, click Next to continue.
The Backup Or Restore Wizard displays the Set Account Information dialog box.
For purposes of this exercise, use the Administrator account to run the scheduled
backup job.
21. In the Set Account Information dialog box, enter the name of an account with the
appropriate rights and permissions (for example, the Administrator account), enter
and confirm the password, and then click OK.
22. Click OK.
The Backup Or Restore Wizard displays the Account Information Warning dialog
box.
23. Click OK to continue.
24. Review the information on the Completing The Backup Or Restore Wizard page,
and then click Finish to schedule the backup job.
When the time for the backup job is reached, the Backup Utility starts and performs the requested backup operation. To verify that the backup job was performed, locate the BACKUP2.BKF file on the root of the C drive.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
20-24
Chapter 20
Backing Up and Restoring Data
1. What are the four choices on the What To Back Up page of the Backup Or Restore
Wizard and what does each choice allow you to do?
2. When should you select the Allow Only The Owner And The Administrator Access
To The Backup Data And Any Backups Appended To This Media check box?
3. If your boss wants daily backups to occur at 1:00 A.M., what could you do to save
yourself the trouble of having to go to the office each morning at 1:00 A.M. to do
the backups?
4. If you do not have a tape drive, can you still perform backups? How?
Lesson 2
Backing Up Data 20-25
5. Why should you e-mail or send a console message to users before you begin a
backup?
Lesson Summary
■
Before beginning a backup, it is best to make sure that users have all files closed.
If you are backing up to removable media, you might need to make sure that the
media is properly prepared to receive a backup.
■
The Backup Utility allows you to back up everything on the computer; to specify
selected files, drives, or network data; or to back up only the System State data.
■
The Backup Utility allows you to provide the target destination and the backup
media or file name.
■
The Backup Or Restore Wizard Advanced backup settings include the following
options: selecting the type of backup operation to perform, verifying data after
backup, using hardware compression, and scheduling the backup to run at a later
time or to run at regularly scheduled times.
20-26
Chapter 20
Backing Up and Restoring Data
Lesson 3: Restoring Data
In this lesson, you learn about restoring data. The ability to restore corrupt or lost data
is critical to all corporations and is the goal of all backup jobs. To ensure that you can
successfully restore data, you should follow certain guidelines, such as keeping thorough documentation on all of your backup jobs and performing test restores on a regular basis.
After this lesson, you will be able to
■ Prepare to restore data
■ Select backup sets, files, and folders to restore
■ Specify advanced restore settings
Estimated lesson time: 30 minutes
How to Prepare to Restore Data
To restore data, you must select the backup sets, files, and folders to restore. You can
also specify additional settings based on your restore requirements. The Backup Or
Restore Wizard helps you restore data.
When critical data is lost, you need to restore it quickly. Use the following guidelines
to help prepare for restoring data:
■
Base your restore strategy on the backup type that you used for the backup. If
time is critical when you are restoring data, your restore strategy must ensure that
the backup types that you choose for backups expedite the restore process. For
example, use normal and differential backups so that you need to restore only the
last normal backup and the last differential backup. If you have a reasonably fast
backup device, you might want to perform daily normal backups so that you need
to restore from only one backup set.
■
Perform a trial restore periodically to verify that your backups are functioning correctly. A trial restore can uncover hardware problems that do not show up with
software verifications. Restore the data to an alternate location, and then compare
the restored data with the data on the original hard disk.
■
Keep documentation for each backup job. Create and print a detailed backup log
for each backup job, containing a record of all files and folders that were backed
up. By using the backup log, you can quickly locate which piece of media contains the files that you need to restore without having to load the catalogs. A catalog is an index of the files and folders from a backup job that Windows XP
Professional automatically creates and stores with the backup job and on the computer running the Backup Utility.
Lesson 3
■
Restoring Data 20-27
Keep a record of multiple backup jobs in a calendar format that shows the days on
which you perform the backup jobs. For each job, note the backup type and identify the storage that is used, such as a tape number or the name of the Iomega Zip
disk. Then, if you need to restore data, you can easily review several weeks’ worth
of backup jobs to select which tape or disk to use.
How to Select Backup Sets, Files, and Folders to Restore
The first step in restoring data is to select the data to restore. You can select individual
files and folders, an entire backup job, or a backup set, which is a collection of files or
folders from one volume that you back up during a backup job. If you back up two
volumes on a hard disk during a backup job, the job has two backup sets. You select
the data to restore in the catalog.
To restore data, use the Restore Wizard, which you access through the Backup Utility,
as follows:
1. In the Backup Or Restore Wizard, on the Backup Or Restore page, select Restore
Files And Settings, and then click Next.
2. On the What To Restore page, expand the media type that contains the data that
you want to restore. This can be either tape or file media.
3. Expand the appropriate media set until the data that you want to restore is visible.
You can restore a backup set or specific files and folders.
4. Select the data that you want to restore, and then click Next.
The Backup Or Restore Wizard displays the settings for the restore.
5. Do one of the following:
❑
Finish the restore process. If you choose to finish the restore job, during the
restore, the Backup Or Restore Wizard requests verification for the source of
the restore media and then performs the restore. During the restore, the
Backup Or Restore Wizard displays status information about the restore.
❑
Specify advanced restore options. These options are covered in the following
section.
How to Specify Advanced Restore Settings
The advanced settings in the Backup Or Restore Wizard vary, depending on the type
of backup media from which you are restoring. Table 20-3 describes the advanced
restore options.
20-28
Chapter 20
Backing Up and Restoring Data
Table 20-3
Advanced Restore Settings
Option
Description
Restore Files To
The target location for the data that you are restoring. The choices are as
follows:
■ Original Location Replaces corrupted or lost data by copying
files from the backup to their original location on the hard drive.
■ Alternate Location Restores files to a separate location from
the original files but maintains the hierarchy of folders backed up.
Use this option to restore an older version of a file or to perform
a test restore.
■ Single Folder Consolidates the files from a tree structure into a
single folder. For example, use this option if you want copies of
specific files but do not want to restore the hierarchical structure
of the files.
If you select either an alternate location or a single directory, you must
provide the path.
When Restoring
Files That
Already Exist On
Your Computer
Determines whether Backup should overwrite existing files. The choices
are as follows:
■ Leave Existing Files (Recommended) Prevents accidental
overwriting of existing data. This setting is the default.
■ Replace Existing Files If They Are Older Than The Backup
Files Verifies that the most recent copy exists on the computer.
■ Replace Existing Files The Backup Utility does not provide a
confirmation message if it encounters a duplicate file name during the restore operation.
Select The Options
You Want To Use
Determines whether Backup should restore security or special system
files. The choices are as follows:
■ Restore Security Settings Applies the original permissions to
files that you are restoring to an NTFS File System volume. Security settings include access permissions, audit entries, and ownership. This option is available only if you have backed up data
from an NTFS volume and are restoring to an NTFS volume.
■ Restore Junction Points, But Not The Folders And File Data
They Reference Restores junction points on your hard disk as
well as the data that the junction points refer to. If you have any
mounted drives, and you want to restore the data that mounted
drives point to, select this check box. If you do not select this
check box, the junction point is restored, but the data your junction point refers to might not be accessible.
■ Preserve Existing Volume Mount Points Prevents the operation from writing over any volume mount points that you have
created on the partition or volume to which you are restoring
data. This option is primarily applicable when you are restoring
data to an entire drive or partition.
Lesson 3
Restoring Data 20-29
After you have finished the Backup Or Restore Wizard, the Backup Utility does the
following:
■
Prompts you to verify your selection of the source media to use to restore data.
After the verification, the Backup Utility starts the restore process.
■
Displays status information about the restore process. As with a backup process,
you can choose to view the report (restore log) of the restore. It contains information about the restore, such as the number of files that have been restored and the
duration of the restore process.
Practice: Restoring Data
In this practice, you restore the Backup1.bkf file that you created in Exercise 1 in the
practice in Lesson 2 of this chapter.
Important
To complete this practice, you must have completed the practice in the previous
lesson, or you must have some files you have backed up by using the Backup Utility that you
can restore.
1. Log on with an account that has the permissions or rights to restore the file. For
the purposes of this exercise, log on as a member of the Administrators group.
2. Click Start, point to All Programs, point to Accessories, point to System Tools, and
then click Backup.
3. On the Welcome To The Backup Or Restore Wizard page, click Next.
4. On the Backup Or Restore page, click Restore Files And Settings, and then click
Next.
The Backup Or Restore Wizard displays the What To Restore page.
5. In the What To Restore box, expand the File node that you created.
Notice that Backup1.bkf is listed.
6. Expand Backup1.bkf.
Notice that drive C appears under Backup1.
7. Select the check box next to drive C, and then click Next.
The Backup Or Restore Wizard displays the Completing The Backup Or Restore
Wizard page. Notice that the file is being restored to its original location and that
the existing files are not to be replaced.
8. Click Advanced.
The Backup Or Restore Wizard displays the Where To Restore page.
20-30
Chapter 20
Backing Up and Restoring Data
9. In the Restore Files To list, select Alternate Location.
The Backup Or Restore Wizard makes the Alternate Location box available.
10. In the Alternate Location text box, type C:\Restored data and then click Next.
The Backup Or Restore Wizard displays the How To Restore page, prompting you
to specify how to process duplicate files during the restore job.
11. Make sure that Leave Existing Files (Recommended) is selected, and then click
Next.
12. On the Advanced Restore Options page, ensure that all check boxes are cleared,
and then click Next.
13. Review the options that you specified on the Completing The Backup Or Restore
Wizard page, and then click Finish to begin the restore process.
The Backup Utility displays the Check Backup File Location dialog box, prompting you to supply or verify the name of the backup file that contains the folders
and files to be restored.
14. Make sure that the file BACKUP1.BKF is entered in the Please Verify This Is The
Correct Location For The Backup text box, and then click OK.
The Backup Utility displays the Selection Information dialog box, indicating the
estimated amount of data for, and the time to complete, the restore job. (This dialog box may appear very briefly because you are restoring only a single file.) The
Backup Utility displays the Restore Progress dialog box, providing the status of the
restore operation, statistics on estimated and actual amount of data that is being
processed, the time that has elapsed, and the estimated time that remains for the
restore operation.
15. Click Close.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What is a trial restore, and why is it important that you perform it?
Lesson 3
Restoring Data 20-31
2. A(n) _____________ is an index of the files and folders from a backup job that
Windows XP Professional automatically creates and stores with the backup job
and on the computer running the Backup Utility.
3. What is a backup set?
4. If you back up two volumes on a hard disk during a backup job, how many
backup sets are created for the job?
5. What are the three Advanced restore settings that allow you to specify how to
restore files that already exist?
6. When do you use the Advanced restore setting Restore Security and when is it
available?
Lesson Summary
■
Before restoring data, you should ensure that you have access to the backup
media. You should also document the restoration.
■
The Backup Utility allows you to restore individual files and folders, an entire
backup job, or a backup set.
■
The Backup Utility’s advanced settings for restoring data vary depending on the
type of backup media from which you are restoring.
20-32
Chapter 20
Backing Up and Restoring Data
Lesson 4: Using the Automated System Recovery Wizard
In this lesson, you learn how to use the Automated System Recovery Wizard, which
helps you back up your system partition so that you can restore it in case it is lost or
damaged because of some type of disaster.
After this lesson, you will be able to
■ Explain the use of the Automated System Recovery Wizard
■ Use the Automated System Recovery Wizard to create an automated recovery disk
■ Copy the System and Software files from backup by using Recovery Console
Estimated lesson time: 15 minutes
Overview of the Automated System Recovery Wizard
The Automated System Recovery Wizard is one of the three wizards provided by the
Backup Utility (see Figure 20-8). Automated System Recovery (ASR) is intended to
allow you to restore your computer after a major failure. The Automated System Recovery Wizard creates a backup in two parts:
■
A floppy disk (referred to as a system recovery disk) that contains hard drive configuration information
■
A full backup of your local system partition on tape or as a file located on a network server
After creating the system recovery disk and full backup, you can boot your computer by
using the disk and run an automated system recovery process to restore your computer.
F20us08
Figure 20-8
Use Advanced mode to access the Automated System Recovery Wizard.
Lesson 4
Using the Automated System Recovery Wizard 20-33
How to Use the Automated System Recovery Wizard
To access the Automated System Recovery Wizard, click Start, point to All Programs,
point to Accessories, point to System Tools, and then click Backup. On the Welcome
To The Backup Or Restore Wizard page, click Advanced Mode.
To use the Automated System Recovery Wizard, use the following steps:
1. In the Advanced Mode window of the Backup Utility, click Automated System
Recovery Wizard.
The Backup Utility displays the Welcome To The Automated System Recovery
Preparation Wizard page.
2. Click Next to continue.
The Automated System Recovery Wizard begins and displays the Backup Destination page (see Figure 20-9). The options on the Backup Destination page are
explained in Table 20-4.
F20us09
Figure 20-9 Enter the backup destination.
Table 20-4 Backup Destination
Option
Description
Backup Media Type
The target medium to use, such as a tape or file. A file can be located
on any disk-based media, including a hard disk, a shared network
folder, or a removable disk, such as an Iomega Zip disk.
Backup Media Or
File Name
The location where the Backup Utility will store the data. For a tape,
enter the tape name. For a file, enter the path for the backup file.
20-34
Chapter 20
Backing Up and Restoring Data
3. Select the appropriate media type and backup media name or file name, and then
click Next.
The Automated System Recovery Wizard verifies the information that you entered and
displays the Completing The Automated System Recovery Preparation Wizard page.
4. Review the information on the Completing The Automated System Recovery Preparation Wizard page, and then click Finish.
The Automated System Recovery Wizard makes a backup of your system files.
This could take an hour or more.
5. When prompted, insert a floppy disk in your floppy disk drive.
6. When the backup completes, click Report to read the report. When you finish
reviewing the report, close Notepad.
7. Click Close to close the Backup Progress dialog box, and then close the Backup
Utility.
If you need to restore your system partition, you can use the floppy disk created by the
Automated System Recovery Wizard. The backup of your local system partition on tape
or as a file must be available to be restored. You would then use the Backup Or Restore
Wizard to restore your data and applications.
How to Recover Important Registry Keys by Using Recovery Console
In Chapter 4, “Modifying and Troubleshooting the Startup Process,” you learned how
to install and start the Recovery Console, and also how to use the Recovery Console to
help repair a Windows installation. If your recovery efforts do not allow you to start
Windows, you can use the Recovery Console to replace two important system files:
■
The System file is used by Windows XP Professional during startup to create the
HKEY_LOCAL_MACHINE\SYSTEM Registry key, which stores application settings
that apply to all users of the computer.
■
The Software file is used during startup to create the HKEY_LOCAL_MACHINE\
SOFTWARE Registry key, which contains information about the local computer,
including hardware data (such as bus type, system memory, and device drivers)
and operating system data (such as startup control parameters).
In fact, if you are troubleshooting a computer that will not start, you should try to
replace these files before going to the trouble of restoring the system using a recovery
disk. The system and software files are stored in %systemroot%\System32\config. A
backup copy is stored in the %systemroot%\repair folder, and this backup is refreshed
each time you back up the System State data on the computer. You can use the Recovery Console to replace the current version of each file with the backed up copy.
Lesson 4
Using the Automated System Recovery Wizard 20-35
When restoring the system or software files from backup with Recovery Console, you
should replace one file at a time to see whether it fixes the problem you are having. If
replacing both files does not fix the problem, you should then try to restore the computer using Automated System Recovery.
To replace the system or software file in the Recovery Console, use these steps:
1. Start your computer by using Recovery Console (see Chapter 4 for instructions on
how to do this).
2. At the Recovery Console prompt, locate the config folder by typing cd
system32\config.
3. Create backups of the current system or software file by typing copy system
<drive:\path\filename> or copy software <drive:\path\filename>, where
<drive:\path\filename> is the folder in which you want to store the backups.
4. Type dir.
5. Look through the list of files in the config folder and see whether any other files
exist that start with “system” or “software” (such as System.sav). If you find such
files, back them up to the same backup folder by using the copy command.
6. Replace the current system or software file by typing copy ..\..\repair\system
(for the system file) or copy ..\..\repair\software (for the software file).
The Recovery Console displays the Answer The Overwrite System? (Yes/No/All):
message.
7. Press Y, and then press ENTER.
8. Restart the computer.
Caution
The system and software files in the repair folder might not be current. If the files
are not current, you might need to update drivers, reinstall applications and service packs,
and perform other configuration to bring your computer up-to-date.
Lesson Review
Use the following questions to help determine whether you have learned enough to
move on to the next lesson. If you have difficulty answering these questions, review
the material in this lesson before beginning the next lesson. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
1. What four wizards does the Backup Utility provide access to?
20-36
Chapter 20
Backing Up and Restoring Data
2. What two things does the Automated System Recovery Wizard create during a
backup?
3. What two pieces of information do you have to supply to the Automated System
Recovery Wizard?
Lesson Summary
■
The Automated System Recovery Wizard creates a system recover disk (on a
floppy disk) that contains your hard drive configuration, and a backup of your
local system partition on tape or as a file.
■
To start the Automated System Recovery Wizard, you must enable the Advanced
mode of the Backup Utility. Because the Automated System Recovery Wizard
includes a full backup, the process can take an hour or longer.
■
The system and software files are stored in %systemroot%\System32\config. A
backup copy is stored in the %systemroot%\repair folder, and this backup is
refreshed each time you back up the System State data on the computer. You can
use the Recovery Console to replace the current version of each file with the
backed up copy.
Case Scenario Exercise
In this exercise, you will read a scenario about backing up a user’s computer and then
answer the questions that follow. If you have difficulty completing this work, review
the material in this chapter before beginning the next chapter. You can find answers to
these questions in the “Questions and Answers” section at the end of this chapter.
Scenario
You are an administrator working for a company named Blue Yonder Airlines, a company that rents charter airplanes to businesses across the country. You are working on
a computer that belongs to Andrew, a user in the sales department. Like other employees in the department, Andrew saves all his documents to his local computer in the My
Documents folder. Andrew keeps a relatively small number of files on his computer—
about 225 MB. However, each user must back up data to a file server on the network
if they want their documents to be included in the company’s backup system. Your
task today is to configure a nightly backup solution for Andrew.
Lesson 4
Using the Automated System Recovery Wizard 20-37
Questions
1. Andrew wants to be able to restore his data as quickly and easily as possible if the
time comes. Which type of backup would you suggest for Andrew’s computer? Why?
2. If you want to minimize the time it takes to back up Andrew’s computer instead
of the time it takes to restore the data, which type(s) of backup would you recommend?
3. Andrew expresses his concern about being able to restore his system to working
order if disaster strikes. What could you do to ensure that Andrew could recover
the computer in the event of a major system failure?
Troubleshooting Lab
You are an administrator for a company named Contoso, Ltd., a manufacturer of fine
dinnerware. You are working with a user named Ariane. Ariane’s computer is configured to run a normal backup of her data each Saturday and to run an incremental
backup every other evening. Backups are stored on a network file server. You are troubleshooting an intermittent hardware error on Ariane’s computer. Before you begin
troubleshooting, you want to create a backup of Ariane’s data. Which type of backup
20-38
Chapter 20
Backing Up and Restoring Data
should you perform to ensure that you do not interfere with the regular nightly backups already scheduled on Andrew’s computer? Why?
Chapter Summary
■
The Windows Backup utility provides a simple interface for backing up and
restoring data. The Backup utility offers two modes: Wizard mode, which steps
you through a backup or restore, and Advanced mode, which provides a more traditional backup interface and access to more options.
■
Before backing up data, it is best to make sure that users have closed all their
files. To back up data, you can use the Backup And Recovery Wizard to select the
files that you want to back up, the location to create the backup file, and any
advanced backup options that you want to use (such as verifying files after they
are backed up). You can also schedule backup jobs to occur at a later time or at
regular intervals.
■
To ensure that you can successfully restore data, you should follow certain guidelines, such as keeping thorough documentation on all your backup jobs and performing test restores on a regular basis.
■
The Automated System Recovery Wizard creates a system recovery disk (on a
floppy disk), which contains your hard drive configuration and a backup of your
local system partition on tape or as a file.
Exam Highlights
Before taking the exam, review the key points and terms that are presented in this
chapter. You need to know this information.
Key Points
■
To back up all data on a computer regardless of the assigned permissions to that
data, you must use a user account that has the Backup Files And Directories user
right assigned. To restore data, you must use a user account that has the Restore
Files And Directories user right assigned. Members of the Administrators and
Backup Operators local groups have these rights by default.
■
Backup allows you to back up data from or to shared folders on remote computers. Backup cannot write backup files directly to a CD-ROM or DVD.
Exam Highlights 20-39
■
Performing regular normal backups takes the most time during the backup phase
but the least time and effort during the restore phase. Using a normal backup plus
incremental backups takes the least time during the backup phase but takes the
most time and effort during the restore phase. Using a normal backup plus differential backups takes more time to back up than using incremental backups
(although less time than using only normal backups) but takes less time during the
restore phase than using incremental backups.
Key Terms
Automated System Recovery A feature of the Backup utility that creates a system
recovery disk and performs a full normal backup of the system partition so that
you can recover your computer in the event of a major failure.
Backup A Windows utility that allows you to back up and restore data and to create
a system recovery disk.
backup job
A single process of backing up data.
Backup Or Restore Wizard A wizard that provides a simple, step-based interface
for backing up or restoring data.
copy backup A backup type in which all selected files and folders are backed up,
regardless of their marker. During a copy backup, markers are not changed.
differential backup A backup type in which only selected files and folders that
have a marker are backed up. During a differential backup, markers are not
cleared so that files are still backed up if they have changed since the last normal
backup.
incremental backup A backup type in which only selected files and folders that
have a marker are backed up. During an incremental backup, markers are cleared
so that the files are not backed up during subsequent incremental backups unless
the files change.
markers Archive attributes that mark a file as having been backed up. During incremental or differential backups, markers are used to determine whether a file has
changed since the last backup.
normal backup A backup type in which all selected files and folders are backed up,
regardless of their marker. During a normal backup, all files are marked as having
been backed up.
System State Configuration information that includes the Windows Registry and
important configuration files.
20-40
Chapter 20
Backing Up and Restoring Data
Questions and Answers
Lesson 1 Review
Page
20-12
1. How do you access the Backup Or Restore Wizard?
To access the Backup Or Restore Wizard, on the Start menu, point to All Programs, point to
Accessories, point to System Tools, and then click Backup; or, on the Start menu, click Run,
type ntbackup, and then click OK.
2. What two operations can you perform using the Backup Or Restore Wizard?
You use the Backup Or Restore Wizard to back up all or a portion of the files on your computer
or network (using the Back Up Files And Settings option) and to restore data that you have
backed up (using the Restore Files And Settings option).
3. What is the primary goal of backing up data?
The primary goal of backing up data is to be able to restore that data if necessary.
4. If you want to perform a backup but do not want to clear markers or affect other
backup types, you should perform a(n) ____________ backup.
Copy
5. During a(n) ____________ backup, only selected files and folders that have a
marker are backed up, but the backup does not clear markers. If you performed
two of these backups in a row on a file and nothing changed in the file, the entire
file would be backed up each time.
Differential
6. How can you change the default settings for backup-and-restores for all backupand-restore operations by using the Backup Utility?
You can change the default settings for the Backup Utility for all backup-and-restore jobs by
changing the settings on the tabs in the Options dialog box. To access the Options dialog box,
on the Welcome To The Backup Or Restore Wizard page, click Advanced Mode. On the Tools
menu, click Options.
7. You performed a normal backup on Monday. For the remaining days of the week,
you want to back up only files and folders that have changed since the previous
day. Which backup type do you select? Why?
Incremental. The incremental backup type backs up changes since the last markers were set
and then clears the markers. Thus, for Tuesday through Friday, you back up only changes since
the previous day.
Questions and Answers 20-41
Lesson 2 Review
Page
20-23
1. What are the four choices on the What To Back Up page of the Backup Or Restore
Wizard and what does each choice allow you to do?
The first choice is My Documents And Settings. Selecting this option backs up certain areas
that pertain to the currently logged on user. All of the files located in the My Documents folder,
your Favorites folder, desktop items, and cookies are backed up in this option.
The second choice is Everyone’s Documents And Settings. Selecting this option backs up each
user’s My Documents folder, Favorites folder, desktop items, and cookies.
The third choice is All Information On This Computer. Selecting this option backs up all files on
the computer except those files that the Backup Utility excludes by default, such as certain
power management files.
The fourth choice is Let Me Choose What To Back Up. Selecting this option allows you to select
the files and folders you want to back up, including files and folders on the computer where you
run the Backup Utility and any shared file or folder on the network.
2. When should you select the Allow Only The Owner And The Administrator Access
To The Backup Data And Any Backups Appended To This Media check box?
You should select this check box when you want to minimize the risk of unauthorized access to
your data.
3. If your boss wants daily backups to occur at 1:00 A.M., what could you do to save
yourself the trouble of having to go to the office each morning at 1:00 A.M. to do
the backups?
You can use the Backup Or Restore Wizard to schedule the backup to occur automatically by
clicking Later on the When To Back Up page of the Backup Or Restore Wizard and specifying
that the backup should occur daily at 1:00 A.M.
4. If you do not have a tape drive, can you still perform backups? How?
Yes. You can use a tape or file as the target medium for the backup, and a file can be located
on any disk-based media, including a hard disk, a shared network folder, or a removable disk,
such as an Iomega Zip drive.
5. Why should you e-mail or send a console message to users before you begin a
backup?
You should notify users to close files before you begin backing up data because the backup
might not contain the correct data if users are still editing files while you perform the backup.
Rather than skip the files that are being written to, the Backup Utility will back up these files
unless you select the Disable Volume Shadow Copy check box. It is best to have all users log
off before doing a backup.
20-42
Chapter 20
Backing Up and Restoring Data
Lesson 3 Review
Page
20-30
1. What is a trial restore, and why is it important that you perform it?
A trial restore involves restoring a backup to an alternate location and comparing the restored
data with the data on the original hard disk. You should perform trial restores to verify that the
Backup Utility is backing up your files correctly and that any hardware problems show up with
software verifications.
2. A(n) _____________ is an index of the files and folders from a backup job that
Windows XP Professional automatically creates and stores with the backup job
and on the computer running the Backup Utility.
Catalog
3. What is a backup set?
A backup set is a collection of files or folders from one volume that you back up during a
backup job.
4. If you back up two volumes on a hard disk during a backup job, how many
backup sets are created for the job?
Two
5. What are the three Advanced restore settings that allow you to specify how to
restore files that already exist?
Leave Existing Files (Recommended), Replace Existing Files If They Are Older Than The Backup
Files, and Replace Existing Files
6. When do you use the Advanced restore setting Restore Security and when is it
available?
The Restore Security setting applies the original permissions, including access permissions,
audit entries, and ownership, to files that you are restoring to an NTFS volume. The Restore
Security option is available only if you have backed up data from an NTFS volume and are
restoring to an NTFS volume.
Lesson 4 Review
Page
20-35
1. What four wizards does the Backup Utility provide access to?
The Backup Utility provides access to the Backup And Restore Wizard, the Backup Wizard
(Advanced), the Restore Wizard (Advanced), and the Automated System Recovery Wizard.
2. What two things does the Automated System Recovery Wizard create during a
backup?
The Automated System Recovery Wizard creates a floppy disk containing your hard drive configuration and a backup of your local system partition.
3. What two pieces of information do you have to supply to the Automated System
Recovery Wizard?
The appropriate media type and the backup media or file name
Questions and Answers 20-43
Case Scenario Exercise
Page
20-36
1. Andrew wants to be able to restore his data as quickly and easily as possible if the
time comes. Which type of backup would you suggest for Andrew’s computer?
Because Andrew is backing up each night and will be backing up over the network, the speed
of the backup is not an issue. You should configure Andrew’s computer to perform a full backup
each night to the file server. This way, Andrew will need to restore only one backup if there is a
problem, instead of having to restore a full backup and then a differential backup (or multiple
incremental backups).
2. If you want to minimize the time it takes to back up Andrew’s computer instead
of the time it takes to restore the data, which type(s) of backup would you recommend?
In this case, you should recommend that Andrew’s computer perform a full normal backup
occasionally (once each week is recommended) and then perform an incremental backup each
day that backs up only the data that has changed since the last incremental backup. When it
comes time to restore data, though, Andrew would have to first restore the most recent full
backup, and then restore each incremental backup in turn.
3. Andrew expresses his concern about being able to restore his system to working
order if disaster strikes. What could you do to ensure that Andrew could recover
the computer in the event of a major system failure?
You could use the Automated System Recovery Wizard on Andrew’s computer to create a system recovery disk and a full system backup. This would allow Andrew to recover his computer
in the event of a major failure.
Troubleshooting Lab
Page
20-37
You are an administrator for a company named Contoso, Ltd., a manufacturer of fine
dinnerware. You are working with a user named Ariane. Ariane’s computer is configured to run a normal backup of her data each Saturday and to run an incremental
backup every other evening. Backups are stored on a network file server. You are troubleshooting an intermittent hardware error on Ariane’s computer. Before you begin
troubleshooting, you want to create a backup of Ariane’s data. Which type of backup
should you perform to ensure that you do not interfere with the regular nightly backups already scheduled on Andrew’s computer?
You should perform a copy backup on Ariane’s computer. A copy backup does not reset the
Backup attribute on files and so would not interfere with the regular nightly backups.
Part II
Prepare for the Exam
21 Installing Windows XP
Professional (1.0)
Microsoft Windows XP Professional is designed to be deployed to a wide variety of
environments, from stand-alone home computers to enterprise networks with thousands of computers. Because different environments have varying needs during
deployment, Windows XP provides several different deployment methods. Home users
and small businesses need a quick, user-friendly installation procedure. For these
users, an attended installation is the most efficient. Enterprises might need to deploy
hundreds or thousands of computers at a time, while minimizing the cost of that
deployment. Computer manufacturers often build thousands of Windows XP Professional computers every day, with dozens of different hardware and software configurations. For these users, Windows XP provides several different unattended installation
technologies, including Remote Installation Services (RIS), the System Preparation Tool
(Sysprep.exe), and unattended answer files.
Upgrade scenarios are even more varied than new installation scenarios. As with new
installations, many users need to upgrade many computers as efficiently as possible.
There are two additional levels of complexity, however. Computers might have one of
several different operating systems, including Windows NT Workstation 4.0,
Windows 95, Windows 98, Windows Me, and Windows 2000 Professional. Additionally, users have documents, applications, and customized settings that they need access
to after the upgrade has been completed.
The vast majority of new installations and upgrades complete without problems. However, when things do go wrong, you must understand how to resolve installation problems. Your job is not done when you complete the installation or upgrade of Windows
XP, either. You must activate Windows XP, apply a service pack (or packs), and install
critical updates to reduce the risk of security vulnerabilities or other problems.
This objective domain assesses your ability to prepare for and perform both attended
(that is, manual) and unattended (automated) installations. You must determine
whether existing operating systems and applications will be upgraded or will be
removed and replaced with new installations. There are several methods for automated
installations of Windows XP Professional, and you must be familiar with them all. Your
ability to deploy service packs, diagnose installation failures, and correct installation
failures will also be assessed. You will do a number of case studies that check your
ability to identify the appropriate installation method when presented with detailed
information about various computing environments. You will also need to understand
the difference between activation and registration of Windows XP Professional and
how to complete the activation process through all available methods.
21-3
21-4
Chapter 21
Installing Windows XP Professional (1.0)
Tested Skills and Suggested Practices
To successfully master the Installing Windows XP Professional objective domain on the
Installing, Configuring, and Administering Microsoft Windows XP Professional exam,
complete the following tasks.
Important
For the following task, you should complete at least Practice 1. If you want a
more well-rounded understanding of installation options, you should also complete Practice
2. If you want hands-on experience with every aspect of the exam and you have the extra lab
resources needed to do Practice 3, complete Practice 3 as well.
■
Performing and troubleshooting an attended installation of Windows XP Professional.
❑
Practice 1: Become familiar with the various stages of the installation process
by installing Windows XP Professional on computers with no operating system.
❑
Practice 2: Install Windows XP Professional on a computer running MS-DOS
by using the 16-bit installation program (Winnt.exe).
❑
Practice 3: Install Windows XP Professional on a new computer, and then
attempt to add it to an Active Directory service domain by using an account
that is a member only of the Domain users group. Then, modify domain
Group Policy settings until you can use the same account to successfully add
the computer to the domain.
Important
For the following task, you should complete at least Practice 1. If you want a
more well-rounded understanding of installation options, you should also complete Practices
2 and 3. If you want hands-on experience with every aspect of the exam and you have the
extra lab resources needed to do Practices 4 and 5, complete those practices as well.
■
Performing and troubleshooting an unattended installation of Windows XP Professional.
❑
Practice 1: Learn the command-line switches available with Winnt32.exe.
❑
Practice 2: Launch Setup Manager and create an answer file for an unattended
installation of a single computer. Run Setup Manager again, but create a
uniqueness database file (UDF) for automating the installation of Windows
XP Professional on multiple computers. Verify that the answer file and UDF
file created by Setup Manager work by running a Windows XP Professional
installation with them.
Tested Skills and Suggested Practices
21-5
❑
Practice 3: Download the latest Dynamic Update package from Microsoft, and
configure a shared folder on your network with the Dynamic Upgrade files.
Perform an unattended installation that retrieves the Dynamic Update files
from your local share rather than from Microsoft’s Web site.
❑
Practice 4: Learn about cloning Windows XP Professional computers by using
the SysPrep utility. If you have non-Microsoft imaging software available, use
the image created to install Windows XP Professional.
❑
Practice 5: Build an RIS infrastructure by installing and configuring a Windows
2000 Server with RIS and Dynamic Host Configuration Protocol (DHCP). Build
a Windows XP Professional system, use the Remote Installation Preparation
Wizard (Riprep.exe) to prepare the system, and then use non-Microsoft software to create an image of the system. Upload the image to the RIS server. Create a Remote Boot Disk or use a Preboot Execution Environment (PXE)–capable
computer to boot to the network, and then run a RIS-based installation. If you
do not have access to non-Microsoft imaging software, you can copy the Windows XP Professional installation CD-ROM to the RIS server (the setup process
will be similar to a normal CD-ROM-based installation).
Important
For the following task, you should complete at least Practice 1. If you want a
more well-rounded understanding of installation options, you should also complete Practice
2. If you want hands-on experience with every aspect of the exam and you have the extra lab
resources needed to do Practice 3, complete Practice 3 as well.
■
Upgrading from a previous version of Windows to Windows XP Professional.
❑
Practice 1: Perform upgrades from Windows 2000 Professional and Windows
Me to Windows XP Professional. The simplest way to do this is to insert the
Windows XP Professional installation CD-ROM into the target computer’s CDROM drive and follow the prompts to upgrade the operating system. You can
also run Winnt32.exe from the \I386 directory of the CD-ROM.
Tip You probably do not have Windows NT 4.0 or Windows Me running on any computers that
you can upgrade just for the sake of learning. (This is okay because most people do not have
them.) I use Microsoft Virtual PC. I install earlier versions of Windows on a virtual PC, back up
the virtual hard disk file, and then perform the Windows XP upgrade process. Later, I can return
to my backup file if I want to try the upgrade by using a different technique. You can run multiple
Virtual PCs simultaneously, and have the virtual computers communicate with each other over a
network. Use this process to create a Windows Server 2003 Active Directory. Although this
exam focuses on Windows XP, you absolutely must understand how changes to Group Policy settings affect what administrators and users can do on Windows XP computers.
21-6
Chapter 21
Installing Windows XP Professional (1.0)
❑
Practice 2: Use the Files And Settings Transfer Wizard to migrate the settings
from one computer to another. The originating computer can be running
Windows XP Professional, Windows 98, Windows Me, Windows NT Workstation 4.0, or Windows 2000 Professional; the destination computer must be
running Windows XP Professional.
❑
Practice 3: Use the User State Migration Tool (USMT) to implement an automated migration of a user’s settings from one computer to another. Customize
the USMT process by making some changes to the .inf files used by the tool.
Important
For the following task, you should complete at least Practices 1 and 2. If you
want a more well-rounded understanding of installation options, you should also complete
Practice 3. If you want hands-on experience with every aspect of the exam and you have the
extra lab resources needed to do Practices 4 and 5, complete those practices as well.
■
Performing post-installation updates and product activation.
❑
Practice 1: Download and install the network package of the latest service
pack for Windows XP Professional. Extract the package and run Update.exe
with the -? switch, and then review the available command-line switches. Use
the appropriate command-line switches to perform an unattended installation. Then, uninstall the service pack by using Add Or Remove Programs.
❑
Practice 2: Using an unpatched Windows XP Professional installation, use Internet Explorer to visit the Microsoft Windows Update site at http://windowsupdate
.microsoft.com/. Choose to perform a custom installation of the available patches
and explore each of the available updates to understand what changes they
make. Bring your Windows XP installation up-to-date by installing the latest service packs and all available critical updates.
❑
Practice 3: Use the Microsoft Baseline Security Analyzer, available from http://
www.microsoft.com/technet/security/tools/mbsahome.mspx, to identify any
computers on your network that are missing critical updates.
❑
Practice 4: Install Microsoft Software Update Services (SUS), available from
http://www.microsoft.com/sus/—on a Windows Server 2003 computer. Configure Automatic Updates on a Windows XP Professional computer to retrieve
updates directly from SUS. Be familiar with how to configure Automatic
Updates for Windows XP Professional stand-alone computers and members
of an Active Directory domain.
❑
Practice 5: If you have time, install Windows XP Professional on a computer,
but do not activate it. Wait until the 30-day grace period expires, and note the
limited functionality that Windows XP provides you until you have activated it.
Further Reading
21-7
Important
For the following task, you should complete at least Practice 1. If you want a more
well-rounded understanding of installation options, you should also complete Practice 2. If you
want hands-on experience with every aspect of the exam, complete Practice 3 as well.
■
Troubleshooting failed installations.
❑
Practice 1: Locate and examine the log files created during installation in the
computer’s operating system folder (%systemroot%).
❑
Practice 2: Enable the highest level of error reporting during an install by
using the /debug switch with Winnt32.exe. Examine the log file after installation is complete. The default location and filename is %systemroot%/
Winnt32.log.
❑
Practice 3: Visit computer hardware vendors’ Web sites and locate their support section. Study basic input/output system (BIOS) update procedures for
motherboards, disk controllers, and other types of hardware that commonly
have BIOS chips onboard.
Further Reading
This section lists supplemental readings by objective. We recommend that you study
these sources thoroughly before taking exam 70-270.
Objective 1.1 “Deploying Windows XP Part I: Planning” by Microsoft Corporation
(available online at http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/
depovg/depxpi.mspx).
“Deploying Windows XP Part II: Implementing” by Microsoft Corporation (available online at http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/
depovg/depxpii.mspx).
Microsoft Corporation. Microsoft Windows XP Professional Resource Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 1, “Planning Deployment,” for an explanation of how to plan and prepare for deploying Windows XP
Professional to meet the business needs of various types of organizations. Read
Chapter 4, “Supporting Installations,” for additional setup information. In particular,
read the first two sections, “The Setup Process” and “Support Tools” (available online
at http://www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prpt_pt1_fmjb.asp).
Objective 1.2 “Deploying and Supporting Windows XP: Microsoft’s IT Group shares
its experiences” by Microsoft Corporation (available online at http://
www.microsoft.com/technet/itsolutions/msit/deploy/wxpdpsp.mspx).
21-8
Chapter 21
Installing Windows XP Professional (1.0)
Read Microsoft Windows XP Corporate Deployment Tools User’s Guide
(DEPLOY.CHM), located on the installation CD-ROM or DVD in \Support\Tools\Deploy.cab. This file, which is formatted as a Windows Help file, contains extensive information about automating the deployment of Windows XP
Professional in enterprise environments.
“Remote Operating System Installation” by Microsoft Corporation (available online
at http://www.microsoft.com/technet/prodtechnol/windows2000serv/deploy/depopt/
remoteos.mspx).
Microsoft Corporation. Microsoft Windows XP Professional Resource Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 2, “Automating and Customizing Installations.” This chapter gives detailed information about creating unique
automated installation routines (available online at http://www.microsoft.com/
resources/documentation/Windows/XP/all/reskit/en-us/prpt_pt1_fmjb.asp).
Objective 1.3 “Upgrade or Wipe-and-Load” by Microsoft Corporation (available online
at http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/upwpload.mspx).
“Step-by-Step Guide to Migrating Files and Settings” by Microsoft Corporation
(available online at http://www.microsoft.com/technet/prodtechnol/winxppro/
deploy/mgrtfset.mspx).
“User State Migration in Windows XP” by Microsoft Corporation (available online at
http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/usermigr.mspx).
“Deploying Windows XP—Application Compatibility” by Microsoft Corporation
(available online at http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/
depxpapp.mspx).
Microsoft Corporation. Microsoft Windows XP Professional Resource Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 1, “Planning Deployment.” Focus on the third section, “Assessing Your Current Configuration” (available
online at http://www.microsoft.com/resources/documentation/Windows/XP/all/reskit/
en-us/prpt_pt1_fmjb.asp).
Objective 1.4 “Inside Update.exe—The Package Installer for Windows and Windows
C o m p o n e n t s ” b y M i c r o s o f t C o r p o r a t i o n ( a v a i l a b l e o n l i n e a t h t tp : / /
www.microsoft.com/technet/prodtechnol/windowsserver2003/deployment/winupdate.mspx).
“Patch Management Process” by Microsoft Corporation (available online at http://
www.microsoft.com/technet/security/guidance/secmod193.mspx).
“Deploying Updates with Windows Update and Automatic Updates” by Microsoft
Corporation (available online at http://www.microsoft.com/smallbusiness/gtm/
securityguidance/articles/dep_patches_wu_au.mspx).
Further Reading
21-9
“Software Update Services 2.0 Overview” by Microsoft Corporation (available online
at http://www.microsoft.com/technet/security/guidance/sus_2_0_overview.mspx).
Microsoft Corporation. Microsoft Windows XP Professional Resource Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 1, “Planning Deployment.” Focus on the third section, “Assessing Your Current Configuration.” Read
Chapter 4, “Supporting Installations.” This chapter provides additional setup information. Read the third and fourth sections: “Installing Service Packs and Hotfixes”
and “Uninstalling a Service Pack or Hotfix” (available online at http://
www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prpt_pt1_fmjb.asp).
Objective 1.5 “Windows Server 2003 Troubleshooting Disks and File Systems” by
Tony Northrup (available online at http://www.microsoft.com/technet/prodtechnol/
windowsserver2003/operations/system/sptchtro.mspx). The information applies
equally well to Windows XP.
“Windows Server 2003 Tools for Troubleshooting” by Tony Northrup (available
online at http://www.microsoft.com/technet/prodtechnol/windowsserver2003/operations/system/sptcctol.mspx). The information applies equally well to Windows XP.
Microsoft Corporation. Microsoft Windows XP Professional Resource Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 4, “Supporting Installations.” This chapter provides additional setup information. Read the fifth and sixth
sections: “Troubleshooting Windows XP Professional Setup” and “Additional
Resources” (available online at http://www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/prpt_pt1_fmjb.asp).
21-10
Chapter 21
Installing Windows XP Professional (1.0)
Objective 1.1
Perform and Troubleshoot an
Attended Installation of Windows
XP Professional
You must prepare for installing Windows XP Professional by verifying that the target
computer’s hardware and software are compatible with Windows XP Professional.
Although it is not mandatory, all hardware should appear in the Windows Catalog
(previously known as the Hardware Compatibility List). You can view the current version of the Windows Catalog at http://www.microsoft.com/windows/catalog/.
Even if you have verified that all the hardware in the target computer is compatible
with Windows XP Professional, there is a good chance that the CD-ROM does not contain drivers for hardware released after Windows XP was first released. If you have
Internet access and are launching Setup from an existing version of Windows, the Windows XP Professional setup routine can attempt to download the latest installation
files, including updated drivers, by using Dynamic Update.
If the computer has an existing operating system, you must know how to configure
Windows XP for dual booting, how to upgrade the operating system, and how to perform a clean installation. Understand that Setup is launched from one of two programs:
Winnt.exe when running a 16-bit operating system such as DOS 6.22 or Windows 3.x,
or Winnt32.exe when running a 32-bit operating system such as Windows 2000 Professional or Windows Me. If the computer is to be part of a domain, you must know how
to add the computer as a domain member and which domain privileges are required.
To successfully answer questions in this objective, you must be adept at manually
installing Windows XP Professional on a range of computer systems, in both workgroup and domain environments. You must know how to prepare for the installation
of Windows XP Professional and the phases of installation. You must also understand
the differences between the various installation methods and how to use each method
to install Windows XP Professional.
Objective 1.1
Perform and Troubleshoot an Attended Installation of Windows XP Professional 21-11
Objective 1.1 Questions
1.
You want to perform a clean install of Windows XP Professional on a computer running
Windows NT Workstation 3.51. The computer contains a Pentium II processor running
at 350 MHz, 48 MB of RAM, a 4 GB hard disk formatted as two 2 GB FAT partitions
(drive C has 1.5 GB of free space, whereas drive D has 900 MB of free space), a 24x CDROM drive, a mouse, a keyboard, and a Super Video Graphics Array (SVGA) video subsystem. All the hardware is in the Windows Catalog. Your desired results are to
■
Replace the existing operating system with Windows XP Professional.
■
Choose a file system that will enable you to ensure the greatest level of security
possible.
■
Rejoin the computer to the Active Directory domain.
■
Retain the existing applications and user settings.
You perform the following tasks:
■
Increase the amount of RAM to 128 MB.
■
While logged on to the existing installation of Windows NT Workstation 3.51, run
Winnt32.exe from the Windows XP Professional installation CD-ROM and choose
to perform a New Installation.
■
Answer the prompts during installation. When prompted, type the appropriate
domain name.
Which goals does your proposed approach provide? Choose two correct answers.
A. Ensures that the computer meets the minimum hardware requirements for running
Windows XP Professional
B. Replaces the existing installation of Windows NT Workstation 3.51 with a new
installation of Windows XP Professional
C. Chooses a file system that enables you to ensure the greatest level of security possible
D. Rejoins the computer to the domain
E. Retains the existing applications and user settings
21-12
2.
Chapter 21
Installing Windows XP Professional (1.0)
You want to perform a clean install of a Windows XP Professional computer running
Windows NT Workstation 3.51. The computer contains a Pentium III processor running
at 700 MHz, 32 MB of RAM, a 4 GB hard disk, a 24x CD-ROM drive, a mouse, a keyboard, and an SVGA video subsystem. The hard disk is formatted as two 2 GB partitions, both formatted with the FAT file system with 650 MB of free space. All the
hardware is in the Windows Catalog. Your desired results are to
■
Replace the existing operating system with Windows XP Professional.
■
Choose a file system that enables you to ensure the greatest level of security possible.
■
Rejoin the computer to the domain.
■
Retain the existing applications and user settings.
■
Allow for more efficient use of hard disk space by creating a single 4 GB partition.
You perform the following tasks:
■
While logged on to the existing installation of Windows NT Workstation 3.51, run
Winnt32.exe from the Windows XP Professional installation CD-ROM and choose
to perform a New Installation.
■
Answer the prompts during installation, but make certain to convert the existing
boot partition to NTFS.
■
When prompted, type the appropriate domain name, and then add the computer
account to the domain by providing logon credentials for an account belonging to
the Domain Administrators group.
■
After Setup completes, open the Computer Management console, and then open
the Disk Management snap-in and perform the appropriate actions to convert the
second partition to NTFS.
Which goals does your proposal achieve? Choose three correct answers.
A. Ensures that the computer meets the minimum hardware requirements for running
Windows XP Professional
B. Replaces the existing installation of Windows NT Workstation 3.51 with a new
installation of Windows XP Professional
C. Chooses a file system that enables you to ensure the greatest level of security possible
D. Rejoins the computer to the domain
E. Retains the existing applications and user settings
F. Allows for more efficient use of hard disk space by creating a single 4 GB partition
Objective 1.1
3.
Perform and Troubleshoot an Attended Installation of Windows XP Professional 21-13
An account executive on your company’s outside sales team just returned from a major
networking conference. His laptop was stolen from him while he was passing through
airport security. You have a new replacement computer available. His data was backed
up to a network server before he left for the conference, so it is possible to restore a
recent copy of his data to the new computer. You are more concerned that the thief
might have compromised proprietary and sensitive information. You want to safeguard
your firm’s confidential data against potential theft in the future.
Which of the following steps do you take to protect the account executive’s replacement computer when you install Windows XP Professional on it? Choose two correct
answers.
A. You configure the computer so that the Welcome Screen is enabled.
B. During the installation of Windows XP Professional, you specify the FAT32 file system for the single partition on the hard disk.
C. You add the computer to the corporate domain and issue user certificates for
Secure/Multipurpose Internet Mail Extensions (S/MIME) and EFS from the Active
Directory–integrated Certificate Services Certificate Authority. You install the certificates onto a smart card, and then instruct the user to keep the smart card in his
wallet when not in use.
D. Using EFS and the user’s logon credentials, you encrypt the user’s My Documents
folders and other folders where the user stores data. You also enable S/MIME in email client software and teach the user how to use both features.
E. You install the Recovery Console and configure it for automatic administrative
logon.
4.
Your current laptop computer is running Windows XP Professional, but you feel that its
performance is unacceptable due to the speed of its central processing unit (CPU) and
the amount of RAM installed. You acquire a new computer with significantly more RAM
and a much faster CPU to replace your existing system. Which tool can you use to
migrate your data and user settings from the old computer to the new one? Choose the
correct answer.
A. Setup Wizard
B. SysPrep
C. File And Settings Transfer Wizard
D. RIS
21-14
5.
Chapter 21
Installing Windows XP Professional (1.0)
Which of the following attended installation procedures best minimizes the risk of a
successful network attack on a new Windows XP Professional installation? Choose the
correct answer.
A. Install Windows XP Professional from the installation CD-ROM. Connect to the
Internet and activate Windows XP. Configure Automatic Updates to download and
install updates without user intervention.
B. Install Windows XP Professional from the installation CD-ROM. Connect to the
Internet and activate Windows XP. Visit the Windows Update site, manually install
the latest service pack, and then install all relevant critical updates.
C. Install Windows XP Professional from the installation CD-ROM. Use another computer to create a CD-ROM containing the latest service pack and all critical updates
released after the service pack. Connect to the Internet, and activate Windows XP.
Install the latest service pack and all critical updates from the CD-ROM.
D. Install Windows XP Professional from the installation CD-ROM. Use another computer to create a CD-ROM containing the latest service pack and all critical updates
released after the service pack. Install the latest service pack and all critical
updates from the CD-ROM. Connect to the Internet, and activate Windows XP.
6.
You are the systems administrator for a branch of Humongous Insurance. Your organization has thousands of computers total, but your branch has only about 50. You do,
however, have your own Windows Server 2003 Active Directory that you have hardened to reduce security risks. Recently, your manager informed you that executive
management has assigned responsibility for another 10,000 customers to your branch.
As a result, your organization needs to hire 20 additional customer support representatives, and each will need a Windows XP Professional desktop computer. You have
too much work planned to install them yourself, so your manager calls a staffing
agency, which sends over a systems administrator named Nicole Caron to perform the
installs. You create a user account for Nicole and add it to the Domain Users group,
hand her the Windows XP Professional CD-ROM and a set of manual installation
instructions, and let her get started.
After about an hour, Nicole reports that she cannot join the computers to your domain
because she receives an access denied error. What is the best way to resolve the problem? Choose the correct answer.
A. Modify the Default Domain Security Settings Group Policy object and add Nicole’s
user account to the Add Workstations To Domain policy.
B. Add Nicole’s user account to the Domain Admins group.
C. Modify the Default Domain Security Settings Group Policy object and add Nicole’s
user account to the Enable Computer And User Accounts To Be Trusted For Delegation policy.
D. Add Nicole’s user account to the Power Users group.
Objective 1.1
Perform and Troubleshoot an Attended Installation of Windows XP Professional 21-15
Objective 1.1 Answers
1.
Correct Answers: A and B
A. Correct: By increasing the system RAM to 128 MB from 48 MB, you have guaranteed that the computer has enough memory for Windows XP Professional to install
and run correctly. The computer already met all the other hardware requirements
for Windows XP Professional, and you already knew that all the hardware was in
the Windows Catalog.
B. Correct: Although you cannot upgrade directly from Windows NT Workstation
3.51 to Windows XP Professional, you can perform a clean install. By selecting a
New Installation, you can replace the existing copy of Windows NT Workstation
3.51.
C. Incorrect: You can install Windows XP Professional onto a partition formatted
with the file allocation table (FAT) file system, but that file system does not allow
for file and folder level access controls. To ensure the greatest level of security
possible, you need to convert each partition to NTFS. The version of NTFS
included with Windows XP Professional also supports the Encrypting File System
(EFS). EFS enables a user to encrypt files so that the data the files contain is protected—even if a hostile intruder obtains physical access to the hard disk. Nothing
in the lists of tasks indicates that you converted each partition to NTFS.
D. Incorrect: Before a computer can join a domain, a computer account must be
created in the domain. If a computer account already exists with the same name,
it needs to be reset or deleted first. This can be accomplished before setup by adding the computer account into Active Directory—a domain administrator can do
this. The computer can also be added to the domain during the installation of Windows XP Professional by anyone who has the right to add workstations to the
domain. Nothing in the lists of tasks indicates that you created the account in the
domain.
E. Incorrect: Performing a new installation on a computer with an existing operating system causes the loss of all user settings and forces you to reinstall all the
applications. Performing an intermediate upgrade to Windows NT Workstation 4.0
or Windows 2000 Professional could have retained them.
2.
Correct Answers: B, C, and D
A. Incorrect: The computer does not have 64 MB of RAM, which is the minimum
requirement for Windows XP Professional to install and run correctly. The computer already met all the other hardware requirements for Windows XP Professional, and you knew that all the hardware was in the Windows Catalog.
21-16
Chapter 21
Installing Windows XP Professional (1.0)
B. Correct: Although you cannot upgrade directly from Windows NT Workstation
3.51 to Windows XP Professional, you can perform a clean install. By selecting a
New Installation, you can replace the existing copy of Windows NT Workstation
3.51.
C. Correct: You can install Windows XP Professional onto a partition formatted with
the FAT file system, but that file system does not allow for file- and folder-level
access controls. To ensure the greatest level of security possible, you need to convert each partition to NTFS. The list of completed tasks indicates that you converted the boot partition to NTFS during installation. You also converted the
second partition to NTFS after setup was complete. You cannot convert boot partitions from FAT or FAT32 to NTFS after setup by using the tools included with
Windows XP Professional.
D. Correct: Before a computer can join a domain, a computer account must be created in the domain. If a computer account of that name already exists in the
domain, it must be reset or deleted first. The list of tasks indicates that you provided logon information for an account with sufficient privileges to create a new
computer account during the installation of Windows XP Professional and that you
completed the required actions to add the computer to the domain.
E. Incorrect: Performing a new installation on a computer with an existing operating system causes the loss of all user settings and forces you to reinstall all the
applications. In contrast, performing an intermediate upgrade to Windows NT
Workstation 4.0 or Windows 2000 Professional could have retained them.
F. Incorrect: Nothing in the list of tasks performed indicates that the hard disk partitions were replaced with a single partition or somehow combined.
3.
Correct Answers: C and D
A. Incorrect: Windows XP Professional can be configured to automatically display
the Welcome Screen at startup. The Welcome Screen lists the local user accounts
so that users have to type only their password, not their user name when logging
in. When the computer displays the user names, people who have gained physical
access to it have useful information if they try to break into the installation of Windows XP Professional. It is more secure to require users to type both their user
names and passwords when they log on to a computer.
B. Incorrect: NTFS supports folder- and file-level access controls. By carefully setting permissions on operating system and data files, you can ensure that only
authenticated users can view files on the computer whether logged on locally or
over the network. The FAT32 file system does not have any built-in security and is
therefore a bad choice for computers that will contain sensitive data.
Objective 1.1
Perform and Troubleshoot an Attended Installation of Windows XP Professional 21-17
C. Correct: Public key encryption can greatly enhance security, especially for
mobile users. Although user certificates can be stored on the computer’s hard disk
and can be password-protected, storing certificates on a smart card is more secure
because it requires a thief to have access to both the smart card and the user’s
password.
D. Correct: By encrypting the user’s data files, you ensure that if the replacement
laptop computer is stolen and the hard disk is moved to another computer, the
thief cannot view confidential information. S/MIME further enhances security by
allowing the account executive to digitally sign sent e-mail and receive encrypted
e-mail messages.
E. Incorrect: The Recovery Console can be a useful tool for diagnosing and repairing serious computer failures such as corrupted system files and unsupportable
configuration changes. Configuring the Recovery Console for automatic logging
on significantly decreases security on a system. This is especially true for mobile
users whose laptop computers are at risk of theft. This configuration setting is
appropriate only on computers that are physically secure or contain no sensitive
data and cannot access any other important computers over the network. Use this
setting with caution.
4.
Correct Answers: C
A. Incorrect: The Setup Wizard is part of the attended installation process; it does
not include any features for migrating user settings from another computer to the
system where Windows XP Professional is being installed.
B. Incorrect: You use SysPrep to prepare a computer running Windows XP Professional for imaging so that the disk image can be used to automate the deployment
of similarly configured systems. It does not include any features for migrating user
settings from one computer to another.
C. Correct: The File And Settings Transfer Wizard is a tool to help transfer a user’s
files and settings to a new installation of Windows XP Professional. It can copy
many different types of files and settings for such things as the Desktop and Display, and for some applications (such as Microsoft Outlook). It is the ideal tool in
this scenario.
D. Incorrect: You use RIS for automating the deployment of computers across the
network. It leverages technologies such as Windows 2000 Server, Active Directory,
GPOs, and Windows XP Professional. It does not include any features for migrating user settings between computers.
21-18
5.
Chapter 21
Installing Windows XP Professional (1.0)
Correct Answers: D
A. Incorrect: This procedure does not minimize the risk of being successfully
attacked because Windows XP has several vulnerabilities that are removed only
after updates have been applied. Therefore, the computer might be exploited
while Automatic Updates is downloading and installing the updates.
B. Incorrect: This procedure does not minimize the risk of being successfully
attacked because Windows XP has several vulnerabilities that are removed only
after updates have been applied. Therefore, the computer might be exploited after
it is connected to the Internet, but before the latest service packs and updates have
been applied. Even if you might apply these updates as quickly as possible, your
computer can be compromised within a few minutes of being connected to the
Internet.
C. Incorrect: This procedure does not minimize the risk of being successfully
attacked because Windows XP has several vulnerabilities that are removed only
after updates have been applied. Therefore, the computer might be exploited after
it is connected to the Internet, but before the latest service packs and updates have
been applied. Even if you might apply these updates as quickly as possible, your
computer can be compromised within a few minutes of being connected to the
Internet.
D. Correct: This procedure reduces the risk of a successful network attack against
the system by remaining disconnected from the network during the installation of
Windows XP. Windows XP has many known vulnerabilities that are removed
when the latest service pack and critical updates are applied. Even performing the
installation behind a firewall is risky because the computer might be attacked by
computers on the local network infected with worms or viruses. You should consider connecting to the Internet only after all updates have been applied.
6.
Correct Answers: A
A. Correct: To add computers to a domain, the user must have the Add Workstations To Domain user right.
B. Incorrect: Although it would solve the problem by allowing Nicole to add computers to the domain, it would also grant Nicole many unnecessary privileges,
such as the ability to create a user account for herself that she could use to connect
to network resources after she has finished her job. The security risks associated
with this option are too great.
C. Incorrect: This domain policy setting will not allow Nicole’s account to add computers to the domain.
D. Incorrect: The Power Users group exists only in the local user database, and
being a member of the Power Users group grants no additional domain-level
rights.
Objective 1.2
Perform and Troubleshoot an Unattended Installation of Windows XP Professional 21-19
Objective 1.2
Perform and Troubleshoot an
Unattended Installation of
Windows XP Professional
Automation of the installation of Windows XP Professional, called unattended installation, is much more efficient and less prone to error when deploying large numbers
of computers. To effectively automate the deployment of Windows XP Professional,
you must know how to plan for deployment, build and configure the installation environment, create customized answer files, and distribute the operating system and
applications to the target computers.
A number of methods for automating operating systems have been developed over
time; consequently, there are several alternatives for preparing installation routines and
deploying the installation packages. Preparation methods include
■
Installation scripts that partially or completely automate setup.
■
The SysPrep utility and disk imaging.
■
The /syspart switch available with Winnt32.exe.
Distribution methods include
■
Bootable CD-ROM.
■
RIS.
■
Batch file and a network distribution folder.
■
Systems Management Server (SMS).
To successfully answer questions in this objective, you must know how to use the
Setup Manager Wizard to prepare for a Windows XP Professional installation and to
create answer files and UDF files. You must also know how to create and edit these
installation scripts manually by using a text editor. You need to be familiar with all the
preparation and distribution methods and understand which ones are appropriate for
different circumstances.
21-20
Chapter 21
Installing Windows XP Professional (1.0)
Objective 1.2 Questions
1.
You were recently hired as part of a systems administration team at a medium-sized
company. Your manager has asked you to install Windows XP Professional on 25 identical new desktop computers for the Accounts Receivable department in your firm. To
date, your colleagues have been manually installing Windows XP Professional and the
suite of applications on each computer as they arrive, carefully following written stepby-step instructions. The process has been tedious and slow, and users have had problems with new computers because of configuration errors caused by human error during the installation process. You want to deploy the computers as efficiently as possible
with all the desktop applications that are required by the staff in Accounts Receivable
installed and configured. You also want to ensure that all 25 computers are configured
consistently.
You propose to do the following:
■
Manually install and configure Windows XP Professional and the required applications on one of the new computers, meticulously following the existing step-bystep instructions.
■
Use Setup Manager to fully automate the installation routine by creating an answer
file called Sysprep.inf.
■
Use a non-Microsoft imaging tool to create an image of the reference computer.
■
Use the imaging tool to copy the image from the reference computer to the
remaining computers.
What critical step is missing from your proposal? Choose the correct answer.
A. Use Setup Manager to create a UDF file with unique settings for each of the 25
computers.
B. Create RIS boot disks so that the computers can connect to the RIS server to download the disk image.
C. Use the SysPrep utility to prepare the reference computer for imaging.
D. Install PXE-compliant network cards into each computer so that they can connect
to the RIS server to download the disk image.
2.
You are creating an automated installation of Windows XP Professional for 30 computers. You want to accomplish the following.
■
Assign a unique computer name to each computer
■
Ensure that all computers have the same display settings, time zone configured,
default user name, and organization name entered
Objective 1.2
Perform and Troubleshoot an Unattended Installation of Windows XP Professional 21-21
■
Install Microsoft Office Professional Edition 2003 on all the computers
■
Configure the local Administrator account with a unique password on each system
■
Modify the user interface so that the desktop icons are no longer visible
You plan to use Setup Manager to create a fully automated installation, combining an
answer file and a UDF file with the preceding settings. Which goals does your
approach achieve? Choose three correct answers.
A. You can assign a unique computer name to each computer.
B. You can ensure that all computers have the same display settings, time zone configured, default user name, and organization name entered.
C. You can install Office Professional Edition 2003 on all the computers.
D. You can configure the local Administrator account with a unique password on
each system.
E. You can modify the user interface so that the desktop icons are no longer visible.
F. Your solution does not achieve any of the desired goals.
3.
You want to perform an unattended installation of Windows XP Professional onto a
computer with a bootable CD-ROM drive. You have already verified that the computer
meets the minimum hardware requirements for Windows XP Professional and that all
the hardware is in the Windows Catalog. You also have a bootable version of the Windows XP Professional installation CD-ROM.
Which of the following is correct? Choose the correct answer.
A. Ensure that the answer file has a section called [Winnt32] that contains the
required keys and values. Save the answer file as Sysprep.inf and copy it to a
floppy disk. Configure the target computer’s BIOS so that it will boot from the CDROM drive, and then insert the Windows XP Professional installation CD-ROM and
reboot the computer. Insert the floppy disk as soon as the computer boots from
the CD-ROM.
B. Ensure that the answer file has a section called [Winnt32] that contains the
required keys and values. Save the answer file as Winnt.sif and copy it to a floppy
disk. Configure the target computer’s BIOS so that it boots from the CD-ROM
drive, and then insert the Windows XP Professional installation CD-ROM and
reboot the computer. Insert the floppy disk as soon as the computer boots from
the CD-ROM.
C. Ensure that the answer file has a section called [Data] that contains the required
keys and values. Save the answer file as Sysprep.inf and copy it to a floppy disk.
Configure the target computer’s BIOS so that it boots from the CD-ROM drive, and
then insert the Windows XP Professional installation CD-ROM and reboot the
computer. Insert the floppy disk as soon as the computer boots from the CD-ROM.
21-22
Chapter 21
Installing Windows XP Professional (1.0)
D. Ensure that the answer file has a section called [Data] that contains the required
keys and values. Save the answer file as Winnt.sif and copy it to a floppy disk.
Insert the floppy disk into the target computer. Configure the target computer’s
BIOS so that it boots from the CD-ROM drive, and then insert the Windows XP
Professional installation CD-ROM and reboot the computer.
4.
During an unattended installation of Windows XP Professional, keys might have values
set in the answer file, the UDF file, in both files, or in neither file. How does Setup handle the following scenarios? Choose four correct answers.
A. If a section or key is present in the UDF file, but there is no section or key of the
same name in the answer file, Setup creates and uses the UDF section.
B. If a key is specified in the answer file and referenced by the unique ID in the UDF
file, the value specified in the answer file is used.
C. If a key is specified in the answer file and referenced by the unique ID in the UDF
file, the value specified in the answer file is used.
D. If a key is specified in the UDF file but not in the answer file, the value specified
in the UDF file is used.
E. If a key is not specified in the answer file, and it is in the UDF file but the value
is left blank, the default value is supplied automatically by Setup.
F. If a key is not specified in the answer file, and it is in the UDF file but the value
is left blank, no value is set.
G. If a key is specified in the answer file but not in the UDF file, the value specified
in the answer file is used.
5.
You will be performing an automated deployment of Windows XP Professional to 40
desktop computers. During testing, you discovered that the video driver causes Setup
to fail unless the driver is updated by using Dynamic Update during the setup procedure. You want to use Dynamic Update, but you are using only a low-bandwidth dialup connection while you wait for your Internet service provider (ISP) to provision your
permanent Internet connection. What steps would you take to use Dynamic Update
with an automated deployment of Windows XP? Choose the correct answer.
A. Download the latest Windows XP Dynamic Update package from Microsoft. Extract
the files to a folder, and share that folder on your local area network. From your Windows XP CD-ROM, run the command winnt32 /duprepare:path_to_shared_folder.
In the [Unattended] section of your Unattend.txt file, add the entry Dushare:
path_to_shared_folder.
B. From your Windows XP CD-ROM, run the command winnt32 /duprepare:path_to_shared_folder to download the Dynamic Update files from Microsoft
and store them in the specified shared folder. In the [Unattended] section of your
Unattend.txt file, add the entry Dushare:path_to_shared_folder.
Objective 1.2
Perform and Troubleshoot an Unattended Installation of Windows XP Professional 21-23
C. Download the latest Windows XP Dynamic Update package from Microsoft. Copy the
file to a folder and share that folder on your local area network. In the [Unattended]
section of your Unattend.txt file, add the entry Dushare:path_to_shared_folder.
D. Download the latest Windows XP Dynamic Update package from Microsoft. Extract
the files to a folder, and share that folder on your local area network. From your Windows XP CD-ROM, run the command winnt32 /duprepare:path_to_shared_folder.
In the [Unattended] section of your Unattend.txt file, add the entries Dushare:local
and Dupath:path_to_shared_folder.
6.
You need to perform an unattended installation from a Windows XP Professional CDROM on a computer that does not currently have an operating system. You want to
provide the computer name and Administrator password on a floppy disk. What do
you name the answer file? Choose the correct answer.
A. Answer.txt
B. Winnt.sif
C. Winnt32.sif
D. Unattend.txt
7.
Which of the following components are required to install Windows XP Professional by
using Remote Installation Services (RIS)? Choose three correct answers.
A. DNS server
B. WINS server
C. DHCP server
D. Web server
E. Active Directory
F. FTP server
21-24
Chapter 21
Installing Windows XP Professional (1.0)
Objective 1.2 Answers
1.
Correct Answers: C
A. Incorrect: When using disk imaging to deploy Windows XP Professional, you do
not need to create UDF files.
B. Incorrect: RIS is another possible approach to deploying multiple computers,
but you have already proposed using disk images. Copying the images to the disk
drives of the new computers does not require RIS. In this scenario, non-Microsoft
tools are used for distribution.
C. Correct: Before you create an image of the reference computer, you must use
SysPrep to remove security and user information unique to the system. SysPrep
erases the computer’s name, its globally unique identifier (GUID), and all other
settings that might cause problems if they appear on multiple computers on the
same network.
D. Incorrect: RIS is another possible approach to deploying multiple computers,
but you have already proposed using disk images. Copying the images to the disk
drives of the new computers does not require RIS or PXE-enabled network cards.
Additionally, the entire computer needs to be PXE-compliant, not just the network
cards. Merely installing PXE-enabled network cards into a computer does not
guarantee that it will be able to boot directly from the network. In this scenario,
non-Microsoft tools are used for distribution.
2.
Correct Answers: A, B, and D
A. Correct: With Setup Manager, you can create UDF files that can be used in conjunction with answer files. The settings in a UDF file take precedence over those
in an answer file. You can specify unique values for many settings such as computer names so that each computer deployed has a distinct name.
B. Correct: Setup Manager can create or modify answer files that can contain all the
settings listed. An answer file is a customized script used to run an unattended
installation of Windows XP Professional.
C. Incorrect: Setup Manager cannot automate the installation of any version of
Microsoft Office Professional Edition 2003 on its own. You can use Setup Manager
to launch other programs and scripts, but you have to create an automated installation for Office Professional Edition 2003 by following the instructions included
in the Office 2003 Editions Resource Kit.
D. Correct: With Setup Manager, you can create UDF files that can be used in conjunction with answer files. The settings in a UDF file take precedence over those
in an answer file. You can specify unique values for many settings, such as the
password for the Local Administrator account.
Objective 1.2
Perform and Troubleshoot an Unattended Installation of Windows XP Professional 21-25
E. Incorrect: Setup Manager does not include tools to modify user interface properties such as the appearance of desktop icons. Instead, you should configure the
computers as Active Directory domain members, and use Group Policy settings to
control the desktop environment.
F. Incorrect: Your solution does not achieve any of the desired goals.
3.
Correct Answers: D
A. Incorrect: The answer file must be named Winnt.sif, not Sysprep.inf. Sysprep.inf
is the name given to the answer file when using SysPrep to deploy Windows XP
Professional via disk imaging. The section with the required keys for automating
installation from the bootable installation CD-ROM must be called [Data].
B. Incorrect: The section with the required keys for automating installation from
the bootable installation CD-ROM must be called [Data].
C. Incorrect: The answer file must be named Winnt.sif, not Sysprep.inf. Sysprep.inf
is the name given to the answer file when using SysPrep to deploy Windows XP
Professional via disk imaging.
D. Correct: The [Data] section is an optional section needed only when installing
Windows XP Professional in an unattended fashion directly from the product CDROM. If you use the Setup Manager Wizard to create the answer file and specify
that the answer file will be used to install from a CD-ROM, it creates the [Data] section with the required keys and values: AutoPartition=1, MsDosInitiated="0", and
UnattendedInstall="Yes". The answer file must be named Winnt.sif; by default,
Setup Manager offers to name the file Unattend.txt. Be sure to name the file
Winnt.sif before booting from the installation CD-ROM. Remember to insert the
diskette into the floppy drive right after the computer boots from the CD-ROM.
4.
Correct Answers: A, D, F, and G
A. Correct: Setup automatically uses values within the UDF file when the corresponding values are not specified in the answer file.
B. Incorrect: The values specified in the UDF file take precedence over those in the
answer file whenever they are in conflict.
C. Incorrect: The values specified in the UDF file take precedence over those in the
answer file whenever they are in conflict.
D. Correct: Setup automatically uses values within the UDF file when the corresponding values are not specified in the answer file.
E. Incorrect: Setup does not automatically supply default values for any keys left
blank. In this situation, it is possible that the user will be prompted for the missing
information.
21-26
Chapter 21
Installing Windows XP Professional (1.0)
F. Correct: If a key has a blank value in the UDF file and the answer file has no
value specified for that key, no value is set and it is possible that the user will be
prompted for the missing information.
G. Correct: Any keys specified in the answer file that are not superseded by those in
the UDF file are used.
5.
Correct Answers: A
A. Correct: To use Dynamic Update, download the latest package, extract the files,
and share them on a network. For unattended installations, you must add the
Dushare: line to the Unattend.txt file to tell Setup where to retrieve the package.
For attended installations, add the /dushare:path_to_shared_folder option to the
winnt32.exe command-line. For more information, refer to Microsoft Knowledge
Base article 312110.
B. Incorrect: Although winnt32.exe is capable of downloading the Dynamic
Update files during installation, it is not capable of storing those files for later use.
You must manually download and extract the files.
C. Incorrect: Before Setup can use the Dynamic Update files, you must extract
them, and then prepare them by running winnt32.exe with the /duprepare command-line parameter.
D. Incorrect: You need to add the Dushare entry only to the [Unattended] section of
your Unattend.txt file. You should set the value to the path of the shared folder
containing your Dynamic Update files.
6.
Correct Answers: B
A. Incorrect: The correct filename is Winnt.sif.
B. Correct: Winnt.sif has the same sections as an Unattend.txt file, and should be
used when performing unattended installations on computers that do not currently have an operating system. Generally, you would place this file on a floppy
disk and insert the floppy disk into the computer immediately after the computer
begins to boot from the CD-ROM.
C. Incorrect: The correct filename is Winnt.sif.
D. Incorrect: The correct filename is Winnt.sif. Although Unattend.txt is often used
for unattended installations where the computer currently has an operating system, you can specify any file name in this scenario.
Objective 1.2
7.
Perform and Troubleshoot an Unattended Installation of Windows XP Professional 21-27
Correct Answers: A, C, and E
A. Correct: Remote installation relies on DNS for locating the directory service and
client machine accounts.
B. Incorrect: RIS clients do not require a WINS server.
C. Correct: RIS requires a DHCP server to be present and active on the network.
The remote boot–enabled client computers receive an Internet Protocol (IP)
address from the DHCP server before contacting RIS.
D. Incorrect: RIS clients do not need to contact a Web server.
E. Correct: RIS relies on Active Directory for locating existing client machines as
well as existing RIS servers.
F. Incorrect: RIS clients do not require FTP.
21-28
Chapter 21
Installing Windows XP Professional (1.0)
Objective 1.3
Upgrade from a Previous Version
of Windows to Windows XP
Professional
Often, Windows XP Professional is needed on systems that already have a version of
Windows installed. The best way to minimize the impact on the applications running
on that system is to perform an in-place upgrade to Windows XP. In-place upgrades
can be performed on systems that have Windows 98, Windows Me, Windows NT
Workstation 4.0 with Service Pack 6, or Windows 2000 Professional. Although this process is much more complex than performing a clean installation, the Windows XP
setup procedures include many tools to make this process as painless as possible.
Systems running older Windows operating systems can also be upgraded, but not
directly. For example, Windows 95 cannot be upgraded to Windows XP Professional
simply by running Winnt32.exe; it must be upgraded to Windows 98 first. Similarly, a
computer with Windows NT 4.0 and Service Pack 5 or earlier installed must be
upgraded to Service Pack 6 before the Windows XP Professional setup routine can be
run successfully.
In addition to verifying that the system’s hardware resources meet the minimum
requirements of Microsoft, you also need to verify that all applications installed on the
system are compatible with Windows XP. To facilitate this process, Microsoft provides
the Windows Application Compatibility Toolkit, which is available online at http://
msdn.microsoft.com/downloads/list/appcomp.asp.
If you have ever replaced your personal desktop or laptop computer that you have
been using for months or years with a new one, you understand how challenging it can
be to copy all your data and user preferences over to the replacement system. Windows XP Professional includes two methods for migrating users’ configuration settings
and data between systems. The Files And Settings Transfer Wizard (FSTW) is
intended for home users, small office users, and lightly managed users in an enterprise
environment. The User State Migration Tool (USMT) is a command-line tool created
for migrating large numbers of users in a corporate setting.
Objective 1.3
Upgrade from a Previous Version of Windows to Windows XP Professional 21-29
Objective 1.3 Questions
1.
A newly hired CIO who understands the benefits of using a single desktop operating
system for the entire company has hired you to upgrade all networked systems to Windows XP. Previously, local administrators with varying policies and procedures managed each remote office. Consequently, desktop systems have a mixture of Windows
for Workgroups 3.11, Windows 95, Windows NT Workstation 4.0, and Windows 2000
Professional. You want to minimize the impact on each user’s applications by performing an in-place upgrade whenever possible.
Which of these operating systems can be upgraded to Windows XP in a single step?
Choose two correct answers.
A. Windows for Workgroups 3.11
B. Windows 95
C. Windows NT Workstation 4.0 with no service pack
D. Windows NT Workstation 4.0 with Service Pack 6
E. Windows 2000 Professional
2.
You are an administrator for a corporate network supporting 40 users. Your CEO
recently learned about the many benefits that Windows XP Professional offers over the
Windows 98 operating system that is currently installed on her laptop computer. You
have been assigned the task of upgrading the CEO’s laptop to Windows XP. It is critical
that the computer be returned when the CEO returns from a business trip the following
day; and all data, applications, and settings must be available.
Which is the best upgrade strategy? Choose the best answer.
A. Perform a full system backup, scan for viruses, and uncompress any compressed
drives. Document the user preferences and applications installed on the system.
Run the Windows XP Professional setup procedure and repartition all drives with
NTFS. After Setup has completed, restore the backup over the new installation.
After Setup has completed, verify the functionality of all hardware and applications.
B. Perform a full system backup, scan for viruses, and uncompress any compressed
drives. Run the standard Windows XP Professional setup procedure and perform
an in-place upgrade. After Setup has completed, verify the functionality of all
hardware and applications. If Windows XP was unable to install drivers for some
hardware components, download and install the updated drivers. If any of the
applications do not function correctly, download and apply patches from the software vendors.
21-30
Chapter 21
Installing Windows XP Professional (1.0)
C. Perform a full system backup, scan for viruses, and uncompress any compressed
drives. Generate a compatibility report by running the Winnt32.exe /checkupgradeonly command. Download any drivers that the compatibility report indicates
are not provided by Windows XP, and patch any applications that have not been
certified. Run the standard Windows XP Professional setup procedure and perform an in-place upgrade, providing updated drivers as prompted. After Setup has
completed, verify the functionality of all hardware and applications.
D. Perform a full system backup, scan for viruses, and uncompress any compressed
drives. Generate a compatibility report by running the Winnt32.exe /checkupgradeonly command. Download any drivers that the compatibility report indicates
are not provided by Windows XP, and patch any applications that have not been
certified. Run the standard Windows XP Professional setup procedure and perform a new install with a different system directory (that is, C:\WinXP\), providing
updated drivers as prompted. After Setup has completed, verify the functionality
of all hardware and applications. After the system is functioning correctly, delete
the directory containing Windows 98.
3.
You have several identical computers that you want to upgrade from Windows Me to
Windows XP Professional. You have already verified that all the computers meet the
minimum hardware requirements and that the hardware and subcomponents appear in
the Windows XP Windows Catalog. You have also verified that each computer already
has the current BIOS installed. The computers have been in operation for several
months, and their users have installed their own applications. How can you quickly
determine whether there will be any application-compatibility issues before proceeding with the upgrade? Choose the correct answer.
A. Run the Setup program from the Windows XP Professional installation media with the
/checkupgradeonly switch by typing x:\i386\Winnt32.exe /checkupgradeonly
from a command prompt where x: is the drive letter assigned to the CD-ROM
drive on each computer.
B. Create a list of the applications installed on each computer and then visit the Web
site of the vendor for each application to find out whether the versions installed
on the computers to be upgraded are compatible with Windows XP Professional.
C. Purchase the latest versions of each installed application.
D. Perform a clean installation of Windows XP Professional on each system, and then
reinstall all the applications.
4.
You are the administrator of a network that includes 50 users running Windows 2000
Professional and 4 servers running Windows 2000 Advanced Server and Active Directory in a domain setting. You are told to replace 20 of the users’ desktop computers
with new laptop computers that have Windows XP Professional preinstalled. You want
Objective 1.3
Upgrade from a Previous Version of Windows XP to Windows XP Professional 21-31
to add the computers to the domain and transfer the users’ data and settings from their
current desktop computers to their new laptop systems. Which of the following solutions best accomplishes these goals? Choose the correct answer.
A. Name each of the computers appropriately, and then join them to the domain.
Install the appropriate applications. Copy each user’s User Profile from the old
computer to the new computer.
B. Give each of the computers a unique name and then join them to the domain.
Write a script that copies each user’s My Documents folder from the old computer
to the replacement computer. Write a script that exports each user’s Registry from
the old computer, and imports it to the replacement computer. Schedule the
scripts to run on each of the replacement computers, and then reboot each computer.
C. Join each of the laptop computers to the domain. Install the appropriate applications. Write a script that uses the USMT ScanState tool to copy all users’ settings
from their old computers to a shared drive on one of the domain controllers. Write
a script that launches the LoadState tool with the required settings to copy the files
and settings from the shared network drive and schedule the script to run on each
laptop computer.
D. Schedule a task to launch the FSTW on each laptop computer and be sure that the
job is run in the context of an account with local administrative access on all the
computers.
5.
You are the administrator for a network that includes 80 users and 3 servers running
Windows 2000 Advanced Server and Active Directory in a domain setting. You are preparing to migrate 15 users from their existing laptop computers that are running Windows Me to new laptop systems that will be running Windows XP Professional. You
have automated most of the process, including installing Windows XP Professional,
joining the computer to the domain, and installing the required applications. You are
having trouble running USMT on your Windows Me test computer. How can you effectively troubleshoot the automated process of copying user data and settings to a shared
folder on the network? Choose the correct answer.
A. Run the ScanState tool with verbose error logging enabled by adding the /l scanstate.log /v 7 /u /f parameters to the command you use to run the tool.
B. Check the local system and application logs for error messages.
C. Run the LoadState tool with verbose error logging enabled by adding the /l scanstate.log /v 7 parameters to the command you use to run the tool.
D. Check the application and system logs on the domain controller where the shared
network folder is located.
21-32
Chapter 21
Installing Windows XP Professional (1.0)
Objective 1.3 Answers
1.
Correct Answers: D and E
A. Incorrect: Windows for Workgroups 3.11 cannot be upgraded directly to Windows XP Professional. After determining that the hardware and software are compatible with Windows XP, you must perform a full system backup and define a list
of installed applications and document personalization settings such as wallpaper
and color scheme. Then, perform a fresh install of Windows XP, reinstall all applications, and restore the user’s data and settings. Alternatively, the system can be
upgraded to Windows 95, and then Windows 98, and then Windows XP Professional. In practice, few people will choose to upgrade computers running this
operating system because the hardware is not likely to meet the minimum requirements for Windows XP.
B. Incorrect: You cannot upgrade directly from Windows 95 directly to Windows
XP Professional. The suggested upgrade path is from Windows 95, to Windows 98,
and then to Windows XP.
C. Incorrect: You cannot upgrade Windows NT Workstation 4.0 to Windows XP
Professional unless Service Pack 6 or later is installed.
D. Correct: You can upgrade Windows NT Workstation 4.0 directly to Windows XP
Professional, as long as Service Pack 6 is installed.
E. Correct: You can upgrade Windows 2000 Professional directly to Windows XP
Professional.
2.
Correct Answers: C
A. Incorrect: Restoring Windows 98 system files over a Windows XP installation
might return the system to its original state, or it might leave the system completely nonfunctional. Although it sometimes might be necessary to restore user
data to a freshly upgraded system, applications and system settings cannot be
transferred this way.
B. Incorrect: This is a commonly used method that will work on many systems.
However, it is very risky to not generate a compatibility report because there is a
distinct possibility that the system will not function at all after the upgrade. Additionally, if you discover after the upgrade that a critical application cannot be
patched to work properly with Windows XP, your only method of recovery is to
perform a full system restore. It is more time-efficient to perform a Winnt32.exe /
checkupgradeonly procedure and resolve any issues before running the full setup
procedure.
Objective 1.3
Upgrade from a Previous Version of Windows XP to Windows XP Professional 21-33
C. Correct: This method is the correct choice because it proactively identifies system incompatibilities. Generating a compatibility report before performing the
upgrade greatly improves the chance of a successful upgrade. If a system component or application is completely incompatible with Windows XP, this method
identifies that weakness ahead of time.
D. Incorrect: Performing a new install of Windows XP preserves the user’s data, but
not applications and system settings. Although applications are not available from
the Start menu, the application files still consume hard disk space. Applications
need to be reinstalled, and system settings are completely lost.
3.
Correct Answers: A
A. Correct: This procedure will generate an application compatibility report for
Windows XP Professional without actually installing the operating system; it is the
most efficient way to check for application compatibility.
B. Incorrect: Although you might have to contact some of the vendors for upgrades
to their applications after running the application compatibility report described in
answer A, it is unlikely that you need to visit all their Web sites. This approach is
unnecessarily cumbersome and time-consuming.
C. Incorrect: You might need to upgrade some of the installed applications, but it is
unlikely that you have to upgrade all (or even most) of them. This approach is
expensive and time-consuming.
D. Incorrect: This approach fails to accomplish the basic objective of upgrading the
existing operating system on each computer. Additionally, you have done nothing
to verify that the applications are compatible with Windows XP Professional, so
you might find that you cannot install some of them.
4.
Correct Answers: C
A. Incorrect: The format and structure of user profiles are different between Windows 2000 and Windows XP. Copying a profile from a computer running one
operating system to another will probably cause problems that can be serious,
such as users not being able to log on (or to access certain applications after they
have logged on).
B. Incorrect: Although a script is an efficient way to copy the My Documents folder,
you cannot simply import the Registry from one computer to another. Additionally, many applications store data in the user profile but outside of the My Documents folder. With this approach, any user data stored outside the My Documents
folder will not be copied to the new laptop computers.
21-34
Chapter 21
Installing Windows XP Professional (1.0)
C. Correct: These procedures accomplish all the stated goals in an efficient manner.
The steps to add the computers to the domain can be partially automated through
a script, but the laptop computers were delivered with Windows XP Professional
already installed, so it might be faster do that manually. When scheduling the
USMT tools to run, make sure that the scheduled job is run in the context of an
account that belongs to the local Administrators group.
D. Incorrect: The FSTW is an interactive tool that cannot be run silently from a command line. In other words, scheduling the tool in this manner does not accomplish
the goal of copying user data and settings. Additionally, there is nothing in this
answer to suggest that the computers were added to the Active Directory domain.
5.
Correct Answers: A
A. Correct: The /l switch enables logging for Scanstate.exe and requires you to provide a file name for the log. The /v switch specifies the level of verbosity for the
logging—7 is the most verbose setting. The /u and /f switches provide additional
information about the resources to be scanned.
B. Incorrect: The USMT does not record detailed error messages to the system or
application logs.
C. Incorrect: The question states that you are having problems on the computer
running Windows Me, which implies that the trouble involves the ScanState tool,
not the LoadState tool. The LoadState tool would be run on the target computer
that has Windows XP Professional installed.
D. Incorrect: The ScanState tool is run locally on the computer where data and settings are being transferred from; it is not likely that it will record any events on the
domain controller’s application or system log. It might generate events in the security log on the domain controller if auditing were enabled and you were trying to
access a shared folder with an account that did not have sufficient permission to
write files to that location.
Objective 1.4
Perform Post-Installation Updates and Product Activation 21-35
Objective 1.4
Perform Post-Installation
Updates and Product Activation
All operating systems require patches to be applied on a regular basis to fix problems,
provide compatibility with new hardware, and resolve newly discovered security vulnerabilities. Microsoft distributes these updates in the form of critical updates and
service packs. Microsoft releases critical updates with relative frequency to resolve
security vulnerabilities. Service packs, which are released less frequently, include all
critical updates released prior to the service pack, as well as other operating system
improvements. These updates can be retrieved from the Windows Update Web site at
http://windowsupdate.microsoft.com/.
If the only Windows XP system you are responsible for managing is your own personal
computer, you will probably choose to configure Automatic Updates to automatically
download and install updates when they become available. This method provides an
easy and bandwidth-efficient method of keeping a single computer up-to-date. If you
are responsible for managing a network of computers, you need to identify methods
that scale to larger numbers of computers and give you tighter control over how
patches are deployed.
The simplest way to distribute a service pack to your network is to download the network package from Microsoft. The network package contains the complete set of files
required to install a service pack on any Windows XP computer. You can then copy
this file to a shared folder on your network and launch the service pack installation
without visiting Windows Update from each computer.
A more efficient (but complex) method of deploying both critical updates and service
packs to computers on your network is to use SUS. When you deploy SUS, you can
configure Automatic Updates to download updates from a server on your local network. This gives you control over which critical updates and service packs are
deployed, which allows you to test each update thoroughly to detect compatibility
problems with your custom applications. You can download SUS from http://
www.microsoft.com/sus/.
Service packs can also be slipstreamed into a complete Windows XP Professional distribution point. Updating the Windows XP setup files with a service pack eliminates the
need to install a service pack on a newly deployed system because the slipstreaming
process integrates service pack updates into the Windows XP Professional setup files.
Future systems built from the slipstreamed distribution point will contain all updates
included in the service pack and reflect the updated build number, but will not require
the additional step of manually installing a service pack.
21-36
Chapter 21
Installing Windows XP Professional (1.0)
Objective 1.4 Questions
1.
You are a systems administrator for a new service provider that plans to offer help desk
services to 50 users. Although the users’ desktop systems have been purchased, you
need to install the latest version of Windows XP on each of them. Rather than installing
Windows XP and then immediately upgrading to Service Pack 2, you want the initial
deployment of Windows XP to include Service Pack 2.
Your Windows XP network distribution point is located at \\server\winxp\. Which
command properly updates the distribution point to Service Pack 2? Choose the correct
answer.
A. Update /copydir:\\server\winxp
B. Update /syspart: \\server\winxp
C. Update /integrate:\\server\winxp
D. Update /o:\\server\winxp
2.
You have a two-year-old computer from a well-known manufacturer that is currently
running Windows Me and several dozen applications. The computer has 128 MB of
RAM, a 500 MHz Pentium III CPU, and a 12 GB hard disk with 7 GB of free space. You
have verified that the computer and its subcomponents are in the Windows XP Windows Catalog. You have also upgraded all the applications to versions that are compatible with Windows XP Professional except for the antivirus software you have
temporarily uninstalled. You back up the current configuration to a removable hard
drive and begin the upgrade process. The first phase of the upgrade appears to complete properly, but when the computer reboots, it crashes before the second phase
begins. You reboot the computer several times with the same result. What is the most
likely cause of this problem? Choose the correct answer.
A. The Windows XP Professional installation CD-ROM is corrupt.
B. One or more of the memory chips installed in the computer is faulty.
C. You entered an invalid product key.
D. The BIOS is incompatible with Windows XP Professional.
3.
You have a home office with a cable modem connection to the Internet. You install and
configure all your own hardware and software. You have been using Windows XP Professional on a Pentium 4 computer for several months when the first service pack is
released. You download and install the service pack from the Windows Update Web
site and note that several minor problems have been resolved by the service pack.
Later, you decide to add software from the Add/Remove Windows Components tool.
After the installation of the new component is complete, what must you do to make
Objective 1.4
Perform Post-Installation Updates and Product Activation 21-37
sure that the new component has the latest updates applied? Choose the correct
answer.
A. Run Setupmgr.exe.
B. Run Sysprep.exe.
C. Reapply the service pack.
D. Do nothing.
4.
What types of information are transmitted to Microsoft during product activation when
performed over an Internet connection? Choose the correct answer.
A. The Windows XP Professional product ID (PID), the product key, and details
about the hardware present in the computer where the operating system is
installed.
B. The user’s registration information, including name, address, city, state, and Zip
code.
C. The user’s credit card information.
D. The entire HKEY_LOCAL_MACHINE hive, several small files from the Application
Data folder within the user’s profile, the Windows XP Professional PID, and the
serial number for each hard disk.
5.
Contoso, Inc. recently hired you as a system administrator for its small network of ten
Windows XP Professional computers. After performing a security audit, you realize that
two of the computers have not yet had Service Pack 2 for Windows XP installed. You
use Internet Explorer to visit the Windows Update site, and are notified that the computers were activated with invalid product keys. Contoso has purchased additional
valid product keys for these computers. What is the quickest way to resolve the problem to allow Service Pack 2 to be installed? Choose the correct answer.
A. Insert the Windows XP Professional CD-ROM, and then restart the computer. Perform an upgrade installation over the existing Windows XP system directory. When
prompted, provide the new valid product key, and then install Service Pack 2.
B. Back up all files and settings on each computer. Insert the Windows XP Professional CD-ROM, and then restart the computer. Perform a new installation of Windows XP by reformatting the hard disk. When prompted, provide the new valid
product key, and then install Service Pack 2. Restore the files and settings from the
backup.
C. Change the HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\Current
Version\WPAEvents\OOBETimer Registry value, and then run the Msoobe.exe
tool to reset the product activation key. Then install Service Pack 2.
21-38
Chapter 21
Installing Windows XP Professional (1.0)
D. Right-click My Computer and then click Properties. Click the Advanced tab and
click the Environment Variables button. Select the PRODUCT_KEY variable, and
then click Edit to specify a new product activation key. Then restart the computer
and install Service Pack 2.
6.
Which of the following are valid techniques for removing Service Pack 2 for Windows
XP? Choose two correct answers.
A. Click Start, click All Programs, click Service Pack 2, and then click Uninstall.
B. In Add Or Remove Programs, click Windows XP Service Pack 2, and then click
Remove.
C. From the command prompt, change to the %systemroot%\$NtservicepackUninstall$\spuninst folder. Run the command spuninst.exe.
D. From the command prompt, change to the %systemroot%\$NtservicepackUninstall$\ folder. Run the command setup.exe.
7.
You are a consultant hired by Fabrikam, Inc. to install Windows XP Professional on 45
desktop computers. At the beginning of your first day, your manager provided you
with Fabrikam’s volume license product key and the Windows XP Professional CDROM. You insert the CD-ROM into the first computer, but the installation fails after several minutes—indicating that the installation media could not be read. You remove the
CD-ROM and examine it to discover a deep scratch in the surface of the media.
Your manager is nowhere to be found. His assistant reports that he will not return until
the afternoon, and that he is the only person with keys to the media locker where
backup copies of the Windows XP Professional CD-ROM are stored. However, you
brought your laptop from home, and your Windows XP Professional retail CD-ROM is
in the CD-ROM drive. What is the quickest way to begin your automated installations?
Choose the correct answer.
A. Use your personal Windows XP Professional retail CD-ROM, and provide the
product key originally included with the disk.
B. Use your personal Windows XP Professional retail CD-ROM and provide Fabrikam’s product key.
C. Copy the contents of your personal Windows XP Professional CD to a shared
folder, and perform a network installation. Provide Fabrikam’s product key.
D. Wait for the manager to return, and get a backup copy of the Windows XP Professional volume licensing CD-ROM.
Objective 1.4
Perform Post-Installation Updates and Product Activation 21-39
Objective 1.4 Answers
1.
Correct Answers: C
A. Incorrect: You use the /copydir parameter with the Windows XP setup routine
(Winnt32.exe) to copy an additional administrator-provided folder to a new
instance of Windows XP.
B. Incorrect: You use the /syspart parameter with Winnt32 only when preloading
Windows XP Setup on a hard drive before moving it to another computer.
C. Correct: The /integrate:distribution_folder is the correct syntax for updating a
Windows XP network distribution point. When this command is issued, the
update procedure identifies outdated files in the Windows XP setup files and
replaces them with versions included in Service Pack 2. As installations are performed from this distribution point, the updated files are automatically used. Previous service packs used the /s parameter to perform the same functionality, and
Service Pack 2 still supports the use of /s instead of /integrate.
D. Incorrect: The /o parameter is a valid parameter for the update command, but it
does not perform slipstreaming. The /o parameter is used to bypass prompting to
overwrite original equipment manufacturer (OEM) drivers during the service pack
install.
2.
Correct Answers: D
A. Incorrect: The first phase of the installation completed successfully, which
strongly suggests that the installation media is in good working order.
B. Incorrect: Although this is a possible explanation, it is highly unlikely because
the computer has been running for two years.
C. Incorrect: If you had entered an invalid product key during the informationgathering process, you would have seen an error message and been prompted to
re-enter the correct key. If you had entered a valid product key that had already
been assigned to a different computer, you would not see an error until you tried
to activate Windows XP.
D. Correct: You performed most of the steps necessary before beginning the
upgrade process, but you forgot to upgrade the BIOS with the latest version available
from the manufacturer. An incompatible BIOS can render a computer unbootable.
Recovering from this situation should not be too difficult if you have another system running that is connected to the Internet. Visit the manufacturer’s Web site
and download the latest BIOS. Follow the manufacturer’s instructions to upgrade
the BIOS on the target computer; typically this involves copying the BIOS update
to a bootable floppy disk and booting the target computer from it. After the BIOS
is upgraded, remove the floppy disk and reboot—the Windows XP Professional
installation should proceed without further problems.
21-40
3.
Chapter 21
Installing Windows XP Professional (1.0)
Correct Answers: D
A. Incorrect: Setup Manager is a tool for creating answer files to automate the
installation of Windows XP Professional or to fully automate a SysPrep installation
routine.
B. Incorrect: The SysPrep tool is used for deploying Windows XP Professional onto
multiple computers by using disk cloning. SysPrep assigns a unique security ID to
each destination computer the first time the computer is restarted. This tool is not
used for managing service packs or for adding and removing optional Windows
components.
C. Incorrect: In previous versions of Windows, you had to reapply the most recent
service pack after installing any additional components from the installation
media. Windows XP Professional overcomes this limitation by ensuring that all the
files included with a service pack are installed to the appropriate folders on the
hard disk, even those that are not currently needed. When an optional component
is added to a system with a newer service pack, the most recent files are automatically retained, eliminating the need to reapply the service pack.
D. Correct: For the reasons noted in answer C, it is not necessary to reapply the service pack.
4.
Correct Answers: A
A. Correct: This is the only information sent to Microsoft.
B. Incorrect: Although this information is sent to Microsoft during the registration
process, it is not sent during product activation. Registration is a voluntary step
that users can choose to bypass—product activation is required to continue running Windows XP Professional for more than 30 days after installation.
C. Incorrect: No personal information, especially financial information, is sent to
Microsoft.
D. Incorrect: The Windows XP Professional PID is sent to Microsoft; however, only
portions of the HKEY_LOCAL_MACHINE hive are sent.
5.
Correct Answers: C
A. Incorrect: Performing an upgrade installation does not allow you to change the
product activation key.
B. Incorrect: Although this procedure does work, it would be extremely time-consuming.
C. Correct: This procedure is the most efficient way to apply a valid product activation key to Windows XP. It is described more fully in Microsoft Knowledge Base
article 328874.
D. Incorrect: The product key is not an environment variable; it can be changed
only by using the Msoobe.exe tool.
Objective 1.4
6.
Perform Post-Installation Updates and Product Activation 21-41
Correct Answers: B and C
A. Incorrect: Service Pack 2 does not add a program group to the Windows XP Start
menu.
B. Correct: The easiest way to manually remove Service Pack 2 is to use Add Or
Remove Programs.
C. Correct: You can uninstall Service Pack 2 from a command line by running the
Spuninst.exe application.
D. Incorrect: The Setup.exe application cannot be used to remove Service Pack 2.
7.
Correct Answers: D
A. Incorrect: Most retail product keys can be used to activate only a single computer, and you have already installed Windows XP Professional on your laptop.
Additionally, this would allow you to complete the installation of only a single
computer.
B. Incorrect: You cannot use volume licensing product keys to activate retail Windows XP installations. Similarly, you cannot activate retail Windows XP installations with volume licensing product keys.
C. Incorrect: You cannot use volume licensing product keys to activate retail Windows XP installations, regardless of whether the installation occurs across a network or directly from the media.
D. Correct: You must use the volume licensing CD-ROM with the volume licensing
product key.
21-42
Chapter 21
Installing Windows XP Professional (1.0)
Objective 1.5
Troubleshoot Failed Installations
Setting up an operating system is an extremely complex procedure. The rich variety of
hardware components provides an unlimited number of combinations that the setup
routine must be able to accommodate. To make these procedures even more complex,
Windows XP Professional is often installed on hardware that was designed after the
release of the operating system.
These complexities lead to occasional failures of the setup routine. Although these failures are challenging to resolve, Windows XP Professional makes this a much simpler
process by providing detailed logging and debugging information. Understanding how
to interpret these log files is critical to quickly resolving failed installations. If you find
that these log files are not providing enough information to effectively troubleshoot a
failed installation, detailed debugging can be enabled.
The setup routine has three installation phases: the Setup Loader phase, the TextMode Setup phase, and the GUI-Mode Setup phase. Understanding which installation
steps occur during each of these three stages is critical to troubleshooting a failed
install.
Throughout these setup phases, text-based log files are written to the local hard disk
for later reference. These log files are located in the %systemroot% directory and end
with a log file extension. After every successful and unsuccessful step of the installation routine, a detailed description of the action is appended to the various log files
for later reference. Referring to these log files will uncover the nature of any problems experienced, even if the installation routine could complete successfully. If the
installation routine fails, identifying the last log entries written helps isolate the
nature of the failure.
Objective 1.5
Troubleshoot Failed Installations 21-43
Objective 1.5 Questions
1.
You are attempting to perform a new manual installation of Windows XP on a system
that already has Windows Me installed. The setup routine fails, and you accidentally
clear the error message box before reading it. Which log file do you view first to read
the details of the error? Choose the correct answer.
A. Setuperr.log
B. Comsetup.log
C. IIS6.log
D. Tsoc.log
2.
You are attempting to perform a new manual installation of Windows XP on a system
that already has Windows Me installed. The setup routine succeeds, but afterward you
cannot connect to the system with the Terminal Services client. Which log files do you
view to determine whether errors were experienced during the installation of the terminal services? Choose two correct answers.
A. Setuperr.log
B. Comsetup.log
C. IIS6.log
D. Tsoc.log
E. Oewablog.txt
3.
After several installation failures, you determine that you need to examine a debug log
for the setup routine. You want the setup routine to create the most detailed debug log
possible. Which command do you use? Choose the correct answer.
A. Winnt32 /debug7:debug.log
B. Winnt32 /debug4:debug.log
C. Winnt32 /debug1:debug.log
D. Winnt32 /debug0:debug.log
21-44
4.
Chapter 21
Installing Windows XP Professional (1.0)
You are a desktop administrator for the Graphic Design Institute, a small design firm.
Your firm recently hired a new designer who insisted his workstation use a Small Computer System Interface (SCSI) drive because disk performance is critical to his work.
You purchase a new computer without a hard disk, install a SCSI adapter, and connect
the SCSI drive according to the manufacturer’s instructions. You install Windows XP
Professional manually from the installation CD-ROM. During the installation, you
receive an error message indicating that Setup could not find a hard disk. After doublechecking the SCSI connections, you attempt the installation again and again receive the
error. Which of the following procedures would most likely solve the problem? Choose
the correct answer.
A. Perform the installation by using the original Windows XP Professional setup files
from a shared folder on the network.
B. Slipstream Service Pack 2 for Windows XP into the installation files and perform
the installation from the slipstreamed files.
C. Restart installation again and provide the SCSI driver when prompted by Setup.
D. Reconfigure the computer’s BIOS to boot from the SCSI hard disk instead of the
CD-ROM drive.
Objective 1.5
Troubleshoot Failed Installations 21-45
Objective 1.5 Answers
1.
Correct Answers: A
A. Correct: The Windows XP setup routine creates the Setuperr.log file during
installation, and adds a description of every error encountered. This file is located
in the %systemroot% directory.
B. Incorrect: The Comsetup.log file contains a description of the progress of COM+
(Component Object Model) installation, but does not contain general error log
information.
C. Incorrect: The IIS6.log file contains a description of the progress of the IIS6
installation, but does not contain general error log information.
D. Incorrect: The Tsoc.log file contains a description of the progress of the installation of terminal services, but does not contain general error log information.
2.
Correct Answers: A and D
A. Correct: The Windows XP setup routine creates the Setuperr.log file during
installation, and adds a description of every error encountered. This file is located
in the %systemroot% directory.
B. Incorrect: The Comsetup.log file contains a description of the progress of COM+
(Component Object Model) installation, but does not contain general error log
information.
C. Incorrect: The IIS6.log file contains a description of the progress of the IIS6
installation, but does not contain general error log information.
D. Correct: The Tsoc.log file contains a description of the progress of the installation of terminal services. Examining this file in addition to the Setuperr.log file
might reveal more detailed information about the nature of the problem experienced.
E. Incorrect: The Oewablog.txt file contains information about the Microsoft Outlook Express installation, but does not contain general error log information.
3.
Correct Answers: B
A. Incorrect: Although the /debug[level]:[filename] syntax is correct, debug level 7 is
not a valid option.
B. Correct: The /debug[level]:[filename] syntax is correct, and debug level 4 is the
highest level of debugging available. Possible options vary from 0 to 4; 0 represents severe errors, 1 represents errors, 2 represents warnings, 3 represents informational messages, and 4 represents very detailed information. Naturally, each
higher level of debugging includes information from all lower levels.
21-46
Chapter 21
Installing Windows XP Professional (1.0)
C. Incorrect: Although the /debug[level]:[filename] syntax is correct, debug level 1
records only errors and severe errors.
D. Incorrect: Although the /debug[level]:[filename] syntax is correct, debug level 0
records only severe errors.
4.
Correct Answers: C
A. Incorrect: Performing the installation from a shared folder would not solve this
problem because the hardware detection would not be changed.
B. Incorrect: Slipstreaming is an excellent way to reduce the time spent updating
Windows XP after installation completes, but it is not likely to solve the problem
of missing SCSI drivers.
C. Correct: Windows XP Setup requires drivers for many types of SCSI adapters to
write the operating system files to the hard disk. Although the setup routine
prompts you to provide SCSI drivers, many administrators are accustomed to
ignoring the prompt and tend to overlook it when they do need it.
D. Incorrect: Although the computer will need to be configured to boot from the
hard disk at some point, it will probably do so with the default BIOS settings.
Regardless, the problem occurred before the setup procedure could copy files to
the hard disk and before the computer needed to boot from the hard disk. Therefore, changing this BIOS setting would not affect the detection of the hard disk.
22 Implementing and
Conducting Administration
of Resources
For the average user, managing disks, shared folders, and printers is self-explanatory
because Microsoft Windows XP does an excellent job of making these resources simple
to administer. Administrators who are expected to troubleshoot these resources must
understand these management tasks in more detail, however. For example, understanding the differences between File Allocation Table (FAT), FAT32, and NT File System (NTFS) can mean the difference between having a system that successfully dual
boots between Windows Me and Windows XP, and a system that must be rebuilt from
scratch. Although most users can set up a locally attached printer, troubleshooting
problems with network printers can be extremely challenging.
Network connectivity is critical for most users, yet it is not always possible for users
who travel with portable computers. Offline Files minimize the problems users experience when disconnected from the network or accessing files across an unreliable network connection. Files in a shared folder can be automatically synchronized with the
local hard disk when connected to a network, and users can access these files transparently when the network is not available. Files even can be edited while offline and
automatically synchronized later.
Tested Skills and Suggested Practices
The skills you need to successfully master the Implementing and Conducting Administration of Resources domain on the Installing, Configuring, and Administering
Microsoft Windows XP Professional exam include the following:
■
Implementing and administering Windows XP file system features.
Important
You must perform these exercises only on a test computer. Modifying the disk
configuration of production computers is very risky.
❑
Practice 1: Create a partition using the Disk Management snap-in.
❑
Practice 2: Convert a file system from FAT32 to NTFS using the Convert.exe
command-line utility.
22-1
22-2
Chapter 22
Implementing and Conducting Administration of Resources
❑
Practice 3: Convert a basic disk to a dynamic disk using the Diskpart.exe command-line utility.
❑
Practice 4: Using the Disk Management snap-in, experiment with the different
options available when accessing basic and dynamic disks.
❑
Practice 5: Create a striped disk by combining two dynamic disks.
❑
Practice 6: Use mount points to graft a dynamic volume into the file system of
an existing volume.
❑
Practice 7: Move files between compressed and uncompressed folders on an
NTFS volume, and notice whether the compression status is inherited from
the source or destination folder.
❑
Practice 8: Move files between compressed and uncompressed folders on different NTFS volumes, and notice whether the compression status is inherited
from the source or destination folder.
❑
Practice 9: Compress different types of files, and determine which file types
benefit the most from compression.
❑
Practice 10: Create a share that only members of the Administrators group can
access.
❑
Practice 11: Create a shared folder using the net share command.
❑
Practice 12: Remotely connect to a folder shared from a Windows XP Professional system. Then, from the system hosting the shared folder, open the
Shared Folders snap-in. Use this tool to send all connected users a message
warning them that their session will be disconnected. Finally, forcibly disconnect the user’s session.
❑
Practice 13: Grant a user Full Control over a folder by using NTFS file permissions. Create a share, and grant that same user only Read access at a share
level. Experiment with that user’s ability to write files to the shared folder
when accessing across the network. Do that user’s rights differ when accessing the same folder when logged on locally?
❑
Practice 14: Stop the Workstation service and attempt to connect to a shared
folder. Next, stop the Server service and attempt to create a shared folder.
Important
For the following task, you should complete at least Practices 1 through 4. If
you want hands-on experience with every aspect of the exam and you have the extra lab
resources needed to do Practice 5, then complete Practice 5 as well.
Further Reading
■
■
22-3
Implementing and administering Windows XP printing.
❑
Practice 1: Add and share a new printer using the Add Printers Wizard.
❑
Practice 2: Stop the Workstation service and attempt to connect to a shared
printer. Next, stop the Server service and attempt to create a shared printer.
❑
Practice 3: Remove the default right of the Power Users group to manage a
printer.
❑
Practice 4: Print to a shared printer and immediately remove the document
using the Printers And Faxes window.
❑
Practice 5: Connect to an Internet Printing Protocol (IPP) shared printer using
a URL. Print a document and use Internet Explorer to remove the document
before it has completed printing.
Configuring offline files.
❑
Practice 1: Disable simple folder sharing—this is required for all following
exercises.
❑
Practice 2: Create a shared folder and enable automatic caching of documents.
❑
Practice 3: Connect to a folder shared from a Windows XP system and pin
individual documents to ensure synchronization.
❑
Practice 4: Change the default synchronization behavior so that files are synchronized nightly instead of when users log on and log off.
❑
Practice 5: Create a shared folder and configure it for automatic caching of
programs. Connect to this share from a client system and pin files for synchronization. Disconnect from the network and modify the synchronized files.
Reconnect to the network and attempt to synchronize the modified files to
the shared folder.
Further Reading
This section lists supplemental readings by objective. We recommend that you study
these sources thoroughly before taking exam 70-270.
Objective 2.1 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 16,
“Authorization and Access Control.” This chapter provides an overview of file
security concepts such as discretionary access control lists (available online at
http://www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prdd_sec_quni.asp).
22-4
Chapter 22
Implementing and Conducting Administration of Resources
Objective 2.2 “Troubleshooting File and Printer Sharing in Microsoft Windows XP” by
Microsoft Corporation (available online at http://www.microsoft.com/downloads/
details.aspx?familyid=fd7fd48d-6b4a-448e-a632-076f98a351a2).
“File and Printer Sharing with Microsoft Windows” by Microsoft Corporation
(available online at http://www.microsoft.com/downloads/details.aspx?FamilyID=
87C0A6DB-AEF8-4BEF-925E-7AC9BE791028).
Objective 2.3 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 11,
“Enabling Printing and Faxing.” This chapter provides detailed information about
managing printers both locally and across a network (available online at http://
www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prdl_pif_frpc.asp).
“Troubleshooting File and Printer Sharing in Microsoft Windows XP” by Microsoft
Corporation (available online at http://www.microsoft.com/downloads/details
.aspx?familyid=fd7fd48d-6b4a-448e-a632-076f98a351a2).
“File and Printer Sharing with Microsoft Windows” by Microsoft Corporation
(available online at http://www.microsoft.com/downloads/details.aspx?FamilyID=
87C0A6DB-AEF8-4BEF-925E-7AC9BE791028).
“Printing, Imaging, Fax, and All-in-One Frequently Asked Questions” by Bruce Sanderson (available online at http://members.shaw.ca/bsanders/PrintingFAQ.HTM).
Objective 2.4 “Choosing between NTFS, FAT, and FAT32” in Windows XP Help and
Support Center (available online at http://www.microsoft.com/windowsxp/home/
using/productdoc/en/choosing_between_NTFS_FAT_and_FAT32.asp).
Objective 2.5 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 5, “Managing Desktops,” Chapter 6, “Managing Files and Folders,” and Chapter 7, “Supporting Mobile Users.” Pay particular attention to the sections that explain offline
file synchronization and the suite of IntelliMirror technologies (available online at
http://www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prda_dcm_vdxa.asp).
Objective 2.1
Monitor, Manage, and Troubleshoot Access to Files and Folders
22-5
Objective 2.1
Monitor, Manage, and
Troubleshoot Access to Files
and Folders
Windows XP Professional administrators must understand the details behind NTFS
compression precisely because it is so easy to use. As the feature increases in popularity, so will the number of users experiencing problems. Although any user can compress a folder using Windows Explorer, only the system administrators can explain
exactly how compressed folders affect system performance and available disk space.
Although Windows Explorer provides the most user-friendly interface into the details
of compression, the Compact.exe utility is useful to administrators who need to compress multiple folders on a system or compress folders on many different systems.
NTFS file compression does not obey the same rules of inheritance as other aspects of
Windows XP. For example, files that are copied always inherit the compression state of
the destination folder. However, if you move files within a single volume, the compression state of the file is retained. To make things more confusing, files moved between
different volumes inherit the compression state of the destination folder.
Windows XP Professional includes the ability to restrict users’ access to files and folders
using NTFS file permissions. For example, a user that has Full Control permission to a
file might alter other users’ rights to that file by modifying the discretionary access control list (DACL). Similar to the way Compact.exe provides a command-line alternative
to enable compressing within Windows Explorer, Cacls.exe provides a command-line
method for modifying file permissions.
22-6
Chapter 22
Implementing and Conducting Administration of Resources
Objective 2.1 Questions
1.
You are moving files from the folder \OLD to the folder \NEW on the same volume.
The \OLD folder is compressed using Windows XP NTFS compression, but the \NEW
folder is not. What will the compression status of the files be after the move has completed?
A. The files are uncompressed.
B. The files are compressed.
C. An error is returned because the files cannot be moved until their compression status matches that of the destination folder.
D. The destination files are not compressed because Windows XP automatically
changes the type of file transfer to copy instead of move to allow the transfer to
complete.
2.
You are copying files from the folder \OLD to the folder \NEW on the same volume.
The \OLD folder is compressed using NTFS compression, but the \NEW folder is not.
What will the compression status of the files be after the copy has completed?
A. The files are uncompressed.
B. The files will be compressed.
C. An error is returned because the files cannot be copied until their compression status matches that of the destination folder.
D. The destination files are not compressed because Windows XP automatically
changes the type of file transfer to move instead of copy to allow the transfer to
complete.
3.
You need to copy a text-based log file that is compressed using NTFS compression to
another volume. The file size of the log file is 2 GB; however, it consumes only 50 MB
of the file system because it is compressed. The destination volume has only 1 GB of
available space, so you enable compression on the folder that will receive the log file.
During the file transfer, you receive an error indicating that there is not enough space
to complete the copy. Which is the most likely explanation?
A. Files copied between volumes are always written as uncompressed, regardless of
the compression state of the source file or the destination folder.
B. Files copied between volumes are first written to the disk uncompressed. NTFS
then compresses the file only if the destination folder is compressed.
C. Files copied between volumes inherit the compression state of the base volume,
not the destination folder. Because the volume itself is not compressed, NTFS
attempts to write the file uncompressed.
Objective 2.1
Monitor, Manage, and Troubleshoot Access to Files and Folders
22-7
D. Compressed files must be written to unfragmented areas of the disk. Although the
destination disk might have sufficient free space, the free space is fragmented and
therefore unusable for compressed files.
4.
You need to increase the free space on a Windows XP Professional system. Which of
the following folders are good candidates for NTFS compression? Choose two correct
answers.
A. The system folder
B. A folder of archived IIS log files
C. A folder containing active IIS log files
D. A folder containing images in the BMP format
E. The %TEMP% folder
5.
You need to grant Read access to files in the \Presentations folder for members of the
Marketing user group in your Windows 2000 Active Directory. There is one exception,
however, and his name is Todd. Todd is a member of the Marketing group, but must
not be allowed access to your presentations. Which of these procedures provides the
desired effect?
A. Within the share permissions of the shared folder, grant Read access to the Marketing Read group. Using Windows Explorer, edit the NTFS file permissions and
remove all existing permissions. Grant Change access to the Everyone group.
Assign the members of the Marketing group Read access, and remove the rights
from the user Todd.
B. Within the folder share permissions, grant Everyone Full Control access. Using
Windows Explorer, edit the NTFS file permissions and remove all existing permissions. Assign the No Access permissions to the Marketing group. Assign Read
access to all members of the Marketing group with the exception of the user Todd.
C. Within the folder share permissions, grant Marketing Read access. Using Windows
Explorer, edit the NTFS file permissions and remove all existing permissions.
Assign the No Access permissions to the user Todd.
D. Within the folder share permissions, grant Everyone Full Control access. Using
Windows Explorer, edit the NTFS file permissions and remove all existing permissions. Grant Read access to the Marketing group. Deny Read access permission to
the user Todd.
22-8
Chapter 22
Implementing and Conducting Administration of Resources
Objective 2.1 Answers
1.
Correct Answers: B
A. Incorrect: Files that are moved within a single volume do not inherit the compression properties of the destination folder. This might seem confusing unless
you understand that files are not rewritten when they are moved within a volume;
only the pointer to the file is changed.
B. Correct: When files are moved within a single volume, the compression status of
the files does not change.
C. Incorrect: Windows XP Professional does allow files to be moved to a destination folder that has a different compression status. However, the compression status of the files does not change and does not inherit the status of the destination
folder.
D. Incorrect: Although files that are copied always inherit the compression status of
the destination folder, Windows XP Professional does not automatically change
the type of file transfer from move to copy.
2.
Correct Answers: A
A. Correct: Files that are copied within a single volume always inherit the compression properties of the destination folder. This is in contrast to files that are moved
within a single volume, which retain their compression status.
B. Incorrect: When files are copied—either within a single volume or between volumes—the compression status of the files is inherited from the destination folder.
C. Incorrect: Windows XP Professional does allow files to be copied to a destination folder that has a different compression status. The files inherit the compression status of the destination folder.
D. Incorrect: Windows XP Professional has the capability to move and copy files
between folders that have different compression settings. When files are copied,
they always inherit the compression status of the destination folder.
3.
Correct Answers: B
A. Incorrect: Files copied between volumes inherit the compression property of the
destination folder.
B. Correct: Compression cannot occur on a file until the entire file has been
received. Therefore, the file is written to the destination volume uncompressed.
NTFS automatically compresses the file after the file transfer has completed. However, because the file is initially written uncompressed regardless of the compression state of the destination folder, the destination volume must have enough free
space to store the entire uncompressed file.
Objective 2.1
Monitor, Manage, and Troubleshoot Access to Files and Folders
22-9
C. Incorrect: Files copied between volumes inherit the compression property of the
destination folder, regardless of the compression status of the volume.
D. Incorrect: Compressed files are written in blocks to the disk and can be fragmented like any other file. In fact, using compressed files necessitates more frequent disk defragmentation because of the way NTFS compresses files.
4.
Correct Answers: B and D
A. Incorrect: NTFS compression negatively affects system performance, so you
must avoid compressing files that are accessed frequently, such as system files.
B. Correct: Old log files are an excellent candidate for NTFS compression. Log files
compress significantly, and because they are not being regularly accessed, the
compression will not negatively affect system performance.
C. Incorrect: Windows XP Professional must perform processor-intensive calculations when writing to compressed files. These calculations can negatively affect
system performance in situations where the processor is the performance bottleneck. Active IIS log files are written to regularly, making them a poor candidate for
compression.
D. Correct: BMP files compress extremely well because of the large amount of
redundant information within a file. Unless bitmap files are being accessed continuously, they make an excellent candidate for compression.
E. Incorrect: Many applications for Windows XP Professional use the %TEMP%
folder continuously. The processor overhead associated with reading from and
writing to compressed files can negatively affect system performance, so it is never
advisable to compress the temp folder.
5.
Correct Answers: D
A. Incorrect: This method does not accomplish the desired effect. Although the
user Todd does not have explicit access to the folder, he has Change permissions
because of his implicit membership in the Everyone group. His effective privileges
are Read because of the restriction placed on the share.
B. Incorrect: This method does not accomplish the desired effect. The No Access
permission always overwrites all other permissions. So, all members of the Marketing group are restricted from accessing the files because the No Access right
was assigned to the Marketing user group.
C. Incorrect: This method does not accomplish the desired effect. The Marketing
group has been assigned Read access to the folder share permissions, but this is
not sufficient to enable members of that group to access files on the file system.
For access to be granted to files accessed through a network share, a user must
have access to both the share and the underlying file system. In this scenario, adding the Read right to the Marketing group within NTFS permissions accomplishes
the desired effect.
22-10
Chapter 22
Implementing and Conducting Administration of Resources
D. Correct: This method accomplishes the desired effect. Members of the Marketing
group have access to the shared folder through their implicit membership in the
Everyone group. They have been explicitly assigned Read access to the folder at
the NTFS level. Finally, Todd’s access was removed by explicitly assigning Deny
Read access rights. Assigning the Deny Read access right overrides the Read
access that was granted to the Marketing group.
Objective 2.2
Manage and Troubleshoot Access to Shared Folders 22-11
Objective 2.2
Manage and Troubleshoot
Access to Shared Folders
Windows XP Professional is more than a desktop operating system; it is a peer-to-peer
networking platform. Using Windows XP Professional, users can give other users carefully restricted access to files and printers across the network. Share permissions are
similar to file permissions (when simple file sharing is disabled), but share permissions
can be defined regardless of the underlying file system.
Besides traditional file sharing, Windows XP Professional users also have the option of
creating Web shares. Users access Web shares in the same way as folder shares, or they
can be accessed with a browser such as Microsoft Internet Explorer to present a more
interactive Web interface. Web shares rely on the World Wide Web Publishing service
instead of the Server service. The World Wide Web Publishing service is part of IIS,
which is not installed during a standard Windows XP Professional installation.
22-12
Chapter 22
Implementing and Conducting Administration of Resources
Objective 2.2 Questions
1.
Which Windows XP Professional built-in user groups have permissions to create
shared folders? Choose two correct answers.
A. Administrators
B. Network Configuration Operators
C. Backup Operators
D. Power Users
E. Users
2.
You need to create a shared folder on your Windows XP Professional system, but you
do not want users browsing the network to see the share. How do you name a share
to ensure that it is not visible to users through My Network Places?
A. PRIVATE#
B. $PRIVATE
C. #PRIVATE
D. PRIVATE$
3.
You are a domain administrator of your company’s Windows 2003 Active Directory.
You want to create a shared folder to allow one of your coworkers to view files on
your Windows XP Professional system. You create an Active Directory user account
named EricG, and grant it Change permissions to your \Presentations folder using Windows Explorer. You then share the folder as Presentations, remove all default share
permissions, and assign the EricG user account Read permissions. What are EricG’s
effective permissions when connecting to the share across the network?
A. No Access
B. Read
C. Change
D. Full Control
4.
What is the maximum number of users who can connect to a single folder shared on
a Windows XP Professional system?
A. 1
B. 5
C. 10
D. 20
Objective 2.2
5.
Manage and Troubleshoot Access to Shared Folders 22-13
You are the systems administrator for Margie’s Travel, a travel agency with a small network based on Windows Server 2003 and Windows XP Professional. Recently, Kim
Akers in Accounting created a spreadsheet that employees can use to automatically
generate expense reports. Kim saved the spreadsheet to a share named ACCOUNTING
on your organization’s server (server.margiestravel.com) using the file name ExpenseReports.xls. Kim has a drive mapped to the shared folder, but nobody else at Margie’s
Travel understands how to access shared folders, so she wants to send out an e-mail
with a Uniform Resource Locator (URL) that staff members can enter into Internet
Explorer to open the file. Which URL do you recommend that Kim use?
A. ftp://server/accounting/expense-reports.xls
B. http://server.margiestravel.com/accounting/expense-reports.xls
C. file://server.margiestravel.com/accounting/expense-reports.xls
D. http://server/accounting/expense%20reports.xls
6.
As a favor to a friend, you are configuring two new Windows XP Professional computers to participate in a workgroup. Your friend needs to be able to share files between
the two computers. After installing Windows XP Professional on both computers, and
then installing Service Pack 2, what is the simplest procedure to allow one of the computers to share a folder?
A. Simply share the folder.
B. Share the folder. Then, select the File And Printer Sharing service on the list of
Windows Firewall exceptions.
C. Share the folder. Then, add TCP ports 389 and 445 and UDP ports 137 and 138 to
the list of Windows Firewall exceptions.
D. Share the folder. Then, add Services.exe to the list of Windows Firewall program
exceptions.
7.
Which Windows component is required to share Web folders?
A. Other Network File And Print Services
B. Internet Information Services (IIS)
C. Message Queuing
D. Management and Monitoring Tools
22-14
Chapter 22
Implementing and Conducting Administration of Resources
Objective 2.2 Answers
1.
Correct Answers: A and D
A. Correct: Administrators, by default, can create shares on Windows XP Professional systems. Select the Computer Administrator account type to place a user
only into the Administrators group when using the User Accounts Wizard. Grant
this privilege only to users who understand the security implications associated
with sharing folders across a network.
B. Incorrect: The Network Configuration Operators group provides a member user
with the ability to modify network parameters such as an IP address. However, it
does not provide the ability to share folders.
C. Incorrect: Although Backup Operators can access the entire file system for the
purpose of backing up files, they do not have the ability to share folders.
D. Correct: Power Users, by default, can create shares on Windows XP Professional
systems. User accounts cannot be placed in the Power Users group directly from
the Control Panel, however. To place a user account into the Power Users group,
use the Computer Management administrative utility. Grant Power Users privilege
only to users who understand the security implications associated with sharing
folders across a network.
E. Incorrect: One of the differences between the Power Users and the Users groups
is that the Users group lacks the ability to create shared folders. Creating a shared
folder provides access to the contents of that folder across the network, and, as a
result, can weaken the security of a system if misused. Therefore, place users who
do not understand the implications of shared folders only into the Users group.
Select the Limited account type to place a user only into the Users group when
using the User Accounts Wizard.
2.
Correct Answers: D
A. Incorrect: This answer is incorrect for the reasons stated in answer D.
B. Incorrect: This answer is incorrect for the reasons stated in answer D.
C. Incorrect: This answer is incorrect for the reasons stated in answer D.
D. Correct: Hidden shares are created by ending the share name with a $.
3.
Correct Answers: B
A. Incorrect: Users have No Access rights to the share only if they are explicitly
assigned No Access or if they, or any group they belong to, are not named in the
permissions. In this case, the user has been assigned Change file permissions and
Read share permissions.
Objective 2.2
Manage and Troubleshoot Access to Shared Folders 22-15
B. Correct: Share permissions override file permissions when the user accesses files
across the network. Windows XP Professional restricts EricG’s access to read-only
because that user has only Read share permissions. If EricG were to log on locally
to the system, he could modify files because Change permissions are assigned at
an NTFS level. In other words, when users access files using a network share, only
the most restrictive permissions are granted.
C. Incorrect: Although EricG has Change permissions at the NTFS level, the Read
share permissions take precedence because Windows XP Professional uses the
most restrictive permissions when comparing access at both the share level and
file level.
D. Incorrect: The user EricG has Full Control permissions to the files in the shared
folder only if the user were explicitly granted Full Control in both the file permissions and the share permissions.
4.
Correct Answers: C
A. Incorrect: A maximum of 10 users can connect to a folder shared on a Windows
XP Professional system.
B. Incorrect: A maximum of 10 users can connect to a folder shared on a Windows
XP Professional system.
C. Correct: Only 10 users can simultaneously connect to a folder shared on a Windows XP Professional system. You need to use a member of the Windows Server
2003 family to provide access to more than 10 users simultaneously.
D. Incorrect: A maximum of 10 users can connect to a folder shared on a Windows
XP Professional system.
5.
Correct Answers: C
A. Incorrect: The protocol specified in this URL, File Transfer Protocol (FTP), probably will not work because the question did not specify that FTP is running on the
server. FTP is an optional component of Internet Information Server (IIS) that is
available for both Windows Server 2003 and Windows XP Professional, but it is
not enabled by default, and additional configuration would be required to enable
files to be shared through FTP.
B. Incorrect: The protocol specified in this URL, Hypertext Transfer Protocol
(HTTP), probably will not work because the question did not specify that HTTP is
running on the server. The HTTP protocol is the foundation for Web communications, and is implemented by the IIS and available for both Windows Server 2003
and Windows XP Professional. Although it would be possible to configure the
server to share this file via HTTP, IIS does not share any files by default.
22-16
Chapter 22
Implementing and Conducting Administration of Resources
C. Correct: Specifying file for the protocol in the URL instructs Internet Explorer to
access the file using shared folders. This URL is exactly equivalent to \\server.margiestravel.com\accounting\expense-reports.xls.
D. Incorrect: As with answer B, the protocol is incorrect. Additionally, the hyphen
in the file name has been replaced with %20, a special sequence used in URLs to
represent a space character, not a hyphen.
6.
Correct Answers: A
A. Correct: Windows Firewall is enabled by default after Service Pack 2 is installed.
However, Windows XP automatically configures Windows Firewall to allow file
and printer sharing traffic when you create a share.
B. Incorrect: You do not need to manually select the File And Printer Sharing service because Windows XP automatically adds it to the Windows Firewall exception list.
C. Incorrect: Although this procedure does work, you do not need to manually add
ports 389 and 445 to the list of Windows Firewall exceptions because Windows XP
automatically adds the File And Printer Sharing service to the list of Windows Firewall exceptions.
D. Incorrect: As with answers B and C, you do not need to add any exceptions
because Windows XP handles it automatically.
7.
Correct Answers: B
A. Incorrect: This Windows component allows sharing printers with UNIX computers and does not relate to Web folders.
B. Correct: IIS is required for Web folders. Web folders use the HTTP protocol,
which is provided by the World Wide Web Publishing service, a component of IIS.
C. Incorrect: Message Queuing is used by some applications to communicate
across a network. However, it is not required by Web folders.
D. Incorrect: This component is primarily used by network administrators to manage and monitor Windows XP computers.
Objective 2.3
Connect to Local and Network Print Devices 22-17
Objective 2.3
Connect to Local and Network
Print Devices
Windows XP Professional allows users on the network to access a printer attached to
a remote system in several different ways: standard file and printer sharing, Internet
Printing Protocol (IPP), a Standard TCP/IP Port, and the Line Printer Remote (LPR) protocol. Controlling access to a shared printer is very different from controlling the security applied to file share. The primary rights available are Print, Manage Printers, and
Manage Documents. By default, Everyone is allowed to print and manage their own
documents, and only Power Users and Administrators are granted access to manage all
documents and printers.
Connecting to remote printers is handled through the Add Printer Wizard—the same
interface used to set up a directly connected printer. To connect to a network printer,
users have the option of selecting the printer by browsing the network, typing a Universal Naming Convention (UNC) name in the form \\server\printer, or typing a URL
in the form http://server/printers/printer/.printer. Local printers, networked LPR printers, and networked Standard TCP/IP printers are all configured as if they are connected
directly to the computer.
22-18
Chapter 22
Implementing and Conducting Administration of Resources
Objective 2.3 Questions
1.
Which services must be running to connect to and print to network printers? Choose
two correct answers.
A. Computer Browser
B. Net Logon
C. Network Connections
D. Print Spooler
E. Server
F. Workstation
2.
Which services must be running to share a printer on a network and allow network
users to print? Choose two correct answers.
A. Computer Browser
B. Net Logon
C. Network Connections
D. Print Spooler
E. Server
F. Workstation
3.
You are configuring your Windows XP Professional computer to connect to a printer
that is shared by a UNIX server using the Line Printer Daemon (LPD) service. How
should you connect to the printer?
A. In Printers and Faxes, double-click Add A Printer. In the Add Printer Wizard, add
a local printer. When prompted, create a new port of type LPR Port.
B. In Printers and Faxes, double-click Add A Printer. In the Add Printer Wizard, add
a network printer. When prompted, create a new port of type LPR Port.
C. In Printers And Faxes, double-click Add A Printer. In the Add Printer Wizard, add
a local printer. When prompted, create a new port of type Standard TCP/IP Port.
D. In Printers And Faxes, double-click Add A Printer. In the Add Printer Wizard, add
a network printer. When prompted, create a new port of type Standard TCP/IP
Port.
Objective 2.3
4.
Connect to Local and Network Print Devices 22-19
You are using a Windows XP Professional computer with Service Pack 2 installed and
Internet Explorer’s default security settings. You want to connect to a printer on the
Internet by using Web-based printer management. How will Windows XP connect to
the printer?
A. Using Print Services for UNIX and LPR
B. Using IPP and HTTP
C. Using remote procedure call (RPC) true-connect
D. Using LPT1 and the Standard TCP/IP Port
22-20
Chapter 22
Implementing and Conducting Administration of Resources
Objective 2.3 Answers
1.
Correct Answers: D and F
A. Incorrect: Although the Computer Browser service helps users find printers on a
network, it is not required to explicitly connect to shared network printers.
B. Incorrect: The Net Logon service is used for pass-through authentication for
computers in a domain, but is not required to connect to shared network printers.
C. Incorrect: The Network Connections service is used to manage objects in the
Network and Dial-Up Connections folder and does not need to be running to connect to shared network printers.
D. Correct: The Print Spooler service is responsible for receiving files from applications and forwarding them to printers. Any time a user needs to print from a Windows XP Professional system, the Printer Spooler service must be running—
including printing to a network printer.
E. Incorrect: The Server service is required only on the system hosting the shared
printer. Windows XP Professional systems connecting to the shared printer across
the network do not need to have the Server service running.
F. Correct: The Workstation service is responsible for establishing connections to
shared files and printers. Therefore, although it is not required when printing to a
local printer, it is required when printing to a shared network printer.
2.
Correct Answers: D and E
A. Incorrect: Although the Computer Browser service helps users find printers on a
network, it is not required to explicitly share printers.
B. Incorrect: The Net Logon service is used for pass-through authentication for
computers in a domain, but is not required to shared network printers. However,
if the Net Logon service is not running, users must have an account on the Windows XP Professional system that is sharing the printer. For users authenticated
using domain accounts, the Net Logon service is required because it enables passthrough authentication.
C. Incorrect: The Network Connections services is used to manage objects in the
Network and Dial-Up Connections folder, and does not need to be running to
share network printers.
D. Correct: The Print Spooler service is responsible for receiving files from applications and forwarding them to printers. Any time a user needs to print to a Windows XP Professional system, the Printer Spooler service must be running—
including remote users printing to a shared printer.
Objective 2.3
Connect to Local and Network Print Devices 22-21
E. Correct: The Server service is required on the system hosting the shared printer
because it is responsible for receiving network connections from remote systems.
The Server service interacts with the Workstation service, which acts as the client
in the client-server relationship.
F. Incorrect: The Workstation service is responsible for establishing connections to
shared files and printers. Although it is required for users connecting to a remote
printer, it does not need to be running on the Windows XP Professional system
sharing the printer.
3.
Correct Answers: A
A. Correct: Although you are connecting to a network printer, the Add Printer Wizard treats LPD-based printers as local printers with an LPR port.
B. Incorrect: This would seem to be the logical answer because the printer is
shared across a network. However, the Add Printer Wizard treats LPD-based printers as local printers.
C. Incorrect: The Standard TCP/IP Port type is usually used by printers that connect
directly to a network. You must use LPR Port to connect to LPD-based printers.
D. Incorrect: As with answer C, this is the incorrect port type. LPR Port must be
used with LPD-based printers.
4.
Correct Answers: B
A. Incorrect: Although Windows XP does support using LPR, it does not automatically configure LPR from Web-based printer management.
B. Correct: If the client’s Internet Explorer security settings for the print server are
set to Medium or higher, Windows XP creates an IPP printer connection using an
HTTP port. In this case, the print server is on the Internet, and therefore Internet
Explorer will assign the print server the Medium security level by default.
C. Incorrect: Windows XP uses RPC true-connect only if the client’s Internet
Explorer settings are set to Medium-Low or lower. In this case, the print server is
on the Internet, and therefore Internet Explorer will assign the print server the
Medium security level by default.
D. Incorrect: Although Windows XP does support using a Standard TCP/IP Port, it
will not automatically configure this port type from Web-based printer management.
22-22
Chapter 22
Implementing and Conducting Administration of Resources
Objective 2.4
Configure and Manage File
Systems
Windows XP Professional supports both basic disks and dynamic disks. Basic disks are
the only format available to Windows Me, Windows NT 4.0, and earlier operating systems. Dynamic disks support three different types of volumes: simple volumes,
spanned volumes, and striped volumes. Simple volumes exist within a single disk.
Spanned volumes concatenate multiple disks into a single volume. Striped volumes are
similar to spanned volumes in that they combine multiple drives. However, striped volumes also improve performance because they enable data to be read from or written
to both disks simultaneously.
Windows XP supports FAT and NTFS file systems for accessing local disks. The FAT16
and FAT32 file systems allow for dual booting with Windows 95, Windows 98, or
Windows Me. NTFS is the preferred file system, however, and adds user-level file
permissions, compression, encryption, disk quotas, volume mount points, directory
junctions, and more. Windows XP provides the Convert.exe tool to convert from FAT
to NTFS for users upgrading from previous operating systems.
Several additional file systems are available for accessing removable media. Floppy
disks are formatted with FAT12, a version of FAT optimized for low-capacity media.
The CD-ROM File System (CDFS) is the standard format for CD-ROMs. Universal Disk
Format (UDF) is primarily used for digital video disc (DVD) access.
Objective 2.4
Configure and Manage File Systems 22-23
Objective 2.4 Questions
1.
You are building a new Windows XP Professional system for a user in the imaging
department of a publishing firm. Knowing that disk input/output (I/O) is critical for
image editing, you decide to create a single volume striped across two Small Computer
System Interface (SCSI) disks. Which disk and volume type must you use?
A. Basic disks with spanned volumes
B. Basic disks with striped volumes
C. Dynamic disks with spanned volumes
D. Dynamic disks with striped volumes
2.
You are installing both Windows Me and Windows XP Professional onto a system with
a single 36 GB hard disk. You need to dual boot between the two operating systems.
Which file system must you use?
A. FAT
B. FAT32
C. CDFS
D. NTFS
3.
On which operating systems can you create a RAID 5 volume? Choose four correct
answers.
A. Windows Me
B. Windows NT Workstation 4.0
C. Windows NT Server 4.0
D. Windows 2000 Professional
E. Windows 2000 Server
F. Windows XP Professional
G. Windows Server 2003
4.
Which tools can be used to convert a disk from basic to dynamic? Choose two correct
answers.
A. Disk Management snap-in
B. Fsutil.exe
C. Format.exe
D. Diskpart.exe
E. Disk Defragmenter snap-in
22-24
5.
Chapter 22
Implementing and Conducting Administration of Resources
You are a systems administrator for Lucerne Publishing. Editors store manuscripts on
their local computers during the reviewing process, which consumes a large amount of
disk space. One user, Lori Shea, ran out of disk space on her FAT32-formatted C:\ drive
and purchased an external hard drive that connects to the computer via USB 2.0. She
plugged it in and could immediately use it because it was preformatted with the FAT32
file system. The fact that it uses a separate drive letter (E:\) disturbs her folder organization, however. She would rather have the drive available as a subfolder of My Documents. Which of the following solutions would meet her requirements?
A. Use the Disk Management snap-in in the Computer Management console to reformat the drive using the NTFS file system. Then, create a new subfolder in My Documents, and mount the new drive in that folder.
B. Open a command prompt and run the command convert C:/fs:ntfs. Then, create a
new subfolder in My Documents, and mount the new drive in that folder.
C. Create a new subfolder in My Documents. Then, open a command prompt and
run the command fsutil reparsepoint E: destination_folder.
D. Create a new subfolder in My Documents. Then, open a command prompt and
run the command format E /FS:NTFS /C: destination_folder.
Objective 2.4
Configure and Manage File Systems 22-25
Objective 2.4 Answers
1.
Correct Answers: D
A. Incorrect: Basic disks cannot support spanned volumes. Regardless, spanned
volumes do not improve disk I/O because data on the disk is not generally written
to or read from multiple disks simultaneously.
B. Incorrect: Although striped volumes are the correct choice for improving disk I/O
when accessing multiple disks, basic disks cannot support striped volumes.
C. Incorrect: Although dynamic disks can support spanned volumes, spanned volumes do not improve disk I/O because data on the disk is not generally written to
or read from multiple disks simultaneously.
D. Correct: Dynamic disks support striped volumes, whereas basic disks do not.
Striped volumes combine multiple disks into a single logical volume. When files
are written to or read from the volume, both disks are accessed simultaneously.
When SCSI disks are used, disk I/O performance improves.
2.
Correct Answers: B
A. Incorrect: Although both Windows Me and Windows XP Professional can access
FAT partitions, FAT is not optimized for such large disk partitions.
B. Correct: Both Windows Me and Windows XP Professional can access FAT32 partitions, and FAT32 can efficiently address 36 GB hard disks. For these reasons,
FAT32 is the best choice for dual booting between Windows Me and Windows XP
Professional.
C. Incorrect: CDFS is a file system used only for CD-ROMs. It is not an option for
hard disk drives.
D. Incorrect: Although NTFS is an excellent choice for Windows XP Professional
systems, NTFS partitions cannot be accessed from Windows Me.
3.
Correct Answers: B, C, E, and G
A. Incorrect: Windows Me cannot support RAID 5 nor any NTFS volume.
B. Correct: Windows NT Workstation 4.0 supports RAID 5 volumes across three or
more disks using NTFS partitions. Windows NT Workstation 4.0 was the last desktop operating system from Microsoft to support RAID 5.
C. Correct: Windows NT Server 4.0 supports RAID 5 volumes across three or more
disks using NTFS partitions.
D. Incorrect: Windows 2000 Professional supports NTFS, but does not support
RAID 5 volumes.
22-26
Chapter 22
Implementing and Conducting Administration of Resources
E. Correct: Windows 2000 Server supports RAID 5 volumes across three or more
disks using NTFS partitions.
F. Incorrect: Windows XP Professional supports NTFS, but does not support RAID
5 volumes.
G. Correct: The Windows Server 2003 family supports RAID 5 volumes across three
or more disks using NTFS partitions.
4.
Correct Answers: A and D
A. Correct: The Disk Management snap-in is the preferred way to upgrade a disk
from basic to dynamic. To do this, open the Disk Management snap-in or launch
the Computer Management tool and select Disk Management. Right-click the disk
to be upgraded, and select Convert To Dynamic Disk. Complete the process by
following the instructions that appear.
B. Incorrect: Fsutil.exe is useful for modifying aspects of the file system, but it cannot be used to modify disk properties.
C. Incorrect: The Format.exe utility is used to add a file system to a disk that has
already been configured. It cannot be used to change properties of a disk, such as
whether the disk is basic or dynamic.
D. Correct: Diskpart.exe provides command-line access to functionality normally
accessed using the Disk Management snap-in. To upgrade disk 0 from basic to
dynamic, you must first open the Diskpart.exe shell by executing the command
Diskpart.exe. At the DISKPART> prompt, type the command select disk 0 to indicate that future disk-related commands will affect disk 0. Then, type the command
convert dynamic to convert the disk from basic to dynamic.
E. Incorrect: The Disk Defragmenter utility is used to reorganize file segments on a
disk to improve performance. It does not have the ability to upgrade disks from
basic to dynamic.
5.
Correct Answers: B
A. Incorrect: Any volume type can be mounted only in an empty folder on an NTFS
volume, but FAT does not support mounting a separate drive to an empty folder.
Therefore, the external drive does not need to have the NTFS file system, but the
C:\ drive does.
B. Correct: The C:\ drive must be converted to NTFS before external drive can be
mounted to a folder. This answer has the proper syntax for converting the drive.
C. Incorrect: Fsutil.exe is useful for modifying aspects of the file system, but it cannot be used to create folder mount points.
D. Incorrect: The Format.exe utility is used to add a file system to a disk that has
already been configured. It cannot be used to create folder mount points.
Objective 2.5
Manage and Troubleshoot Access to and Synchronization of Offline Files 22-27
Objective 2.5
Manage and Troubleshoot
Access to and Synchronization of
Offline Files
Enterprise workers rely on the network to access information and exchange files.
Users who always work at the office take this access for granted—but roaming users
cannot. When users with portable computers disconnect from the network, their
access to business-critical information is also disconnected. To ease the pain of being
away from the network, users can synchronize important files to their portable computers for offline use.
Users control when their computer synchronizes files using the Synchronization Manager. This tool is useful for troubleshooting offline file problems because it displays
when folders were last synchronized. It can also be used to configure offline files for
synchronization when users log on or log off, while the computer is idle, or at specific
times.
22-28
Chapter 22
Implementing and Conducting Administration of Resources
Objective 2.5 Questions
1.
Which caching options are selected by default for folders shared from a Windows XP
Professional system?
A. Caching on shared folders is disabled by default.
B. Manual Caching Of Documents is selected by default.
C. Automatic Caching Of Documents is selected by default.
D. Automatic Caching Of Programs And Documents is selected by default.
2.
You have configured a shared network folder for offline use with your Windows XP
Professional system. While you were disconnected from the network, you edited one
of the synchronized files. At the same time, another user modified the network copy of
this document. What happens when you reconnect your system to the network?
A. The copy of the document on the network share is automatically overwritten with
your cached copy.
B. Changes you made to the cached document are automatically merged into the
shared networked document.
C. Windows XP Professional prompts you to choose which version to keep, and
allows you to rename one of the copies of the document.
D. The copy of the document that was modified most recently is kept. Changes to the
older version of the document are discarded.
3.
The vice president of marketing at your organization uses a Windows XP Professional
laptop computer. While traveling, she needs to update a set of presentations located on
a shared network folder. She will intermittently dial into your corporate network, but
also plans to make updates while offline. Which synchronization strategy meets her
needs?
A. Disable simple file sharing. Enable automatic caching of documents by clicking
the Caching button on the server’s shared folder properties. From the Synchronization Manager settings, click the Setup button. Select the When I Log On To My
Computer and When I Log Off My Computer check boxes for automatic synchronization for both her local area network (LAN) and dial-up connections.
B. Disable simple file sharing. Enable automatic caching of programs and documents
by clicking the Caching button on the server’s shared folder properties. From the
Synchronization Manager settings, click the Setup button. Select When I Log On
To My Computer and When I Log Off My Computer for automatic synchronization
for both her LAN and dial-up connections.
Objective 2.5
Manage and Troubleshoot Access to and Synchronization of Offline Files 22-29
C. Disable simple file sharing. Enable manual caching of documents by clicking the
Caching button on the server’s shared folder properties. From Windows
Explorer, right-click the files and select the Make Available Offline check box to
pin the files that she needs to access offline. From the Synchronization Manager
settings, click the Setup button. Select When I Log On To My Computer and
When I Log Off My Computer for automatic synchronization for both her LAN
and dial-up connections.
D. Disable simple file sharing. Enable manual caching of documents by clicking the
Caching button on the server’s shared folder properties. From Windows Explorer,
right-click the files and select Make Available Offline to pin the files that she needs
to access offline. From the Synchronization Manager settings, click the Setup button. Deselect the When I Log On To My Computer and When I Log Off My Computer check boxes for automatic synchronization for both her LAN and dial-up
connections. Instead, select the Synchronize The Selected Items While My Computer Is Idle check box.
4.
You are a systems administrator at a medium-sized company with 250 employees. All
employees have Windows XP Professional computers, and all computers are members
of your Windows Server 2003 domain. About 50 of those employees are salespeople
who frequently travel with laptops. While connected to the internal network, these
salespeople access shared folders containing presentations, spreadsheets, and databases to manage their contacts, gather information, and record notes. To enable these
salespeople to work with these files when traveling, you have enabled offline file caching for the shared folder. However, during a recent security review, your manager
noticed that there was extremely confidential financial information in the Excel spreadsheets. Your manager has asked you to ensure that these .XLS files are not stored on
the salespeople’s computers for offline use. What is the best way to accomplish this?
A. On the Offline Files tab of the Folder Options dialog box on the client computers,
select the Encrypt Offline Files To Secure Data check box.
B. Modify the file permissions on all .XLS files so that salespeople are denied access.
C. Modify the Computer Configuration\Administrative Templates\Network\Offline
Files\Files Not Cached domain Group Policy setting to add the .XLS file name
extension.
D. Modify the share permissions for the shared folder containing the XLS files so that
salespeople are denied Read access.
22-30
Chapter 22
Implementing and Conducting Administration of Resources
Obejective 2.5 Answers
1.
Correct Answers: B
A. Incorrect: Caching is enabled by default for folders shared from Windows XP
Professional systems.
B. Correct: By default, shared folders on a Windows XP Professional system have
manual caching for documents enabled. Users connecting to the share must then
specifically mark files as being available offline for the caching to be effective—no
files are automatically cached with this setting.
C. Incorrect: The Automatic Caching Of Documents setting on a shared folder
causes the client system to cache documents in the folder after they have been
accessed. Older and less frequently accessed cached documents are automatically
removed to save space on the connecting user’s hard disk. This option is not
enabled by default.
D. Incorrect: The Automatic Caching Of Programs And Documents setting on a
shared folder is similar to the Automatic Caching Of Documents setting, but it does
not allow files on the shared folder to be overwritten. This setting enables caching
for read-only documents and applications, and ensures that changes made to a
document offline are not synchronized back to the shared folder. This option is
not enabled by default.
2.
Correct Answers: C
A. Incorrect: Windows XP never automatically overwrites a document that has
been updated since synchronization, even if changes were made to a cached version of the document.
B. Incorrect: Windows XP lacks the capability to merge changes. However, you can
manually merge changes between multiple versions of documents.
C. Correct: Windows XP Professional provides the user with the option of overwriting one version of the document. Avoid this, however, because changes to the discarded document are lost. Instead, choose the option of renaming one of the
documents and manually merge the document’s changes.
D. Incorrect: Windows XP never automatically overwrites a document that has
been updated since synchronization.
3.
Correct Answers: C
A. Incorrect: The automatic caching of documents setting meets the user’s needs,
but this synchronization strategy does not include pinning the files for offline use.
Pinning files ensures that they are always synchronized. With this strategy, files are
available offline only when the user accessed those files prior to disconnecting
from the network.
Objective 2.5
Manage and Troubleshoot Access to and Synchronization of Offline Files 22-31
B. Incorrect: The Automatic Caching Of Programs And Documents setting does not
meet the user’s needs because this is a read-only caching strategy. Files accessed
through this type of shared folder cannot be edited offline and automatically synchronized the next time the user connects.
C. Correct: This synchronization strategy meets the user’s needs. When manual
caching is enabled on a folder, the user must pin files for them to be synchronized.
Manual caching is enabled on shared folders by default, and Synchronization Manager is configured to synchronize files by default when users log on and log off.
D. Incorrect: The manual caching of documents setting meets the user’s needs,
except that the synchronization strategy was changed to happen when the computer was idle. This setting must not be used with users who are intermittently
connected to the network because the computer is unlikely to be both connected
and idle.
4.
Correct Answers: C
A. Incorrect: Although encrypting offline files does improve security, it does not
ensure that .XLS files will not be stored on the salespeople’s computers for offline
use.
B. Incorrect: This would prevent salespeople from storing the files for offline use;
however, it would also prevent them from accessing the files when they are connected to the network.
C. Correct: This Group Policy setting controls which file extensions can be cached
on computers that apply the Group Policy Object (GPO). By default, several types
of files are not cached to prevent multiuser databases from being cached.
D. Incorrect: This would prevent salespeople from storing the files for offline use;
however, it would also prevent them from accessing the files when they are connected to the network.
23 Implementing, Managing,
Monitoring, and
Troubleshooting Hardware
Devices and Drivers
Installing new hardware in a computer requires connecting it to the computer and then
installing software, called a device driver, so that Microsoft Windows XP can communicate with the hardware. Usually, Windows XP finds the device and automatically
installs the device driver. However, you must be prepared to troubleshoot problems
with this process, particularly when working with hardware that is more than a few
years old. You should be able to manually add, update, and roll back device drivers
when problems arise.
The device driver is not always the only software you need. Computer motherboards
and many other hardware devices have firmware that contain code independent of
the operating system needed for startup and initialization of the device. If you have
problems with a device that an updated device driver does not resolve, verify that the
computer’s firmware and the device’s firmware are up-to-date and configured properly. Although you can use Device Manager to update device drivers, you will need a
software tool provided by the hardware manufacturer to update a device’s firmware.
Tested Skills and Suggested Practices
The skills that you need to successfully master the Installing Windows XP Professional
objective domain on the Installing, Configuring, and Administering Microsoft Windows
XP Professional exam include the following:
Important
For the following task, you should complete at least Practices 1 through 3. If
you want hands-on experience with every aspect of the exam and you have the extra lab
resources needed to do Practice 4, complete Practice 4 as well.
■
Implement, manage, and troubleshoot disk devices.
❑
Practice 1: Configure Chkdsk to scan your C: drive and fix any problems that
it finds. You will probably need to restart your computer.
❑
Practice 2: Use the Disk Defragmenter to defragment your C: drive.
23-1
23-2
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
❑
Practice 3: Change the drive letter of your CD-ROM disk to T: and then
change it back.
❑
Practice 4: On a test computer with multiple hard disks, upgrade a basic disk
other than the system disk to a dynamic disk. Afterward, note whether you
can downgrade the disk back to a basic disk.
Important
For the following task, you should complete at least Practices 1 and 2. If you
want hands-on experience with every aspect of the exam and you have the extra lab
resources needed to do Practice 3, complete Practice 3 as well.
■
■
■
Implement, manage, and troubleshoot display devices.
❑
Practice 1: Change the refresh rate on your video adapter. Note the difference
between high and low refresh rates. Afterward, reset the refresh rate to the
highest rate supported by your monitor.
❑
Practice 2: Open Internet Explorer, maximize the window, and visit the http://
www.microsoft.com Web site. Then, use the Display Properties dialog box to
adjust your monitor to several different resolutions. At each resolution, notice
how the Web page appears different. Note the resolution that is the easiest to
read while still enabling Internet Explorer to display the entire width of the
Web page without scrolling left and right.
❑
Practice 3: On a test computer with one video adapter, install a second video
adapter and video monitor; configure the computer for multiple monitors.
Configure Advanced Configuration Power Interface (ACPI).
❑
Practice 1: Check to see whether your computer is an ACPI system. Compare
an ACPI-compatible with one that is not compatible.
❑
Practice 2: Review the various Power Schemes; create and test a custom
Power Scheme.
❑
Practice 3: Enable hibernation, and then hibernate your computer.
Implement, manage, and troubleshoot input and output (I/O) devices.
❑
Practice 1: Install Plug and Play hardware such as a digital camera, scanner,
and network card into an existing Windows XP Professional computer.
❑
Practice 2: Open Device Manager and inspect the properties of all the objects
displayed there. Run the hardware troubleshooter for some of the devices by
clicking the Troubleshoot button on the General tab of the device’s Properties
window.
❑
Practice 3: Familiarize yourself with the other tools available for troubleshooting hardware, such as Dxdiag.exe, Winmsd.exe, Sigverif.exe, and Verifier.exe.
Further Reading
■
23-3
Manage and troubleshoot drivers and driver signing.
❑
Practice 1: Download updated drivers for one of the hardware devices and
install them. Try installing updated drivers from the Windows Update Web
site; also check the Web site of the hardware device manufacturer. Then, roll
back the driver to the previous version.
❑
Practice 2: Download an updated driver for one of your hardware devices.
Notice the current driver version before the upgrade using Device Manager.
Next, install the updated driver. Restart your computer if necessary, and
launch System Restore. Windows XP should have automatically created a
restore point before you installed the driver. Restore to this point, and restart
your computer. Use Device Manager to verify that the driver version was
returned to the version before the update.
Important
For the following task, you should complete at least Practice 1. If you want
hands-on experience with every aspect of the exam and you have a test computer available,
complete Practice 2 as well.
■
Monitor and configure multiprocessor computers.
❑
Practice 1: Run the Performance snap-in to view and analyze data relating to
the CPUs.
❑
Practice 2: On a test computer, use Recovery Console to replace the hardware
abstraction layer (HAL) and kernel files with the original versions from the
Windows XP Professional CD-ROM.
Further Reading
This section lists supplemental readings by objective. We recommend that you study
these sources thoroughly before taking exam 70-270.
Objective 3.1 Microsoft Corporation. Microsoft Windows XP Professional Resource Kit
Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 12, “Disk Management,” and Chapter 13, “File Systems.” These chapters explain the various storage types and partition styles available in Windows XP Professional, the Disk
Management snap-in, and the command-line utilities you can use to manage storage
devices. Review Chapter 27, “Troubleshooting Disks and File Systems.” This chapter
outlines the troubleshooting tools available in Windows XP Professional, discusses
many common problems relating to disk devices, and tells you how to correct them
(available online at http://www.microsoft.com/resources/documentation/Windows/
XP/all/reskit/en-us/prork_overview.asp).
23-4
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Objective 3.2 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 9, “Managing Devices,” focusing on the sections about installing and configuring hardware and device drivers. Also read the sections called “Configuring the Display”
and “Using Multiple Monitors.” Review the list of error messages described
in Appendix F, “Device Manager Error Codes” (available online at http://
www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prdh_dmt_zehg.asp).
Objective 3.3 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 7, “Supporting Mobile Users,” for a thorough look at all the challenges unique to managing mobile computers. Read Chapter 9, “Managing Devices” and review the
section called “Power Management” (available online at http://
www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prork_overview.asp).
“Power Management in Windows XP,” by Charlie Russel (available online at http://
www.microsoft.com/windowsxp/using/setup/learnmore/russel_02march25.mspx).
Objective 3.4 Microsoft Corporation. Microsoft Windows XP Professional Resource Kit
Documentation. Redmond, WA: Microsoft Press, 2001. Read the sections called
“Other Hardware Support” and “Hardware Troubleshooting” in Chapter 9, “Managing Devices.” Read Chapter 10, “Managing Digital Media” and review the “Digital
Media Components Overview” section to ensure that you understand which features
Windows XP Professional includes for creating and managing digital media. Read
the “Troubleshooting Digital Media” section to learn about solving a wide range of
typical problems. Read Chapter 26, “Troubleshooting Concepts and Strategies.” This
chapter provides a generalized troubleshooting methodology, steps to take for gathering information, additional online and print resources for technical information,
and step-by-step troubleshooting instructions for a variety of common issues (available online at http://www.microsoft.com/resources/documentation/Windows/XP/all/
reskit/en-us/prork_overview.asp).
“General USB troubleshooting in Windows XP,” by Microsoft Corporation (available online at http://support.microsoft.com/?kbid=310575).
“How to troubleshoot wireless network connections in Windows XP Service Pack
2,” by Microsoft Corporation (available online at http://support.microsoft.com/
?kbid=870702).
“Wireless LAN Enhancements in Windows XP Service Pack 2,” by Joseph Davies
(available online at http://www.microsoft.com/technet/community/columns/
cableguy/cg0804.mspx).
“Microsoft Windows XP: An Overview of Windows Image Acquisition,” by William
Keener (available online at http://support.microsoft.com/?scid=%2Fservicedesks%2
Fwebcasts%2Fen%2Ftranscripts%2Fwct042203.asp).
Further Reading
23-5
Objective 3.5 Microsoft Corporation. Microsoft Windows XP Professional Resource Kit
Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 9, “Managing
Devices,” paying close attention to the sections titled “Device Drivers” and “Installing Drivers” (available online at http://www.microsoft.com/resources/documentation/
Windows/XP/all/reskit/en-us/prdh_dmt_zehg.asp).
“Troubleshoot Device Driver Problems,” by Paul McFedries (available online at
http://www.microsoft.com/windowsxp/using/setup/expert/
mcfedries_03may12.mspx).
“Digital Signature Benefits for Windows Users,” by Microsoft Corporation (available
online at http://www.microsoft.com/winlogo/benefits/signature-benefits.mspx).
“How to Troubleshoot Hardware and Software Driver Problems in Windows XP,”
by Microsoft Corporation (available online at http://support.microsoft.com/
?kbid=322205).
Objective 3.6 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 26, “Troubleshooting Concepts and Strategies.” Study the “Check Firmware Versions” section
(available online at http://www.microsoft.com/resources/documentation/Windows/
XP/all/reskit/en-us/prma_trb_ersf.asp).
23-6
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Objective 3.1
Implement, Manage, and
Troubleshoot Disk Devices
Windows XP Professional supports a wide range of fixed and removable storage
devices. Common fixed disk technologies include Small Computer System Interface
(SCSI), Intelligent Drive Electronics or Integrated Drive Electronics (IDE), and
Serial Advanced Technology Attachment (Serial ATA). DVD-ROM, floppy, CDROM, tape drives, and universal serial bus (USB) or Institute of Electrical and Electronics Engineers, Inc. (IEEE) 1394 (FireWire) external drives are popular removable storage devices. As with other hardware devices, a software device driver enables
Windows XP to communicate with the storage hardware.
You use the Disk Management snap-in, part of the Computer Management console,
and the Diskpart.exe command-line tool to convert storage types, create and extend
volumes, and perform other disk-management tasks. Over time, the files on disks tend
to become more and more fragmented. Windows XP Professional includes the Disk
Defragmenter snap-in and the command-line version of the tool called Defrag.exe.
Windows XP Professional supports two types of fixed disk storage: basic disks and
dynamic disks. If you want to dual boot Windows XP Professional with Windows NT
4.0, Windows Me, Windows XP Home Edition, or earlier Windows operating systems,
you must use basic disks. Dynamic disks support many advanced features such as volume spanning, volume extending, and unlimited volumes per disk.
To successfully answer questions in this objective, you must be familiar with the common types of fixed and removable storage and know how to install, manage, and troubleshoot each type. You need to know how to use the tools included with Windows
XP Professional for creating, managing, and modifying dynamic disks and basic disks.
You must know how to enable and disable the different types of performance counters
with Diskperf.exe, and know how to view performance data in the Performance Logs
and Alerts snap-in.
Objective 3.1
Implement, Manage, and Troubleshoot Disk Devices
23-7
Objective 3.1 Questions
1.
Which of the following multiboot scenarios results in each operating system listed
being fully functional with access to at least one hard disk? Choose two correct
answers.
A. Hard disk 1 configured as a basic disk with a single partition formatted as the NT
File System (NTFS) with Windows XP Professional and Windows Me installed on
it. Hard disk 2 configured as a basic disk with a single partition formatted as the
32-bit version of File Allocation Table (FAT32).
B. Hard disk 1 configured as a basic disk with a single partition formatted as FAT32
with Windows XP Professional and Windows Me installed on it. Hard disk 2 configured as a basic disk with a single partition formatted as NTFS.
C. Hard disk 1 configured as a dynamic disk with a single volume formatted as NTFS
with Windows XP Professional installed on it. Hard disk 2 configured as a dynamic
disk with a single volume formatted as NTFS with Windows 2000 Professional
installed on it.
D. Hard disk 1 configured as a dynamic disk with a single volume formatted as NTFS
with Windows XP Professional and Windows 2000 Professional installed on it.
Hard disk 2 configured as a basic disk with a single volume formatted as NTFS.
E. Hard disk 1 configured as a dynamic disk with a single partition formatted as NTFS
with Windows XP Professional and Windows XP Home Edition installed on it.
Hard disk 2 configured as a basic disk with a single partition formatted as FAT32.
2.
Your company uses a flexible workspace approach to organizing office space. You are
replacing 30 desktop computers for the telemarketing department. You want to ensure
that no individual user can monopolize local storage on these new computers, so you
decide to apply disk quotas to them all. Which file system supports disk quotas?
Choose the correct answer.
A. FAT
B. UDF
C. FAT32
D. NTFS
E. CDFS
3.
You have a 700 MHz Pentium III computer with 256 megabytes of RAM running Windows 2000 Professional. You want to retain the existing operating system while installing Windows XP Professional. You successfully configure the computer for dual
booting and run a full backup using the NT Backup. You also create a new Automatic
23-8
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Speech Recognition (ASR) disk and manually edit the Boot.ini file to change the order
of the operating systems when you boot the computer. In doing so, you do not realize
that you accidentally deleted the Boot.ini file.
The next time you start the computer, you receive an error message, and then it stops
responding. What can you do to restore the computer to full functionality while retaining existing configuration settings? Choose all that apply.
A. Reinstall Windows 2000 Professional and all the applications, and then reinstall
Windows XP Professional.
B. Use the Recovery Console to copy the Boot.ini file from a Windows XP Professional installation CD-ROM.
C. Use the ASR disk to restore the Boot.ini file.
D. Use the Recovery Console to copy the Boot.ini file from a Windows 2000 Professional installation CD-ROM.
E. Use the Recovery Console and run the Bootcfg command to generate a new
Boot.ini.
4.
One of the graphics artists in your company’s marketing department needs to access
some multimedia files that were archived on an old removable storage device several
years ago. You verify that the device is on the Windows XP Professional Windows Catalog and attach it to the artist’s computer. You use the Add/Remove Hardware Wizard
to install it, but receive a message that Windows could not detect it. You choose to
manually select it from the list of hardware in the Add/Remove Hardware Wizard, but
you cannot locate it.
What do you do to install it? Choose the correct answer.
A. Click Have Disk in the Install New Hardware dialog box and specify the path to
the driver files.
B. Change the Driver Signing File signature verification setting to Ignore.
C. Change the Driver Signing File signature verification setting to Block.
D. The device cannot be installed.
E. Reboot in safe mode and install the appropriate drivers.
Objective 3.1
Implement, Manage, and Troubleshoot Disk Devices
23-9
Objective 3.1 Answers
1.
Correct Answers: B and C
A. Incorrect: Windows Me cannot read NTFS volumes; therefore, formatting hard
disk 1 as NTFS would make it impossible to run the operating system on that
computer.
B. Correct: Both Windows Me and Windows XP Professional recognize partitions
formatted with the FAT32 file system; therefore, both operating systems can be
installed onto hard disk 1 in this scenario. Although Windows XP Professional can
read NTFS drives, Windows Me cannot do so. Although Windows Me does not
recognize hard disk 2 in this scenario, the requirement was for each operating system to be able to recognize at least one disk, not necessarily both disks.
C. Correct: Both Windows XP Professional and Windows 2000 Professional support
dynamic disks, but they store information about the disks in their Registry. If both
operating systems are installed on the same disk and you use one to convert the
disk to dynamic, the Registry of the other operating system becomes out-of-date
and no longer boots. The proper method to use dynamic disks in a multiboot configuration with these operating systems is to install them on separate disks. For
example, install Windows XP Professional on hard disk 1 and Windows 2000 Professional on hard disk 2. Use Windows XP Professional to convert hard disk 1 to
dynamic, and then use Windows 2000 Professional to convert hard disk 2 to
dynamic.
D. Incorrect: Although both Windows XP Professional and Windows 2000 Professional support dynamic disks, they store information about the disks in their Registry. If both operating systems are installed on the same disk and you use one to
convert the disk to dynamic, the Registry of the other operating system becomes
out-of-date and no longer boots.
E. Incorrect: Windows XP Home Edition does not recognize dynamic disks, so it
cannot be installed on a dynamic disk.
2.
Correct Answers: D
A. Incorrect: The 16-bit FAT file system was created when disk drives were relatively small. FAT16 does not support large partitions, file and folder level security,
disk quotas, and other advanced features.
B. Incorrect: The Universal Disk Format (UDF) was introduced in Windows 2000. It
is a standards-based file system for DVD and CD-ROM. You cannot format a hard
disk with the UDF file system.
23-10
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
C. Incorrect: The 32-bit version of the FAT file system supports large partitions, but
not other advanced features such as security, auditing, and disk quotas.
D. Correct: NTFS is a high-performance file system designed for modern computer
systems. It supports per-user disk quotas, folder and file-level security, auditing,
reparse points, and other advanced features.
E. Incorrect: The CD-ROM File System (CDFS) is used only for CD-ROM disks and
cannot be used to format a hard disk.
3.
Correct Answers: C and E
A. Incorrect: It is not necessary to reinstall the operating systems; there is a much
quicker way to resolve this problem. Reinstalling the operating systems allows the
computer to boot, but configuration settings are lost.
B. Incorrect: The Windows XP Professional installation CD-ROM does not contain a
Boot.ini file. If no Boot.ini file is on a computer, it is created automatically by the
Setup program; if one already exists, the Setup program automatically edits it.
C. Correct: You can boot from the Windows XP Professional installation CD-ROM
and attempt to repair the existing installation. Selecting the Inspect Startup Environment option verifies and, if necessary, repairs the Windows XP Professional
files in the system partition. A new Boot.ini file is automatically created. You are
then able to boot from the hard disk into Windows XP Professional and manually
edit the Boot.ini file to add Windows 2000 Professional to the boot menu.
D. Incorrect: The Windows 2000 Professional installation CD-ROM does not contain a Boot.ini file. If no Boot.ini file is on a computer, it is created automatically
by the Setup program; if one already exists, the Setup program automatically
edits it.
E. Correct: The Bootcfg /rebuild Recovery Console command is capable of scanning
your hard disk for Windows installations and automatically rebuilding your
Boot.ini file. Additionally, you can use Bootcfg to manually create or edit the
Boot.ini file.
4.
Correct Answers: A
A. Correct: You need to acquire device driver files compatible with Windows XP
Professional from the vendor, and then use them to install the device. In this particular scenario, the most likely location for those files is on the vendor’s Web site.
B. Incorrect: The issue is not Driver Signing; changing this setting does not correct
the problem.
Objective 3.1
Implement, Manage, and Troubleshoot Disk Devices 23-11
C. Incorrect: The issue is not Driver Signing; changing this setting does not correct
the problem.
D. Incorrect: If the device appears in Windows Catalog, it should be possible to
install it.
E. Incorrect: Safe mode is used for resolving problems caused by installing drivers
that lead to system instability. You do not use safe mode to install new hardware
devices.
23-12
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Objective 3.2
Implement, Manage, and
Troubleshoot Display Devices
In most circumstances, Windows XP automatically detects and configures display
adapters and monitors. However, unusual hardware configurations do cause problems
that require troubleshooting. For example, if the monitor, video adapter, or device
driver does not support Plug and Play, Windows XP will detect your monitor as Default
Monitor, and you will need to manually configure the monitor type. Even if all the display components are Plug and Play, connecting them to a keyboard-video-mouse
switch box can block the Plug and Play signals from the monitor.
Windows XP generally prevents misconfigurations by testing updated settings and displaying a confirmation dialog box. If you do not confirm the new settings, Windows
XP restores the old settings. If you, a user, or Windows XP does configure display settings that your monitor cannot support, or if you switch to a monitor that does not support your current settings, you might not be able to see the display to troubleshoot the
problem. In this circumstance, you can use safe mode to start Windows XP with basic
video settings and select an acceptable configuration.
If you plan to enable multiple monitors for a computer, install Windows XP Professional with only one adapter present. After you have completed the installation of the
additional video adapters and video monitors, you use the Settings tab in the Display
program in Control Panel to configure multiple monitor support.
To successfully answer questions in this objective, you must know how to use the Add
Hardware Wizard, Device Manager, and the Display program in Control Panel to
install, configure, and troubleshoot both legacy and Plug and Play video adapters and
monitors. You must be able to install multiple video adapters and monitors, change the
primary adapter, and move items between monitors.
Objective 3.2
Implement, Manage, and Troubleshoot Display Devices 23-13
Objective 3.2 Questions
1.
You bought a new computer with recently released multimedia hardware including a
video adapter with many advanced features. The computer was shipped with Windows
XP Professional preinstalled, but the vendor’s documentation indicates that the external television port on the video adapter did not have a functional driver at the time of
shipping and that you must check with vendor’s Web site for updates. Two weeks later,
you find and download new drivers for the video adapter from the vendor’s Web site.
You install them and reboot when told to do so. The system restarts normally, and you
log on. You see an error message indicating that the display settings have been
restored to their defaults. You try to open the Display program in Control Panel, but the
system freezes.
What is the best way to return the computer to full functionality? Choose the best
answer.
A. Turn the computer off, unplug the power cord, and disconnect it from the video
monitor. Physically move the video adapter to a different slot, and then reconnect
the cables and restart the computer.
B. Restart the computer using safe mode. Click the Roll Back Driver button from the
video adapter’s properties dialog box to restore the original device drivers for the
video adapter.
C. Restart the computer and use the ASR to restore the original drivers.
D. Restart the computer using the Recovery Console to delete the new video device
drivers.
2.
You buy a new computer with an Accelerated Graphics Port (AGP) video adapter. You
install Windows XP Professional from the installation CD-ROM, and the video adapter
is automatically configured. You use the computer for several days at a resolution of
1600 x 1200 and decide that the text appears too small on-screen to be easily readable.
You want to change the font size to 125 percent of its normal size. What do you do?
Choose the correct answer.
A. Edit the size manually in the system Registry using the Registry Editor tool.
B. Open Device Manager from the Computer Management console.
C. Select the List All Modes button from the Adapter tab of the display adapter’s
advanced properties dialog box.
D. Adjust the DPI setting from the General tab of the display adapter advanced properties dialog box.
23-14
3.
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Recently, you discovered an old Pentium 233 MHz computer in a closet and decided to
use it as a test system. During setup, the video adapter is not recognized, and the display is set to Video Graphics Adapter (VGA) resolution. You know that the adapter and
video monitor support higher resolutions. What do you do to fully enable the video
adapter? Choose the correct answer.
A. Use the Registry Editor tool to manually modify the display settings in the system
Registry.
B. Use Dxdiag.exe to install the specified drivers from a floppy disk or CD-ROM.
C. Windows XP Professional can support only VGA resolutions with legacy hardware
devices; therefore, you must replace the computer’s motherboard and processor.
D. Obtain and manually install the correct device driver for the video adapter.
4.
You are a desktop administrator at Contoso Pharmaceuticals. Recently, your organization hired a new employee named Dan Wilson who has special display requirements.
Specifically, Dan needs his display adjusted so that window borders, buttons, and fonts
are displayed using highly contrasting colors, rather than the Windows Standard color
scheme other employees at your organization use. What is the best way to adjust Dan’s
display to meet his needs? Choose the best answer.
A. Open Control Panel, and then open the Accessibility Options dialog box. Click the
Display tab, select the Use High Contrast check box, and then apply the changes.
B. Open Control Panel, and then open Display. Click the Accessibility Options tab,
select the Use High Contrast check box, and then apply the changes.
C. Launch Microsoft Narrator, and select the Read Typed Characters and Announce
Events On Screen check boxes.
D. Instruct Dan to enable high-contrast display settings by holding the Alt+Ctrl keys
and pressing Print Screen.
Objective 3.2
Implement, Manage, and Troubleshoot Display Devices 23-15
Objective 3.2 Answers
1.
Correct Answers: B
A. Incorrect: These steps will not resolve the problem. If the video monitor is not
displaying the Windows XP desktop or if the image is flickering, the video adapter
might not be seated properly in its slot, or the slot’s connectors might be damaged.
If that is the case, moving the video adapter might resolve the problem. But the
question stated that the image is viewable, so moving the card will not help.
B. Correct: This is the best way to repair the computer. In safe mode, Windows XP
Professional starts with only basic files and drivers. If you still cannot access the
display properties dialog box in safe mode, you might need to use the Recovery
Console to manually replace the video driver. If you continue to have problems,
you might need to restore the operating system files from a backup.
C. Incorrect: The ASR can be used to repair basic system files, the boot sector, and
the startup environment, but it cannot help you to repair bad video drivers.
D. Incorrect: If you know the exact names and versions of each file that you
need to delete and restore, it might be possible to manually correct this problem. This is a time-consuming and error-prone approach though; booting into
safe mode and using the graphical tools to repair the computer are much more
likely to succeed.
2.
Correct Answers: D
A. Incorrect: You do not need to manually edit the Registry to change the appearance of fonts on the Windows XP Professional desktop.
B. Incorrect: You use Device Manager to manage system resource configuration for
hardware devices, but you cannot change the other video adapter and video monitor settings.
C. Incorrect: Use the Adapter tab to view detailed information about the display
adapter, the list of modes that the adapter can display, and the adapter’s properties. You cannot change the size of the fonts displayed on the Windows XP Professional desktop from the Adapter tab.
D. Correct: You can scale the fonts displayed in the Windows XP Professional desktop to be much smaller or larger than their default size by changing the value in
the DPI list on the General tab of the display adapter’s advanced properties dialog
box. The specific font sizes available are determined by which fonts you have
installed on your system. When you change the font size, you have to reboot for
the new settings to take effect.
23-16
3.
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Correct Answers: D
A. Incorrect: Some of the earlier versions of Windows required you to manually
edit the system Registry to resolve certain software problems; however, it is very
easy to make a mistake and render Windows XP Professional unusable when
you manually edit the Registry. Windows XP Professional allows you to manage
virtually all aspects of the system through graphical tools and command-line
tools. Whenever possible, use these built-in management tools to resolve issues
such as this.
B. Incorrect: The DirectX Diagnostic Tool can be launched from a command line
by typing Dxdiag.exe. This tool is used to review, configure, and troubleshoot
the hardware in a computer that interacts with DirectX. The DirectX Diagnostic
Tool is not used to install or update drivers for hardware devices.
C. Incorrect: Windows XP Professional is compatible with numerous legacy hardware devices. If the specific device does not appear on the list in the Add/Remove
Hardware Wizard, verify that it is in Windows Catalog. If it is, contact the vendor
to obtain up-to-date device drivers for Windows XP Professional.
D. Correct: Windows XP Professional is compatible with many legacy video adapters, even if they are not Plug and Play–compatible. During the installation of Windows XP Professional, the Setup program can detect many legacy hardware
devices and then install appropriate drivers to enable them. However, Setup does
not always recognize every installed hardware device. If appropriate drivers are
not on the Windows XP Professional installation CD-ROM, you might be able to
locate compatible drivers on the vendor’s Web site.
4.
Correct Answers: A
A. Correct: High-contrast display settings are well-suited to users who cannot easily
distinguish user interface elements. The correct way to enable this setting is by
using the Accessibility Options in Control Panel.
B. Incorrect: The Display properties dialog box does not have an Accessibility
Options tab. Instead, you should use the Accessibility Options dialog box.
C. Incorrect: Narrator is a useful tool for users who prefer audio to visual feedback
from the computer in response to events such as switching windows and typing
characters. However, it does not meet Dan’s needs because Dan prefers to view
the monitor directly, but requires more contrasting colors.
D. Incorrect: High-contrast settings can be enabled by holding the left-Alt and leftShift keys and pressing Print Screen.
Objective 3.3
Configure Advanced Configuration Power Interface 23-17
Objective 3.3
Configure Advanced
Configuration Power Interface
There are two ways to extend battery life in mobile computers: enhance battery technology and decrease power utilization. The vendors of batteries have been slowly
improving their products since mobile computers were first introduced, but the greatest gains over the past few years have come from making mobile computer hardware
and software more energy-efficient. Advanced Configuration Power Interface
(ACPI) allows computers running Windows XP Professional to use electricity more
efficiently than previous technologies. Windows XP Professional supports the ACPI for
sophisticated power management. Windows XP Professional also supports the older
and less-effective standard Advanced Power Management (APM).
On an ACPI system, power consumption is determined by the power settings configured in the Power Options, the requirements of running services and applications, and
the capabilities of the installed hardware. To put it another way, Windows XP Professional fully supports the ACPI standard, but applications and hardware must be
designed to work with ACPI and Plug and Play for the power management system to
be as effective as possible.
To successfully answer questions in this objective, you must know how to create, modify, and select power schemes. You need to know how to enable and disable hibernation; and how to configure power alarms, Standby mode, and advanced power
settings. You must be able to install, configure, and troubleshoot PC Cards. You need
to be able to unplug or eject hardware from the taskbar.
23-18
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Objective 3.3 Questions
1.
You have installed Windows XP Professional on your laptop computer. You often carry
the laptop around your company’s campus while working, and periodically have to
leave it unattended for extended periods of time. You do not want to drain the battery
at all during these times, but you also do not want to close all your applications and
shut down Windows XP. What do you do? Choose the correct answer.
A. Shut down the computer.
B. Enable Hibernation in the Power Options program in Control Panel. Then create
a power scheme that causes the laptop computer to hibernate whenever the computer is not used for a suitable period of time.
C. Use the Power Options in Control Panel to create a custom power scheme.
D. Use the Power Options in Control Panel to select the Max Battery power scheme.
2.
Under which of the following scenarios do you not see the APM tab in the Power
Options program located in Control Panel? Choose two correct answers.
A. The APM-based basic input/output system (BIOS) is failing.
B. The computer’s BIOS is ACPI-compliant.
C. The external Uninterruptible Power Supply (UPS) is not properly connected to the
serial port of the computer.
D. The computer’s battery has been improperly charged.
E. The computer’s BIOS is not APM-based.
3.
A user in your organization has installed Windows XP Professional on his notebook
computer, which supports APM. When the user tries to shut down the computer and it
freezes during the shutdown process, pressing the power button does not resolve the
problem. He has to unplug the computer and remove the battery to completely shut it
off. How do you check to see whether the APM-based BIOS is the cause of the problem? Choose the correct answer.
A. Restart the computer and run Acldiag.exe.
B. Install a new copy of Windows XP Professional so that the APM-based BIOS can
be properly detected and installed.
C. Restart the computer in safe mode and disable as many of the power management
options as possible.
D. Turn the computer on and, after the desktop has appeared, run the Apmstat.exe
tool from a command prompt.
Objective 3.3
Configure Advanced Configuration Power Interface 23-19
Objective 3.3 Answers
1.
Correct Answers: B
A. Incorrect: Shutting down the computer minimizes power drain on the battery,
but takes a relatively long time to restart the computer from a complete shutdown.
B. Correct: Hibernation must be enabled from the Hibernate tab in the Power
Options program located in Control Panel first, and then you can create a custom
power scheme that will automatically hibernate the computer after a period of
inactivity that you specify. As an alternative, you could have your computer automatically go into Standby mode. However, Standby mode places a very slight
drain on the battery, whereas hibernation uses no batteries.
C. Incorrect: Until you enable hibernation, custom power schemes allow you to
specify only when the monitor and hard disks will be turned off and when the system will go to Standby mode. Even when the system is in Standby mode with the
disks and monitor powered-down, it continues to draw on the battery for power.
In this state, the battery eventually runs out of power and it is possible to lose
important data.
D. Incorrect: This power scheme greatly reduces drain on the battery because the
hard disks and monitor are turned off and the computer is left in Standby mode
when unattended for just a few minutes. Nevertheless, when the system is in
Standby mode with the disks and monitor powered down, it continues to draw on
the battery for power. In this state, the battery eventually runs out of power, and
it is possible for you to lose important data.
2.
Correct Answers: B and E
A. Incorrect: If the motherboard’s BIOS is failing, other more severe problems are
apparent. The computer is probably not able to boot, and if it does boot, it probably crashes or freezes frequently.
B. Correct: If a computer’s BIOS is ACPI-complaint, the APM tab is not visible in the
Power Options program.
C. Incorrect: An external UPS is not required for either APM or ACPI support. You
can use an UPS with a mobile computer, but it is an unlikely scenario because
mobile computers already have built-in batteries. Many UPSs do provide protection against power surges and other quality-of-service problems possible on electrical outlets, but they are very expensive. A much more affordable solution
appropriate for protecting a mobile computer is a surge suppressor.
23-20
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
D. Incorrect: As long as the computer is connected to a power source, the state of
the battery is irrelevant to the question.
E. Correct: If a computer’s BIOS is not APM-based or if it supports ACPI, the APM
tab is not visible in the Power Options program.
3.
Correct Answers: D
A. Incorrect: Acldiag.exe is a command-line tool in the \Support\Tools\Support.cab file. It is used for checking security on objects and containers in Active
Directory, and it has no relation to power management or APM technology.
B. Incorrect: It is doubtful that reinstalling Windows XP Professional will resolve
the problem. A more effective approach to troubleshooting this issue is to determine why the BIOS is causing problems.
C. Incorrect: It is unlikely that these procedures will resolve the problem; a more
effective approach to troubleshooting this issue is to determine why the BIOS is
causing problems.
D. Correct: The Advanced Power Management Status tool (Apmstat.exe) is designed
to check whether a computer’s APM-based BIOS is compatible with Windows XP
Professional. You install it by running Setup.exe in the \Support\Tools folder on the
Windows XP Professional installation CD-ROM. If you do not have an APM-based
BIOS, Apmstat.exe will inform you of this. You might determine that you need to
update the BIOS, in which case you need to contact the manufacturer for tools to
bring it up to date.
Objective 3.4
Implement, Manage, and Troubleshoot I/O Devices 23-21
0bjective 3.4
Implement, Manage, and
Troubleshoot I/O Devices
Many of the hardware devices you might use with Windows XP Professional can be
considered I/O devices. Other objectives in this domain discuss several classes of input
and output (I/O) devices: network adapters, PC Cards, display adapters and monitors,
and disks. This objective reviews many other I/O devices including modems, smart
card readers and cards, Universal Serial Bus (USB), IEEE 1394 (FireWire), wireless
devices, and multimedia hardware. Multimedia hardware encompasses a broad array
of devices such as DVD-ROM readers, Musical Instrument Digital Interface (MIDI)
devices, scanners, digital cameras, digital video recorders, sound cards, and CD-ROM
readers and writers. From a high level, the process of installing and managing each
type of I/O device is similar: physically connect the device to the computer’s bus;
install software drivers; configure the device; maintain and troubleshoot the device as
needed. The details vary between devices, especially when comparing Plug and Play
devices to older models that do not fully support Plug and Play. Windows XP Professional usually detects Plug and Play hardware devices and automatically installs suitable drivers for them.
To successfully answer questions in this objective, you must be able to use the Add
Hardware Wizard and Device Manager to install, manage, and troubleshoot I/O
devices. You must also be able to use the individual device management applications
in Control Panel such as Phone and Modem Options, Scanners and Cameras, Sounds
and Audio Devices, and Wireless Link.
23-22
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Objective 3.4 Questions
1.
You are a desktop administrator at an organization with strict desktop security requirements that include software restrictions, the use of Windows Firewall, and the use of
standard user accounts for day-to-day activities. A puzzled user in your organization
asks you why he cannot install a flatbed scanner on his system. He previously successfully installed other hardware, such as his handheld Windows Mobile device and a digital camera that connect to his Windows XP Professional computer via the USB port.
He tells you that he disconnected his personal laser printer; he then connected the
scanner to the parallel port, turned it on, and launched the Add Hardware Wizard. He
seems to think that Windows XP Professional might have detected the scanner, but he
receives a series of error messages and cannot install the Windows XP drivers he just
downloaded from the vendor’s Web site.
What is preventing this user from installing the scanner? Choose the correct answer.
A. Someone who is a member of the local Administrators group on the computer
must be logged on to install hardware devices that are not Plug and Play.
B. The scanner is not compatible with Windows XP.
C. The parallel cable is damaged.
D. There is an interrupt request (IRQ) conflict between the parallel port and another
installed hardware device.
2.
Your multimedia-capable computer seems to record and play back sound and voice at
very low quality. When you try to conduct video conferences over the Internet, your
colleagues cannot understand you, although they have no problems communicating
with one another. You also notice that their voices sound distorted and you hear lots of
pops and hisses.
When you use a different computer in your office, the video conferencing tools work
great. You suspect that there is something wrong with your sound card or the drivers
that interact with it; you want to examine the sound recording and playback devices
installed in your computer. You also want to check driver versions and perform diagnostics. How do you do this? Choose the correct answer.
A. You run Sigverif.exe at a command prompt.
B. You open the Registry Editor tool (Regedt32.exe) and look for entries that might
be related to audio devices installed in your computer.
C. You select the Hardware tab in the Sounds And Audio Devices program in Control
Panel.
D. You open the DirectX Diagnostics tool.
Objective 3.4
3.
Implement, Manage, and Troubleshoot I/O Devices 23-23
You are listening to an audio CD on your desktop computer at work when you realize
that the music might be disturbing your colleagues who are holding a small meeting in
the cubicle next to yours. You turn off the speakers, put on your stereo headphones,
and insert the plug into the jack on the front of the CD-ROM drive, but you hear no
sound. You adjust the volume control on the front of the CD-ROM drive, but still hear
no sound. You turn the speakers back on and can hear the music again.
Why is there no music through your headphones? Choose the correct answer.
A. The CD-ROM drive is defective and must be replaced.
B. Digital audio playback is enabled for your CD-ROM drive.
C. One or more of the volume levels in the Volume Control program is muted or
turned all the way down.
D. The Hardware Sound Acceleration Level is set to No acceleration on the Sound tab
of the DirectX Diagnostics tool.
4.
You recently purchased an external USB hard disk. You plug the power cord in and
connect the device to the USB hub that is already connected to your keyboard and
Pocket PC. You insert the installation CD-ROM that came with the device, follow the
prompts to install the device drivers, and reboot the computer when told to do so. You
log back on to the desktop and open Windows Explorer. You do not see the new hard
disk under My Computer where the other local disks are visible. You open Device
Manager, but cannot locate the new hard disk there, either.
Which of the following are appropriate troubleshooting steps? Choose three correct
answers.
A. Install the device into another computer.
B. Disconnect the Pocket PC and mouse.
C. Disconnect the new disk drive from the hub and plug it directly into a USB port on
the computer.
D. Look for USB-related messages in the System event logs using Event Viewer.
E. Verify that USB support is enabled in your computer’s BIOS.
F. Verify that you have not accidentally disabled USB support in Device Manager.
5.
Which of the following are ways to install a modem in Windows XP Professional?
Choose three correct answers.
A. Use the Phone And Modem Options program in Control Panel.
B. Use the Add Hardware program in Control Panel.
C. Use the Printer And Faxes program in Control Panel.
23-24
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
D. Boot into safe mode.
E. Attach a Plug and Play modem.
F. From the Start menu, click Run and type Winmsd.exe.
6.
The president of your company just received a new laptop with a built-in 802.11g network adapter and Windows XP Professional with Service Pack 2. The CEO has asked
you to configure it to connect to your corporate wireless network. You talk to the people responsible for managing the network, and they tell you that it uses Wired Equivalent Policy (WEP) encryption, and they give you the network name (SSID) and a
network key. When you are adding the network, you realize that they did not tell you
what to specify in the Network Authentication field, as shown in the following picture.
Which value do you select for the Network Authentication field? Choose the correct
answer.
A. Open
B. Shared
C. WPA
D. WPA-PSK
Objective 3.4
Implement, Manage, and Troubleshoot I/O Devices 23-25
Objective 3.4 Answers
1.
Correct Answers: A
A. Correct: Windows XP Professional installs Plug and Play devices automatically;
an administrator does not need to be present. The puzzled user was able to use
the Plug and Play devices because they were automatically detected and appropriate drivers were installed for him. Non–Plug and Play devices are installed in the
context of the currently logged-on user, and only administrators can install device
drivers and make other changes to critical system files and configuration settings.
The user could not install the scanner because it is not Plug and Play–capable.
B. Incorrect: The user told you that he downloaded Windows XP Professional drivers from the firm that built the scanner.
C. Incorrect: The user believes that Windows XP Professional did detect the scanner and that he received the error messages after it had already been detected.
D. Incorrect: Nothing in the question suggests that there are any resource conflicts;
additionally, the user had disconnected his personal laser printer from the parallel
port before attempting to install the flatbed scanner. Because the user reported no
problems with the printer, it is unlikely that there are resource conflicts between
the parallel port and any other device.
2.
Correct Answers: C
A. Incorrect: The Signature Verification tool (Sigverif.exe) is used to scan the computer for critical files such as device drivers and system dynamic-link libraries
(DLLs). It checks to see whether each file has a valid digital signature from
Microsoft; it is not used for hardware or driver troubleshooting.
B. Incorrect: Manually searching the Registry is a haphazard and time-consuming
approach to gathering the desired information. Launching the Sounds And Audio
Devices program in Control Panel is much faster and more effective. Also, the Registry Editor tool does not include troubleshooting tools to help you resolve hardware and software problems.
C. Correct: You use the Sounds and Audio Devices program to adjust volume, specify the kind of speakers you are using, create and select Sound Schemes, select
devices for sound and voice recording and playback, select devices for MIDI playback, view the properties of installed sound devices, and troubleshoot installed
sound devices.
D. Incorrect: The DirectX Diagnostics tool is used to review, configure, and troubleshoot the hardware in a computer that interacts with DirectX. It does have a tab
labeled Sound where you can test DirectSound, but it does not have detailed infor-
23-26
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
mation about the sound card. You can launch the Sound Troubleshooter from the
More Help tab in the DirectX Diagnostic tool or from the Hardware tab in the
Sounds And Audio Devices program.
3.
Correct Answers: B
A. Incorrect: The CD-ROM drive plays audio CDs through the speakers, and the
question gives no indication of other problems with the drive, so it is not clear that
replacing it will solve the problem.
B. Correct: When digital playback of audio CDs is enabled, the headphone jack on
the front of most CD-ROM drives is disabled. To use headphones to listen to audio
CDs, you have to either connect the headphones to a jack attached to the sound
card or to a headphone jack built into the speakers.
C. Incorrect: You can hear music through the speakers, so the CD volume and master volume controls must not be muted or turned down. There is no volume control specific to headphone jacks, so adjusting the volume levels in the Volume
Control program does not resolve the problem.
D. Incorrect: The Hardware Sound Acceleration Level has no effect on the volume
of audio CDs. Adjusting hardware acceleration on the Display and Sound tabs of
the DirectX Diagnostic tools might help to resolve stability or performance issues
relating to DirectX.
4.
Correct Answers: A, C, and D
A. Correct: If the problem reappears on a different computer system, it is likely that
the USB hard disk is defective. If it performs as expected on the other computer,
the problem is specific to the original computer.
B. Incorrect: It is possible that having too many USB devices connected can cause
problems because there is not enough power available for all devices. There are
limitations on how much power each individual USB device can draw from the
USB chain; if a USB device tries to use more than 500 milliamps of current, the
port is disabled until the system is rebooted. The total amount of power used by
all the devices is also limited. However, the question states that you connected the
USB disk drive’s power plug, which means that it will not be using much current
from the USB connection. Additionally, USB mouse devices and Pocket PCs normally use a trivial amount of electric current from the USB connection.
C. Correct: If this step resolves the problem, you have determined that the issue
was caused by the USB hub or its connection to your computer. Try power cycling
the hub and plugging it into an alternate port on your computer.
D. Correct: When Windows XP Professional detects problems with USB devices, it
writes error messages to the System event log. These messages can provide useful troubleshooting information. Another important step to take when resolving
Objective 3.4
Implement, Manage, and Troubleshoot I/O Devices 23-27
USB-related issues is to examine all the devices under the USB controller’s tree in
Device Manager. If a yellow exclamation point appears before a device, verify
that the system firmware is configured to allocate an IRQ number to the USB
controller.
E. Incorrect: The question stated that you had existing connections for your mouse
and Pocket PC so USB support must already be enabled in your computer’s BIOS.
F. Incorrect: The question stated that you had existing connections for your mouse
and Pocket PC, so USB support was not disabled in Device Manager. For the USB
disk drive to have been specifically disabled in Device Manager, it first must be
installed.
5.
Correct Answers: A, B, and E
A. Correct: After opening the Phone And Modem Options program, select the
Modems tab and click Add to open the Install New Modem page in the Add New
Hardware Wizard. The wizard tries to automatically detect and install the modem;
if automatic detection fails, the wizard allows you to select the manufacturer and
model of the new modem.
B. Correct: After the Add New Hardware Wizard launches, click Next and then
select Add A New Hardware Device From The List and click Next. You can then
either allow the wizard to automatically detect and install the modem or manually
select it from a list. If automatic detection succeeds, the wizard installs the modem
and the appropriate device drivers; if automatic detection fails, the wizard allows
you to select the manufacturer and model of the new modem.
C. Incorrect: The Printer And Faxes program is used to manage existing fax and
printer connections; it also installs, removes, and configures printers and fax printers. It is not used to install new modems.
D. Incorrect: Booting Windows XP Professional in safe mode is a method to resolve
stability problems with services and hardware devices; it is not an effective
approach to installing new hardware.
E. Correct: After you connect a Plug and Play modem to the computer, the Install
New Modem page in the Add New Hardware Wizard appears. The wizard tries to
automatically detect and install the modem; if automatic detection fails, the wizard
allows you to select the manufacturer and model of the new modem.
F. Incorrect: The System Information tool (Winmsd.exe) is not used to install or
configure any hardware devices including modems. The System Information tool
shows detailed information about the installed hardware and software and the
allocation of resources such as IRQ, direct memory access (DMA), I/O ports, and
memory.
23-28
6.
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Correct Answers: A
A. Correct: Almost all WEP-based networks rely on open authentication.
B. Incorrect: WEP networks can use shared authentication. However, the shared
authentication process actually decreases the security of the WEP network by giving more information to an attacker who is trying to crack your network key.
Therefore, shared WEP authentication should not be used and is rarely used.
C. Incorrect: WPA provides similar functionality to WEP, but with improved security. However, WPA and WEP are mutually exclusive and therefore can never be
used together.
D. Incorrect: As described in answer C, WPA-PSK and WEP cannot be used
together.
Objective 3.5
Manage and Troubleshoot Drivers and Driver Signing 23-29
Objective 3.5
Manage and Troubleshoot Drivers
and Driver Signing
Drivers enable Windows XP to communicate with hardware devices. Drivers act as part
of the operating system and, as a result, have the potential to cause Windows XP to fail
with a Stop error, also known as a Blue Screen of Death (BSOD). This is the most disturbing type of error Windows XP can display, and it causes any work that has not yet
been saved to be lost.
Most Stop errors are caused by problematic drivers. Although drivers act as part of the
operating system, they are usually written by the hardware vendors, not by Microsoft.
Hardware vendors might not use the same rigorous testing procedures as Microsoft
and, as a result, unhandled errors that cause Stop errors can occur. With the proper
skills, you can isolate the driver that is causing a problem and replace it with a more
compatible driver.
To reduce the number of driver problems, Microsoft offers driver signing. Microsoft
reviews and tests drivers written by hardware manufacturers to verify their stability. If
a driver proves to be stable, Microsoft signs the driver, and users can install it with minimal risk. In fact, you might choose to block any unsigned drivers from being installed
in your organization to prevent unpredictable driver problems.
To successfully answer questions in this objective, you must know how to configure
and use Windows Update. You must be able to navigate to a specific hardware device
in Device Manager; view its properties; and update, roll back, and uninstall its driver.
23-30
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Objective 3.5 Questions
1.
Members of which group can manually install, update, and roll back drivers on a computer running Windows XP Professional? Choose the correct answer.
A. Network Configuration Operators
B. Debugger Users
C. Users
D. Administrators
2.
You have been using a film scanner connected to the USB port of your computer for
several months. You learn that the manufacturer has released new drivers for the scanner that allow it to make multiple passes of a single negative and generate a higher resolution digital image. You download the drivers from the vendor’s Web site, install
them using the Update Hardware Wizard, and reboot when prompted. Now the scanner no longer works.
What is the easiest way to resolve this problem? Choose the correct answer.
A. Use the Roll Back Driver feature available on the device’s properties page.
B. Uninstall the device drivers for the scanner, physically disconnect the printer,
reboot, and then reconnect the printers and reinstall the new drivers when the
Add Hardware Wizard prompts you.
C. Uninstall the device drivers for the scanner, physically disconnect the printer,
reboot, and then reconnect the printers and reinstall the original drivers when the
Add Hardware Wizard prompts you.
D. Use Drivers.exe to roll back to the previous version of the device driver.
3.
You want to update the driver for your 3-D video adapter. Your computer has access
to the Internet. Which of the following tools can you use to update the driver? Choose
two correct answers.
A. Run Drivers.exe from a command prompt.
B. Run Device Manager.
C. Use Windows Update.
D. Open the WMI Control console.
E. Open the System Information tool (Winmsd.exe).
F. Launch the Add Hardware Wizard.
Objective 3.5
4.
Manage and Troubleshoot Drivers and Driver Signing 23-31
Which command launches the File Signature Verification tool that is used to identify
unsigned drivers installed on a Windows XP Professional system? Choose the correct
answer.
A. Winmsd.exe
B. Fsutil.exe
C. Sigverif.exe
D. Regedit.exe
5.
Which of the following tools can produce a list of drivers installed on a Windows XP
Professional computer? Choose two correct answers.
A. Driverquery.exe
B. Sigverif.exe
C. Winmsd.exe
D. Sfc.exe
E. Getmac.exe
23-32
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Objective 3.5 Answers
1.
Correct Answers: D
A. Incorrect: By default, the members of the Network Configuration Operators
group have limited administrative privileges that allow them to manage networking features.
B. Incorrect: By default, members of the Debugger Users group can debug processes on the computer.
C. Incorrect: By default, members of the Users group are restricted from making
system-wide changes including installing, updating, or rolling back device drivers.
D. Correct: By default, members of the Administrators group have total control of
the computer; therefore, they can install, update, and roll back device drivers.
2.
Correct Answers: A
A. Correct: The ability to roll back device drivers is a new feature in Windows XP
Professional. You access it by clicking the Roll Back Driver button in the device’s
properties page. You can view the properties of a device by double-clicking it in
Device Manager.
B. Incorrect: You have already determined that the new drivers do not work with
your system, so this series of steps does not resolve the problem.
C. Incorrect: These procedures should resolve the problem, but it is much faster
and easier to use the Driver Rollback feature available in Windows XP Professional.
D. Incorrect: Drivers.exe is a Windows 2000 Resource Kit tool used for viewing
information about the drivers currently running on a computer; it does not have
the ability to roll back device drivers.
3.
Correct Answers: B and C
A. Incorrect: Drivers.exe is a Windows 2000 Resource Kit tool that lists information
about all the drivers running; it is not used for updating device drivers.
B. Correct: You can update device drivers from Device Manager in two ways. Navigate to the device and right-click it, and then select Update Driver from the menu.
You can also double-click the device to open its properties dialog box, select the
Driver tab, and click Update Driver. Both methods launch the Hardware Update
Wizard, which guides you through the process of updating the driver.
Objective 3.5
Manage and Troubleshoot Drivers and Driver Signing 23-33
C. Correct: Although Windows Update is the simplest way to update device drivers,
it requires access to the Web, might not have the most recent version of drivers,
and does not offer drivers for all hardware vendors.
D. Incorrect: Windows Management Instrumentation (WMI) provides a management infrastructure for monitoring and controlling system resources. The WMI
Control console is used for configuring and controlling the WMI service; it is not
used for managing device drivers.
E. Incorrect: The System Information tool shows detailed information about the
installed hardware and software and the allocation of system resources; it does not
have the capability to update device drivers.
F. Incorrect: The Add Hardware Wizard is used to install new hardware devices
and to troubleshoot existing devices. It is not used to update drivers for existing
devices.
4.
Correct Answers: C
A. Incorrect: Winmsd.exe launches the Help And Support Services tool, which provides useful information about the system’s configuration. Although this tool cannot be used to find unsigned drivers, it can be used to launch the File Signature
Verification tool. To launch this tool, select File Signature Verification Utility from
the Tools menu.
B. Incorrect: Running the Fsutil.exe command-line utility is useful for modifying
aspects of the file system. However, this tool cannot be used to verify driver signatures.
C. Correct: Sigverif.exe is the correct command to launch the File Signature Verification utility. This tool can also be launched from the System Information program
located in the Start menu in the folder called All Programs\Accessories\System
Tools.
D. Incorrect: The Regedit.exe command launches the Registry Editor, which is used
to modify system configuration parameters. It cannot be used to verify driver signatures.
5.
Correct Answers: A and C
A. Correct: Driverquery.exe is a command-line tool that lists drivers installed on a
Windows XP computer. Because it is a command-line tool, you can conveniently
redirect the output to a text file, which is useful for sending the drivers to technical
support.
B. Incorrect: The driver verifier is very useful for verifying driver signatures. It cannot, however, produce a list of drivers installed on the computer. Instead, it is
capable only of listing unsigned drivers.
23-34
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
C. Correct: The System Information tool, launched by running Winmsd.exe, can
display signed and system drivers. To display drivers, expand Software Environment, and then click System Drivers or Signed Drivers.
D. Incorrect: You can use the System File Checker to scan and replace important
system files. It does not, however, list drivers.
E. Incorrect: This tool shows Machine Access Control (MAC) addresses assigned to
network interface cards on the current computer. It does not list drivers.
Objective 3.6
Monitor and Configure Multiprocessor Computers 23-35
Objective 3.6
Monitor and Configure
Multiprocessor Computers
The operating system kernel in Windows XP can support one or two CPUs. Windows
XP leverages the hardware abstraction layer (HAL) to bridge the gap between your
computer’s hardware and the operating system. This fundamental architecture facilitates porting the operating system to different hardware platforms.
Windows XP has a different HAL and kernel for uniprocessor and multiprocessor systems. Therefore, you must upgrade the HAL and kernel when adding a second processor to an existing Windows XP Professional computer. If you accidentally upgrade to
an incompatible HAL, or if you forget to upgrade your HAL, the computer will probably be unable to boot. The only ways to recover from this situation are to restore your
original hardware configuration, reinstall Windows XP Professional, or manually
replace the kernel and HAL by using Recovery Console.
You can use the Performance console or Windows Task Manager to analyze processor
performance. On each computer you manage, you must establish a baseline of satisfactory performance and monitor the system for diminished performance in an ongoing way. The major processor-related objects you must understand and monitor are
Thread, Process, System, Processor, Job Object, and Job Object Details.
To successfully answer questions in this objective, you must know the different HAL
versions available; how to upgrade from a single processor to a dual processor configuration; how to downgrade to a single processor configuration; and how to monitor
system operation using the Performance snap-in.
23-36
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Objective 3.6 Questions
1.
You manage the computers for the graphic artists in your company, many of whom
regularly use 3-D rendering software to create computerized special effects for promotional videos. Their standard workstations include dual CPUs running at 3 gigahertz, 1
gigabyte of RAM, and a high-end video card with built-in 3-D graphics acceleration.
One of the artists complains that her workstation periodically performs poorly. You log
performance data from several of the computers while the artist who is experiencing
diminished performance continues to work. You see the following processor-related
statistics for that system:
■
The Processor object’s % Processor Time counter averages 85 percent.
■
The Processor object’s Interrupts/Sec counter averages 6,500.
■
The Memory object’s Pages/Sec counter averages 1.5.
■
The System object’s Processor Queue Length counter averages 1.8.
Which of the following is the likeliest cause of diminished performance? Choose the
best answer.
A. Processor object’s % Processor Time
B. Processor object’s Interrupts per second
C. Memory object’s Pages/Sec
D. System object’s Processor Queue Length
2.
Yesterday, one of the developers at your company purchased a second processor for
his dual processor Windows XP Professional computer. Although he knows he should
contact you for hardware upgrades, he was excited about the performance boost and
installed the processor himself after hours. The first time he started his computer after
adding the processor, he received a Stop error (which he referred to as a Blue Screen).
He left his computer in that state until you arrived the next morning to help him troubleshoot the problem. The Stop error information was 0x00000079 MISMATCHED_HAL.
He wants you to enable Windows XP to start successfully using both processors without opening the computer’s case again. What is the best way to solve the problem?
Choose the best answer.
A. Start Windows XP in safe mode. Open the System Properties dialog box and click
the Hardware tab. Click the Hardware Profiles button, and create a new profile for
the multiprocessor configuration. Then, restart Windows XP in normal mode.
B. Insert the Windows XP Professional CD-ROM and reinstall Windows XP Professional over the existing installation.
Objective 3.6
Monitor and Configure Multiprocessor Computers 23-37
C. Replace the new processor with a functioning processor.
D. Start Recovery Console and insert the Windows XP Professional CD-ROM. Use
Recovery Console to copy the multiprocessor kernel and HAL files that match the
computer’s hardware configuration. Rename the files as needed.
23-38
Chapter 23
Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers
Objective 3.6 Answers
1.
Correct Answers: B
A. Incorrect: Although 85 percent is a very high sustained value for this counter,
and the user probably could benefit from faster processors, the computer should
continue to function acceptably because there is still 15 percent idle processor
time. The average for the Interrupts per second suggests why the percent processor time might be running so high.
B. Correct: You must establish an acceptable baseline for Interrupts per second on
a system performing nominally while under load. A generally considered acceptable starting point is 1,000 to 2,000 interrupts per second. 6,500 interrupts per second indicates a serious performance problem. You could further analyze the
impact of the problem by watching the % Interrupt Time counter, which measures
the percentage of the processor’s time that is consumed by handling interrupt
requests. Most likely, this problem is caused by a network adapter, although many
different hardware devices could theoretically be responsible. Try updating the
BIOS on the network adapter and the Windows XP Professional drivers for the
adapter. If that procedure does not resolve the problem, replace the adapter.
C. Incorrect: This counter measures the number of times Windows XP has to access
the paging file. If this counter were high, it would indicate that applications are
using significantly more memory than the computer has physical RAM available.
However, 1.5 is a very low count and is not indicative of a problem.
D. Incorrect: For this counter, 1.8 is an acceptable average. Because it is greater
than 1, it indicates that the computer’s processor is not handling instructions quite
as fast as it is receiving them. However, the % Processor Time counter indicates
that the computer should continue to function in an acceptable manner.
2.
Correct Answers: D
A. Incorrect: Even safe mode will fail to start when you have the incorrect kernel
installed. Additionally, you cannot use hardware profiles to support both uniprocessor and multiprocessor configurations.
B. Incorrect: This would solve the problem because Setup would detect the second
processor and install the multiprocessor kernel. However, it would also result in
the user losing his operating system settings. It would be more efficient to replace
the kernel file by using Recovery Console.
C. Incorrect: The question provides no information that should lead you to believe
the processor is not functioning correctly. Windows XP does not automatically
switch between uniprocessor and multiprocessor HALs, so the uniprocessor HAL
and kernel files need to be replaced.
Objective 3.6
Monitor and Configure Multiprocessor Computers 23-39
D. Correct: This process replaces the uniprocessor kernel with the multiprocessor
kernel. The specific files you need vary depending on the exact hardware being
used; contact your hardware manufacturer to determine which version of the HAL
and kernel you need. You should name the HAL file Hal.dll and the kernel files
Ntoskrnl.exe and Ntkrnlpa.exe.
24 Monitoring and Optimizing
System Performance and
Reliability
Windows XP gives administrators the ability to carefully monitor and tune system performance. Tools such as the Task Manager, the Performance utility, and a suite of command-line utilities allow for both real-time and historical performance data analysis.
Trace logs function very similarly, and are used to troubleshoot system problems and
debug applications.
Tuning the performance of portable computers is more complicated than tuning desktop systems because administrators must balance battery life with performance. Windows XP provides power schemes to allow users to quickly change a system’s power
consumption. Power schemes, combined with standby and hibernation features, dramatically increase battery life when a system is not in use.
Sometimes, problems are unavoidable. Windows XP provides a full set of troubleshooting tools to resolve these problems when they arise. The System Restore tool captures
system configuration information, and can reapply a working configuration if the system later becomes unreliable. Functionality such as the Last Known Good Configuration can allow Windows XP to boot even if a faulty driver was installed. Safe mode and
the Recovery Console provide administrators with the ability to repair even the most
damaged Windows XP installations.
Tested Skills and Suggested Practices
The skills that you need to successfully master the Monitoring and Optimizing System
Performance and Reliability objective domain on the Installing, Configuring, and
Administering Microsoft Windows XP Professional exam include the following:
■
Monitor, optimize, and troubleshoot performance of the Windows XP Professional
desktop.
❑
Practice 1: Use Task Manager to determine which process is currently consuming the most processor time.
❑
Practice 2: Change the fields on the Processes tab of Task Manager so that
every possible field is visible.
❑
Practice 3: Use Task Manager to change the priority of an application so that
it runs at high priority.
24-1
24-2
Chapter 24
■
■
Monitoring and Optimizing System Performance and Reliability
❑
Practice 4: Use the Performance console to monitor real-time performance
information about several different counters simultaneously.
❑
Practice 5: Gather processor utilization information over several hours, and
then analyze that information using the Performance console.
❑
Practice 6: Configure Scheduled Tasks to perform a complete disk defragmentation weekly, but only if the computer is idle. Configure the task to wake the
computer if necessary.
❑
Practice 7: Run the AT command without any parameters to view scheduled
tasks. Schedule a task to run daily using the AT command.
Manage, monitor, and optimize system performance for mobile users.
❑
Practice 1: On a portable computer, manually set the hardware profile for
both docked and undocked configurations.
❑
Practice 2: Create a new hardware profile and disable noncritical drivers for
that profile.
❑
Practice 3: Adjust the power scheme on a computer to a variety of different
settings and observe how the computer’s behavior is changed. Create a custom power scheme.
Restore and back up the operating system, System State data, and user data.
❑
Practice 1: Perform a complete system backup using the Backup Utility.
❑
Practice 2: Save the current system configuration using the System Restore
tool, and then restore the system configuration to its previous state.
❑
Practice 3: Boot the computer using the Last Known Good Configuration.
❑
Practice 4: Boot the computer using safe mode.
❑
Practice 5: Install the Recovery Console as an option on the boot menu. Then,
launch the Recovery Console using the Microsoft Windows XP Professional
CD and examine the available commands by executing the HELP command.
Examine each command in detail by typing the name of each command followed by /?. Finally, edit the Boot.ini system file using the Recovery Console.
Further Reading
This section lists supplemental readings by objective. We recommend that you study
these sources thoroughly before taking exam 70-270.
Objective 4.1 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read sections covering
Task Manager, Performance Monitor, and Disk Defragmenter in Appendix D,
“Tools for Troubleshooting” (available online at http://www.microsoft.com/
resources/documentation/Windows/XP/all/reskit/en-us/prmb_tol_cfbi.asp).
Further Reading
24-3
“Support WebCast: Monitoring and Tuning System Performance in Microsoft Windows XP,” by Dan Suehr (available online at http://support.microsoft.com/
?kbid=823887).
“Solving Performance Problems,” in the Windows XP Professional product documentation (available online at http://www.microsoft.com/resources/documentation/
windows/xp/all/proddocs/en-us/sag_mpmonperf_28.mspx).
Objective 4.2 Microsoft Corporation. Microsoft Windows XP Professional Resource Kit
Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 7, “Supporting
Mobile Users,” for information about power schemes, standby mode, and hibernation
(available online at http://www.microsoft.com/resources/documentation/Windows/
XP/all/reskit/en-us/prdc_mcc_gnml.asp).
“Power Management in Windows XP,” by Charlie Russel (available online at http://
www.microsoft.com/windowsxp/using/setup/learnmore/russel_02march25.mspx).
Objective 4.3 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 4, “Supporting Installations,” and Chapter 14, “Backup and Restore” (available online at
http://www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prork_overview.asp).
“Microsoft Windows XP System Restore,” by Bobbie Harder (available online at
http://msdn.microsoft.com/library/techart/windowsxpsystemrestore.htm).
“Support WebCast: Microsoft Windows XP: Troubleshooting Startup and Shutdown
Problems,” by William Keener (available online at http://support.microsoft.com/
?kbid=326841).
24-4
Chapter 24
Monitoring and Optimizing System Performance and Reliability
Objective 4.1
Monitor, Optimize, and
Troubleshoot Performance of the
Windows XP Professional
Desktop
Windows XP Professional has been designed to provide the optimum performance on
any hardware configuration without any adjustments. In fact, most users never need to
monitor or modify the performance of their Windows XP system. There are also times
when an administrator who has a detailed understanding of system performance monitoring and tuning can improve a system’s performance. For these administrators, Windows XP provides a suite of tools useful for monitoring, analyzing, and tuning system
performance characteristics.
The most commonly used tool is the Task Manager, which displays real-time information about network utilization and users in addition to monitoring applications, processes, and performance. The Performance console is a more powerful utility for
analyzing system performance because it provides real-time information about hundreds of detailed aspects of the system’s performance—including memory utilization,
shared folders, and network errors. You can also use the Performance console to alert
when counters reach a specific threshold, which enables you to detect impending
problems such as low disk space or high memory utilization before they cause the
computer to slow down.
Windows XP Professional provides the Scheduled Tasks to allow tasks to be executed
when the computer is not being actively used. If you prefer, you can use the AT command-line utility to schedule tasks.
Objective 4.1
Monitor, Optimize, and Troubleshoot Performance of the Windows XP Professional Desktop
24-5
Objective 4.1 Questions
1.
You are a systems administrator, and your responsibilities were recently increased to
include a group of users at a remote office who have, up until now, been forced to
maintain their own Windows XP computers. One of your users is complaining that his
computer has grown slower over the past year. In particular, he notes that it takes
Microsoft Word longer to open documents that have been recently created. Which of
the following actions will improve the performance of this user’s desktop? Choose the
correct answer.
A. Decrease the size of the paging file.
B. Enable NTFS compression.
C. Run Disk Defragmenter on the system’s hard disk.
D. Set the Performance Logs And Alerts service to start automatically.
2.
Which of the following pieces of information can be gathered from the Windows Task
Manager? Choose three correct answers.
A. CPU utilization
B. Network utilization
C. Page file utilization
D. Packet loss
E. Memory usage
F. Open files
3.
A user is complaining of performance problems with his Windows XP Professional system, but he is not sure whether the problems are caused by an underpowered processor, a shortage of memory for the applications he uses, or a slow disk drive. To
upgrade the system component that is limiting the system’s performance, you need to
log performance data over a period of several days while the user is working with the
computer. Which of the following procedures begins the process of gathering performance data? Choose two correct answers.
A. Log on to the user’s computer. Launch the Computer Management console,
expand System Tools, and then expand Performance Logs And Alerts. Select
Counter Logs in the left pane. In the right pane, right-click System Overview and
click Start.
B. Log on to the user’s computer. Launch Control Panel and select Performance
And Maintenance. Click Consoles, and then double-click Performance. Select
System Monitor in the left pane. In the right pane, right-click System Overview
and click Start.
24-6
Chapter 24
Monitoring and Optimizing System Performance and Reliability
C. Log on to the user’s computer. Launch Windows Task Manager. From the File
menu, select Log Data, and provide a file name.
D. Log on to the user’s computer. From a command prompt, type Logman start
“System Overview”.
E. Log on to the user’s computer. From a command prompt, type Relog
System_Overview.blg -q -o System_Overview.txt.
4.
Which of the following tools can be used to set the priority of a process? Choose the
correct answer.
A. System Monitor
B. Performance Logs And Alerts
C. Computer Manager
D. Task Manager
5.
A user complains about slow system performance. You decide to improve performance
by adjusting the Performance Options tool. You launch this tool by opening Control
Panel, selecting Performance And Maintenance, and clicking Adjust Visual Effects task.
Which of the following changes that can be applied to the Performance Options tool
improves the system’s responsiveness? Choose the correct answer.
A. On the Visual Effects tab, click the Adjust For Best Appearance option.
B. On the Visual Effects tab, click the Adjust For Best Performance option.
C. On the Advanced tab, under Processor Scheduling, select optimization for Background Services.
D. On the Advanced tab, under Memory Usage, select optimization for System Cache.
E. On the Advanced tab, under Virtual Memory, reduce the paging file size by half.
6.
You are the system administrator of a small network of end users who have both desktop and laptop Windows XP Professional systems. All systems participate in a Windows
XP domain. You want to avoid the reduced performance that fragmented file systems
cause by scheduling the disk defragmenter utility to run on all systems every Sunday at
01:00 Eastern Time (that is, at 1 A.M.). This task is important enough that systems must
be brought out of power savings mode if necessary. However, you do not want the
disk defragmentation to interfere with the users, nor do you want it to consume the
batteries on laptop systems.
The proposed solution is as follows: Launch the Scheduled Tasks system tool and choose
New Scheduled Task from the File menu. Name the task File Defragmentation, and
then right-click the new task and select Properties. From the Task tab of the Properties
dialog box, type defrag C: in the Run text box. In the Run As field, type the user name
of a Domain Admin account that has local Administrator rights on all systems in the
Objective 4.1
Monitor, Optimize, and Troubleshoot Performance of the Windows XP Professional Desktop
24-7
domain, and set the password using the Set Password button. From the Schedule tab,
at the Schedule Task drop-down list, select Weekly. Set the Start Time to 1:00 A.M., and
select only Sunday from the Schedule Task Weekly section. Create this task to all Windows XP Professional systems.
Which of your desired results does the proposed solution accomplish? Choose two correct answers.
A. Schedule the Disk Defragmenter to run on Sundays at 1:00 A.M.
B. Execute the Disk Defragmenter with an account that has proper privileges on all
systems.
C. Ensure that the Disk Defragmenter does not interfere with user sessions.
D. Wake the computers from power savings mode to run the Disk Defragmenter, if
possible.
E. Ensure that the Disk Defragmenter does not consume the battery on laptop
computers.
7.
Using the AT command-line utility, you schedule a task to run nightly on your Windows XP Professional system. Immediately afterward, you decide that the task must
run only weekly, so you launch the Scheduled Tasks administrative utility and modify
the task properties. The next time you execute the AT command from the commandline, what does it display about your scheduled task? Choose the correct answer.
A. The scheduled task appears and is scheduled to run daily.
B. The scheduled task appears and is scheduled to run weekly.
C. The scheduled task appears twice, and is scheduled to run both daily and weekly.
D. The scheduled task does not appear.
8.
You are a desktop administrator at the Graphic Design Institute. Currently, two dozen
designers are adding an animated character to a digital film for an upcoming made-fortelevision movie. Each night, they render the animated characters using their desktop
computers. The rendering process consumes their computer’s processors for approximately nine hours. Tonight, one of the designers needs to work late, and the rendering
process has slowed down other applications on his computer so much that his computer is barely usable. What is the most efficient way to improve the situation for him?
Choose the correct answer.
A. Change the priority of the rendering process to RealTime.
B. Change the priority of all other applications to High.
C. Change the priority of the rendering process to Low.
D. Change the priority of all other applications to Low.
24-8
9.
Chapter 24
Monitoring and Optimizing System Performance and Reliability
You have recently upgraded a computer from Windows 98 to Windows XP. Although
the computer meets the minimum requirements for Windows XP, the video card is outdated by current standards. You enjoy the Windows XP visual effects and select the
option to adjust visual effects for best appearance. Overall, performance is acceptable.
However, when you select multiple items on your desktop by dragging a box around
the items, it takes Windows XP several seconds to draw the box. What setting should
you change to resolve this problem while retaining as many visual effects as possible?
Choose the correct answer.
A. Select Adjust For Best Performance.
B. Deselect Show Shadows Under Mouse Pointer.
C. Deselect Show Translucent Selection Rectangle.
D. Deselect Smooth Edges Of Screen Fonts.
Objective 4.1
Monitor, Optimize, and Troubleshoot Performance of the Windows XP Professional Desktop
24-9
Objective 4.1 Answers
1.
Correct Answers: C
A. Incorrect: Windows XP Professional uses the paging file to temporarily store
data from the computer’s memory. Decreasing the size of the paging file increases
the free space on the system’s hard disk, but it does not improve the system’s performance.
B. Incorrect: NTFS allows files and directories to be compressed at the file system
level. This allows compressible files to consume less space on the hard disk.
Although compressing files increases the free space on the hard disk, it does not
improve the system’s performance.
C. Correct: Hard disks perform best when file data is written in contiguous blocks.
Over time, however, file data can become broken into discontiguous fragments.
Although the hard disk is still able to access fragmented files, they take longer to
load. Because the user’s performance problem was most noticeable when accessing files, and no maintenance had been done in at least a year, the cause of the
problem is most likely disk fragmentation. Running the Disk Defragmenter utility
resolves this problem and drastically improves disk performance on affected systems.
D. Incorrect: The Performance Logs and Alerts service is used when logging data
for performance analysis. Although it is necessary for logging performance data,
simply starting the service does not improve system performance.
2.
Correct Answers: A, B, and E
A. Correct: CPU utilization is shown both numerically and graphically on the Performance tab of the Windows Task Manager.
B. Correct: Network utilization is shown both numerically and graphically on the
Networking tab of the Windows Task Manager.
C. Incorrect: Page file utilization information is not available from the Windows
Task Manager.
D. Incorrect: Packet loss cannot be viewed from the Windows Task Manager. However, executing the command NETSTAT -S -P TCP from the command line shows
the Segments Retransmitted statistic, which is very similar to overall packet loss.
E. Correct: Memory usage is shown both numerically and graphically on the Performance tab of the Windows Task Manager.
F. Incorrect: Open files cannot be viewed from the Windows Task Manager.
24-10
3.
Chapter 24
Monitoring and Optimizing System Performance and Reliability
Correct Answers: A and D
A. Correct: The Performance Logs And Alerts snap-in, available through the Computer Management console, is the correct graphical tool for creating performance
logs.
B. Incorrect: The System Monitor snap-in is useful for monitoring real-time performance data, but it cannot log performance data.
C. Incorrect: Although the Windows Task Manager is useful for viewing a real-time
snapshot of a system’s performance, it cannot be used to log performance data.
D. Correct: Using the Logman utility is the correct way to start logging performance
data from the command line.
E. Incorrect: Relog is useful for analyzing logged data, but it is not used for starting
the logging process. Relog is used to resample logged data at a longer interval in
order to reduce the amount of data being analyzed.
4.
Correct Answers: D
A. Incorrect: The System Monitor is useful for viewing the processor utilization of a
given process, but it cannot change a process’ priority.
B. Incorrect: The Performance Logs And Alerts snap-in is useful for logging performance data, and allows you to record a given process’ processor utilization. However, it cannot be used to change the priority of a process.
C. Incorrect: The Computer Manager provides access to both the System Monitor
and the Performance Logs And Alerts snap-ins, but none of these tools can be
used to change the priority of a process.
D. Correct: The Processes tab of the Task Manager is used to change the priority of
a process. Right-click the name of a process, choose Set Priority, and select the
desired level.
5.
Correct Answers: B
A. Incorrect: The Adjust For Best Appearance option enables every visual feature of
the Windows XP Professional operating system. This provides the best user experience on systems that have sufficient processing capability. However, it reduces
system responsiveness and must not be used on systems experiencing performance problems.
B. Correct: The Adjust For Best Performance option disables all unnecessary visual
effects. Choosing this option reduces the amount of work Windows XP needs to
do to display the user’s graphical interface, thereby improving system responsiveness. Changing this setting is the best way to make the computer seem faster.
Objective 4.1
Monitor, Optimize, and Troubleshoot Performance of the Windows XP Professional Desktop 24-11
C. Incorrect: Optimizing processor scheduling for background services is useful on
servers because it ensures that interactive applications do not reduce the performance of a server’s primary tasks. However, it does reduce system responsiveness
for users working interactively with the computer because background services
receive higher priority than interactive applications.
D. Incorrect: Optimizing memory usage for system cache improves the performance of file sharing and Web services. However, when you allocate more of the
system RAM to these services, interactive applications suffer.
E. Incorrect: Windows XP uses virtual memory as an extension of the system’s
physical RAM. It is a slow process to page data from the physical memory to the
virtual memory located on the system’s hard disk, but decreasing the size of the
paging file does not improve system performance.
6.
Correct Answers: A and B
A. Correct: The settings selected on the Schedule tab are correct to launch the task
every Sunday at 1:00 A.M.
B. Correct: Selecting a Domain Admin account is the best way to ensure that a
scheduled task copied to many different systems has local Administrator rights on
all systems. If a Domain Admin account is not used, a local Administrator account
must be selected for each individual system—and account names and passwords
might vary.
C. Incorrect: The proper method for ensuring that scheduled tasks do not interfere
with user sessions is to select the Only Start The Task If The Computer Has Been
Idle For At Least check box from the Settings tab of the Task Properties dialog box.
D. Incorrect: The Wake The Computer To Run This Task check box was not
selected while the task was being configured. This check box is located on the Settings tab of the Task Properties dialog box.
E. Incorrect: This desired result was not accomplished. To ensure that the scheduled task does not consume the system’s battery, select both the Don’t Start The
Task If The Computer Is Running On Batteries and Stop The Task If Battery Mode
Begins check boxes from the Settings tab of the Task Properties dialog box.
7.
Correct Answers: D
A. Incorrect: The Scheduled Tasks graphical administrative utility is capable of
modifying tasks created with the AT command. Further, AT cannot display the
task because tasks that have been modified by the Scheduled Tasks are not visible to AT.
B. Incorrect: The Scheduled Tasks graphical administrative utility can update tasks
created with the AT command, but makes the tasks invisible to the AT commandline utility after they have been modified.
24-12
Chapter 24
Monitoring and Optimizing System Performance and Reliability
C. Incorrect: The Scheduled Tasks utility does not duplicate tasks when making a
modification, but it does make them invisible to AT.
D. Correct: The Scheduled Tasks utility and the AT command maintain entirely separate lists of scheduled tasks. Although the Scheduled Tasks utility can display
tasks created with the AT command, it cannot directly modify those tasks. To modify a task created with the AT command, the Scheduled Tasks utility removes the
task from the AT command’s list and adds the task to its own list. Therefore, tasks
created with AT become invisible to AT after being modified with the Scheduled
Tasks utility.
8.
Correct Answers: C
A. Incorrect: You should never use the RealTime priority level because it can interfere with normal system processing. Besides, increasing the priority of the rendering process would be opposite of the desired effect, and would make other
applications even less usable by assigning them fewer processor cycles.
B. Incorrect: Technically, increasing the priority of other applications to High
would improve their performance. However, because the designer might be using
several different applications, it is more efficient to lower the priority of the rendering process.
C. Correct: This is the most efficient way to improve the performance of all interactive applications on the designer’s computer. Setting the priority of the rendering
process to Low will free up more processing time for other applications, achieving
the desired effect.
D. Incorrect: This would have the opposite of the desired effect, making applications less usable by assigning them fewer processor cycles.
9.
Correct Answers: C
A. Incorrect: Although selecting this option would resolve the problem, it would
also disable almost all visual effects.
B. Incorrect: If this were the source of the problem, performance would be bad any
time the mouse cursor is displayed.
C. Correct: This visual effect displays a selection rectangle that uses a special video
card capability. If the video card lacks the capability, Windows XP can still draw
the translucent selection; however, it will take more processing capability. Deselecting this option should resolve the performance problem.
D. Incorrect: Deselecting this option would improve overall system performance.
However, it would affect performance at all times, not simply when dragging a
selection rectangle.
Objective 4.2
Manage, Monitor, and Optimize System Performance for Mobile Users 24-13
Objective 4.2
Manage, Monitor, and Optimize
System Performance for Mobile
Users
Thanks to recent improvements in portable computer hardware, battery life, and wireless networking, more and more users choose laptop computers that can travel with
them. Windows XP Professional’s mobile computing environment is so intuitive that
mobile users do not need special training. Administrators need to have a detailed
understanding of how the latest hardware and software work together to enable the
mobile environment, however.
Power schemes, such as Always On, Presentation, and Max Battery, provide a simple
way to adjust the balance between power consumption and performance. Power
schemes define settings for power-saving features such as turning off hardware components, standby, and hibernation. Together, these features maximize battery life when
a portable computer is used intermittently.
Hardware profiles were originally created to allow laptop computers to support different hardware configurations when connected to a docking station. You might never
need to use hardware profiles, however, because Windows XP automatically detects
the hardware that is currently connected to the computer. However, if a user wants to
disable connected hardware, such as disabling a network interface adapter on a laptop
when the computer is not connected to a network, you can create a hardware profile
by using Device Manager.
24-14
Chapter 24
Monitoring and Optimizing System Performance and Reliability
Obejctive 4.2 Questions
1.
You are configuring a new, fully PnP-compatible laptop for a user who will use the laptop both in a docking station and separate from the docking station. After installing
Windows XP Professional, how must you configure the hardware profiles? Choose the
correct answer.
A. Make no changes to the hardware profiles.
B. Insert the laptop into the docking station and boot the computer. View the current
hardware profile properties, select the This Is A Portable Computer check box,
and select the option labeled The Computer Is Docked.
C. Create two new hardware profiles. Name the profiles Docked and Undocked.
D. Insert the laptop into the docking station and boot the computer. Create a copy of
the current profile and name it Undocked.
2.
Which is the correct tool for specifying which drivers will be loaded in a given hardware profile? Choose the correct answer.
A. Task Manager
B. Device Manager
C. Computer Manager
D. System Monitor
3.
Which power scheme is the correct choice for a mobile user who wants to maximize
the lifetime of the battery, but needs the display to remain on at all times? Choose the
correct answer.
A. Home/Office Desk
B. Portable/Laptop
C. Presentation
D. Always On
E. Minimal Power Management
F. Max Battery
4.
Which of the following are advantages of standby mode over hibernation? Choose two
correct answers.
A. Shorter wake-up period
B. Provides compliance with airline regulations regarding the use of electronic
devices during takeoff and landing
Objective 4.2
Manage, Monitor, and Optimize System Performance for Mobile Users 24-15
C. Lower power consumption
D. No risk of data loss
E. Does not consume hard disk space
5.
You are a desktop administrator for City Power & Light. In the last several years, instant
messaging has become the preferred technique for contacting people within your organization. Recently, Simon Rapier, your CEO, complained that nobody can instant message him when he closes the lid to his laptop computer because, in his words, “It
seems to disconnect from the network.” He wants his battery to last as long as possible,
but needs to stay connected to the network when he closes his lid. How should you
configure the Advanced Power Options on his computer? Choose the correct answer.
A. Set When I Close The Lid Of My Portable Computer to Do Nothing, and set When
I Press The Sleep Button On My Computer to Do Nothing.
B. Set When I Close The Lid Of My Portable Computer to Do Nothing, and set When
I Press The Sleep Button On My Computer to Stand By.
C. Set When I Close The Lid Of My Portable Computer to Hibernate, and set When I
Press The Sleep Button On My Computer to Shut Down.
D. Set When I Close The Lid Of My Portable Computer to Stand By, and set When I
Press The Sleep Button On My Computer to Hibernate.
24-16
Chapter 24
Monitoring and Optimizing System Performance and Reliability
Objective 4.2 Answers
1.
Correct Answers: A
A. Correct: Hardware profiles are designed for computers that are not fully PnPcompatible. Computers with full PnP compatibility do not require hardware profiles to be configured.
B. Incorrect: Hardware profiles do not need to be configured for laptops that are
fully PnP-compatible. This is the correct procedure, however, if the computer is
not PnP-compatible.
C. Incorrect: Hardware profiles do not need to be configured for laptops that are
fully PnP-compatible.
D. Incorrect: Hardware profiles do not need to be configured for laptops that are
fully PnP-compatible.
2.
Correct Answers: B
A. Incorrect: The Task Manager is used to set process priorities and monitor processor performance, among other things. It cannot be used to specify which drivers are loaded in a given hardware profile.
B. Correct: The Device Manager is used to disable drivers for the current profile. To
disable a driver for the current profile, start Windows XP using the profile that you
want to configure. Then, launch Device Manager to view the properties of a
driver. From the Device Usage drop-down list, select Do Not Use This Device In
The Current Hardware Profile (Disable).
C. Incorrect: The Computer Manager is a set of snap-ins used to manage many
aspects of a Windows XP Professional computer. However, it cannot be used to
specify which drivers are loaded in a given hardware profile.
D. Incorrect: The System Monitor is used to monitor hundreds of performance
counters, but it cannot be used to specify which drivers are loaded in a given
hardware profile.
3.
Correct Answers: C
A. Incorrect: This power scheme does not meet the requirements. The Home/
Office Desk scheme maintains constant power when the system is plugged in, but
might turn off the display while on battery power.
B. Incorrect: This power scheme does not meet the requirements. The Portable/
Laptop scheme turns off all system components after a short period of inactivity.
This causes the display to shut down.
Objective 4.2
Manage, Monitor, and Optimize System Performance for Mobile Users 24-17
C. Correct: The Presentation power scheme maximizes battery life by allowing any
component except for the display to be turned off when not in use. When the system is plugged in, the Presentation power scheme maintains constant power to
the hard disk and system.
D. Incorrect: This scheme does not meet the requirements. The Always On scheme
disables all power-saving features, ensuring optimum performance at the cost of
battery life.
E. Incorrect: This scheme does not meet the requirements. The Minimal Power
Management scheme maintains constant power when the system is plugged-in,
but might turn off the display while on battery power.
F. Incorrect: This scheme does not meet the requirements. The Max Battery
scheme is excellent for conserving battery power, but might turn off the display.
4.
Correct Answers: A and E
A. Correct: Standby mode has a shorter wake-up period than hibernation mode.
Waking from hibernation requires reading the contents of the system’s memory
from the hard disk.
B. Incorrect: A mobile computer running Windows XP Professional might wake up
from standby mode to execute a scheduled task or switch to hibernation mode.
This possibility restricts this mode from being used during the takeoff or landing
of a commercial airplane.
C. Incorrect: Standby mode minimizes battery usage by shutting down as many
components as possible. However, it maintains the state of the computer in the
system’s RAM, which requires small amounts of power. Hibernation writes the
contents of the system’s RAM to the hard disk and shuts the system down completely. Therefore, hibernation has a lower power consumption than standby
mode.
D. Incorrect: Standby mode maintains the state of the computer in the system’s
RAM, which requires small amounts of power. If power is lost suddenly, for example if the battery is removed, data is lost. Hibernation does not have this limitation
because no power is required to maintain that state.
E. Correct: Standby mode maintains the state of the computer in system’s RAM—
only hibernation mode writes the system’s memory to the hard drive. As a result,
you must have enough free disk space to store the contents of the system’s memory to use hibernation mode.
24-18
5.
Chapter 24
Monitoring and Optimizing System Performance and Reliability
Correct Answers: B
A. Incorrect: Although this configuration would cause Simon’s computer to stay
online when he closes the lid, it does not allow him to manually put the computer
into standby or hibernate mode to save power.
B. Correct: These settings enable Simon to stay connected to the network when the
lid to his portable computer is closed and enable Simon to manually put the computer into standby mode when he needs to save power.
C. Incorrect: These settings would cause the computer to go into hibernate mode
when Simon closes the lid. Hibernate mode saves the contents of the computer’s
memory to disk and shuts the computer down, which does cause the network to
be disconnected.
D. Incorrect: These settings would cause the computer to go into standby mode
when Simon closes the lid. Standby mode saves power by shutting down most of
the computer’s hardware resources, including the network interface cards. This
would cause the network to be disconnected.
Objective 4.3
Restore and Back Up the Operating System, System State Data, and User Data 24-19
Objective 4.3
Restore and Back Up the
Operating System, System State
Data, and User Data
You cannot entirely prevent hardware failures, but you can be prepared for them. The
most fundamental recovery tool is the Backup Utility, which includes wizards to back
up files, restore files, and prepare your system for Automated System Recovery (ASR).
The System Restore utility enables you to recover from less-significant problems related
to drivers and software configurations. Like the Last Known Good Configuration, the
System Restore utility automatically creates a backup of vital system information.
Unlike the Last Known Good Configuration, the System Restore utility keeps a history
of system configurations and provides the user with the ability to restore the system
state to a specific date.
For problems that result in the inability to boot normally, but cannot be resolved with
the Last Known Good Configuration, use safe mode. If safe mode does not work correctly, the Recovery Console provides a useful set of command-line utilities that can be
used to troubleshoot problems. Recovery Console, which is similar to a command
prompt, allows you to view text files and replace system files, among other tasks.
24-20
Chapter 24
Monitoring and Optimizing System Performance and Reliability
Objective 4.3 Questions
1.
Your Windows XP Professional system fails to boot after you add a new network card
driver. Which feature of Windows XP Professional must you use to return the system to
the state it was in prior to adding the driver? Choose the correct answer.
A. Boot.ini
B. System Restore
C. Last Known Good Configuration
D. Recovery Console
2.
After an unexpected power outage, a user’s Windows XP Professional system fails to
boot successfully. The boot process allows you to select an instance of Windows XP
Professional to boot from, but fails partially through the startup routine. Which tools
can you use to diagnose and resolve this problem? Choose three correct answers.
A. System Restore
B. Last Known Good Configuration
C. Safe mode
D. Recovery Console
E. ASR
F. Device Manager
3.
Which of the following tasks cannot be accomplished from the Windows XP Professional recovery console? Choose two correct answers.
A. Format a hard disk.
B. Boot to the Last Known Good Configuration.
C. Set services to be disabled or start automatically.
D. Reinstall Windows XP.
E. Restore damaged system files from a CD.
F. Restore damaged system files from a network share.
G. Edit the Boot.ini file.
4.
Which of the following tasks must you do before installing a new application that
might cause a Windows XP Professional system to become unstable? Choose the correct answer.
Objective 4.3
Restore and Back Up the Operating System, System State Data, and User Data 24-21
A. Create a new Restore Point using System Restore.
B. Boot to the Last Known Good Configuration.
C. Back up all files using the Backup Utility.
D. Boot into safe mode.
E. Boot into the Recovery Console.
5.
You are designing a backup strategy for your Windows XP Professional system. You
cannot afford to lose more than a single day’s work, so you must back up the system
every night. You want to minimize the tape backup media used to store your backups,
but you do not want to use more than two backup tapes to perform a complete system
restore. Which of the following backup procedures meets your needs? Choose the correct answer.
A. Normal backup nightly
B. Incremental backup nightly
C. Differential backup nightly
D. Normal backup weekly, incremental backup nightly
E. Normal backup weekly, differential backup nightly
6.
You are a desktop support technician at Litware, Inc., a financial organization with
about 1,000 Windows XP Professional desktop computers. The desktop computing
environment is tightly controlled, and users log on to their computers as members of
the local Users group with no additional privileges. You receive a call from Jim Stewart,
a traveling salesperson. You recognize his name because you recently replaced his
hard drive after it failed while he was traveling. Jim lost several days of work when his
laptop’s hard drive failed because his computer is backed up only when attached to
your corporate network. To prevent this from happening in the future, Jim’s manager
gave him a fairly old parallel port–based external tape backup drive. Although Jim
seems to know how to run Windows Backup, when he reaches the Backup Type, Destination, And Name page of the Backup Or Restore Wizard, his external tape drive does
not appear in the Choose A Place To Save Your Backup list. Jim has a floppy disk with
drivers for the tape drive, but cannot seem to install the driver. The device seems to be
in the Windows Catalog. Which of the following changes would be the best way to
solve Jim’s problem? Choose the correct answer.
A. Contact the external tape drive vendor to acquire a driver signed by Microsoft.
B. Add Jim’s user account to the local Backup Operators group.
C. Add Jim’s user account to the local Administrators group.
D. Restart Jim’s computer and use the basic input/output system (BIOS) configuration
to disable the laptop’s serial port.
24-22
7.
Chapter 24
Monitoring and Optimizing System Performance and Reliability
You are a desktop support technician at Northwind Traders, a firm with about 200 Windows XP Professional and Windows 2000 Professional desktop computers. You receive
a call from James Van Eaton, a bookkeeper in your Accounting department. James
recently installed an update to a non-Microsoft application. After he installed the
update, his computer became very unreliable. Docking and undocking frequently
failed, and his computer seemed to slow down and show a great deal of unexplained
hard drive activity. James uninstalled the update, but the problems continue. What do
you recommend for the next step in troubleshooting the problem? Choose the correct
answer.
A. Open System Restore and select the Create A Restore Point option.
B. Open System Restore and select the Restore My Computer To An Earlier Time
option.
C. Boot to the Last Known Good Configuration.
D. Boot into safe mode.
E. Boot into the Recovery Console.
8.
You are a desktop administrator for Trey Research, a small consulting firm. Recently,
work that your firm did in 1999 has been subpoenaed for a lawsuit that one of your
former clients is involved in. The files identified by the court order had been stored on
a Windows 98 laptop computer that you decommissioned in 2001. However, you still
have a copy of a backup file you made with the Windows 98 Msbackup tool. Unfortunately, the Backup Utility on your Windows XP Professional computer reports the following error message: Unrecognized Media: The Backup File Contains Unrecognized
Data And Cannot Be Used. How can you restore the file? Choose the correct answer.
A. You cannot restore the file because it has been corrupted.
B. Install Windows 98 on a computer and use that computer to restore the backup.
C. Use an administrator account to take ownership of the files and grant your user
account Read permission.
D. Decrypt the file using the administrator password from the Windows 98 computer,
and then restore the file normally.
Objective 4.3
Restore and Back Up the Operating System, System State Data, and User Data 24-23
Objective 4.3 Answers
1.
Correct Answers: C
A. Incorrect: The Boot.ini file specifies the set of choices that are presented to the
user before the operating system is loaded. The Boot.ini file can be configured to
allow for booting between several different instances of Windows, but it cannot be
used to modify the configuration of Windows XP.
B. Incorrect: The System Restore tool is used to roll back the configuration of a
Windows XP system. However, it can be used only after the operating system has
booted. In this case, the System Restore tool is inaccessible because the operating
system is unbootable.
C. Correct: The Last Known Good Configuration is a copy of the system state stored
in the HKEY_LOCAL_MACHINE\System\CurrentControlSet registry key when a
user last successfully logged on. You can revert to this backup configuration by
rebooting the computer and pressing F8 when prompted to select the operating
system from which to start. From the Windows XP Professional Advanced Options
menu, select the Last Known Good Configuration option.
D. Incorrect: The Recovery Console can be a useful tool for recovering a system
that does not boot correctly, but it is not useful for restoring the last working configuration of a system. Use the Recovery Console only when all other methods
have failed.
2.
Correct Answers: C, D, and E
A. Incorrect: The System Restore utility is useful for troubleshooting problems
caused by system misconfigurations. However, it can be used only if the system is
bootable.
B. Incorrect: The Last Known Good Configuration is a quick way to resolve problems caused by misconfigurations and faulty drivers. Although the Last Known
Good Configuration is available at the boot menu and can therefore be used in
this scenario, it would not resolve the problem because the problem is not related
to a misconfiguration. Failure to boot after a power failure is generally caused by
corrupted files or a damaged hard disk—neither of which Last Known Good Configuration is capable of repairing.
C. Correct: Safe mode might or might not work in this scenario, but it is the first
thing to try. Safe mode loads a minimal set of drivers, and as such, it has a higher
chance of successfully booting than Windows XP Professional’s standard boot
mode. If safe mode does start successfully, you can use the graphical user interface to diagnose the hardware problems. If you determine that system files have
been damaged, you can initiate a scan of the disk and, if necessary, restore files
from the system CD.
24-24
Chapter 24
Monitoring and Optimizing System Performance and Reliability
D. Correct: The Recovery Console is a useful tool for recovering a system that does
not boot correctly. If the system has the recovery console installed, it is an option
on the boot menu. If it is not installed, insert the Windows XP Professional CD and
boot from the CD—the Recovery Console is an option. Recovery Console is command-line only, so it is not as convenient for diagnosis and troubleshooting as safe
mode. However, because it can be loaded from a CD, it starts even if the system’s
hard disk is completely destroyed. In this scenario, use the Recovery Console to
diagnose the extent of the damage. If you determine that system files have been
damaged, you can initiate a scan of the disk and, if necessary, restore files from
the system CD.
E. Correct: You use ASR only after attempts to resolve the problem with safe mode
and the Recovery Console have failed. If the hard disk is functional, but files have
been damaged, ASR can make the Windows XP Professional installation bootable.
If the hard disk itself is damaged, you need to fix those errors or replace the hard
disk before using ASR.
F. Incorrect: The Device Manager is a useful tool for diagnosing problems relating
to hardware drivers. However, it is accessible only after the system has successfully booted. In this scenario, you cannot get access to the Device Manager tool
unless you first start safe mode.
3.
Correct Answers: B and D
A. Incorrect: The FORMAT recovery console command can be used to format a
hard disk. This process erases all data on the hard disk and must be used only
when all other recovery methods fail.
B. Correct: You cannot boot the computer directly from the Recovery Console. The
system must be rebooted before Windows XP can be started in any configuration.
C. Incorrect: The Enable And Disable Recovery Console can be used to set the startup
value of services.
D. Correct: The Recovery Console cannot be used to launch the Windows XP setup
routine.
E. Incorrect: The Recovery Console can copy files from floppy drives and CDs
using the COPY command.
F. Incorrect: The Recovery Console can copy files across the network after a drive
letter has been mapped using the Net Use command.
G. Incorrect: Use the Bootcfg Recovery Console command to edit the Boot.ini file.
Objective 4.3
4.
Restore and Back Up the Operating System, System State Data, and User Data 24-25
Correct Answers: C
A. Incorrect: Creating a restore point prior to installing a new application enables
you to restore the system’s configuration if the new application causes problems.
However, Windows XP creates a Restore Point automatically when you launch a
Setup application.
B. Incorrect: Use the Last Known Good Configuration only if the system becomes
unbootable. It might be a useful tool if the new application stops your system from
starting successfully, but it must not be used prior to installing an application.
C. Correct: The Backup Utility enables you to back up all files and configuration
settings to removable media. Having a valid backup allows a Windows XP Professional system to be completely rebuilt in the event of a complete failure. Always
create a backup of a system before installing a potentially troublesome application.
D. Incorrect: Safe mode is a valuable tool for repairing a system that is having problems booting. Use it only after the system has failed, however.
E. Incorrect: The Recovery Console can salvage systems that are otherwise completely unbootable. Do not use it prior to installing an application, however,
because it does not facilitate backing up files or configurations.
5.
Correct Answers: E
A. Incorrect: Performing a normal backup every night enables you to restore the
entire system using only a single night’s backup tape. However, it uses more tape
backup media than is necessary because every file on the system is backed up
every night.
B. Incorrect: The incremental backup makes a copy of all files marked with the
archive attribute. After each file has been backed up, the file’s archive attribute is
cleared. Therefore, the incremental backup copies only files that were modified
since the last backup. Performing only incremental backups would require restoring every single backup ever made in the event of a hard disk failure.
C. Incorrect: The differential backup makes a copy of all files marked with the
archive attribute. Unlike the incremental backup, the differential backup does not
modify the archive attribute of files after creating the backup. In this way, performing a differential backup every night ensures that every file modified since the
last full backup can be restored. This is useful when combined with a normal
backup, but using only differential backups results in a backup set that grows
larger every night. Therefore, the differential backup does not meet the criteria of
minimizing the backup media used.
24-26
Chapter 24
Monitoring and Optimizing System Performance and Reliability
D. Incorrect: This is a common backup strategy, but it does not meet the requirement of needing to restore only two sets of backups for a complete system recovery. Each incremental backup copies only those files that were modified since the
prior night’s backup. Therefore, every single incremental backup since the last
normal backup must be restored to ensure total data recovery. For example, if a
normal backup was performed on a Sunday and incremental backups thereafter,
restoring the system on Thursday requires restoring Sunday’s normal backup and
Monday’s, Tuesday’s, and Wednesday’s incremental backups.
E. Correct: This backup strategy meets all the requirements. Differential backups
copy all files modified since the last normal backup, enabling a maximum of two
separate restores to completely rebuild a file system. For example, if a normal
backup was performed on a Sunday and differential backups thereafter, restoring
the system on Thursday requires restoring only Sunday’s normal backup and
Wednesday’s differential backup.
6.
Correct Answers: B
A. Incorrect: Although it is a good idea to contact the manufacturer for the latest
drivers, a lack of a digital signature is not preventing Tom from installing the
driver. Instead, he is restricted by the limited permission set granted by his membership in the Users group.
B. Correct: Normally, membership in the Backup Operators group is granted to
allow a user to read files that the user would normally not be allowed to access.
The group membership also gives the user the ability to install drivers for backup
devices. In this scenario, Tom’s user account lacks the necessary permissions to
install drivers. Adding Tom’s user account to the Backup Operators group gives
him the permissions necessary to install the driver without granting excessive
rights.
C. Incorrect: This would solve the problem because members of the Administrators
group do have the right to install drivers. However, Administrators have many
privileges that Tom does not need, which would create an unnecessary security
vulnerability.
D. Incorrect: Prior to the introduction of Plug and Play, many hardware problems
were resolved by disabling ports that used conflicting hardware interrupts. However, serial ports and parallel ports generally do not conflict. Additionally, Jim’s
problem is related to his restrictive user rights, not hardware conflicts.
7.
Correct Answers: B
A. Incorrect: Creating a restore point allows you to return to the current system
configuration in the future if a problem occurs. In this case, the problem has
already occurred, and it is too late to create a restore point.
Objective 4.3
Restore and Back Up the Operating System, System State Data, and User Data 24-27
B. Correct: By restoring the computer to an earlier restore point, you might be able
to remove the settings that are causing problems on the computer. Hopefully,
Windows XP automatically created a restore point when James ran the update.
C. Incorrect: Use the Last Known Good Configuration only if the system becomes
unbootable. In this case, it could not possibly help because James has already
logged into the computer. The Last Known Good Configuration settings are overwritten each time a user successfully logs in.
D. Incorrect: Safe mode is a valuable tool for repairing a system that is having problems booting. However, use it only after the system has failed and you can no
longer boot normally.
E. Incorrect: The Recovery Console can salvage systems that are otherwise completely unbootable. Because James’ computer does boot successfully, using
Recovery Console is unnecessary. You can perform your troubleshooting from a
standard Windows session.
8.
Correct Answers: B
A. Incorrect: Although it is possible for backup files to become corrupted, there is
an incompatibility between the Windows 98 backup tool and the Windows XP
backup tool that is causing this problem.
B. Correct: As described by Microsoft Knowledge Base article 305381, the Backup
tool included with Windows XP cannot open compressed backups created in Windows 95, Windows 98, and Windows Me. The only way to access the backup file
is to restore it by using one of those compatible operating systems.
C. Incorrect: In this scenario, the problem is not likely to be caused by insufficient
file permissions.
D. Incorrect: Windows 98 did not provide encryption for backup files and did not
have a dedicated administrator user account.
25 Configuring and
Troubleshooting the
Desktop Environment
The desktop environment in Microsoft Windows XP Professional is both flexible and
customizable. It can be configured to meet the needs and tastes of a wide range of
users and organizations, including those with employees and customers in different
countries. Although flexibility is desirable in many situations, some organizations need
to be able to enforce specific policies for the appearance and functionality of desktop
elements because of security or supportability requirements.
This objective examines how to configure and manage a Windows XP Professional
desktop, including configuring local and remote user profiles and multiple languages.
Additionally, this objective requires you to understand how to distribute, install, and
remove Windows Installer packages.
Tested Skills and Suggested Practices
The skills that you need to successfully master the Installing Windows XP Professional
Objective Domain on the Installing, Configuring, and Administering Microsoft Windows XP Professional exam include the following:
Important
For the following task, you should complete at least Practices 1 through 8. If
you want hands-on experience with every aspect of the exam and you have the extra lab
resources needed, complete Practices 9 and 10 as well.
■
Configure and manage user profiles and desktop settings.
❑
Practice 1: Right-click the taskbar to open the Taskbar And Start Menu Properties dialog box. Customize the behavior and appearance of the taskbar and
Start menu using the various options available on the Taskbar and Start Menu
tabs.
❑
Practice 2: Right-click the Start menu and select Explore. Right-click the Start
menu and select Explore All Users. Compare the locations displayed in each
Explorer window, and examine the subfolders and files contained within
each location.
25-1
25-2
Chapter 25
Configuring and Troubleshooting the Desktop Environment
❑
Practice 3: Using the Display program from the Appearance And Themes
group in Control Panel, select a different Theme for the desktop on the
Theme tab.
❑
Practice 4: Select the Appearance tab in the Display Program located in the
Appearance And Themes group in Control Panel and switch to Windows
Classic from the drop-down list below Windows and buttons. Select different
options from the drop-down list below Color Scheme. Click the Effects button
and see how different choices affect the behavior of the user interface elements. Click the Advanced button and experiment with specifying custom
colors for specific user interface elements.
❑
Practice 5: Create a blank Microsoft Management Console (MMC) and add the
Group Policy snap-in and view the Local Computer Policy. Examine the configuration choices available under the Administrative Templates folder of the
User Configuration node. Experiment with some of the settings available
under these folders: Start Menu And Taskbar, Desktop, and Control
Panel\Display.
❑
Practice 6: Launch Control Panel, click Performance And Maintenance, and
then click System. Click the Advanced tab, and then click the Settings button
in the User Profiles section of the dialog box. The User Profiles dialog box
appears; use it to copy and delete a user profile.
❑
Practice 7: Create a new local user account and log on to the computer using
that account. Type set at a command prompt to see a list of the configured
environment variables. Make note of the value for the USERPROFILE variable.
Log off the computer and log back on with an account that has local administrator privileges. Open the User Profiles dialog box, as discussed in Practice
1, and delete the user profile for this new local user. Log off the computer and
back on with the new local user. Type set at the command prompt to see
how the USERPROFILE variable has changed. Repeat these steps at least two
more times with this user account.
❑
Practice 8: Launch Control Panel, click Performance And Maintenance, select
System, click the Advanced tab, and then click the Environment Variables
button to open the Environment Variables dialog box. Note which variables
appear under the User Variables section and which appear under the Systems Variables section. Determine what happens when you create a new
variable under each section and log on using different user accounts. Identify which environment variables are present regardless of which user
account is logged on.
❑
Practice 9: Configure a roaming user profile on a workgroup computer, and
then configure a fully functional roaming user profile using an Active Directory domain controller. Copy a local user profile to a network location and
Tested Skills and Suggested Practices
25-3
configure a domain account to use that roaming user profile; then log on to
the network using that account.
❑
■
Practice 10: Using two Active Directory domain accounts, configure each type
of mandatory user profile (Ntuser.man and profile_folder.man). Log on to a
computer running Windows XP Professional with each of these accounts, and
then disconnect the computer from the network. Attempt to log on again with
each account and identify which mandatory user profile allows you to log on
with the cached copy of the profile.
Configure support for multiple languages or multiple locations.
❑
Practice 1: Create a table showing which of the three versions of Windows XP
Professional support the following features: ability to read and edit documents in multiple languages, language and regional support for 24 localized
language versions, localized language user interface, ability to transact business primarily in English but to have access to additional languages, ability to
transact business primarily in one or more languages besides English, and single worldwide rollouts for hot fixes and service packs.
❑
Practice 2: Install an additional Language Group on a computer running the
International English version of Windows XP Professional. Visit two or more
Web sites written in languages supported by the newly installed Language
Group and copy the text into a text editor. Print a page from each Web site to
verify that printing in the newly installed languages is possible. Enable the
Language Bar and use it to quickly shift the keyboard from one language to
another.
❑
Practice 3: Install the Windows XP Professional Multilingual User Interface
Pack (MUI Pack), and use the Regional and Language Options application in
Control Panel to select a non-English language. Open and use several of the
applications included with Windows XP Professional (such as WordPad, Solitaire, and Calculator) to verify that the menus, dialog boxes, and other user
interface elements appear in the language you selected.
❑
Practice 4: Select a different region, such as English (United Kingdom) or Italian (Italy), on the Regional Options tab of the Regional and Language
Options dialog box. Open the Date and Time Properties program in Control
Panel to see how the appearance of the calendar and clock changes when
you specify a new region.
Important
For the following task, you should complete at least Practices 1 and 2. If you
want hands-on experience with every aspect of the exam and you have the extra lab
resources needed to do Practice 3, complete Practice 3 as well.
25-4
Chapter 25
■
Configuring and Troubleshooting the Desktop Environment
Manage applications by using Windows Installer packages.
❑
Practice 1: Perform a Windows Installer–based routine (that is, from an .msi
file) by downloading the Windows Server 2003 Administration Tools Pack
from Microsoft.com and extracting the Adminpack.msi file from the executable file. Then, use the Add Or Remove Programs program in Control Panel
to remove the newly installed tools.
❑
Practice 2: Repeat Practice 1, but perform all tasks from the command line by
using the Msiexec.exe tool.
❑
Practice 3: On an Active Directory domain controller, use the Group Policy
snap-in to assign and publish software applications to users. Be sure you
understand which choice forces installation and which makes the installation
optionally available. Use Group Policy to assign software to a client computer, and then reboot that computer and log on to it to verify that the software was installed automatically.
Further Reading
This section lists supplemental readings by objective. We recommend that you study
these sources thoroughly before taking exam 70-270.
Objective 5.1 Open Help And Support from the Start menu; with the Help Index and
the Help Search, look for the term User Profile. Scroll down to and view the articles about configuring user profiles such as “Assign a logon script to a profile,”
“Assign a mandatory user profile,” “Creating a roaming or mandatory profile,” and
“Understanding User Profiles.” Be sure to select additional articles from the
Related Topics link available at the bottom of each of the articles you review.
Microsoft Corporation. Microsoft Windows XP Professional Resource Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 5, “Managing Desktops.” This chapter examines options for configuring Windows XP desktops in
workgroup and Active Directory domain environments; information relating to
user profiles appears throughout the chapter (available online at http://
www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/prda_
dcm_vdxa.asp).
Microsoft Corporation. “User Data and Settings Management.” 2002. This white paper
is available at http://www.microsoft.com/technet/prodtechnol/windowsserver2003/
technologies/management/user01.mspx. (If the white paper has moved, search for
the title at http://www.microsoft.com.) Review this paper for a detailed look at
managing user data and settings in Active Directory using IntelliMirror and Group
Policy.
Further Reading
25-5
Objective 5.2 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 3, “Multilingual Solutions for Global Business.” This chapter examines the levels of support
for multiple languages and locations available in the different versions of Windows XP Professional (available online at http://www.microsoft.com/resources/
documentation/Windows/XP/all/reskit/en-us/prff_mul_wtws.asp).
Objective 5.3 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 5, “Managing Desktops.” This chapter introduces desktop-management features in Windows XP Professional when running in workgroups or as part of Active Directory
domains using IntelliMirror, Group Policy, and the Windows Installer Service
(available online at http://www.microsoft.com/resources/documentation/Windows/
XP/all/reskit/en-us/prda_dcm_vdxa.asp).
Microsoft Corporation. “Group Policy Software Installation Overview.” This is part
of the Windows Server 2003 Help and Support Center documentation, and is available at http://www.microsoft.com/resources/documentation/windowsserv/2003/
standard/proddocs/en-us/ADE.asp. This topic describes how to use Active Directory GPOs to distribute software to computers and users that are members of a
domain.
25-6
Chapter 25
Configuring and Troubleshooting the Desktop Environment
Objective 5.1
Configure and Manage User
Profiles and Desktop Settings
Home users change desktop settings as a matter of convenience, and might never think
about user profiles. To a business, however, desktop settings and user profiles are key
tools for protecting the security of client systems. Businesses restrict desktop settings to
enforce consistency between computers and reduce the occurrence of problems. On a
network, a business might use roaming profiles to enable a user to use a different computer but keep the same documents and settings available.
In some environments, businesses use mandatory profiles to prevent users from making permanent changes to their profiles. Mandatory profiles are important in environments in which users change frequently, such as classroom environments and
businesses that make use of temporary staff. To succeed at this objective, you must
understand how to configure desktop settings on a local computer, create a roaming
profile by moving a user’s profile to a shared network folder, and configure mandatory
profiles. Additionally, you should have a solid understanding of how domain administrators can use Active Directory Group Policy settings to control the desktop environment of domain member computers.
Objective 5.1
Configure and Manage User Profiles and Desktop Settings
25-7
Objective 5.1 Questions
1.
You are the administrator of a LAN consisting of Windows XP Professional computers
and Windows 2003 Servers running Active Directory. All the systems belong to the
same Active Directory domain. Some users periodically access more than one computer. You want to be sure that users retain their desktop settings, no matter which
computer they use to log on to the network, and you want them to access their documents from a network file server. What do you do? Choose two correct answers.
A. Have a domain administrator configure Group Policy settings to redirect personal
folders to the file server.
B. Configure the ClipBook service to redirect the personal folders to a network
server.
C. Configure each of the user accounts for roaming user profiles.
D. Use the Accessibility Options program in Control Panel to specify the network
location for user profiles.
E. Use Windows Explorer to specify the network location for user profiles.
2.
Your manager has asked you to find ways to lower support costs for maintaining desktop computers at your company. You want to restrict which configuration changes
users can make to their computers. You also want to prevent users from modifying certain services local to their computers. You believe it will be easier to manage these
restrictions if you can hide the administrative tools from the users so that they never
even see them or their icons. Which of the following do you do? Choose the correct
answer.
A. Use the Add Or Remove Programs application in Control Panel to uninstall the
programs you want to prevent users from accessing.
B. Manually set permissions on the appropriate .cpl and .msc files from the file systems so that only administrators and the special local account called System have
access to them on each computer you want to lock down.
C. Have a domain administrator configure a Group Policy Object (GPO) that hides
the desired Control Panel programs and MMC snap-ins. Link the GPO to the organizational units (OUs) containing the user accounts you need to restrict. Set permissions on the GPO so that it applies only to the users you want to lock down.
D. Delete the appropriate .cpl and .msc files from the file systems of each computer
you want to lock down.
3.
You own a computer with a 300 MHz Pentium II microprocessor, 128 MB of RAM, and
a 4 MB video adapter running Windows 2000 Professional. All the hardware compo-
25-8
Chapter 25
Configuring and Troubleshooting the Desktop Environment
nents appear in Windows Catalog. You upgrade the computer to Windows XP Professional without any problems, but you notice that performance feels significantly slower
than it used to. Short of upgrading the computer hardware, what can you do to
improve the responsiveness of Windows XP Professional on your computer? Choose
three correct answers.
A. Launch the Windows XP Professional installation routine again, but this time reformat the hard disk drive during the setup process and perform a clean installation
of the operating system.
B. Reduce the size of the paging file to 2 MB.
C. Lower the screen resolution and reduce the color depth using the Display program
in Control Panel.
D. Remove the paging file completely.
E. Run the Disk Defragmenter tool to reduce fragmentation on all the installed hard
disks.
F. Use the Performance Options dialog box to set the display options to Adjust For
Best Performance.
G. Use Task Manager to set the priority for the Explorer.exe process to Real Time.
4.
John and Mary share the same computer running Windows XP Professional. You log
on to their computer with an account that has administrative access and install a suite
of internally developed applications used to access data on some of your firm’s mainframe computers. You confirm that the applications were correctly installed by opening
and testing each from their shortcuts on the Start menu. Later, they both report that
they cannot find the icons for any of the programs. Which of the following is the quickest way to ensure that both John and Mary can easily access the suite of applications
you just installed? Choose the correct answer.
A. Copy the program group for the suite of applications from your user profile to the
Default User profile.
B. Copy the program group for the suite of applications from your user profile to
John and Mary’s user profiles.
C. Have John log on to the computer and install the suite of applications, and then
have him log off. Have Mary perform the same installation while logged on with
her user account.
D. Copy the program group for the suite of applications from your user profile to the
All Users profile.
5.
You have been told to increase security for your organization’s network by designing
a more tightly controlled approach to managing user desktop settings and data. The
goals for your project are to do the following:
Objective 5.1
Configure and Manage User Profiles and Desktop Settings
25-9
■
Store user desktop settings in roaming profiles that will be available to users
regardless of which computer they log on to.
■
Prevent users from logging on with cached profiles when the network is unavailable.
■
Minimize the amount of time required for mobile users to log on to their computers when away from the office.
■
Ensure that all confidential user data is protected, even if a mobile user’s laptop
computer is stolen.
■
Ensure that all critical user data is backed up regularly according to your organization’s backup policy.
■
Allow users to manage their own desktop settings.
You propose to do the following:
■
Configure each user’s account to employ a roaming user profile using the Active
Directory Users And Computers snap-in.
■
Make user profiles mandatory by appending .man to the root folder of each of the
user profiles on the network.
■
Use Group Policy to redirect the My Documents to a distributed file system (DFS)
share located on several file servers that are secured and backed up according to
your organization’s policies.
■
Implement Offline Folders so that users can work with their documents even
when not connected to the network.
Which of the following goals does your proposed solution accomplish? Choose three
correct answers.
A. Store user desktop settings in roaming profiles that will be available to users
regardless of which computer they log on to.
B. Prevent users from logging on with cached profiles when the network is
unavailable.
C. Minimize the amount of time required for mobile users to log on to their computers when away from the office.
D. Ensure that all confidential user data is protected, even if a mobile user’s laptop
computer is stolen.
E. Ensure that all critical user data is backed up regularly according to your organization’s backup policy.
F. Allow users to manage their own desktop settings.
25-10
Chapter 25
Configuring and Troubleshooting the Desktop Environment
Objective 5.1 Answers
1.
Correct Answers: A and C
A. Correct: Normally, a roaming user profile includes My Documents, My Pictures,
and other personal folders. When you use Group Policy to redirect these folders,
users work on the data contained in them as if the folders were still on their workstations. Another benefit of this approach is that when a user logs off the network,
these folders are not synchronized with the roaming user profile. Because user
data can become quite large, this approach might save users considerable time
when logging on and off of their computers. You can further enhance this solution
by configuring Offline Files for these folders, allowing mobile users to transparently synchronize the network-based folders with a locally cached copy of the
files. When users are working from their computer while disconnected from the
network, they can continue to work with the locally cached copies of their files.
Changes are automatically resynchronized with the network copies the next time
they connect their system to the network.
B. Incorrect: The ClipBook service is for sharing documents copied to the Clipboard with other users via the network. The ClipBook service does not play a role
in managing user profiles or folder redirection.
C. Correct: When a user’s account is set up to use a roaming user profile, that user’s
profile is stored on the network. When the user logs on to a computer, the user
profile is cached to the local system. Any changes to the profile are written to the
cached copy. When the user logs off the network, the changes in the cached copy
are written back to the network copy. When a user logs on to a computer that has
been disconnected from the network, the locally cached copy of the user profile
is loaded transparently unless mandatory roaming profiles have been employed.
D. Incorrect: The Accessibility Options program is for configuring keyboard,
mouse, sound, and display settings to help people with mobility, vision, or hearing disabilities. The Accessibility Options program does not play a role in managing user profiles or folder redirection.
E. Incorrect: Windows Explorer is not used to manage user profiles or folder redirection.
2.
Correct Answers: C
A. Incorrect: Although the Add Or Remove Programs application can be used to
remove some Windows components (such as the Indexing Service), it cannot be
used to uninstall or reconfigure Control Panel programs or MMC snap-ins.
B. Incorrect: Although this approach might accomplish the desired results, it is
time-consuming, and doing it manually on many computers might result in errors
Objective 5.1
Configure and Manage User Profiles and Desktop Settings 25-11
on some systems. Using GPOs as described in answer C is a much more efficient
and reliable approach.
C. Correct: GPOs are an extremely effective way to lock down the desktops of
users. They are very flexible, allowing you to implement whatever degree of control that is appropriate for your particular environment.
D. Incorrect: This is a bad solution because the Windows File Protection feature in
Windows XP Professional might automatically restore some or all the files that you
manually remove. Any files that are not automatically restored are unavailable to
all users who log on to those computers, including the system administrators who
might need access to those files to do their jobs.
3.
Correct Answers: C, E, and F
A. Incorrect: This is a drastic approach that requires reinstalling all your applications and restoring your data from backup. Also, it is unlikely that you would
notice a significant improvement in performance.
B. Incorrect: This step would probably result in even slower performance of Windows XP Professional.
C. Correct: Depending on the video card and how low you adjust these settings, the
increase in performance might be subtle or dramatic. Dropping the resolution
from 1280 × 1024 to 640 × 480 reduces the number of pixels by more than 75 percent. Cutting the color depth from 32 bits per pixel to 8 bits per pixel lowers the
number of colors per pixel by 75 percent. Either of these steps reduces the workload on the video adapter by three-quarters, but it also decreases the quality of the
display for the operating system and all applications.
D. Incorrect: This procedure would probably result in even slower performance.
E. Correct: Depending on the level of file fragmentation, the increase in performance might be imperceptible, moderate, or quite significant. It is a good idea to
regularly defragment each hard disk on all your Windows XP systems. Disk
Defragmenter can be launched from the Start menu by selecting All Programs,
then Accessories, and then System Tools. You can also schedule the Defrag.exe
command-line tool to run automatically by using Scheduled Tasks.
F. Correct: Slower systems such as the one described in this scenario often demonstrate much quicker responsiveness when the simpler graphical elements are
selected for the user interface. The Performance Options dialog box is on the
Advanced tab of the System program in Control Panel. You can enable or disable
all the enhanced graphical user interface options together or specify settings for
individual elements.
G. Incorrect: When tuning performance on busy systems running Windows XP Professional, it is possible to improve overall system efficiency considerably by spec-
25-12
Chapter 25
Configuring and Troubleshooting the Desktop Environment
ifying appropriate priority levels for individual processes. Be sure to have a
thorough understanding of how the processes for the operating system, services,
and applications interact and what effect each change will have before attempting
this type of system tuning on production systems. It is extremely unusual to set
any process to Real Time priority because that configuration might cause the process to consume 100 percent of the CPU’s processing time, making it difficult or
even impossible to do anything else on the computer.
4.
Correct Answers: D
A. Incorrect: Although copying the program group to the Default User profile
ensures that any newly created profiles on the computer get a copy, existing user
profiles do not.
B. Incorrect: These procedures ensure that both John and Mary have access to the
new program group, but there is a quicker way to accomplish this.
C. Incorrect: It is possible that neither John nor Mary will be able to complete the
installation if they do not have administrative privileges on the computer. Even if
these procedures do work, it is an unnecessarily time-consuming solution.
D. Correct: This is the quickest way to resolve the problem. Program groups present
in the All Users profiles are accessible to everyone who logs on to the computer.
This type of issue is common with older applications and with internally developed programs that have not met all the requirements for the Certified for Windows logo program. Certified programs are required to recognize user profiles and
to give the installer the option of making the program group accessible to all users
or only the user logged on during the installation.
5.
Correct Answers: A, B, and E
A. Correct: By implementing roaming user profiles, your solution ensures that each
user’s profile will be available from any computer on the network.
B. Correct: By using the method of appending .man to the end of all users’ Roaming User Profile folder, they cannot log on to computers using locally cached copies of their roaming profiles.
C. Incorrect: Appending .man to the end of each user’s Roaming User Profile folder
forces Windows XP Professional to download the entire user profile every time a
user logs on. Although you are redirecting the My Documents to a location separate from each user’s profile, the profiles can still grow large, leading to long logon
times for remote users. It is important to note that this goal conflicts with the second goal—sometimes it is not possible to achieve all desired goals.
D. Incorrect: Nothing in your proposed solution addresses this goal. Implementing
Encrypting File System (EFS) in combination with the Offline Files feature would
allow you to better protect the data of the mobile users.
Objective 5.1
Configure and Manage User Profiles and Desktop Settings 25-13
E. Correct: By redirecting the My Documents folder to a DFS share that is located
on file servers that are backed up regularly, you have ensured that critical user
data is backed up periodically.
F. Incorrect: If you implement mandatory profiles, users can no longer manage
their desktop settings. Any changes users make to their desktops will be discarded
when they log off.
25-14
Chapter 25
Configuring and Troubleshooting the Desktop Environment
Objective 5.2
Configure Support for Multiple
Languages or Multiple Locations
Windows XP Professional is available in three versions that provide different levels of
support for multiple languages.
■
International English Version. This version includes the Multilingual Editing
and Viewing feature, which allows the user to view, edit, and print information in
more than 60 languages. This version is appropriate for occasional electronic communications in non-English languages.
■
Localized Language Versions. This is a localized version that provides the same
type of support as the English version, but all built-in menus, dialog boxes, Help
files, wizards, and file systems appear in a non-English language. Implement this
version when support for a few non-English languages is needed throughout the
entire organization.
■
Multilingual User Interface Pack (MUI Pack). Provides the same features as the
other versions, but enables you to switch from one language to another on the fly.
The MUI Pack is the best choice when support for numerous languages is needed
across the organization.
The most important element of mastering this objective is to understand how to configure and deploy the MUI Pack.
Objective 5.2
Configure Support for Multiple Languages or Multiple Locations 25-15
Objective 5.2 Questions
1.
Your organization has major offices in Spain, Portugal, France, Germany, Poland, Great
Britain, and the United States. Many users do not speak or write English fluently. Users
in many locations must regularly create and receive documents in two or more languages. Your organization has decided to migrate to Windows XP Professional, and it
is up to you to recommend how to best support the multilingual needs of the users.
Which of the following do you suggest? Choose the correct answer.
A. Create a standard base desktop using the Windows XP Professional Multilingual
User Interface (MUI) Pack. Be sure to install all the Input Languages used throughout your organization so that users can easily exchange documents in any language with one another.
B. Create a standard base desktop using the English version of Windows XP Professional. Be sure to install all the Input Languages used throughout your organization so that users can easily exchange documents in any language with one
another. Recommend to your manager that all users be signed up for extensive
English language courses as soon as possible.
C. Create a standard base desktop using the English version of Windows XP Professional. Recommend to your manager that all users be signed up for extensive
English language courses as soon as possible. Require users to create all their documents in English.
D. Create standard base desktops using the English version and the appropriate
Translated versions of Windows XP Professional. Be sure to install all the Input
Languages used throughout your organization so that users can easily exchange
documents in any language with one another.
2.
Your company has offices spread across the United States and Canada. Although all
employees speak and write English fluently, your company occasionally does business
with organizations in the Canadian province of Quebec. Some of these organizations
do the majority of their business in French. What must you do at the Windows XP Professional computers of employees who will be working with these organizations?
Choose the correct answer.
A. Open WordPad and select the French (Canada) input locale.
B. Install the French Translated version of Windows XP Professional.
C. Install the French version of WordPad by downloading it from the Windows
Update Web site.
D. Use the Regional And Languages Options program by launching Control Panel
and then choosing Date, Time, Language, And Regional Options to enable support
for French (Canada) as an input language. If prompted, provide the location of the
Windows XP Professional installation media and restart the computer.
25-16
3.
Chapter 25
Configuring and Troubleshooting the Desktop Environment
You are a consultant who was asked by a worldwide commercial property management firm to plan an upgrade program to deploy the MUI Pack throughout its organization. The firm has many offices around the globe, most of which have not been
tightly managed by their information technology group. A thorough audit of the hardware and software reveals that the firm is running a variety of previous Windows versions on a multitude of hardware platforms. You determine that many systems will
have to be replaced because that will be less expensive than trying to upgrade the
hardware to the point where it could reliably run Windows XP Professional. Which of
the following versions of Windows can be upgraded directly to the MUI Pack? Choose
four correct answers.
A. Windows 2000 Server
B. Windows Me
C. Windows NT Workstation 4.0
D. Windows NT Server 4.0
E. Windows NT Workstation 3.51
F. Windows 2000 Professional
G. Windows 98
Objective 5.2
Configure Support for Multiple Languages or Multiple Locations 25-17
Objective 5.2 Answers
1.
Correct Answers: A
A. Correct: This is the easiest approach to this challenge because the information
technology group within your organization has a single standard desktop to maintain and support.
B. Incorrect: Although this approach might be easier on your organization’s information technology group, it does not fulfill the needs of your users. Forcing the
users to learn a second language is expensive and time-consuming, and might
cause resentment in some.
C. Incorrect: This solution is inappropriate for the same reasons noted in answer B.
D. Incorrect: Although this solution meets the multilingual requirements of the
users, it will result in at least six versions of Windows XP Professional being
deployed in your organization. That will cause an unnecessary challenge for your
organization’s information technology group.
2.
Correct Answers: D
A. Incorrect: Although you can view and edit documents in WordPad using any
installed Input Language, you cannot switch languages from within that program.
B. Incorrect: This is an inefficient and expensive solution for supporting the viewing, editing, and printing of documents in multiple languages.
C. Incorrect: There is no French version of WordPad available for download from
the Windows Update Web site.
D. Correct: All versions of Windows XP Professional support viewing, editing, and
printing documents in multiple languages as long as the proper language group is
installed. The Western Europe and United States Language Group is installed by
default in the English version of Windows XP Professional. It includes support for
several languages such as French and English. Other language groups must be
installed to support additional input languages, such as Greek. You must restart
the computer after installing additional language groups.
3.
Correct Answers: B, C, F, and G
A. Incorrect: Because it is not possible to upgrade Windows 2000 Server to Windows XP Professional, it is also not possible to upgrade this version of the operating system to Windows XP Professional MUI Pack.
B. Correct: Upgrade from Windows Me to Windows XP Professional, and then
apply the MUI Pack files. You can simplify the process by creating an unattended
answer file–based upgrade installation of Windows XP Professional. Then add
25-18
Chapter 25
Configuring and Troubleshooting the Desktop Environment
MUISETUP to the [GUIRunOnce] section of the answer file. Details of the procedure are available on the Windows XP MUI Pack installation media.
C. Correct: Like Windows Me, upgrade Windows NT Workstation 4.0 to Windows
XP Professional English Version and then apply the MUI Pack files.
D. Incorrect: It is not possible to upgrade Windows NT Server 4.0 to Windows XP
Professional; therefore, it is not possible to upgrade this version of the operating
system to Windows XP Professional MUI Pack.
E. Incorrect: It is not possible to upgrade Windows NT Workstation 3.51 to Windows XP Professional; therefore, it is not possible to upgrade this version of the
operating system to Windows XP Professional MUI Pack.
F. Correct: Like Windows Me, upgrade Windows 2000 Professional to Windows XP
Professional English version and then apply the MUI Pack files.
G. Correct: Like Windows Me, upgrade Windows 98 to Windows XP Professional
English version, and then apply the MUI Pack files.
Objective 5.3
Manage Applications by Using Windows Installer Packages 25-19
Objective 5.3
Manage Applications by Using
Windows Installer Packages
Software developers create Windows Installer packages for their products. For example, Microsoft distributes updates for Microsoft Office 2003 as Windows Installer packages. Developers within your organization can also create Windows Installer packages
to simplify the deployment of the application. In particular, Windows Installer packages make it extremely easy to distribute an application by using Active Directory software distribution. Although you do not need to know exactly how to configure
software distribution by using Active Directory Group Policy objects, you must understand it conceptually and be able to troubleshoot the problems that can arise.
To succeed at this objective, you must understand the purpose of Windows Installer
packages. You should have hands-on experience installing, configuring, and removing
Windows Installer packages using both graphical tools and the Msiexec.exe commandline tool. If you have an Active Directory domain controller at your disposal, having
hands-on experience distributing Windows Installer packages using Active Directory
software distribution will give you a deeper understanding of the capabilities.
25-20
Chapter 25
Configuring and Troubleshooting the Desktop Environment
Objective 5.3 Questions
1.
You are a desktop administrator for a sports equipment manufacturing company. Yesterday, the engineers responsible for software distribution deployed Office 2003 to all
computers in your domain. All users have local user profiles. The following day you
discover that Office has not been deployed to most of the Windows XP Professional
computers that you manage. Which Group Policy setting do the domain administrators
need to modify to ensure that the application is distributed the next time users log in?
Choose the correct answer.
A. Enable the Always Wait For The Network At Computer Startup And Logon policy.
B. Enable the Maximum Wait Time For Group Policy Scripts setting and set it to zero
seconds.
C. Enable the Wait For Remote User Profile setting.
D. Enable Turn Off Background Refresh Of Group Policy.
2.
You identify the source of a persistent problem with one of your user’s computers: an
application, installed by using a Windows Installer package, that is consuming a large
amount of disk space. You are not sure where the user found the Windows Installer
package to perform the original installation, however. What is the easiest way to uninstall the application? Choose the correct answer.
A. msiexec /uninstall ProductCode
B. Right-click the original .msi file and select Remove.
C. Double-click the original .msi file. When prompted, click Remove
D. Open Add Or Remove Programs. Click the application, and then click Remove.
3.
You are a part-time desktop administrator for a small organization that consists of five
users who work from home in different parts of the world. Each user has a Windows
XP Professional computer that is not connected to an Active Directory domain. In fact,
the organization has no servers. You have been working closely with one of your software vendors to resolve a bug in an application that the users depend on. After several
weeks of support calls, the vendor posted a .msi file to its Web site for you to install on
each of your computers. The location of the .msi file is http://www.contoso.com/
patch.msi. Users will need to install the update themselves.
Each user has a local administrator account to use for the installation. You want to send
them a command that they can run to automatically install the patch. Which command
would work? Choose the correct answer.
Objective 5.3
Manage Applications by Using Windows Installer Packages 25-21
A. msiexec /x “http://www.contoso.com/patch.msi”
B. msiexec /update “http://www.contoso.com/patch.msi”
C. msiexec /i “http://www.contoso.com/patch.msi”
D. msiexec /url “http://www.contoso.com/patch.msi”
4.
Which version of Windows Installer is included with Service Pack 2 for Windows XP?
Choose the correct answer.
A. Windows Installer 1.0
B. Windows Installer 2.0
C. Windows Installer 3.0
D. Windows Installer 4.0
25-22
Chapter 25
Configuring and Troubleshooting the Desktop Environment
Objective 5.3 Answers
1.
Correct Answers: A
A. Correct: By default, Windows XP does not wait for the network to be fully initialized at startup and logon. Existing users are logged on using cached credentials, which results in shorter logon times. Windows XP applies Group Policy in
the background after the network becomes available. As a result, software installations usually take two or three logons. Enabling this setting causes Windows XP
to wait for the network before logon so that Group Policy can be immediately
applied.
B. Incorrect: Setting this policy to zero forces clients to wait indefinitely while
Group Policy scripts run. It will not ensure that the application is installed at the
next login, however.
C. Incorrect: This setting directs the system to wait for the remote copy of the
roaming user profile to load, no matter how long it takes. Waiting for the remote
profile is appropriate when users move between computers frequently, and the
local copy of their profile is not always current. However, the users in this scenario
have local user profiles, so enabling this setting will have no effect.
D. Incorrect: This setting prevents Group Policy from being updated while the
computer is in use. If you enable this setting, the system waits until the user logs
off the system before updating Group Policy settings instead of refreshing settings on a regular basis. This setting would have no effect on how software is distributed.
2.
Correct Answers: D
A. Incorrect: You can use the Msiexec tool to uninstall applications. However, it is
easier to use Add Or Remove Programs.
B. Incorrect: While you can uninstall a Windows Installer package by right-clicking
the original .msi file and clicking Uninstall, the menu item is not named Remove.
Additionally, this is typically not as easy as opening Add Or Remove Programs and
uninstalling the package.
C. Incorrect: This will work. However, because you do not know where the original .msi file is located, it would be more time-consuming than using Add Or
Remove Programs.
D. Correct: Windows Installer applications always add themselves to the Add Or
Remove Programs list. Therefore, you should use Add Or Remove Programs to
uninstall them.
Objective 5.3
3.
Manage Applications by Using Windows Installer Packages 25-23
Correct Answers: C
A. Incorrect: The /x parameter actually uninstalls a package, rather than installing it.
B. Incorrect: The /update parameter requires a Windows Installer update file,
which would have a .MSP file extension. The developer has provided you with a
.msi file, which should be installed with the /i parameter.
C. Correct: Use the /i parameter to install Windows Installer packages. You can
specify a URL for the location of the file.
D. Incorrect: Msiexec does not support the /url parameter.
4.
Correct Answers: C
A. Incorrect: Windows XP includes Windows Installer 2.0, and Service Pack 2
upgrades it to version 3.0.
B. Incorrect: Windows XP includes Windows Installer 2.0, and Service Pack 2
upgrades it to version 3.0.
C. Correct: Windows XP includes Windows Installer 2.0, and Service Pack 2
upgrades it to version 3.0.
D. Incorrect: Windows Installer 4.0 was not yet available when Service Pack 2 was
released.
26 Implementing, Managing,
and Troubleshooting
Network Protocols and Services
Microsoft Windows XP makes it easy to stay connected while minimizing your exposure to attacks. Naturally, you can connect to traditional wired networks. You can also
connect to wireless networks at your home or office, or at wireless hotspots. If you are
away from the office, you can connect to any Internet connection and use Windows XP
to create a virtual private network (VPN) connection to access resources on your internal network. If an Internet connection is not available, but you can access a telephone
line, you can use dial-up networking to connect to your office network.
It is risky to connect to any network, especially the Internet. Windows XP helps protect
you from network attacks by using Internet Connection Firewall (ICF) and, when Service Pack 2 is installed, Windows Firewall. Both ICF and Windows Firewall are capable
of providing similar levels of protection by blocking all incoming connections that have
not specifically been allowed. Windows Firewall is enabled by default, however, and is
easier to configure. In Active Directory environments, domain administrators can configure Windows Firewall by using Group Policy settings.
For troubleshooting problems with remote computers and helping users across a network, Windows XP provides Remote Desktop and Remote Assistance, both of which
display a remote computer’s desktop on your own computer. Additionally, Windows
XP can act as either a Web server or a Web client, thanks to Internet Information Services (IIS) and Microsoft Internet Explorer.
To complete this objective, you must understand how to install, configure, and troubleshoot all these technologies.
Tested Skills and Suggested Practices
The skills you need to successfully master the Implementing, Managing, and Troubleshooting Network Protocols and Services objective domain on the Installing, Configuring,
and Administering Microsoft Windows XP Professional exam include the following:
■
Configure and troubleshoot the TCP/IP protocol.
❑
Practice 1: Install TCP/IP and configure the computer to use Automatic Private IP Addressing (APIPA).
26-1
26-2
Chapter 26
■
■
Implementing, Managing, and Troubleshooting Network Protocols and Services
❑
Practice 2: Connect a Windows XP computer to a network with a Dynamic
Host Configuration Protocol (DHCP) server. Verify that the Windows XP Professional computer obtains its TCP/IP configuration from the DHCP server.
Then use Ipconfig.exe to examine, release, and renew DHCP leases on the
Windows XP Professional computer.
❑
Practice 3: Familiarize yourself with the other tools available for troubleshooting network connections such as Arp.exe, Hostname.exe, Ipconfig.exe,
Ping.exe, Pathping.exe, Tracert.exe, Netstat.exe, and Route.exe.
❑
Practice 4: Configure a static TCP/IP address for a client computer that normally relies on DHCP-assigned Internet Protocol (IP) addresses.
❑
Practice 5: Use the Nslookup.exe utility to identify the IP addresses for http://
www.microsoft.com.
❑
Practice 6: Edit the HOSTS file in the %windir%\system32\drivers\etc directory so that the domain name http://www.microsoft.com resolves to the IP
address 127.0.0.1. Save the HOSTS file, and use the command ping
www.microsoft.com to verify that this domain name resolves to the IP address
127.0.0.1. Edit the HOSTS file again, remove the new entry, and save the file.
Connect to computers by using dial-up networking.
❑
Practice 1: Create a dial-up connection to an Internet service provider (ISP).
After this connection is working properly, configure Internet Connection
Sharing (ICS) to allow multiple computers to access the Internet across a single link.
❑
Practice 2: If you have a VPN server available, establish a VPN tunnel. Configure this connection with ICS to allow multiple computers to use the VPN
simultaneously.
Connect to resources by using Internet Explorer.
❑
Practice 1: Configure offline Web pages to store several Web sites offline.
Open the Synchronize dialog box, and adjust the properties to automatically
download these sites at a specific time. After this time has passed, disconnect
from the network and attempt to access one of the offline Web sites.
❑
Practice 2: Press Ctrl+H to open the history toolbar. Notice that all sites visited
in the last several weeks are available for recall.
❑
Practice 3: Use the Internet Options dialog box to clear your temporary Internet files and history. This helps to protect your privacy if other people have
access to your computer.
❑
Practice 4: Using the Security tab of the Internet Options dialog box, compare
the security settings for the Internet and Trusted Sites zones. Consider how
they differ, and how that improves the security of your computer.
Tested Skills and Suggested Practices
❑
■
26-3
Practice 5: Using the Privacy tab of the Internet Options dialog, examine the
settings for each of the six privacy levels. Temporarily set your privacy level
to Block All Cookies, and then visit several of your favorite Web sites. Consider how your user experience was affected. Afterwards, set the privacy level
to its original setting.
Configure, manage, and implement Internet Information Services (IIS).
❑
Practice 1: If IIS was not installed with Windows XP, install it from Add/
Remove Windows Components in Control Panel. Familiarize yourself with the
different IIS components available for installation.
❑
Practice 2: Edit the application configuration to remove unused script mappings. Although this does not change the site’s existing functionality, it does
dramatically reduce the risk of security vulnerabilities.
❑
Practice 3: Add a virtual directory, and disable anonymous access to the virtual directory. Access the virtual directory using Internet Explorer and notice
that you are prompted for authentication. Provide your user name and password, and verify that you have access.
❑
Practice 4: Modify NTFS file permissions for Web content within the IIS home
directory. Notice how removing Read file permissions for the
IUSR_computername account affects your ability to anonymously access files.
❑
Practice 5: Install an IIS security hot fixes if any are available.
Important
For the following task, you should complete at least Practice 1. If you want
hands-on experience with every aspect of the exam and you have multiple networked Windows XP computers, complete Practices 2 and 3 as well.
■
Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.
❑
Practice 1: Use the Remote tab of the System Properties dialog box to allow
both Remote Desktop and Remote Assistance incoming connections.
❑
Practice 2: Open the Remote Desktop Connection tool, and use the Experience tab to optimize the performance for local area network (LAN) speeds.
Connect to a remote computer by using Remote Desktop. Then disconnect,
and optimize the performance of the connection for modem speeds. Reconnect, and notice how the experience is different.
❑
Practice 3: Have another Windows XP user send you a Remote Assistance invitation, and then connect to the remote computer by using Remote Assistance.
26-4
Chapter 26
■
Implementing, Managing, and Troubleshooting Network Protocols and Services
Configure, manage, and troubleshoot an ICF.
❑
Practice 1: First, disable Remote Desktop and Remote Assistance. Then install
Service Pack 2, and open the Security Center. Notice whether Windows Firewall is enabled or not. View the Windows Firewall properties, and notice the
programs and services listed on the Exceptions tab.
❑
Practice 2: Enable Remote Desktop. Then view the Windows Firewall properties, and notice that Remote Desktop has been added to the Exceptions tab.
❑
Practice 3: Manually add Windows Messenger to the list of Windows Firewall
exceptions.
❑
Practice 4: Enable ICF or Windows Firewall with all default settings so that all
incoming traffic is automatically filtered. Attempt to ping this system from a
remote system, and notice the results. Attempt to map a connection to a
shared folder, and notice the results. Disable ICF or Windows Firewall and
repeat these steps.
Further Reading
This section lists supplemental readings by objective. We recommend that you study
these sources thoroughly before taking exam 70-270.
Objective 6.1 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 18, “Connecting Clients to Windows Networks.” This chapter covers the fundamentals of
installing and configuring network protocols and services in Windows XP Professional. Read Chapter 19, “Configuring TCP/IP,” for a detailed look at all the configuration options available in the Windows XP Professional implementation of
TCP/IP. Read Chapter 20, “Configuring IP Addressing and Name Resolution.” This
chapter provides detailed information about configuring IP addresses and names
and how to identify and resolve problems (available online at http://
www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prork_overview.asp).
Microsoft Corporation. “How to Troubleshoot TCP/IP Connectivity with Windows
XP.” 2004. This Knowledge Base article provides important network troubleshooting information. This article is available at http://support.microsoft.com/kb/314067.
(If the article has moved, search for the title at http://www.microsoft.com.)
Objective 6.2 Microsoft Corporation. Microsoft Windows XP Professional Resource Kit
Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 21, “Connecting
Remote Offices,” for background information about VPNs and Internet Connection
Sharing (available online at http://www.microsoft.com/resources/documentation/
Windows/XP/all/reskit/en-us/prcg_cnd_cgza.asp).
Further Reading
26-5
Microsoft Corporation. “The Cable Guy - August 2001: Layer Two Tunneling Protocol in Windows 2000.” 2001. Although this article was written for Windows 2000,
it applies to Windows XP Professional as well. This article is available at http://
www.microsoft.com/technet/community/columns/cableguy/cg0801.mspx. (If the
article has moved, search for the title at http://www.microsoft.com.)
Objective 6.3 Microsoft Corporation. Internet Explorer Administration Kit. 2004.
Read the Appendix, “Windows XP Service Pack 2 Enhancements to Internet
Explorer 6.” This appendix covers the very significant changes to Internet Explorer
that Service Pack 2 adds (available online at http://www.microsoft.com/windows/
ieak/techinfo/deploy/60/en/appendix.mspx).
Launch Internet Explorer, select the Help menu, and then select Contents And
Index. Read through all the available topics, paying particular attention to the
proxy settings, favorites, and history features.
Objective 6.4 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read “Internet Printing”
in Chapter 11, “Enabling Printing and Faxing,” for general information about how
IIS facilitates sharing printers. Read “Broadcasting Digital Media Presentations over
Your Intranet” in Chapter 10, “Managing Digital Media,” for details about how IIS
provides for streaming digital media (available online at http://
www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prork_overview.asp).
Microsoft Corporation. “Securing Internet Information Services 5.0 and 5.1.” 2004.
This white paper is available at http://www.microsoft.com/smallbusiness/gtm/
securityguidance/articles/sec_iis_5_0_5_1.mspx. (If the white paper has moved,
search for the title at http://www.microsoft.com.)
Objective 6.5 Microsoft Corporation. Microsoft Windows XP Professional Resource Kit
Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 8, “Configuring
Remote Desktop,” for detailed information about Remote Desktop. Also read
Appendix D, “Tools for Troubleshooting,” for information about remote assistance
(available online at http://www.microsoft.com/resources/documentation/Windows
/XP/all/reskit/en-us/prork_overview.asp).
Objective 6.6 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read “Internet Connection Firewalls” in Chapter 21, “Connecting Remote Offices” (available online at
http://www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prcg_cnd_cgza.asp).
26-6
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Microsoft Corporation. “Troubleshooting Windows Firewall in Microsoft Windows XP
Service Pack 2.” 2004. This white paper is available at http://www.microsoft.com/
downloads/details.aspx?FamilyID=a7628646-131d-4617-bf68-f0532d8db131.
(If
the white paper has moved, search for the title at http://www.microsoft.com.)
Tony Northrup. “Firewalls.” 2002. This white paper is available at http://
www.microsoft.com/technet/security/topics/network/firewall.mspx. (If the white
paper has moved, search for the title at http://www.microsoft.com.)
Objective 6.1
Configure and Troubleshoot the TCP/IP Protocol
26-7
Objective 6.1
Configure and Troubleshoot the
TCP/IP Protocol
For two computers to communicate, they must agree to speak a common language. On
the Internet, and most private networks, this common language is TCP/IP. Each device
on a TCP/IP network is assigned one or more unique IP addresses. You can assign IP
addresses in three ways: DHCP, Automatic Private IP Addressing (APIPA), or manually.
Both DHCP and APIPA are enabled by default.
If a computer cannot communicate with another computer on the network, you must
verify that the network adapter is installed and operational in Device Manager. Next,
verify that it is physically connected to the network. Then run protocol-specific utilities
designed to test network connections. Some of the tools for testing TCP/IP connectivity
included with Windows XP Professional are Arp.exe, Hostname.exe, Ping.exe, Pathping.exe, Tracert.exe, Netstat.exe, Route.exe, and Ipconfig.exe.
To successfully answer questions in this objective, you must know how to install, configure, manage, and troubleshoot network adapters. You also need to know how to
install, configure, manage, and troubleshoot TCP/IP connections.
26-8
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Objective 6.1 Questions
1.
Which of the following is the correct order Windows XP Professional uses for resolving
a DNS host name? Choose the correct answer.
A. (1) Check the local computer’s host name for a match. (2) Check the NetBIOS
name cache. (3) Send a WINS query if configured. (4) Send a broadcast query for
a matching NetBIOS name. (5) Check the LMHOSTS file for a match. (6) Check the
HOSTS file for a match. (7) Send a DNS query.
B. (1) Check the local computer’s host name for a match. (2) Send a DNS query. (3)
Check the HOSTS file for a match. (4) Check the NetBIOS name cache. (5) Send
a WINS query if configured. (6) Send a broadcast query for a matching NetBIOS
name. (7) Check the LMHOSTS file for a match.
C. (1) Check the local computer’s host name for a match. (2) Check the HOSTS file
for a match. (3) Send a DNS query. (4) Check the NetBIOS name cache. (5) Send
a WINS query if configured. (6) Send a broadcast query for a matching NetBIOS
name. (7) Check the LMHOSTS file for a match.
D. (1) Check the local computer’s host name for a match. (2) Check the HOSTS file
for a match. (3) Send a DNS query. (4) Check the NetBIOS name cache. (5) Check
the LMHOSTS file for a match. (6) Send a WINS query if configured. (7) Send a
broadcast query for a matching NetBIOS name.
2.
Your computer is able to connect to some network resources with no problem, but you
feel that performance is abnormally slow when connecting to some specific servers
located in remote offices. You suspect that there might be a routing issue on your network. Which tools included with Windows XP Professional are best for examining
these types of problems? Choose two correct answers.
A. Pathping.exe
B. Arp.exe
C. Tracert.exe
D. Ping.exe
E. Ipconfig.exe
3.
You are a consultant and have just started working at the office of a new client. The
company has a DHCP server on the network, so you should be able to plug your Windows XP laptop into the network and get immediate access to the Internet. You turn on
your laptop computer, connect the network cable, and log on to the desktop. You
open Microsoft Internet Explorer and receive a The Page Cannot Be Displayed Error no
matter which Web page you try to access. You open a command prompt and run
Ipconfig.exe. You notice that your computer has the IP address 169.254.0.2 and a subnet mask of 255.255.0.0. Choose the best answer.
Objective 6.1
Configure and Troubleshoot the TCP/IP Protocol
26-9
Why are you unable to browse the Web from your laptop computer? Choose the best
answer.
A. Your computer was unable to get an IP address from the DHCP server; therefore,
it used APIPA to assign an address to itself.
B. The network adapter is malfunctioning.
C. The network cable is disconnected from either your computer’s network adapter
or the network port.
D. TCP/IP is not installed on your laptop computer.
4.
Which of the following problems is resolved by clearing the ARP cache by typing the
command netsh interface ip delete arpcache? Choose the best answer.
A. Clients cannot reach a server on the local subnet that has recently had the IP
address changed.
B. Clients cannot reach a server on the local subnet that has recently had the network
card replaced.
C. Clients cannot reach a server that has recently had the DNS entry changed.
D. Clients cannot reach a server that has moved to a different network segment.
5.
You are a systems administrator at your organization’s corporate headquarters. Your
company is in the process of establishing a small remote office in another country. The
local systems administrator calls you for assistance because his Windows XP desktop
computer cannot connect to the company’s wide area network (WAN). You gather
information about the IP configuration of his network and draw the following diagram
based on the information the systems administrator provides.
IP address: 10.1.3.1
Subnet mask: 255.255.255.0
WAN
Headquarters
IP address: 10.1.4.1
Subnet mask: 255.255.255.0
IP address: 10.1.2.2
Subnet mask: 255.255.255.0
Default gateway: 10.1.3.1
What setting does the administrator need to change? Choose the best answer.
G26us01
A. Change the computer’s subnet mask to 255.0.0.0.
B. Change the computer’s default gateway to 10.1.4.1.
C. Change the computer’s IP address to 10.1.3.2.
D. Set both of the router’s IP addresses to 10.1.3.1.
26-10
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Objective 6.1 Answers
1.
Correct Answers: C
A. Incorrect: Windows XP Professional always attempts to resolve names using the
HOSTS file and DNS first. NetBIOS name resolution methods such as WINS and
the LMHOSTS file are used only as a last resort.
B. Incorrect: Windows XP Professional checks the HOSTS file for host name resolution before sending a DNS query. However, the LMHOSTS file is not checked
until after a WINS resolution request is attempted.
C. Correct: Windows XP Professional first checks the specified host name against
the local machine name. It then begins the DNS name resolution process, first
checking the HOSTS file and then sending a DNS query. Finally, the NetBIOS
name resolution process is used, which is as follows: check the NetBIOS name
cache, send a WINS query, send a broadcast query, and scan the LMHOSTS file.
D. Incorrect: A DNS query and the HOSTS file are very similar to a WINS query and
the LMHOSTS file. Windows XP standard DNS name resolution scans the HOSTS
file before sending a DNS query. However, by default, NetBIOS name resolution
scans the LMHOSTS file after sending a WINS query.
2.
Correct Answers: A and C
A. Correct: PathPing is a command-line tool for tracing routes through TCP/IP networks. It combines features of both Ping.exe and Tracert.exe and provides additional information that neither offers. It is an excellent tool for troubleshooting
routing problems.
B. Incorrect: You use the Arp tool to view, edit, and clear the Address Resolution
Protocol (ARP) cache on the local computer. Arp is used to map IP addresses to
media access control (MAC) addresses of specific network adapters on the same
network segment. It does not provide any information about routing IP traffic to
other network segments and therefore is not an appropriate tool for this scenario.
C. Correct: Tracert is a command-line, route-tracing tool that repeatedly sends Internet Control Message Protocol (ICMP) Echo Request messages with increasingly
larger time-to-live values to map out the route from the local computer to the one
specified in the command. It is an ideal tool for diagnosing routing problems.
D. Incorrect: Ping is a command-line tool for verifying IP connectivity. The Ping
tool can be used to verify that your computer can communicate with another host
on the network, but it does not provide information about the route taken across
the network and therefore is not an appropriate tool to use in this scenario.
E. Incorrect: Ipconfig is a command-line tool for reviewing the current IP addressing configuration for the local computer. It is not used for troubleshooting problems on the network.
Objective 6.1
3.
Configure and Troubleshoot the TCP/IP Protocol 26-11
Correct Answers: A
A. Correct: APIPA uses IP addresses from the range 169.254.0.1 through
169.254.255.254 and a subnet mask of 255.255.0.0, and your computer’s address
falls within that range. Your next step is to determine why your computer was
unable to get an address from the DHCP server—likely reasons for that problem
include the server being offline or the physical segment that your computer is connected to being unable to send DHCP messages to the DHCP server.
B. Incorrect: If the network adapter was not working, you would see an error message when you ran Ipconfig.exe or no information would be displayed regarding
your IP address.
C. Incorrect: If the cable was not connected properly, you would see an error message when you run Ipconfig.exe stating that the media is disconnected.
D. Incorrect: If TCP/IP were not installed correctly, you would not have had any IP
address assigned.
4.
Correct Answers: B
A. Incorrect: When Arp looks up an IP address’ associated MAC address, this relationship is stored in the ARP cache for future reference. If a server’s IP address
changes, Arp issues a new request for the MAC address. Therefore, clearing the
ARP cache does not resolve this problem.
B. Correct: Every network card includes a unique MAC address. Therefore, when a
network card is replaced on a system, that system’s MAC address also changes. If
clients attempt to reconnect to a system that has recently had the network card
replaced, they may address network communications to the cached MAC address
of the failed network card. The server does not respond to these communications
because it is listening for requests addressed to the MAC address of the new network card. Clearing the ARP cache of the clients on the same subnet resolves this
problem.
C. Incorrect: Changing a server’s DNS host name causes new communications
addressed to the previous host name to fail. However, DNS resolution does not
directly involve Arp. As a result, clearing the ARP cache does not resolve the
problem.
D. Incorrect: If a system moves between network segments, the IP address must
also change. In this scenario, the ARP cache might still contain the IP address to
MAC address mapping of the system’s previous IP address. However, the new IP
address of the server does not yet reside in the ARP cache. Therefore, clearing the
ARP cache does not resolve the problem.
26-12
5.
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Correct Answers: C
A. Incorrect: In this scenario, the computer and both of the router’s network interfaces have been configured with class A addresses. However, class A addresses
can have a subnet mask of 255.255.255.0. In fact, a subnet mask of 255.0.0.0
would be extremely unusual.
B. Incorrect: The computer’s default gateway should be set to the IP address of the
router’s local network adapter. In other words, the default gateway must be set to
the IP address that the router has been assigned on the local network. In this case,
the default gateway is correct.
C. Correct: The problem is that the computer’s IP address and the router’s local IP
address are on different logical subnets. The computer has been configured with
an IP address of 10.1.2.2, but the default gateway is 10.1.3.1. Because the default
gateway is on a different logical subnet, the computer cannot send packets to it—
even though it is on the same physical network segment. Assigning the computer
an IP address of 10.1.3.2 places it on the same logical subnet as the router’s
10.1.3.1 address, allowing it to send packets to the router.
D. Incorrect: Each network interface must have a unique IP address. Therefore, you
cannot configure two network adapters to have the same IP address.
Objective 6.2
Connect to Computers by Using Dial-Up Networking 26-13
Objective 6.2
Connect to Computers by Using
Dial-Up Networking
There are two primary ways to gain remote access to your internal network: dial-up
networking and a VPN. With dial-up networking, you connect your Windows XP computer to a telephone line and use the telephone line to connect to a remote access
server at your office. With a VPN, you connect your Windows XP computer to the
Internet and use the Internet to connect to a VPN server at your office.
ICS provides a convenient way for small business and home users to connect multiple
systems to the Internet using a single connection. ICS combines three software services: DHCP, Network Address Translation (NAT), and DNS proxy. DHCP is used to
assign private IP addresses to other computers on the local area network (LAN). NAT
translates the private IP addresses used by the internal computers into the public IP
address assigned by the ISP. DNS proxy enables systems residing on the LAN to resolve
domain names to public IP addresses.
To successfully answer questions in this objective, you must know how to create dialup and VPN connections. Additionally, you should understand how to configure and
use ICS.
26-14
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Objective 6.2 Questions
1.
Which of the following accurately describes Layer Two Tunneling Protocol (L2TP) tunneling? Choose three correct answers.
A. Supports Internet Protocol security (IPSec) authentication
B. Supports header compression
C. Automatically provides privacy using Point-to-Point Protocol (PPP) encryption
D. Supported by Microsoft Windows NT 4.0
E. Requires authentication of both the computer and the user
2.
Which of the following remote access authentication protocols does not support sending encrypted password information? Choose the correct answer.
A. PAP
B. Shiva Password Authentication Protocol (SPAP)
C. CHAP
D. MS-CHAP
E. MS-CHAP v2
3.
In which of the following scenarios does ICS enable all computers to access the Internet? Choose the correct answer.
A. A LAN with 100 computers and a routed T3 connection to the Internet. All the
computers have IP addresses assigned by the ISP.
B. A home network with four computers connected to the Internet with a cable
modem. Each of the four computers has been assigned a public IP address by the
ISP.
C. A home network with four computers connected to the Internet with a single analog dial-up connection. All the computers currently use DHCP and do not have
public IP addresses.
D. A small office network with 300 computers and a single digital subscriber line
(DSL) connection. All the computers currently use DHCP and do not have public
IP addresses.
Objective 6.2
Connect to Computers by Using Dial-Up Networking 26-15
Objective 6.2 Answers
1.
Correct Answers: A, B, and E
A. Correct: L2TP tunneling supports IPSec authentication. Point-to-Point Tunneling
Protocol (PPTP) tunneling does not support this type of authentication.
B. Correct: L2TP supports header compression, which reduces the number of bytes
consumed by the header to four. PPTP does not perform header compression, and
as a result, IP headers consume six bytes.
C. Incorrect: Only PPTP automatically provides PPP encryption. L2TP can provide
IPSec encryption.
D. Incorrect: PPTP was the only method of tunneling included with Windows NT
4.0. Windows 2000 and later versions of Windows include both PPTP and L2TP
capabilities.
E. Correct: PPTP connections require only user-level authentication. L2TP/IPSec
connections can require the same user-level authentication and, in addition, computer-level authentication through a computer certificate.
2.
Correct Answers: A
A. Correct: Password Authentication Protocol (PAP) does not support encryption.
As a result, PAP is more vulnerable to attack than other protocols and must be
used only when the remote access client does not support any other method of
authentication.
B. Incorrect: The Shiva Password Authentication Protocol (SPAP) does support
encryption. However, SPAP is not as secure as Challenge Handshake Authentication Protocol (CHAP) or Microsoft Challenge Handshake Authentication Protocol
(MS-CHAP) because it sends the password across the remote access link using
reversible encryption. Use SPAP only when it is the sole method of authentication
that the client supports.
C. Incorrect: The CHAP transmits authentication information using encrypted, oneway MD5 hashes. Using a one-way hash is more secure than using reversible
encryption because the user can be authenticated without actually sending the
password to the server.
D. Incorrect: The MS-CHAP provides encrypted authentication in a very similar
manner to CHAP. However, MS-CHAP can also use Microsoft Point-to-Point
Encryption (MPPE) to encrypt data to the client or the server.
E. Incorrect: The Microsoft Challenge Handshake Authentication Protocol version 2
(MS-CHAP v2) provides all the features of MS-CHAP, plus authentication of both
the client and server using one-way encryption. Therefore, MS-CHAP v2 provides
the highest level of security available to users of Windows XP Professional.
26-16
3.
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Correct Answers: C
A. Incorrect: The only aspect of this scenario that is not compatible with ICS is the
public IP addressing. ICS can function only when the client computers on the LAN
receive dynamically assigned IP addresses from the ICS computer. In this scenario,
each of the 100 systems can reach the Internet directly, without requiring the assistance of ICS.
B. Incorrect: ICS is intended for use with small home networks and cable modems.
However, in this scenario, the ISP is providing a block of four public IP addresses.
Each system has its own IP address, so ICS is not needed for the systems to provide access.
C. Correct: ICS is the ideal method for providing all four systems in this scenario
with Internet access. The computer that is connected to the dial-up connection
must have ICS enabled. As soon as ICS is enabled, that system’s LAN connection
is assigned the private IP address 192.168.0.1. DHCP services are automatically initiated to assign the other systems IP addresses in the range 192.168.0.2 through
192.168.0.254. The next time the client computers reboot, they retrieve a DHCPassigned IP address from the ICS system. When the ICS system connects to the
Internet, it performs NAT services to provide all systems on the network with
Internet access.
D. Incorrect: This scenario is perfect for ICS, except for one major detail: ICS can
assign IP addresses to only 253 computers. ICS is intended to be used on small
networks and is not designed to provide Internet access for larger quantities of
computers. A more robust NAT/DHCP solution is required.
Objective 6.3
Connect to Resources Using Internet Explorer 26-17
Objective 6.3
Connect to Resources Using
Internet Explorer
The World Wide Web is the most widely used aspect of the Internet. The Web consists
of Web servers, such as IIS, and Web clients, such as Internet Explorer. Windows XP
provides Internet Explorer to allow users to access Web content while minimizing risk.
After Service Pack 2 has been installed, Internet Explorer is much more resistant to
attacks from malicious Web sites.
However, the fact that Internet Explorer attempts to protect users from malicious and
annoying Web content can also cause problems. Many Web sites use Web content such
as ActiveX objects and pop-up windows that may be blocked by default. To enable
users to access these types of Web sites while minimizing their exposure to attack, you
must understand how to configure Internet Explorer. In particular, pay attention to
Internet Explorer’s privacy and security features.
26-18
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Objective 6.3 Questions
1.
You are the desktop administrator of a 30-user LAN that connects to the Internet
through a proxy server that the server management group configured. The proxy
server is a Microsoft Windows Server 2003 computer running Microsoft ISA Server
2004. The server management group needs to closely monitor and control the public
Internet sites that your users visit, so they have configured ISA Server to act as a Hypertext Transfer Protocol (HTTP) proxy for all Web requests, and they specifically do not
want users to access public Web sites by using NAT.
You are responsible for configuring the desktop computers to use the proxy server. In
addition to using the ISA server to access public Web sites, you want Internet Explorer
to bypass the proxy server for intranet Web sites on the local and wide area network.
Which of the following solutions meets your requirements? Choose the best answer.
A. Configure the ISA Server to not allow requests for sites on the local intranet.
B. In each user’s Internet Explorer Internet Options dialog box, select the Security
tab. Select the Local Intranet Web content zone and click the Sites button. In the
Local Intranet dialog box, add the URLs and IP addresses of the local intranet sites
to the Web sites list.
C. In each user’s Internet Explorer Internet Options dialog box, select the Connections tab and click the LAN Settings button. Select the Use A Proxy Server For Your
LAN check box, type the address and port number of your ISA server, and click
the Advanced button. In the Proxy Settings dialog box, add the URLs and IP
addresses of the local intranet sites to the Exceptions text box.
D. In each user’s Internet Explorer Internet Options dialog box, select the Privacy tab
and click the Edit button. In the Per Site Privacy Actions dialog box, type the URL
or the IP address of each local intranet site, and click the Block button.
2.
Which of the following types of resources can be viewed from Internet Explorer without launching a separate application? Choose three answers.
A. Web sites
B. File Transfer Protocol (FTP) sites
C. Gopher sites
D. Hypertext Markup Language (HTML) files on the local computer
E. Telnet sites
F. Tagged Image File Format (TIFF) images
Objective 6.3
3.
Connect to Resources Using Internet Explorer 26-19
As part of your effort to stay apprised of the latest security threats, you log on to a Webbased forum on the Internet that fellow systems administrators use to discuss security
topics. This forum requires you to log in. Unfortunately, it makes you log in every day,
which is not the case for most people. For other users, the forum seems to remember
their user name and password. You are using Internet Explorer on Windows XP Professional with Service Pack 2. What is the most likely cause of the problem? Choose the
best answer.
A. Internet Explorer security is configured to block cookies from the forum.
B. You have not granted appropriate file permission to allow the forum to store your
user name and password.
C. The forum is presenting an invalid SSL certificate.
D. Windows Firewall is blocking authentication requests from the Web site.
26-20
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Objective 6.3 Answers
1.
Correct Answers: C
A. Incorrect: This solution does not meet all the requirements because it does not
configure Internet Explorer to directly access the intranet systems. Instead, users
are completely unable to access local intranet sites.
B. Incorrect: This solution does not meet any of the requirements. Placing URLs
and IP addresses into the Local Intranet Web content zone increases the level of
trust granted to those sites. However, it does not configure Internet Explorer for
bypassing the proxy server for local intranet sites.
C. Correct: This solution meets your requirements. Before a request is sent to a Web
site, Internet Explorer checks the Web site’s address against the list of exceptions.
If that Web site’s name appears on the list, requests are sent directly to the site
instead of to the proxy server. To make deploying and maintaining these settings
easier across a large user base, consider automating this process using an automatic configuration script.
D. Incorrect: This solution does not meet any of the requirements. Adding the URLs
and IP addresses of the local intranet sites to this list only blocks Internet Explorer
from accepting cookies from those sites.
2.
Correct Answers: A, B, and D
A. Correct: Internet Explorer’s primary purpose is to view sites on the Internet using
HTTP.
B. Correct: Internet Explorer can be used to navigate FTP sites, view directory contents, and transfer files.
C. Incorrect: Gopher is a network protocol that was common during the early years
of the Internet. Gopher’s functionality has been replaced by HTTP. As a result,
Internet Explorer does not support the Gopher protocol.
D. Correct: Internet Explorer can be used to view HTML files on the local computer.
The easiest way to access files on the local computer is to type the file path in the
Address field. An alternative method is to choose Open from the File menu, click
the Browse button, and select the file.
E. Incorrect: Telnet is a text-based protocol used to issue commands on a remote
system. An open telnet session resembles a command prompt. Although you can
use Internet Explorer to launch a telnet session, Internet Explorer must launch a
separate application—the telnet window. To launch a telnet session from the
Internet Explorer address bar, type the address in the form telnet:// hostname.
Objective 6.3
Connect to Resources Using Internet Explorer 26-21
F. Incorrect: Internet Explorer is capable of viewing many types of images, including Graphics Interchange Format (GIF) and Joint Photographics Experts Group
(JPEG) files. However, Internet Explorer cannot natively view TIFF images. TIFF is
a common format for storing images that will be printed, but it is not common on
the Internet because of the large file size.
3.
Correct Answers: A
A. Correct: Web sites store cookies on your computer, and under normal circumstances your Web browser presents the cookie to the Web site each time you visit
it. Malicious Web sites can also abuse cookies to violate your privacy, however, so
Internet Explorer has several different settings for cookies and will reject cookies
under certain circumstances. Some of these circumstances are legitimate.
B. Incorrect: File permissions have no impact on whether a Web site will recognize
your browser. That is handled by cookies.
C. Incorrect: SSL certificates have no impact on a Web site’s ability to store your
user settings.
D. Incorrect: Authenticating to Web sites uses the same network protocols that you
use to visit the site. Therefore, if you are able to visit the site at all, Windows Firewall is not interfering with the connection.
26-22
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Objective 6.4
Configure, Manage, and
Implement Internet Information
Services (IIS)
IIS is a robust, high-performance Web server included with Windows XP Professional.
It is based on the same software included with the Windows Server 2003 family, used
to host some of the largest sites on the Internet. The version of IIS included with Windows XP Professional has been scaled down for home and small office use, however.
Understanding the features and limitations of this variety of IIS is critical for completing
this objective.
To understand IIS, you must have some understanding of the underlying protocols.
HTTP provides rich content to browsers, and is the only protocol most Internet and
intranet Web sites require. File Transfer Protocol (FTP) is often used for downloading
files, although HTTP is more common. Simple Mail Transfer Protocol (SMTP) is the
protocol used to transfer messages between post offices. IIS uses SMTP to send outgoing mail—for example, to forward the results of a form to the site administrator.
Security is a critical aspect of every Web site. To protect IIS from attack, you should
restrict NTFS file permissions, configure authentication requirements, and restrict the
types of access available to users. You can configure each of these types of protection
separately for different virtual directories. Optimally, you would follow the security
principal of least privilege and grant only the minimal access required to each virtual
directory.
Objective 6.4
Configure, Manage, and Implement Internet Information Services (IIS) 26-23
Objective 6.4 Questions
1.
By default, which TCP port is IIS is configured to use for HTTP? Choose the correct
answer.
A. 25
B. 443
C. 80
D. 21
2.
What is the maximum number of users who can connect to an IIS Web site installed on
Windows XP Professional? Choose the correct answer.
A. 1
B. 10
C. 100
D. No enforced limitation
3.
Which of the following features are available with IIS included with Windows XP Professional? Choose two correct answers.
A. ISAPI filters
B. Application recycling
C. Bandwidth throttling
D. IP address and domain name restrictions
E. Content expiration
4.
You configure IIS on your Windows XP Professional system to allow a coworker on the
Internet to view HTML files located on your computer. Windows Firewall is enabled on
your computer, and you create an exception for HTTP traffic. You create a user account
with the name Kevin for your coworker and make that account a member of your local
Users group. The Users group currently has Change NTFS permissions to the IIS home
directory and all subdirectories. On the Home Directory tab of the Web site Properties,
you enable Read access, and disable Script Source Access, Write access, and Directory
Browsing. What are Kevin’s effective permissions to the HTML files in your IIS home
directory? Choose the correct answer.
A. Read access only
B. Write access only
C. Read and write access
D. Full control
26-24
5.
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
A Windows XP Professional user is attempting to share files with other computers on
your local network. He has installed IIS, and configured IIS following some security
guidelines he read in a magazine article. Windows Firewall is enabled, but it is configured to allow IIS traffic as an exception. His computer’s IP address is 192.168.10.152.
When he tries to connect from another computer, he receives an error message indicating that the server could not be found. You examine his IIS Web site configuration,
as shown in the following figure.
You suspect that he is using the wrong URL to access the Web site. What is the correct
URL? Choose the correct answer.
G26us02
A. http://192.168.10.152/
B. ftp://192.168.10.152/
C. http://www.192.168.10.152/
D. http://192.168.10.152:81/
E. https://192.168.10.152/
Objective 6.4
Configure, Manage, and Implement Internet Information Services (IIS) 26-25
Objective 6.4 Answers
1.
Correct Answers: C
A. Incorrect: TCP port 25 is the IIS default port for SMTP. SMTP is used for transferring e-mail messages.
B. Incorrect: TCP port 443 is the IIS default port for Hypertext Transfer Protocol
Secure (HTTPS). HTTPS adds SSL encryption to the standard HTTP protocol.
C. Correct: IIS uses port 80, the Internet standard, as the default for HTTP. Web
browsers automatically connect to Web servers on port 80. Therefore, if you specify a port other than 80 for Web services, you need to specify the port number as
part of the Web site’s URL. For example, if you change the port number to port
8080, the URL for the Web site becomes http://<your URL>:8080/.
D. Incorrect: TCP port 21 is the IIS default port for FTP services. Port 21 is used only
to authenticate users and accept commands—FTP uses TCP port 20 for all file
transfers.
2.
Correct Answers: B
A. Incorrect: The version of IIS included with Windows XP Professional can support up to 10 simultaneous incoming connections.
B. Correct: IIS, when installed on Windows XP Professional, can support a maximum of 10 simultaneous users. There is no limit to the number of incoming connections that IIS can support when installed on Windows 2000 Server or the
Windows Server 2003 family.
C. Incorrect: The version of IIS included with Windows XP Professional can support up to 10 simultaneous incoming connections. To support more than 10 connections, you must upgrade to Windows 2000 Server or the Windows Server 2003
family.
D. Incorrect: The version of IIS included with Windows XP Professional can support up to 10 simultaneous incoming connections. To support more than 10 connections, you must upgrade to Windows 2000 Server or the Windows Server 2003
family.
3.
Correct Answers: A and E
A. Correct: The version of IIS included with Windows XP Professional does support
ISAPI filters. ISAPI filters process incoming requests before IIS default processing
and are capable of dramatically changing the way IIS behaves.
26-26
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
B. Incorrect: Only the Windows Server 2003 family includes application recycling
as a feature of IIS. This feature automatically restarts IIS applications and ensures
that active users do not get disconnected during this process.
C. Incorrect: Only the Windows Server 2003 and the Windows 2000 Server families
include bandwidth throttling as a feature of IIS. This feature limits the amount of
traffic that IIS can generate. It is useful for ensuring that Web services do not consume an Internet connection, thereby reducing performance for users and other
Web sites.
D. Incorrect: Only the Windows Server 2003 and the Windows 2000 Server families
include IP address and domain name restrictions. Using this capability, it is possible to allow or disallow users based on their source IP address. Alternatively, filtering can be done based on the results of a reverse DNS lookup of the source IP
address.
E. Correct: The version of IIS included with Windows XP Professional does support
content expiration. This feature improves the performance of the Web site by
instructing the client and proxy servers to cache specified content. Cached content
can be retrieved from the local system, without issuing a request to the Web
server. Content expiration must be enabled only on content that does not change
frequently, to ensure clients always retrieve an up-to-date version of the content.
4.
Correct Answers: A
A. Correct: If Kevin logs on interactively, he has Change permission to the files in
the IIS home directory. However, because Kevin can access the Web content only
using HTTP, IIS controls access and limits rights to Read access only. NTFS permissions do not override limitations enforced by IIS. Instead, effective permissions are
always equal to the lesser access allowed by IIS and NTFS. As a result, the Full
Control provided by the file permissions has no effect.
B. Incorrect: Kevin is not capable of updating files using HTTP because IIS does
not have Write access enabled.
C. Incorrect: Kevin is able to read files in the home directory because IIS has read
access enabled. However, write access is not enabled. NTFS permissions do not
override limitations enforced by IIS. Instead, effective permissions are always
equal to the lesser access allowed by IIS and NTFS. As a result, the Full Control
provided by the file permissions has no effect.
D. Incorrect: Kevin is able to read files in the home directory because IIS has read
access enabled. However, write access is not enabled. Full control also allows for
file permissions to be changed, which is never possible when access to files is
through IIS. NTFS permissions do not override limitations enforced by IIS. Instead,
effective permissions are always equal to the lesser access allowed by IIS and
NTFS. As a result, the Full Control provided by the file permissions has no effect.
Objective 6.4
5.
Configure, Manage, and Implement Internet Information Services (IIS) 26-27
Correct Answers: D
A. Incorrect: This URL would cause the Web browser to attempt to connect to the
Web site by using the default HTTP port of 80. The figure shows that IIS has been
configured to use port 81, however.
B. Incorrect: FTP is a separate protocol from HTTP. You cannot use FTP to connect
to Web sites. Instead, you must specify HTTP.
C. Incorrect: Adding www to the URL will not solve the problem. Instead, you need
to specify that the Web browser use port 81 to connect to the Web server.
D. Correct: The figure shows that the Web site has been configured to use port 81
for HTTP. This is different from the default port of 80. Therefore, you must explicitly append the port number to the URL.
E. Incorrect: HTTPS is the correct protocol to use when accessing Web sites protected by an SSL certificate. However, this Web site does not have an SSL certificate, which is evident because the SSL Port box is disabled.
26-28
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Objective 6.5
Configure, Manage, and
Troubleshoot Remote Desktop
and Remote Assistance
Remote Desktop enables users to interact with a computer across a network as if they
were sitting directly in front of it. Essentially, keyboard and mouse commands are
transmitted from the client computer across the network to the Remote Desktop server
running Windows XP Professional. The Remote Desktop server returns video and
sound to the client, recreating the experience of working directly with the remote system. A variation of the Remote Desktop is the Remote Desktop Web connection.
Installed as an option in the World Wide Web Service of IIS, the Remote Desktop Web
Connection enables users to connect to the Remote Desktop without installing the
Remote Desktop client utility.
Remote assistance leverages the abilities of the Remote Desktop to enable administrators to provide technical support to remote users. If the user has enabled remote control, the administrator can even take control of the keyboard and mouse to guide the
user through the problem. To ensure privacy, all communications are encrypted.
Objective 6.5
Configure, Manage, and Troubleshoot Remote Desktop and Remote Assistance 26-29
Objective 6.5 Questions
1.
Which of the following Remote Desktop performance options must be enabled to optimize performance across slow dial-up connections? Choose the best answer.
A. Desktop Background
B. Show Contents Of Window While Dragging
C. Menu And Window Animation
D. Themes
E. Bitmap Caching
2.
Remote Desktop Web connection requires which of the following protocols to establish a connection? Choose two correct answers.
A. HTTP (TCP port 80)
B. RDP (TCP port 3389)
C. SMTP (TCP port 25)
D. LDAP (TCP port 389)
E. POP (TCP port 110)
3.
Which of the following methods of communication can be used to send an invitation
for remote assistance? Choose two correct answers.
A. Internet Explorer
B. Internet newsgroups
C. E-mail
D. Windows Messenger
E. FTP
4.
Which user groups have permissions to connect to control the Remote Desktop of a
Windows XP Professional computer that has Remote Desktop enabled? Choose two
correct answers.
A. Administrators
B. Power Users
C. Users
D. Guests
E. Remote Desktop Users
26-30
5.
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Remote Desktop could be used for which of the following scenarios? Choose two correct answers.
A. Connecting to your Windows XP Professional computer at home to access your
personal e-mail.
B. Connecting to your Windows XP Home Edition computer at home to edit a
Microsoft Word document stored on your home computer.
C. Training a remote user by interactively walking him or her through the steps
required to perform a task on his or her Windows XP Professional computer.
D. Connecting to a computer in a remote office after hours to install the latest
updates.
E. Controlling a remote Windows XP Professional computer behind a firewall that
allows only traffic using TCP port 80.
Objective 6.5
Configure, Manage, and Troubleshoot Remote Desktop and Remote Assistance 26-31
Objective 6.5 Answers
1.
Correct Answers: E
A. Incorrect: Enabling the Desktop Background option on Remote Desktops
decreases performance because the image must be transmitted across the network
to the Remote Desktop client. Therefore, this option must not be enabled when a
slow dial-up connection is being used.
B. Incorrect: The Show Contents Of Window While Dragging option must be disabled when a slow dial-up connection is being used because it causes unnecessary traffic across the network connection.
C. Incorrect: Menu And Window Animation must be disabled when a slow dial-up
connection is being used. Although this option provides the Remote Desktop with
a richer graphical user interface, it causes unnecessary traffic to be sent across the
network.
D. Incorrect: Enabling the Themes performance option for a Remote Desktop connection causes the client to retrieve customized aspects of the user interface, such
as fonts and colors. This transfer causes less traffic than the other performance
options, but must still be disabled for best performance. Enabling the Themes
option does not automatically cause the desktop background to be transferred,
even if the background is part of the theme.
E. Correct: Enabling Bitmap Caching reduces the number of times a single image
must be sent between the Remote Desktop client and server. Therefore, enabling
this option reduces network traffic and can dramatically improve performance on
slow dial-up connections.
2.
Correct Answers: A and B
A. Correct: HTTP is the protocol used by IIS and Internet Explorer for exchanging
files. Remote Desktop Web connection uses HTTP to prompt the user to connect.
By default, HTTP uses port 80, though that can be changed. After the connection
has been established, Remote Desktop Protocol (RDP) is used exclusively.
B. Correct: RDP is used by the Remote Desktop, Remote Desktop Web connection,
and Remote Assistance for exchanging video, sound, keyboard, and mouse data.
By default, RDP uses TCP port 3389. Though you can change the TCP port used
for RDP on the Remote Desktop server computer, the Remote Desktop Web connection client must always use the default port. Remote Desktop Web connection
also requires HTTP to initiate the session from a browser.
C. Incorrect: SMTP is the protocol used to exchange messages between post
offices. Remote Desktop Web connection does not require SMTP.
26-32
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
D. Incorrect: Lightweight Directory Access Protocol (LDAP) is the protocol used by
Windows clients to communicate with the Active Directory service. Remote Desktop Web connection does not require LDAP.
E. Incorrect: Post Office Protocol (POP) is a common protocol used by e-mail clients to retrieve messages from a post office. Remote Desktop Web connection
does not require POP.
3.
Correct Answers: C and D
A. Incorrect: Invitations for remote assistance can be sent using either e-mail or
Windows Messenger. Internet Explorer cannot be used to send invitations.
B. Incorrect: Internet newsgroups are a common message-based method for seeking assistance with technical problems. However, remote assistance cannot send
an invitation to an Internet newsgroup. Invitations for remote assistance can be
sent using either e-mail or Windows Messenger.
C. Correct: When remote assistance is initiated, it prompts the novice to send an
invitation via e-mail or Windows Messenger. After the expert receives the e-mail
message, clicking the link establishes a connection to the novice’s computer. At
that point, the novice is prompted to accept the incoming connection.
D. Correct: When remote assistance is initiated, it prompts the novice to send an
invitation via e-mail or Windows Messenger. After the expert receives the real-time
message, clicking the link establishes a connection to the novice’s computer. At
that point, the novice is prompted to accept the incoming connection.
E. Incorrect: FTP is commonly used to transfer files across the Internet. However, it
cannot be used to send remote assistance invitations. Invitations for remote assistance can be sent using either e-mail or Windows Messenger.
4.
Correct Answers: A and E
A. Correct: Members of the Administrators group have permission to connect to the
Remote Desktop.
B. Incorrect: Members of the Power Users group do not have permissions to connect to the Remote Desktop unless they are also a member of the Administrators
or Remote Desktop Users groups.
C. Incorrect: Members of the Users group do not have permissions to connect to
the Remote Desktop unless they are also a member of the Administrators or
Remote Desktop Users groups.
D. Incorrect: Users authenticating with only Guest permissions do not have permissions to connect to the Remote Desktop.
E. Correct: Members of the Remote Desktop Users group have permission to connect to the Remote Desktop.
Objective 6.5
5.
Configure, Manage, and Troubleshoot Remote Desktop and Remote Assistance 26-33
Correct Answers: A and D
A. Correct: If you have enabled Remote Desktop and properly configured Windows
Firewall and any other firewalls that might be present, you can use Remote Desktop to control your home computer from your office.
B. Incorrect: Although you could use Remote Desktop to edit a document using
Word, Windows XP Home Edition does not support acting as a Remote Desktop
server.
C. Incorrect: Connecting with Remote Desktop blocks users sitting in front of the
computer from accessing the computer. Remote Assistance would be the better
choice for this scenario
D. Correct: Remote Desktop is perfect for remote administration scenarios such as
this one.
E. Incorrect: Remote Desktop Web Connection does use TCP port 80 to transfer the
ActiveX Remote Desktop Client to the client’s browser. However, Remote Desktop
Web Connection also requires the use of TCP port 3389, exactly like the standard
Remote Desktop client.
26-34
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Objective 6.6
Configure, Manage, and
Troubleshoot an Internet
Connection Firewall
Windows XP Professional is a client operating system, but it has many server capabilities. It can share folders and printers, host a Web site, and receive messages from other
computers on the network. Unfortunately, by listening for inbound connections, Windows XP is vulnerable to network attacks against those services.
Firewalls help protect against network attacks by blocking any network requests that
have not specifically been allowed. Windows XP includes a built-in firewall named
Internet Connection Firewall (ICF). Unfortunately, ICF is not enabled by default. When
you install Service Pack 2, ICF is upgraded to Windows Firewall. Windows Firewall is
enabled by default, and greatly reduces the risk of network attacks.
To successfully answer questions in this objective, you must know how to configure
both ICF and Windows Firewall. Additionally, you should understand how to configure
exceptions to selectively enable applications that must receive incoming connections.
Configure, Manage, and Troubleshoot an Internet Connection Firewall 26-35
Objective 6.6
Objective 6.6 Questions
1.
Enabling Windows Firewall can prevent which of the following types of network intrusions? Choose the best answer.
A. A hacker who exploits a vulnerability in IIS by sending malformed HTTP requests
to your publicly accessible IIS Web server
B. A hacker who initiates a distributed denial of service (DoS) intrusion to saturate
the bandwidth on your DSL connection, which is connected directly to your Windows XP computer
C. A user who opens a virus disguised as an e-mail attachment
D. A hacker who uploads a Trojan horse into a directory on an FTP server that was
accidentally started
2.
Which of the following types of information is collected in the Windows Firewall security log? Choose two correct answers.
A. Source IP address
B. Destination port
C. Source host name
D. Packet contents
E. Source user name
3.
You are a systems administrator at a small office with 10 Windows XP Professional
computers organized in a workgroup. All computers at your office have Service Pack
2 installed. Your home computer is running Windows XP Professional with Service
Pack 1 installed and is connected to the Internet with a cable modem and a static IP
address. The ISP you use at home provides no packet filtering, and you do not have
Internet Connection Firewall enabled, which allows you to use Remote Desktop to
connect directly to your home computer to check your personal e-mail.
You upgrade your home computer to Service Pack 2 for Windows XP. The next day at
work, you are unable to connect to your home computer with Remote Desktop. What
should you do to fix the problem? Choose the best answer.
A. Contact your ISP and request that they allow packets using port 3389.
B. Reselect the Allow Users To Remotely Connect To This Computer check box on
the Remote tab of the System Properties dialog.
C. Re-enable Remote Desktop.
D. Add Remote Desktop to the list of Windows Firewall exceptions.
26-36
Chapter 26
Implementing, Managing, and Troubleshooting Network Protocols and Services
Objective 6.6 Answers
1.
Correct Answers: D
A. Incorrect: Windows Firewall cannot prevent this type of intrusion because the
Web server must be able to receive HTTP requests from legitimate users on the
public Internet. Windows Firewall is capable of stopping all HTTP requests, but
cannot distinguish between legitimate and malicious requests within a single protocol.
B. Incorrect: Windows Firewall filters packets as they are processed by a Windows
XP Professional network adapter. This particular scenario saturates your bandwidth with incoming packets. The packets sent during the DoS intrusion saturate
the Internet connection before they reach hosts on the destination network. Windows Firewall can filter the packets when they reach the Windows XP Professional
system; however, it cannot stop the Internet connection from being saturated.
C. Incorrect: Windows Firewall is capable of filtering connections only where the
Windows XP Professional computer is acting as the server. When users retrieve email messages, the connection is initiated by the Windows XP Professional computer. Further, Windows Firewall is capable of filtering only an entire protocol. ICF
is incapable of differentiating between legitimate and malicious requests within a
single protocol.
D. Correct: By default, Windows Firewall filters incoming FTP requests. In this scenario, the FTP server was accidentally started. Windows Firewall is designed to
prevent this type of vulnerability. When Windows Firewall is enabled, only those
services explicitly enabled can receive traffic—even if they are accidentally
started.
2.
Correct Answers: A and B
A. Correct: The source IP address is one of the fields of data collected in the Windows Firewall security log.
B. Correct: The destination port is one of the fields of data collected in the Windows Firewall security log.
C. Incorrect: The Windows Firewall security log does not contain the source’s host
name. The source IP address is included, however, so you can perform a reverse
DNS lookup based on the source IPs in the log.
D. Incorrect: Windows Firewall security logs do not contain the data that was contained in the dropped packets. Only information contained in the header of packets is recorded.
Objective 6.6
Configure, Manage, and Troubleshoot an Internet Connection Firewall 26-37
E. Incorrect: Although some protocols do pass user name information, the Windows Firewall security log does not attempt to record this information. Indeed, in
the case of malicious intrusions, the user name information included is never
accurate.
3.
Correct Answers: D
A. Incorrect: Nothing in this scenario indicates that the ISP would start filtering. In
this case, the packet filtering is occurring on the home computer itself.
B. Incorrect: Although this check box should be selected, upgrading to Service
Pack 2 for Windows XP will not disable it.
C. Incorrect: Service Pack 2 does not disable Remote Desktop. Therefore, if it
worked previously, it would still be enabled.
D. Correct: To enable incoming Remote Desktop connections, you will have to add
Remote Desktop to the Exception tab of the Windows Firewall properties dialog
box.
27 Configuring, Managing, and
Troubleshooting Security
Computers are constantly under attack. Although Microsoft Windows XP (especially
with Service Pack 2 installed) is designed to protect against most attacks, the default
configuration might not meet your organization’s security needs. Depending on how
users make use of their computers and the confidentiality of the data on your computers, you might need to adjust the default security settings.
You will start by configuring Users and Groups for the people who will need to access
resources on each Windows XP computer. Then, you can use tools such as the Computer Management console and the Local Security Policy console to grant rights to
those users. Users who do not have accounts will have a very difficult time gaining
access to resources on your computer, which will protect you against most attacks.
Some attacks might come from users with legitimate user accounts, however. In fact,
the most damaging attacks come from people within your own organization. You can
reduce the risk of this type of attack by tightly configuring user rights. Ideally, you will
follow the principle of least privilege and assign users only the bare minimum rights
they need to do their jobs.
You might still be vulnerable to attacks from threats without valid user accounts, however. To protect against people who might physically steal a computer (especially a
laptop), use Encrypting File System (EFS). EFS encrypts files, requiring the attacker to
log on with a user account that has a private key that can decrypt the files. To protect
against malicious Web sites, you can configure Internet Explorer to prevent risky types
of communications, such as transmitting unencrypted data across the Internet or
accepting third-party cookies without privacy policies.
To complete this objective, you must understand how to install, configure, and troubleshoot all these security technologies.
Tested Skills and Suggested Practices
The skills you need to successfully master the Configuring, Managing, and Troubleshooting Security objective domain on the Installing, Configuring, and Administering
Microsoft Windows XP Professional exam include the following:
■
Configure, manage, and troubleshoot Encrypting File System (EFS).
❑
Practice 1: Encrypt and decrypt files and folders on a storage volume formatted with NTFS by using Microsoft Windows Explorer.
27-1
27-2
Chapter 27
■
■
■
Configuring, Managing, and Troubleshooting Security
❑
Practice 2: Use the command-line tool CIPHER.EXE to view the encryption
settings on some files encrypted in Practice 1. Use CIPHER.EXE to encrypt
and decrypt additional files and folders. Type cipher /? at a command
prompt to view all the command-line switches for this tool.
❑
Practice 3: Use the command-line tool EFSINFO.EXE from the Windows XP
Professional Resource Kit to view the encryption settings on some of the files
and folders used in Practices 1 and 2. Type efsinfo /? at a command prompt
to view all the command-line switches for this tool.
❑
Practice 4: Recover encrypted files from a Windows XP Professional computer
in a workgroup. If you have a domain available, perform an EFS recovery by
using the domain administrator account.
Configure, manage, and troubleshoot a security configuration and local security
policy.
❑
Practice 1: Open the Local Security Policy console and expand the Local Policies folder. Select the Audit Policy folder and review each of the settings
available. Select the Security Options folder and examine all the settings.
❑
Practice 2: Open the Local Security Policy console and expand the Account
Policies folder. Select and configure settings available under both the Password Policy and Account Lockout Policy folders.
❑
Practice 3: Open the Local Security Policy console snap-in and expand the
Software Restriction Policies folder. Right-click the Software Restriction Policies folder and click Create New Policies from the context menu. Configure a
new policy so that Notepad.exe is restricted from execution. Verify that you
can no longer launch Notepad from the Start menu. Carefully review all the
other options available under the Software Restriction Policies folder.
Configure, manage, and troubleshoot local user and group accounts.
❑
Practice 1: Open the Computer Management console and expand the Local
Users and Groups node. Create several test accounts and groups, and then
make some of the accounts members of some of the groups.
❑
Practice 2: Use the Local Security Policy console to enable success and failure
auditing for the Audit Logon Events policy.
❑
Practice 3: Log off Windows XP, and then attempt to log on with an incorrect
password. Afterwards, log back onto Windows XP, and open Event Viewer.
Click the Security node, and examine the events that were generated during
your successful and unsuccessful logon attempts.
Configure, manage, and troubleshoot Internet Explorer security settings.
❑
Practice 1: Launch Internet Explorer and visit some Web sites that include
active content. Open the Internet Options dialog box from the Tools menu in
Further Reading
27-3
Internet Explorer. Click the Security tab, click the Internet zone, and then
click the Custom Level button. On the Security Settings dialog box, set the
Reset To list to High and click the Reset button. Click Yes when prompted.
Restart Internet Explorer and revisit the same Web sites. What happens?
Restore the security settings in Internet Explorer to their defaults. Note that
you can add specific sites to the predefined site collections: Internet, Local
Intranet, Trusted Sites, and Restricted Sites. You can also customize the security settings for each of these collections.
❑
Practice 2: Launch Internet Explorer. Open the Internet Options dialog box
from the Tools menu and click the Privacy tab to review the options for customizing how Internet Explorer handles cookies.
❑
Practice 3: Launch Internet Explorer, and then open the Internet Options dialog box from the Tools menu and click the Content tab. Click the Certificates
button to open the Certificates dialog box. View all the tabs available in this
dialog box. With a certificate selected, click the Advanced button to examine
the purpose of the certificate. Close this dialog box and click the View button
to examine the certificate itself.
❑
Practice 4: Launch Internet Explorer, and then open the Internet Options dialog box from the Tools menu and click the Advanced tab. Scroll to the bottom
of the list to examine the additional security settings that can be configured
for Internet Explorer, such as enabling or disabling Secure Sockets Layer (SSL)
2 and SSL 3.
Further Reading
This section lists supplemental readings by objective. We recommend that you study
these sources thoroughly before taking exam 70-270.
Objective 7.1 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 17,
“Encrypting File System.” This chapter takes a close look at how to implement and
resolve common problems with EFS (available online at http://
www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en-us/
prnb_efs_qutx.asp).
Microsoft Corporation. “Protecting Data by Using EFS to Encrypt Hard Drives.”
2004. This article is available at http://www.microsoft.com/smallbusiness/gtm/
securityguidance/articles/protect_data_efs.mspx. (If the article has moved, search
for the title at http://www.microsoft.com.)
Objective 7.2 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 13, “File
Systems,” focusing on the sections that discuss NTFS. Read Chapter 15, “Logon
27-4
Chapter 27
Configuring, Managing, and Troubleshooting Security
and Authentication,” for information about configuring account policies and other
security settings relating to user authentication. Review Chapter 16, “Authorization
and Access Control,” and Appendix B, “User Rights.” Chapter 16 explains how
objects in Windows XP have ACLs, and how to use the permissions available with
different types of objects to secure them from unauthorized access. Appendix B
defines all the user rights available under Windows XP Professional (available
online at http://www.microsoft.com/resources/documentation/Windows/XP/all/
reskit/en-us/prork_overview.asp).
Objective 7.3 Microsoft Corporation. Microsoft Windows XP Professional Resource
Kit Documentation. Redmond, WA: Microsoft Press, 2001. Read Chapter 15,
“Logon and Authentication,” for information about creating and managing user
accounts and groups. Review Chapter 16, “Authorization and Access Control.” This
chapter explains how to configure and troubleshoot permissions on objects in
Windows XP Professional (available online at http://www.microsoft.com/resources/
documentation/Windows/XP/all/reskit/en-us/prork_overview.asp).
Microsoft Corporation. “Windows XP Security Guide.” 2004. Read Chapters 3, 4, 5,
and 6 for detailed information about Windows XP Professional security settings.
Then, read Appendix A for information about new security settings included
in Service Pack 2. This documentation is available at http://www.microsoft.com/
technet/security/prodtech/winclnt/secwinxp/. (If the documentation has moved,
search for the title at http://www.microsoft.com.)
Objective 7.4 Launch Internet Explorer, click the Help menu, and then click Contents and Index. Read all the articles and related topics under the headings “Sending Information over the Internet” and “Understanding Security and Privacy on the
Internet.”
Microsoft Corporation. “Windows XP Service Pack 2: What’s New for Internet
Explorer and Outlook Express.” 2004. This article is available at http://
www.microsoft.com/windowsxp/sp2/ieoeoverview.mspx. (If the article has moved,
search for the title at http://www.microsoft.com.)
Objective 7.1
Configure, Manage, and Troubleshoot Encrypting File System (EFS)
27-5
Objective 7.1
Configure, Manage, and
Troubleshoot Encrypting File
System (EFS)
Security experts say, “If an attacker can touch your computer, it is not your computer
anymore.” The rationale behind this is that an attacker with physical access to your
computer can bypass your operating system’s security measures. For example, an
attacker could start your computer with a bootable CD and access your files directly
from the hard disk, regardless of how you had configured file permissions.
EFS can protect your files from this type of attack. EFS encrypts files on your hard disk,
and they can be decrypted only with your private key. The operating system protects
your private key, making it very difficult for an attacker to access your files with a bootable CD. To effectively use EFS, you must understand how to configure, manage, and
troubleshoot EFS. Troubleshooting is particularly important because EFS problems
often result in users not being able to access their most important files.
27-6
Chapter 27
Configuring, Managing, and Troubleshooting Security
Objective 7.1 Questions
1.
You are the administrator for a network of computers running Windows XP Professional. You want to write a script and schedule it to run once on each system. The
script encrypts each user’s My Documents folder using EFS. What tool must you call
from the script to encrypt the desired folder? Choose the correct answer.
A. Windows Explorer
B. Efsinfo
C. Syskey
D. Cipher
2.
You are the administrator of an Active Directory directory service domain with 50 Windows XP Professional desktop computers. All users have their own home folder on a
file server in which they save their documents. John leaves the company, and his manager, April, asks you to move John’s documents to her home folder. You log on to the
network with your account that belongs to the Domain Admins group and move the
files. When April tries to open the files, she sees an Access Denied error message. How
can you give April access to the encrypted files? Choose the best answer.
A. Grant April the Full Control NTFS permission.
B. Log on by using the domain Administrator account and recover the files.
C. Log on as a local administrator and recover the files.
D. Restore the files from the most recent backup tape.
3.
Which of the following file systems supports EFS? Choose the correct answer.
A. FAT (also known as FAT 16)
B. FAT32
C. CDFS
D. NTFS
4.
You are a desktop systems engineer at the Graphic Design Institute. At a recent board
meeting your CEO had a conversation with a board member who had his laptop stolen
at the airport while on the way to the meeting. Although the board member was not
concerned about the cost of replacing the laptop hardware, she was extremely concerned about the confidentiality of the documents stored on her laptop. Your CEO asks
you how to best protect the confidentiality of the files in his My Documents\Confidential\ folder in the event his laptop is stolen, while minimizing any negative performance impacts. What do you recommend that he do? Choose the best answer.
Objective 7.1
Configure, Manage, and Troubleshoot Encrypting File System (EFS)
27-7
A. In Windows Explorer, right-click the Confidential folder and click Properties. Click
the Advanced button and select the Compress Contents To Save Disk Space checkbox.
B. In Windows Explorer, right-click the Confidential folder and click Properties.
Then, click the Security tab. Remove all user accounts from the Group Or User
Names List. Then, add the CEO’s user account to the list and grant the account Full
Control permissions.
C. In Windows Explorer, right-click the Confidential folder and click Properties.
Then, click the Advanced button and select the Encrypt Contents To Secure Data
check box.
D. In Windows Explorer, select the Confidential folder and then press Ctrl+A to select
all files in the folder. Right-click the selected files and then click Properties. Then,
click the Advanced button and select the Encrypt Contents To Secure Data check
box.
27-8
Chapter 27
Configuring, Managing, and Troubleshooting Security
Objective 7.1 Answers
1.
Correct Answers: D
A. Incorrect: Although you can use Windows Explorer to manually encrypt files
and folders, it is a graphical tool that cannot be easily incorporated into a script.
B. Incorrect: Efsinfo (EFSINFO.EXE) is a command-line tool that displays information about encrypted files and folders—you cannot use it to encrypt or decrypt
files or folders.
C. Incorrect: Syskey (SYSKEY.EXE) is the graphical Startup Key tool for encrypting
sensitive operating system files—it cannot be used to encrypt user’s data files.
D. Correct: Cipher (CIPHER.EXE) is a command-line tool for creating file encryption
keys, viewing encryption settings, encrypting files and folders, and decrypting files
and folders. It is the best tool to use in a script for encrypting files and folders.
2.
Correct Answers: B
A. Incorrect: Encryption is separate from NTFS permissions. As a member of the
Domain Admins group, you can modify the permissions on Jim’s documents, but
giving April Full Control will still not enable her to decrypt the files because she is
not a recovery agent.
B. Correct: Windows XP Professional computers that are members of an Active
Directory domain automatically specify the domain administrator account
(domain_name\Administrator) as EFS recovery agents because those accounts are
designated as encryption recovery agents in the Default Domain Policy Group Policy Object (GPO).
C. Incorrect: When a Windows XP Professional computer joins an Active Directory
domain, the domain administrator account (domain_name\Administrator)
becomes the default recovery agent. Whether the computer is a stand-alone system or a member of an Active Directory domain, the local Administrator account
is never automatically made a recovery agent. Note that there is an alternative
solution to this situation: If John’s domain account has not been deleted yet, you
can reset the password for that account and then log on with her account and
decrypt the files.
D. Incorrect: Files encrypted via EFS remain encrypted when backed up to tape—
the restored files are still encrypted and inaccessible to April.
Objective 7.1
3.
Configure, Manage, and Troubleshoot Encrypting File System (EFS)
27-9
Correct Answers: D
A. Incorrect: Neither FAT nor FAT32 supports EFS. Only NTFS supports EFS.
B. Incorrect: FAT32 does not support EFS. Only NTFS supports EFS. As a result,
operating systems that do not support NTFS, such as Windows 98 and Windows
ME, cannot use EFS.
C. Incorrect: CDFS is the file system used for CD-ROM media. You cannot use EFS
on CD-ROM drives.
D. Correct: NTFS is the only file system that supports EFS.
4.
Correct Answers: C
A. Incorrect: Although compression and encryption can be combined, compressing
files does nothing to improve confidentiality.
B. Incorrect: Creating restrictive file permissions does improve the security of files
when a user is logged on. However, file permissions are not sufficient to deter an
attacker with physical access to the system. An attacker who can access the computer’s hard disk can bypass file security. Encryption is the best way to deter
attackers with physical access to a computer.
C. Correct: Choosing to encrypt the contents of a folder enables EFS. All files and
subfolders can be automatically encrypted, and new files and subfolders will be
automatically encrypted. Because the files are encrypted, the security cannot be
bypassed as easily as file security.
D. Incorrect: Although encrypting existing files and folders would make it much
more difficult for a thief to gain access to those files, new files would not be
encrypted because the parent folder properties were not modified.
27-10
Chapter 27
Configuring, Managing, and Troubleshooting Security
Objective 7.2
Configure, Manage, and
Troubleshoot a Security
Configuration and Local
Security Policy
You can greatly reduce the risk of your computer being compromised by carefully configuring security settings. To simplify this configuration task, Windows XP uses local
security policy, which you can configure by using the Local Security Policy tool in
Administrative Tools. The Local Security Policy tool provides access to a wide variety of
security settings, including password policies, audit policies, user rights assignments,
and software restrictions.
Configuring multiple computers in a network can be difficult. The simplest way to control the security configuration of multiple Windows XP Professional computers is to
join them to a domain, and configure domain GPOs. If you do not have a domain, you
can create security templates, and apply the security template to each of your computers. Windows XP even includes default security templates that might meet your needs.
To configure, manage, and troubleshoot security configuration, you should understand
how to use the different settings available in local security policy. You should also
understand how to use security templates and how domain GPOs might override your
local security policy settings.
Objective 7.2
Configure, Manage, and Troubleshoot a Security Configuration and Local Security Policy 27-11
Objective 7.2 Questions
1.
Jim and Lisa share the same desktop computer running Windows XP Professional.
They log on to the system with their own local accounts that are members of the local
Users group. While trying to tighten security on the computer, Jim resets the permissions on many of the files and folders located on the local hard drive. Both Jim and Lisa
can still log on to the system, but they cannot launch some programs that they were
using previously, such as Microsoft Word and Microsoft Outlook. You want to use
auditing to locate the files and folders that have their permissions set too restrictively.
What do you do? Choose two correct answers.
A. Configure auditing in Event Viewer.
B. Open the Local Security Policy console and enable Failure auditing for the Audit
Object Access setting.
C. Open the Local Security Policy console and configure Software Restriction policies
on the programs that Jim and Lisa need to use.
D. Load the Security Configuration And Analysis snap-in, import the HISECWS.INF
security template, and analyze the computer.
E. Use Windows Explorer to configure failure auditing for the desired groups or
accounts on the files and folders you believe Jim might have configured incorrectly.
2.
You manage a handful of Windows XP Professional computers in a workgroup environment. You want to specify how many failed logon attempts are allowed before an
account is locked out and how long before the account is automatically reset. How can
you do this? Choose the best answer.
A. Open the Local Security Policy console, expand the Account Settings folder, select
the Account Lockout Policy folder, and configure the appropriate settings located
there.
B. Open the Local Users And Groups snap-in located in the Computer Management
console by launching Control Panel, clicking Performance And Maintenance, and
then clicking Administrative Tools.
C. Launch Control Panel and click User Accounts.
D. Launch Control Panel, click Accessibility Options, click Accessibility Options again,
and click the General tab when the Accessibility Options program window appears.
3.
Your company’s legal department has decided that all corporate computer systems
must display a brief message when users log on to the computers interactively. You are
responsible for a half-dozen Windows XP Professional computers that are set up as a
workgroup separate from the company’s Active Directory domain. A member of the
legal department provides you with the text that she wants displayed on these systems.
How do you configure them? Choose the correct answer.
27-12
Chapter 27
Configuring, Managing, and Troubleshooting Security
A. Open the Services And Applications group from the Computer Management console, expand the Services folder, scroll down the list, and double-click the Workstation service. Configure the startup parameters for the Workstation service to
display the message text.
B. Launch Control Panel, click Appearance And Themes, click Display, and click the
Settings tab.
C. Open the Local Security Policy console, expand the Local Policies folder, and then
select the Security Options folder. Scroll down the list of policies and double-click
Interactive Logon: Message Text For Users Attempting To Log On and type the
desired text.
D. Open Notepad, copy the text message into the document, and then save the document as a file called LOGON.TXT into the %systemroot% folder.
4.
Which of the following tools cannot be used to apply the settings in a security template
to a computer? Choose all that apply.
A. The Resultant Set Of Policy snap-in
B. The Secedit command-line tool
C. The Security Templates snap-in
D. The Security Configuration And Analysis snap-in
E. The Local Security Policy console
5.
You are a consultant setting up four new desktop computers for a dental office on its
local area network that is set up as a workgroup. The computers all have Windows XP
Professional preinstalled. You want to design a secure configuration and apply it to all
four computers. What is the most efficient and effective way to accomplish this goal?
Choose the best answer.
A. Open the Local Security Policy console and configure the desired settings on each
of the computers. Next, open Windows Explorer and configure the desired permissions on each folder.
B. Write a script in VBScript that makes all the desired changes; copy and run the
script on each of the four computers.
C. Use the System program located in Control Panel to configure the desired settings
on one computer, and then export the settings to a text file and import them into
each of the other computers using the System program.
D. Open the Security Templates snap-in and create a new security template with the
desired settings on one of the computers. Save the template and copy it to each of
the other computers. Open the Security Configuration And Analysis snap-in,
import the template, and then apply the template on each computer.
Objective 7.2
Configure, Manage, and Troubleshoot a Security Configuration and Local Security Policy 27-13
Objective 7.2 Answers
1.
Correct Answers: B and E
A. Incorrect: Although you use Event Viewer to view the Security log, you cannot
configure auditing settings here.
B. Correct: This is one of the two steps you must perform to enable failure auditing
for specific files and folders. In this scenario, this setting is stored in the LGPO; it
can also be configured in a Windows 2000 domain environment by using Active
Directory-based GPOs.
C. Incorrect: The problems described in this scenario were caused by improperly
set NTFS permissions—configuring Software Restriction policies does not correct
them.
D. Incorrect: You can use this snap-in to compare the current NTFS permissions
with those contained in a security template, but the HISECWS.INF security template does not include any NTFS permissions settings. Also, the scenario states that
you want to configure auditing, which you cannot accomplish by analyzing the
computer.
E. Correct: This is the second step you must perform to enable failure auditing for
specific files and folders. When this step is combined with setting auditing policy,
an event is written to the local Security log each time an account attempts an
unauthorized access on an audited object.
2.
Correct Answers: A
A. Correct: The Local Security Policy console contains the Security Settings extension of the LGPO. You configure settings for stand-alone and workgroup computers using this console; the settings made apply to the local computer, therefore
you must log on to each targeted computer to make the settings.
B. Incorrect: You can add and remove users and groups, set properties for users
and groups, and reset passwords for users using the Local Users and Groups snapin, but you cannot configure account lockout policies with this tool.
C. Incorrect: The User Accounts program located in Control Panel includes some of
the features available through the Local Users And Groups snap-in, but you cannot
use it to configure account lockout policies.
D. Incorrect: The Accessibility Options program is for configuring Windows XP for
people with disabilities; it is not used for configuring account lockout policies.
27-14
3.
Chapter 27
Configuring, Managing, and Troubleshooting Security
Correct Answers: C
A. Incorrect: The startup parameters field is located on the General tab in the Properties dialog box for each service. The parameters in this field are included in the
command that launches the service when the service is started from this dialog
box; there are no command-line parameters for configuring the logon message
text.
B. Incorrect: The Display program is used for configuring desktop appearance,
screen saver options, display resolution, color depth, and other display-related
options; you cannot configure a logon message from this tool.
C. Correct: This is how you configure this setting on stand-alone and workgroup
computers. There is a second setting usually configured with this one called Interactive Logon: Message Title For Users Attempting To Log On that is displayed in
the title bar for the dialog box displaying the logon message. When you are configuring this setting on large numbers of Windows XP Professional computers, it is
more efficient to apply this setting via a domain-based GPO.
D. Incorrect: Windows XP Professional does not use a text file to determine
whether it should display a text message when users attempt to log on interactively, nor does Windows XP store a logon message in a text file.
4.
Correct Answers: A and C
A. Correct: The Resultant Set Of Policy snap-in is a very useful tool for determining
what a computer’s effective security settings will be when security settings are
defined by multiple layers of policy, such as both GPOs and local security policy.
However, you cannot change a computer’s configuration settings by using this
tool.
B. Incorrect: You can use the Secedit command-line tool to apply a security template to a computer by using the /configure parameter.
C. Correct: You can use the Security Templates snap-in to create and edit security
templates. However, it cannot be used to apply a security template to a computer.
D. Incorrect: You can use the Security Configuration And Analysis snap-in to apply
a security template by first importing the security template into a database, rightclicking Security Configuration And Analysis, and then clicking Configure Computer Now.
E. Incorrect: You can use the Local Security Policy console to apply a security template to a computer by right-clicking Security Settings and then clicking Import
Policy.
Objective 7.2
5.
Configure, Manage, and Troubleshoot a Security Configuration and Local Security Policy 27-15
Correct Answers: D
A. Incorrect: Although this approach will get security configured on each of the
computers, it is a time-consuming and error-prone approach. It is unlikely that all
four computers will have the same settings when the process is completed.
B. Incorrect: This approach will result in a consistent security configuration across
all four computers but writing and debugging a complex script will take a great
deal of time.
C. Incorrect: The System program is not used for configuring security settings.
D. Correct: For computers that are not members of an Active Directory domain, this
is the best way to apply consistent computer settings across multiple computers.
27-16
Chapter 27
Configuring, Managing, and Troubleshooting Security
Objective 7.3
Configure, Manage, and
Troubleshoot Local User and
Group Accounts
Windows XP stores a list of users that can be assigned rights to access resources in a
local user database. To make it easier to assign rights, you can place those users into
groups and assign the rights to these groups.
User management is a complex topic, however. First, you need to be able to keep track
of who has accessed, or attempted to access, your computers. To enable this, Windows
XP provides auditing. Second, you must be able to control what users can do on your
computer because not all users should have the same rights. To enable you to configure user rights, Windows XP provides account settings, account policies, and user and
group rights.
To configure, manage, and troubleshoot local user and group accounts, you must
understand how to use the Computer Management console to manage accounts. You
must also understand how to use the Local Security Policy console to configure user
privileges. Finally, make sure that you understand how to assign users and groups
rights to access resources such as files, printers, and the Registry.
Objective 7.3
Configure, Manage, and Troubleshoot Local User and Group Accounts 27-17
Objective 7.3 Questions
1.
You are a network administrator for a manufacturing company. You have been told to
remove Richard and Anthony from the Accounting1 group, which has access to the Overdue shared folder. You notice that Richard and Anthony are the only members of the
Accounting1 group, so you remove their accounts from the group and then delete the
group. Several weeks later, you are told that Richard once again needs access to the Overdue folder. What steps can you take to restore his access? Choose two correct answers.
A. Re-create Richard’s user account.
B. Re-create the Accounting1 group and add Richard’s account to it.
C. Give Richard’s user account the user right Create Permanent Shared Objects.
D. Re-create the Accounting1 group.
E. Grant the Accounting1 group the proper permissions to the Overdue shared folder.
2.
You work for a small law firm. Dave, Jenny, and Joe are attorneys at the same firm who
have been assigned a laptop computer to share. The laptop is delivered with Windows
XP Professional and Office 2003 Professional preinstalled. You install the remaining
applications that your firm uses, but you want to make sure that Dave, Jenny, and Joe
have their data and user preferences stored and maintained separately from one
another. What do you do? Choose the best answer.
A. Run the Sysprep tool.
B. Manually create a new local user profile for each attorney.
C. Create separate hardware profiles for each attorney.
D. Create local user accounts for each attorney.
3.
You work at a small law office that upgraded its network to an Active Directory–based
domain. All user accounts and computers have been migrated to the domain. An attorney named Dave recently left the company and is being replaced by a temporary attorney named Scott. What is the easiest way to give Scott the exact same access to the
network that Dave had? Choose the best answer
A. Rename Dave’s account to Scott and reset the password.
B. Create a new user account called Scott and then copy the Dave user profile to
Scott’s account.
C. Create a new account for Scott and manually grant it access to all the resources
that Dave’s account had access to. Delete Dave’s account.
D. Create a new account for Scott and manually grant it access to all the resources
that Dave’s account had access to. Disable Dave’s account.
27-18
4.
Chapter 27
Configuring, Managing, and Troubleshooting Security
You recently took a position as desktop systems engineer at The Phone Company. The
Phone Company currently has about 500 Windows XP Professional desktop computers
and a single Windows Server 2003 Active Directory domain. During a meeting with
members of the Human Resources team to discuss its IT needs, the members mention
that they employ a large staff of temporary employees. They emphasize that it is critical
that those users cannot log on to their computers after their accounts have been
removed. You want to ensure that no user can log on unless the domain controller is
available and authenticates the user. What is the best way to accomplish this? Choose
the best answer.
A. In the Local Security Policy console, set the Log On Locally security policy to only
Authenticated Users.
B. In the Local Security Policy console, disable the Interactive Logon: Do Not Require
CTRL+ALT+DEL security policy.
C. In the Local Security Policy console, enable the Interactive Logon: Require
Domain Controller Authentication To Unlock Workstation security policy.
D. In the Local Security Policy console, set the Interactive Logon: Number Of Previous Logons To Cache security policy to 0.
5.
Bob is a Web developer in your organization. He has installed Internet Information Services (IIS) on his Windows XP Professional computer for testing and development purposes. He is writing a Web application that will access files stored on Windows Server
2003 computers and he wants the IIS service on his computer to be able to access
those other systems across the network. He asks you to create an account in the
domain called BobIIS. He adds the account to the local Power Users group and then
configures the World Wide Web Publishing service to start with the new domain
account. However, when he tries to start the service, he receives a logon failure message. When he reboots the computer, the service still fails to start. What do you do?
Choose the best answer.
A. Add the domain account to the local Administrators group.
B. Open the Local Security Policy console, expand the Local Policies folder, select the
User Rights Assignment folder, and scroll down the list of user rights until you see
Log On As A Service. Double-click Log On As A Service and add the new domain
account to the list of accounts that have this user right.
C. Configure the IIS Admin service’s startup so that it runs under the BobIIS domain
account as well.
D. Open the Local Security Policy console, expand the Local Policies folder, select the
User Rights Assignment folder, and scroll down the list of user rights until you see
Log On Locally. Double-click Log On Locally and add the new domain account to
the list of accounts that have this user right.
Objective 7.3
Configure, Manage, and Troubleshoot Local User and Group Accounts 27-19
Objective 7.3 Answers
1.
Correct Answers: B and E
A. Incorrect: There is no need to re-create Richard’s account because it has not
been deleted.
B. Correct: Merely creating a group and calling it Accounting1 does not restore its
members and permissions. You must manually add the members that need to
belong to it and explicitly grant permissions to the resources it must be able to
access.
C. Incorrect: User accounts do not require this user right to access resources shared
over the network.
D. Incorrect: This answer is incorrect for the reasons noted in answer B.
E. Correct: This answer is correct for the same reasons noted in answer B.
2.
Correct Answers: D
A. Incorrect: The Sysprep tool is used for creating installation images of Windows
XP Professional that include other applications such as Office 2003; it is not used
for creating user accounts or user profiles.
B. Incorrect: It is not necessary to manually create local user profiles for the reasons explained in answer D.
C. Incorrect: Hardware profiles are used when computers are regularly moved
between markedly distinct hardware environments, for example, docked and
undocked profiles for a laptop computer. Hardware profiles have nothing to do
with individual user data or settings, so creating unique hardware profiles does
not address the requirements outlined in the question.
D. Correct: When the users log on to the computer for the first time, a new user
profile is created for them under the Documents And Settings folder located on the
system volume. The profile automatically retains their user settings, and a folder
called My Documents is created within their profile. Most Windows-compatible
programs automatically try to store documents at this location.
3.
Correct Answers: A
A. Correct: Each user account has a unique Security Identifier (SID). The SID is
granted access to resources but is typically represented by the friendlier user name
for the account. Changing the account name does not change the SID, so Scott will
have access to everything that Dave had access to. Changing the password
ensures that Dave can longer connect to the network with that account.
27-20
Chapter 27
Configuring, Managing, and Troubleshooting Security
B. Incorrect: This procedure would ensure that Scott’s profile settings match
Dave’s, but Scott’s account would not have access to shared folders and printers,
NTFS files and folders, and other resources that Dave’s account had access to.
Also, if Dave were still able to connect to the network, perhaps via a dial-up or virtual private network (VPN) connection, he would still be able to gain access to
data on the network—this is a significant security risk.
C. Incorrect: These procedures would accomplish the desired goals, but there is a
much simpler way to give Scott the appropriate access to resources on the network.
D. Incorrect: These procedures would accomplish the desired goals, but there is a
much simpler way to give Scott the appropriate access to resources on the network.
4.
Correct Answers: D
A. Incorrect: This security setting would not prevent users from logging on if they
previously had logged on to the computer, had their domain account removed,
and disconnected the computer from the network. In this scenario, the user could
authenticate by using locally cached credentials.
B. Incorrect: Requiring users to press Ctrl+Alt+Del does improve the security of the
system, but it might still allow users to log on without being authenticated by a
domain controller if that domain controller is unavailable.
C. Incorrect: The Interactive Logon: Require Domain Controller To Unlock Workstation security policy causes Windows XP to reauthenticate a user with a domain
controller when he unlocks the workstation. The primary purpose of this security
setting is to prevent an attacker from guessing a user’s password when the workstation has been locked by a screen saver. When this setting is disabled, authentication attempts made at a locked workstation do not count against failed logon
attempts. Although enabling this security policy is an important security best practice, it does not accomplish the goal outlined in this scenario.
D. Correct: Setting this security policy to 0 means that no user can log on unless a
domain controller is available to authenticate the user.
5.
Correct Answers: B
A. Incorrect: Although adding the account to that group ensures that it has access
to all the local files, folders, and other resources that it might need, it probably
already had sufficient access because it was added to the Power Users group. This
step is unlikely to resolve the problem.
B. Correct: Services that run on Windows XP must run in the context of accounts
that have the user right called Log On As A Service. The account must also have
access to files, folders, and other resources utilized by that service.
Objective 7.3
Configure, Manage, and Troubleshoot Local User and Group Accounts 27-21
C. Incorrect: These procedures do not resolve the problem; the account used to
launch the IIS Admin service will not impact the behavior of the World Wide Web
Publishing service. You will also see the same logon failure for this service when
you try to start it.
D. Incorrect: This user right is required for any accounts that will log on to the system interactively. It is also needed for any users, including the built-in account for
anonymous Web access, that will access any Web sites running on the computer.
The Log On Locally user right is not needed for the account used to launch services, though, so this procedure will not resolve the problem.
27-22
Chapter 27
Configuring, Managing, and Troubleshooting Security
Objective 7.4
Configure, Manage, and
Troubleshoot Internet Explorer
Security Settings
When Web browsers were new, they were simple tools for displaying HTML files. As
time went on, Web browsers gained more and more functionality. Today, Internet
Explorer is an extremely complex tool that requires a great deal of knowledge to configure, manage, and troubleshoot.
Especially after installing Service Pack 2 for Windows XP, you must have a detailed
understanding of Internet Explorer security settings. If security settings are too restrictive, users cannot access Web sites that they need for their jobs. If security settings are
too permissive, malicious Web sites will install spyware or other types of malicious
software on the computers you manage. To successfully maintain Internet Explorer,
you must understand not only how to configure, manage, and troubleshoot it, but also
how to protect it from malicious Web content.
Objective 7.4
Configure, Manage, and Troubleshoot Internet Explorer Security Settings 27-23
Objective 7.4 Questions
1.
By default, which of the following Web content zones prompts the user to download
an unsigned ActiveX control? Choose the correct answer.
A. Internet
B. Local Intranet
C. Trusted Sites
D. Restricted Sites
2.
You work for Humongous Insurance, a company that has a strong partnership with
Contoso Pharmaceuticals. Users on your network can access some Web servers on
Contoso’s intranet via a VPN connection that travels across the network. For an added
level of security, the administrators of Contoso’s network require HTTPS for all connections to its intranet Web servers. These servers use SSL certificates issued from Contoso’s own certificate authority (CA). Every time users on your network visit one of the
Web servers on Contoso’s intranet, they receive an error message stating that the SSL
certificate was not issued from a trusted root CA. What is the easiest way to allow users
on your network to access Web servers on Contoso’s intranet without having to view
these error messages? Choose the best answer.
A. Ask an administrator from Contoso to provide you with a copy of the issuing certificate from its root CA. Use the Internet Options program located in Control
Panel to import the certificate as a trusted root authority on each computer used
for visiting the Contoso intranet.
B. Ask an administrator from Contoso to send the issuing certificate from its CA to
Microsoft so it can be incorporated into the next service pack for Windows XP.
C. Instruct the administrators at Contoso to purchase a new certificate from an existing trusted root CA, and then rebuild its internal CA using the new certificate for
the first server.
D. Use the Registry Editor tool (REGEDT32.EXE) to manually add Contoso’s issuing
certificate to the list of trusted root CAs on each computer that visits the Contoso
intranet.
3.
You regularly visit a hardware vendor’s Web site to order computers, computer parts,
and network equipment online. You have been satisfied with this arrangement for
many months until the vendor introduces a revamped Web site that uses ActiveX controls to present its catalog, inventory, account information, past orders, and pending
orders. When you visit the overhauled Web site, you can see many text and graphic
elements, but large sections appear to be blank. When you click some links, more
27-24
Chapter 27
Configuring, Managing, and Troubleshooting Security
pages with blank sections appear. What is the easiest way to allow yourself to access
all the functionality on the vendor’s new Web site? Choose the best answer.
A. Contact the vendor and explain that its Web site is down.
B. Ask the vendor to e-mail the ActiveX controls to you so you can manually install
them on your computer.
C. Add the vendor’s URL to the list of Trusted sites by using the Security tab in the
Internet Options program located in Control Panel.
D. Ask the vendor to provide you with a link to its old Web site.
4.
In response to an increased number of attackers using malicious Web sites to attack visitors’ browsers, you have hardened your organization’s Internet Explorer security settings. During testing, you notice that you can no longer search at any popular Web
directory. What change should you make to resolve the problem while minimizing
security risks? Choose the best answer.
A. Searching is inherently risky, so hardened versions of Internet Explorer refuse to
submit information to Internet search directories.
B. Change Internet Explorer’s default protocol from HTTP to HTTPS.
C. Edit the Internet Explorer access control list (ACL). Add the Authenticated Users
special group to the Permit Unencrypted Form Data resource.
D. In Internet Explorer, click the Tools menu, and then click Internet Options. Click
the Security tab, and then click the Internet zone. Click the Custom Level button.
Scroll down to Submit Nonencrypted Form Data, and then click Enable.
Objective 7.4
Configure, Manage, and Troubleshoot Internet Explorer Security Settings 27-25
Objective 7.4 Answers
1.
Correct Answers: C
A. Incorrect: By default, sites that are placed in the Internet zone have unsigned
ActiveX controls disabled. If an ActiveX control has been signed, the user is
prompted to download it. This ensures that the user is kept safe from potentially
dangerous unsigned ActiveX controls on the public Internet. Users can change this
default by choosing Internet Options in Internet Explorer, clicking the Security tab,
clicking the Internet zone, and clicking the Custom Level button.
B. Incorrect: By default, sites that are placed in the Local Intranet zone have
unsigned ActiveX controls disabled. If an ActiveX control has been signed, the
user is prompted to download it, which ensures that users are kept safe from
potentially dangerous unsigned ActiveX controls on their local intranet. Users
can change this default by choosing Internet Options in Internet Explorer, clicking the Security tab, clicking the Local Intranet zone, and clicking the Custom
Level button.
C. Correct: By default, sites that have been placed in the Trusted Sites zone prompt
the user to download an unsigned ActiveX control. Signed ActiveX controls are
automatically downloaded, which provides users with the convenience of skipping prompts to install controls from a Web server that they feel confident will
never present potentially dangerous ActiveX controls for download.
D. Incorrect: Restricted Sites have both signed and unsigned ActiveX controls disabled. The user is not prompted to download any ActiveX controls, ever. Sites
placed in the Restricted Sites zone are assumed to have potentially dangerous
code. Users can change this default by choosing Internet Options in Internet
Explorer, clicking the Security tab, clicking the Restricted Sites zone, and clicking
the Custom Level button.
2.
Correct Answers: A
A. Correct: This is the best choice among the answers given. This process would be
greatly simplified if the network were running Active Directory. The certificate
from Contoso can be added to the list of trusted root CAs using domain-based
GPOs instead.
B. Incorrect: Microsoft has tough requirements that must be met before adding new
trusted root CAs to the list shipped with its operating systems. There must be compelling evidence that a wide range of users from many different organizations will
benefit from the new CA being added to the list.
27-26
Chapter 27
Configuring, Managing, and Troubleshooting Security
C. Incorrect: If Contoso were just starting to deploy its first CA this option might
make sense, but because the CA is already in operation it would be very time consuming to scrap it and start all over again.
D. Incorrect: It is not possible to import SSL certificates in this manner.
3.
Correct Answers: C
A. Incorrect: Although it is possible that the Web site is having problems, it is not
the most likely cause of the behavior described in the question. Because parts of
the pages are rendered correctly, and links to other pages function, the Web server
is probably working. The issues might be caused by a failing database server or
application server that is supposed to feed data to the Web server, but you do not
have enough information to determine whether this is the case.
B. Incorrect: ActiveX, Java, and other Web-based applets are designed to be downloaded by visitors to the Web site as they go along, not to be repackaged and
deployed via installation routines. Resolving the problem in this manner would
add a great deal of overhead to the vendor’s Web management team and force you
to spend time manually installing its software.
C. Correct: This is an easy way around the problem. By default, sites in the Internet
zone do not allow unsigned ActiveX controls. This restrictive setting can cause
problems for some downloadable ActiveX controls. The default setting for Trusted
sites is Low Safety, which should allow any thoroughly debugged Java applet to
run correctly. Be careful when adding URLs to your list of Trusted Sites because
malicious or poorly written programs might be downloaded and run by Internet
Explorer without your knowledge. This could lead to lost or compromised data or
even a damaged installation of Windows XP Professional. However, there is little
risk when adding sites with content you trust to our list of Trusted Sites.
D. Incorrect: It is unlikely that the vendor will want to maintain two different versions of its Web site simultaneously; therefore, this approach is not feasible.
4.
Correct Answers: D
A. Incorrect: Although unencrypted data transmitted across the Internet is vulnerable to capture and analysis, Internet Explorer can be configured to allow it. In fact,
Internet Explorer transmits unencrypted data by default.
B. Incorrect: In this scenario, Internet Explorer refuses to transmit unencrypted
data. The HTTPS protocol would encrypt the data prior to transmission, allowing
Internet Explorer to function properly. However, you cannot configure HTTPS to
be the default protocol, and many Internet Web sites do not support HTTPS.
Objective 7.4
Configure, Manage, and Troubleshoot Internet Explorer Security Settings 27-27
C. Incorrect: Internet Explorer does not use ACLs to restrict actions that users are
allowed to take.
D. Correct: Although not enabled by default, Internet Explorer can be configured to
refuse to send unencrypted form data across the Internet to reduce the likelihood
of an attacker capturing your traffic and identifying the data you typed into the
form.
Glossary
A
AC-3 The coding system used by Dolby Digital. A standard for high-quality digital
audio that is used for the sound portion of video stored in digital format.
Accelerated Graphics Port (AGP) A type of expansion slot that is solely for video
cards. Designed by Intel and supported by Microsoft Windows XP Professional,
AGP is a dedicated bus that provides fast, high-quality video and graphics performance.
access control entry (ACE) The entries on the access control list (ACL) that control
user account or group access to a resource. The entry must allow the type of
access that is requested (for example, Read access) for the user to gain access. If
no ACE exists in the ACL, the user cannot gain access to the resource or folder on
an NTFS partition. See also access control list (ACL).
access control list (ACL) A list of all user accounts and groups that have been
granted access for the file or folder on an NTFS partition or volume, as well as the
type of access they have been granted. When a user attempts to gain access to a
resource, the ACL must contain an entry, called an access control entry (ACE), for
the user account or group to which the user belongs. See also access control entry
(ACE).
access permissions
Professional.
Features that control access to shared resources in Windows XP
access token A data structure containing security information that identifies a user to
the security subsystem on a computer running Windows XP Professional, Windows 2000, or Windows NT. An access token contains a user’s security ID, the
security IDs for groups that the user is a member of, and a list of the user’s privileges on the local computer.
account
See user account.
account lockout A Windows XP Professional security feature that locks a user
account if a number of failed logon attempts occur within a specified amount of
time, based on account policy lockout settings. Locked accounts cannot log on.
account policy Controls how passwords must be used by all user accounts on an
individual computer or in a domain.
ACE
See access control entry (ACE).
ACL
See access control list (ACL).
ACPI
See Advanced Configuration and Power Interface (ACPI).
1-1
G-1
G-2
Glossary
Active Directory directory service The directory service included in Windows
2000 Server products that identifies all resources on a network and makes them
accessible to users and applications.
Active Directory schema The structure of the tables and fields and how they are
related to one another. In Active Directory, the schema is a collection of data
(object classes) that defines how the real data of the directory (the attributes of an
object) is organized and stored.
Address Resolution Protocol (ARP) Determines hardware addresses (MAC
addresses) that correspond to an Internet Protocol (IP) address.
ad-hoc wireless network A wireless network mode in which multiple wireless stations can connect without requiring an access point.
administrative share A hidden share that Windows XP Professional creates automatically so that administrators can access resources on a computer.
ADSL
See asymmetric digital subscriber line (ADSL).
Advanced Configuration and Power Interface (ACPI) An open industry specification that defines power management on a wide range of mobile, desktop, and
server components and peripherals. ACPI is the foundation for the OnNow industry initiative that allows system manufacturers to deliver computers that will start
at the touch of a keyboard. ACPI design is essential to take full advantage of
power management and Plug and Play in Windows XP Professional. Check the
manufacturer’s documentation to verify that a computer is ACPI-compliant.
Advanced Power Management (APM) A software interface designed by Microsoft
and Intel used between hardware-specific power management software, such as
that located in a system BIOS and an operating system power management driver.
agent A program that performs a background task for a user and reports to the user
when the task is done or when some expected event has taken place.
AGP See Accelerated Graphics Port (AGP).
American National Standards Institute (ANSI) An organization of American
industry and business groups dedicated to the development of trade and communication standards. ANSI is the American representative to the International Organization for Standardization (ISO). See also International Organization for
Standardization (ISO).
analog A system that encodes information using frequency modulation in a nonbinary context. Modems use analog encoding to transmit data through a phone line.
An analog signal can be any frequency, allowing many possibilities. Because of
this ambiguity of signal, a device has to interpret the signal, often finding errors.
See also digital, modem.
analog line A communication line that carries information using frequency modulation. See also digital line.
Glossary
ANSI
G-3
See American National Standards Institute (ANSI).
answer file A text file that supplies Windows XP Professional Setup with information
necessary during the installation process.
API
See application programming interface (API).
APIPA
APM
See Automatic Private IP Addressing (APIPA).
See Advanced Power Management (APM).
application layer The top (seventh) layer of the OSI reference model. This layer
serves as the window that application processes use to access network services. It
represents the services that directly support user applications, such as software for
file transfers, database access, and e-mail. See also Open Systems Interconnection
(OSI) reference model.
application programming interface (API) A set of routines that an application
program uses to request and carry out lower-level services performed by the operating system.
application protocols Protocols that work at the higher end of the OSI reference
model, providing application-to-application interaction and data exchange. Popular application protocols include File Transfer Access and Management (FTAM), a
file access protocol; Simple Mail Transfer Protocol (SMTP), a TCP/IP protocol for
transferring e-mail; Telnet, a TCP/IP protocol for logging on to remote hosts and
processing data locally; and NetWare Core Protocol (NCP), the primary protocol
used to transmit information between a NetWare server and its clients.
ARP
See Address Resolution Protocol (ARP).
ASCII (American Standard Code for Information Interchange) A coding
scheme that assigns numeric values to letters, numbers, punctuation marks, and
certain other characters. By standardizing the values used for these characters,
ASCII enables computers and programs to exchange information.
asymmetric digital subscriber line (ADSL) A recent modem technology that converts existing twisted-pair telephone lines into access paths for multimedia and
high-speed data communications. These new connections can transmit more than
8 Mbps to the subscriber and up to 1 Mbps from the subscriber. ADSL is recognized as a physical layer transmission protocol for unshielded twisted-pair media.
Asynchronous Transfer Mode (ATM) An advanced implementation of packet
switching that provides high-speed data transmission rates to send fixed-size cells
over local area networks (LANs) or wide area networks (WANs). Cells are 53
bytes—48 bytes of data with 5 additional bytes of address. ATM accommodates
voice, data, fax, real-time video, CD-quality audio, imaging, and multimegabit data
transmission. ATM uses switches as multiplexers to permit several computers to
put data on a network simultaneously. Most commercial ATM boards transmit data
at about 155 Mbps, but theoretically a rate of 1.2 Gbps is possible.
G-4
Glossary
asynchronous transmission A form of data transmission in which information is
sent one character at a time, with variable time intervals between characters. Asynchronous transmission does not rely on a shared timer that allows the sending and
receiving units to separate characters by specific time periods. Therefore, each
transmitted character consists of a number of data bits (which compose the character itself) preceded by a start bit and ending in an optional parity bit followed by
a 1-, 1.5-, or 2-stop bit.
ATM
See Asynchronous Transfer Mode (ATM).
auditing A process that tracks network activities by user accounts and is a routine
element of network security. Auditing can produce records of users who have
accessed—or attempted to access—specific resources; help administrators identify
unauthorized activity; and track activities such as logon attempts, connection and
disconnection from designated resources, changes made to files and directories,
server events and modifications, password changes, and logon parameter
changes.
audit policy Defines the types of security events that Windows XP Professional
records in the security log on each computer.
authentication Verification based on user name, passwords, and time and account
restrictions.
automated installation An unattended setup using one or more of several methods
such as Remote Installation Services, bootable CD, and Sysprep.
Automated System Recovery A feature of the Backup utility that creates a system
recovery disk and performs a full normal backup of the system partition so that
you can recover your computer in the event of a major failure.
Automatic Private IP Addressing (APIPA) A feature of Windows XP Professional
that automatically configures a unique Internet Protocol (IP) address from
169.254.0.1 to 169.254.255.255, and a subnet mask of 255.255.0.0 when the Transmission Control Protocol/Internet Protocol (TCP/IP) is configured for dynamic
addressing and a Dynamic Host Configuration Protocol (DHCP) server is not available.
Automatic Updates A Windows service that scans for, downloads, and installs available updates for Windows XP and other Microsoft programs
B
back end In a client/server application, the part of the program that runs on the
server.
backup A duplicate copy of a program, a disk, or data made to secure valuable files
from loss.
backup job
A single process of backing up data.
Glossary
G-5
Backup Or Restore Wizard A wizard that provides a simple, step-based interface
for backing up or restoring data.
bandwidth In analog communication, the difference between the highest and lowest frequencies in a given range.
Bandwidth Allocation Protocol (BAP) A Point-to-Point Protocol (PPP) control protocol that helps provide bandwidth on demand. BAP dynamically controls the use
of multilinked lines and is a very efficient mechanism for controlling connection
costs while dynamically providing optimum bandwidth.
BAP
See Bandwidth Allocation Protocol (BAP).
base I/O port Specifies a channel through which information is transferred between
a computer’s hardware, such as the network interface card (NIC) and its CPU.
baseline A measurement derived from the collection of data over an extended
period of time. The data should reflect varying but typical types of workloads and
user connections. The baseline is an indicator of how individual system resources
or a group of resources are used during periods of normal activity.
base memory address Defines the address of the location in a computer’s memory
(RAM) that is used by the network interface card (NIC). This setting is sometimes
called the RAM start address.
base priority A setting made in Task Manager that determines how much processor
time Windows XP Professional devotes to the process compared to other processes.
basic disk A physical disk that contains primary partitions or extended partitions
with logical drives used by Windows XP Professional, Windows 2000, and all versions of Windows NT. Basic disks can also contain volume, striped, mirror, or
RAID-5 sets that were created using Windows NT 4.0 or earlier versions. As long
as a compatible file format is used, basic disks can be accessed by MS-DOS, Windows 95, Windows 98, and all versions of Windows NT.
basic input/output system (BIOS) The set of essential software routines that tests
hardware at startup, assists with starting the operating system, and supports the
transfer of data among hardware devices. The BIOS is stored in read-only memory
(ROM) so that it can be executed when the computer is started. Although critical
to performance, the BIOS is usually invisible to computer users.
baud A measure of data-transmission speed named after the French engineer and
telegrapher Jean-Maurice-Emile Baudot. It is a measure of the speed of oscillation
of the sound wave on which a bit of data is carried over telephone lines. Because
baud was originally used to measure the transmission speed of telegraph equipment, the term sometimes refers to the data transmission speed of a modem. However, current modems can send at a speed higher than one bit per oscillation, so
baud is being replaced by the more accurate bps (bits per second) as a measure
of modem speed.
G-6
Glossary
baud rate Refers to the speed at which a modem can transmit data. Often confused
with bps (the number of bits per second transmitted), baud rate actually measures
the number of events, or signal changes, that occur in one second. Because one
event can actually encode more than one bit in high-speed digital communication,
baud rate and bps are not always synonymous, and the latter is the more accurate
term to apply to modems. For example, the 9600-baud modem that encodes four
bits per event actually operates at 2400 baud but transmits at 9600 bps (2400
events times 4 bits per event), so it should be called a 9600-bps modem. See also
bits per second (bps).
bind To associate two pieces of information with one another.
binding A process that establishes the communication channel between network
components on different levels to enable communication between those components—for example, the binding of a protocol driver (such as TCP/IP) and a network adapter.
BIOS
See basic input/output system (BIOS).
bisync (binary synchronous communications protocol) A communications
protocol developed by IBM. Bisync transmissions are encoded in either ASCII or
EBCDIC. Messages can be of any length and are sent in units called frames,
optionally preceded by a message header. Because bisync uses synchronous
transmission, in which message elements are separated by a specific time interval,
each frame is preceded and followed by special characters that enable the sending
and receiving machines to synchronize their clocks.
bit
Short for binary digit: either 1 or 0 in the binary number system. In processing and
storage, a bit is the smallest unit of information handled by a computer. It is represented physically by an element such as a single pulse sent through a circuit or
small spot on a magnetic disk capable of storing either a 1 or 0. Eight bits make a
byte.
bits per second (bps) A measure of the speed at which a device can transfer data.
See also baud rate.
bit time The time it takes for each station to receive and store a bit.
bootable CD An automated installation method that runs Setup from a CD-ROM.
This method is useful for computers at remote sites with slow links and no local
IT department.
BOOT.INI A file used to build the operating system choices that are displayed during
startup.
boot partition The disk partition that possesses the system files required to load the
operating system into memory.
Glossary
G-7
boot sector A critical disk structure for starting your computer, located at sector 1 of
each volume or floppy. It contains executable code and data that is required by
the code, including information used by the file system to access the volume. The
boot sector is created when you format the volume.
boot-sector virus A type of virus that resides in the first sector of a floppy disk or
hard drive. When the computer is booted, the virus executes. In this common
method of transmitting viruses from one floppy disk to another, the virus replicates itself onto the new drive each time a new disk is inserted and accessed.
bottleneck A device or program that significantly degrades network performance.
Poor network performance results when a device uses noticeably more CPU time
than it should, consumes too much of a resource, or lacks the capacity to handle
the load. Potential bottlenecks can be found in the CPU, memory, network interface card (NIC), and other components.
bps
See bits per second (bps).
broadcast A transmission sent simultaneously to more than one recipient. In communication and on networks, a broadcast message is one distributed to all stations
or computers on the network.
broadcast storm An event that occurs when there are so many broadcast messages
on the network that they approach or surpass the capacity of the network bandwidth. This can happen when one computer on the network transmits a flood of
frames, saturating the network with traffic so it can no longer carry messages from
any other computer. Such a broadcast storm can shut down a network.
buffer A reserved portion of RAM in which data is held temporarily, pending an
opportunity to complete its transfer to or from a storage device or another location
in memory.
built-in group One type of group account used by Windows XP Professional. Builtin groups, as the name implies, are included with the operating system and have
been granted useful collections of rights and built-in abilities. In most cases, a
built-in group provides all the capabilities needed by a particular user. For example, if a user account belongs to the built-in Administrators group, logging on with
that account gives the user administrative capabilities. See also user account.
bus
Parallel wires or cabling that connect components in a computer.
byte A unit of information consisting of 8 bits. In computer processing or storage, a
byte is often equivalent to a single character, such as a letter, numeral, or punctuation mark. Because a byte represents only a small amount of information,
amounts of computer memory are usually given in kilobytes (1024 bytes or 2
raised to the 10th power), megabytes (1,048,576 bytes or 2 raised to the 20th
power), gigabytes (1024 megabytes), terabytes (1024 gigabytes), petabytes (1024
terabytes), or exabytes (1024 petabytes).
G-8
Glossary
C
cache A special memory subsystem or part of RAM in which frequently used data
values are duplicated for quick access. A memory cache stores the contents of frequently accessed RAM locations and the addresses where these data items are
stored. When the processor references an address in memory, the cache checks to
see whether it holds that address. If it does hold the address, the data is returned
to the processor; if it does not, regular memory access occurs. A cache is useful
when RAM accesses are slow compared with the microprocessor speed.
CAL
See client access license (CAL).
callback A setting in Windows XP Professional that causes the remote server to disconnect and call back the client attempting to access the remote server. This
reduces the client’s phone bill by having the call charged to the remote server’s
phone number. The callback feature can also improve security by calling back the
phone number that you specified.
central processing unit (CPU) The computational and control unit of a computer;
the device that interprets and carries out instructions. Single-chip CPUs, called
microprocessors, made personal computers possible. Examples include the 80286,
80386, 80486, and Pentium processors.
Check Disk A command-line utility that verifies and repairs the integrity of the file
system on a volume.
Cipher A command-line utility that provides the capability to encrypt and decrypt
files and folders from a command prompt.
client A computer that accesses shared network resources provided by another computer, called a server.
client access license (CAL) A CAL gives client computers the right to connect to
computers running one of the Windows Server family of products.
client/server A network architecture designed around the concept of distributed
processing in which a task is divided between a back end (server) that stores and
distributes data and a front end (client) that requests specific data from the server.
codec (compression/decompression)
for digital video and stereo audio.
Compression/decompression technology
Color Quality A setting that affects the number of colors used to display objects on
the Desktop.
compressed folders A feature that allows you to compress folders on volumes formatted with NTFS or FAT. Compressed folders are compatible with other ZIP programs.
Glossary
G-9
compression state Each file and folder on an NTFS volume has a compression state,
either compressed or uncompressed.
Computer Management A console that provides access to a number of management utilities for administering a computer, including the ability to create, manage,
and monitor shared folders.
control set A Windows XP Professional installation contains control sets stored as
subkeys in the registry. The control sets contain configuration data used to control
the system, such as a list of which device drivers and services to load and start.
copy backup A backup type in which all selected files and folders are backed up,
regardless of their marker. During a copy backup, markers are not changed.
counter
CPU
A particular aspect of an object that System Monitor can measure.
See central processing unit (CPU).
D
database management system (DBMS) A layer of software between the physical
database and the user. The DBMS manages all requests for database action from
the user, including keeping track of the physical details of file locations and formats, indexing schemes, and so on. In addition, a DBMS permits centralized control of security and data integrity requirements.
data encryption
See encryption.
Data Encryption Standard (DES) A commonly used, highly sophisticated algorithm
developed by the U.S. National Bureau of Standards for encrypting and decoding
data. This encryption algorithm uses a 56-bit key and maps a 64-bit input block to
a 64-bit output block. The key appears to be a 64-bit key, but one bit in each of
the 8 bytes is used for odd parity, resulting in 56 bits of usable key. See also
encryption.
data frames Logical, structured packages in which data can be placed. Data being
transmitted is segmented into small units and combined with control information
such as message start and message end indicators. Each package of information is
transmitted as a single unit, called a frame. The data-link layer packages raw bits
from the physical layer into data frames. The exact format of the frame used by the
network depends on the topology. See also frame.
data-link layer The second layer in the OSI reference model. This layer packages
raw bits from the physical layer into data frames. See also Open Systems Interconnection (OSI) reference model.
data stream
An undifferentiated, byte-by-byte flow of data.
G-10
Glossary
DBMS
See database management system (DBMS).
defragmenting The process of finding and consolidating fragmented files and folders. Defragmenting involves moving the pieces of each file or folder to one location so that each occupies a single, contiguous space on the hard disk. The system
can then access and save files and folders more efficiently.
DES
See Data Encryption Standard (DES).
Desktop Cleanup Wizard A wizard that runs every 60 days by default, offering to
remove unused Desktop icons.
device A generic term for a computer subsystem. Printers, serial ports, and disk
drives are referred to as devices.
Device Manager An administrative tool that you can use to manage the devices on
your computer. Using Device Manager, you can view and change device properties, update device drivers, configure device settings, and uninstall devices.
DHCP
See Dynamic Host Configuration Protocol (DHCP).
dial-up connection A connection that connects you to a private network or the
Internet by using a device that transfers data over a public telephone network.
differential backup A backup type in which only selected files and folders that
have a marker are backed up. During a differential backup, markers are not
cleared so that files are still backed up if they have changed since the last normal
backup.
digital A system that encodes information numerically, such as 0 and 1, in a binary
context. Computers use digital encoding to process data. A digital signal is a discrete binary state, either on or off. See also analog, modem.
digital line A communication line that carries information only in binary-encoded
(digital) form. To minimize distortion and noise interference, a digital line uses
repeaters to regenerate the signal periodically during transmission. See also analog line.
digital video disc (DVD) An optical storage medium with higher capacity and bandwidth than a compact disc. A DVD can hold a full-length film with up to 133 minutes of high-quality video, in MPEG-2 format, and audio. Also known as digital
versatile disc.
DIP (dual inline package) switch One or more small rocker or sliding switches that
can be set to one of two states—closed or open—to control options on a circuit
board.
direct memory access (DMA) Memory access that does not involve the microprocessor; frequently employed for data transfer directly between memory and an
“intelligent” peripheral device such as a disk drive.
Glossary
G-11
direct memory access (DMA) channel A channel for direct memory access that
does not involve the microprocessor, providing data transfer directly between
memory and a disk drive.
directory Stores information about network resources, as well as all the services that
make the information available and useful. The resources stored in the directory—
such as user data, printers, servers, databases, groups, computers, and security
policies—are known as objects. The directory is part of Active Directory.
directory service A network service that identifies all resources on a network and
makes them accessible to users and applications.
Disk Cleanup A utility that calculates the amount of space that you can gain by
deleting certain types of files, such as temporary files and downloaded program
files.
Disk Defragmenter
disk duplexing
The program used in Windows XP to defragment a disk.
See disk mirroring, fault tolerance.
disk duplication An automated installation in which you use the System Preparation
tool to create an image from a computer running Windows XP Professional, and
then clone that image on other computers. Using disk duplication usually requires
third-party software.
diskless computers Computers that have neither a floppy disk nor a hard disk.
Diskless computers depend on special ROM to provide users with an interface
through which they can log on to the network.
Disk Management The name of the Windows XP utility used to manage fixed and
removable disks, as well as to create and manage volumes and partitions.
disk mirroring A technique, also known as disk duplicating, in which all or part of
a hard disk is duplicated onto one or more hard disks, each of which ideally is
attached to its own controller. With disk mirroring, any change made to the original disk is simultaneously made to the other disk or disks. Disk mirroring is used
in situations in which a backup copy of current data must be maintained at all
times. See also disk striping, fault tolerance.
Diskpart A command used to execute disk-management tasks from a command
prompt and to create scripts for automating tasks that you need to perform frequently or on multiple computers.
disk quota A feature that allows you to allocate disk space to users based on the files
and folders that they own.
disk striping Divides data into 64-Kb blocks and spreads it equally at a fixed rate
and in a fixed order among all disks in an array. However, disk striping does not
provide any fault tolerance because there is no data redundancy. If any partition
in the set fails, all data is lost. See also disk mirroring, fault tolerance.
G-12
Glossary
distinguished name (DN) A name that uniquely identifies an object within Active
Directory and contains sufficient information for a client to retrieve the object from
the directory.
distribution server Stores the distribution folder structure, which contains the files
needed to install a product, for example Windows XP Professional.
DLL
See dynamic-link library (DLL).
DMA See direct memory access (DMA).
DMA channel
DN
DNS
See direct memory access (DMA) channel.
See distinguished name (DN).
See Domain Name System (DNS).
domain For Microsoft networking, a collection of computers and users that share a
common database and security policy stored on a computer running Windows
2000 Server and configured as a domain controller. Each domain has a unique
name. See also workgroup.
domain controller For Microsoft networking, the Windows 2000 Server-based computer that authenticates domain logons and maintains the security policy and master database for a domain.
Domain Name System (DNS) A general-purpose, distributed, replicated, data-query
service used primarily on the Internet and on private Transmission Control Protocol/Internet Protocol (TCP/IP) networks for translating host names into Internet
addresses.
domain namespace The naming scheme that provides the hierarchical structure for
the DNS database.
downtime The amount of time a computer system or associated hardware remains
nonfunctioning. Although downtime can occur because hardware fails unexpectedly, it can also be a scheduled event, such as when a network is shut down to
allow time for maintaining the system, changing hardware, or archiving files.
drive letter Used to access the volume through Windows Explorer and other applications. Hard disks, floppy drives, CD-ROM and DVD drives, removable drives,
and tape devices are assigned drive letters.
driver A software component that permits a computer system to communicate with
a device. For example, a printer driver is a device driver that translates computer
data into a form understood by the target printer. In most cases, the driver also
manipulates the hardware to transmit the data to the device.
driver signing A process in which device drivers that have passed a series of tests
by Microsoft are digitally signed, enabling the operating system to determine
whether the drivers are acceptable for use.
Glossary
G-13
duplex transmission Also called full-duplex transmission. Communication that takes
place simultaneously and in both directions. See also full-duplex transmission.
DVD
See digital video disc (DVD).
dynamic disk A physical disk that is managed by Disk Management. Dynamic disks
can contain only dynamic volumes, which are created by using Disk Management.
Dynamic disks cannot contain partitions or logical drives, nor can they be
accessed by MS-DOS.
Dynamic Host Configuration Protocol (DHCP) A protocol for automatic TCP/IP
configuration that provides static and dynamic address allocation and management. See also Transmission Control Protocol/Internet Protocol (TCP/IP).
dynamic-link library (DLL) A feature of the Microsoft Windows family of operating
systems and the OS/2 operating system. DLLs allow executable routines, generally
serving a specific function or set of functions, to be stored separately as files with
.dll extensions and to be loaded only when needed by the program that calls
them.
E
EAP
See Extensible Authentication Protocol (EAP).
effective permissions The sum of the NTFS permissions assigned to the user
account and to all of the groups to which the user belongs. If a user has Read permission for a folder and is a member of a group with Write permission for the
same folder, then the user has both Read and Write permission for the folder.
EFS
EISA
See Encrypting File System (EFS).
See Extended Industry Standard Architecture (EISA).
Encrypting File System (EFS) A feature of Windows 2000 and Windows XP Professional that protects sensitive data in files that are stored on disk using the NTFS file
system. It uses symmetric key encryption in conjunction with public key technology to provide confidentiality for files. It runs as an integrated system service,
which makes it easy to manage, difficult to attack, and transparent to the file
owner and applications.
encryption The process of making information indecipherable to protect it from
unauthorized viewing or use, especially during transmission or when the data is
stored on a transportable magnetic medium. A key is required to decode the information. See also Data Encryption Standard (DES).
End-User License Agreement (EULA) An agreement that dictates the terms of service for using an application or service.
Enhanced Small Device Interface (ESDI) A standard interface for hard drives
before the IDE/ATA interface became mainstream.
G-14
Glossary
environment variables Settings that define the system and user environment information; they contain information such as a drive, path, or file name.
ESDI
See Enhanced Small Device Interface (ESDI).
EULA
See End-User License Agreement (EULA).
event An action or occurrence to which a program might respond. Examples of
events are mouse clicks, key presses, and mouse movements. Also, any significant
occurrence in the system or in a program that requires users to be notified or an
entry to be added to a log.
Event Viewer A utility that allows you to monitor the events that Windows XP Professional records in various logs.
exabyte
See byte.
exception Unsolicited network traffic that you have specifically configured Windows Firewall to allow.
Extended Industry Standard Architecture (EISA) A 32-bit bus design for x86based computers introduced in 1988. EISA was specified by an industry consortium of nine computer companies (AST Research, Compaq, Epson, Hewlett-Packard, NEC, Olivetti, Tandy, Wyse, and Zenith). An EISA device uses cards that are
upwardly compatible from ISA. See also Industry Standard Architecture (ISA).
extended partition A partition that provides a way to exceed the four primary partition limit. You cannot format an extended partition with any file system. Rather,
extended partitions serve as a shell in which you can create any number of logical
partitions.
Extensible Authentication Protocol (EAP) An extension to the Point-to-Point Protocol (PPP) that works with dial-up, PPTP, and L2TP clients. EAP allows for an
arbitrary authentication mechanism to validate a dial-up connection. The exact
authentication method to be used is negotiated by the dial-up client and the
remote access server.
F
FAT
See file allocation table (FAT).
FAT32 A derivative of the file allocation table file system. FAT32 supports smaller
cluster sizes than FAT in the same given disk space, which results in more efficient
space allocation on FAT32 drives. See also file allocation table (FAT).
fault tolerance The capability of a computer or an operating system to respond to
an event such as a power outage or a hardware failure so that no data is lost and
any work in progress is not corrupted.
FDDI
See Fiber Distributed Data Interface (FDDI).
Glossary
G-15
Fiber Distributed Data Interface (FDDI) A standard developed by the ANSI for
high-speed, fiber-optic local area networks. FDDI provides specifications for transmission rates of 100 Mbps on networks based on the Token Ring standard.
file allocation table (FAT) A table maintained by some operating systems, including
Windows NT, Windows 2000, and Windows XP Professional, to keep track of the
status of various segments of disk space used for file storage.
Files And Settings Transfer Wizard One of two methods used by administrators to
transfer user configuration settings and files from systems running Windows 95 or
later to a clean Windows XP installation.
File Signature Verification utility (Sigverif.exe) A utility that is used to scan a
Windows XP system for unsigned files, providing a simple method to identify
unsigned drivers.
File Transfer Protocol (FTP) A process that provides file transfers between local and
remote computers. FTP supports several commands that allow bidirectional transfer
of binary and ASCII files between computers. The FTP client is installed with the
TCP/IP connectivity utilities. See also ASCII (American Standard Code for Information Interchange), Transmission Control Protocol/Internet Protocol (TCP/IP).
firewall A security system, usually a combination of hardware and software,
intended to protect a network against external threats coming from another network, including the Internet. Firewalls prevent an organization’s networked computers from communicating directly with computers that are external to the
network, and vice versa. Instead, all incoming and outgoing communication is
routed through a proxy server outside the organization’s network. Firewalls also
audit network activity, recording the volume of traffic and information about
unauthorized attempts to gain access. See also proxy server.
firmware Software routines stored in read-only memory (ROM). Unlike random access
memory (RAM), ROM stays intact even in the absence of electrical power. Startup
routines and low-level input/output (I/O) instructions are stored in firmware.
fixed storage device
A storage device that is not removable, such as a hard drive.
forest A grouping or hierarchical arrangement of one or more domain trees that form
a disjointed namespace.
formatting Preparing a hard disk to accept data by creating a file system (such as
NTFS or FAT) on that disk.
fragmentation The scattering of the parts of a file over different parts of the disk
rather than having all parts of the file located in contiguous space. When a hard
disk contains numerous fragmented files and folders, the computer takes longer to
gain access to files and folders because it requires several additional reads to collect the various pieces. Creating new files and folders also takes longer because
the available free space on the hard disk is scattered.
G-16
Glossary
frame A package of information transmitted on a network as a single unit. Frame is
a term most often used with Ethernet networks. A frame is similar to the packet
used in other networks. See also data frames, packet.
frame preamble Header information added to the beginning of a data frame in the
physical layer of the OSI reference model.
frame relay An advanced, fast-packet, variable-length, digital, packet-switching
technology. It is a point-to-point system that uses a private virtual circuit (PVC) to
transmit variable-length frames at the data-link layer of the OSI reference model.
Frame relay networks can also provide subscribers with bandwidth, as needed,
that allows users to make nearly any type of transmission.
front end In a client/server application, the part of the program carried out on the
client computer.
FTP
See File Transfer Protocol (FTP).
full-duplex transmission Also called duplex transmission. Communication that
takes place simultaneously, in both directions. See also duplex transmission.
G
gateway A device used to connect networks using different protocols so that information can be passed from one system to the other. Gateways function at the network layer of the OSI reference model.
Gb
See gigabit (Gb).
GB
See gigabyte (GB).
gigabit (Gb)
1,073,741,824 bits. Also referred to as 1 billion bits.
gigabyte (GB) Commonly, 1000 megabytes. However, the precise meaning often
varies with the context. A gigabyte is 1 billion bytes. In the context of computing,
bytes are often expressed in multiples of powers of two. Therefore, a gigabyte can
also be either 1000 megabytes or 1024 megabytes, where a megabyte is considered to be 1,048,576 bytes (2 raised to the 20th power).
Global Catalog A service and a physical storage location that contains a replica of
selected attributes for every object in Active Directory.
global group One type of group account used by Windows 2000 Server. Used across
an entire domain, global groups are created on domain controllers in the domain
in which the user accounts reside. Global groups can contain only user accounts
from the domain in which the global group is created. Members of global groups
obtain resource permissions when the global group is added to a local group. See
also group.
Glossary
G-17
globally unique identifier (GUID) A 128-bit number, guaranteed to be unique, that
is assigned to an object created in Active Directory.
group In networking, an account containing other accounts that are called members.
The permissions and rights granted to a group are also provided to its members;
thus, groups offer a convenient way to grant common capabilities to collections of
user accounts. For Windows XP Professional, groups are managed with the Computer Management snap-in. For Windows 2000 Server, groups are managed with
the Active Directory Users And Computers snap-in.
Group Policy An administrator’s tool for defining and controlling how programs,
network resources, and the operating system operate for users and computers in
an organization. In an Active Directory environment, Group Policy is applied to
users or components on the basis of their membership in sites, domains, or organizational units (OUs).
Group Policy Result Tool A command-line utility that helps you determine which
policies are actually applied to a computer.
GUID
See globally unique identifier (GUID).
H
handshaking A term applied to modem-to-modem communication. Refers to the
process by which information is transmitted between the sending and receiving
devices to maintain and coordinate data flow between them. Proper handshaking
ensures that the receiving device will be ready to accept data before the sending
device transmits it.
hard disk One or more inflexible platters coated with material that allows the magnetic recording of computer data. A typical hard disk rotates at up to 7200 revolutions per minute (RPM), and the read/write heads ride over the surface of the disk
on a cushion of air 10- to 25-millionths of an inch deep. A hard disk is sealed to
prevent contaminants from interfering with the close head-to-disk tolerances.
Hard disks provide faster access to data than floppy disks and are capable of storing much more information. Because platters are rigid, they can be stacked so that
one hard-disk drive can access more than one platter. Most hard disks have
between two and eight platters.
hardware The physical components of a computer system, including any peripheral
equipment such as printers, modems, and mouse devices.
Hardware Compatibility List (HCL)
See Windows Catalog.
hardware loopback A connector on a computer that is useful for troubleshooting
hardware problems, allowing data to be transmitted to a line and then returned as
received data. If the transmitted data does not return, the hardware loopback
detects a hardware malfunction.
G-18
Glossary
header In network data transmission, one of the three sections of a packet component. It includes an alert signal to indicate that the packet is being transmitted, the
source address, the destination address, and clock information to synchronize
transmission.
hertz (Hz) The unit of frequency measurement. Frequency measures how often a
periodic event occurs, such as the manner in which a wave’s amplitude changes
with time. One hertz equals one cycle per second. Frequency is often measured in
kilohertz (KHz, 1000 Hz), megahertz (MHz, 1000 KHz), gigahertz (GHz, 1000
MHz), or terahertz (THz, 1000 GHz).
hibernate mode A state where Windows saves the current system state (including
open programs and windows) to your hard disk and then shuts the computer
down. When you restart the computer, the open programs and windows are
restored.
HID
See Human Interface Device (HID).
hidden share A method of preventing users who are browsing the network from
viewing the share. If you append the dollar sign ($) to a share name, it becomes
hidden. Built-in administrative shares are examples of hidden shares.
histogram A chart consisting of horizontal or vertical bars. The widths or heights of
these bars represent the values of certain data.
host See server.
host ID The portion of an IP address that identifies the network segment on which
a host is located.
hot fixing See sector sparing.
HTML
See Hypertext Markup Language (HTML).
HTTP
See Hypertext Transfer Protocol (HTTP).
Human Interface Device (HID) A firmware specification standard for input and
output devices such as drawing tablets, keyboards, universal serial bus (USB)
speakers, and other specialized devices designed to improve accessibility.
Hypertext Markup Language (HTML) A language developed for writing pages for
the World Wide Web. HTML allows text to include codes that define fonts, layout,
embedded graphics, and hypertext links. Hypertext provides a method for presenting text, images, sound, and videos that are linked together in a nonsequential
web of associations.
Hypertext Transfer Protocol (HTTP) The method by which World Wide Web
pages are transferred over the network.
Glossary
G-19
I
ICM
See Image Color Management (ICM) 2.0.
ICMP
See Internet Control Message Protocol (ICMP).
ICS
See Internet Connection Sharing (ICS).
IDE
See Integrated Device Electronics (IDE).
IEEE
See Institute of Electrical and Electronics Engineers (IEEE).
IEEE 802 A networking model developed by the IEEE. Named for the year and
month it began (February 1980), Project 802 defines local area network (LAN)
standards for the physical and data-link layers of the OSI reference model. Project
802 divides the data-link layer into two sublayers: media access control (MAC) and
Logical Link Control (LLC).
IEEE 802.1x authentication Authenticates users and computers for access to 802.11
wireless networks and wired Ethernet networks.
IEEE 802.11a a Wireless network standard that offers data transfer rates up to 54
Mbps and operates in the 5.8 GHz frequency.
IEEE 802.11b A wireless network standard that offers data transfer rates of 5.5 Mbps
and 11 Mbps and operates in the 2.45 GHz frequency.
IEEE 802.11g A wireless network standard that offers data transfer rates up to 54
Mbps and operates in the 2.4 GHz frequency.
IEEE 1394 Firewire A standard for high-speed serial devices such as digital video
and digital audio editing equipment.
IIS
See Internet Information Services (IIS).
Image Color Management (ICM) 2.0 The API that applications use to take advantage of color management capabilities in Windows.
incremental backup A backup type in which only selected files and folders that
have a marker are backed up. During an incremental backup, markers are cleared
so that the files are not backed up during subsequent incremental backups unless
the files change.
Industry Standard Architecture (ISA) An unofficial designation for the bus design
of the IBM Personal Computer (PC) PC/XT. It allows various adapters to be added
to the system by inserting plug-in cards into expansion slots. Commonly, ISA
refers to the expansion slots themselves; such slots are called 8-bit slots or 16-bit
slots. See also Extended Industry Standard Architecture (EISA).
G-20
Glossary
infrared transmission Electromagnetic radiation with frequencies in the electromagnetic spectrum in the range just below that of visible red light. In network
communications, infrared technology offers extremely high transmission rates and
wide bandwidth in line-of-sight communications.
infrastructure wireless network A wireless network mode in which multiple wireless stations communicate through an access point.
input language Language installed on a computer running Windows XP Professional from which the computer can accept input.
instance
A particular occurrence of an object in System Monitor.
Institute of Electrical and Electronics Engineers (IEEE) An organization of engineering and electronics professionals; noted in networking for developing the
IEEE 802.x standards for the physical and data-link layers of the OSI reference
model, applied in a variety of network configurations.
Integrated Device Electronics (IDE) A type of disk drive interface in which the
controller electronics reside on the drive itself, eliminating the need for a separate
network interface card. The IDE interface is compatible with the Western Digital
ST-506 controller.
Integrated Services Digital Network (ISDN) A worldwide digital communication
network that evolved from existing telephone services. The goal of the ISDN is to
replace current telephone lines, which require digital-to-analog conversions, with
completely digital switching and transmission facilities capable of carrying data
ranging from voice to computer transmissions, music, and video. The ISDN is built
on two main types of communications channels: B channels, which carry voice,
data, or images at a rate of 64 Kbps (kilobits per second); and a D channel, which
carries control information, signaling, and link management data at 16 Kbps. Standard ISDN Basic Rate desktop service is called 2B+D. Computers and other
devices connect to ISDN lines through simple, standardized interfaces.
interfaces Boundaries that separate layers from each other. For example, in the OSI
reference model, each layer provides some service or action that prepares the data
for delivery over the network to another computer.
International Organization for Standardization (ISO) An organization made up
of standards-setting groups from various countries. For example, the United States
member is the American National Standards Institute (ANSI). The ISO works to
establish global standards for communications and information exchange. Primary
among its accomplishments is development of the widely accepted OSI reference
model. Note that the ISO is often wrongly identified as the International Standards
Organization, probably because of the acronym ISO; however, ISO is derived from
isos, which means equal in Greek, rather than an acronym.
Glossary
G-21
Internet Connection Sharing (ICS) A feature of Windows XP Professional that
allows you to share one connection to the Internet with all computers on your
network.
Internet Control Message Protocol (ICMP) Used by Internet Protocol (IP) and
higher level protocols to send and receive status reports about information being
transmitted.
Internet Information Services (IIS) Web server software built into Windows XP
Professional that allows you to easily publish information on the Internet or on
your or your company’s intranet.
Internet Protocol (IP) The TCP/IP protocol for packet forwarding. See also Transmission Control Protocol/Internet Protocol (TCP/IP).
Internet Protocol Security (IPSec) A framework of open standards for ensuring
secure private communications over IP networks by using cryptographic security
services.
Internet service provider (ISP) A company that provides individuals or companies
access to the Internet and the World Wide Web. An ISP provides a telephone number, a user name, a password, and other connection information, so users can connect their computer to the ISP’s computers. An ISP typically charges a monthly or
hourly connection fee.
internetworking
networks.
The intercommunication in a network that is made up of smaller
interoperability The ability of components in one system to work with components
in other systems.
interrupt request (IRQ) An electronic signal sent to a computer’s CPU to indicate
that an event has taken place that requires the processor’s attention.
intranet A network within an organization that uses Internet technologies and protocols but is available only to certain people, such as employees of a company. An
intranet is also called a private network.
IP See Internet Protocol (IP), Transmission Control Protocol/Internet Protocol (TCP/IP).
IP address A 32-bit address used to identify a node on an Internet Protocol (IP) internetwork. Each node on the IP internetwork must be assigned a unique IP address,
which is made up of the network ID plus a unique host ID. This address is typically represented with the decimal value of each octet separated by a period (for
example, 192.168.7.23). In Windows XP Professional, the IP addresses can be configured manually, or if you have a computer running Windows 2000 Server and
DHCP, the IP addresses can be configured dynamically. See also Dynamic Host
Configuration Protocol (DHCP).
G-22
Glossary
ipconfig A diagnostic command that displays all current TCP/IP network configuration values. It is of particular use on systems running DHCP because it allows
users to determine which TCP/IP configuration values have been configured by
the DHCP server.
IPSec
See Internet Protocol Security (IPSec).
IRQ
See interrupt request (IRQ).
ISA
See Industry Standard Architecture (ISA).
ISDN
See Integrated Services Digital Network (ISDN).
ISO
See International Organization for Standardization (ISO).
ISP
See Internet service provider (ISP).
J
jumper A small, plastic-and-metal plug or wire for connecting different points in an
electronic circuit. Jumpers are used to select a particular circuit or option from several possible configurations. Jumpers can be used on network interface cards to
select the type of connection through which the card will transmit, either DIX or
BNC.
K
K
See kilo (K).
KB
Kbit
See kilobyte (KB).
See kilobit (Kbit).
Kerberos authentication protocol An authentication mechanism used to verify
user or host identity. The Kerberos v.5 authentication protocol is the default
authentication service for Windows XP Professional. Internet Protocol security and
the QoS Admission Control Service use the Kerberos protocol for authentication.
key
In database management, an identifier for a record or group of records in a data
file. Most often, the key is defined as the contents of a single field (called the key
field in some database management programs and the index field in others). Keys
are maintained in tables and are indexed to speed record retrieval. Keys also refer
to code that deciphers encrypted data.
kilo (K) Refers to 1000 in the metric system. In computing terminology, because computing is based on powers of 2, kilo is most often used to mean 1024 (2 raised to the
10th power). To distinguish between the two contexts, a lowercase k is often used
to indicate 1000 and an uppercase K indicates 1024. A kilobyte is 1024 bytes.
kilobit (Kbit)
1024 bits. See also bit, kilo (K).
kilobyte (KB) 1024 bytes. See also byte, kilo (K).
Glossary
G-23
L
L2TP
LAN
See Layer Two Tunneling Protocol (L2TP).
See local area network (LAN).
LAN requester
See requester (LAN requester).
Last Known Good configuration A hardware configuration that is available by
pressing the F8 key during startup. The Last Known Good configuration contains
the configuration information saved after the last successful logon.
LAT
See local area transport (LAT).
layering The coordination of various protocols in a specific architecture that allows
the protocols to work together to ensure that the data is prepared, transferred,
received, and acted on as intended.
Layer Two Tunneling Protocol (L2TP) Its primary purpose is to create an
encrypted tunnel through an untrusted network. L2TP is similar to Point-to-Point
Tunneling Protocol (PPTP) in that it provides tunneling but not encryption. L2TP
provides a secure tunnel by cooperating with other encryption technologies such
as IPSec. L2TP functions with IPSec to provide a secure virtual private network
solution.
line printer A connectivity tool that runs on client systems and is used to print files
to a computer running an LPD server.
Line Printer Daemon (LPD) A service on the print server that receives documents
(print jobs) from Line Printer Remote (LPR) tools running on client systems.
link
The communication system that connects two local area networks (LANs). Also
refers to Equipment that provides the link, including bridges, routers, and gateways.
local area network (LAN) Computers connected in a geographically confined network, such as in the same building, campus, or office park.
local area transport (LAT)
ration.
A nonroutable protocol from Digital Equipment Corpo-
local computer A computer that can be accessed directly without using a communications line or a communications device, such as a network adapter or a
modem.
local group One type of group account used by Windows XP. Implemented in each
local computer’s account database, local groups contain user accounts and other
global groups that need to have access, rights, and permissions assigned to a
resource on a local computer. Local groups cannot contain other local groups.
local printer
A printer that is connected to a physical port on the print server.
local security database A database on a computer running Windows XP Professional that holds local user accounts and groups.
G-24
Glossary
Local Security Policy
local computer.
A combination of settings applied during startup that affect a
local user account An account that allows you to log on to a specific computer to
access resources on that computer.
logical drive A volume created within an extended partition on a basic disk. You can
format and assign a drive letter to a logical drive. Only basic disks can contain logical drives. A logical drive cannot span multiple disks.
Logical Link Control (LLC) sublayer One of two sublayers created by the IEEE 802
project out of the data-link layer of the OSI reference model. The LLC is the upper
sublayer that manages data-link communication and defines the use of logical
interface points, called service access points (SAPs), used by computers to transfer
information from the LLC sublayer to the upper OSI layers. See also media access
control (MAC) sublayer, service access point (SAP).
logical printer The software configuration that is created in Windows and displayed
in Printers And Faxes.
logical structure The administrative structure of Active Directory that includes
domains, trees, organizational units, and objects.
logon right A user right assigned to a group or an individual user account that controls the way users can log on to a system.
logon script Files that can be assigned to user accounts. Typically a batch file, a
logon script runs automatically every time the user logs on. It can be used to configure a user’s working environment at every logon, and it allows an administrator
to influence a user’s environment without managing all aspects of it. A logon script
can be assigned to one or more user accounts.
loopback address
LPD
A special reserved IP address that represents the local computer.
See Line Printer Daemon (LPD).
M
marker An archive attribute that marks a file as having been backed up. During
incremental or differential backups, markers are used to determine whether a file
has changed since the last backup.
Master Boot Record (MBR) The first sector on a hard disk, this data structure starts
the process of booting the computer. The MBR contains the partition table for the
disk and a small amount of executable code called the master boot code.
MB
See megabyte (MB).
Mb
See megabit (Mb).
Mbps
See millions of bits per second (Mbps).
Glossary
MBR
G-25
See Master Boot Record (MBR).
media The vast majority of local area networks (LANs) today are connected by some
sort of wire or cabling that acts as the LAN transmission medium, carrying data
between computers. The cabling is often referred to as the media.
media access control (MAC) driver The device driver located at the media access
control sublayer of the OSI reference model. This driver is also known as the NIC
driver. It provides low-level access to network interface cards (NICs) by providing
data-transmission support and some basic NIC management functions. These drivers also pass data from the physical layer to transport protocols at the network and
transport layers.
media access control (MAC) sublayer One of two sublayers created by the IEEE
802 project out of the data-link layer of the OSI reference model. The MAC sublayer communicates directly with the network interface card and is responsible for
delivering error-free data between two computers on the network. See also Logical Link Control (LLC) sublayer.
megabit (Mb) Usually, 1,048,576 bits (2 raised to the 20th power); sometimes interpreted as 1 million bits. See also bit.
megabyte (MB) 1,048,576 bytes (2 raised to the 20th power); sometimes interpreted
as 1 million bytes. See also byte.
Member server A computer running Windows 2000 Server or Windows Server 2003
that is a member of an Active Directory domain but is not a domain controller.
Microsoft Technical Information Network (TechNet) Provides informational
support for all aspects of networking, with an emphasis on Microsoft products.
millions of bits per second (Mbps) The unit of measure of supported transmission
rates on the following physical media: coaxial cable, twisted-pair cable, and fiberoptic cable. See also bit.
mobile computing Incorporates wireless adapters using cellular telephone technology to connect portable computers with the cabled network.
modem A communications device that enables a computer to transmit information
over a standard telephone line. Because a computer is digital, it works with discrete electrical signals representing binary 1 and binary 0. A telephone is analog
and carries a signal that can have many variations. Modems are needed to convert
digital signals to analog and back. When transmitting, modems impose (modulate)
a computer’s digital signals onto a continuous carrier frequency on the telephone
line. When receiving, modems sift out (demodulate) the information from the carrier and transfer it in digital form to the computer.
mounted volume A volume to which you assign a path on an existing volume
rather than a drive letter.
G-26
Glossary
multitasking A mode of operation offered by an operating system in which a computer works on more than one task at a time. There are two primary types of multitasking: preemptive and nonpreemptive. In preemptive multitasking, the
operating system can take control of the processor without the task’s cooperation.
In nonpreemptive multitasking, the processor is never taken from a task—the task
itself decides when to give up the processor. A true multitasking operating system
can run as many tasks as it has processors. When there are more tasks than processors, the computer must “time slice” so that the available processors devote a
certain amount of time to one task and then move on to the next task, alternating
between tasks until all are completed.
N
namespace Any bounded area in which a name can be resolved. Name resolution is
the process of translating a name into some object or information that the name
represents. The Active Directory namespace is based on the Domain Name System
(DNS) naming scheme, which allows for interoperability with Internet technologies.
naming convention
An organization’s established standard for identifying users.
nbtstat A diagnostic command that displays protocol statistics and current Transmission Control Protocol/Internet Protocol (TCP/IP) connections using NetBIOS over
TCP/IP (NetBT). This command is available only if the TCP/IP protocol has been
installed. See also netstat.
NDIS
See Network Device Interface Specification (NDIS).
NetBEUI (NetBIOS Extended User Interface) A protocol supplied with all
Microsoft network products. NetBEUI advantages include small stack size (important for MS-DOS-based computers), speed of data transfer on the network
medium, and compatibility with all Microsoft-based networks. The major drawback of NetBEUI is that it is a local area network (LAN) transport protocol and
therefore does not support routing. It is also limited to Microsoft-based networks.
NetBIOS (network basic input/output system) An application programming interface (API) that can be used by application programs on a local area network (LAN)
consisting of IBM-compatible microcomputers running MS-DOS, OS/2, or some
version of UNIX. Primarily of interest to programmers, NetBIOS provides application programs with a uniform set of commands for requesting the lower level network services required to conduct sessions between nodes on a network and
transmit information between them.
NetBIOS over TCP/IP The session-layer network service that performs name-to-IP
address mapping for name resolution.
NetBT
See NetBIOS over TCP/IP.
Glossary
G-27
netstat A diagnostic command that displays protocol statistics and current Transmission Control Protocol/Internet Protocol (TCP/IP) network connections. This command is available only if the TCP/IP protocol has been installed. See also nbtstat.
network In the context of computers, a system in which a number of independent
computers are linked together to share data and peripherals, such as hard disks
and printers.
network adapter card
See network interface card (NIC).
Network Device Interface Specification (NDIS) A standard that defines an interface for communication between the media access control (MAC) sublayer and
protocol drivers. NDIS allows for a flexible environment of data exchange. It
defines the software interface, called the NDIS interface, which is used by protocol
drivers to communicate with the network interface card. The advantage of NDIS is
that it offers protocol multiplexing so that multiple protocol stacks can be used at
the same time. See also Open Data-link Interface (ODI).
Network Bridge A feature that allows Windows XP Professional to connect network
segments (groups of networked computers) without having to use a router or
bridge.
network ID The portion of the IP address that identifies a particular host on a network segment.
network interface card (NIC) An expansion card installed in each computer and
server on the network. The NIC acts as the physical interface or connection
between the computer and the network cable.
network interface printer A printer that is connected directly to the network via an
internal network adapter.
network layer The third layer in the OSI reference model. This layer is responsible
for addressing messages and translating logical addresses and names into physical
addresses. This layer also determines the route from the source to the destination
computer. It determines which path the data should take based on network conditions, priority of service, and other factors. It also manages traffic problems such
as switching, routing, and controlling the congestion of data packets on the network. See also Open Systems Interconnection (OSI) reference model.
network monitors Monitors that track all or a selected part of network traffic. They
examine frame-level packets and gather information about packet types, errors,
and packet traffic to and from each computer.
New Connection Wizard A wizard in Windows XP Professional that can perform
much of the work of configuring a network connection for different situations.
NIC
See network interface card (NIC).
G-28
Glossary
node On a local area network (LAN), a device that is connected to the network and
is capable of communicating with other network devices. For example, clients,
servers, and repeaters are called nodes.
nonpreemptive multitasking A form of multitasking in which the processor is
never taken from a task. The task itself decides when to give up the processor.
Programs written for nonpreemptive multitasking systems must include provisions
for yielding control of the processor. No other program can run until the nonpreemptive program gives up control of the processor. See also multitasking, preemptive multitasking.
normal backup A backup type in which all selected files and folders are backed up,
regardless of their marker. During a normal backup, all files are marked as having
been backed up.
NTFS compression A function of the NTFS file system that performs dynamic compression and decompression on folders and files marked with the compression
attribute.
NTFS permissions Assignments that specify which users and groups can access files
and folders and what they can do with the contents of the files or folders. NTFS
permissions are available only on NTFS volumes.
NTLDR A file used to control the Windows startup process until control is passed to
the Windows kernel.
O
object A distinct, named set of attributes that represent a network resource. Object
attributes are characteristics of objects in the Active Directory directory. For example, the attributes of a user account might include the user’s first and last names,
department, and e-mail address.
ODI
See Open Data-link Interface (ODI).
Offline Files A feature of Windows XP Professional that makes temporary copies of
shared network files on a local computer so that you can access those files when
the local computer is disconnected from the network.
Open Data-link Interface (ODI) A specification defined by Novell and Apple to
simplify driver development and to provide support for multiple protocols on a
single network interface card. Similar to Network Device Interface Specification
(NDIS) in many respects, ODI allows Novell NetWare drivers to be written without
concern for the protocol that will be used on top of them.
Glossary
G-29
Open Systems Interconnection (OSI) reference model A seven-layer architecture that standardizes levels of service and types of interaction for computers
exchanging information through a network. It is used to describe the flow of data
between the physical connection to the network and the end user application.
This model is the best-known and most widely used model for describing networking environments.
organizational unit (OU) A container used to organize objects within a domain into
logical administrative groups. An OU can contain objects such as user accounts,
groups, computers, printers, applications, file shares, and other OUs.
OSI
See Open Systems Interconnection (OSI) reference model.
OU
See organizational unit (OU).
Owner
The user who created a file, folder, or printer.
P
packet A unit of information transmitted as a whole from one device to another on
a network. In packet-switching networks, a packet is defined more specifically as
a transmission unit of fixed maximum size that consists of binary digits representing data; a header containing an identification number, a source, and destination
addresses; and sometimes error-control data. See also frame.
Packet Internet Groper (ping) A simple tool that tests if a network connection is
complete, from the server to the workstation, by sending a message to the remote
computer. If the remote computer receives the message, it responds with a reply
message. The reply consists of the remote workstation’s Internet Protocol (IP)
address, the number of bytes in the message, how long it took to reply—given in
milliseconds (ms)—and the length of Time to Live (TTL) in seconds. Ping works at
the IP level and often responds even when higher level TCP-based services cannot
respond.
packet switching A message delivery technique in which small units of information
(packets) are relayed through stations in a computer network along the best route
available between the source and the destination. Data is broken into smaller units
and then repacked in a process called packet assembly/disassembly (PAD).
Although each packet can travel along a different path, and the packets composing a message can arrive at different times or out of sequence, the receiving computer reassembles the original message. Packet-switching networks are considered
fast and efficient. Standards for packet switching on networks are documented in
the CCITT recommendation X.25.
G-30
Glossary
page-description language (PDL) A language that communicates to a printer how
printed output should appear. The printer uses the PDL to construct text and graphics to create the page image. PDLs are like blueprints in that they set parameters and
features such as type sizes and fonts, but leave the drawing to the printer.
page fault An error that occurs when the requested code or data cannot be located
in the physical memory that is available to the requesting process.
paging The process of moving virtual memory back and forth between physical
memory (RAM) and the disk. Paging occurs when physical memory becomes full.
paging file A special file on one or more of the hard disks of a computer running
Windows XP Professional. Windows XP Professional uses virtual memory to store
some of the program code and other information in RAM and to temporarily store
some of the program code and other information on the computer’s hard disks.
This increases the amount of available memory on the computer.
parity An error-checking procedure in which the number of 1s must always be the
same—either odd or even—for each group of bits transmitted without error. Parity
is used for checking data transferred within a computer or between computers.
partition A logical division of a hard disk that functions as if it were a physically separate unit. Each partition can be formatted for a different file system.
password-protected share Access to a shared resource that is granted when a user
enters the appropriate password.
password reset disk A removable disk on which is stored a file that allows a user to
recover a user account when the user forgets his or her password.
Pathping A command-line tool that is a combination of both Ping and Tracert, displaying information about packet loss at every router between the host computer
and the remote one.
PCI
See Peripheral Component Interconnect (PCI).
PDA
See personal digital assistant (PDA).
PDL
See page-description language (PDL).
PDN
See public data network (PDN).
peer-to-peer network A network in which there are no dedicated servers or hierarchy among the computers. All computers are equal and therefore known as peers.
Generally, each computer functions as both client and server.
Performance Console A tool that is used to monitor resource usage on a computer
running Windows XP Professional. The Performance Console provides access to
two snap-ins: System Monitor and Performance Logs And Alerts.
Performance Logs And Alerts A snap-in that collects performance data over time
from the local or a remote computer or that has Windows XP alert you when a
particular performance threshold is crossed.
Glossary
G-31
peripheral A term used for devices such as disk drives, printers, modems, mouse
devices, and joysticks that are connected to a computer and controlled by its
microprocessor.
Peripheral Component Interconnect (PCI) 32-bit local bus used in most Pentium
computers and in the Apple Power Macintosh. Meets most of the requirements for
providing Plug and Play functionality.
permanent virtual circuit (PVC) A permanent logical connection between two
nodes on a packet-switching network; similar to leased lines that are permanent
and virtual, except that with PVC the customer pays only for the time the line is
used. This type of connection service is gaining importance because both frame
relay and ATM use it. See also packet switching, virtual circuit.
permissions
See access permissions.
permissions inheritance The process of a file or folder receiving permissions
based on the permissions assigned to the object’s parent folder.
personal digital assistant (PDA) A type of handheld computer that provides functions including personal organization features—such as calendar, note-taking
device, database manipulation, calculator, and communications functions. For
communication, a PDA uses cellular or wireless technology that is often built into
the system but can be supplemented or enhanced by means of a PC card.
petabyte
See byte.
phase change rewritable (PCR) A type of rewritable optical technology in which
the optical devices come from one manufacturer (Matsushita/Panasonic) and the
media come from two manufacturers (Panasonic and Plasmon).
physical layer The first (bottom) layer of the OSI reference model. This layer
addresses the transmission of the unstructured raw bitstream over a physical
medium (the networking cable). The physical layer relates the electrical/optical,
mechanical, and functional interfaces to the cable and also carries the signals that
transmit data generated by all of the higher OSI layers. See also Open Systems
Interconnection (OSI) reference model.
ping
See Packet Internet Groper (ping).
Plug and Play A set of specifications developed by Intel that allows a computer to
automatically detect and configure a device and install the appropriate device
drivers.
point of presence (POP) The local access point for a network provider. Each POP
provides a telephone number that allows users to make a local call for access to
online services.
G-32
Glossary
point-to-point configuration Dedicated circuits that are also known as private, or
leased, lines. They are the most popular wide area network (WAN) communication circuits in use today. The carrier guarantees full-duplex bandwidth by setting
up a permanent link from each end point, using bridges and routers to connect
local area networks (LANs) through the circuits. See also Point-to-Point Protocol
(PPP), Point-to-Point Tunneling Protocol (PPTP), duplex transmission.
Point-to-Point Protocol (PPP) A data-link protocol for transmitting Transmission
Control Protocol/Internet Protocol (TCP/IP) packets over dial-up telephone connections, such as between a computer and the Internet. PPP was developed by the
Internet Engineering Task Force in 1991.
Point-to-Point Tunneling Protocol (PPTP) An extension of the Point-to-Point Protocol (PPP) used for communications on the Internet. It was developed by
Microsoft to support virtual private networks (VPNs), which allow individuals and
organizations to use the Internet as a secure means of communication. PPTP supports encapsulation of encrypted packets in secure wrappers that can be transmitted over a Transmission Control Protocol/Internet Protocol (TCP/IP) connection.
See also virtual private network (VPN).
POP
See point of presence (POP).
Power scheme Allows you to configure Windows XP Professional to turn off the
power to your monitor and your hard disk, conserving energy.
Preboot eXecution Environment (PXE) A standard for network booting that is
supported by some network adapters. Using a PXE-compliant network adapter is
one of three configurations that will allow a RIS client to boot from the network
and locate a RIS server. (RIS clients can also be compliant with the Net PC specification or use an RIS boot disk.)
preemptive multitasking A form of multitasking (the capability of a computer’s
operating system to work on more than one task at a time). With preemptive multitasking—as opposed to nonpreemptive multitasking—the operating system can
take control of the processor without the task’s cooperation. See also nonpreemptive multitasking.
presentation layer The sixth layer of the OSI reference model. This layer determines the form used to exchange data between networked computers. At the
sending computer, this layer translates data from a format sent down from the
application layer into a commonly recognized, intermediary format. At the receiving end, this layer translates the intermediary format into a format useful to that
computer’s application layer. The presentation layer manages network security
issues by providing services such as data encryption, provides rules for data transfer, and performs data compression to reduce the number of bits that need to be
transmitted. See also Open Systems Interconnection (OSI) reference model.
Glossary
G-33
primary display The default display in a multiple display configuration. You can
often change which video adapter controls the primary display by changing settings in the computer’s BIOS.
primary partition A partition that you can configure as the active, or bootable,
drive. You can configure up to four primary partitions on a computer running a
Windows operating system (three partitions if you also have an extended partition
on the disk).
print job
A document that Windows has prepared for printing.
print permissions Permissions that enable you to control which users can access a
printer and which actions they can perform.
print processor Software that is responsible for processing print documents into a
format that is suitable to be sent to the printer. Windows XP contains only the WinPrint processor by default.
print queue
A buffer in which a print job is held until the printer is ready to print it.
print server The computer on which the printers reside. The print server receives
and processes documents from client computers. You set up and share network
printers on print servers.
print spooling The process of saving a print job to the hard disk before sending it
to the printer.
printer The physical device used for printing. This device is usually a standard
printer, but it can also be a fax device, a plotter, or a file. It might also refer to the
combination of the physical and logical printer.
printer driver One or more files containing information that Windows XP Professional requires to convert print commands into a specific printer language, such as
PostScript. A printer driver is specific to each print device model.
printer pool A printing option that permits you to attach two or more printers to a
single printer configuration.
printer port The software interface through which a computer communicates with
a print device by means of a locally attached interface. These supported interfaces
include LPT, COM, USB, and network-attached devices such as the HP JetDirect
and Intel NetPort.
printer priority Governs the order in which print jobs are printed relative to other
logical printers configured for the same printer.
printer redirecting The process of sending a document to another printer. You can
redirect only all documents for a printer, not individual documents. Also, you can
redirect documents only to printers that use the same printer driver as the original
printer.
G-34
Glossary
private key The secret half of a cryptographic key pair that is used with a public key
algorithm. Private keys are typically used to digitally sign data and to decrypt data
that has been encrypted with the corresponding public key.
privilege A user right that allows the members of the group to which it is assigned
to perform a specific task, usually one that affects an entire computer system
rather than one object.
process An operating system object that consists of an executable program, a set of
virtual memory addresses, and one or more threads. When a program runs, a process is created.
processor affinity A setting made in Task Manager that determines on which processors (on a multiple-processor computer) a process can run.
protocol The system of rules and procedures that govern communication between
two or more devices. Many varieties of protocols exist, and not all are compatible,
but as long as two devices are using the same protocol, they can exchange data.
Networking software usually implements multiple levels of protocols layered one
on top of another. Windows XP Professional includes TCP/IP- and IPX/SPX-compatible protocols.
protocol driver The driver responsible for offering four or five basic services to
other layers in the network while “hiding” the details of how the services are actually implemented. Services performed include session management, datagram service, data segmentation and sequencing, acknowledgment, and possibly routing
across a wide area network (WAN).
protocol stack A layered set of protocols that work together to provide a set of network functions.
proxy server A firewall component that manages Internet traffic to and from a local
area network (LAN). The proxy server decides whether it is safe to let a particular
message or file pass through to the organization’s network, provides access control to the network, and filters and discards requests as specified by the owner—
including requests for unauthorized access to proprietary data. See also firewall.
public data network (PDN) A commercial packet-switching or circuit-switching wide
area network (WAN) service provided by local and long-distance telephone carriers.
public key The nonsecret half of a cryptographic key pair that is used with a public
algorithm. Public keys are typically used to verify digital signatures or decrypt data
that has been encrypted with the corresponding private key.
PVC
See permanent virtual circuit (PVC).
PXE
See Preboot eXecution Environment (PXE).
Glossary
G-35
Q
QoS
See quality of service.
quality of service (QoS)
data transmission.
A set of quality assurance standards and mechanisms for
R
RADIUS
See Remote Authentication Dial-In User Service (RADIUS).
RAID
See redundant array of independent disks (RAID).
RAM
See random access memory (RAM).
random access memory (RAM) Semiconductor-based memory that can be read
and written to by the microprocessor or other hardware devices. The storage locations can be accessed in any order. Note that the various types of read-only memory (ROM) are also capable of random access. However, RAM is generally
understood to refer to volatile memory, which can be written as well as read. See
also read-only memory (ROM).
RDN
See relative distinguished name (RDN).
read-only memory (ROM) Semiconductor-based memory that contains instructions
or data that can be read but not modified. See also random access memory (RAM).
recovery agent A user account that is given the capability to decrypt an encrypted
file or folder in case the owner of the resource loses the file encryption certificate
that allows decryption.
Recovery Console A command-line console interface that provides access to the
hard disks and a limited set of administrative commands useful for recovering a
computer.
redirector Networking software that accepts input/output (I/O) requests for remote
files, named pipes or mail slots, and sends (redirects) the requests to a network
service on another computer.
Reduced Instruction Set Computing (RISC) A type of microprocessor design that
focuses on rapid and efficient processing of a relatively small set of instructions.
RISC architecture limits the number of instructions that are built into the microprocessor, but it optimizes each so it can be carried out very rapidly, usually within a
single clock cycle.
redundancy system A fault-tolerant system that protects data by duplicating it in
different physical sources. Data redundancy allows access to data even if part of
the data system fails. See also fault tolerance.
G-36
Glossary
redundant array of independent disks (RAID) A standardization of fault-tolerant
options in five levels. The levels offer various combinations of performance, reliability, and cost. Formerly known as redundant array of inexpensive disks.
redundant array of inexpensive disks (RAID)
dent disks (RAID).
See redundant array of indepen-
Registry In Windows XP Professional, Windows 2000, Windows NT, Windows 98,
and Windows 95, a database of information about a computer’s configuration. The
Registry is organized in a hierarchical structure and consists of subtrees and their
keys, hives, and entries.
relative distinguished name (RDN)
within a particular OU.
A name that uniquely identifies an object
Remote Assistance A utility that allows a user to invite an administrator or other
expert user to provide help remotely.
Remote Authentication Dial-In User Service (RADIUS) A security authentication
protocol widely used by Internet service providers (ISPs). RADIUS provides
authentication and accounting services for distributed dial-up networking.
remote-boot PROM (programmable read-only memory) A special chip in the
network interface card that contains the hardwired code that starts the computer
and connects the user to the network, used in computers for which there are no
hard disk or floppy drives. See also diskless computers.
Remote Desktop
tion.
A utility that allows you to control a computer from a remote loca-
remote installation The process of connecting to a server running Remote Installation Services (RIS), called the RIS server, and then starting an automated installation of Windows XP Professional on a local computer.
Remote Installation Services (RIS) Software that stores images of Windows XP
installations and makes those images available over the network.
remote user A user who dials in to the server over modems and telephone lines
from a remote location.
removable storage device A storage device that allows you to remove either the
device itself or the storage media that the device uses.
replication The process of copying information from one location to another. In
Active Directory, replication of directory information happens automatically
between domain controllers in the same site.
requester (LAN requester) Software that resides in a computer and forwards
requests for network services from the computer’s application programs to the
appropriate server. See also redirector.
Glossary
G-37
Request for Comments (RFC) A document that defines a standard. RFCs are published by the Internet Engineering Task Force (IETF) and other working groups.
resource publishing The process of making an object visible and accessible to
users in a Windows 2000 domain.
resources Any part of a computer system. Users on a network can share computer
resources, such as hard disks, printers, modems, CD-ROM drives, and even the
processor.
restore point A saved snapshot of the Registry and important system and application files that is created using the System Restore utility.
Resultant Set of Policy A tool that provides a way for you to simulate and test policy
settings applied to computers or users. It shows you the policies applied to the
object and the order in which they are applied.
RFC
See Request for Comments (RFC).
rights Authorization with which a user is entitled to perform certain actions on a
computer network. Rights apply to the system as a whole, whereas permissions
apply to specific objects. For example, a user might have the right to back up an
entire computer system, including the files that the user does not have permission
to access. See also access permissions.
RIP
See Routing Information Protocol (RIP).
RIS
See Remote Installation Services (RIS).
RISC
See Reduced Instruction Set Computing (RISC).
Roll Back Driver A feature in Windows XP that permits you to reinstall (roll back) a
previously installed driver. The uninstalled drivers are stored in the systemroot\system32\reinstallbackups folder.
ROM
See read-only memory (ROM).
routable protocol The protocol that supports multipath LAN-to-LAN communications. See also protocol.
router A device used to connect networks of different types, such as those using different architectures and protocols. Routers work at the network layer of the OSI
reference model. They can switch and route packets across multiple networks,
which they do by exchanging protocol-specific information between separate networks. Routers determine the best path for sending data and filter broadcast traffic
to the local segment.
Routing Information Protocol (RIP) A protocol that uses distance-vector algorithms
to determine routes. With RIP, routers transfer information among other routers to
update their internal routing tables and use that information to determine the best
routes based on hop counts between routers. TCP/IP and IPX support RIP.
G-38
Glossary
RS-232 standard An industry standard for serial communication connections.
Adopted by the Electrical Industries Association (EIA), this recommended standard
defines the specific lines and signal characteristics used by serial communications
controllers to standardize the transmission of serial data between devices.
S
safe mode A method of starting Windows XP Professional using basic files and drivers only, without networking. Safe mode is available by pressing the F8 key when
prompted during startup. Safe mode allows the computer to start when a problem
prevents it from starting normally.
SAP (service access point)
See service access point (SAP).
SAP (Service Advertising Protocol)
See Service Advertising Protocol (SAP).
Scheduled Tasks A feature of Windows XP Professional that lets you schedule programs, scripts, batch files, or documents to run once, at regular intervals, or at specific times.
schema Contains a formal definition of the contents and structure of Active Directory, including all attributes, classes, and class properties. For each object class,
the schema defines what attributes an instance of the class must have, what additional attributes it can have, and what object class can be a parent of the current
object class.
Screen Resolution A setting that allows you to set the number of pixels Windows
uses to display the Desktop.
SCSI
See Small Computer System Interface (SCSI).
SDLC
See Synchronous Data Link Control (SDLC).
Secondary Logon Service A service in Windows XP Professional that allows a user
to run a program (using the Run As command) with different credentials from the
currently logged-on user.
sector A portion of the data-storage area on a disk. A disk is divided into sides (top
and bottom), tracks (rings on each surface), and sectors (sections of each ring).
Sectors are the smallest physical storage units on a disk and are of fixed size—typically capable of holding 512 bytes of information each.
sector sparing A fault-tolerant system also called hot fixing. It automatically adds
sector-recovery capabilities to the file system during operation. If bad sectors are
found during disk I/O, the fault-tolerant driver will attempt to move the data to a
good sector and map out the bad sector. If the mapping is successful, the file system is not alerted. It is possible for SCSI devices to perform sector sparing, but AT
devices (ESDI and IDE) cannot.
Glossary
G-39
security Making computers and the data stored on them safe from harm or unauthorized access.
Security Center A feature of Windows XP Professional with Service Pack 2 that provides at-a-glance security status for a computer, including information on Windows Firewall, Automatic Updates, and antivirus software.
Security Identifier (SID) A data structure of variable length that uniquely identifies
user, group, service, and computer accounts within an enterprise. Every account is
issued an SID when the account is first created. Access control mechanisms in
Windows XP Professional and Windows 2000 identify security principals by SID
rather than by name.
security log Records security events, such as valid and invalid logon attempts, and
events relating to creating, opening, or deleting files or other objects.
Security options Policies that allow you to control various security settings in Windows XP Professional.
security templates Preconfigured combinations of security settings that you can
apply to computers or customize to suit your needs.
security zones Categories of Web sites that Internet Explorer uses to allow or block
access to particular types of activities. Zones include Internet, Local Intranet,
Trusted Sites, and Restricted Sites.
segment The length of cable on a network between two terminators. A segment can
also refer to messages that have been broken up into smaller units by the protocol
driver.
separator page A file that contains print device commands. Separator pages identify
and separate print jobs and can also be used to switch a printer to a different print
mode.
serial transmission One-way data transfer. The data travels on a network cable
with one bit following another.
server
A computer that provides shared resources to network users. See also client.
server-based network A network in which resource security and most other network functions are provided by dedicated servers. Server-based networks have
become the standard model for networks serving more than 10 users. See also
peer-to-peer network.
Server Message Block (SMB) The protocol developed by Microsoft, Intel, and IBM
that defines a series of commands used to pass information between network
computers. The redirector packages SMB requests into a network control block
(NCB) structure that can be sent over the network to a remote device. The network provider listens for SMB messages destined for it and removes the data portion of the SMB request so that it can be processed by a local device.
G-40
Glossary
service A program or process that runs in the background on a computer to perform
particular system functions for other programs.
service access point (SAP) The interface between each of the seven layers in the
OSI protocol stack that has connection points, similar to addresses, used for communication between layers. Any protocol layer can have multiple SAPs active at
one time.
Service Advertising Protocol (SAP) Allows service-providing nodes (including file,
printer, gateway, and application servers) to advertise their services and addresses.
service dependency The other services that must be running for a service to start, as
well as the services that cannot start until the service in question starts.
Service Pack A software upgrade to an existing software distribution that contains
updated files consisting of patches and fixes.
session
A connection or link between stations on a network.
session layer The fifth layer of the OSI reference model. This layer allows two applications on different computers to establish, use, and end a connection called a
session. This layer performs name recognition and functions, such as security,
needed to allow two applications to communicate over the network. The session
layer provides synchronization between user tasks. This layer also implements
dialog control between communicating processes, regulating which side transmits,
when, for how long, and so on. See also Open Systems Interconnection (OSI) reference model.
session management Establishing, maintaining, and terminating connections
between stations on the network.
shared folder
A folder made accessible to users on the network.
shared folder permissions Permissions assigned to shared folders that control
access to the folder over the network. Shared folder permissions include Read,
Change, and Full Control.
sharing Means by which files of folders are publicly posted on a network for access
by anyone on the network.
shell A piece of software, usually a separate program, that provides direct communication between the user and the operating system. This usually, but not always,
takes the form of a command-line interface. Examples of shells are Macintosh
Finder and the MS-DOS command interface program COMMAND.COM.
SID
See Security Identifier (SID).
Simple File Sharing A type of sharing that is used when a Windows XP computer
has not joined a domain or is running Windows XP Home Edition.
Glossary
G-41
Simple Mail Transfer Protocol (SMTP) A TCP/IP protocol for transferring e-mail.
See also application protocols, Transmission Control Protocol/Internet Protocol
(TCP/IP).
Simple Network Management Protocol (SNMP) A network management protocol
installed with TCP/IP and widely used on TCP/IP and IPX networks. SNMP transports management information and commands between a management program
run by an administrator and the network management agent running on a host.
The SNMP agent sends status information to one or more hosts when the host
requests it or when a significant event occurs.
simple volume A dynamic volume that contains disk space from a single disk and
can be extended if necessary.
simultaneous peripheral operation on line (spool)
moving a print job from the network into a printer.
site
Facilitates the process of
A combination of one or more Internet Protocol (IP) subnets, typically connected
by a high-speed link.
Small Computer System Interface (SCSI) A standard, high-speed parallel interface
defined by the ANSI. A SCSI interface is used for connecting microcomputers to
peripheral devices, such as hard disks and printers, and to other computers and
LANs. Pronounced “scuzzy.”
smart card A credit card–sized device that is used with a PIN number to enable certificate-based authentication and single sign on to the enterprise. Smart cards
securely store certificates, public and private keys, passwords, and other types of
personal information. A smart card reader attached to the computer reads the
smart card.
SMB
SMDS
SMP
See Server Message Block (SMB).
See Switched Multimegabit Data Services (SMDS).
See symmetric multiprocessing (SMP).
SMTP
See Simple Mail Transfer Protocol (SMTP).
SNMP
See Simple Network Management Protocol (SNMP).
software Computer programs or sets of instructions that allow the hardware to work.
Software can be grouped into four categories: system software, such as operating
systems, which control the workings of the computer; application software, such
as word processing programs, spreadsheets, and databases, which perform the
tasks for which people use computers; network software, which enables groups of
computers to communicate; and language software, which provides programmers
with the tools they need to write programs.
G-42
Glossary
SONET See Synchronous Optical Network (SONET).
spanned volume A dynamic volume that contains disk space from 2 or more (up to
a maximum of 32) disks. The amount of disk space from each disk can vary. There
is no fault tolerance in spanned volumes. If any of the disks containing the
spanned volume fails, you lose all data in the entire spanned volume.
spanning tree algorithm (STA) An algorithm (mathematical procedure) implemented to eliminate redundant routes and avoid situations in which multiple local
area networks (LANs) are joined by more than one path by the IEEE 802.1 Network Management Committee. Under STA, bridges exchange certain control information in an attempt to find redundant routes. The bridges determine which is the
most efficient route, and then use that one and disable the others. Any of the disabled routes can be reactivated if the primary route becomes unavailable.
SQL
See structured query language (SQL).
STA
See spanning tree algorithm (STA).
stand-alone computer A computer that is not connected to any other computers
and is not part of a network.
stand-alone environment A work environment in which each user has a personal
computer but works independently, unable to share files and other important
information that would be readily available through server access in a networking
environment.
stealth virus A variant of the file-infector virus. This virus is so named because it
attempts to hide from detection. When an antivirus program attempts to find it, the
stealth virus tries to intercept the probe and return false information, indicating
that it does not exist.
stop error Also referred to as a blue-screen error, a stop error occurs when the system detects a condition from which it cannot recover.
striped volume A dynamic volume that contains disk space from 2 or more (up to
a maximum of 32) disks. Unlike spanned volumes, striped volumes require that
you use an identical amount of disk space from each disk. Striped volumes provide increased performance because it is faster to read or write two smaller pieces
of a file on two drives than to read or write the entire file on a single drive. However, you cannot extend striped volumes and they provide no fault tolerance.
structured query language (SQL) A widely accepted standard database sublanguage used in querying, updating, and managing relational databases.
subnet A subdivision of an Internet Protocol (IP) network. Each subnet has its own
unique subnetted network ID.
Glossary
G-43
subnet mask A 32-bit value expressed as four decimal numbers from 0 to 255, separated by periods (for example, 255.255.255.0). This number allows TCP/IP to
determine the network ID portion of an IP address.
Switched Multimegabit Data Services (SMDS) A high-speed, switched-packet service that can provide speeds of up to 34 Mbps.
switched virtual circuit (SVC) A logical connection between end computers that
uses a specific route across the network. Network resources are dedicated to the
circuit, and the route is maintained until the connection is terminated. These are
also known as point-to-multipoint connections. See also virtual circuit.
symmetric multiprocessing (SMP) SMP systems, such as Windows 2000, use any
available processor on an as-needed basis. With this approach, the system load
and application needs can be distributed evenly across all available processors.
Synchronization Manager In Windows XP Professional, the tool used to ensure
that a file or folder on a client computer contains the same data as a matching file
or folder on a server.
Synchronous Data Link Control (SDLC) The data link (data transmission) protocol most widely used in networks conforming to IBM’s Systems Network Architecture (SNA). SDLC is a communications guideline that defines the format in which
information is transmitted. As its name implies, SDLC applies to synchronous
transmissions. SDLC is also a bit-oriented protocol and organizes information in
structured units called frames.
Synchronous Optical Network (SONET) A fiber-optic technology that can transmit data at more than one gigabit per second. Networks based on this technology are capable of delivering voice, data, and video. SONET is a standard for
optical transport formulated by the Exchange Carriers Standards Association
(ECSA) for the ANSI.
System Monitor A snap-in that tracks resource use and network throughput in real
time through the use of objects and counters.
system partition Normally the same partition as the boot partition, this partition
contains the hardware-specific files required to load and start Windows XP.
System Preparation A utility that allows you to prepare master images of an existing Windows XP installation for distribution to other computers by removing
machine-specific information from the computer.
System Restore A utility that monitors changes to certain system and application
files, and creates automatic restore points that contain a snapshot of the Registry
and a copy of certain system files that Windows XP Professional requires for startup. You can also create restore points manually and restore the computer to any
restore point.
G-44
Glossary
systemroot The path and folder name where the Windows XP Professional system
files are located. Typically, this is C:\Windows, although a different drive or folder
can be designated when Windows XP Professional is installed. The value of %systemroot% can be used to replace the actual location of the folder that contains the
Windows XP Professional system files. To identify your systemroot folder, click
Start, click Run, type %systemroot%, and click OK.
System State Configuration information that includes the Windows Registry and
important configuration files.
T
Task Manager A tool that provides information about the programs and processes
running on your computer and the performance of your computer.
TCO
See total cost of ownership (TCO).
TCP
See Transmission Control Protocol (TCP).
TCP/IP
TDI
See Transmission Control Protocol/Internet Protocol (TCP/IP).
See transport driver interface (TDI).
Technet
See Microsoft Technical Information Network (TechNet).
Telnet The command and program used to log on from one Internet site to another.
The Telnet command and program brings the user to the logon prompt of another
host.
terabyte
See byte.
thread A type of object within a process that runs program instructions. Using multiple threads allows concurrent operations within a process and enables one process to run different parts of its program on different processors simultaneously.
throughput A measure of the data transfer rate through a component, connection,
or system. In networking, throughput is a good indicator of the system’s total performance because it defines how well the components work together to transfer
data from one computer to another. In this case, the throughput would indicate
how many bytes or packets the network could process per second.
topology The arrangement or layout of computers, cables, and other components on
a network. Topology is the standard term that most network professionals use
when referring to the network’s basic design.
total cost of ownership (TCO) The total amount of money and time associated
with purchasing computer hardware and software and deploying, configuring,
and maintaining the hardware and software. It includes hardware and software
updates, training, maintenance and administration, and technical support. One
other major factor is lost productivity caused by user errors, hardware problems,
software upgrades, and retraining.
Glossary
G-45
tracert A Trace Route command-line tool that shows every router interface through
which a TCP/IP packet passes on its way to a destination.
trailer One of the three sections of a packet component. The exact content of the
trailer varies depending on the protocol, but it usually includes error checking in
the form of a cyclical redundancy check (CRC).
Transmission Control Protocol (TCP) The TCP/IP protocol for sequenced data.
See also Transmission Control Protocol/Internet Protocol (TCP/IP).
Transmission Control Protocol/Internet Protocol (TCP/IP) An industry standard suite of protocols providing communications in a heterogeneous environment. In addition, TCP/IP provides a routable enterprise networking protocol and
access to the Internet and its resources. It is a transport layer protocol that actually
consists of several other protocols in a stack that operates at the session layer.
Most networks support TCP/IP as a protocol. See also Internet Protocol (IP).
transport driver interface (TDI) An interface that works between the file-system
driver and the transport protocols, allowing any protocol written to TDI to communicate with the file-system drivers.
transport layer The fourth layer of the OSI reference model. It ensures that messages are delivered error-free, in sequence, and without losses or duplications.
This layer repackages messages for efficient transmission over the network. At the
receiving end, the transport layer unpacks the messages, reassembles the original
messages, and sends an acknowledgment of receipt. See also Open Systems Interconnection (OSI) reference model.
transport protocol A protocol that provides for communication sessions between
computers and ensures that data can move reliably between computers.
Traverse Folder A permission that allows or denies moving through folders to
access other files or folders, even when the user has no permissions for the traversed folder (the folder that the user is moving through).
tree
A grouping of hierarchical arrangements of one or more Windows 2000 domains
that share a contiguous namespace.
Trojan horse virus A type of virus that appears to be a legitimate program that
might be found on any system. A Trojan horse virus can destroy files and cause
physical damage to disks.
trust relationship A trust relationships is a link between domains that enables passthrough authentication, in which a user has only one user account in one domain
but can access the entire network. User accounts and global groups defined in a
trusted domain can be given rights and resource permissions in a trusting domain,
even if those accounts do not exist in the trusting domain’s database. A trusting
domain honors the logon authentication of a trusted domain.
G-46
Glossary
U
UDF
See uniqueness database file (UDF).
UDP
See User Datagram Protocol (UDP).
unattended installation An automated installation in which the Winnt32 and Winnt
commands are used along with an unattended answer file to script the installation.
UNC
See Universal Naming Convention (UNC).
Uniform Resource Locator (URL) Provides the hypertext links between documents
on the World Wide Web (WWW). Every resource on the Internet has its own URL
that specifies the server to access as well as the access method and the location.
URLs can use various protocols including File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP).
uninterruptible power supply (UPS) A device connected between a computer or
another piece of electronic equipment and a power source, such as an electrical
outlet. The UPS ensures that the electrical flow to the computer is not interrupted
because of a blackout and, in most cases, protects the computer against potentially damaging events such as power surges and brownouts. All UPS units are
equipped with a battery and loss-of-power sensor. If the sensor detects a loss of
power, it immediately switches to the battery so that users have time to save their
work and shut off their computers. Most higher-end models have features such as
power filtering, sophisticated surge protection, and a serial port so that an operating system capable of communicating with a UPS (such as Windows XP Professional) can work with the UPS to facilitate automatic system shutdown.
uniqueness database file (UDF) A text file that is used in conjunction with an
answer file and contains the settings that are unique to each computer.
Universal Naming Convention (UNC) A convention for naming files and other
resources beginning with two backslashes (\\), indicating that the resource exists
on a network computer. UNC names conform to the \\Servername\Sharename
syntax.
universal serial bus (USB) A serial bus with a data transfer rate of 12 megabits per
second (Mbps) for connecting peripherals to a microcomputer. USB can connect
up to 127 peripheral devices to the system through a single general-purpose port.
This is accomplished by daisy chaining peripherals together. USB is designed to
support the ability to automatically add and configure new devices as well as the
ability to add such devices without having to shut down and restart the system.
UPN
See user principal name (UPN).
UPS
See uninterruptible power supply (UPS).
URL
See Uniform Resource Locator (URL).
Glossary
USB
G-47
See universal serial bus (USB).
user account Consists of all of the information that defines a user on a network. This
includes the user name and password required for the user to log on, the groups
in which the user account has membership, and the rights and permissions the
user has for using the system and accessing its resources. See also built-in group.
User Datagram Protocol (UDP) A connection-less protocol that is responsible for
end-to-end data transmission.
user groups Groups of users who meet online or in person to discuss installation,
administration, and other network challenges for the purpose of sharing and
drawing on each other’s expertise in developing ideas and solutions.
user principal name (UPN) A “shorthand” name representing the user account and
the DNS name of the tree where the user account object resides.
user profile A collection of user-specific settings, such as a customized desktop or
personalized application settings.
User rights Rights that allow the members of a group or an individual user to perform a specific action, such as backing up files or changing the system time. User
rights include privileges and logon rights.
User State Migration Tool (USMT) A tool that lets administrators transfer user configuration settings and files from systems running Windows 95 or later to a clean
Windows XP installation.
V
virtual circuit A logical connection between two nodes on a packet-switching network. Similar to leased lines that are permanent and virtual, except that with a virtual circuit, the customer pays only for the time the line is used. This type of
connection service is gaining importance because both frame relay and ATM use
it. See also packet switching, permanent virtual circuit (PVC).
virtual memory The space on one or more of a computer’s hard drives used by
Windows XP Professional as if it were random access memory (RAM). This space
on the hard drives is known as a paging file. The benefit of virtual memory is
being able to run more applications at one time than is possible by using just the
RAM (physical memory) on the computer.
virtual private network (VPN) Computers on a public network such as the Internet
that communicate among themselves by using encryption technology. In this way,
their messages are safe from being intercepted and understood by unauthorized
users. VPNs operate as if the computers were connected by private lines.
G-48
Glossary
virus Computer programming, or code, that hides in computer programs or on the
boot sector of storage devices such as hard disk drives and floppy disk drives. The
primary purpose of a virus is to reproduce itself as often as possible; a secondary
purpose is to disrupt the operation of the computer or the program.
Visual Effects Desktop display features that look nice but often degrade a computer’s performance.
volume set A collection of hard-disk partitions that are treated as a single partition,
thus increasing the disk space available in a single drive letter. Volume sets are created by combining between 2 and 32 areas of unformatted free space on one or
more physical drives. These spaces form one large logical volume set that is
treated like a single partition.
VPN
See virtual private network (VPN).
W
WAN
See wide area network (WAN).
WEP
See Wired Equivalent Privacy (WEP).
wide area network (WAN) A computer network that uses long-range telecommunication links to connect networked computers across long distances.
Wi-Fi Protected Access (WPA) A wireless encryption standard available in Windows XP Professional that provides increased security over the Wired Equivalent
Privacy (WEP) standard—the other encryption standard supported by Windows
XP Professional.
Windows Catalog A Web site that lists all hardware and software tested for compatibility with Windows XP by Microsoft.
Windows Firewall A software-based firewall built into Windows XP Service Pack 2
that replaces the Internet Connection Firewall built into Windows XP prior to Service Pack 2.
Windows Product Activation (WPA) The process of activating a copy of Windows
with Microsoft after installation. Windows XP Professional requires that the operating system be activated with Microsoft within 30 days of installation.
Windows Setup Manager A wizard-based program that allows you to quickly create
a script for an unattended installation of Windows XP Professional.
Windows Update An Internet-based service that allows you to download and install
updates provided by Microsoft for the Windows operating system.
Windows XP Service Pack 2 A major update to Windows XP that includes all the
critical updates released for Windows XP to date. In addition, Service Pack 2
includes a large number of new enhancements to Windows XP—enhancements
aimed at increasing the default level of security for the operating system.
Glossary
G-49
Winnt.exe The command used for starting Windows XP Professional installation in
MS-DOS and Windows 3.0/3.1.
Winnt32.exe The command used for starting Windows XP Professional installation
in Windows 95, Windows 98, Windows Me, Windows NT 4.0, or Windows 2000
Professional.
Wired Equivalent Privacy (WEP) One of two wireless encryption standards available in Windows XP Professional. WEP is the encryption standard that is specified
by the IEEE 802.11 standard. The other encryption standard available is Wi-Fi Protected Access (WPA).
workgroup A collection of computers grouped for sharing resources such as data
and peripherals over a local area network (LAN). Each workgroup is identified by
a unique name. See also domain, peer-to-peer network.
World Wide Web (WWW) Also known as the Web, the Internet multimedia service
that contains a vast storehouse of hypertext documents written in Hypertext
Markup Language (HTML). See also Hypertext Markup Language (HTML).
WORM
See Write-Once Read-Many (WORM).
WPA
See Wi-Fi Protected Access (WPA).
WPA
See Windows Product Activation (WPA).
Write-Once Read-Many (WORM) Any type of storage medium to which data can be
written only once but can be read any number of times. Typically, this is an optical
disc whose surface is permanently etched using a laser to record information.
WWW
See World Wide Web (WWW).
Z
zone A zone represents a discrete portion of the domain namespace. Zones provide
a way to partition the domain namespace into discrete manageable sections.
System Requirements
While following the practices in this book, it is recommended that you use a computer
that is not your primary workstation because you will be called on to make changes to
the operating system and application configuration. The computer you use must have
the following minimum configuration. All hardware should be listed in the Microsoft
Windows Catalog.
Hardware Requirements
■
Personal computer with an Intel Pentium 233 megahertz (MHz) or faster processor
(300 MHz or faster processor recommended)
■
64 megabytes (MB) of RAM or higher (128 MB or higher recommended)
■
1.5 gigabytes (GB) of available hard disk space
■
CD-ROM drive or DVD drive
■
Super VGA (800 x 600) or higher resolution monitor
■
Keyboard and Microsoft Mouse or compatible pointing device
Additionally, several chapters have practices that require you to have an Internet
connection.
Software Requirements
■
Microsoft Windows XP Professional Edition with Service Pack 2 (SP2)
Caution
The 180-day Evaluation Edition of Windows XP Professional with SP2 provided
with this training is not the full retail product and is provided only for the purposes of training
and evaluation. Microsoft Technical Support does not support these evaluation editions. For
additional support information regarding this book and the CD-ROMs (including answers to
commonly asked questions about installation and use), visit the Microsoft Press Technical
Support Web site at http://www.microsoft.com/learning/support/default.asp/. You can also
e-mail tkinput@microsoft.com, or send a letter to Microsoft Press, Attn: Microsoft Press
Technical Support, One Microsoft Way, Redmond, WA 98502-6399.