Table of Contents

Acknowledgments

Introduction

1 Preparing for Windows Vista Deployment

Before You Begin

Lesson 1: Overview of the Windows Deployment Process

Overview of the Deployment Life Cycle

Planning for Deployment Challenges

Lesson Summary

Lesson Review

Lesson 2: Verifying Windows Vista Hardware Requirements

Understanding Windows Vista Performance Levels

Verifying Computer Hardware Requirements

Practice: Assessing Windows Vista Hardware Readiness

Lesson Summary

Lesson Review

Lesson 3: Migrating Applications and Data

Migrating Applications to Windows Vista

Migrating Data to Windows Vista

Determining Where to Store Data

Migrating User Data with Windows Easy Transfer

Migrating User Data with the User State Migration Tool 3.0

Practice: Transferring Users by Using USMT 3.0.1

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenarios

Case Scenario 1: Performing Upgrade

Case Scenario 2: Migrating Data

Suggested Practices

Perform a Migration

Assess Network Hardware Readiness

Watch a Webcast

Perform a Virtual Lab

Take a Practice Test

2 Deploying Windows Vista

Before You Begin

Lesson 1: Understanding Windows Vista Deployment

Introduction to WIM Files

Windows Vista Deployment Tools

Lesson Summary

Lesson Review

Lesson 2: Using Windows Vista Deployment Tools

Creating Windows PE Media

Capturing a WIM File Image

Viewing WIM File Metadata

Viewing and Editing a WIM File Image Offline

Deploying a WIM File Image

Practice: Capturing and Deploying a WIM File Image

Lesson Summary

Lesson Review

Lesson 3: Designing a Network Environment

Windows Vista Deployment Methods

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenarios

Case Scenario 1: Choosing a Deployment Technology

Case Scenario 2: Preparing a Master Image

Suggested Practices

Work with WIM Files

Perform a Virtual Lab

Watch a Webcast

Take a Practice Test

3 Troubleshooting Deployment Issues

Before You Begin

Lesson 1: Resolving User Profile Compatibility Issues

Understanding User Profiles in Windows Vista

Understanding Windows Vista Folder Redirection

Configuring Folder Redirection

Practice: Configuring Roaming User Profiles and Folder Redirection

Lesson Summary

Lesson Review

Lesson 2: Configuring Application Compatibility Settings

Understanding Application Compatibility

Using Windows Vista Built-in Compatibility Tools

Alternate Hosting for Application Compatibility

Configuring Application Compatibility Diagnostics through Group Policy

Practice: Configuring Application Compatibility Diagnostics

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenarios

Case Scenario 1: Supporting Roaming Users in Windows Vista

Case Scenario 2: Configuring Application Compatibility Settings

Suggested Practices

Configure Folder Redirection

Perform a Virtual Lab

Watch a Webcast

Take a Practice Test

4 Troubleshooting Group Policy Settings

Before You Begin

Lesson 1: Group Policy Overview

What Is Group Policy?

Which Computers Can Use Group Policy?

How Are Group Policy Objects Applied in Domain Environments?

Multiple Local Group Policy Objects

Understanding Administrative Templates

Practice: Working with Local GPOs

Lesson Summary

Lesson Review

Lesson 2: Windows Vista Group Policy Settings

New Windows Vista Group Policy Settings

How to Configure Group Policy Processing

Practice: Using Domain GPOs

Lesson Summary

Lesson Review

Lesson 3: Troubleshooting Group Policy Settings

How to Manually Refresh Group Policy

How to Use the Resultant Set of Policy Tool

What Are Security Templates?

How to Use the Security Configuration And Analysis Tool

How to Use the GPResult Tool

Examining Group Policy Logs

Troubleshooting Software Restriction Policies

Troubleshooting Logon Scripts

Practice: Troubleshooting Group Policy Settings

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenarios

Case Scenario 1: Configuring a Windows Vista Computer for a Kiosk

Case Scenario 2: Troubleshooting Group Policy Objects

Suggested Practices

Troubleshoot Policy Settings

Troubleshoot Security Configuration Issues

Take a Practice Test

5 Protecting Internet Explorer and Other Applications

Before You Begin

Lesson 1: Configuring and Troubleshooting Internet Explorer Security

Internet Explorer Add-Ons

Protected Mode

How to Troubleshoot Certificate Problems

Practice: Troubleshoot Certificate Problems

Lesson Summary

Lesson Review

Lesson 2: Updating Software

Methods for Deploying Updates

How to Install Updates

How to Troubleshoot Problems Installing Updates

How to Remove Updates

Practice: Distribute Updates

Lesson Summary

Lesson Review

Lesson 3: Troubleshooting Windows Defender

How to Troubleshoot Problems Downloading Definitions

How to Identify Changes Blocked by Windows Defender

How to Work Around False Alarms

Practice: Distribute Updates and Analyze Windows Defender Problems

Lesson Summary

Lesson Review

Lesson 4: Supporting Applications

Deploying Applications

Configuring Applications and the Desktop Environment

The Microsoft Support Diagnostic Tool

Practice: Automating Software Installations

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenarios

Case Scenario 1: Unwanted Internet Explorer Add-On

Case Scenario 2: Distribute Updates

Suggested Practices

Configuring and Troubleshooting Internet Explorer

Updating Software

Troubleshoot Windows Defender issues

Take a Practice Test

6 Monitoring Client Computers

Before You Begin

Lesson 1: Monitoring Events in an Enterprise

Practice: Forward Events Between Computers

Lesson Summary

Lesson Review

Lesson 2: Troubleshooting Performance, Reliability, and Security Problems

Performance Monitor

Data Collector Sets and Reports

Reliability Monitor

Practice: Collect and Analyze Performance Data

Lesson Summary

Lesson Review

Lesson 3: Using Task Scheduler

Task Scheduler Improvements in Windows Vista

How to Create Tasks with the Task Scheduler Tool

How to Create Tasks with the SchTasks.exe Command-Line Tool

How to Manage Existing Tasks

How to Troubleshoot Problems Running Tasks

Practice: Create and Manage a Scheduled Task

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenarios

Case Scenario 1: Monitoring Kiosk Computers

Case Scenario 2: Troubleshooting Client Computer Problems

Suggested Practices

Configure and Troubleshoot Event Forwarding

Troubleshoot Performance and Reliability Issues

Configure and Manage the Task Scheduler

Take a Practice Test

7 Authenticating, Authorizing, and Auditing Access to Resources

Before You Begin

Lesson 1: Authenticating Users

What Is Authentication?

The New Windows Vista Logon Architecture

Smart Card Improvements

How to Use Credential Manager

How to Troubleshoot Authentication Issues

Practice: Save Credentials for Future Use

Lesson Summary

Lesson Review

Lesson 2: Using Encryption to Control Access to Data

Encrypting File System (EFS)

BitLocker

Practice: Encrypt and Recover Encrypted Data

Lesson Summary

Lesson Review

Lesson 3: Troubleshooting Authorization Problems and Auditing User Access

Windows Vista Auditing Enhancements

Troubleshooting Problems Related to Permissions

Practice: Identify File Permission Problems

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenarios

Case Scenario 1: Recommend Data Protection Technologies

Case Scenario 2: Troubleshoot Permission Problems

Suggested Practices

Troubleshoot Authentication Issues

Configure and Troubleshoot Access to Resources

Take a Practice Test

8 Understanding and Configuring User Account Control

Before You Begin

Lesson 1: Understanding User Account Control

What is User Account Control?

Understanding the Differences Between Standard Users and

Administrators in Windows Vista

Understanding the Windows Vista Logon

Understanding the UAC Elevation Prompts

Practice: Exploring UAC Features

Lesson Summary

Lesson Review

Lesson 2: Configuring User Account Control

Turning UAC On and Off in Control Panel

Locating UAC Policy Settings

Configuring UAC Policy Settings

Running a Command Prompt as Administrator

Practice: Configuring UAC Settings in Windows Vista

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenarios

Case Scenario 1: Configuring User Account Control

Case Scenario 2: Troubleshooting User Account Control

Suggested Practices

Explore User Account Control Policy Settings

Perform a Virtual Lab

Watch a Webcast

Take a Practice Test

9 Configuring and Troubleshooting Client Connectivity

Before You Begin

Lesson 1: Configuring Client Networking

Networking Changes in Windows Vista

How to Identify the Current Network Configuration

How to Configure IP Settings

How to Configure Sharing And Discovery

Practices: Examine and Modify Network Configuration

Lesson Summary

Lesson Review

Lesson 2: Troubleshooting Network Problems

How to Use Windows Network Diagnostics

Network Troubleshooting Tools

How to Troubleshoot Problems Connecting to Shared Folders and Printers 393

How to Troubleshoot an APIPA Address

How to Troubleshoot Name Resolution Problems

How to Troubleshoot Connectivity Problems

Practice: Troubleshoot Network Problems

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenarios

Case Scenario 1: Choosing a Network Configuration Method

Case Scenario 2: Troubleshooting a Network Problem

Suggested Practices

Configure and Troubleshoot Network Protocols

Configure and Troubleshoot Network Services at the Client

Troubleshoot Access to Network Resources

Troubleshoot Connectivity Issues

Take a Practice Test

10 Managing Network Security

Before You Begin

Lesson 1: Securing Network Traffic

What is IPSec?

How to Configure an IPSec Policy

Creating and Configuring a Connection Security Rule

Practice: Deploying IPSec Through IPSec Policies and

Connection Security Rules

Lesson Summary

Lesson Review

Lesson 2: Troubleshooting Windows Firewall

How Windows Firewall Works

Using Windows Firewall Troubleshooting Tools

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenario

Case Scenario: Troubleshooting Network Security

Suggested Practices

Deploy IPSec

Perform a Virtual Lab

Watch a Webcast

Take a Practice Test

11 Configuring and Troubleshooting Wireless Networking

Before You Begin

Lesson 1: Configuring Wireless Networking

Wireless Networking Overview

Wireless Networking Improvements

Wireless Networking Security

Connecting to Wireless Networks

Reconfiguring a Wireless Network

Practice: Connect to Wireless Networks

Lesson Summary

Lesson Review

Lesson 2: Advanced Wireless Configuration and Troubleshooting

Changing the Priorities of Wireless Networks

Creating an Ad Hoc Wireless Network

Configuring WPA-EAP Security

Configuring Wireless Network Profile Types

Troubleshooting Common Wireless Network Problems

Using Event Viewer to Analyze Wireless Connection Problems

Practice: Troubleshoot and Connect to a Wireless Network

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenarios

Case Scenario 1: Teaching a User to Connect to Wireless Networks

Case Scenario 2: Troubleshooting Problems Connecting to a

Wireless Network

Suggested Practices

Configure and Troubleshoot Wireless Networking

Take a Practice Test

12 Managing Shared Desktops

Before You Begin

Lesson 1: Managing Remote Desktop Connections

Understanding Remote Desktop

Understanding New Remote Desktop Security Features

Configuring Remote Desktop Connection

Allowing Remote Desktop Connections

Troubleshooting Remote Desktop

Practice: Implementing and Troubleshooting Remote Desktop

Lesson Summary

Lesson Review

Lesson 2: Offering Remote Assistance

Enabling Remote Assistance

Requesting Remote Assistance

Offering Unsolicited Remote Assistance

Establishing the Remote Assistance Session

Windows Remote Assistance Compatibility Issues

Practice: Offering Remote Assistance

Lesson Summary

Lesson Review

Chapter Review

Chapter Summary

Key Terms

Case Scenarios

Case Scenario 1: Configuring Remote Desktop

Case Scenario 2: Offering Remote Assistance

Suggested Practices

Enable Remote Desktop Remotely

Offer Unsolicited Remote Assistance

Accept a Remote Assistance Request from a Friend

Take a Practice Test

Answers

Glossary

Index

 

 

© Microsoft. All Rights Reserved.