Table of Contents
Acknowledgments
Introduction
1 Preparing for Windows Vista Deployment
Before You Begin
Lesson 1: Overview of the Windows Deployment Process
Overview of the Deployment Life Cycle
Planning for Deployment Challenges
Lesson Summary
Lesson Review
Lesson 2: Verifying Windows Vista Hardware Requirements
Understanding Windows Vista Performance Levels
Verifying Computer Hardware Requirements
Practice: Assessing Windows Vista Hardware Readiness
Lesson Summary
Lesson Review
Lesson 3: Migrating Applications and Data
Migrating Applications to Windows Vista
Migrating Data to Windows Vista
Determining Where to Store Data
Migrating User Data with Windows Easy Transfer
Migrating User Data with the User State Migration Tool 3.0
Practice: Transferring Users by Using USMT 3.0.1
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Performing Upgrade
Case Scenario 2: Migrating Data
Suggested Practices
Perform a Migration
Assess Network Hardware Readiness
Watch a Webcast
Perform a Virtual Lab
Take a Practice Test
2 Deploying Windows Vista
Before You Begin
Lesson 1: Understanding Windows Vista Deployment
Introduction to WIM Files
Windows Vista Deployment Tools
Lesson Summary
Lesson Review
Lesson 2: Using Windows Vista Deployment Tools
Creating Windows PE Media
Capturing a WIM File Image
Viewing WIM File Metadata
Viewing and Editing a WIM File Image Offline
Deploying a WIM File Image
Practice: Capturing and Deploying a WIM File Image
Lesson Summary
Lesson Review
Lesson 3: Designing a Network Environment
Windows Vista Deployment Methods
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Choosing a Deployment Technology
Case Scenario 2: Preparing a Master Image
Suggested Practices
Work with WIM Files
Perform a Virtual Lab
Watch a Webcast
Take a Practice Test
3 Troubleshooting Deployment Issues
Before You Begin
Lesson 1: Resolving User Profile Compatibility Issues
Understanding User Profiles in Windows Vista
Understanding Windows Vista Folder Redirection
Configuring Folder Redirection
Practice: Configuring Roaming User Profiles and Folder Redirection
Lesson Summary
Lesson Review
Lesson 2: Configuring Application Compatibility Settings
Understanding Application Compatibility
Using Windows Vista Built-in Compatibility Tools
Alternate Hosting for Application Compatibility
Configuring Application Compatibility Diagnostics through Group Policy
Practice: Configuring Application Compatibility Diagnostics
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Supporting Roaming Users in Windows Vista
Case Scenario 2: Configuring Application Compatibility Settings
Suggested Practices
Configure Folder Redirection
Perform a Virtual Lab
Watch a Webcast
Take a Practice Test
4 Troubleshooting Group Policy Settings
Before You Begin
Lesson 1: Group Policy Overview
What Is Group Policy?
Which Computers Can Use Group Policy?
How Are Group Policy Objects Applied in Domain Environments?
Multiple Local Group Policy Objects
Understanding Administrative Templates
Practice: Working with Local GPOs
Lesson Summary
Lesson Review
Lesson 2: Windows Vista Group Policy Settings
New Windows Vista Group Policy Settings
How to Configure Group Policy Processing
Practice: Using Domain GPOs
Lesson Summary
Lesson Review
Lesson 3: Troubleshooting Group Policy Settings
How to Manually Refresh Group Policy
How to Use the Resultant Set of Policy Tool
What Are Security Templates?
How to Use the Security Configuration And Analysis Tool
How to Use the GPResult Tool
Examining Group Policy Logs
Troubleshooting Software Restriction Policies
Troubleshooting Logon Scripts
Practice: Troubleshooting Group Policy Settings
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Configuring a Windows Vista Computer for a Kiosk
Case Scenario 2: Troubleshooting Group Policy Objects
Suggested Practices
Troubleshoot Policy Settings
Troubleshoot Security Configuration Issues
Take a Practice Test
5 Protecting Internet Explorer and Other Applications
Before You Begin
Lesson 1: Configuring and Troubleshooting Internet Explorer Security
Internet Explorer Add-Ons
Protected Mode
How to Troubleshoot Certificate Problems
Practice: Troubleshoot Certificate Problems
Lesson Summary
Lesson Review
Lesson 2: Updating Software
Methods for Deploying Updates
How to Install Updates
How to Troubleshoot Problems Installing Updates
How to Remove Updates
Practice: Distribute Updates
Lesson Summary
Lesson Review
Lesson 3: Troubleshooting Windows Defender
How to Troubleshoot Problems Downloading Definitions
How to Identify Changes Blocked by Windows Defender
How to Work Around False Alarms
Practice: Distribute Updates and Analyze Windows Defender Problems
Lesson Summary
Lesson Review
Lesson 4: Supporting Applications
Deploying Applications
Configuring Applications and the Desktop Environment
The Microsoft Support Diagnostic Tool
Practice: Automating Software Installations
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Unwanted Internet Explorer Add-On
Case Scenario 2: Distribute Updates
Suggested Practices
Configuring and Troubleshooting Internet Explorer
Updating Software
Troubleshoot Windows Defender issues
Take a Practice Test
6 Monitoring Client Computers
Before You Begin
Lesson 1: Monitoring Events in an Enterprise
Practice: Forward Events Between Computers
Lesson Summary
Lesson Review
Lesson 2: Troubleshooting Performance, Reliability, and Security Problems
Performance Monitor
Data Collector Sets and Reports
Reliability Monitor
Practice: Collect and Analyze Performance Data
Lesson Summary
Lesson Review
Lesson 3: Using Task Scheduler
Task Scheduler Improvements in Windows Vista
How to Create Tasks with the Task Scheduler Tool
How to Create Tasks with the SchTasks.exe Command-Line Tool
How to Manage Existing Tasks
How to Troubleshoot Problems Running Tasks
Practice: Create and Manage a Scheduled Task
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Monitoring Kiosk Computers
Case Scenario 2: Troubleshooting Client Computer Problems
Suggested Practices
Configure and Troubleshoot Event Forwarding
Troubleshoot Performance and Reliability Issues
Configure and Manage the Task Scheduler
Take a Practice Test
7 Authenticating, Authorizing, and Auditing Access to Resources
Before You Begin
Lesson 1: Authenticating Users
What Is Authentication?
The New Windows Vista Logon Architecture
Smart Card Improvements
How to Use Credential Manager
How to Troubleshoot Authentication Issues
Practice: Save Credentials for Future Use
Lesson Summary
Lesson Review
Lesson 2: Using Encryption to Control Access to Data
Encrypting File System (EFS)
BitLocker
Practice: Encrypt and Recover Encrypted Data
Lesson Summary
Lesson Review
Lesson 3: Troubleshooting Authorization Problems and Auditing User Access
Windows Vista Auditing Enhancements
Troubleshooting Problems Related to Permissions
Practice: Identify File Permission Problems
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Recommend Data Protection Technologies
Case Scenario 2: Troubleshoot Permission Problems
Suggested Practices
Troubleshoot Authentication Issues
Configure and Troubleshoot Access to Resources
Take a Practice Test
8 Understanding and Configuring User Account Control
Before You Begin
Lesson 1: Understanding User Account Control
What is User Account Control?
Understanding the Differences Between Standard Users and
Administrators in Windows Vista
Understanding the Windows Vista Logon
Understanding the UAC Elevation Prompts
Practice: Exploring UAC Features
Lesson Summary
Lesson Review
Lesson 2: Configuring User Account Control
Turning UAC On and Off in Control Panel
Locating UAC Policy Settings
Configuring UAC Policy Settings
Running a Command Prompt as Administrator
Practice: Configuring UAC Settings in Windows Vista
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Configuring User Account Control
Case Scenario 2: Troubleshooting User Account Control
Suggested Practices
Explore User Account Control Policy Settings
Perform a Virtual Lab
Watch a Webcast
Take a Practice Test
9 Configuring and Troubleshooting Client Connectivity
Before You Begin
Lesson 1: Configuring Client Networking
Networking Changes in Windows Vista
How to Identify the Current Network Configuration
How to Configure IP Settings
How to Configure Sharing And Discovery
Practices: Examine and Modify Network Configuration
Lesson Summary
Lesson Review
Lesson 2: Troubleshooting Network Problems
How to Use Windows Network Diagnostics
Network Troubleshooting Tools
How to Troubleshoot Problems Connecting to Shared Folders and Printers 393
How to Troubleshoot an APIPA Address
How to Troubleshoot Name Resolution Problems
How to Troubleshoot Connectivity Problems
Practice: Troubleshoot Network Problems
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Choosing a Network Configuration Method
Case Scenario 2: Troubleshooting a Network Problem
Suggested Practices
Configure and Troubleshoot Network Protocols
Configure and Troubleshoot Network Services at the Client
Troubleshoot Access to Network Resources
Troubleshoot Connectivity Issues
Take a Practice Test
10 Managing Network Security
Before You Begin
Lesson 1: Securing Network Traffic
What is IPSec?
How to Configure an IPSec Policy
Creating and Configuring a Connection Security Rule
Practice: Deploying IPSec Through IPSec Policies and
Connection Security Rules
Lesson Summary
Lesson Review
Lesson 2: Troubleshooting Windows Firewall
How Windows Firewall Works
Using Windows Firewall Troubleshooting Tools
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenario
Case Scenario: Troubleshooting Network Security
Suggested Practices
Deploy IPSec
Perform a Virtual Lab
Watch a Webcast
Take a Practice Test
11 Configuring and Troubleshooting Wireless Networking
Before You Begin
Lesson 1: Configuring Wireless Networking
Wireless Networking Overview
Wireless Networking Improvements
Wireless Networking Security
Connecting to Wireless Networks
Reconfiguring a Wireless Network
Practice: Connect to Wireless Networks
Lesson Summary
Lesson Review
Lesson 2: Advanced Wireless Configuration and Troubleshooting
Changing the Priorities of Wireless Networks
Creating an Ad Hoc Wireless Network
Configuring WPA-EAP Security
Configuring Wireless Network Profile Types
Troubleshooting Common Wireless Network Problems
Using Event Viewer to Analyze Wireless Connection Problems
Practice: Troubleshoot and Connect to a Wireless Network
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Teaching a User to Connect to Wireless Networks
Case Scenario 2: Troubleshooting Problems Connecting to a
Wireless Network
Suggested Practices
Configure and Troubleshoot Wireless Networking
Take a Practice Test
12 Managing Shared Desktops
Before You Begin
Lesson 1: Managing Remote Desktop Connections
Understanding Remote Desktop
Understanding New Remote Desktop Security Features
Configuring Remote Desktop Connection
Allowing Remote Desktop Connections
Troubleshooting Remote Desktop
Practice: Implementing and Troubleshooting Remote Desktop
Lesson Summary
Lesson Review
Lesson 2: Offering Remote Assistance
Enabling Remote Assistance
Requesting Remote Assistance
Offering Unsolicited Remote Assistance
Establishing the Remote Assistance Session
Windows Remote Assistance Compatibility Issues
Practice: Offering Remote Assistance
Lesson Summary
Lesson Review
Chapter Review
Chapter Summary
Key Terms
Case Scenarios
Case Scenario 1: Configuring Remote Desktop
Case Scenario 2: Offering Remote Assistance
Suggested Practices
Enable Remote Desktop Remotely
Offer Unsolicited Remote Assistance
Accept a Remote Assistance Request from a Friend
Take a Practice Test
Answers
Glossary
Index
© Microsoft. All Rights Reserved.