Index

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W

Symbols

32-bit options, 22

64-bit options, 22–23

A

accepting license terms, 53

accessing display settings, 81–83

from the Desktop, 82–83

using Control Panel, 81–82

accessing shared files and folders, 415–416

activity reports, reviewing, 328–330

configuring activity reporting, 329

viewing activity reports, 329–330

ad hoc network connections, 397–398

adding an extender to Windows Media Center, 181

adding and configuring gadgets

Windows Sidebar, 112–113

adding folders to Windows Photo Gallery, 167

adding network, wireless, or Bluetooth printers, 469

adding user accounts, 253–254

adjusting visual effects, 239

advanced settings, Windows Mail, 130–131

adware, 531

Aero. See Windows Aero

Alt+Tab, 96

antivirus options, changing, 298–299

antivirus products, evaluating, 298

application compatibility, troubleshooting, 67–70

using Program Compatibility Wizard, 68–69

using software compatibility modes, 69–70

application restrictions, managing, 327–328

applications, monitoring, 201–202

associating file types with specific programs, 185

automatic updating, 293–296

AutoPlay settings, 187

B

Backup and Restore Center, 557–580

backups using the Internet, 561

choosing backup destinations, 560–561

lesson review, 579–580

lesson summary, 579

performing file backups, 562–569

planning for backups, 558–561

practice, 577–579

protecting backup data, 561

real-world example, 559–560

reasons for performing backups, 558

restoring files from a backup, 569–573

scheduling backups, 559

selecting files for backup, 558–559

using previous versions of files, 573–577

backup destinations, 560–561

external hard disk drives, 561

hard disks, 560

network devices, 561

removable media, 561

removable memory devices, 561

base operating system, 4

baseline, establishing, 222

blocking e-mails based on regional encoding settings, 135. See also e-mail

Bluetooth, 477

Bluetooth printers, 469

Boot Logging, 514

bottlenecks, identifying, 222

burning, 162

C

Calendar. See Windows Calendar

case scenarios

adding a new computer to a network, 406

choosing folder sharing options, 446

configuring media devices and features, 492

configuring Web browser security, 361

configuring Windows Mail, 193

configuring Windows Sidebar, 116

customizing desktop, 116

diagnosing and troubleshooting startup problems, 551

disk partitioning, 76

evaluating restore options, 593–594

evaluating upgrade options, 34

evaluating Windows Vista installation options, 76

managing mobile devices, 492

managing wireless network connections, 407

monitoring performance, 245

optimizing performance, 245

troubleshooting security issues with Windows Security Center, 307

using parental controls, 361

verifying compatibility, 34–35

working with public folder sharing, 446

working with Windows Defender, 552

working with Windows Media Center, 193

CD/DVD boot issues

troubleshooting, 47

centrally managing advanced user settings, 258

changing AutoPlay settings, 187

changing passwords, 255–256

checking for encrypted files, 437

choosing desktop background, 92–93

choosing installation location, 55

choosing installation type, 54–55

choosing language and preference settings, 50–51

clean installations, 40–41

practice, 63

client network services, 371–375

DHCP, 372–373

Domain Name System (DNS), 373–374

firewalls, 374–375

codecs, installing, 165

color

color intensity, 89

color mixer, 89

color scheme, 90, 93–94

window color and appearance, 90

Windows Aero, 88

color depth, 17

color intensity

Windows Aero, 89

color mixer

Windows Aero, 89

color scheme, 93–94

High Contrast, 94

Windows Aero, 90, 94

Windows Classic, 94

Windows Standard, 94

Windows Vista Basic, 94

colors, 84

common features to editions, 3–4

base operating system, 4

hardware support, 4

integrated search, 4

parental controls, 4

security, 4

software compatibility, 4

comparing consumer editions, 4–8

summary of features, 7–8

Window Vista Home Basic, 5

Windows Vista Business, 6

Windows Vista Home Premium, 5–6

Windows Vista Ultimate, 6–7

comparing editions, 3–13

comparing user permissions, 251–252

compatibility, 19–22. See also application compatibility; hardware compatibility; system compatibility

hardware devices, 19–20

real-world example, 21–22

software, 20–21

testing, 30

verifying compatibility, 42

completing configuration process, 60–61

computer location, selecting, 60

home, 60

public location, 60

work, 60

computer name, configuring, 58

computer settings, verifying, 437–438

computer time limits, defining, 322–323

configuration process, completing, 60–61

configuring computer name and desktop background, 58

configuring computer names and related settings, 416–417

configuring device settings, 454

configuring file and folder sharing, 420–426

configuring file sharing, 422–425

configuring gadget settings

Windows Sidebar, 108–109

configuring game settings, 323–327

configuring junk e-mail settings, 132–135

configuring list of blocked top-level domains, 134. See also e-mail

configuring malware protection, 297–301

configuring message rules, Windows Mail, 135–136

configuring network connections, 375–384

creating a new network connection, 383–384

managing network settings, 375–376

manually configuring TCP/IP settings, 381–383

modifying network settings, 378–379

setting network location details, 380–381

viewing network information, 376–378

configuring network discovery, 415–418

configuring password-protected sharing, 422

configuring properties

Windows Sidebar, 103–104

configuring RSS feeds

Windows Sidebar, 110–112

configuring startup items with MSConfig, 225–226

configuring theme settings, 91–92

configuring TV tuner for Windows Media Center, 178–179

configuring user accounts, 254–255

configuring Windows ad hoc network connections, 397–398

configuring Windows Aero and desktop settings, 81–100

accessing display settings, 81–83

configuring other display options, 91–94

customizing options, 88–89

desktop usability enhancements, 95–96

enabling, 88

features, 86–87

managing Windows display settings, 83–86

troubleshooting, 89–91

working with windows display settings, 81–86

configuring Windows features, 230–231

configuring Windows Firewall, 288–292

managing firewall settings, 289–292

understanding inbound filtering, 289

understanding outbound filtering, 289

configuring Windows Mail for e-mail, 123–131

advanced settings, 130–131

creating e-mail accounts, 125–128

importing and exporting accounts, 131

preparing to create e-mail accounts, 124

troubleshooting e-mail account issues, 128–129

Web-based e-mail vs. Windows Mail, 124

configuring Windows ReadyBoost, 231–233

configuring Windows Update settings, 58

configuring wireless networks, 395–401

connecting to wireless networks, 395–397

connectivity, verifying, 438

cookies, 342–343

CPU options, 22–23

comparing 32- and 64-bit options, 22–23

multiple CPUs and cores, 23

creating e-mail accounts, 125–128

customizing window layout, Windows Mail, 136

D

Data Collector Sets, 210–212

LAN Diagnostics, 210

running, 211

System Diagnostics, 210

System Performance, 211

viewing reports, 211–212

Wireless Diagnostics, 211

default e-mail folders, 131–132. See also e-mail

Deleted Items, 131

Drafts, 131

Inbox, 131

Junk E-mail, 132

Outbox, 131

Sent Items, 131

default gadgets, 104–106

calendar, 105

clock, 105

contacts, 105

CPU meter, 105

currency, 105

feed headlines, 105

notes, 105

picture puzzle, 105

slide show, 105

stocks, 105

weather, 105

default programs, setting, 183–185

defining computer time limits, 322–323

defining Web restrictions, 315–320

defragmentation. See disk defragmentation

Deleted Items folder, 131

desktop background

choosing, 92–93

configuring, 58

desktop settings, configuring, 81–100

accessing display settings, 81–83

configuring other display options, 91–94

customizing options, 88–89

desktop usability enhancements, 95–96

enabling, 88

features, 86–87

managing Windows display settings, 83–86

troubleshooting, 89–91

working with windows display settings, 81–86

desktop theme settings

Windows Aero, 90

desktop usability enhancements, 95–96

Alt+Tab, 96

live Taskbar previews, 96

using Flip 3D, 95

detecting hardware, 454

developing performance-optimization approach, 221–223

device drivers

installing, 62

managing, 455–456

obtaining, 66–67

updating, 65–66

Device Manager, 453

device settings, configuring, 454

DHCP, 372–373

digital cameras, 458–459

installing, 457–458

using, 458–459

disk defragmentation, 237–238

disk performance, optimizing, 235–238

disk cleanup, 236–237

disk defragmentation, 237–238

display configuration settings, 90–91

Display Driver Model support. See Windows Display Driver Model support

display hardware, 89

display settings

Windows Aero, 90

display settings, accessing, 81–83

from the Desktop, 82–83

using Control Panel, 81–82

display settings, managing, 83–86

colors, 84

multiple monitors, 85

resolution, 84

screen refresh rate, 84–85

Domain Name System (DNS), 373–374

downloading and installing new gadgets

Windows Sidebar, 109

Drafts folder, 131

E

editing movies, 173

editions

base operating system, 4

choosing, 11

common features, 3–4

hardware support, 4

integrated search, 4

lesson review, 12–13

lesson summary, 12

parental controls, 4

security, 4

software compatibility, 4

understanding, 3–9

Windows Vista Enterprise, 9–10

Windows Vista Starter, 10

editions, consumer, 4–8

summary of features, 7–8

Window Vista Home Basic, 5

Windows Vista Business, 6

Windows Vista Home Premium, 5–6

Windows Vista Ultimate, 6–7

e-mail, 123–137. See also default e-mail folders; Windows Mail

advanced settings, 130–131

configuring junk e-mail settings, 132–135

configuring message rules, 135–136

creating e-mail accounts, 125–128

customizing window layout, 136

default mail folders, 131–132

importing and exporting accounts, 131

preparing to create e-mail accounts, 124

troubleshooting e-mail account issues, 128–129

understanding default Mail folders, 131–132

user interface, 123–124

Web-based e-mail vs. Windows Mail, 124

e-mailing photos, 170

enable transparency

Windows Aero, 89

encrypted files, 437

enhanced window management buttons, 87

establishing a baseline, 222

evaluating an upgrade to Windows Vista, 23–30

evaluating gadgets

Windows Sidebar, 110

evaluating hardware configurations, 35

evaluating printer costs, 467

evaluating software and hardware compatibility, 19–22

real-world example, 21–22

software, 20–21

evaluating upgrade requirements, 11–12

Event Log, 229

Event Viewer, 498

viewing events by event type, 499–500

viewing specific event logs, 500–501

F

Feed Headlines gadget

adding, 111

feed options, 111–112

RSS and, 111

file and printer sharing, troubleshooting, 434–444

checking for encrypted files, 437

lesson review, 443–444

lesson summary, 443

practice, 442

real-world example, 440–441

resource sharing issues, 434–437

shared folder permissions, 435–436

testing shared resources on local computer, 439

troubleshooting network-related sharing issues, 437–440

verifying computer settings, 437–438

verifying file system permissions, 436–437

verifying firewall configuration, 439–440

verifying network connectivity, 438

verifying shared resource settings, 434–435

verifying sharing and discovery settings, 434

file associations, managing and troubleshooting, 182–187

associating file types with specific programs, 185

changing AutoPlay settings, 187

setting default programs, 183–185

using set program access and computer defaults, 185–187

file system permissions, verifying, 436–437

firewalls, 288–292, 374–375

managing firewall settings, 289–292

understanding inbound filtering, 289

understanding outbound filtering, 289

verifying configuration, 439–440

fixing photos in Windows Photo Gallery, 169

Flip 3D, 95

G

gadgets

add Feed Headlines gadget, 111

adding, 106–107

adding and configuring, 112

attaching, detaching, and arranging, 106

configuring Feed Headlines options, 111–112

configuring settings, 108–109

default, 104–106

downloading and installing new, 109

evaluating, 110

managing, 104–108

removing, 107–108

using through the Web, 104

Windows Sidebar and, 205

gadgets for Windows Sidebar, 205

gadgets, default, 104–106

calendar, 105

clock, 105

contacts, 105

CPU meter, 105

currency, 105

feed headlines, 105

notes, 105

picture puzzle, 105

slide show, 105

stocks, 105

weather, 105

game settings, configuring, 323–327

allowing and blocking specific games, 326–327

choosing a game rating system, 323–324

defining game restrictions, 324–326

managing access to games, 327

H

hard disk, partitioning, 43–44

hardware compatibility, troubleshooting, 65–67

obtaining device drivers, 66

updating device drivers, 65–66

hardware configurations, 35

hardware device compatibility, 19–20

real-world example, 21–22

software, 20–21

hardware devices, 452–456

configuring device settings, 454

detecting hardware, 454

Device Manager, 453

managing device drivers, 455–456

hardware pixel shader 2.0 support, 17

hardware-related changes

Windows Aero, 90

High Contrast

color scheme, 94

I

identifying bottlenecks, 222

IMAP

Windows Mail and, 126

implementing a change, 222

importing and exporting e-mail accounts, 131

importing files in Windows Photo Gallery, 168

Inbox folder, 131

indexing options, managing, 239–240

infrared connections, 477

initial setup, Windows Media Center, 177–178

in-place upgrades, 41–42

practice, 62

starting, 47

installation, 46–64

accepting license terms, 53

choosing installation location, 55

choosing installation type, 54–55

choosing language and preference settings, 50–51

lesson review, 45, 64

lesson summary, 44–45, 64

monitoring installation progress, 56–57

performing Windows Vista installation, 48–57

postinstallation configuration, 57–61

providing product key, 51–53

real-world example, 49

starting a clean installation, 46–47

starting an in-place upgrade, 47–48

starting installation process, 49–50

troubleshooting CD/DVD boot issues, 47

verifying upgrade edition requirements, 46

installation, preparing for, 39

installation, understanding, 39–42

clean installations, 40–41

in-place upgrades, 41–42

supported installation types, 40

Windows Easy Transfer, 41

installing and managing printers, 466–471

installing local printers, 467–468

installing scanners and cameras, 457–458

Internet Explorer 7, securing

accessing configuration options, 336

configuring privacy settings, 342–346

configuring security levels, 339–340

cookies, 342–343

deleting browsing history, 355

Internet Explorer Information Bar, 352–353

lesson review, 359

lesson summary, 358

maintaining Web security, 336

managing add-ons, 355

managing browser security settings, 337–341

managing privacy settings, 343–344

managing zone settings, 338–339

phishing filter, 347–350

pop-up blocker, 346

practice, 357–358

real-world example, 351–352

resetting Internet Explorer settings, 355–356

summarizing default security settings, 341

understanding certificates, 353–354

understanding protected mode, 341

understanding zone types, 338

using secure connections, 353

working with, 335–336

Internet Explorer Content Advisor

Web restrictions, defining, 320

Internet Explorer Information Bar, 352–353

Internet Explorer, troubleshooting, 543–546

deleting browser history, 544

managing add-ons, 544–545

resetting IE options, 545–546

IP configuration, 386

IPv4, 367–369

default gateways, 368

IP addresses, 367

managing settings, 369

subnets, 367–368

IPv6, 369–371

performance enhancements, 370

security improvements, 370

simplified configuration, 370

support for more addresses, 369

understanding IPv6 addresses, 371

understanding IPv6 support in Windows Vista, 370

isolating performance issues, 206–207

J

Junk E-mail folder, 132

Junk E-mail settings, 132–135. See also e-mail

blocking e-mails based on regional encoding settings, 135

configuring list of blocked top-level domains, 134

High, 133

International options, 134

Low, 132

No Automatic Filtering, 132

Safe List Only, 133

K

keyboard shortcuts, 96–97

Task Manager, 201

L

LAN Diagnostics, 210

language and preference settings, 50–51

Last Known Good Configuration, 515

legacy applications, 90

lesson review, 243

Backup and Restore Center, 579–580

malware, removing, 549

media devices, installing and managing, 474–475

mobile devices, 490

network protocols and client network services, 389–390

network sharing, 432–433

Parental Controls, 333–334

Performance Monitor, 220

upgrading, 31–32

user accounts, 261

Windows Sidebar, 113–114

Windows Vista editions, 12–13

Windows Vista, diagnosing issues in, 529

wireless networking, 404

lesson summary, 242

Backup and Restore Center, 579

malware, removing, 548

media devices, installing and managing, 474

mobile devices, 488

network protocols and client network services, 389

network sharing, 432

Parental Controls, 333

Performance Monitor, 219–220

upgrading, 31

user accounts, 260

Windows Sidebar, 113

Windows Vista editions, 12

Windows Vista, diagnosing issues in, 528

wireless networking, 403–404

license terms, 53

live Taskbar previews, 96

logos, 22

look and feel enhancements, 87

M

malware protection, 297–301

changing antivirus options, 298–299

evaluating antivirus products, 298

Windows Defender, 299–30

malware, removing, 530–550

adware, 531

common malware issues, 530–533

effects of malware installation, 533

keeping up with security details, 547–548

lesson review, 549

lesson summary, 548

preventing malware installations, 530

real-world example, 533–534

reinstalling Windows Vista, 547

responding to alerts, 537–538

root kits, 531

scanning for, 536–537

sources of malware, 532

spyware, 531

troubleshooting Internet Explorer, 543–546

types of malware, 531–532

uninstalling programs, 547–548

viruses, 531

Windows Defender, 534–543

managing and troubleshooting file associations, 182–187

managing application restrictions, 327–328

managing device drivers, 455–456

managing gadgets

Windows Sidebar, 104–108

managing indexing options, 239–240

managing network discovery options, 418

managing printer settings, 469–470

managing privacy settings, 343–344

managing services, 233–235

Description, 234

Log On As, 235

Name, 234

Startup Type, 235

Status, 234

viewing service configuration information, 234–235

managing shared folders, 426

managing startup programs, 224–228

managing startup programs with Windows Defender, 226–228

managing user accounts, 249–261

adding user accounts, 253–254

centrally managing advanced settings, 258

changing passwords, 255–256

comparing user permissions, 251–252

configuring user accounts, 254–255

lesson review, 261

lesson summary, 260

performing advanced configuration, 256–258

practice, 259–260

understanding user account types, 249–251

managing user profile types, 401

managing Windows Features, 121–122

managing wireless network connections, 399–401

mapping network drives, 414

measuring performance, 222

media devices, installing and managing, 451–475

configuring device settings, 454

detecting hardware, 454

hardware devices, 452–456

installing and managing printers, 466–471

installing scanners and cameras, 457–458

lesson review, 474–475

lesson summary, 474

managing device drivers, 455–456

practice, 472–474

real-world example, 451

scanners and digital cameras, 457–459

using Device Manager, 453

using digital cameras, 458–459

using scanners, 458

using Windows fax and scan, 459–466

media library sharing, 428–429

Media Player. See Windows Media Player

Meeting Space. See Windows Meeting Space

memory, 16

Memory Diagnostics Tool, 505–509

performing memory diagnostic tests, 507–509

starting, 505–507

viewing results, 509

Microsoft SpyNet, 540–541

mobile devices, 476–490

Bluetooth, 477

infrared connections, 477

installing, 477–478

lesson review, 490

lesson summary, 488

practice, 488–490

serial cables, 477

Sync Center, 481–488

USB connections, 477

Windows Mobile Device Center, 478

Windows Mobility Center, 479–481

wireless network connections, 477

working with, 476–478

monitoring applications, 201–202

monitoring installation progress, 56–57

monitoring performance, 204–205

monitoring processes, Task Manager, 202–203

CPU, 203

Description, 203

Image Name, 203

Image Path Name, 203

Memory, 203

User Name, 203

monitoring services, 203–204

monitoring system resource usage, 218

MSConfig, 225–226

Command, 225

configuring startup options with, 515–517

Date Disabled, 225

Location, 225

Manufacturer, 225

Startup Item, 225

multiboot installation, 43

virtual machines vs. multiboot, 43

multifunction printers, 467

multiple CPUs and cores, 23

multiple monitors

configuring display settings for, 85

N

NETSH, 387

network connections

configuring, 375–384

troubleshooting, 384–385

network connectivity, verifying, 438

network discovery options, 418

network drives, mapping, 414

network locations, 411–413

network paths, 413

network printers, 466

network protocols and client network services, 365–390

client network services, 371–375

configuring network connections, 375–384

IPv4, 367–369

IPv6, 369–371

lesson review, 389–390

lesson summary, 389

next generation TCP/IP stack, 365–367

practice, 387–389

troubleshooting network connections, 384–385

using network troubleshooting tools, 385–387

network sharing, 411–433

accessing shared files and folders, 415–416

configuring computer names and related

settings, 416–417

configuring file and folder sharing, 420–426

configuring file sharing, 422–425

configuring network discovery, 415–418

configuring password-protected sharing, 422

lesson review, 432–433

lesson summary, 432

managing network discovery options, 418

managing shared folders, 426

mapping network drives, 414

media library sharing, 428–429

network locations, 411–413

network paths, 413

printer sharing, 426–427

public folder sharing, 420–422

sharing data with other operating systems, 420

working with network resources, 411–414

network troubleshooting tools, 385–387

NETSH, 387

PING, 386

Windows IP configuration, 386

newsgroups

accessing in Windows Mail, 154–155

configuring accounts, 138–140

reading and posting messages, 141–142

subscribing to, 140

using Windows Mail to access, 138–142

next generation TCP/IP stack, 365–367

automatic configuration, 366

diagnostic features, 366

dynamic reconfiguration, 366

extensibility, 366

improved security, 366

performance enhancements, 366

support for multiple versions of the IP, 366

O

obtaining, 176

optimizing disk performance, 235–238

disk cleanup, 236–237

disk defragmentation, 237–238

Outbox folder, 131

P

Parental Controls, 311–334

configuring game settings, 323–327

configuring user accounts, 312–313

defining computer time limits, 322–323

defining Web restrictions, 315–320

enabling, 313–314

lesson review, 333–334

lesson summary, 333

managing application restrictions, 327–328

practice, 331–333

real-world example, 314–315

reviewing activity reports, 328–330

understanding, 311–314

partitioning hard disk, 43–44

password-protected sharing, configuring, 422

passwords, changing, 255–256

performance information and tools, using, 223–224

performance issues, isolating, 206–207

Performance Monitor, 208–210

power of, 210

performance optimization process, repeating, 222–223

performance, measuring, 222

performance, monitoring, 204–205

performance-optimization approach, 221–223

performing advanced user account configuration, 256–258

performing Windows Vista installation, 48–57

phishing filter, 347–350

detecting phishing attempts, 347–348

manually verifying and reporting Web sites, 350

testing phishing functionality, 348

using options, 349

PING, 386

POP3

Windows Mail and, 126

pop-up blocker, 346

postinstallation configuration, 57–61

completing configuration process, 60–61

configuring computer name and desktop background, 58

configuring Windows Update settings, 58

providing user name info, 57

reviewing time and date settings, 59

selecting computer’s location, 60

preparing to create e-mail accounts, 124

printer sharing, 426–427

printers, installing and managing, 466–471

adding network, wireless, or Bluetooth printers, 469

evaluating printer costs, 467

installing local printers, 467–468

managing printer settings, 469–470

multifunction devices, 467

network printers, 466

sharing printers, 470–471

wired printers, 466

wireless printers, 466–467

privacy settings, managing, 343–344

Problem Reports and Solutions, 522–525

processes, monitoring, 202–203

product keys, 51–53

Program Compatibility Wizard, 68–69

locating or selecting program, 68–69

security settings, 69

selecting compatibility mode, 69

selecting display settings, 69

providing product key, 51–53

providing user name info, 57

public folder sharing, 420–422

publishing movies

Digital Video Camera, 175

DVD, 175

E-mail, 175

Recordable CD, 175

This Computer, 174

R

ReadyBoost. See Windows ReadyBoost

recommending wireless devices, 394

refresh rate

Windows Aero, 90

RegEdit, 521–522

reinstalling Windows Vista, 71

Reliability Monitor, 207–208

removing malware, 530–550

adware, 531

common malware issues, 530–533

effects of malware installation, 533

keeping up with security details, 547–548

lesson review, 549

lesson summary, 548

preventing malware installations, 530

real-world example, 533–534

reinstalling Windows Vista, 547

responding to alerts, 537–538

root kits, 531

scanning for, 536–537

sources of malware, 532

spyware, 531

troubleshooting Internet Explorer, 543–546

types of malware, 531–532

uninstalling programs, 547–548

viruses, 531

Windows Defender, 534–543

repair and reinstallation, 43

repairing Windows Vista, 517–520

accessing system repair options, 517–518

Startup Repair, 519–520

using command prompt, 520

repeating performance optimization process, 222–223

resolution, 84

Resource Monitor, 205–206

resource sharing issues, 434–437

reviewing activity reports, 328–330

reviewing time and date settings, 59

ripping, 162

root kits, 531

RSS, 110–112

defined, 110

Feed Headlines gadget, 111

understanding, 110

running Data Collector Sets, 211

running legacy applications

Windows Aero, 90

S

Safe Mode, 511–513

scanners, 458

installing, 457–458

using, 458

scanners and digital cameras, 457–459

screen refresh rate, 84–85

secure connections, 353

Security Center. See Windows Security Center

security options, wireless, 393–395

security settings, 249–261

adding user accounts, 253–254

additional security features, 267–270

Admin Approval mode, 266

Admin Approval mode for the built-in administrator account, 274

behavior of the elevation prompt for administrators, 274

centrally managing advanced settings, 258

changing passwords, 255–256

common security risks and threats, 262–263

comparing user permissions, 251–252

configuring user accounts, 254–255

detect application installations and prompt for elevation, 275

enabling and disabling, 270–271

lesson review, 279

lesson summary, 278

managing settings with Local Security Policy, 271–276

only elevate executables that are signed and validated, 275

only elevate UIAccess applications that are installed in secure locations, 275

performing advanced configuration, 256–258

practice, 259–260

real-world example, 264

run all administrators in Admin Approval mode, 274

standard user mode, 265–266

switch to the secure desktop when prompting for elevation, 275–276

understanding UAC process, 264–266

understanding user account types, 249–251

virtualize file and registry write failures to peruse locations, 276

Windows Vista security goals, 263

selecting color scheme, 93–94

selecting computer’s location, 60

Sent Items folder, 131

serial cables, 477

services

managing, 233–235

monitoring, 203–204

services, managing

Description, 234

Log On As, 235

Name, 234

starting and stopping services, 235

Startup Type, 235

Status, 234

viewing service configuration information, 234–235

setting default programs, 183–185

shadow effects for open windows, 87

shared files and folders, accessing, 415–416

practice, 430–431

shared folder permissions, 435–436

shared resource settings, verifying, 434–435

shared resources, testing on local computer, 439

sharing and discovery settings, verifying, 434

sharing data with other operating systems, 420

sharing printers, 470–471

Sidebar. See Windows Sidebar

spyware, 531

SSIDs, configuring, 395

starting a clean installation, 46–47

starting an in-place upgrade, 47–48

starting installation process, 49–50

startup items, configuring with MSConfig, 225–226

startup problems, troubleshooting, 509–517

Boot Logging, 514

configuring startup options with MSConfig, 515–517

Last Known Good Configuration, 515

Safe Mode, 511–513

Windows Error Recovery, 513

startup programs, 224–228

managing with Windows Defender, 226–228

Startup Repair, 519–520

summary of consumer features, 7–8

supported installation types, 40

system compatibility. See also compatibility

Windows Vista Aero requirements, 16–17

Windows Vista Capable, 15

Windows Vista Premium Ready, 15

System Diagnostics, 210

System Information, 212–213

Components, 213

Hardware Resources, 213

Software Environment, 213

viewing, 212–213

working with, 214

System Performance, 211

System Performance, improving, 221–243

adjusting visual effects, 239

configuring startup items with MSConfig, 225–226

configuring Windows features, 230–231

configuring Windows ReadyBoost, 231–233

developing performance-optimization approach, 221–223

disk defragmentation, 237–238

establishing a baseline, 222

identifying bottlenecks, 222

implementing a change, 222

lesson review, 243

lesson summary, 242

managing indexing options, 239–240

managing services, 233–235

managing startup programs, 224–228

managing startup programs with Windows Defender, 226–228

measuring performance, 222

optimizing disk performance, 235–238

practice, 241–242

real-world example, 228

repeating performance optimization process, 222–223

using performance information and tools, 223–224

viewing performance information in Event Log, 229

system requirements, Windows Media Center, 176

System Restore

configuring system protection, 503

restoring system settings, 503–505

Windows Vista, diagnosing issues in, 502–505

T

Task Manager, 200–205

caution when stopping programs, 202

CPU, 203

Description, 203

Image Name, 203

Image Path Name, 203

keyboard shortcut, 201

Memory, 203

monitoring applications, 201–202

monitoring performance, 204–205

monitoring processes, 202–203

monitoring services, 203–204

start menu, 200

taskbar, 200

User Name, 203

testing shared resources on local computer, 439

theme settings, configuring, 91–92

time and date settings, 59

time limits, defining, 322–323

transparency effects, 97–98

transparent glass borders, 86–87

troubleshooting, 65–74

application compatibility, 67–70

hardware compatibility, 65–66

Internet Explorer, 543–546

lesson review, 74

lesson summary, 73

network connections, 384–385

network-related sharing issues, 437–440

practice, 72–73

reinstalling Windows Vista, 71

startup problems, 509–517

using network troubleshooting tools, 385–387

Windows Aero, 89–91

Windows Mail, 128–129

Windows Vista, diagnosing issues in, 497–530

troubleshooting CD/DVD boot issues, 47

troubleshooting e-mail account issues, 128–129

troubleshooting file and printer sharing, 434–444

checking for encrypted files, 437

lesson review, 443–444

lesson summary, 443

practice, 442

real-world example, 440–441

resource sharing issues, 434–437

shared folder permissions, 435–436

testing shared resources on local computer, 439

troubleshooting network-related sharing issues, 437–440

verifying computer settings, 437–438

verifying file system permissions, 436–437

verifying firewall configuration, 439–440

verifying network connectivity, 438

verifying shared resource settings, 434–435

verifying sharing and discovery settings, 434

troubleshooting network connections, 384–385

diagnosing and repairing connections, 385

understanding network diagnostics framework, 384–385

troubleshooting network-related sharing issues, 437–440

troubleshooting wireless connections, 402

typical wireless configurations, 392

U

UAC. See User Account Control

understanding default Mail folders, 131–132

understanding editions, 3–9

understanding Parental Controls, 311–314

understanding performance monitoring tools, 199

understanding user account types, 249–251

understanding user preferences, 11–12

updates

installing, 29

upgrade options, evaluating, 44

upgrade requirements, 11–12

summary, 17–18

upgrading, 23–30

lesson review, 31–32

lesson summary, 31

methods, 24

upgrading to Windows Vista, 14–32

verifying system compatibility, 14–19

USB connections, 477

User Account Control (UAC), 262–279

additional security features, 267–270

Admin Approval mode, 266

Admin Approval mode for the built-in administrator account, 274

behavior of the elevation prompt for administrators, 274

common security risks and threats, 262–263

detect application installations and prompt for elevation, 275

enabling and disabling, 270–271

managing settings with Local Security Policy, 271–276

only elevate executables that are signed and validated, 275

only elevate UIAccess applications that are installed in secure locations, 275

practice, 277–278

real-world example, 264

run all administrators in Admin Approval mode, 274

standard user mode, 265–266

switch to the secure desktop when prompting for elevation, 275–276

understanding UAC process, 264–266

virtualize file and registry write failures to per-use locations, 276

Windows Vista security goals, 263

user accounts, 249–261

adding, 253–254

adding user accounts, 253–254

centrally managing advanced settings, 258

changing passwords, 255–256

comparing user permissions, 251–252

configuring user accounts, 254–255

lesson review, 261

lesson summary, 260

performing advanced configuration, 256–258

practice, 259–260

understanding user account types, 249–251

user interface, Windows Mail, 123–124

user name info, providing, 57

user needs, evaluating, 8–9

user permissions, comparing, 251–252

administrator accounts, 252

standard user accounts, 251–252

user preferences

understanding, 11–12

user profile types, managing, 401

using Data Collector Sets, 219

using Device Manager, 453

using digital cameras, 458–459

using network troubleshooting tools, 385–387

using performance information and tools, 223–224

using scanners, 458

using service set identifiers, 394–395

using set program access and computer defaults, 185–187

using Windows fax and scan, 459–466

V

verifying computer settings, 437–438

verifying display configuration settings, 90–91

verifying display hardware, 89

verifying file system permissions, 436–437

verifying firewall configuration, 439–440

verifying network connectivity, 438

verifying shared resource settings, 434–435

verifying sharing and discovery settings, 434

verifying upgrade edition requirements, 46

viewing and managing data in Windows Photo Gallery, 167–168

viewing performance information in Event Log, 229

viewing reports with Data Collector Sets, 211–212

viewing System Information, 212–213

viewing Windows network connection status details, 398

virtual machines vs. multiboot, 43

viruses, 531

Vista Basic. See Windows Vista Basic

Vista Business. See Windows Vista Business

Vista Capable. See Windows Vista Capable

Vista Enterprise. See Windows Vista Enterprise

Vista Home Premium. See Windows Vista Home Premium

Vista Premium Ready. See Windows Vista Premium Ready

Vista Starter. See Windows Vista Starter

Vista Ultimate. See Windows Vista Ultimate

Vista Upgrade. See Windows Vista Upgrade

visual effects, adjusting, 239

W

WDDM support, 17

Web restrictions, defining, 315–320

allowing and blocking Web sites, 316–317

attempting to access blocked Web sites, 319

blocking sites based on content, 317–318

providing site reviews, 318

using Internet Explorer Content Advisor, 320

Web-based e-mail vs. Windows Mail, 124

WEP standard, 393–394

Wi-Fi Protected Access, 394

window animations, 87

window color and appearance

Windows Aero, 90

Windows Aero

color scheme, 94

Windows Aero configuration

accessing display settings, 81–83

color scheme, 90

configuring other display options, 91–94

customizing options, 88–89

desktop theme settings, 90

desktop usability enhancements, 95–96

display settings, 90

enabling, 88

features, 86–87

hardware-related changes, 90

lesson review, 99–100

lesson summary, 99

managing Windows display settings, 83–86

memory limitations, 91

refresh rate, 90

running legacy applications, 90

troubleshooting, 89–91

verifying display configuration settings, 90–91

verifying display hardware, 89

window color and appearance, 90

working with desktop usability enhancements, 95–96

working with windows display settings, 81–86

Windows Aero features, 86–87

enhanced window management buttons, 87

other look and feel enhancements, 87

shadow effects for open windows, 87

transparent glass borders, 86–87

window animations, 87

Windows Aero requirements, 16–17

color depth, 17

hardware pixel shader 2.0 support, 17

memory, 16

WDDM support, 17

Windows Aero, customizing options, 88–89

color, 88

color intensity, 89

color mixer, 89

enable transparency, 89

Windows Calendar, 142–147

creating tasks and appointments, 143–144

managing calendars and groups, 143

publishing calendars, 146–147

sending calendar information, 145

subscribing to, 147

viewing calendar information, 145

Windows Classic

color scheme, 94

Windows communication features, 121–157

configuring Windows Mail for e-mail, 123–131

lesson review, 156–157

lesson summary, 156

managing Windows Features, 121–122

Windows Complete PC Backup and Restore, 581–591

creating a complete PC backup, 581–583

lesson review, 590–591

lesson summary, 590

performing a complete PC restore, 583–588

practice, 588–590

understanding, 581

Windows Defender, 226–228

configuring options, 541–543

Disable, 228

Enable, 228

Microsoft SpyNet, 540–541

real-world example, 228

Remove, 228

removing malware, 534–543

responding to malware alerts, 537–538

scanning for malware, 536–537

viewing history, 539

viewing quarantined and allowed items, 539–540

Windows Defender, configuring, 299–301

administrator options, 301

advanced options, 300–301

automatic scanning, 299–300

default actions, 300

real-time protection actions, 300

Windows Display Driver Model support, 17

Windows display options, 91–94

choosing desktop background, 92–93

configuring theme settings, 91–92

selecting color scheme, 93–94

Windows Easy Transfer, 41

Windows Error Recovery, 513

Windows Experience Index, 214–216

evaluating system performance, 215

using Windows Experience Index score, 216

viewing the Windows Experience Index score, 215–216

Windows fax and scan, 459–466

configuring settings, 465–466

creating a new fax, 462–464

setting up a fax account, 460–462

working with, 459–460

Windows Features, 121–122

configuring, 230–231

Windows Firewall, 288–292

managing firewall settings, 289–292

understanding inbound filtering, 289

understanding outbound filtering, 289

Windows Mail, 123–137. See also e-mail

advanced settings, 130–131

configuring junk e-mail settings, 132–135

configuring message rules, 135–136

creating e-mail accounts, 125–128

customizing window layout, 136

default mail folders, 131–132

IMAP, 126

importing and exporting accounts, 131

POP3, 126

preparing to create e-mail accounts, 124

real-world example, 137–138

troubleshooting e-mail account issues, 128–129

understanding default Mail folders, 131–132

user interface, 123–124

using to access newsgroups, 138–142

Web-based e-mail vs. Windows Mail, 124

Windows Media Center, 176–181

adding an extender, 181

configuring TV tuner, 178–179

initial setup, 177–178

obtaining, 176

system requirements, 176

working with, 179–181

Windows Media Center requirements, 17

Windows media features, 158–194

managing and troubleshooting file associations, 182–187

Windows Media Center, 176–181

Windows Media Player, 159–165

Windows Movie Maker

Windows Photo Gallery, 165–170

Windows Media features

lesson review, 191

lesson summary, 190

Windows Media Player, 159–165

Burn, 162

configuring options, 163

installing codecs, 165

Library view, 162

Now Playing view, 161

Online Music Store, 163

portable music devices, 163

Rip, 162

setting up, 159–161

Sync, 163

user interface, 161–163

working with, 189

Windows Meeting Space, 148–153

exiting a meeting, 153

inviting meeting attendees, 151

joining a meeting, 151

practice, 155

sharing information in, 152–153

starting a new meeting, 149–151

Windows Mobile Device Center, 478

Windows Mobility Center, 479–481

battery status, 480

Display Brightness, 480

external display, 481

presentation settings, 481

shortcut keys, 480

Sync Center, 481

volume, 480

wireless network, 481

Windows Movie Maker

editing movies, 173

hardware requirements, 171–172

importing media, 172

publishing movies, 174–175

user interface, 172

using, 189–190

Windows Photo Gallery, 165–170

adding folders to, 167

e-mailing photos, 170

fixing photos, 169

hardware requirements, 166

importing files, 168

viewing and managing data, 167–168

working with, 166

Windows ReadyBoost, 231–233

enabling, 232–233

requirements, 232

role of, 232

understanding, 232

Windows Security Center, 285–308

changing Windows Security Alert settings, 287–288

configuring automatic updating, 293–296

configuring malware protection, 297–301

configuring other security settings, 302

configuring Windows Firewall, 288–292

lesson review, 304–305

lesson summary, 304

overview, 285–292

practice, 302–304

real-world example, 296

security in previous Windows versions, 287

understanding security details, 287

using to modify Update Settings, 295–296

Windows Sidebar, 101–114

adding and configuring gadgets, 112–113

configuring, 112

configuring gadget settings, 108–109

configuring properties, 103–104

configuring RSS feeds, 110–112

downloading and installing new gadgets, 109

evaluating gadgets, 110

gadgets for, 205

lesson review, 113–114

lesson summary, 113

managing gadgets, 104–108

overview, 101

understanding, 101–102

Windows Standard

color scheme, 94

Windows Sync Center, 481–488

accessing, 482

managing offline files, 484–486

managing synchronization settings, 486

setting up offline files, 483–484

understanding sync partnerships, 483

verifying synchronizations, 487–488

Windows Update, changing settings, 294–295

Windows Update, configuring settings, 58

Windows Vista Basic, 94

Windows Vista Business, 6

Windows Vista Capable, 15

Windows Vista Enterprise, 9–10

Windows Vista Home Basic, 5

Windows Vista Home Premium, 5–6

Windows Vista performance tools, 199–220

Data Collector Sets, 210–212

gadgets for Windows Sidebar, 205

isolating performance issues, 206–207

lesson review, 220

lesson summary, 219–220

monitoring applications, 201–202

monitoring performance, 204–205

monitoring processes, 202–203

monitoring services, 203–204

Performance Monitor, 208–210

practice, 217–219

Reliability Monitor, 207–208

Resource Monitor, 205–206

understanding performance monitoring tools, 199

understanding Task Manager, 200–205

viewing System Information, 212–213

Windows Experience Index, 214–216

working with System Information, 214

Windows Vista Premium Ready, 15

Windows Vista Starter, 10

Windows Vista Ultimate, 6–7

Windows Vista Upgrade

summary, 17–18

Windows Vista Upgrade Advisor, 35

devices, 28

overview, 24–25

programs, 28

system, 28

task list, 29

using, 25–28

Windows Vista, diagnosing issues in, 497–530

lesson review, 529

lesson summary, 528

monitoring Windows Event Logs, 497–501

performing Windows memory diagnostics, 505–509

practice, 526–528

Problem Reports and Solutions, 522–525

real-world example, 501–502

RegEdit, 521–522

repairing Windows Vista, 517–520

troubleshooting startup problems, 509–517

using Event Viewer, 498

using System Restore, 502–505

viewing events by event type, 499–500

viewing specific event logs, 500–501

Windows Recovery Console, 520

wired printers

printers, installing and managing, 466

wireless devices, recommending, 394

Wireless Diagnostics, 211

wireless network connections, 477

wireless network protocols, 392

wireless networking, 391–404

configuring SSIDs for usability and security, 395

configuring Windows ad hoc network

connections, 397–398

configuring wireless networks, 395–401

connecting to wireless networks, 395–397

lesson review, 404

lesson summary, 403–404

managing user profile types, 401

managing wireless network connections, 399–401

practice, 402–403

recommending wireless devices, 394

troubleshooting wireless connections, 402

typical wireless configurations, 392

using service set identifiers, 394–395

viewing Windows network connection status details, 398

WEP standard, 393–394

Wi-Fi Protected Access, 394

wireless network protocols, 392

wireless security options, 393–395

working with wireless networks, 391–393

wireless printers, 466–467

wireless security options, 393–395

working with network resources, 411–414

working with System Information, 214

working with Windows Mail, 131–137

configuring junk e-mail settings, 132–135

configuring message rules, 135–136

customizing window layout, 136

understanding default Mail folders, 131–132

working with Windows Media Center, 179–181

working with wireless networks, 391–393

 

 

© Microsoft. All Rights Reserved.