Index
Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W
Symbols
32-bit options, 22
64-bit options, 22–23
A
accepting license terms, 53
accessing display settings, 81–83
from the Desktop, 82–83
using Control Panel, 81–82
accessing shared files and folders, 415–416
activity reports, reviewing, 328–330
configuring activity reporting, 329
viewing activity reports, 329–330
ad hoc network connections, 397–398
adding an extender to Windows Media Center, 181
adding and configuring gadgets
Windows Sidebar, 112–113
adding folders to Windows Photo Gallery, 167
adding network, wireless, or Bluetooth printers, 469
adding user accounts, 253–254
adjusting visual effects, 239
advanced settings, Windows Mail, 130–131
adware, 531
Aero. See Windows Aero
Alt+Tab, 96
antivirus options, changing, 298–299
antivirus products, evaluating, 298
application compatibility, troubleshooting, 67–70
using Program Compatibility Wizard, 68–69
using software compatibility modes, 69–70
application restrictions, managing, 327–328
applications, monitoring, 201–202
associating file types with specific programs, 185
automatic updating, 293–296
AutoPlay settings, 187
B
Backup and Restore Center, 557–580
backups using the Internet, 561
choosing backup destinations, 560–561
lesson review, 579–580
lesson summary, 579
performing file backups, 562–569
planning for backups, 558–561
practice, 577–579
protecting backup data, 561
real-world example, 559–560
reasons for performing backups, 558
restoring files from a backup, 569–573
scheduling backups, 559
selecting files for backup, 558–559
using previous versions of files, 573–577
backup destinations, 560–561
external hard disk drives, 561
hard disks, 560
network devices, 561
removable media, 561
removable memory devices, 561
base operating system, 4
baseline, establishing, 222
blocking e-mails based on regional encoding settings, 135. See also e-mail
Bluetooth, 477
Bluetooth printers, 469
Boot Logging, 514
bottlenecks, identifying, 222
burning, 162
C
Calendar. See Windows Calendar
case scenarios
adding a new computer to a network, 406
choosing folder sharing options, 446
configuring media devices and features, 492
configuring Web browser security, 361
configuring Windows Mail, 193
configuring Windows Sidebar, 116
customizing desktop, 116
diagnosing and troubleshooting startup problems, 551
disk partitioning, 76
evaluating restore options, 593–594
evaluating upgrade options, 34
evaluating Windows Vista installation options, 76
managing mobile devices, 492
managing wireless network connections, 407
monitoring performance, 245
optimizing performance, 245
troubleshooting security issues with Windows Security Center, 307
using parental controls, 361
verifying compatibility, 34–35
working with public folder sharing, 446
working with Windows Defender, 552
working with Windows Media Center, 193
CD/DVD boot issues
troubleshooting, 47
centrally managing advanced user settings, 258
changing AutoPlay settings, 187
changing passwords, 255–256
checking for encrypted files, 437
choosing desktop background, 92–93
choosing installation location, 55
choosing installation type, 54–55
choosing language and preference settings, 50–51
clean installations, 40–41
practice, 63
client network services, 371–375
DHCP, 372–373
Domain Name System (DNS), 373–374
firewalls, 374–375
codecs, installing, 165
color
color intensity, 89
color mixer, 89
color scheme, 90, 93–94
window color and appearance, 90
Windows Aero, 88
color depth, 17
color intensity
Windows Aero, 89
color mixer
Windows Aero, 89
color scheme, 93–94
High Contrast, 94
Windows Aero, 90, 94
Windows Classic, 94
Windows Standard, 94
Windows Vista Basic, 94
colors, 84
common features to editions, 3–4
base operating system, 4
hardware support, 4
integrated search, 4
parental controls, 4
security, 4
software compatibility, 4
comparing consumer editions, 4–8
summary of features, 7–8
Window Vista Home Basic, 5
Windows Vista Business, 6
Windows Vista Home Premium, 5–6
Windows Vista Ultimate, 6–7
comparing editions, 3–13
comparing user permissions, 251–252
compatibility, 19–22. See also application compatibility; hardware compatibility; system compatibility
hardware devices, 19–20
real-world example, 21–22
software, 20–21
testing, 30
verifying compatibility, 42
completing configuration process, 60–61
computer location, selecting, 60
home, 60
public location, 60
work, 60
computer name, configuring, 58
computer settings, verifying, 437–438
computer time limits, defining, 322–323
configuration process, completing, 60–61
configuring computer name and desktop background, 58
configuring computer names and related settings, 416–417
configuring device settings, 454
configuring file and folder sharing, 420–426
configuring file sharing, 422–425
configuring gadget settings
Windows Sidebar, 108–109
configuring game settings, 323–327
configuring junk e-mail settings, 132–135
configuring list of blocked top-level domains, 134. See also e-mail
configuring malware protection, 297–301
configuring message rules, Windows Mail, 135–136
configuring network connections, 375–384
creating a new network connection, 383–384
managing network settings, 375–376
manually configuring TCP/IP settings, 381–383
modifying network settings, 378–379
setting network location details, 380–381
viewing network information, 376–378
configuring network discovery, 415–418
configuring password-protected sharing, 422
configuring properties
Windows Sidebar, 103–104
configuring RSS feeds
Windows Sidebar, 110–112
configuring startup items with MSConfig, 225–226
configuring theme settings, 91–92
configuring TV tuner for Windows Media Center, 178–179
configuring user accounts, 254–255
configuring Windows ad hoc network connections, 397–398
configuring Windows Aero and desktop settings, 81–100
accessing display settings, 81–83
configuring other display options, 91–94
customizing options, 88–89
desktop usability enhancements, 95–96
enabling, 88
features, 86–87
managing Windows display settings, 83–86
troubleshooting, 89–91
working with windows display settings, 81–86
configuring Windows features, 230–231
configuring Windows Firewall, 288–292
managing firewall settings, 289–292
understanding inbound filtering, 289
understanding outbound filtering, 289
configuring Windows Mail for e-mail, 123–131
advanced settings, 130–131
creating e-mail accounts, 125–128
importing and exporting accounts, 131
preparing to create e-mail accounts, 124
troubleshooting e-mail account issues, 128–129
Web-based e-mail vs. Windows Mail, 124
configuring Windows ReadyBoost, 231–233
configuring Windows Update settings, 58
configuring wireless networks, 395–401
connecting to wireless networks, 395–397
connectivity, verifying, 438
cookies, 342–343
CPU options, 22–23
comparing 32- and 64-bit options, 22–23
multiple CPUs and cores, 23
creating e-mail accounts, 125–128
customizing window layout, Windows Mail, 136
D
Data Collector Sets, 210–212
LAN Diagnostics, 210
running, 211
System Diagnostics, 210
System Performance, 211
viewing reports, 211–212
Wireless Diagnostics, 211
default e-mail folders, 131–132. See also e-mail
Deleted Items, 131
Drafts, 131
Inbox, 131
Junk E-mail, 132
Outbox, 131
Sent Items, 131
default gadgets, 104–106
calendar, 105
clock, 105
contacts, 105
CPU meter, 105
currency, 105
feed headlines, 105
notes, 105
picture puzzle, 105
slide show, 105
stocks, 105
weather, 105
default programs, setting, 183–185
defining computer time limits, 322–323
defining Web restrictions, 315–320
defragmentation. See disk defragmentation
Deleted Items folder, 131
desktop background
choosing, 92–93
configuring, 58
desktop settings, configuring, 81–100
accessing display settings, 81–83
configuring other display options, 91–94
customizing options, 88–89
desktop usability enhancements, 95–96
enabling, 88
features, 86–87
managing Windows display settings, 83–86
troubleshooting, 89–91
working with windows display settings, 81–86
desktop theme settings
Windows Aero, 90
desktop usability enhancements, 95–96
Alt+Tab, 96
live Taskbar previews, 96
using Flip 3D, 95
detecting hardware, 454
developing performance-optimization approach, 221–223
device drivers
installing, 62
managing, 455–456
obtaining, 66–67
updating, 65–66
Device Manager, 453
device settings, configuring, 454
DHCP, 372–373
digital cameras, 458–459
installing, 457–458
using, 458–459
disk defragmentation, 237–238
disk performance, optimizing, 235–238
disk cleanup, 236–237
disk defragmentation, 237–238
display configuration settings, 90–91
Display Driver Model support. See Windows Display Driver Model support
display hardware, 89
display settings
Windows Aero, 90
display settings, accessing, 81–83
from the Desktop, 82–83
using Control Panel, 81–82
display settings, managing, 83–86
colors, 84
multiple monitors, 85
resolution, 84
screen refresh rate, 84–85
Domain Name System (DNS), 373–374
downloading and installing new gadgets
Windows Sidebar, 109
Drafts folder, 131
E
editing movies, 173
editions
base operating system, 4
choosing, 11
common features, 3–4
hardware support, 4
integrated search, 4
lesson review, 12–13
lesson summary, 12
parental controls, 4
security, 4
software compatibility, 4
understanding, 3–9
Windows Vista Enterprise, 9–10
Windows Vista Starter, 10
editions, consumer, 4–8
summary of features, 7–8
Window Vista Home Basic, 5
Windows Vista Business, 6
Windows Vista Home Premium, 5–6
Windows Vista Ultimate, 6–7
e-mail, 123–137. See also default e-mail folders; Windows Mail
advanced settings, 130–131
configuring junk e-mail settings, 132–135
configuring message rules, 135–136
creating e-mail accounts, 125–128
customizing window layout, 136
default mail folders, 131–132
importing and exporting accounts, 131
preparing to create e-mail accounts, 124
troubleshooting e-mail account issues, 128–129
understanding default Mail folders, 131–132
user interface, 123–124
Web-based e-mail vs. Windows Mail, 124
e-mailing photos, 170
enable transparency
Windows Aero, 89
encrypted files, 437
enhanced window management buttons, 87
establishing a baseline, 222
evaluating an upgrade to Windows Vista, 23–30
evaluating gadgets
Windows Sidebar, 110
evaluating hardware configurations, 35
evaluating printer costs, 467
evaluating software and hardware compatibility, 19–22
real-world example, 21–22
software, 20–21
evaluating upgrade requirements, 11–12
Event Log, 229
Event Viewer, 498
viewing events by event type, 499–500
viewing specific event logs, 500–501
F
Feed Headlines gadget
adding, 111
feed options, 111–112
RSS and, 111
file and printer sharing, troubleshooting, 434–444
checking for encrypted files, 437
lesson review, 443–444
lesson summary, 443
practice, 442
real-world example, 440–441
resource sharing issues, 434–437
shared folder permissions, 435–436
testing shared resources on local computer, 439
troubleshooting network-related sharing issues, 437–440
verifying computer settings, 437–438
verifying file system permissions, 436–437
verifying firewall configuration, 439–440
verifying network connectivity, 438
verifying shared resource settings, 434–435
verifying sharing and discovery settings, 434
file associations, managing and troubleshooting, 182–187
associating file types with specific programs, 185
changing AutoPlay settings, 187
setting default programs, 183–185
using set program access and computer defaults, 185–187
file system permissions, verifying, 436–437
firewalls, 288–292, 374–375
managing firewall settings, 289–292
understanding inbound filtering, 289
understanding outbound filtering, 289
verifying configuration, 439–440
fixing photos in Windows Photo Gallery, 169
Flip 3D, 95
G
gadgets
add Feed Headlines gadget, 111
adding, 106–107
adding and configuring, 112
attaching, detaching, and arranging, 106
configuring Feed Headlines options, 111–112
configuring settings, 108–109
default, 104–106
downloading and installing new, 109
evaluating, 110
managing, 104–108
removing, 107–108
using through the Web, 104
Windows Sidebar and, 205
gadgets for Windows Sidebar, 205
gadgets, default, 104–106
calendar, 105
clock, 105
contacts, 105
CPU meter, 105
currency, 105
feed headlines, 105
notes, 105
picture puzzle, 105
slide show, 105
stocks, 105
weather, 105
game settings, configuring, 323–327
allowing and blocking specific games, 326–327
choosing a game rating system, 323–324
defining game restrictions, 324–326
managing access to games, 327
H
hard disk, partitioning, 43–44
hardware compatibility, troubleshooting, 65–67
obtaining device drivers, 66
updating device drivers, 65–66
hardware configurations, 35
hardware device compatibility, 19–20
real-world example, 21–22
software, 20–21
hardware devices, 452–456
configuring device settings, 454
detecting hardware, 454
Device Manager, 453
managing device drivers, 455–456
hardware pixel shader 2.0 support, 17
hardware-related changes
Windows Aero, 90
High Contrast
color scheme, 94
I
identifying bottlenecks, 222
IMAP
Windows Mail and, 126
implementing a change, 222
importing and exporting e-mail accounts, 131
importing files in Windows Photo Gallery, 168
Inbox folder, 131
indexing options, managing, 239–240
infrared connections, 477
initial setup, Windows Media Center, 177–178
in-place upgrades, 41–42
practice, 62
starting, 47
installation, 46–64
accepting license terms, 53
choosing installation location, 55
choosing installation type, 54–55
choosing language and preference settings, 50–51
lesson review, 45, 64
lesson summary, 44–45, 64
monitoring installation progress, 56–57
performing Windows Vista installation, 48–57
postinstallation configuration, 57–61
providing product key, 51–53
real-world example, 49
starting a clean installation, 46–47
starting an in-place upgrade, 47–48
starting installation process, 49–50
troubleshooting CD/DVD boot issues, 47
verifying upgrade edition requirements, 46
installation, preparing for, 39
installation, understanding, 39–42
clean installations, 40–41
in-place upgrades, 41–42
supported installation types, 40
Windows Easy Transfer, 41
installing and managing printers, 466–471
installing local printers, 467–468
installing scanners and cameras, 457–458
Internet Explorer 7, securing
accessing configuration options, 336
configuring privacy settings, 342–346
configuring security levels, 339–340
cookies, 342–343
deleting browsing history, 355
Internet Explorer Information Bar, 352–353
lesson review, 359
lesson summary, 358
maintaining Web security, 336
managing add-ons, 355
managing browser security settings, 337–341
managing privacy settings, 343–344
managing zone settings, 338–339
phishing filter, 347–350
pop-up blocker, 346
practice, 357–358
real-world example, 351–352
resetting Internet Explorer settings, 355–356
summarizing default security settings, 341
understanding certificates, 353–354
understanding protected mode, 341
understanding zone types, 338
using secure connections, 353
working with, 335–336
Internet Explorer Content Advisor
Web restrictions, defining, 320
Internet Explorer Information Bar, 352–353
Internet Explorer, troubleshooting, 543–546
deleting browser history, 544
managing add-ons, 544–545
resetting IE options, 545–546
IP configuration, 386
IPv4, 367–369
default gateways, 368
IP addresses, 367
managing settings, 369
subnets, 367–368
IPv6, 369–371
performance enhancements, 370
security improvements, 370
simplified configuration, 370
support for more addresses, 369
understanding IPv6 addresses, 371
understanding IPv6 support in Windows Vista, 370
isolating performance issues, 206–207
J
Junk E-mail folder, 132
Junk E-mail settings, 132–135. See also e-mail
blocking e-mails based on regional encoding settings, 135
configuring list of blocked top-level domains, 134
High, 133
International options, 134
Low, 132
No Automatic Filtering, 132
Safe List Only, 133
K
keyboard shortcuts, 96–97
Task Manager, 201
L
LAN Diagnostics, 210
language and preference settings, 50–51
Last Known Good Configuration, 515
legacy applications, 90
lesson review, 243
Backup and Restore Center, 579–580
malware, removing, 549
media devices, installing and managing, 474–475
mobile devices, 490
network protocols and client network services, 389–390
network sharing, 432–433
Parental Controls, 333–334
Performance Monitor, 220
upgrading, 31–32
user accounts, 261
Windows Sidebar, 113–114
Windows Vista editions, 12–13
Windows Vista, diagnosing issues in, 529
wireless networking, 404
lesson summary, 242
Backup and Restore Center, 579
malware, removing, 548
media devices, installing and managing, 474
mobile devices, 488
network protocols and client network services, 389
network sharing, 432
Parental Controls, 333
Performance Monitor, 219–220
upgrading, 31
user accounts, 260
Windows Sidebar, 113
Windows Vista editions, 12
Windows Vista, diagnosing issues in, 528
wireless networking, 403–404
license terms, 53
live Taskbar previews, 96
logos, 22
look and feel enhancements, 87
M
malware protection, 297–301
changing antivirus options, 298–299
evaluating antivirus products, 298
Windows Defender, 299–30
malware, removing, 530–550
adware, 531
common malware issues, 530–533
effects of malware installation, 533
keeping up with security details, 547–548
lesson review, 549
lesson summary, 548
preventing malware installations, 530
real-world example, 533–534
reinstalling Windows Vista, 547
responding to alerts, 537–538
root kits, 531
scanning for, 536–537
sources of malware, 532
spyware, 531
troubleshooting Internet Explorer, 543–546
types of malware, 531–532
uninstalling programs, 547–548
viruses, 531
Windows Defender, 534–543
managing and troubleshooting file associations, 182–187
managing application restrictions, 327–328
managing device drivers, 455–456
managing gadgets
Windows Sidebar, 104–108
managing indexing options, 239–240
managing network discovery options, 418
managing printer settings, 469–470
managing privacy settings, 343–344
managing services, 233–235
Description, 234
Log On As, 235
Name, 234
Startup Type, 235
Status, 234
viewing service configuration information, 234–235
managing shared folders, 426
managing startup programs, 224–228
managing startup programs with Windows Defender, 226–228
managing user accounts, 249–261
adding user accounts, 253–254
centrally managing advanced settings, 258
changing passwords, 255–256
comparing user permissions, 251–252
configuring user accounts, 254–255
lesson review, 261
lesson summary, 260
performing advanced configuration, 256–258
practice, 259–260
understanding user account types, 249–251
managing user profile types, 401
managing Windows Features, 121–122
managing wireless network connections, 399–401
mapping network drives, 414
measuring performance, 222
media devices, installing and managing, 451–475
configuring device settings, 454
detecting hardware, 454
hardware devices, 452–456
installing and managing printers, 466–471
installing scanners and cameras, 457–458
lesson review, 474–475
lesson summary, 474
managing device drivers, 455–456
practice, 472–474
real-world example, 451
scanners and digital cameras, 457–459
using Device Manager, 453
using digital cameras, 458–459
using scanners, 458
using Windows fax and scan, 459–466
media library sharing, 428–429
Media Player. See Windows Media Player
Meeting Space. See Windows Meeting Space
memory, 16
Memory Diagnostics Tool, 505–509
performing memory diagnostic tests, 507–509
starting, 505–507
viewing results, 509
Microsoft SpyNet, 540–541
mobile devices, 476–490
Bluetooth, 477
infrared connections, 477
installing, 477–478
lesson review, 490
lesson summary, 488
practice, 488–490
serial cables, 477
Sync Center, 481–488
USB connections, 477
Windows Mobile Device Center, 478
Windows Mobility Center, 479–481
wireless network connections, 477
working with, 476–478
monitoring applications, 201–202
monitoring installation progress, 56–57
monitoring performance, 204–205
monitoring processes, Task Manager, 202–203
CPU, 203
Description, 203
Image Name, 203
Image Path Name, 203
Memory, 203
User Name, 203
monitoring services, 203–204
monitoring system resource usage, 218
MSConfig, 225–226
Command, 225
configuring startup options with, 515–517
Date Disabled, 225
Location, 225
Manufacturer, 225
Startup Item, 225
multiboot installation, 43
virtual machines vs. multiboot, 43
multifunction printers, 467
multiple CPUs and cores, 23
multiple monitors
configuring display settings for, 85
N
NETSH, 387
network connections
configuring, 375–384
troubleshooting, 384–385
network connectivity, verifying, 438
network discovery options, 418
network drives, mapping, 414
network locations, 411–413
network paths, 413
network printers, 466
network protocols and client network services, 365–390
client network services, 371–375
configuring network connections, 375–384
IPv4, 367–369
IPv6, 369–371
lesson review, 389–390
lesson summary, 389
next generation TCP/IP stack, 365–367
practice, 387–389
troubleshooting network connections, 384–385
using network troubleshooting tools, 385–387
network sharing, 411–433
accessing shared files and folders, 415–416
configuring computer names and related
settings, 416–417
configuring file and folder sharing, 420–426
configuring file sharing, 422–425
configuring network discovery, 415–418
configuring password-protected sharing, 422
lesson review, 432–433
lesson summary, 432
managing network discovery options, 418
managing shared folders, 426
mapping network drives, 414
media library sharing, 428–429
network locations, 411–413
network paths, 413
printer sharing, 426–427
public folder sharing, 420–422
sharing data with other operating systems, 420
working with network resources, 411–414
network troubleshooting tools, 385–387
NETSH, 387
PING, 386
Windows IP configuration, 386
newsgroups
accessing in Windows Mail, 154–155
configuring accounts, 138–140
reading and posting messages, 141–142
subscribing to, 140
using Windows Mail to access, 138–142
next generation TCP/IP stack, 365–367
automatic configuration, 366
diagnostic features, 366
dynamic reconfiguration, 366
extensibility, 366
improved security, 366
performance enhancements, 366
support for multiple versions of the IP, 366
O
obtaining, 176
optimizing disk performance, 235–238
disk cleanup, 236–237
disk defragmentation, 237–238
Outbox folder, 131
P
Parental Controls, 311–334
configuring game settings, 323–327
configuring user accounts, 312–313
defining computer time limits, 322–323
defining Web restrictions, 315–320
enabling, 313–314
lesson review, 333–334
lesson summary, 333
managing application restrictions, 327–328
practice, 331–333
real-world example, 314–315
reviewing activity reports, 328–330
understanding, 311–314
partitioning hard disk, 43–44
password-protected sharing, configuring, 422
passwords, changing, 255–256
performance information and tools, using, 223–224
performance issues, isolating, 206–207
Performance Monitor, 208–210
power of, 210
performance optimization process, repeating, 222–223
performance, measuring, 222
performance, monitoring, 204–205
performance-optimization approach, 221–223
performing advanced user account configuration, 256–258
performing Windows Vista installation, 48–57
phishing filter, 347–350
detecting phishing attempts, 347–348
manually verifying and reporting Web sites, 350
testing phishing functionality, 348
using options, 349
PING, 386
POP3
Windows Mail and, 126
pop-up blocker, 346
postinstallation configuration, 57–61
completing configuration process, 60–61
configuring computer name and desktop background, 58
configuring Windows Update settings, 58
providing user name info, 57
reviewing time and date settings, 59
selecting computer’s location, 60
preparing to create e-mail accounts, 124
printer sharing, 426–427
printers, installing and managing, 466–471
adding network, wireless, or Bluetooth printers, 469
evaluating printer costs, 467
installing local printers, 467–468
managing printer settings, 469–470
multifunction devices, 467
network printers, 466
sharing printers, 470–471
wired printers, 466
wireless printers, 466–467
privacy settings, managing, 343–344
Problem Reports and Solutions, 522–525
processes, monitoring, 202–203
product keys, 51–53
Program Compatibility Wizard, 68–69
locating or selecting program, 68–69
security settings, 69
selecting compatibility mode, 69
selecting display settings, 69
providing product key, 51–53
providing user name info, 57
public folder sharing, 420–422
publishing movies
Digital Video Camera, 175
DVD, 175
E-mail, 175
Recordable CD, 175
This Computer, 174
R
ReadyBoost. See Windows ReadyBoost
recommending wireless devices, 394
refresh rate
Windows Aero, 90
RegEdit, 521–522
reinstalling Windows Vista, 71
Reliability Monitor, 207–208
removing malware, 530–550
adware, 531
common malware issues, 530–533
effects of malware installation, 533
keeping up with security details, 547–548
lesson review, 549
lesson summary, 548
preventing malware installations, 530
real-world example, 533–534
reinstalling Windows Vista, 547
responding to alerts, 537–538
root kits, 531
scanning for, 536–537
sources of malware, 532
spyware, 531
troubleshooting Internet Explorer, 543–546
types of malware, 531–532
uninstalling programs, 547–548
viruses, 531
Windows Defender, 534–543
repair and reinstallation, 43
repairing Windows Vista, 517–520
accessing system repair options, 517–518
Startup Repair, 519–520
using command prompt, 520
repeating performance optimization process, 222–223
resolution, 84
Resource Monitor, 205–206
resource sharing issues, 434–437
reviewing activity reports, 328–330
reviewing time and date settings, 59
ripping, 162
root kits, 531
RSS, 110–112
defined, 110
Feed Headlines gadget, 111
understanding, 110
running Data Collector Sets, 211
running legacy applications
Windows Aero, 90
S
Safe Mode, 511–513
scanners, 458
installing, 457–458
using, 458
scanners and digital cameras, 457–459
screen refresh rate, 84–85
secure connections, 353
Security Center. See Windows Security Center
security options, wireless, 393–395
security settings, 249–261
adding user accounts, 253–254
additional security features, 267–270
Admin Approval mode, 266
Admin Approval mode for the built-in administrator account, 274
behavior of the elevation prompt for administrators, 274
centrally managing advanced settings, 258
changing passwords, 255–256
common security risks and threats, 262–263
comparing user permissions, 251–252
configuring user accounts, 254–255
detect application installations and prompt for elevation, 275
enabling and disabling, 270–271
lesson review, 279
lesson summary, 278
managing settings with Local Security Policy, 271–276
only elevate executables that are signed and validated, 275
only elevate UIAccess applications that are installed in secure locations, 275
performing advanced configuration, 256–258
practice, 259–260
real-world example, 264
run all administrators in Admin Approval mode, 274
standard user mode, 265–266
switch to the secure desktop when prompting for elevation, 275–276
understanding UAC process, 264–266
understanding user account types, 249–251
virtualize file and registry write failures to peruse locations, 276
Windows Vista security goals, 263
selecting color scheme, 93–94
selecting computer’s location, 60
Sent Items folder, 131
serial cables, 477
services
managing, 233–235
monitoring, 203–204
services, managing
Description, 234
Log On As, 235
Name, 234
starting and stopping services, 235
Startup Type, 235
Status, 234
viewing service configuration information, 234–235
setting default programs, 183–185
shadow effects for open windows, 87
shared files and folders, accessing, 415–416
practice, 430–431
shared folder permissions, 435–436
shared resource settings, verifying, 434–435
shared resources, testing on local computer, 439
sharing and discovery settings, verifying, 434
sharing data with other operating systems, 420
sharing printers, 470–471
Sidebar. See Windows Sidebar
spyware, 531
SSIDs, configuring, 395
starting a clean installation, 46–47
starting an in-place upgrade, 47–48
starting installation process, 49–50
startup items, configuring with MSConfig, 225–226
startup problems, troubleshooting, 509–517
Boot Logging, 514
configuring startup options with MSConfig, 515–517
Last Known Good Configuration, 515
Safe Mode, 511–513
Windows Error Recovery, 513
startup programs, 224–228
managing with Windows Defender, 226–228
Startup Repair, 519–520
summary of consumer features, 7–8
supported installation types, 40
system compatibility. See also compatibility
Windows Vista Aero requirements, 16–17
Windows Vista Capable, 15
Windows Vista Premium Ready, 15
System Diagnostics, 210
System Information, 212–213
Components, 213
Hardware Resources, 213
Software Environment, 213
viewing, 212–213
working with, 214
System Performance, 211
System Performance, improving, 221–243
adjusting visual effects, 239
configuring startup items with MSConfig, 225–226
configuring Windows features, 230–231
configuring Windows ReadyBoost, 231–233
developing performance-optimization approach, 221–223
disk defragmentation, 237–238
establishing a baseline, 222
identifying bottlenecks, 222
implementing a change, 222
lesson review, 243
lesson summary, 242
managing indexing options, 239–240
managing services, 233–235
managing startup programs, 224–228
managing startup programs with Windows Defender, 226–228
measuring performance, 222
optimizing disk performance, 235–238
practice, 241–242
real-world example, 228
repeating performance optimization process, 222–223
using performance information and tools, 223–224
viewing performance information in Event Log, 229
system requirements, Windows Media Center, 176
System Restore
configuring system protection, 503
restoring system settings, 503–505
Windows Vista, diagnosing issues in, 502–505
T
Task Manager, 200–205
caution when stopping programs, 202
CPU, 203
Description, 203
Image Name, 203
Image Path Name, 203
keyboard shortcut, 201
Memory, 203
monitoring applications, 201–202
monitoring performance, 204–205
monitoring processes, 202–203
monitoring services, 203–204
start menu, 200
taskbar, 200
User Name, 203
testing shared resources on local computer, 439
theme settings, configuring, 91–92
time and date settings, 59
time limits, defining, 322–323
transparency effects, 97–98
transparent glass borders, 86–87
troubleshooting, 65–74
application compatibility, 67–70
hardware compatibility, 65–66
Internet Explorer, 543–546
lesson review, 74
lesson summary, 73
network connections, 384–385
network-related sharing issues, 437–440
practice, 72–73
reinstalling Windows Vista, 71
startup problems, 509–517
using network troubleshooting tools, 385–387
Windows Aero, 89–91
Windows Mail, 128–129
Windows Vista, diagnosing issues in, 497–530
troubleshooting CD/DVD boot issues, 47
troubleshooting e-mail account issues, 128–129
troubleshooting file and printer sharing, 434–444
checking for encrypted files, 437
lesson review, 443–444
lesson summary, 443
practice, 442
real-world example, 440–441
resource sharing issues, 434–437
shared folder permissions, 435–436
testing shared resources on local computer, 439
troubleshooting network-related sharing issues, 437–440
verifying computer settings, 437–438
verifying file system permissions, 436–437
verifying firewall configuration, 439–440
verifying network connectivity, 438
verifying shared resource settings, 434–435
verifying sharing and discovery settings, 434
troubleshooting network connections, 384–385
diagnosing and repairing connections, 385
understanding network diagnostics framework, 384–385
troubleshooting network-related sharing issues, 437–440
troubleshooting wireless connections, 402
typical wireless configurations, 392
U
UAC. See User Account Control
understanding default Mail folders, 131–132
understanding editions, 3–9
understanding Parental Controls, 311–314
understanding performance monitoring tools, 199
understanding user account types, 249–251
understanding user preferences, 11–12
updates
installing, 29
upgrade options, evaluating, 44
upgrade requirements, 11–12
summary, 17–18
upgrading, 23–30
lesson review, 31–32
lesson summary, 31
methods, 24
upgrading to Windows Vista, 14–32
verifying system compatibility, 14–19
USB connections, 477
User Account Control (UAC), 262–279
additional security features, 267–270
Admin Approval mode, 266
Admin Approval mode for the built-in administrator account, 274
behavior of the elevation prompt for administrators, 274
common security risks and threats, 262–263
detect application installations and prompt for elevation, 275
enabling and disabling, 270–271
managing settings with Local Security Policy, 271–276
only elevate executables that are signed and validated, 275
only elevate UIAccess applications that are installed in secure locations, 275
practice, 277–278
real-world example, 264
run all administrators in Admin Approval mode, 274
standard user mode, 265–266
switch to the secure desktop when prompting for elevation, 275–276
understanding UAC process, 264–266
virtualize file and registry write failures to per-use locations, 276
Windows Vista security goals, 263
user accounts, 249–261
adding, 253–254
adding user accounts, 253–254
centrally managing advanced settings, 258
changing passwords, 255–256
comparing user permissions, 251–252
configuring user accounts, 254–255
lesson review, 261
lesson summary, 260
performing advanced configuration, 256–258
practice, 259–260
understanding user account types, 249–251
user interface, Windows Mail, 123–124
user name info, providing, 57
user needs, evaluating, 8–9
user permissions, comparing, 251–252
administrator accounts, 252
standard user accounts, 251–252
user preferences
understanding, 11–12
user profile types, managing, 401
using Data Collector Sets, 219
using Device Manager, 453
using digital cameras, 458–459
using network troubleshooting tools, 385–387
using performance information and tools, 223–224
using scanners, 458
using service set identifiers, 394–395
using set program access and computer defaults, 185–187
using Windows fax and scan, 459–466
V
verifying computer settings, 437–438
verifying display configuration settings, 90–91
verifying display hardware, 89
verifying file system permissions, 436–437
verifying firewall configuration, 439–440
verifying network connectivity, 438
verifying shared resource settings, 434–435
verifying sharing and discovery settings, 434
verifying upgrade edition requirements, 46
viewing and managing data in Windows Photo Gallery, 167–168
viewing performance information in Event Log, 229
viewing reports with Data Collector Sets, 211–212
viewing System Information, 212–213
viewing Windows network connection status details, 398
virtual machines vs. multiboot, 43
viruses, 531
Vista Basic. See Windows Vista Basic
Vista Business. See Windows Vista Business
Vista Capable. See Windows Vista Capable
Vista Enterprise. See Windows Vista Enterprise
Vista Home Premium. See Windows Vista Home Premium
Vista Premium Ready. See Windows Vista Premium Ready
Vista Starter. See Windows Vista Starter
Vista Ultimate. See Windows Vista Ultimate
Vista Upgrade. See Windows Vista Upgrade
visual effects, adjusting, 239
W
WDDM support, 17
Web restrictions, defining, 315–320
allowing and blocking Web sites, 316–317
attempting to access blocked Web sites, 319
blocking sites based on content, 317–318
providing site reviews, 318
using Internet Explorer Content Advisor, 320
Web-based e-mail vs. Windows Mail, 124
WEP standard, 393–394
Wi-Fi Protected Access, 394
window animations, 87
window color and appearance
Windows Aero, 90
Windows Aero
color scheme, 94
Windows Aero configuration
accessing display settings, 81–83
color scheme, 90
configuring other display options, 91–94
customizing options, 88–89
desktop theme settings, 90
desktop usability enhancements, 95–96
display settings, 90
enabling, 88
features, 86–87
hardware-related changes, 90
lesson review, 99–100
lesson summary, 99
managing Windows display settings, 83–86
memory limitations, 91
refresh rate, 90
running legacy applications, 90
troubleshooting, 89–91
verifying display configuration settings, 90–91
verifying display hardware, 89
window color and appearance, 90
working with desktop usability enhancements, 95–96
working with windows display settings, 81–86
Windows Aero features, 86–87
enhanced window management buttons, 87
other look and feel enhancements, 87
shadow effects for open windows, 87
transparent glass borders, 86–87
window animations, 87
Windows Aero requirements, 16–17
color depth, 17
hardware pixel shader 2.0 support, 17
memory, 16
WDDM support, 17
Windows Aero, customizing options, 88–89
color, 88
color intensity, 89
color mixer, 89
enable transparency, 89
Windows Calendar, 142–147
creating tasks and appointments, 143–144
managing calendars and groups, 143
publishing calendars, 146–147
sending calendar information, 145
subscribing to, 147
viewing calendar information, 145
Windows Classic
color scheme, 94
Windows communication features, 121–157
configuring Windows Mail for e-mail, 123–131
lesson review, 156–157
lesson summary, 156
managing Windows Features, 121–122
Windows Complete PC Backup and Restore, 581–591
creating a complete PC backup, 581–583
lesson review, 590–591
lesson summary, 590
performing a complete PC restore, 583–588
practice, 588–590
understanding, 581
Windows Defender, 226–228
configuring options, 541–543
Disable, 228
Enable, 228
Microsoft SpyNet, 540–541
real-world example, 228
Remove, 228
removing malware, 534–543
responding to malware alerts, 537–538
scanning for malware, 536–537
viewing history, 539
viewing quarantined and allowed items, 539–540
Windows Defender, configuring, 299–301
administrator options, 301
advanced options, 300–301
automatic scanning, 299–300
default actions, 300
real-time protection actions, 300
Windows Display Driver Model support, 17
Windows display options, 91–94
choosing desktop background, 92–93
configuring theme settings, 91–92
selecting color scheme, 93–94
Windows Easy Transfer, 41
Windows Error Recovery, 513
Windows Experience Index, 214–216
evaluating system performance, 215
using Windows Experience Index score, 216
viewing the Windows Experience Index score, 215–216
Windows fax and scan, 459–466
configuring settings, 465–466
creating a new fax, 462–464
setting up a fax account, 460–462
working with, 459–460
Windows Features, 121–122
configuring, 230–231
Windows Firewall, 288–292
managing firewall settings, 289–292
understanding inbound filtering, 289
understanding outbound filtering, 289
Windows Mail, 123–137. See also e-mail
advanced settings, 130–131
configuring junk e-mail settings, 132–135
configuring message rules, 135–136
creating e-mail accounts, 125–128
customizing window layout, 136
default mail folders, 131–132
IMAP, 126
importing and exporting accounts, 131
POP3, 126
preparing to create e-mail accounts, 124
real-world example, 137–138
troubleshooting e-mail account issues, 128–129
understanding default Mail folders, 131–132
user interface, 123–124
using to access newsgroups, 138–142
Web-based e-mail vs. Windows Mail, 124
Windows Media Center, 176–181
adding an extender, 181
configuring TV tuner, 178–179
initial setup, 177–178
obtaining, 176
system requirements, 176
working with, 179–181
Windows Media Center requirements, 17
Windows media features, 158–194
managing and troubleshooting file associations, 182–187
Windows Media Center, 176–181
Windows Media Player, 159–165
Windows Movie Maker
Windows Photo Gallery, 165–170
Windows Media features
lesson review, 191
lesson summary, 190
Windows Media Player, 159–165
Burn, 162
configuring options, 163
installing codecs, 165
Library view, 162
Now Playing view, 161
Online Music Store, 163
portable music devices, 163
Rip, 162
setting up, 159–161
Sync, 163
user interface, 161–163
working with, 189
Windows Meeting Space, 148–153
exiting a meeting, 153
inviting meeting attendees, 151
joining a meeting, 151
practice, 155
sharing information in, 152–153
starting a new meeting, 149–151
Windows Mobile Device Center, 478
Windows Mobility Center, 479–481
battery status, 480
Display Brightness, 480
external display, 481
presentation settings, 481
shortcut keys, 480
Sync Center, 481
volume, 480
wireless network, 481
Windows Movie Maker
editing movies, 173
hardware requirements, 171–172
importing media, 172
publishing movies, 174–175
user interface, 172
using, 189–190
Windows Photo Gallery, 165–170
adding folders to, 167
e-mailing photos, 170
fixing photos, 169
hardware requirements, 166
importing files, 168
viewing and managing data, 167–168
working with, 166
Windows ReadyBoost, 231–233
enabling, 232–233
requirements, 232
role of, 232
understanding, 232
Windows Security Center, 285–308
changing Windows Security Alert settings, 287–288
configuring automatic updating, 293–296
configuring malware protection, 297–301
configuring other security settings, 302
configuring Windows Firewall, 288–292
lesson review, 304–305
lesson summary, 304
overview, 285–292
practice, 302–304
real-world example, 296
security in previous Windows versions, 287
understanding security details, 287
using to modify Update Settings, 295–296
Windows Sidebar, 101–114
adding and configuring gadgets, 112–113
configuring, 112
configuring gadget settings, 108–109
configuring properties, 103–104
configuring RSS feeds, 110–112
downloading and installing new gadgets, 109
evaluating gadgets, 110
gadgets for, 205
lesson review, 113–114
lesson summary, 113
managing gadgets, 104–108
overview, 101
understanding, 101–102
Windows Standard
color scheme, 94
Windows Sync Center, 481–488
accessing, 482
managing offline files, 484–486
managing synchronization settings, 486
setting up offline files, 483–484
understanding sync partnerships, 483
verifying synchronizations, 487–488
Windows Update, changing settings, 294–295
Windows Update, configuring settings, 58
Windows Vista Basic, 94
Windows Vista Business, 6
Windows Vista Capable, 15
Windows Vista Enterprise, 9–10
Windows Vista Home Basic, 5
Windows Vista Home Premium, 5–6
Windows Vista performance tools, 199–220
Data Collector Sets, 210–212
gadgets for Windows Sidebar, 205
isolating performance issues, 206–207
lesson review, 220
lesson summary, 219–220
monitoring applications, 201–202
monitoring performance, 204–205
monitoring processes, 202–203
monitoring services, 203–204
Performance Monitor, 208–210
practice, 217–219
Reliability Monitor, 207–208
Resource Monitor, 205–206
understanding performance monitoring tools, 199
understanding Task Manager, 200–205
viewing System Information, 212–213
Windows Experience Index, 214–216
working with System Information, 214
Windows Vista Premium Ready, 15
Windows Vista Starter, 10
Windows Vista Ultimate, 6–7
Windows Vista Upgrade
summary, 17–18
Windows Vista Upgrade Advisor, 35
devices, 28
overview, 24–25
programs, 28
system, 28
task list, 29
using, 25–28
Windows Vista, diagnosing issues in, 497–530
lesson review, 529
lesson summary, 528
monitoring Windows Event Logs, 497–501
performing Windows memory diagnostics, 505–509
practice, 526–528
Problem Reports and Solutions, 522–525
real-world example, 501–502
RegEdit, 521–522
repairing Windows Vista, 517–520
troubleshooting startup problems, 509–517
using Event Viewer, 498
using System Restore, 502–505
viewing events by event type, 499–500
viewing specific event logs, 500–501
Windows Recovery Console, 520
wired printers
printers, installing and managing, 466
wireless devices, recommending, 394
Wireless Diagnostics, 211
wireless network connections, 477
wireless network protocols, 392
wireless networking, 391–404
configuring SSIDs for usability and security, 395
configuring Windows ad hoc network
connections, 397–398
configuring wireless networks, 395–401
connecting to wireless networks, 395–397
lesson review, 404
lesson summary, 403–404
managing user profile types, 401
managing wireless network connections, 399–401
practice, 402–403
recommending wireless devices, 394
troubleshooting wireless connections, 402
typical wireless configurations, 392
using service set identifiers, 394–395
viewing Windows network connection status details, 398
WEP standard, 393–394
Wi-Fi Protected Access, 394
wireless network protocols, 392
wireless security options, 393–395
working with wireless networks, 391–393
wireless printers, 466–467
wireless security options, 393–395
working with network resources, 411–414
working with System Information, 214
working with Windows Mail, 131–137
configuring junk e-mail settings, 132–135
configuring message rules, 135–136
customizing window layout, 136
understanding default Mail folders, 131–132
working with Windows Media Center, 179–181
working with wireless networks, 391–393
© Microsoft. All Rights Reserved.