Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 440 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
440
Dung lượng
6,1 MB
Nội dung
MicrosoftWindowsXPRegistry Guide
Table of Contents
MicrosoftWindowsXPRegistryGuide 1
Introduction 4
This Book Is Different—Really 4
Power Users First; Then IT Professionals 5
Some Terminology 6
Gotta Love WindowsXP 7
Final Note 7
Part I: Registry Overview 9
Chapter List 9
Part Overview 9
Chapter 1: Learning the Basics 10
Overview 10
Heart and Soul of WindowsXP 10
For Power Users 11
For IT Professionals 12
Registry Warnings and Myths 14
Must−Know Concepts 14
Security Identifiers 14
Globally Unique Identifiers 17
Hexadecimal Notation 17
Bits and Bit Masks 18
Little−Endian and Big−Endian 19
ANSI and Unicode Encoding 20
Null and Empty Strings 20
Structure of the Registry 20
Keys 22
Values 23
Types 24
Organization of the Registry 26
HKEY_USERS 27
HKEY_CURRENT_USER 28
HKEY_LOCAL_MACHINE 29
HKEY_CLASSES_ROOT 29
HKEY_CURRENT_CONFIG 30
Registry Management Tools 30
Registry Hive Files 31
Hives in HKLM 31
Hives in HKU 32
Chapter 2: Using the Registry Editor 33
Overview 33
Running Regedit 33
Exploring Regedit 34
Key Pane 35
Value Pane 36
Searching for Data 37
Searching Incrementally 38
i
Table of Contents
Chapter 2: Using the Registry Editor
Searching in Binary Values 38
Bookmarking Favorite Keys 39
Using Better Techniques 40
Editing the Registry 41
Changing Values 41
Adding Keys or Values 44
Deleting Keys or Values 45
Renaming Keys or Values 45
Printing the Registry 46
Exporting Settings to Files 47
Registration Files 48
Win9x/NT4 Registration Files 49
Hive Files 50
Text Files 51
Working with Hive Files 51
Getting Beyond Basics 52
Chapter 3: Backing up the Registry 53
Overview 53
Editing the Registry Safely 53
Copying Single Values 54
Backing Up to REG Files 55
Backing Up to Hive Files 55
Fixing Corrupt Settings 57
Allowing WindowsXP to Fix Errors 58
Repairing an Application's Settings 59
Removing Programs from the Registry 61
Using Another Computer's Settings 62
Using System Restore 62
Taking Configuration Snapshots 63
Peeking Under the Covers 64
Managing System Restore 66
Hacking System Restore 66
Scripting System Restore 67
Backing Up the Registry Regularly 68
Planning a Backup Strategy 69
Backing Up System State Data 70
Restoring System State Data 71
Backing Up User Settings 72
Recovering from Disasters 73
Advanced Options Menu 73
Recovery Console 74
Automated System Recovery 76
Chapter 4: Hacking the Registry 78
Overview 78
Redirecting Special Folders 78
Customizing Shell Folders 80
Renaming Desktop Icons 82
ii
Table of Contents
Chapter 4: Hacking the Registry
Using Custom Icon Images 83
Adding Desktop Icons 83
Hiding Desktop Icons 85
Customizing File Associations 85
Running Programs from My Computer 86
Open Command Prompts at Folders 88
Rooting Windows Explorer at a Folder 89
Adding InfoTips to Program Classes 90
Adding File Templates 92
Preventing Messenger from Running 93
Personalizing the Start Menu 93
Configuring the Menu's Contents 94
Trimming the Frequently Used Programs List 96
Restoring the Sort Order 97
Customizing Internet Explorer 98
Extending the Shortcut Menus 98
Changing the Toolbar Background 99
Customizing Search URLs 99
Clearing History Lists 102
Running Programs at Startup 102
Controlling Registry Editor 103
Default Action for REG Files 103
Storing Window Position and Size 103
Logging On Automatically 104
Changing User Information 104
Looking for More Hacks 105
Chapter 5: Mapping Tweak UI 106
Overview 106
General 106
Focus 108
Mouse 109
Hover 110
Wheel 110
X−Mouse 110
Explorer 111
Shortcut 112
Colors 113
Thumbnails 113
Command Keys 114
Common Dialog Boxes 115
Taskbar 116
Grouping 116
XP Start Menu 117
Desktop 118
First Icon 119
My Computer 119
Drives 119
Special Folders 120
iii
Table of Contents
Chapter 5: Mapping Tweak UI
AutoPlay 121
Control Panel 122
Templates 122
Internet Explorer 123
Search 123
View Source 124
Command Prompt 125
Logon 125
Autologon 125
Part II: Registry in Management 127
Chapter List 127
Part Overview 127
Chapter 6: Using Registry−Based Policy 128
Overview 128
Editing Local Policies 128
Group Policy Extensions 130
Registry−Based Policy 131
Group Policy Storage 134
Extending Registry−Based Policy 135
Comments 137
Strings 137
CLASS 138
CATEGORY 139
KEYNAME 140
POLICY 140
EXPLAIN 142
VALUENAME 142
VALUEON and VALUEOFF 142
ACTIONLIST 142
PART 143
CHECKBOX 145
COMBOBOX 147
DROPDOWNLIST 148
EDITTEXT 150
LISTBOX 151
NUMERIC 152
TEXT 154
Deploying Registry−Based Policy 155
Windows 2000 Server−Based Networks 155
Windows NT−Based and Other Networks 156
Customizing WindowsXP 157
Using the Group Policy Tools 159
Gpresult 159
Gpupdate 160
Help and Support Center 161
Resultant Set of Policy 162
Finding More Resources 163
iv
Table of Contents
Chapter 7: Managing Registry Security 164
Overview 164
Setting Keys' Permissions 164
Adding Users to ACLs 166
Removing Users from ACLs 166
Assigning Special Permissions 167
Mapping Default Permissions 168
Taking Ownership of Keys 172
Auditing Registry Access 173
Preventing Local Registry Access 174
Restricting Remote Registry Access 175
Deploying Security Templates 175
Creating a Security Management Console 176
Choosing a Predefined Security Template 177
Building a Custom Security Template 178
Analyzing a Computer's Configuration 179
Modifying a Computer's Configuration 180
Deploying Security Templates on the Network 181
Chapter 8: Finding Registry Settings 182
Comparing REG Files 182
Using WinDiff 184
Using Word 2002 185
Comparing with Reg.exe 186
Auditing the Registry 187
Setting Audit Policy 188
Auditing Registry Keys 188
Analyzing the Results 189
Monitoring the Registry 189
Using Winternals Regmon 189
Filtering for Better Results 191
Part III: Registry in Deployment 192
Chapter List 192
Part Overview 192
Chapter 9: Scripting Registry Changes 193
Overview 193
Choosing a Technique 193
Installing INF Files 194
Starting with a Template 195
Linking Sections Together 197
Adding Keys and Values 198
Deleting Keys and Values 200
Setting and Clearing Bits 200
Using Strings in INF Files 202
Setting Values with REG Files 203
Exporting Settings to REG Files 204
Creating REG Files Manually 205
Encoding Special Characters 206
v
Table of Contents
Chapter 9: Scripting Registry Changes
Deleting Keys Using a REG File 207
Editing from the Command Prompt 207
Adding Keys and Values 208
Querying Values 209
Deleting Keys and Values 209
Comparing Keys and Values 210
Copying Keys and Values 211
Exporting Keys to REG Files 211
Importing REG Files 212
Saving Keys to Hive Files 212
Restoring Hive Files to Keys 212
Loading Hive Files 212
Unloading Hive Files 213
Scripting Using Windows Script Host 213
Creating Script Files 214
Running Script Files 215
Formatting Key and Value Names 217
Adding and Updating Values 218
Removing Keys and Values 218
Querying Registry Values 219
Creating Windows Installer Packages 219
Chapter 10: Deploying User Profiles 221
Overview 221
Exploring User Profiles 221
Profile Hives 224
Profile Folders 224
Special Profiles 227
Getting User Profiles 228
Local Profiles 228
Roaming Profiles 229
Using Roaming User Profiles 230
Managing Roaming User Profiles 232
Understanding Fast Network Logon 233
Understanding the New Merge 234
Deploying Default User Profiles 235
Customizing User Settings 236
Cleaning User Profiles 237
Creating Default User Folders 239
Deploying Default User Folders 240
Coexisting with Earlier Versions of Windows 240
Migrating User Settings to WindowsXP 241
Files And Settings Transfer Wizard 241
User State Migration Tool 242
Chapter 11: Mapping Windows Installer 243
Overview 243
Repairing Registry Settings 243
Managing Windows Installer with Policies 244
vi
Table of Contents
Chapter 11: Mapping Windows Installer
Installing with Elevated Privileges 246
Caching Transforms in Secure Location 247
Locking Down Windows Installer 247
Removing Windows Installer Data 248
Msizap.exe 248
Msicuu.exe 249
Inventorying Applications 250
Chapter 12: Deploying with Answer Files 253
Overview 253
Creating Distribution Folders 253
Customizing Answer Files 255
Setup Manager 258
Notepad and Other Text Editors 260
Adding Settings to Unattend.txt 262
[GuiRunOnce] 262
Cmdlines.txt 263
Logging On Automatically After Installation 264
Chapter 13: Cloning Disks with Sysprep 266
Overview 266
Cloning WindowsXP 266
Windows XP Tools 268
Sysprep Limitations 268
Building a Disk Image 269
Customizing Mini−Setup 270
Preparing for Duplication 272
Cloning the Disk Image 272
Reducing Image Count 275
Filling SysprepMassStorage Manually 275
Filling SysprepMassStorage Automatically 276
Cleaning Up After Sysprep 276
Mapping Sysprep Settings 277
Keeping Perspective 278
Chapter 14: Microsoft Office XP User Settings 280
Overview 280
Profile Wizard 280
Customizing the Wizard 281
Capturing Settings 288
Deploying Settings 289
Custom Installation Wizard 290
Add/Remove Registry Entries 291
Customize Default Application Settings 292
Change Office User Settings 293
Add Installations and Run Programs 294
Custom Maintenance Wizard 295
Group and System Policy 295
vii
Table of Contents
Chapter 15: Working Around IT Problems 298
Controlling Just−in−Time Setup 298
Outlook Express 299
Windows Media Player 300
Desktop Themes 300
Other Shortcuts 301
Removing Components 302
Answer File [Components] Section 302
Extending Windows Components Wizard 304
Removing Components After Installation 305
Hiding Non−Removable Components 306
Removing Policy Tattoos 307
Elevating Processes' Privileges 309
Group Policy 309
Secondary Logon 310
Scheduled Tasks 310
AutoLogon 311
Severing File Associations 313
Deploying Office XP Trusted Sources 314
Enabling Remote Desktop Remotely 314
Customizing the WindowsXP Logon 315
Part IV: Appendices 316
Appendix List 316
Part Overview 316
Appendix A: File Associations 317
Overview 317
Merge Algorithm 317
File Extension Keys 317
OpenWithList 318
PerceivedType 319
ShellNew 319
Program Class Keys 319
DefaultIcon 321
EditFlags 321
Shell 322
Specialized Keys 323
Applications 324
SystemFileAssociations 324
Unknown 324
COM Class Keys 324
Appendix B: Per−User Settings 327
Overview 327
AppEvents 327
Console 328
Control Panel 329
Desktop 330
Desktop\Window Metrics 333
viii
Table of Contents
Appendix B: Per−User Settings
Mouse 335
Environment 336
Keyboard Layout 336
Network 337
Printers 337
SessionInformation 337
Software 337
Classes 338
Microsoft\Command Processor 338
Microsoft\Internet Connection Wizard 339
Microsoft\Internet Explorer 339
Microsoft\Internet Explorer\MenuExt 340
Microsoft\Internet Explorer\SearchURL 341
Microsoft\MessengerService 342
Microsoft\Office 343
Microsoft\Search Assistant 344
Microsoft\VBA\Trusted 344
Policies 345
Software\Microsoft\Windows\CurrentVersion 346
Explorer\Advanced 346
Explorer\AutoComplete 350
Explorer\ComDlg32 350
Explorer\HideDesktopIcons 350
Explorer\HideMyComputerIcons 350
Explorer\MenuOrder 350
Explorer\RecentDocs 351
Explorer\RunMRU 351
Explorer\User Shell Folders 351
Appendix C: Per−Computer Settings 353
Overview 353
HARDWARE 353
DESCRIPTION 354
DEVICEMAP 354
SAM 355
SECURITY 355
SOFTWARE 356
Classes 356
Clients 356
Microsoft\Active Setup 357
Microsoft\Command Processor 358
Microsoft\Driver Signing 359
Microsoft\InternetExplorer 360
Microsoft\Sysprep 360
Microsoft\Windows NT\CurrentVersion 360
Policies 361
SOFTWARE\Microsoft\Windows\CurrentVersion 361
App Paths 362
Applets 362
ix
[...]... 3 Introduction The registry is the heart and soul of Microsoft WindowsXP In my other registry books, I said the same thing about the registry in every version of Windows since MicrosoftWindows 95, and by the time you're finished reading this book, I hope you'll agree The registry contains the configuration data that makes the operating system work The registry enables developers to organize... behind just about every feature in WindowsXP that you think is cool More importantly, it enables you to customize WindowsXP in ways you can't through the user interface WindowsXP and every application that runs on Microsoft' s latest desktop operating system do absolutely nothing without consulting the registry first When you double−click a file, WindowsXP consults the registry to figure out what to... "Managing Registry Security" WindowsXP secures settings in the registry This chapter shows you how to manage the registry' s security It also shows you how to poke selective holes in the registry' s security so that you can deploy and run legacy applications on WindowsXP • Chapter 8, "Finding Registry Settings" Finding the location where WindowsXP stores a setting in the registry is easy, as long as... of the Registry The structure of WindowsXP' s registry is so similar to the structure of its file system that I can't help but make the analogy Figure 1−4 compares Registry Editor, the tool you use to edit the registry, and Windows Explorer (You learn how to use Registry Editor in Chapter 2, "Using the Registry 20 Editor.") In the editor's left pane, which is called the key pane, you see the registry' s... show you how to prevent WindowsXP from creating the Microsoft Outlook Express icon on the desktop when a user logs on to the computer for the first time This Book Is Different—Really This book contains information that you're not going to find in any other book about the Windows XPregistry You'll learn how to track down where WindowsXP and other programs store settings in the registry You'll learn... job easier A lot of the book focuses on how the registry affects WindowsXP and Office XP deployment You'll learn about creating and deploying effective default user profiles You'll learn how to deploy settings with Windows XP and Office XP You'll even learn how to build your own Windows Installer package files expressly for managing settings in the registry The best part is that just about every tool... Per−Computer Settings Explorer 362 Explorer\AutoplayHandlers 363 Explorer\Desktop\NameSpace .363 Explorer\FindExtensions 363 Explorer\HideDesktopIcons 364 Explorer\HideMyComputerIcons 364 Explorer\MyComputer 364 Explorer\NetworkNeighborhood\NameSpace 364 Explorer\RemoteComputer\NameSpace 365 Explorer\StartMenu... the registry itself, there are a few changes that struck me right away First Microsoft got rid of the dueling registry editors Windows 2000 had two editors: Regedit and Regedt32 Both had strengths and weakness, and you had no choice but to flip back and forth between each WindowsXP combines both editors into a single registry editor Another new feature is Console Registry Tool for Windows (Reg) Windows. .. contains most of WindowsXP' s settings You can do nothing in WindowsXP that doesn't access the registry I use a tool to monitor registry access and often leave it running while clicking around the operating system's user interface I almost never see this monitor idle With every click, WindowsXP consults the registry Every time I launch a program, the operating system consults the registry Every application... Introducing MicrosoftWindows 2000 Professional (Microsoft Press, 1999) He has written six other books about the registry Most of his books are sold internationally and are available in a variety of languages Jerry is also a columnist for Microsoft Expert Zone, a Web site for WindowsXP enthusiasts, and makes frequent contributions to a variety of content areas on Microsoft' s Web site: Office XP, TechNet, . Microsoft Windows XP Registry Guide
Table of Contents
Microsoft Windows XP Registry Guide 1
Introduction 4
This Book. 426
List of Sidebars 428
x
Microsoft Windows XP Registry Guide
Jerry Honeycutt
Microsoft Press
A Division of Microsoft Corporation One Microsoft Way Redmond