Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 50 trang
THÔNG TIN TÀI LIỆU
Cấu trúc
Cover
Copyright Page
Contents at a Glance
Table of Contents
Acknowledgments
Introduction
Part I: Overview
Chapter 1: Overview of Windows 7 Improvements
Windows 7 Improvements by Chapter
User Interactions
Performance
Mobility
Reliability and Supportability
Troubleshooting
Deployment
Windows 7 Editions
Windows 7 Starter
Windows 7 Home Basic
Windows 7 Home Premium
Windows 7 Professional
Windows 7 Enterprise
Windows 7 Ultimate
Choosing Software and Hardware
Windows 7 Software Logo
Hardware Requirements
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 2: Security in Windows 7
Addressing Specific Security Concerns
Help Desk Calls Related to Malware
Data Theft
Security Features Previously Introduced in Windows Vista
Windows Defender
Windows Firewall
Encrypting File System
Credential Manager Enhancements
Architectural and Internal Security Improvements
New and Improved Security Features of Windows 7
BitLocker and BitLocker To Go
AppLocker
Multiple Active Firewall Profiles
User Account Control
Internet Explorer Security Features
Auditing Enhancements
Safe Unlinking in the Kernel Pool
Windows Biometric Framework
Smart Cards
Service Accounts
Summary
Additional Resources
Related Information
On the Companion Media
Part II: Deployment
Chapter 3: Deployment Platform
Tools Introduction
Windows 7 Deployment Terminology
Platform Components
Windows Imaging
Answer Files
Windows SIM
Windows Setup
Sysprep
Windows PE
Deployment Image Servicing and Management
Other Tools
Windows Deployment Services
ImageX
Deployment Scenarios
Upgrade Computer Scenario
New Computer Scenario
Refresh Computer Scenario
Replace Computer Scenario
Understanding Setup
Preinstallation Phase
Online Configuration Phase
Windows Welcome Phase
Basic Deployment Process
Microsoft Deployment Toolkit Process
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 4: Planning Deployment
Using the Microsoft Deployment Toolkit
Documentation
Solution Framework
Planning High-Volume Deployment
Envision
Project Planning
Build
Stabilize
Deploy
Planning Low-Volume Deployment
Scope and Objectives
Current Environment
Configuration Plan
Testing and Piloting
Rolling Out
Windows 7 Requirements
Hardware Requirements
Upgrade Paths
Preparing for Development
Application Management
Image Engineering
Deployment
Infrastructure Remediation
Operations Readiness
Security
Migration
Installing the Microsoft Deployment Toolkit
Starting Deployment Workbench
Updating Microsoft Deployment Toolkit Components
Summary
Additional Resources
Chapter 5: Testing Application Compatibility
Understanding Compatibility
What Compatibility Means
Why Applications Fail
Choosing the Best Tool
Program Compatibility Assistant
Program Compatibility Troubleshooter
Application Compatibility Toolkit
Windows XP Mode
Application Virtualization
Understanding the ACT
Support Topologies
Compatibility Evaluators
Planning for the ACT
Targeting Deployment
Choosing a Deployment Method
Choosing a Log File Location
Preparing for the ACT
Sharing the Log Processing Folder
Preparing for Microsoft Compatibility Exchange
Installing the ACT 5.5
Configuring the ACM
Collecting Compatibility Data
Analyzing Compatibility Data
Creating and Assigning Categories
Prioritizing Compatibility Data
Assessing Application Compatibility
Setting the Deployment Status
Managing Compatibility Issues
Filtering Compatibility Data
Synchronizing with the Compatibility Exchange Service
Rationalizing an Application Inventory
Identifying the Missing Applications
Selecting Specific Application Versions
Testing and Mitigating Issues
Building a Test Lab
Modeling the Production Environment
Using the Standard User Analyzer
Using the Compatibility Administrator
Deploying Application Mitigation Packages
Summary
Additional Resources
Chapter 6: Developing Disk Images
Getting Started
Prerequisite Skills
Lab Requirements
Capturing Images Using Microsoft Deployment Toolkit
Creating and Configuring a Deployment Share
Adding Operating Systems
Adding Applications
Adding Packages
Adding Out-of-Box Drivers
Creating Task Sequences
Editing a Task Sequence
Configuring Group and Task Properties
Configuring the Options Tab
Updating the Deployment Share
Capturing a Disk Image for LTI
Preparing Images Manually
Customizing Microsoft Deployment Toolkit
Summary
Additional Resources
Chapter 7: Migrating User State Data
Evaluating Migration Technologies
Windows Easy Transfer
User State Migration Tool
Microsoft IntelliMirror
Using Windows Easy Transfer
Refresh Computer
Replace Computer
Planning User State Migration Using USMT
Choosing Subject Matter Experts
Identifying User State Data
Prioritizing Migration Tasks
Choosing a Data Store Location
Automating USMT
Testing User State Migration
Installing USMT
Network Share
Windows PE Media
Microsoft Deployment Toolkit
Configuration Manager
Understanding USMT Components
Scanstate.exe
Loadstate.exe
Migration Files
Developing Migration Files
Customizing USMT
Control File Syntax
Deploying Migration Files
Using USMT in Microsoft Deployment Toolkit
Specifying the Data Store Location
Adding Custom Migration Files
Summary
Additional Resources
Chapter 8: Deploying Applications
Preparing the Lab
Planning Deployment
Priorities
Categories
Installation Methods
Subject Matter Experts
Configurations
Choosing a Deployment Strategy
Thick Images
Thin Images
Hybrid Images
Automating Installation
Windows Installer
InstallShield
Legacy InstallShield
Legacy InstallShield PackageForTheWeb
Legacy Wise Installation System
Windows Script Host
Repackaging Legacy Applications
The Repackaging Process
Repackaging Tools
Injecting in a Disk Image
Adding Applications
Creating Dependencies
Installing Applications
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 9: Preparing Windows PE
Exploring Windows PE
Capabilities
Limitations
New Features of Windows PE 3.0
Setting Up the Environment
Installing the Windows AIK 2.0
Configuring the Build Environment
Removing the Build Environment
Working with Windows PE
Mounting Windows PE
Adding Packages
Copying Applications
Adding Device Drivers
Installing Updates
Committing the Changes
Creating Bootable Media
Customizing Windows PE
Automating Windows PE
Automating with Unattend.xml
Adding Images to Windows Deployment Services
Using Windows PE with Microsoft Deployment Toolkit
Summary
Additional Resources
Chapter 10: Configuring Windows Deployment Services
Introducing Windows Deployment Services
Service Architecture
Operating Modes
Planning for Windows Deployment Services
Choosing a Version of Windows Deployment Services
Server Requirements
Client Computer Requirements
DHCP Requirements
Routing Requirements
Capacity Requirements
Installing Windows Deployment Services
Windows Server 2003
Windows Server 2008 R2
Configuring Windows Deployment Services
Preparing Discover Images
Importing Images
Importing Boot Images
Importing Install Images
Managing and Deploying Driver Packages
Deploying Driver Packages to Clients
Managing Driver Groups and Driver Packages
Adding Driver Packages to Boot Images
Managing Image Security
Pre-staging Client Computers
Configuring Administrator Approval
Installing Windows 7
Capturing Custom Images
Creating Multicast Transmissions
Multicast Prerequisites
Transmission Types
Performing Multicast Deployment
Using Windows Deployment Services with Microsoft Deployment Toolkit
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 11: Using Volume Activation
Introduction
Activation Options
Retail
Original Equipment Manufacturer
Volume Licensing
Key Management Service
Minimum Computer Requirements
How KMS Works
Planning a KMS Deployment
Multiple Activation Key
Volume Activation Management Tool
MAK Architecture
Volume Activation Scenarios
Core Network
Isolated Networks
Individual Disconnected Computers
Test/Development Labs
What If Systems Are Not Activated?
Grace Period
Grace Period Expiration
Product Keys
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 12: Deploying with Microsoft Deployment Toolkit
Introducing MDT 2010
Deployment Scenarios
Resource Access
Using LTI with MDT 2010
Replicating a Deployment Share
Preparing Windows Deployment Services
Configuring Resources
Configuring CustomSettings.ini
Automating the LTI Process
Performing LTI Deployments
Customizing MDT 2010
Configuring Multiple Computers
Configuring Individual Computers
Customizing CustomSettings.ini
Customizing BootStrap.ini
Using the MDT 2010 Database
Summary
Additional Resources
Part III: Desktop Management
Chapter 13: Overview of Management Tools
Included Tools
Group Policy
Windows Management Instrumentation
Windows PowerShell
Windows Remote Management
Command-Line Tools
Remote Desktop
Downloadable Tools
Microsoft Network Monitor
Microsoft Baseline Security Analyzer
Microsoft IPsec Diagnostic Tool
Windows NT Backup-Restore Utility
Windows Sysinternals Suite
Windows 7 Enterprise and the Microsoft Desktop Optimization Pack
Microsoft Application Virtualization
Microsoft Advanced Group Policy Management
Microsoft Asset Inventory Service
Microsoft Diagnostics and Recovery Toolset
Microsoft Enterprise Desktop Virtualization
Microsoft System Center Desktop Error Monitoring
Microsoft System Center
System Center Configuration Manager
System Center Operations Manager
System Center Data Protection Manager
System Center Virtual Machine Manager
System Center Essentials
Introduction to Windows PowerShell Scripting
Working with Windows PowerShell Cmdlets
Using the Pipeline to Read Text Files
Additional Pipeline Techniques
Working with Cmdlets
Scripting Fundamentals
Using the while Statement
Using the do…while Statement
Using the do…until Statement
The for Statement
The if Statement
The switch Statement
Understanding Modules
Including Functions
Adding Help for Functions
Locate and Load Modules
Install Modules
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 14: Managing the Desktop Environment
Understanding Group Policy in Windows 7
Group Policy Before Windows Vista
Group Policy in Windows Vista and Windows Server 2008
New Group Policy Features in Windows 7 and Windows Server 2008 R2
Group Policy Policy Settings in Windows 7
Understanding ADMX Template Files
Understanding Multiple Local Group Policy
Managing Group Policy
Configuring the Central Store
Adding ADMX Templates to the Store
Creating and Managing GPOs
Editing GPOs
Managing MLGPOs
Migrating ADM Templates to ADMX Format
Configuring Group Policy Processing
Using Advanced Group Policy Management
Troubleshooting Group Policy
Using Event Viewer
Enabling Debug Logging
Using Group Policy Log View
Using GPResult
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 15: Managing Users and User Data
Understanding User Profiles in Windows 7
Types of User Profiles
User Profile Namespace
Understanding Libraries
Working with Libraries
Managing Libraries
Implementing Corporate Roaming
Understanding Roaming User Profiles and Folder Redirection
Implementing Folder Redirection
Implementing Roaming User Profiles
Working with Offline Files
Enhancements to Offline Files Introduced Previously in Windows Vista
Additional Enhancements to Offline Files Introduced in Windows 7
Understanding Offline File Sync
Managing Offline Files
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 16: Managing Disks and File Systems
Overview of Partitioning Disks
How to Choose Between MBR or GPT
Converting from MBR to GPT Disks
GPT Partitions
Choosing Basic or Dynamic Disks
Working with Volumes
How to Create a Simple Volume
How to Create a Spanned Volume
How to Create a Striped Volume
How to Resize a Volume
How to Delete a Volume
How to Create and Use a Virtual Hard Disk
File System Fragmentation
Backup And Restore
How File Backups Work
File and Folder Backup Structure
How System Image Backups Work
How to Start a System Image Backup from the Command Line
How to Restore a System Image Backup
System Image Backup Structure
Best Practices for Computer Backups
How to Manage Backup Using Group Policy Settings
Previous Versions and Shadow Copies
Windows ReadyBoost
BitLocker Drive Encryption
How BitLocker Encrypts Data
How BitLocker Protects Data
BitLocker To Go
BitLocker Phases
Requirements for Protecting the System Volume with BitLocker
How to Enable the Use of BitLocker on the System Volume on Computers Without TPM
How to Enable BitLocker Encryption on System Volumes
How to Enable BitLocker Encryption on Data Volumes
How to Manage BitLocker Keys on a Local Computer
How to Manage BitLocker from the Command Line
How to Recover Data Protected by BitLocker
How to Disable or Remove BitLocker Drive Encryption
How to Decommission a BitLocker Drive Permanently
How to Prepare AD DS for BitLocker
How to Configure a Data Recovery Agent
How to Manage BitLocker with Group Policy
The Costs of BitLocker
Encrypting File System
How to Export Personal Certificates
How to Import Personal Certificates
How to Grant Users Access to an Encrypted File
Symbolic Links
How to Create Symbolic Links
How to Create Relative or Absolute Symbolic Links
How to Create Symbolic Links to Shared Folders
How to Use Hard Links
Disk Quotas
How to Configure Disk Quotas on a Single Computer
How to Configure Disk Quotas from a Command Prompt
How to Configure Disk Quotas by Using Group Policy Settings
Disk Tools
Disk Usage
EFSDump
SDelete
Streams
Sync
MoveFile and PendMoves
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 17: Managing Devices and Services
Understanding Device Installation and Management
Device Enhancements in Windows 7
Understanding Device Installation
Installing and Using Devices
Managing Device Installation Using Group Policy
Troubleshooting Device Installation
Understanding Power Management
Power Management Enhancements in Windows 7
Configuring Power Management Settings
Understanding Services
Service Enhancements in Windows 7
Managing Services
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 18: Managing Printing
Enhancements to Printing in Windows 7
Printing Enhancements Previously Introduced in Windows Vista
Additional Printing Enhancements in Windows 7
How Printing Works in Windows 7
Understanding XPS
Understanding the Windows Printing Subsystem
Understanding Printer Driver Isolation
Understanding the Print Management Console
Enhancements to the Print Management Console in Windows 7
The Print Management Console
Adding and Removing Print Servers
Configuring Default Security for Print Servers
Adding Printers Using the Network Printer Installation Wizard
Creating and Using Printer Filters
Creating and Using Driver Filters
Managing Printers Using Print Management
Configuring Properties of Printers
Publishing Printers in AD DS
Managing Printer Drivers
Configuring Printer Driver Isolation Mode
Exporting and Importing Print Server Configurations
Performing Bulk Actions Using Print Management
Client-Side Management of Printers
Installing Printers Using the Add Printers Wizard
Searching for Printers
Installing Printers Using Point and Print
Using Devices And Printers
Using Location-Aware Printing
Using the Color Management CPL
Managing Client-Side Printer Experience Using Group Policy
Configuring the Add Printer Wizard
Disable Client-Side Printer Rendering
Configuring Package Point and Print Restrictions
Extending Point and Print Using Windows Update
Deploying Printers Using Group Policy
Preparing to Deploy Printers
Deploying a Printer Connection
Limitations of Deploying Printers Using Group Policy
Assigning Printers Based on Location
Migrating Print Servers
Migrate Print Servers Using Print Management
Migrating Print Servers Using PrintBRM
Monitoring and Troubleshooting Printers
Configuring E-Mail Notifications
Configuring Print Server Notifications
Configuring Script Actions
Configuring Detailed Event Logging
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 19: Managing Search
Search and Indexing Enhancements
Search in Windows XP
Search in Windows Vista
Search in Windows 7
Understanding the Windows Search Versions
How Windows Search Works
Understanding Search Engine Terminology
Windows Search Engine Processes
Enabling the Indexing Service
Windows Search Engine Architecture
Understanding the Catalog
Understanding the Indexing Process
Understanding Remote Search
Managing Indexing
Configuring the Index
Configuring Offline Files Indexing
Configuring Indexing of Encrypted Files
Configuring Indexing of Similar Words
Configuring Indexing of Text in TIFF Image Documents
Other Index Policy Settings
Using Search
Configuring Search Using Folder Options
Using Start Menu Search
Searching Libraries
Using Federated Search
Troubleshooting Search and Indexing Using the Built-in Troubleshooter
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 20: Managing Windows Internet Explorer
Internet Explorer 8 Improvements
InPrivate Browsing
InPrivate Filtering
Compatibility View
SmartScreen
Domain Highlighting
Tab Isolation
Accelerators
Improvements Previously Introduced in Internet Explorer 7
User Interface Changes
Tabbed Browsing
Search Bar
RSS Feeds
Improved Standards Support
Expanded Group Policy Settings
Defending Against Malware
Protecting Against Data Theft
Security Zones
Managing Internet Explorer Using Group Policy
Group Policy Settings for Internet Explorer 7 and Internet Explorer 8
New Group Policy Settings for Internet Explorer 8
Using the Internet Explorer Administration Kit
Troubleshooting Internet Explorer Problems
Internet Explorer Does Not Start
An Add-on Does Not Work Properly
Some Web Pages Do Not Display Properly
Preventing Unwanted Toolbars
The Home Page or Other Settings Have Changed
Summary
Additional Resources
Related Information
On the Companion Media
Part IV: Desktop Maintenance
Chapter 21: Maintaining Desktop Health
Performance Monitoring
Improvements to Performance Monitoring in Windows 7
Using Performance Monitor
Resource Monitor
Overview Tab
CPU Tab
Memory Tab
Disk Tab
Network Tab
Reliability Monitor
How Reliability Monitor Works
Windows Performance Tools Kit
Event Monitoring
Understanding the Windows Event Architecture
Channels
Improvements to Event Monitoring in Windows 7
Using Event Viewer
Using the Windows Events Command-Line Utility for Event Monitoring
Using Windows PowerShell for Event Monitoring
Using Task Scheduler
Improvements to Task Scheduler in Windows 7
Understanding Tasks
Understanding the Task Scheduler Architecture
Understanding Task Scheduler Security
Understanding AT and Task Scheduler v1.0 Compatibility Modes
Understanding the Task Scheduler Snap-in
Understanding Default Tasks
Creating Tasks
Managing Tasks
Using SchTasks.exe for Creating and Managing Tasks
Task Scheduler Events
Troubleshooting Task Scheduler
Interpreting Result and Return Codes
Understanding the Windows System Assessment Tool
Understanding WinSAT Assessment Tests
Examining the WinSAT Features Assessment
Running WinSAT from the Command Line
Understanding WinSAT Command Exit Values
Running WinSAT Using Performance Information and Tools
Understanding Windows Error Reporting
Overview of Windows Error Reporting
How WER Works
Understanding the Error Reporting Cycle
Understanding WER Data
Configuring WER Using Group Policy
Configuring WER Using the Action Center
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 22: Supporting Users with Remote Assistance
Understanding Remote Assistance
Improvements to Remote Assistance in Windows 7
How Remote Assistance Works
Using Remote Assistance in the Enterprise
Interoperability with Remote Assistance in Windows Vista
Interoperability with Remote Assistance in Windows XP
Implementing and Managing Remote Assistance
Initiating Remote Assistance Sessions
Scenario 1: Soliciting Remote Assistance Using Easy Connect
Scenario 2: Soliciting Remote Assistance by Creating Remote Assistance Tickets and Saving Them on Monitored Network Shares
Scenario 3: Offering Remote Assistance Using DCOM
Managing Remote Assistance Using Group Policy
Configuring Remote Assistance in Unmanaged Environments
Additional Registry Settings for Configuring Remote Assistance
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 23: Managing Software Updates
Methods for Deploying Updates
Windows Update Client
Windows Server Update Services
System Center Configuration Manager 2007 R2
Manually Installing, Scripting, and Removing Updates
Overview of Windows 7 Update Files
How to Script Update Installations
How to Remove Updates
Deploying Updates to New Computers
Managing BITS
BITS Behavior
BITS Group Policy Settings
Managing BITS with Windows PowerShell
Windows Update Group Policy Settings
Configuring Windows Update to Use a Proxy Server
Tools for Auditing Software Updates
The MBSA Console
MBSACLI
Troubleshooting the Windows Update Client
The Process of Updating Network Software
Assembling the Update Team
Inventorying Software
Creating an Update Process
How Microsoft Distributes Updates
Security Updates
Update Rollups
Service Packs
Microsoft Product Life Cycles
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 24: Managing Client Protection
Understanding the Risk of Malware
User Account Control
UAC for Standard Users
UAC for Administrators
UAC User Interface
How Windows Determines Whether an Application Needs Administrative Privileges
UAC Virtualization
UAC and Startup Programs
Compatibility Problems with UAC
How to Configure UAC
How to Configure Auditing for Privilege Elevation
Other UAC Event Logs
Best Practices for Using UAC
AppLocker
AppLocker Rule Types
Auditing AppLocker Rules
DLL Rules
Custom Error Messages
Using AppLocker with Windows PowerShell
Using Windows Defender
Understanding Windows Defender
Windows Defender Alert Levels
Understanding Microsoft SpyNet
Configuring Windows Defender Group Policy
Configuring Windows Defender on a Single Computer
How to Determine Whether a Computer Is Infected with Spyware
Best Practices for Using Windows Defender
How to Troubleshoot Problems with Unwanted Software
Network Access Protection
Forefront
Summary
Additional Resources
On the Companion Media
Part V: Networking
Chapter 25: Configuring Windows Networking
Usability Improvements
Network And Sharing Center
Network Explorer
Network Map
Set Up A Connection Or Network Wizard
Manageability Improvements
Network Location Types
Policy-Based QoS
Windows Firewall and IPsec
Windows Connect Now
Core Networking Improvements
BranchCache
DNSsec
GreenIT
Efficient Networking
Scalable Networking
Improved Reliability
IPv6 Support
802.1X Network Authentication
Server Message Block (SMB) 2.0
Strong Host Model
Wireless Networking
Improved APIs
Network Awareness
Improved Peer Networking
EAPHost Architecture
Layered Service Provider (LSP)
Windows Sockets Direct Path for System Area Networks
How to Configure Wireless Settings
Configuring Wireless Settings Manually
Using Group Policy to Configure Wireless Settings
Configuring Wireless Settings from the Command Line or a Script
How to Configure TCP/IP
DHCP
Configuring IP Addresses Manually
Command Line and Scripts
How to Connect to AD DS Domains
How to Connect to a Domain When 802.1X Authentication Is Not Enabled
How to Connect to a Domain When 802.1X Authentication Is Enabled
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 26: Configuring Windows Firewall and IPsec
Understanding Windows Firewall with Advanced Security
Improvements to Windows Firewall Introduced Previously in Windows Vista
Additional Improvements to Windows Firewall in Windows 7
Understanding the Windows Filtering Platform
Understanding Windows Service Hardening
Understanding Multiple Active Firewall Profiles
Understanding Rules
Managing Windows Firewall with Advanced Security
Tools for Managing Windows Firewall with Advanced Security
Common Management Tasks
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 27: Connecting Remote Users and Networks
Enhancements for Connecting Remote Users and Networks in Windows 7
Understanding IKEv2
Understanding MOBIKE
Understanding VPN Reconnect
Understanding DirectAccess
Understanding BranchCache
Supported Connection Types
Outgoing Connection Types
Incoming Connection Types
Deprecated Connection Types
Configuring VPN Connections
Supported Tunneling Protocols
Comparing the Different Tunneling Protocols
Understanding Cryptographic Enhancements
Understanding the VPN Connection Negotiation Process
Creating and Configuring VPN Connections
Configuring Dial-Up Connections
Creating a Dial-Up Connection
Configuring a Dial-Up Connection
Advanced Connection Settings
Configuring Incoming Connections
Managing Connections Using Group Policy
Using Remote Desktop
Understanding Remote Desktop
Configuring and Using Remote Desktop
Configuring and Using RemoteApp and Desktop Connection
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 28: Deploying IPv6
Understanding IPv6
Understanding IPv6 Terminology
Understanding IPv6 Addressing
Understanding IPv6 Routing
Understanding ICMPv6 Messages
Understanding Neighbor Discovery
Understanding Address Autoconfiguration
Understanding Name Resolution
IPv6 Enhancements in Windows 7
Summary of IPv6 Enhancements in Windows 7
Configuring and Troubleshooting IPv6 in Windows 7
Displaying IPv6 Address Settings
Configuring IPv6 in Windows 7 Using the User Interface
Configuring IPv6 in Windows 7 Using Netsh
Other IPv6 Configuration Tasks
Troubleshooting IPv6 Connectivity
Planning for IPv6 Migration
Understanding ISATAP
Migrating an Intranet to IPv6
Summary
Additional Resources
Related Information
On the Companion Media
Part VI: Troubleshooting
Chapter 29: Configuring Startup and Troubleshooting Startup Issues
What’s New with Windows Startup
Boot Configuration Data
System Recovery
Windows Boot Performance Diagnostics
Understanding the Startup Process
Power-on Self Test Phase
Initial Startup Phase
Windows Boot Manager Phase
Windows Boot Loader Phase
Kernel Loading Phase
Logon Phase
Important Startup Files
How to Configure Startup Settings
How to Use the Startup And Recovery Dialog Box
How to Use the System Configuration Tool
How to Use BCDEdit
How to Remove the Windows 7 Boot Loader
How to Configure a User Account to Automatically Log On
How to Disable the Windows Startup Sound
How to Speed Up the Startup Process
The Process of Troubleshooting Startup
Startup Troubleshooting Before the Starting Windows Logo Appears
Startup Troubleshooting After the Starting Windows Logo Appears
Troubleshooting Startup Problems After Logon
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 30: Troubleshooting Hardware, Driver, and Disk Issues
Windows 7 Improvements for Hardware and Driver Troubleshooting
Windows Troubleshooting Platform
Reliability Monitor
Resource Monitor
Windows Memory Diagnostics
Disk Failure Diagnostics
Self-Healing NTFS
Improved Driver Reliability
Improved Error Reporting
The Process of Troubleshooting Hardware Issues
How to Troubleshoot Problems That Prevent Windows from Starting
How to Troubleshoot Problems Installing New Hardware
How to Troubleshoot Problems with Existing Hardware
How to Troubleshoot Unpredictable Symptoms
How to Diagnose Hardware Problems
How to Use Device Manager to Identify Failed Devices
How to Check the Physical Setup of Your Computer
How to Check the Configuration of Your Hardware
How to Verify That System Firmware and Peripheral Firmware Are Up to Date
How to Test Your Hardware by Running Diagnostic Tools
How to Diagnose Disk-Related Problems
How to Use Built-In Diagnostics
How to Use Reliability Monitor
How to Use Event Viewer
How to Use Data Collector Sets
How to Use Windows Memory Diagnostics
How to Troubleshoot Disk Problems
How to Prepare for Disk Failures
How to Use ChkDsk
How to Use the Disk Cleanup Wizard
How to Disable Nonvolatile Caching
How to Troubleshoot Driver Problems
How to Find Updated Drivers
How to Roll Back Drivers
How to Use Driver Verifier
How to Use the File Signature Verification
How to Use Device Manager to View and Change Resource Usage
How to Use System Restore
How to Troubleshoot USB Problems
How to Solve USB Driver and Hardware Problems
Understanding USB Limitations
How to Identify USB Problems Using Performance Monitor
How to Examine USB Hubs
How to Troubleshoot Bluetooth Problems
Troubleshooting Tools
DiskView
Handle
Process Monitor
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 31: Troubleshooting Network Issues
Tools for Troubleshooting
Arp
Event Viewer
IPConfig
Nblookup
Nbtstat
Net
Netstat
Network Monitor
Nslookup
PathPing
Performance Monitor
Data Collector Sets
Resource Monitor
Ping
PortQry
Route
Task Manager
TCPView
Telnet Client
Testing Service Connectivity
Test TCP
Windows Network Diagnostics
The Process of Troubleshooting Network Problems
How to Troubleshoot Network Connectivity Problems
How to Troubleshoot Application Connectivity Problems
How to Troubleshoot Name Resolution Problems
How to Troubleshoot Performance Problems and Intermittent Connectivity Issues
How to Troubleshoot Joining or Logging on to a Domain
How to Troubleshoot Network Discovery
How to Troubleshoot File and Printer Sharing
How to Troubleshoot Wireless Networks
How to Troubleshoot Firewall Problems
Summary
Additional Resources
Related Information
On the Companion Media
Chapter 32: Troubleshooting Stop Messages
Stop Message Overview
Identifying the Stop Error
Finding Troubleshooting Information
Stop Messages
Types of Stop Errors
Memory Dump Files
Configuring Small Memory Dump Files
Configuring Kernel Memory Dump Files
Configuring Complete Memory Dump Files
How to Manually Initiate a Stop Error and Create a Dump File
Using Memory Dump Files to Analyze Stop Errors
Being Prepared for Stop Errors
Prevent System Restarts After a Stop Error
Record and Save Stop Message Information
Check Software Disk Space Requirements
Install a Kernel Debugger and Symbol Files
Common Stop Messages
Stop 0xA or IRQL_NOT_LESS_OR_EQUAL
Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED
Stop 0x24 or NTFS_FILE_SYSTEM
Stop 0x2E or DATA_BUS_ERROR
Stop 0x3B or SYSTEM_SERVICE_EXCEPTION
Stop 0x3F or NO_MORE_SYSTEM_PTES
Stop 0x50 or PAGE_FAULT_IN_NONPAGED_AREA
Stop 0x77 or KERNEL_STACK_INPAGE_ERROR
Stop 0x7A or KERNEL_DATA_INPAGE_ERROR
Stop 0x7B or INACCESSIBLE_BOOT_DEVICE
Stop 0x7F or UNEXPECTED_KERNEL_MODE_TRAP
Stop 0x9F or DRIVER_POWER_STATE_FAILURE
Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY
Stop 0xC2 or BAD_POOL_CALLER
Stop 0xCE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS
Stop 0xD1 or IRQL_NOT_LESS_OR_EQUAL
Stop 0xD8 or DRIVER_USED_EXCESSIVE_PTES
Stop 0xEA or THREAD_STUCK_IN_DEVICE_DRIVER
Stop 0xED or UNMOUNTABLE_BOOT_VOLUME
Stop 0xFE or BUGCODE_USB_DRIVER
Stop 0x00000124
Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED
Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH
Hardware Malfunction Messages
Stop Message Checklist
Check Your Software
Check Your Hardware
Summary
Additional Resources
Related Information
On the Companion Media
Appendix
Accessibility in Windows 7
Ease of Access Center
Additional Accessibility Features
Using the Ease of Access Center
Using Magnifier
Using Narrator
Using the On-Screen Keyboard
Ease of Access Keyboard Shortcuts
Windows Speech Recognition
Assistive Technology Products
Microsoft Accessibility Resource Centers
Additional Resources
Glossary
Index
About the Authors
System Requirements
Nội dung
Working with Offline Files CHAPTER 15
603
If you do not configure this policy setting, the system limits the space that offline files
occupy to 25 percent of the total space on the drive where the Offline Files cache is
located. The limit for automatically cached files is 100 percent of the total disk space
limit. However, the users can change these values using the Offline Files Control Panel
tool.
If you enable this setting and specify a total size limit greater than the size of the drive
hosting the Offline Files cache and that drive is the system drive, the total size limit is
automatically adjusted downward to 75 percent of the size of the drive. If the cache
is located on a drive other than the system drive, the limit is automatically adjusted
downward to 100 percent of the size of the drive.
If you enable this setting and specify a total size limit less than the amount of space
currently used by the Offline Files cache, the total size limit is automatically adjusted
upward to the amount of space currently used by offline files. The cache is then con-
sidered full.
If you enable this setting and specify an auto-cached space limit greater than the total
size limit, the auto-cached limit is automatically adjusted downward to equal the total
size limit.
note The Limit Disk Space Used By Offline Files policy setting replaces the Default
Cache Size policy setting used by earlier versions of Windows.
n
Turn On Economical Application Of Administratively Assigned Offline Files This
policy setting allows you to turn on economical application of administratively assigned
Offline Files.
If you enable this policy setting, only new files and folders in administratively assigned
folders are synchronized at logon. Files and folders that are already available offline
are skipped and are synchronized later.
If you disable or do not configure this policy setting, all administratively assigned folders
are synchronized at logon.
ADDITIONAL OFFLINE FILES POLICY SETTINGS FOR WINDOWS 7
The following Group Policy settings for managing Offline Files are new in Windows 7:
n
Configure Background Sync This policy setting applies to any user who logs on to
the specified machine while this policy is in effect. This policy is in effect when a net-
work folder is determined by the Configure Slow-Link Mode policy to be in slow-link
mode.
For network folders in slow-link mode, a sync will be initiated in the background on a
regular basis, according to these settings, to synchronize the files in those shares/fold-
ers between the client and server. By default, network folders in slow-link mode will
be synchronized with the server every 360 minutes, with the start of the sync varying
between 0 and 60 additional minutes (as shown in Figure 15-18).
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
CHAPTER 15 Managing Users and User Data
604
FIGURE 15-18 The new Configure Background Sync policy setting in Windows 7
You can override the default sync interval and variance by setting Sync Interval and
Sync Variance values. You can also set a period of time in which background sync is
disabled by setting Blockout Start Time and Blockout Duration values. To ensure that
all the network folders on the machine are synchronized with the server on a regular
basis, you may also set the Maximum Allowed Time Without A Sync value.
You may also configure Background Sync for network shares that are in user-selected
Work Offline mode. This mode is in effect when a user selects the Work Offline option
for a specific share. When selected, all configured settings will apply to shares in user-
selected Work Offline mode as well.
n
Enable Transparent Caching Enabling this policy optimizes subsequent reads to
network files by a user or an application. This is done by caching reads to remote files
over a slow network in the Offline Files cache. Subsequent reads to the same file are
then satisfied from the client after verifying the integrity of the cached copy. This policy
not only improves user response times but also decreases bandwidth consumption over
the WAN links to the server. The cached files are temporary and are not available to the
user when offline. The cached files are not kept in sync with the version on the server,
and the most current version from the server is always available for subsequent reads.
This policy is triggered by the configured round-trip network latency value (shown in
Figure 15-19). We recommend using this policy when the network connection to the
server is slow. For example, you can configure a value of 60 milliseconds as the round-
trip latency of the network above which files should be transparently cached in the
Offline Files cache. If the round-trip latency of the network is less than 60 milliseconds,
reads to remote files will not be cached. If you do not configure this setting, remote
files will not be transparently cached on user clients.
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Working with Offline Files CHAPTER 15
605
FIGURE 15-19 The new Enable Transparent Caching policy setting in Windows 7
n
Exclude Files From Being Cached This policy enables administrators to exclude
certain file types from being made available offline. You need to specify the file exten-
sions of the file types that should be excluded (shown in Figure 15-20). A user then will
be unable to create a file of this type in the folders that are available offline.
FIGURE 15-20 The new Exclude Files From Being Cached policy setting in Windows 7
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
CHAPTER 15 Managing Users and User Data
606
diReCt FRoM tHe SoURCe
Troubleshooting Roaming User Profile Folder Redirection,
and Client-Side Caching Issues in Windows Vista and Later
Versions
Paul D. LeBlanc, Manager
Supportability Program
T
he following lists describe some common support issues with Folder
Redirection, RUP, and CSC in Windows Vista and later versions.
Roaming User Profile Issue Troubleshooting
Symptom: Loading temporary profile error during user logon: “Windows cannot
find the local profile and is logging you on with a temporary profile. Changes you
make to this profile will be lost when you log off.”
n
Possible cause #1: SID in ProfileList structure deleted
Explanation: Microsoft does not recommend that you delete user profiles
using anything other than the Control Panel item (Computer Properties
\Advanced System Settings\User Profiles\Settings). When the folder structure
for a user profile is deleted using Windows Explorer or the command prompt,
the corresponding registry entries under the ProfileList registry key are left
behind.
Resolution: Remove the corresponding SID entry under the ProfileList
registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion
\ProfileList.
n
Possible cause #2: User in Guests group
Explanation: During logon, the interactive user is checked for membership in
the local Guests group and the domain Guest group (if the user is the mem-
ber of a domain).
Resolution: If appropriate, remove the affected user from the local Guests
/Domain Guest membership (see http://support.microsoft.com/kb/940453).
n
Possible cause #3: Insufficient permissions (roaming profile)
Explanation: If permissions have been altered on a working roaming profile,
the user may encounter this error.
Resolution: Correct the permissions so that the user has Full Control over her
Roaming User Profile folders. If a locked-down user profile is required, use a
mandatory user profile.
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Working with Offline Files CHAPTER 15
607
Folder Redirection Troubleshooting
Symptom: Duplicate folders in user profile
n
Possible cause #1: Partial sync
Explanation: Users of Windows Vista and later versions can select various
folders within their user profiles to redirect to a local or remote drive. If only
some of the contents of a folder are moved, the user may see multiple folders
under a user profile, such as two folders named Documents or Music.
Resolution: Allow the session to complete data transfer before logoff.
n
Possible cause #2: Local and remote copies of files kept
Explanation: When a user’s folder is being redirected, the user will be asked
whether she wants to move all current content. If the user chooses not to
move the contents but only to copy them, duplicate folders will appear under
the user profile—one local, one remote.
Resolution: This is by design.
n
Possible cause #3: Program creating folder locally (application compatibility)
Explanation: After a user redirects a user profile folder or folders successfully,
on running an application, a local instance of the user profile folder(s) may
be created. This behavior is due to the application using only local resources
or having a fixed path for resources and not using the environment variables.
This is an application-specific issue.
Resolution: Update the application or do not redirect the affected user profile
folder(s).
Client-Side Caching Troubleshooting
Symptom: Files/folders not seen while offline
n
Possible cause #1: Sync has not completed (because it occurs during background)
Explanation: This is a fundamental change from Windows XP. In Windows
Vista and later versions, Offline Files will synchronize in the background as
user activity allows. This means that users will not have to wait for files to
synchronize before completing a logoff. However, this also means that,
depending on the volume and type of data that is to be synchronized,
synchronization may need further logon sessions to complete.
Resolution: Allow longer logon sessions for larger amounts of data to be
synchronized.
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
CHAPTER 15 Managing Users and User Data
608
n
Possible cause #2: Sync has not completed
Explanation: Another possible root cause of incomplete synchronization is
the same as in Windows XP—namely, if a file is in use, open file handles will
prevent the file from synchronizing.
Resolution: This is an unchanged behavior and is by design.
n
Possible cause #3: Offline files respond slowly over a VPN connection
Explanation: On computers running Windows Vista and later versions,
you experience slow performance after you establish a VPN connection.
Additionally, it may take several minutes to open a redirected shell folder.
This problem occurs if the following conditions are true:
•
Offline files are enabled on the computer.
•
Some offline files are cached on the local computer.
•
You logged on to the computer when you were offline.
•
The VPN connection is based on a slow connection.
This problem usually lasts several minutes and then disappears.
Resolution: See http://support.microsoft.com/kb/934202. (This issue has been
fixed in SP1.)
n
Possible cause #4: Changes to an offline file are not saved to the server when files
are synchronized
Explanation: When you modify an offline file in Windows Vista and later
versions, the changes are not saved to the server when files are synchronized.
When this problem occurs, you receive the following error message: “Access
Denied.” Additionally, a .tmp file that corresponds to the file appears on the
server. You may experience this symptom even when you have Change per-
missions to the shared resource.
Resolution: See http://support.microsoft.com/kb/935663. (This issue has been
fixed in SP1.)
Summary
Folder Redirection, Offline Files, and Roaming User Profiles have been enhanced in
Windows 7 to provide better support for corporate roaming scenarios and high availability
for file server scenarios. You can implement these features using the procedures outlined in
this chapter; you can manage various aspects of their behavior using Group Policy and from
the user interface.
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Additional Resources CHAPTER 15
609
Additional Resources
These resources contain additional information and tools related to this chapter.
Related Information
n
“Folder Redirection Overview” found at http://technet.microsoft.com/en-us/library
/cc732275.aspx.
n
“File Sharing and Offline Files Enhancements” found at http://technet.microsoft.com
/en-us/library/dd637828.aspx.
n
“Windows Browse and Organize Features” found at http://technet.microsoft.com
/en-us/library/dd744693.aspx.
n
Managing Roaming User Data Deployment Guide found at http://technet.microsoft.com
/en-us/library/cc766489.aspx. Note that this information is for Windows Vista, so check
first to see whether this topic has been updated for Windows7 either here or else-
where on TechNet.
On the Companion Media
n
AddLocalUserToLocalGroup.ps1
n
Change-LocalUserPassword.ps1
n
CreateLocalGroup.ps1
n
CreateLocalUser.ps1
n
Remove-LocalUserFromLocalGroup.ps1
n
Get-LocalGroupMembers.ps1
n
LocateDisabledUsers.ps1
n
Get-LocalGroups.ps1
n
Get-LocalUsers.ps1
n
LocateLockedOutLocalUsers.ps1
n
ListUserLastLogon.ps1
n
FindAdmin.ps1
n
EnableDisableUser.ps1
n
BackupFolderToServer.ps1
n
GetSystemRestoreSettings.ps1
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
611
CHAPTER 16
Managing Disks and File
Systems
n
Overview of Partitioning Disks 612
n
Working with Volumes 615
n
File System Fragmentation 622
n
Backup And Restore 624
n
Windows ReadyBoost 639
n
BitLocker Drive Encryption 641
n
Encrypting File System 662
n
Symbolic Links 664
n
Disk Quotas 670
n
Disk Tools 673
n
Summary 677
n
Additional Resources 678
T
he most important aspect of a computer is the user data. Businesses depend on the
privacy of their intellectual property to stay competitive, and government organi-
zations depend on confidentiality for national security. Thus, it’s critical that Windows
protects the availability, integrity, and privacy of the user data on client computers. The
Windows 7 operating system provides several important improvements to disk and file
management.
Windows 7 includes several improvements that both users and administrators will
appreciate. By default, backups automatically create a System Image backup of the entire
system drive. Additionally, you can store System Image backups to shared folders. System
Image backups greatly reduce the time required to restore a computer after a hard disk
failure or system corruption.
To improve data security, you can use Windows BitLocker Drive Encryption to encrypt
an entire volume, protecting the data on the disk even if the disk is physically removed
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
CHAPTER 16 Managing Disks and File Systems
612
from the computer. BitLocker works alongside Encrypting File System (EFS): BitLocker can
encrypt system files and the page file along with any other files on the volume, whereas EFS
is intended primarily to encrypt user files. Windows7 supports BitLocker To Go, enabling
removable flash drives to be encrypted with BitLocker. The BitLocker To Go Reader enables
earlier versions of Windows to read encrypted files from the removable flash drive if the user
has the required password.
This chapter describes these features, as well as features introduced in Windows Vista, in
more detail.
Overview of Partitioning Disks
Before you can format disks into volumes that applications can access, you must partition
them. Windows7 provides flexible partitioning that you can change even after you have
formatted a volume. However, it’s still important to plan ahead when creating partitions for
features such as BitLocker Drive Encryption, which has very specific partitioning requirements.
note If Windows discovers a problem with a volume, it might schedule ChkDsk to
run the next time the computer starts. Large volumes, especially volumes bigger than a
terabyte, can take a very long time to check—more than an hour. During this time, the
computer will be offline. Therefore, when you plan the size of your partitions, consider the
time required for Windows to perform a ChkDsk operation at startup.
The sections that follow describe how to partition disks in Windows 7.
How to Choose Between MBR or GPT
Master Boot Record (MBR) and Globally Unique Identifier Partition Table (GPT) are two dif-
ferent disk-partitioning systems. MBR is the most common system and is supported by every
version of Windows, including Windows Vista and Windows7. GPT is an updated and im-
proved partitioning system and is supported on Windows Vista, Windows 7, Windows Server
2008, and 64-bit versions of Windows XP and Windows Server 2003 operating systems.
GPT offers several advantages over MBR:
n
In Windows, GPT can support up to 128 partitions. MBR supports only four partitions.
n
GPT accurately describes physical disk geometry, allowing Windows to create partitions
and logical drives on cylinder boundaries. Although Windows attempts to do this for
MBR, the geometry that MBR reports has no relationship to a modern drive’s physi-
cal geometry because it has been altered to enable larger capacities. Different disk
vendors have created vendor-specific workarounds for this problem that are difficult to
manage. Therefore, partitioning is more reliable when using GPT.
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
[...]... Windows Vista and Windows 7, and they have the same functionality that basic disks have always had, plus a few extras You can create new partitions (called simple volumes in Windows Vista and Windows 7) , delete partitions, and extend or shrink the existing partitions The ability to extend or shrink an existing partition is an important new feature in Windows Vista and continues to be supported in Windows. .. 12/20/2006 4:42:12 PM Shadow Copy ID: { 271 752a4-e886-4c92-9 671 -10624ca36cd4} Original Volume: (C:)\\?\Volume{3e5 979 6e-cf1b-11da-af4b-806d6 172 696f}\ Shadow Copy Volume: \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2 Backup And Restore Chapter 16 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark 635 Originating Machine: WIN7 Service Machine: WIN7 Provider: 'Microsoft Software Shadow... folder on the target computer File and Folder Backup Structure The Backup tool in Windows XP creates a single file with a bkf extension when you perform a backup Backups in Windows Vista and Windows7 provide a more flexible and reliable file structure When a user chooses to perform a backup to an external hard disk, Windows7 automatically creates a folder in the root of the hard disk using the computer... {26fc6f1c-9610-4c0c-b10b-7e9f6fab042c} Original Volume: (C:)\\?\Volume{3e5 979 6e-cf1b-11da-af4b-806d6 172 696f}\ Shadow Copy Volume: \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1 Originating Machine: WIN7 Service Machine: WIN7 Provider: 'Microsoft Software Shadow Copy provider 1.0' Type: DataVolumeRollback Attributes: Persistent, No auto release, No writers, Differential Contents of shadow copy set ID: {d14c728d-ff85-4be1-b048-24f3aced48a9}... (PARTITION_MSFT_RESERVED_GUID, 0xE3C9E316L, 0x0B5C, 0x4DB8, 0x81, 0x7D, 0xF9, 0x2D, 0xF0, 0x02, 0x15, 0xAE) n Data partition This partition stores Windows7 system files and user files The data partition has the following partition GUID: DEFINE_GUID (PARTITION_BASIC_DATA_GUID, 0xEBD0A0A2L, 0xB9E5, 0x4433, 0x 87, 0xC0, 0x68, 0xB6, 0xB7, 0x26, 0x99, 0xC7); Additionally, dynamic disks can use two different GPT... multiple versions of a single file, Windows7 gives users the opportunity to choose from several older copies of a file when using the Previous Versions tool (also described later in this chapter) When you restore files, you only need to restore from a single backup because Windows7 automatically locates the most recent version of each file In previous versions of Windows, you need to first restore... Virtual Server 2005 or Microsoft Virtual PC Additionally, Complete PC Backup in Windows Vista created a copy of the computer’s hard disk as a VHD disk image Beginning with Windows 7, you can now mount VHDs exactly like a physical disk By mounting a VHD, you can easily copy files to and from the virtual disk Additionally, Windows 7 can be configured to boot from a VHD, as described in Chapter 29 You can... administrative command-line tool (C) Copyright 2001-2005 Microsoft Corp Shadow Copy Storage association For volume: (C:)\\?\Volume{3e5 979 6e-cf1b-11da-af4b-806d6 172 696f}\ Shadow Copy Storage volume: (C:)\\?\Volume{3e5 979 6e-cf1b-11da-af4b806d6 172 696f}\ Used Shadow Copy Storage space: 32 .70 3 MB (0%) Allocated Shadow Copy Storage space: 1.904 GB (1%) Maximum Shadow Copy Storage space: 38.061 GB (30%) n Vssadmin... Volumes In earlier versions of Windows, your choices for resizing volumes and partitions after they have been created are limited If you need to add space to a volume, your only choice is to make the disk a dynamic disk and then create a spanned volume If you want to expand or contract a partition, your only choice is to use third-party tools In Windows Vista and Windows 7, however, you can now expand... structure includes separate folders for each computer, backup set, backup session, and catalog Note When restoring files, Windows 7 looks for a folder with the current computer’s name in the root of the backup media If you need to restore files created on a different Windows 7 computer, you can either rename the folder to the current computer’s name or perform an Advanced Restore and select the Files . of Windows, including Windows Vista and Windows 7. GPT is an updated and im-
proved partitioning system and is supported on Windows Vista, Windows 7, Windows. http://technet.microsoft.com/en-us/library
/cc732 275 .aspx.
n
“File Sharing and Offline Files Enhancements” found at http://technet.microsoft.com
/en-us/library/dd6 378 28.aspx.
n
Windows Browse