1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Windows 7 Resource Kit- P14 doc

50 405 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Cấu trúc

  • Cover

    • Copyright Page

  • Contents at a Glance

  • Table of Contents

  • Acknowledgments

  • Introduction

  • Part I: Overview

    • Chapter 1: Overview of Windows 7 Improvements

      • Windows 7 Improvements by Chapter

        • User Interactions

        • Performance

        • Mobility

        • Reliability and Supportability

        • Troubleshooting

        • Deployment

      • Windows 7 Editions

        • Windows 7 Starter

        • Windows 7 Home Basic

        • Windows 7 Home Premium

        • Windows 7 Professional

        • Windows 7 Enterprise

        • Windows 7 Ultimate

      • Choosing Software and Hardware

        • Windows 7 Software Logo

        • Hardware Requirements

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 2: Security in Windows 7

      • Addressing Specific Security Concerns

        • Help Desk Calls Related to Malware

        • Data Theft

      • Security Features Previously Introduced in Windows Vista

        • Windows Defender

        • Windows Firewall

        • Encrypting File System

        • Credential Manager Enhancements

        • Architectural and Internal Security Improvements

      • New and Improved Security Features of Windows 7

        • BitLocker and BitLocker To Go

        • AppLocker

        • Multiple Active Firewall Profiles

        • User Account Control

        • Internet Explorer Security Features

        • Auditing Enhancements

        • Safe Unlinking in the Kernel Pool

        • Windows Biometric Framework

        • Smart Cards

        • Service Accounts

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

  • Part II: Deployment

    • Chapter 3: Deployment Platform

      • Tools Introduction

      • Windows 7 Deployment Terminology

      • Platform Components

        • Windows Imaging

        • Answer Files

        • Windows SIM

        • Windows Setup

        • Sysprep

        • Windows PE

        • Deployment Image Servicing and Management

        • Other Tools

        • Windows Deployment Services

        • ImageX

      • Deployment Scenarios

        • Upgrade Computer Scenario

        • New Computer Scenario

        • Refresh Computer Scenario

        • Replace Computer Scenario

      • Understanding Setup

        • Preinstallation Phase

        • Online Configuration Phase

        • Windows Welcome Phase

      • Basic Deployment Process

      • Microsoft Deployment Toolkit Process

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 4: Planning Deployment

      • Using the Microsoft Deployment Toolkit

        • Documentation

        • Solution Framework

      • Planning High-Volume Deployment

        • Envision

        • Project Planning

        • Build

        • Stabilize

        • Deploy

      • Planning Low-Volume Deployment

        • Scope and Objectives

        • Current Environment

        • Configuration Plan

        • Testing and Piloting

        • Rolling Out

      • Windows 7 Requirements

        • Hardware Requirements

        • Upgrade Paths

      • Preparing for Development

        • Application Management

        • Image Engineering

        • Deployment

        • Infrastructure Remediation

        • Operations Readiness

        • Security

        • Migration

      • Installing the Microsoft Deployment Toolkit

      • Starting Deployment Workbench

      • Updating Microsoft Deployment Toolkit Components

      • Summary

      • Additional Resources

    • Chapter 5: Testing Application Compatibility

      • Understanding Compatibility

        • What Compatibility Means

        • Why Applications Fail

      • Choosing the Best Tool

        • Program Compatibility Assistant

        • Program Compatibility Troubleshooter

        • Application Compatibility Toolkit

        • Windows XP Mode

        • Application Virtualization

      • Understanding the ACT

        • Support Topologies

        • Compatibility Evaluators

      • Planning for the ACT

        • Targeting Deployment

        • Choosing a Deployment Method

        • Choosing a Log File Location

      • Preparing for the ACT

        • Sharing the Log Processing Folder

        • Preparing for Microsoft Compatibility Exchange

        • Installing the ACT 5.5

        • Configuring the ACM

      • Collecting Compatibility Data

      • Analyzing Compatibility Data

        • Creating and Assigning Categories

        • Prioritizing Compatibility Data

        • Assessing Application Compatibility

        • Setting the Deployment Status

        • Managing Compatibility Issues

        • Filtering Compatibility Data

        • Synchronizing with the Compatibility Exchange Service

      • Rationalizing an Application Inventory

        • Identifying the Missing Applications

        • Selecting Specific Application Versions

      • Testing and Mitigating Issues

        • Building a Test Lab

        • Modeling the Production Environment

        • Using the Standard User Analyzer

        • Using the Compatibility Administrator

        • Deploying Application Mitigation Packages

      • Summary

      • Additional Resources

    • Chapter 6: Developing Disk Images

      • Getting Started

        • Prerequisite Skills

        • Lab Requirements

      • Capturing Images Using Microsoft Deployment Toolkit

      • Creating and Configuring a Deployment Share

        • Adding Operating Systems

        • Adding Applications

        • Adding Packages

        • Adding Out-of-Box Drivers

      • Creating Task Sequences

      • Editing a Task Sequence

        • Configuring Group and Task Properties

        • Configuring the Options Tab

        • Updating the Deployment Share

      • Capturing a Disk Image for LTI

      • Preparing Images Manually

      • Customizing Microsoft Deployment Toolkit

      • Summary

      • Additional Resources

    • Chapter 7: Migrating User State Data

      • Evaluating Migration Technologies

        • Windows Easy Transfer

        • User State Migration Tool

        • Microsoft IntelliMirror

      • Using Windows Easy Transfer

        • Refresh Computer

        • Replace Computer

      • Planning User State Migration Using USMT

        • Choosing Subject Matter Experts

        • Identifying User State Data

        • Prioritizing Migration Tasks

        • Choosing a Data Store Location

        • Automating USMT

        • Testing User State Migration

      • Installing USMT

        • Network Share

        • Windows PE Media

        • Microsoft Deployment Toolkit

        • Configuration Manager

      • Understanding USMT Components

        • Scanstate.exe

        • Loadstate.exe

        • Migration Files

      • Developing Migration Files

        • Customizing USMT

        • Control File Syntax

        • Deploying Migration Files

      • Using USMT in Microsoft Deployment Toolkit

        • Specifying the Data Store Location

        • Adding Custom Migration Files

      • Summary

      • Additional Resources

    • Chapter 8: Deploying Applications

      • Preparing the Lab

      • Planning Deployment

        • Priorities

        • Categories

        • Installation Methods

        • Subject Matter Experts

        • Configurations

      • Choosing a Deployment Strategy

        • Thick Images

        • Thin Images

        • Hybrid Images

      • Automating Installation

        • Windows Installer

        • InstallShield

        • Legacy InstallShield

        • Legacy InstallShield PackageForTheWeb

        • Legacy Wise Installation System

        • Windows Script Host

      • Repackaging Legacy Applications

        • The Repackaging Process

        • Repackaging Tools

      • Injecting in a Disk Image

        • Adding Applications

        • Creating Dependencies

        • Installing Applications

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 9: Preparing Windows PE

      • Exploring Windows PE

        • Capabilities

        • Limitations

        • New Features of Windows PE 3.0

      • Setting Up the Environment

        • Installing the Windows AIK 2.0

        • Configuring the Build Environment

        • Removing the Build Environment

      • Working with Windows PE

        • Mounting Windows PE

        • Adding Packages

        • Copying Applications

        • Adding Device Drivers

        • Installing Updates

        • Committing the Changes

        • Creating Bootable Media

        • Customizing Windows PE

      • Automating Windows PE

        • Automating with Unattend.xml

        • Adding Images to Windows Deployment Services

      • Using Windows PE with Microsoft Deployment Toolkit

      • Summary

      • Additional Resources

    • Chapter 10: Configuring Windows Deployment Services

      • Introducing Windows Deployment Services

        • Service Architecture

        • Operating Modes

      • Planning for Windows Deployment Services

        • Choosing a Version of Windows Deployment Services

        • Server Requirements

        • Client Computer Requirements

        • DHCP Requirements

        • Routing Requirements

        • Capacity Requirements

      • Installing Windows Deployment Services

        • Windows Server 2003

        • Windows Server 2008 R2

      • Configuring Windows Deployment Services

      • Preparing Discover Images

      • Importing Images

        • Importing Boot Images

        • Importing Install Images

      • Managing and Deploying Driver Packages

        • Deploying Driver Packages to Clients

        • Managing Driver Groups and Driver Packages

        • Adding Driver Packages to Boot Images

      • Managing Image Security

        • Pre-staging Client Computers

        • Configuring Administrator Approval

      • Installing Windows 7

      • Capturing Custom Images

      • Creating Multicast Transmissions

        • Multicast Prerequisites

        • Transmission Types

        • Performing Multicast Deployment

      • Using Windows Deployment Services with Microsoft Deployment Toolkit

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 11: Using Volume Activation

      • Introduction

      • Activation Options

        • Retail

        • Original Equipment Manufacturer

        • Volume Licensing

      • Key Management Service

        • Minimum Computer Requirements

        • How KMS Works

        • Planning a KMS Deployment

      • Multiple Activation Key

        • Volume Activation Management Tool

        • MAK Architecture

      • Volume Activation Scenarios

        • Core Network

        • Isolated Networks

        • Individual Disconnected Computers

        • Test/Development Labs

      • What If Systems Are Not Activated?

        • Grace Period

        • Grace Period Expiration

      • Product Keys

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 12: Deploying with Microsoft Deployment Toolkit

      • Introducing MDT 2010

        • Deployment Scenarios

        • Resource Access

      • Using LTI with MDT 2010

        • Replicating a Deployment Share

        • Preparing Windows Deployment Services

        • Configuring Resources

        • Configuring CustomSettings.ini

        • Automating the LTI Process

        • Performing LTI Deployments

      • Customizing MDT 2010

        • Configuring Multiple Computers

        • Configuring Individual Computers

        • Customizing CustomSettings.ini

        • Customizing BootStrap.ini

        • Using the MDT 2010 Database

      • Summary

      • Additional Resources

  • Part III: Desktop Management

    • Chapter 13: Overview of Management Tools

      • Included Tools

        • Group Policy

        • Windows Management Instrumentation

        • Windows PowerShell

        • Windows Remote Management

        • Command-Line Tools

        • Remote Desktop

      • Downloadable Tools

        • Microsoft Network Monitor

        • Microsoft Baseline Security Analyzer

        • Microsoft IPsec Diagnostic Tool

        • Windows NT Backup-Restore Utility

      • Windows Sysinternals Suite

      • Windows 7 Enterprise and the Microsoft Desktop Optimization Pack

        • Microsoft Application Virtualization

        • Microsoft Advanced Group Policy Management

        • Microsoft Asset Inventory Service

        • Microsoft Diagnostics and Recovery Toolset

        • Microsoft Enterprise Desktop Virtualization

        • Microsoft System Center Desktop Error Monitoring

      • Microsoft System Center

        • System Center Configuration Manager

        • System Center Operations Manager

        • System Center Data Protection Manager

        • System Center Virtual Machine Manager

        • System Center Essentials

      • Introduction to Windows PowerShell Scripting

        • Working with Windows PowerShell Cmdlets

        • Using the Pipeline to Read Text Files

        • Additional Pipeline Techniques

        • Working with Cmdlets

        • Scripting Fundamentals

        • Using the while Statement

        • Using the do…while Statement

        • Using the do…until Statement

        • The for Statement

        • The if Statement

        • The switch Statement

        • Understanding Modules

        • Including Functions

        • Adding Help for Functions

        • Locate and Load Modules

        • Install Modules

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 14: Managing the Desktop Environment

      • Understanding Group Policy in Windows 7

        • Group Policy Before Windows Vista

        • Group Policy in Windows Vista and Windows Server 2008

        • New Group Policy Features in Windows 7 and Windows Server 2008 R2

        • Group Policy Policy Settings in Windows 7

        • Understanding ADMX Template Files

        • Understanding Multiple Local Group Policy

      • Managing Group Policy

        • Configuring the Central Store

        • Adding ADMX Templates to the Store

        • Creating and Managing GPOs

        • Editing GPOs

        • Managing MLGPOs

        • Migrating ADM Templates to ADMX Format

        • Configuring Group Policy Processing

        • Using Advanced Group Policy Management

      • Troubleshooting Group Policy

        • Using Event Viewer

        • Enabling Debug Logging

        • Using Group Policy Log View

        • Using GPResult

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 15: Managing Users and User Data

      • Understanding User Profiles in Windows 7

        • Types of User Profiles

        • User Profile Namespace

      • Understanding Libraries

        • Working with Libraries

        • Managing Libraries

      • Implementing Corporate Roaming

        • Understanding Roaming User Profiles and Folder Redirection

        • Implementing Folder Redirection

        • Implementing Roaming User Profiles

      • Working with Offline Files

        • Enhancements to Offline Files Introduced Previously in Windows Vista

        • Additional Enhancements to Offline Files Introduced in Windows 7

        • Understanding Offline File Sync

        • Managing Offline Files

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 16: Managing Disks and File Systems

      • Overview of Partitioning Disks

        • How to Choose Between MBR or GPT

        • Converting from MBR to GPT Disks

        • GPT Partitions

        • Choosing Basic or Dynamic Disks

      • Working with Volumes

        • How to Create a Simple Volume

        • How to Create a Spanned Volume

        • How to Create a Striped Volume

        • How to Resize a Volume

        • How to Delete a Volume

        • How to Create and Use a Virtual Hard Disk

      • File System Fragmentation

      • Backup And Restore

        • How File Backups Work

        • File and Folder Backup Structure

        • How System Image Backups Work

        • How to Start a System Image Backup from the Command Line

        • How to Restore a System Image Backup

        • System Image Backup Structure

        • Best Practices for Computer Backups

        • How to Manage Backup Using Group Policy Settings

        • Previous Versions and Shadow Copies

      • Windows ReadyBoost

      • BitLocker Drive Encryption

        • How BitLocker Encrypts Data

        • How BitLocker Protects Data

        • BitLocker To Go

        • BitLocker Phases

        • Requirements for Protecting the System Volume with BitLocker

        • How to Enable the Use of BitLocker on the System Volume on Computers Without TPM

        • How to Enable BitLocker Encryption on System Volumes

        • How to Enable BitLocker Encryption on Data Volumes

        • How to Manage BitLocker Keys on a Local Computer

        • How to Manage BitLocker from the Command Line

        • How to Recover Data Protected by BitLocker

        • How to Disable or Remove BitLocker Drive Encryption

        • How to Decommission a BitLocker Drive Permanently

        • How to Prepare AD DS for BitLocker

        • How to Configure a Data Recovery Agent

        • How to Manage BitLocker with Group Policy

        • The Costs of BitLocker

      • Encrypting File System

        • How to Export Personal Certificates

        • How to Import Personal Certificates

        • How to Grant Users Access to an Encrypted File

      • Symbolic Links

        • How to Create Symbolic Links

        • How to Create Relative or Absolute Symbolic Links

        • How to Create Symbolic Links to Shared Folders

        • How to Use Hard Links

      • Disk Quotas

        • How to Configure Disk Quotas on a Single Computer

        • How to Configure Disk Quotas from a Command Prompt

        • How to Configure Disk Quotas by Using Group Policy Settings

      • Disk Tools

        • Disk Usage

        • EFSDump

        • SDelete

        • Streams

        • Sync

        • MoveFile and PendMoves

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 17: Managing Devices and Services

      • Understanding Device Installation and Management

        • Device Enhancements in Windows 7

        • Understanding Device Installation

        • Installing and Using Devices

        • Managing Device Installation Using Group Policy

        • Troubleshooting Device Installation

      • Understanding Power Management

        • Power Management Enhancements in Windows 7

        • Configuring Power Management Settings

      • Understanding Services

        • Service Enhancements in Windows 7

        • Managing Services

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 18: Managing Printing

      • Enhancements to Printing in Windows 7

        • Printing Enhancements Previously Introduced in Windows Vista

        • Additional Printing Enhancements in Windows 7

      • How Printing Works in Windows 7

        • Understanding XPS

        • Understanding the Windows Printing Subsystem

        • Understanding Printer Driver Isolation

      • Understanding the Print Management Console

        • Enhancements to the Print Management Console in Windows 7

        • The Print Management Console

        • Adding and Removing Print Servers

        • Configuring Default Security for Print Servers

        • Adding Printers Using the Network Printer Installation Wizard

        • Creating and Using Printer Filters

        • Creating and Using Driver Filters

      • Managing Printers Using Print Management

        • Configuring Properties of Printers

        • Publishing Printers in AD DS

        • Managing Printer Drivers

        • Configuring Printer Driver Isolation Mode

        • Exporting and Importing Print Server Configurations

        • Performing Bulk Actions Using Print Management

      • Client-Side Management of Printers

        • Installing Printers Using the Add Printers Wizard

        • Searching for Printers

        • Installing Printers Using Point and Print

        • Using Devices And Printers

        • Using Location-Aware Printing

        • Using the Color Management CPL

      • Managing Client-Side Printer Experience Using Group Policy

        • Configuring the Add Printer Wizard

        • Disable Client-Side Printer Rendering

        • Configuring Package Point and Print Restrictions

        • Extending Point and Print Using Windows Update

      • Deploying Printers Using Group Policy

        • Preparing to Deploy Printers

        • Deploying a Printer Connection

        • Limitations of Deploying Printers Using Group Policy

        • Assigning Printers Based on Location

      • Migrating Print Servers

        • Migrate Print Servers Using Print Management

        • Migrating Print Servers Using PrintBRM

      • Monitoring and Troubleshooting Printers

        • Configuring E-Mail Notifications

        • Configuring Print Server Notifications

        • Configuring Script Actions

        • Configuring Detailed Event Logging

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 19: Managing Search

      • Search and Indexing Enhancements

        • Search in Windows XP

        • Search in Windows Vista

        • Search in Windows 7

        • Understanding the Windows Search Versions

      • How Windows Search Works

        • Understanding Search Engine Terminology

        • Windows Search Engine Processes

        • Enabling the Indexing Service

        • Windows Search Engine Architecture

        • Understanding the Catalog

        • Understanding the Indexing Process

        • Understanding Remote Search

      • Managing Indexing

        • Configuring the Index

        • Configuring Offline Files Indexing

        • Configuring Indexing of Encrypted Files

        • Configuring Indexing of Similar Words

        • Configuring Indexing of Text in TIFF Image Documents

        • Other Index Policy Settings

      • Using Search

        • Configuring Search Using Folder Options

        • Using Start Menu Search

        • Searching Libraries

        • Using Federated Search

      • Troubleshooting Search and Indexing Using the Built-in Troubleshooter

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 20: Managing Windows Internet Explorer

      • Internet Explorer 8 Improvements

        • InPrivate Browsing

        • InPrivate Filtering

        • Compatibility View

        • SmartScreen

        • Domain Highlighting

        • Tab Isolation

        • Accelerators

      • Improvements Previously Introduced in Internet Explorer 7

        • User Interface Changes

        • Tabbed Browsing

        • Search Bar

        • RSS Feeds

        • Improved Standards Support

        • Expanded Group Policy Settings

        • Defending Against Malware

        • Protecting Against Data Theft

        • Security Zones

      • Managing Internet Explorer Using Group Policy

        • Group Policy Settings for Internet Explorer 7 and Internet Explorer 8

        • New Group Policy Settings for Internet Explorer 8

      • Using the Internet Explorer Administration Kit

      • Troubleshooting Internet Explorer Problems

        • Internet Explorer Does Not Start

        • An Add-on Does Not Work Properly

        • Some Web Pages Do Not Display Properly

        • Preventing Unwanted Toolbars

        • The Home Page or Other Settings Have Changed

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

  • Part IV: Desktop Maintenance

    • Chapter 21: Maintaining Desktop Health

      • Performance Monitoring

        • Improvements to Performance Monitoring in Windows 7

        • Using Performance Monitor

      • Resource Monitor

        • Overview Tab

        • CPU Tab

        • Memory Tab

        • Disk Tab

        • Network Tab

      • Reliability Monitor

        • How Reliability Monitor Works

      • Windows Performance Tools Kit

      • Event Monitoring

        • Understanding the Windows Event Architecture

        • Channels

        • Improvements to Event Monitoring in Windows 7

        • Using Event Viewer

        • Using the Windows Events Command-Line Utility for Event Monitoring

        • Using Windows PowerShell for Event Monitoring

      • Using Task Scheduler

        • Improvements to Task Scheduler in Windows 7

        • Understanding Tasks

        • Understanding the Task Scheduler Architecture

        • Understanding Task Scheduler Security

        • Understanding AT and Task Scheduler v1.0 Compatibility Modes

        • Understanding the Task Scheduler Snap-in

        • Understanding Default Tasks

        • Creating Tasks

        • Managing Tasks

        • Using SchTasks.exe for Creating and Managing Tasks

        • Task Scheduler Events

        • Troubleshooting Task Scheduler

        • Interpreting Result and Return Codes

      • Understanding the Windows System Assessment Tool

        • Understanding WinSAT Assessment Tests

        • Examining the WinSAT Features Assessment

        • Running WinSAT from the Command Line

        • Understanding WinSAT Command Exit Values

        • Running WinSAT Using Performance Information and Tools

      • Understanding Windows Error Reporting

        • Overview of Windows Error Reporting

        • How WER Works

        • Understanding the Error Reporting Cycle

        • Understanding WER Data

        • Configuring WER Using Group Policy

        • Configuring WER Using the Action Center

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 22: Supporting Users with Remote Assistance

      • Understanding Remote Assistance

        • Improvements to Remote Assistance in Windows 7

        • How Remote Assistance Works

        • Using Remote Assistance in the Enterprise

        • Interoperability with Remote Assistance in Windows Vista

        • Interoperability with Remote Assistance in Windows XP

      • Implementing and Managing Remote Assistance

        • Initiating Remote Assistance Sessions

        • Scenario 1: Soliciting Remote Assistance Using Easy Connect

        • Scenario 2: Soliciting Remote Assistance by Creating Remote Assistance Tickets and Saving Them on Monitored Network Shares

        • Scenario 3: Offering Remote Assistance Using DCOM

        • Managing Remote Assistance Using Group Policy

        • Configuring Remote Assistance in Unmanaged Environments

        • Additional Registry Settings for Configuring Remote Assistance

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 23: Managing Software Updates

      • Methods for Deploying Updates

        • Windows Update Client

        • Windows Server Update Services

        • System Center Configuration Manager 2007 R2

      • Manually Installing, Scripting, and Removing Updates

        • Overview of Windows 7 Update Files

        • How to Script Update Installations

        • How to Remove Updates

        • Deploying Updates to New Computers

      • Managing BITS

        • BITS Behavior

        • BITS Group Policy Settings

        • Managing BITS with Windows PowerShell

      • Windows Update Group Policy Settings

      • Configuring Windows Update to Use a Proxy Server

      • Tools for Auditing Software Updates

        • The MBSA Console

        • MBSACLI

      • Troubleshooting the Windows Update Client

      • The Process of Updating Network Software

        • Assembling the Update Team

        • Inventorying Software

        • Creating an Update Process

      • How Microsoft Distributes Updates

        • Security Updates

        • Update Rollups

        • Service Packs

        • Microsoft Product Life Cycles

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 24: Managing Client Protection

      • Understanding the Risk of Malware

      • User Account Control

        • UAC for Standard Users

        • UAC for Administrators

        • UAC User Interface

        • How Windows Determines Whether an Application Needs Administrative Privileges

        • UAC Virtualization

        • UAC and Startup Programs

        • Compatibility Problems with UAC

        • How to Configure UAC

        • How to Configure Auditing for Privilege Elevation

        • Other UAC Event Logs

        • Best Practices for Using UAC

      • AppLocker

        • AppLocker Rule Types

        • Auditing AppLocker Rules

        • DLL Rules

        • Custom Error Messages

        • Using AppLocker with Windows PowerShell

      • Using Windows Defender

        • Understanding Windows Defender

        • Windows Defender Alert Levels

        • Understanding Microsoft SpyNet

        • Configuring Windows Defender Group Policy

        • Configuring Windows Defender on a Single Computer

        • How to Determine Whether a Computer Is Infected with Spyware

        • Best Practices for Using Windows Defender

        • How to Troubleshoot Problems with Unwanted Software

      • Network Access Protection

      • Forefront

      • Summary

      • Additional Resources

        • On the Companion Media

  • Part V: Networking

    • Chapter 25: Configuring Windows Networking

      • Usability Improvements

        • Network And Sharing Center

        • Network Explorer

        • Network Map

        • Set Up A Connection Or Network Wizard

      • Manageability Improvements

        • Network Location Types

        • Policy-Based QoS

        • Windows Firewall and IPsec

        • Windows Connect Now

      • Core Networking Improvements

        • BranchCache

        • DNSsec

        • GreenIT

        • Efficient Networking

        • Scalable Networking

        • Improved Reliability

        • IPv6 Support

        • 802.1X Network Authentication

        • Server Message Block (SMB) 2.0

        • Strong Host Model

        • Wireless Networking

      • Improved APIs

        • Network Awareness

        • Improved Peer Networking

        • EAPHost Architecture

        • Layered Service Provider (LSP)

        • Windows Sockets Direct Path for System Area Networks

      • How to Configure Wireless Settings

        • Configuring Wireless Settings Manually

        • Using Group Policy to Configure Wireless Settings

        • Configuring Wireless Settings from the Command Line or a Script

      • How to Configure TCP/IP

        • DHCP

        • Configuring IP Addresses Manually

        • Command Line and Scripts

      • How to Connect to AD DS Domains

        • How to Connect to a Domain When 802.1X Authentication Is Not Enabled

        • How to Connect to a Domain When 802.1X Authentication Is Enabled

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 26: Configuring Windows Firewall and IPsec

      • Understanding Windows Firewall with Advanced Security

        • Improvements to Windows Firewall Introduced Previously in Windows Vista

        • Additional Improvements to Windows Firewall in Windows 7

        • Understanding the Windows Filtering Platform

        • Understanding Windows Service Hardening

        • Understanding Multiple Active Firewall Profiles

        • Understanding Rules

      • Managing Windows Firewall with Advanced Security

        • Tools for Managing Windows Firewall with Advanced Security

        • Common Management Tasks

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 27: Connecting Remote Users and Networks

      • Enhancements for Connecting Remote Users and Networks in Windows 7

        • Understanding IKEv2

        • Understanding MOBIKE

        • Understanding VPN Reconnect

        • Understanding DirectAccess

        • Understanding BranchCache

      • Supported Connection Types

        • Outgoing Connection Types

        • Incoming Connection Types

        • Deprecated Connection Types

      • Configuring VPN Connections

        • Supported Tunneling Protocols

        • Comparing the Different Tunneling Protocols

        • Understanding Cryptographic Enhancements

        • Understanding the VPN Connection Negotiation Process

        • Creating and Configuring VPN Connections

      • Configuring Dial-Up Connections

        • Creating a Dial-Up Connection

        • Configuring a Dial-Up Connection

        • Advanced Connection Settings

        • Configuring Incoming Connections

      • Managing Connections Using Group Policy

      • Using Remote Desktop

        • Understanding Remote Desktop

        • Configuring and Using Remote Desktop

        • Configuring and Using RemoteApp and Desktop Connection

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 28: Deploying IPv6

      • Understanding IPv6

        • Understanding IPv6 Terminology

        • Understanding IPv6 Addressing

        • Understanding IPv6 Routing

        • Understanding ICMPv6 Messages

        • Understanding Neighbor Discovery

        • Understanding Address Autoconfiguration

        • Understanding Name Resolution

      • IPv6 Enhancements in Windows 7

        • Summary of IPv6 Enhancements in Windows 7

      • Configuring and Troubleshooting IPv6 in Windows 7

        • Displaying IPv6 Address Settings

        • Configuring IPv6 in Windows 7 Using the User Interface

        • Configuring IPv6 in Windows 7 Using Netsh

        • Other IPv6 Configuration Tasks

        • Troubleshooting IPv6 Connectivity

      • Planning for IPv6 Migration

        • Understanding ISATAP

        • Migrating an Intranet to IPv6

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

  • Part VI: Troubleshooting

    • Chapter 29: Configuring Startup and Troubleshooting Startup Issues

      • What’s New with Windows Startup

        • Boot Configuration Data

        • System Recovery

        • Windows Boot Performance Diagnostics

      • Understanding the Startup Process

        • Power-on Self Test Phase

        • Initial Startup Phase

        • Windows Boot Manager Phase

        • Windows Boot Loader Phase

        • Kernel Loading Phase

        • Logon Phase

      • Important Startup Files

      • How to Configure Startup Settings

        • How to Use the Startup And Recovery Dialog Box

        • How to Use the System Configuration Tool

        • How to Use BCDEdit

        • How to Remove the Windows 7 Boot Loader

        • How to Configure a User Account to Automatically Log On

        • How to Disable the Windows Startup Sound

        • How to Speed Up the Startup Process

      • The Process of Troubleshooting Startup

        • Startup Troubleshooting Before the Starting Windows Logo Appears

        • Startup Troubleshooting After the Starting Windows Logo Appears

        • Troubleshooting Startup Problems After Logon

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 30: Troubleshooting Hardware, Driver, and Disk Issues

      • Windows 7 Improvements for Hardware and Driver Troubleshooting

        • Windows Troubleshooting Platform

        • Reliability Monitor

        • Resource Monitor

        • Windows Memory Diagnostics

        • Disk Failure Diagnostics

        • Self-Healing NTFS

        • Improved Driver Reliability

        • Improved Error Reporting

      • The Process of Troubleshooting Hardware Issues

        • How to Troubleshoot Problems That Prevent Windows from Starting

        • How to Troubleshoot Problems Installing New Hardware

        • How to Troubleshoot Problems with Existing Hardware

        • How to Troubleshoot Unpredictable Symptoms

      • How to Diagnose Hardware Problems

        • How to Use Device Manager to Identify Failed Devices

        • How to Check the Physical Setup of Your Computer

        • How to Check the Configuration of Your Hardware

        • How to Verify That System Firmware and Peripheral Firmware Are Up to Date

        • How to Test Your Hardware by Running Diagnostic Tools

        • How to Diagnose Disk-Related Problems

      • How to Use Built-In Diagnostics

        • How to Use Reliability Monitor

        • How to Use Event Viewer

        • How to Use Data Collector Sets

        • How to Use Windows Memory Diagnostics

      • How to Troubleshoot Disk Problems

        • How to Prepare for Disk Failures

        • How to Use ChkDsk

        • How to Use the Disk Cleanup Wizard

        • How to Disable Nonvolatile Caching

      • How to Troubleshoot Driver Problems

        • How to Find Updated Drivers

        • How to Roll Back Drivers

        • How to Use Driver Verifier

        • How to Use the File Signature Verification

        • How to Use Device Manager to View and Change Resource Usage

      • How to Use System Restore

      • How to Troubleshoot USB Problems

        • How to Solve USB Driver and Hardware Problems

        • Understanding USB Limitations

        • How to Identify USB Problems Using Performance Monitor

        • How to Examine USB Hubs

      • How to Troubleshoot Bluetooth Problems

      • Troubleshooting Tools

        • DiskView

        • Handle

        • Process Monitor

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 31: Troubleshooting Network Issues

      • Tools for Troubleshooting

        • Arp

        • Event Viewer

        • IPConfig

        • Nblookup

        • Nbtstat

        • Net

        • Netstat

        • Network Monitor

        • Nslookup

        • PathPing

        • Performance Monitor

        • Data Collector Sets

        • Resource Monitor

        • Ping

        • PortQry

        • Route

        • Task Manager

        • TCPView

        • Telnet Client

        • Testing Service Connectivity

        • Test TCP

        • Windows Network Diagnostics

      • The Process of Troubleshooting Network Problems

        • How to Troubleshoot Network Connectivity Problems

        • How to Troubleshoot Application Connectivity Problems

        • How to Troubleshoot Name Resolution Problems

        • How to Troubleshoot Performance Problems and Intermittent Connectivity Issues

        • How to Troubleshoot Joining or Logging on to a Domain

        • How to Troubleshoot Network Discovery

        • How to Troubleshoot File and Printer Sharing

        • How to Troubleshoot Wireless Networks

        • How to Troubleshoot Firewall Problems

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

    • Chapter 32: Troubleshooting Stop Messages

      • Stop Message Overview

        • Identifying the Stop Error

        • Finding Troubleshooting Information

        • Stop Messages

        • Types of Stop Errors

      • Memory Dump Files

        • Configuring Small Memory Dump Files

        • Configuring Kernel Memory Dump Files

        • Configuring Complete Memory Dump Files

        • How to Manually Initiate a Stop Error and Create a Dump File

        • Using Memory Dump Files to Analyze Stop Errors

      • Being Prepared for Stop Errors

        • Prevent System Restarts After a Stop Error

        • Record and Save Stop Message Information

        • Check Software Disk Space Requirements

        • Install a Kernel Debugger and Symbol Files

      • Common Stop Messages

        • Stop 0xA or IRQL_NOT_LESS_OR_EQUAL

        • Stop 0x1E or KMODE_EXCEPTION_NOT_HANDLED

        • Stop 0x24 or NTFS_FILE_SYSTEM

        • Stop 0x2E or DATA_BUS_ERROR

        • Stop 0x3B or SYSTEM_SERVICE_EXCEPTION

        • Stop 0x3F or NO_MORE_SYSTEM_PTES

        • Stop 0x50 or PAGE_FAULT_IN_NONPAGED_AREA

        • Stop 0x77 or KERNEL_STACK_INPAGE_ERROR

        • Stop 0x7A or KERNEL_DATA_INPAGE_ERROR

        • Stop 0x7B or INACCESSIBLE_BOOT_DEVICE

        • Stop 0x7F or UNEXPECTED_KERNEL_MODE_TRAP

        • Stop 0x9F or DRIVER_POWER_STATE_FAILURE

        • Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY

        • Stop 0xC2 or BAD_POOL_CALLER

        • Stop 0xCE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS

        • Stop 0xD1 or IRQL_NOT_LESS_OR_EQUAL

        • Stop 0xD8 or DRIVER_USED_EXCESSIVE_PTES

        • Stop 0xEA or THREAD_STUCK_IN_DEVICE_DRIVER

        • Stop 0xED or UNMOUNTABLE_BOOT_VOLUME

        • Stop 0xFE or BUGCODE_USB_DRIVER

        • Stop 0x00000124

        • Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED

        • Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH

      • Hardware Malfunction Messages

      • Stop Message Checklist

        • Check Your Software

        • Check Your Hardware

      • Summary

      • Additional Resources

        • Related Information

        • On the Companion Media

  • Appendix

    • Accessibility in Windows 7

      • Ease of Access Center

        • Additional Accessibility Features

        • Using the Ease of Access Center

        • Using Magnifier

        • Using Narrator

        • Using the On-Screen Keyboard

        • Ease of Access Keyboard Shortcuts

      • Windows Speech Recognition

      • Assistive Technology Products

      • Microsoft Accessibility Resource Centers

      • Additional Resources

  • Glossary

  • Index

  • About the Authors

  • System Requirements

Nội dung

Working with Offline Files CHAPTER 15 603 If you do not configure this policy setting, the system limits the space that offline files occupy to 25 percent of the total space on the drive where the Offline Files cache is located. The limit for automatically cached files is 100 percent of the total disk space limit. However, the users can change these values using the Offline Files Control Panel tool. If you enable this setting and specify a total size limit greater than the size of the drive hosting the Offline Files cache and that drive is the system drive, the total size limit is automatically adjusted downward to 75 percent of the size of the drive. If the cache is located on a drive other than the system drive, the limit is automatically adjusted downward to 100 percent of the size of the drive. If you enable this setting and specify a total size limit less than the amount of space currently used by the Offline Files cache, the total size limit is automatically adjusted upward to the amount of space currently used by offline files. The cache is then con- sidered full. If you enable this setting and specify an auto-cached space limit greater than the total size limit, the auto-cached limit is automatically adjusted downward to equal the total size limit. note The Limit Disk Space Used By Offline Files policy setting replaces the Default Cache Size policy setting used by earlier versions of Windows. n Turn On Economical Application Of Administratively Assigned Offline Files This policy setting allows you to turn on economical application of administratively assigned Offline Files. If you enable this policy setting, only new files and folders in administratively assigned folders are synchronized at logon. Files and folders that are already available offline are skipped and are synchronized later. If you disable or do not configure this policy setting, all administratively assigned folders are synchronized at logon. ADDITIONAL OFFLINE FILES POLICY SETTINGS FOR WINDOWS 7 The following Group Policy settings for managing Offline Files are new in Windows 7: n Configure Background Sync This policy setting applies to any user who logs on to the specified machine while this policy is in effect. This policy is in effect when a net- work folder is determined by the Configure Slow-Link Mode policy to be in slow-link mode. For network folders in slow-link mode, a sync will be initiated in the background on a regular basis, according to these settings, to synchronize the files in those shares/fold- ers between the client and server. By default, network folders in slow-link mode will be synchronized with the server every 360 minutes, with the start of the sync varying between 0 and 60 additional minutes (as shown in Figure 15-18). Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. CHAPTER 15 Managing Users and User Data 604 FIGURE 15-18 The new Configure Background Sync policy setting in Windows 7 You can override the default sync interval and variance by setting Sync Interval and Sync Variance values. You can also set a period of time in which background sync is disabled by setting Blockout Start Time and Blockout Duration values. To ensure that all the network folders on the machine are synchronized with the server on a regular basis, you may also set the Maximum Allowed Time Without A Sync value. You may also configure Background Sync for network shares that are in user-selected Work Offline mode. This mode is in effect when a user selects the Work Offline option for a specific share. When selected, all configured settings will apply to shares in user- selected Work Offline mode as well. n Enable Transparent Caching Enabling this policy optimizes subsequent reads to network files by a user or an application. This is done by caching reads to remote files over a slow network in the Offline Files cache. Subsequent reads to the same file are then satisfied from the client after verifying the integrity of the cached copy. This policy not only improves user response times but also decreases bandwidth consumption over the WAN links to the server. The cached files are temporary and are not available to the user when offline. The cached files are not kept in sync with the version on the server, and the most current version from the server is always available for subsequent reads. This policy is triggered by the configured round-trip network latency value (shown in Figure 15-19). We recommend using this policy when the network connection to the server is slow. For example, you can configure a value of 60 milliseconds as the round- trip latency of the network above which files should be transparently cached in the Offline Files cache. If the round-trip latency of the network is less than 60 milliseconds, reads to remote files will not be cached. If you do not configure this setting, remote files will not be transparently cached on user clients. Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. Working with Offline Files CHAPTER 15 605 FIGURE 15-19 The new Enable Transparent Caching policy setting in Windows 7 n Exclude Files From Being Cached This policy enables administrators to exclude certain file types from being made available offline. You need to specify the file exten- sions of the file types that should be excluded (shown in Figure 15-20). A user then will be unable to create a file of this type in the folders that are available offline. FIGURE 15-20 The new Exclude Files From Being Cached policy setting in Windows 7 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. CHAPTER 15 Managing Users and User Data 606 diReCt FRoM tHe SoURCe Troubleshooting Roaming User Profile Folder Redirection, and Client-Side Caching Issues in Windows Vista and Later Versions Paul D. LeBlanc, Manager Supportability Program T he following lists describe some common support issues with Folder Redirection, RUP, and CSC in Windows Vista and later versions. Roaming User Profile Issue Troubleshooting Symptom: Loading temporary profile error during user logon: “Windows cannot find the local profile and is logging you on with a temporary profile. Changes you make to this profile will be lost when you log off.” n Possible cause #1: SID in ProfileList structure deleted Explanation: Microsoft does not recommend that you delete user profiles using anything other than the Control Panel item (Computer Properties \Advanced System Settings\User Profiles\Settings). When the folder structure for a user profile is deleted using Windows Explorer or the command prompt, the corresponding registry entries under the ProfileList registry key are left behind. Resolution: Remove the corresponding SID entry under the ProfileList registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion \ProfileList. n Possible cause #2: User in Guests group Explanation: During logon, the interactive user is checked for membership in the local Guests group and the domain Guest group (if the user is the mem- ber of a domain). Resolution: If appropriate, remove the affected user from the local Guests /Domain Guest membership (see http://support.microsoft.com/kb/940453). n Possible cause #3: Insufficient permissions (roaming profile) Explanation: If permissions have been altered on a working roaming profile, the user may encounter this error. Resolution: Correct the permissions so that the user has Full Control over her Roaming User Profile folders. If a locked-down user profile is required, use a mandatory user profile. Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. Working with Offline Files CHAPTER 15 607 Folder Redirection Troubleshooting Symptom: Duplicate folders in user profile n Possible cause #1: Partial sync Explanation: Users of Windows Vista and later versions can select various folders within their user profiles to redirect to a local or remote drive. If only some of the contents of a folder are moved, the user may see multiple folders under a user profile, such as two folders named Documents or Music. Resolution: Allow the session to complete data transfer before logoff. n Possible cause #2: Local and remote copies of files kept Explanation: When a user’s folder is being redirected, the user will be asked whether she wants to move all current content. If the user chooses not to move the contents but only to copy them, duplicate folders will appear under the user profile—one local, one remote. Resolution: This is by design. n Possible cause #3: Program creating folder locally (application compatibility) Explanation: After a user redirects a user profile folder or folders successfully, on running an application, a local instance of the user profile folder(s) may be created. This behavior is due to the application using only local resources or having a fixed path for resources and not using the environment variables. This is an application-specific issue. Resolution: Update the application or do not redirect the affected user profile folder(s). Client-Side Caching Troubleshooting Symptom: Files/folders not seen while offline n Possible cause #1: Sync has not completed (because it occurs during background) Explanation: This is a fundamental change from Windows XP. In Windows Vista and later versions, Offline Files will synchronize in the background as user activity allows. This means that users will not have to wait for files to synchronize before completing a logoff. However, this also means that, depending on the volume and type of data that is to be synchronized, synchronization may need further logon sessions to complete. Resolution: Allow longer logon sessions for larger amounts of data to be synchronized. Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. CHAPTER 15 Managing Users and User Data 608 n Possible cause #2: Sync has not completed Explanation: Another possible root cause of incomplete synchronization is the same as in Windows XP—namely, if a file is in use, open file handles will prevent the file from synchronizing. Resolution: This is an unchanged behavior and is by design. n Possible cause #3: Offline files respond slowly over a VPN connection Explanation: On computers running Windows Vista and later versions, you experience slow performance after you establish a VPN connection. Additionally, it may take several minutes to open a redirected shell folder. This problem occurs if the following conditions are true: • Offline files are enabled on the computer. • Some offline files are cached on the local computer. • You logged on to the computer when you were offline. • The VPN connection is based on a slow connection. This problem usually lasts several minutes and then disappears. Resolution: See http://support.microsoft.com/kb/934202. (This issue has been fixed in SP1.) n Possible cause #4: Changes to an offline file are not saved to the server when files are synchronized Explanation: When you modify an offline file in Windows Vista and later versions, the changes are not saved to the server when files are synchronized. When this problem occurs, you receive the following error message: “Access Denied.” Additionally, a .tmp file that corresponds to the file appears on the server. You may experience this symptom even when you have Change per- missions to the shared resource. Resolution: See http://support.microsoft.com/kb/935663. (This issue has been fixed in SP1.) Summary Folder Redirection, Offline Files, and Roaming User Profiles have been enhanced in Windows 7 to provide better support for corporate roaming scenarios and high availability for file server scenarios. You can implement these features using the procedures outlined in this chapter; you can manage various aspects of their behavior using Group Policy and from the user interface. Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. Additional Resources CHAPTER 15 609 Additional Resources These resources contain additional information and tools related to this chapter. Related Information n “Folder Redirection Overview” found at http://technet.microsoft.com/en-us/library /cc732275.aspx. n “File Sharing and Offline Files Enhancements” found at http://technet.microsoft.com /en-us/library/dd637828.aspx. n “Windows Browse and Organize Features” found at http://technet.microsoft.com /en-us/library/dd744693.aspx. n Managing Roaming User Data Deployment Guide found at http://technet.microsoft.com /en-us/library/cc766489.aspx. Note that this information is for Windows Vista, so check first to see whether this topic has been updated for Windows 7 either here or else- where on TechNet. On the Companion Media n AddLocalUserToLocalGroup.ps1 n Change-LocalUserPassword.ps1 n CreateLocalGroup.ps1 n CreateLocalUser.ps1 n Remove-LocalUserFromLocalGroup.ps1 n Get-LocalGroupMembers.ps1 n LocateDisabledUsers.ps1 n Get-LocalGroups.ps1 n Get-LocalUsers.ps1 n LocateLockedOutLocalUsers.ps1 n ListUserLastLogon.ps1 n FindAdmin.ps1 n EnableDisableUser.ps1 n BackupFolderToServer.ps1 n GetSystemRestoreSettings.ps1 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 611 CHAPTER 16 Managing Disks and File Systems n Overview of Partitioning Disks 612 n Working with Volumes 615 n File System Fragmentation 622 n Backup And Restore 624 n Windows ReadyBoost 639 n BitLocker Drive Encryption 641 n Encrypting File System 662 n Symbolic Links 664 n Disk Quotas 670 n Disk Tools 673 n Summary 677 n Additional Resources 678 T he most important aspect of a computer is the user data. Businesses depend on the privacy of their intellectual property to stay competitive, and government organi- zations depend on confidentiality for national security. Thus, it’s critical that Windows protects the availability, integrity, and privacy of the user data on client computers. The Windows 7 operating system provides several important improvements to disk and file management. Windows 7 includes several improvements that both users and administrators will appreciate. By default, backups automatically create a System Image backup of the entire system drive. Additionally, you can store System Image backups to shared folders. System Image backups greatly reduce the time required to restore a computer after a hard disk failure or system corruption. To improve data security, you can use Windows BitLocker Drive Encryption to encrypt an entire volume, protecting the data on the disk even if the disk is physically removed Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. CHAPTER 16 Managing Disks and File Systems 612 from the computer. BitLocker works alongside Encrypting File System (EFS): BitLocker can encrypt system files and the page file along with any other files on the volume, whereas EFS is intended primarily to encrypt user files. Windows 7 supports BitLocker To Go, enabling removable flash drives to be encrypted with BitLocker. The BitLocker To Go Reader enables earlier versions of Windows to read encrypted files from the removable flash drive if the user has the required password. This chapter describes these features, as well as features introduced in Windows Vista, in more detail. Overview of Partitioning Disks Before you can format disks into volumes that applications can access, you must partition them. Windows 7 provides flexible partitioning that you can change even after you have formatted a volume. However, it’s still important to plan ahead when creating partitions for features such as BitLocker Drive Encryption, which has very specific partitioning requirements. note If Windows discovers a problem with a volume, it might schedule ChkDsk to run the next time the computer starts. Large volumes, especially volumes bigger than a terabyte, can take a very long time to check—more than an hour. During this time, the computer will be offline. Therefore, when you plan the size of your partitions, consider the time required for Windows to perform a ChkDsk operation at startup. The sections that follow describe how to partition disks in Windows 7. How to Choose Between MBR or GPT Master Boot Record (MBR) and Globally Unique Identifier Partition Table (GPT) are two dif- ferent disk-partitioning systems. MBR is the most common system and is supported by every version of Windows, including Windows Vista and Windows 7. GPT is an updated and im- proved partitioning system and is supported on Windows Vista, Windows 7, Windows Server 2008, and 64-bit versions of Windows XP and Windows Server 2003 operating systems. GPT offers several advantages over MBR: n In Windows, GPT can support up to 128 partitions. MBR supports only four partitions. n GPT accurately describes physical disk geometry, allowing Windows to create partitions and logical drives on cylinder boundaries. Although Windows attempts to do this for MBR, the geometry that MBR reports has no relationship to a modern drive’s physi- cal geometry because it has been altered to enable larger capacities. Different disk vendors have created vendor-specific workarounds for this problem that are difficult to manage. Therefore, partitioning is more reliable when using GPT. Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. [...]... Windows Vista and Windows 7, and they have the same functionality that basic disks have always had, plus a few extras You can create new partitions (called simple volumes in Windows Vista and Windows 7) , delete partitions, and extend or shrink the existing partitions The ability to extend or shrink an existing partition is an important new feature in Windows Vista and continues to be supported in Windows. .. 12/20/2006 4:42:12 PM Shadow Copy ID: { 271 752a4-e886-4c92-9 671 -10624ca36cd4} Original Volume: (C:)\\?\Volume{3e5 979 6e-cf1b-11da-af4b-806d6 172 696f}\ Shadow Copy Volume: \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2 Backup And Restore  Chapter 16 Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark 635 Originating Machine: WIN7 Service Machine: WIN7 Provider: 'Microsoft Software Shadow... folder on the target computer File and Folder Backup Structure The Backup tool in Windows XP creates a single file with a bkf extension when you perform a backup Backups in Windows Vista and Windows 7 provide a more flexible and reliable file structure When a user chooses to perform a backup to an external hard disk, Windows 7 automatically creates a folder in the root of the hard disk using the computer... {26fc6f1c-9610-4c0c-b10b-7e9f6fab042c} Original Volume: (C:)\\?\Volume{3e5 979 6e-cf1b-11da-af4b-806d6 172 696f}\ Shadow Copy Volume: \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1 Originating Machine: WIN7 Service Machine: WIN7 Provider: 'Microsoft Software Shadow Copy provider 1.0' Type: DataVolumeRollback Attributes: Persistent, No auto release, No writers, Differential Contents of shadow copy set ID: {d14c728d-ff85-4be1-b048-24f3aced48a9}... (PARTITION_MSFT_RESERVED_GUID, 0xE3C9E316L, 0x0B5C, 0x4DB8, 0x81, 0x7D, 0xF9, 0x2D, 0xF0, 0x02, 0x15, 0xAE) n Data partition  This partition stores Windows 7 system files and user files The data partition has the following partition GUID: DEFINE_GUID (PARTITION_BASIC_DATA_GUID, 0xEBD0A0A2L, 0xB9E5, 0x4433, 0x 87, 0xC0, 0x68, 0xB6, 0xB7, 0x26, 0x99, 0xC7); Additionally, dynamic disks can use two different GPT... multiple versions of a single file, Windows 7 gives users the opportunity to choose from several older copies of a file when using the Previous Versions tool (also described later in this chapter) When you restore files, you only need to restore from a single backup because Windows 7 automatically locates the most recent version of each file In previous versions of Windows, you need to first restore... Virtual Server 2005 or Microsoft Virtual PC Additionally, Complete PC Backup in Windows Vista created a copy of the computer’s hard disk as a VHD disk image Beginning with Windows 7, you can now mount VHDs exactly like a physical disk By mounting a VHD, you can easily copy files to and from the virtual disk Additionally, Windows 7 can be configured to boot from a VHD, as described in Chapter 29 You can... administrative command-line tool (C) Copyright 2001-2005 Microsoft Corp Shadow Copy Storage association For volume: (C:)\\?\Volume{3e5 979 6e-cf1b-11da-af4b-806d6 172 696f}\ Shadow Copy Storage volume: (C:)\\?\Volume{3e5 979 6e-cf1b-11da-af4b806d6 172 696f}\ Used Shadow Copy Storage space: 32 .70 3 MB (0%) Allocated Shadow Copy Storage space: 1.904 GB (1%) Maximum Shadow Copy Storage space: 38.061 GB (30%) n Vssadmin... Volumes In earlier versions of Windows, your choices for resizing volumes and partitions after they have been created are limited If you need to add space to a volume, your only choice is to make the disk a dynamic disk and then create a spanned volume If you want to expand or contract a partition, your only choice is to use third-party tools In Windows Vista and Windows 7, however, you can now expand... structure includes separate folders for each computer, backup set, backup session, and catalog Note  When restoring files, Windows 7 looks for a folder with the current computer’s name in the root of the backup media If you need to restore files created on a different Windows 7 computer, you can either rename the folder to the current computer’s name or perform an Advanced Restore and select the Files . of Windows, including Windows Vista and Windows 7. GPT is an updated and im- proved partitioning system and is supported on Windows Vista, Windows 7, Windows. http://technet.microsoft.com/en-us/library /cc732 275 .aspx. n “File Sharing and Offline Files Enhancements” found at http://technet.microsoft.com /en-us/library/dd6 378 28.aspx. n Windows Browse

Ngày đăng: 21/01/2014, 11:20

TỪ KHÓA LIÊN QUAN