Sei sulla pagina 1di 16

1

Index
Note: Numbers preceding the hyphens indicate the module in which the entry can be found.

Access Control Entries (ACEs), 10-43 access token, security for user accounts domains, 10-43 to 10-44 workgroups, 10-8 Account Policies, configuring for local user workgroups, 10-14 to 10-16 accounts computer, 1-12 configuring Account Policies for workgroups, 10-14 to 10-16 user. See users and user accounts ACEs (Access Control Entries), 10-43 ACPI (Advanced Configuration and Power Interface), options for mobile computing, 12-2 activating Windows XP, 1-49 to 1-50. See also product key automatic activation, 2-7 Product Activation, defined, 1-49 Active Directory, 1-12 domain security, 10-41 cached credentials, 10-42 logging on, 10-43 Group Policy, desktop customization, 8-35 RIS (Remote Installation Services), 2-52 to 2-53 workgroup user accounts, 10-4 active paging file, defined, 4-15 active partition, defined, 1-34 Active Windows dialog box, 1-49 adding hardware Add Hardware Wizard, 3-13 print devices. See printers and print devices Address Resolution Protocol (ARP), 7-29, 7-32 address space, defined, 13-7 Administrator passwords, configuring in Setup Manager Wizard, 2-13 Advanced Boot Options, 6-17 Advanced Configuration and Power Interface (ACPI), options for mobile computing, 12-2 Advanced Power Management (APM) configuring standby option, 12-8 to 12-9 options for mobile computing, 12-2 Advanced RISC Computing (ARC) paths, 6-11 advertisements. See pop-ups alerts of system failures, 8-26 allocation of space, quotas, 1-9, 5-5 answer files, 2-5 to 2-16, 2-27. See also UDF (Uniqueness Database Files) defined, 2-4 location, 2-10 Mini-Setup Wizard, 2-40 naming convention, 2-40 setup values, 2-31 syntax, 2-6 Sysprep.inf, 2-40 anti-piracy measures, 1-49. See also activating Windows XP APM (Advanced Power Management) configuring standby option, 12-8 to 12-9 options for mobile computing, 12-2

applications. See also software automatic startup, 8-18 automatic updates, configuring, 2-58 compatibility. See software disk imaging, 2-34, 2-48, 2-52 events and logs. See events and event logs monitoring with Task Manager, 13-2, 13-6 network access to. See shared files and folders pinning programs to start menu, 8-15 processes. See processes RIPrep (Remote Installation Preparation), 2-52 shortcuts, 8-7 surprise removal, 3-33 ARC (Advanced RISC Computing) paths, 6-11 archives event logs, 13-26 to 13-27 My Documents Folder, 8-22 ARP (Address Resolution Protocol), 7-29, 7-32 ASR (Automated System Recovery), 6-31, 6-34 to 6-37 audit policy, event logs, 13-19, 13-20 authentication certificates. See certificates passwords. See passwords Automated System Recovery (ASR), 6-31, 6-34 to 6-37 automating installation, 2-1 to 2-59 answer files, 2-5 to 2-16 benefits of automated installations, 2-1 deployment folder, 2-16 distribution method, configuring, 2-10 files required, 2-4 image creation and deployment, 2-32 to 2-34, 2-46 to 2-53 initiating, 2-27 to 2-31 installation folder, 2-15 performing installations, 2-26 to 2-31 reference computer. See reference computers RIS (Remote Installation Services), 2-52 to 2-53 security center, 2-54 to 2-59 Setup Manager Wizard, 2-8 to 2-16 unique IDs for client computers, 2-21, 2-22 Uniqueness Database File (UDF), 2-20 to 2-25 user interaction level, configuring, 2-10

backgrounds, desktop configuration, 8-4 Bandwidth Allocation Protocol (BAP), 11-11 banking institutions, legal requirements for archiving event logs, 13-26 BAP (Bandwidth Allocation Protocol), 11-11 basic disks, 4-6 to 4-11 adding, 4-10 to 4-11 compression, 5-14 converting from or to dynamic disk, 4-15 to 4-16 defined, 4-6 dual-boot system requirements, 4-13 dynamic disks vs., 4-12 extending partitions, 4-29 partitioning. See partitions volumes. See volumes

battery life
offline files, configuring for, 12-10 to 12-16 remote users. See remote users unique IDs, 2-21, 2-22 CloneControlSet, 6-5, 6-7 color and color quality in desktop configurations, 8-5 COM port devices, removal, 3-33 commands. See specific command names compact discs. See CDs and CD-ROMs compatibility Compatibility mode Program Compatibility Wizard, 13-40 to 13-41 properties set manually, 13-42 troubleshooting, 13-42 hardware compatibility, 1-5 to 1-6 reports, 1-5 software compatibility. See software Components folder, monitoring system information, 13-5 compressed files and folders best practices, 5-15 compression state, described, 5-10 to 5-12 copying and moving, 5-14 encryption and compression, differences, 5-24. See also encryption My Documents Folder, 8-22 NTFS, 1-9 volumes. See volumes computer accounts, 1-12 computer names computer name and computer description, described, 10-28, 10-29 configuring in Setup Manager Wizard, 2-13 unique IDs for automated installation, 2-21, 2-22 connection settings in Internet Explorer, 9-16 to 9-18 control sets. See also specific names of control sets changing configurations, 6-7 to 6-8 described, 6-5 subkey pointers, 6-6 ControlSet001, 6-5 ControlSet002, 6-5 convert command, 5-8 to 5-9 cookies, 9-6 to 9-15 defined, 9-7, 11-40 types, 9-8 CPU performance, optimizing, 13-17 credentials, associating with shortcuts, 8-8. See also passwords cryptography. See encryption CurrentControlSet, 6-5, 6-7 to 6-8

battery life reducing usage, 12-8 to 12-9 setting power options, 12-6 to 12-7 BIOS (basic input/output system). See also NetBIOS detecting hardware for mobile computing, 12-3 monitoring system information, 13-4 Bluetooth devices changing settings, 3-7 definition of Bluetooth wireless technology, 3-6 finding computer, procedure to allow device to find computer, 3-7 incoming Bluetooth connections, 3-7 installing or upgrading, 3-6 to 3-7 preparation of devices for Windows XP SP2 upgrade, 3-6 to 3-7 Bluetooth File Transfer Wizard, 3-6 boot partitions, 1-34, 6-9 boot process, 6-1 to 6-37. See also startup advanced boot options, 6-15 to 6-17 boot volumes, adding space, 4-30 common problems and solutions, 6-22 configurations. See also LastKnownGood configuration described, 6-5 dual-boot, 6-10, 6-14 defined, 6-1 dual booting. See dual-boot systems kernel initiation sequence, 6-7 partitions. See boot partitions previous state, 6-31 to 6-37 Recovery Console, 6-18 to 6-22 safe mode, 6-15 to 6-16 system settings, controlling, 6-4 to 6-8 Boot.ini files, 6-9 to 6-14 ARC paths, 6-11 components, 6-10 to 6-12 modifying, 6-13 to 6-14 restore point, creating, 6-33 switches, 6-12, 6-14 broadband connection, defined, 11-6 browser. See Internet Explorer bus devices, 3-8

cable connections, remote access, 11-3 to 11-5 cache credentials, 10-42 hard drive copies of network files, 12-10 to 12-12 settings for offline files, 12-15 to 12-16 CardBus Card, 3-33 CD Key, 2-12 CDs and CD-ROMs automated installations, 2-10, 2-11 disk imaging. See disk imaging deployment Setup Manager Wizard, distribution method, 2-10 certificates best practices for encryption, 5-32 defined, 5-26 Internet Explorer configuration, 9-11 to 9-12 personal certificates, 9-11 Web site certificates, 9-11 CHAP (Challenge Handshake Authentication Protocol), 11-22 chats in connection with remote assistance, 8-40 clean installs, 1-18 client computers automating Windows XP installation. See automating installation connecting clients to networks. See TCP/IP (Transmission Control Protocol/Internet Protocol)

data compression. See compressed files and folders Data Decryption Field (DDF), 5-26 data encryption. See encryption data recovery agent (DRA), 5-24, 5-30 to 5-31, 5-32 Data Recovery Field (DRF), 5-26 DCOM, Windows Firewall configuration, 7-18 DDF (Data Decryption Field), 5-26 debugging system failures, 8-27 decrypting, Data Decryption Field (DDF), 5-26. See also EFS (Encrypting File System); encryption default gateway addresses, 7-4 Defrag.exe, 4-48 defragmenting, 4-46 to 4-48. See also installing Windows XP; upgrades

display
deployment of Windows XP automating. See automating installation deployment folder, answer file configuration, 2-16 imaging. See disk imaging deployment desktop computers. See client computers desktop settings, 8-1 to 8-42 accessibility options, 8-9 to 8-10 backgrounds, 8-4 currency settings, 8-11 customizing desktop environments, 8-14 to 8-22 date settings, 8-11 defined, 8-2 Desktop Cleanup, 8-4 display settings, 8-3 to 8-6 environment variables, 8-24 to 8-25, 8-36 Group Policy, 8-36 keyboard layouts, 8-11 to 8-13 language configuration, 8-12 to 8-13 multiple languages, 8-12 to 8-13 My Documents Folder, 8-21 to 8-22 programs, automatic startup, 8-18 regional options, 8-11 to 8-12 remote assistance, 8-37 to 8-42 screen savers, 8-4 shortcuts, 8-4, 8-7 start menu, 8-15 to 8-17 startup folder, 8-18 system settings, 8-23 to 8-27 taskbar, 8-19 to 8-20 themes, 8-3 time settings, 8-11 Unused Icons folder, 8-4 user profiles, 8-34 to 8-35 visual effects, 8-5 Web content, 8-4 device drivers. See drivers Device Manager configuring resources, 3-34 to 3-36 running, 3-8 to 3-9 troubleshooting devices, 3-30 to 3-31 viewing hidden devices, 3-31 device node and device tree, defined, 3-8 devices. See hardware Dg0 and Dg1, disk group name suffixes, 4-21 DHCP (Dynamic Host Configuration Protocol) configuring IP addresses, 7-2 to 7-7, 7-54 ICS and, 10-25 on-with-no-exceptions mode, 7-19 to 7-20 repair, 7-32 VPN connection configuration, 11-19 WINS clients, configuring with DHCP scope options, 7-62 dial-up connections, 9-18, 11-6 digital signatures driver signing, 3-19 to 3-20 restoration, 6-34 to 6-35 security certificates, 9-11 unsigned drivers, 3-20 DirectX, 3-11 Disk Defragmenter, 4-46 to 4-48 disk groups defined, 4-21 Dg0, as suffix of name, 4-21 Dg1, as suffix of name, 4-21 disk imaging deployment, 2-32 to 2-34, 2-46 to 2-53 definition, 2-33 disk-imaging software, 2-34, 2-48 multicast server, deploying image from, 2-50 network startup disk, deploying image from, 2-50 reference computer preparation, 2-35 to 2-45 removable media, deploying image from, 2-50 requirements, 2-34 startup disk, deploying image from, 2-50 testing, 2-49 Disk Management, 4-2 to 4-5 converting basic disk to dynamic disk, 4-15 to 4-16 described, 1-8 disk-management tasks, 4-26 to 4-28 formatting dynamic disks, 4-20 disk partitioning. See partitions disk performance, defined, 4-17 Disk Properties sheet, 4-27 to 4-28 disk quotas, 1-9, 5-5 disk space boot volumes, adding space, 4-30 quotas, 1-9, 5-5 disklist command, 4-5 DiskPart converting basic disk to dynamic disk, 4-16 disk-management tasks, 4-2 to 4-5, 4-26 to 4-28 disks adding hard disks from one computer to another, 4-10 basic disks. See basic disks CDs. See CDs and CD-ROMs cluster disk, defined, 4-14 deleting, 4-27 to 4-28 Disk Defragmenter, 4-46 to 4-48 Disk Management. See Disk Management disk object number, defined, 4-5 Disk Properties sheet, 4-27 to 4-28 disk quotas, 1-9, 5-5 disk space. See disk space dynamic disks. See dynamic disks EFS storage, 5-24 groups. See disk groups imaging. See disk imaging deployment label, 4-27 logical disks. See logical disks managing, 4-1 to 4-48 naming, 4-27 partitions. See partitions quotas, 1-9, 5-5 reactivating, 4-28 removable disks, 4-14 repairing, 4-27 to 4-28 restoration, 6-34 to 6-35 space. See disk space types of disks, supported on operating systems, 4-24 unreadable, defined, 4-11 unrecognized, defined, 4-11 upgrading to Windows XP Professional, 4-23 to 4-25 volumes. See volumes display. See also desktop settings compressed files and folders, changing color, 5-12 desktop configuration, 8-3 to 8-6 multiple monitor configuration, 3-10 to 3-12, 8-6 onboard display device for multiple-monitor installation, 3-10 Setup Manager Wizard, 2-11

distribution folder
dual monitor configuration, 3-10 to 3-12, 8-6 dual-boot systems Boot.ini file, 6-10 disk requirements, 4-13 display names, modifying, 6-14 dynamic disks and, 4-16 FAT or FAT32 and, 1-10, 5-4 installing Windows XP Professional, 1-34 dynamic addressing alternate IP addresses, 7-7 automatic IP addresses, 7-5 defined, 7-5 static addresses as secondary addresses, 7-7 dynamic disks, 4-12 to 4-22. See also volumes basic disks vs., 4-12 compression, 5-14 converting from or to basic disk, 4-15 to 4-16 dual-boot systems and, 4-16 extending volumes, 4-29 to 4-30 Fiber Channel buses, support, 4-14 FireWire, support on, 4-13 foreign, 4-21, 4-27 formatting with Disk Management, 4-20 moving, 4-22 small computer system interface (SCSI), support, 4-14 Universal Serial Bus (USB), disks supported on, 4-14 upgrading from Windows NT 4.0 Workstation or Windows 2000 Professional, 4-26 Dynamic Host Configuration Protocol. See DHCP (Dynamic Host Configuration Protocol) dynamic tables, defined, 7-43 dynamic update protocol, 7-58 to 7-59

distribution folder, Setup Manager Wizard, 2-10 DLL (dynamic-link libraries), 13-5 DMA (direct memory access), conflicts revealed in Hardware Resources folder, 13-4 DNS (Domain Name System). See also TCP/IP (Transmission Control Protocol/Internet Protocol) alternate DNS servers, 7-54 to 7-55 DNS clients, configuring, 7-52 to 7-63 dynamic IP mapping, 7-44 joining domains, 10-38 name resolution. See name resolution query settings, configuring, 7-56 to 7-57 repair, 7-32 docking stations, 12-3 to 12-4 domain users, adding to encrypted file, 5-28 domains. See also workgroups access control, 10-43 to 10-44 Active Directory, 10-41 cached credentials, 10-42 logging on, 10-43 authenticating users, 10-41 to 10-42 computer accounts, 10-40 configuring in Setup Manager Wizard, 2-14 defined, 1-12 DNS (Domain Name System), 10-38 Group Policy settings, 10-45 joining, 1-12 procedures, 10-39 requirements, 10-37 to 10-38 logging on, 10-4, 10-40, 10-43 security access control, 10-43 to 10-44 Active Directory, 10-41, 10-42, 10-43 authenticating users, 10-41 cached credentials, 10-42 Group Policy, 10-45 logging on, 10-43 user account log on, 10-4 workgroup vs. domains, 1-11 to 1-12 double monitor configuration, 3-10 to 3-12, 8-6 Dr. Watson application log, 13-20 DRA (data recovery agent), 5-24, 5-30 to 5-31, 5-32 DRF (Data Recovery Field), 5-26 drive letters and paths assignment, 4-10 changing, 4-32 Driver Rollback, 3-23 to 3-24, 6-31, 6-36 drivers, 3-18 to 3-28 Bluetooth, 3-6 device driver, 3-2 Driver Rollback, 3-23 to 3-24, 6-31, 6-36 monitoring system information, 13-4 new device, adding, 6-7 to 6-8 signing, 3-19 to 3-20 storage, 3-24 unsigned, 3-20 updating, 3-8, 3-21 to 3-22 Windows Update, 3-21 to 3-22 drives drive compression, described, 4-28 Indexing Service, described, 4-28 logical, 4-7 mount points, 4-33 to 4-34 mounted drives, 4-33 to 4-34 naming, 4-27 partitioning basic disk, 4-8 to 4-9

EAP (Extensible Authentication Protocol) authentication of remote user, 11-23 to 11-24 remote access security, 11-20 echo requests, security logs, 7-23 to 7-24 educational software, compatibility, 13-41 EFS (Encrypting File System), 5-5, 5-22 to 5-33. See also encryption authorized users, adding, 5-28 best practices, 5-32 to 5-33 Data Decryption Field (DDF), 5-26 data recovery agent, 5-24, 5-30 to 5-32 Data Recovery Field (DRF), 5-26 decrypting files and folders, 5-29 NTFS and, 5-5 ejecting computer from docking station, 12-5 electrical power. See power and power management encryption best practices, 5-32 compression, 5-11. See also compressed files and folders differences between compression and encryption, 5-24 Data Decryption Field (DDF), 5-26 data recovery agent (DRA), 5-24, 5-30 to 5-31 EFS. See EFS (Encrypting File System) My Documents Folder, 8-21 NTFS and EFS, 5-5 recovering encrypted files and folders, 5-30 to 5-31 remote access, 11-20 security certificates, 9-11 transparent, 1-9 environment variables, 8-24 to 8-25, 8-36 errors event logs, 13-21 recovery. See recovery options

hardware
Event Viewer, 13-20 events and event logs, 13-19 to 13-27 archives, 13-26 to 13-27 described, 13-19, 13-20 echo requests, security logs, 7-23 to 7-24 file formats, 13-27 remote users, 13-22 security logs, 7-23 to 7-24 size limitations, 13-24 to 13-25 types of logs, 13-21 viewing, 13-22 to 13-23 Extensible Authentication Protocol. See EAP (Extensible Authentication Protocol) folders best practices for encryption, 5-32 compression. See compressed files and folders encryption. See encryption My Documents folder, 5-32, 8-21 to 8-22 offline files and folders. See offline availability of files security, 1-9 sharing. See shared files and folders shortcuts, 8-7 transferring folders Files and Settings Transfer Wizard, 1-38 to 1-39 User State Migration Tool, 1-36 to 1-37 foreign disks, 4-21, 4-27 Ftp.exe, 7-71

failure. See recovery options FAST (Files and Settings Transfer) Wizard, 1-38 to 1-39. See also transferring files and settings FAT or FAT32 choosing appropriate file system, 1-9 to 1-10 description and comparison, 5-2 to 5-4 Disk Defragmenter, 4-46 disk partitioning, 1-7 dual-boot systems and, 5-4 file system, choosing appropriate, 5-7 NTFS, converting to, 5-8 to 5-9 security, 1-10 security considerations, 5-7 fault tolerance, 4-18 Fiber Channel buses, 4-14 file systems. See also FAT or FAT32; NTFS choosing, 1-9 to 1-10, 5-7 configuring and managing, 5-1 to 5-39 converting, 5-8 to 5-9 defined, 5-1 File Transfer Protocol (FTP), 7-70 to 7-72 files active paging file, defined, 4-15 compression. See compressed files and folders EFS. See EFS (Encrypting File System) encrypted files. See encryption FAST Wizard. See FAST (Files and Settings Transfer) Wizard hardware-specific, 6-9 My Documents, 8-21 to 8-22 network access to. See shared files and folders offline files and folders. See offline availability of files paging file, defined, 5-9 security, 1-9. See also encryption signature verification, 3-20 sharing. See shared files and folders shortcuts, 8-7 transferring. See transferring files and settings unsigned, 3-20 Files and Settings Transfer (FAST) Wizard, 1-38 to 1-39. See also transferring files and settings FilterKeys, 8-10 financial institutions, legal requirements for archiving event logs, 13-26 firewalls ICF. See ICF (Internet Connection Firewall) local Intranet security zone settings, 9-4 Windows Firewall. See Windows Firewall first-time logon, answer file configuration, 2-16

game software compatibility, 13-41 gateways, static IP addresses, 7-4. See also remote access servers government agencies, legal requirements for archiving event logs, 13-26 Group Policy, desktop customization, 8-36 groups domains. See domains workgroups. See workgroups

handle, defined, 13-11 hard disks. See disks hardware Bluetooth. See Bluetooth devices bus devices, 3-8 compatibility. See hardware compatibility configuring, 3-1 to 3-36 device resource settings report, 3-36 driver signing options, 3-20 dual-boot configuring, 1-10, 1-34 hardware, 3-1 to 3-36 printers, 3-13 to 3-14 resources, 3-34 to 3-36 conflicts, resolving manually, 3-35 device drivers. See drivers Device Manager, 3-8 to 3-9, 3-30 to 3-31, 3-34 to 3-36 device node, defined, 3-8 device tree, defined, 3-8 drivers. See drivers hardware ID, defined, 3-21 Hardware Resources folder, 13-4 HCL (Hardware Compatibility List), 1-5 hidden devices, viewing, 3-31 installed devices, viewing, 3-8 to 3-9 installing, 3-2 to 3-17 mobile computing configuration, 12-3 to 12-5 multiple monitor configuration, 3-10 to 3-12 network-addressable devices, 3-6 onboard display device for multiple-monitor installation, 3-10 peripheral hardware. See peripheral devices Plug and Play hardware. See Plug and Play printers. See printers and print devices remote access options, 11-4 removing devices, 3-32 to 3-33 resource settings report, 3-36 rolling back drivers, 3-23 to 3-24 Safe Removal, 3-33

hardware compatibility
domain vs. workgroup configuration, 1-11 to 1-12 dual-boot configuration, 1-34 hardware compatibility, 1-5 to 1-6 network, installing Windows XP Professional over, 1-21 to 1-22 network components, 1-20 post-installation tasks, 1-49 to 1-52 pre-installation checklist, 1-13 tasks, 1-2 to 1-13 Product Activation, 1-49 from product CD, 1-18 to 1-20 RIS (Remote Installation Services), 2-52 to 2-53 setup errors, 1-51 to 1-52 software compatibility, 1-5 to 1-6 stand-alone computer, 1-11 system requirements, 1-3 to 1-4 transferring files. See transferring files and settings troubleshooting failed installations, 1-51 to 1-52 upgrades. See upgrades user settings, transferring. See transferring files and settings Internet computer name requirements, 10-28 desktop configuration, Web content, 8-4 proxy server settings, 9-17 remote access connections, 11-3, 11-4, 11-6 shortcuts to Web sites, 8-8 VPN connections, 11-14 to 11-15, 11-18 to 11-19 workgroup networking options, 10-23, 10-25 to 10-27 Internet Connection Firewall. See ICF (Internet Connection Firewall) Internet Connection Message Protocol. See ICMP (Internet Connection Message Protocol) Internet Connection Sharing. See ICS (Internet Connection Sharing) Internet Explorer, 9-1 to 9-22 certificates, 9-11 to 9-12 connection settings, 9-16 to 9-18 cookies, 9-6 to 9-15 dial-up connections, 9-18 FTP site access, 7-72 identity protection, 9-1 to 9-22 P3P privacy policy, 9-7 pop-ups, 9-6 to 9-15 privacy, 9-6 to 9-15 proxy server settings, 9-17 security, 9-2 to 9-5 zones, 9-3 to 9-4 VPN connections, 9-18 interrupt requests (IRQs), 13-4 intranets, security, 9-3 I/O (input/output) BIOS. See BIOS (basic input/output system) monitoring system information, 13-4 IP (Internet Protocol) addresses. See also TCP/IP (Transmission Control Protocol/Internet Protocol) alternate IP configurations, 7-2 automatically obtaining IP addresses, 7-2, 7-7 dynamic addressing. See dynamic addressing ipconfig command, 7-2 mapping names to IP addresses. See name resolution static addresses, 7-4, 7-7 troubleshooting, 7-28 to 7-34 WINS clients, configuring, 7-62

hardware, continued surprise removal, 3-32 to 3-33 system partition, 6-9 troubleshooting, 3-29 to 3-36 uninstalling devices, 3-32 to 3-33 notifying operating system of removal of Plug and Play device, 3-33 Safe Removal, 3-33 surprise removal, 3-33 hardware compatibility compatibility list, 1-5 HCL (Hardware Compatibility List), 1-5 for installation, 1-5 to 1-6 hardware profiles for mobile users, 12-3 to 12-4 Hardware Resources folder, 13-4 HCL (Hardware Compatibility List), 1-5 Help and Support, remote assistance, 8-37 to 8-42 hibernation, 12-8, 12-9 HighContrast, 8-10 Home and Small Network Setup checklist, 10-24 host names. See also name resolution defined, 7-41 dynamic IP mapping, 7-44 hostname command, 7-29 HOSTS file, defined, 7-46 HyperTerminal defined, 7-76 Telnet clients, 7-75 to 7-76

ICF (Internet Connection Firewall) configuring connection sharing, 10-27 enabling VPN packets, 11-19 enhanced security with Windows XP Service Pack 2, 7-19 on-with-no-exceptions mode, 7-19 securing workgroup networks, 10-23 ICMP (Internet Connection Message Protocol) options, 7-22 Windows XP Service Pack 2, 7-18 icons, shortcuts, 8-8 ICS (Internet Connection Sharing) configuring, 10-25 to 10-27 workgroup Internet access, 10-23 ICS Discover and Control, 10-26 identity protection in Internet Explorer, 9-1 to 9-22 imaging. See disk imaging deployment indexing Indexing Service, described, 4-28 My Documents Folder, 8-22 .inf files, changing transferred files or settings by modifying, 1-41 Input Method Editor (IME), 8-11 input/output BIOS. See BIOS (basic input/output system) monitoring system information, 13-4 installing hardware, 3-2 to 3-17 non-Plug and Play devices, 3-5 Plug and Play devices, 3-3 to 3-4 installing Windows XP, 1-1 to 1-52. See also setup activating, 1-49 to 1-50 automated installation. See automating installation choosing installation type, 1-29 clean install, 1-18

name resolution
ipconfig command, 7-2 IPSec, 5-25 IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange), 10-27 IRQs (interrupt requests), 13-4 ISDN lines, 11-4, 11-6 to 11-7 ISP (Internet service provider), remote access connections, 11-3 creating, 11-6 inbound connections, configuring, 11-18 to 11-19 remote users, connections through ISP, 11-4 VPN connections, 11-14 to 11-15, 11-18 to 11-19

kernel boot process, kernel initiation sequence, 6-7 described, 13-11 system failure recovery options, kernel memory dump, 8-27 keyboard layouts, 8-11 to 8-13 keys private keys, 5-30 to 5-31, 5-32 public keys, 5-26, 9-11 registry keys, 6-4

L2TP (Layer Two Tunneling Protocol), 11-16 to 11-17 LANs (local area networks) LAN protocols data transport protocols, 11-9 to 11-10 described, 11-8 monitoring network connectivity with Task Manager, 13-13 proxy server settings, 9-17 laptop computers. See mobile computing LastKnownGood configuration Automated System Recovery (ASR), 6-34 to 6-35 best practices, 6-36 to 6-37 CloneControlSet, 6-5 starting computer, 6-7 to 6-8 system restoration tool, 6-31 licensing, Volume License Product Key, 1-49 limiting disk space with disk quotas, 1-9, 5-5 links on taskbar, 8-20 LMHOSTS file, defined, 7-47 loadstate command-line tool, 1-40 local area networks. See LANs (local area networks) local intranet zone, security settings, 9-3 local loopbacks, TCP/IP troubleshooting, 7-29 local user profiles, 8-35 lockouts, 10-14, 10-16, 10-20 logging events. See events and event logs logging on domains, 10-4, 10-40, 10-43 first-time logon, answer file configuration, 2-16 workgroups, 10-21 to 10-22 logical disks. See also partitions; volumes creating, 4-8 to 4-9 described, 4-7 logs. See events and event logs

MD5-CHAP (Message Digest 5 Challenge Handshake Authentication Protocol), 11-23 media access control address, defined, 7-29 memory. See also virtual memory active paging file, defined, 4-15 monitoring system information, 13-4 optimizing performance, 13-17 to 13-18 paging file, defined, 5-9 system failure recovery, memory dump, 8-27 Microsoft Challenge Handshake Authentication Protocol. See MS-CHAP (Microsoft Challenge Handshake Authentication Protocol) Microsoft Management Console. See MMC (Microsoft Management Console) Mini-Setup Wizard, 2-40, 2-49, 2-51 MMC (Microsoft Management Console) Account Policies, 10-14 to 10-16 creating customized consoles, 10-12 to 10-13 security, 10-9 to 10-16 mobile computing, 12-1 to 12-23. See also remote users docking stations, 12-3 to 12-5 dynamic disk support, 4-14 hardware configuration, 12-3 to 12-5 offline files and folders. See offline availability of files power scheme selections, 12-6 to 12-7 synchronizing files, 12-10 to 12-11, 12-18 to 12-19 modems, remote access, 11-3 to 11-7 monitoring performance. See system performance monitors. See display mount points, 4-33 to 4-34 mounted drives, 4-33 to 4-34 MouseKeys, 8-10 MS-CHAP (Microsoft Challenge Handshake Authentication Protocol), 11-22 multicast servers, deploying image from, 2-50 Multilink, 11-11 to 11-12 multiple monitor configuration, 3-10 to 3-12, 8-6 My Documents folder, 5-32, 8-21 to 8-22

Magnifier, 8-10 maintenance tools. See performance and maintenance tools mandatory user profiles, 8-35 mapping drive letters. See drive letters and paths mapping user-friendly names to IP addresses. See name resolution

name devolution, defined, 7-57 name resolution, 7-40 to 7-76. See also DNS (Domain Name System) alternate DNS servers, 7-54 to 7-55 alternate servers, configuring, 7-54 to 7-55 connection-specific names, 7-53 domain names, 7-53 dynamic IP mapping, 7-44 to 7-45 dynamically updating DNS, 7-58 to 7-59 HOSTS file, 7-46 LMHOSTS file, 7-47 multihomed computers, 7-53 name devolution, 7-57 NetBIOS names, 7-41, 7-42, 7-44, 7-49 to 7-51 primary DNS suffix, 7-57 query settings, configuring, 7-56 to 7-57 servers, configuring, 7-54 to 7-55 static IP mapping, 7-46 to 7-47 suffixes, 7-53, 7-57 tables, 7-43 temporary name registrations, 7-62 troubleshooting, 7-49 to 7-50, 7-60 to 7-61 updating DNS, 7-58 to 7-59 WINS (Windows Internet Name Service), 7-44 to 7-45, 7-48

NetBIOS
Ntldr files, 6-9 to 6-10 NWLink, data transport protocols, 11-9 to 11-10

NetBIOS name resolution, 7-41, 7-42, 7-44, 7-49 to 7-51 dynamic IP mapping, 7-44 LMHOSTS file, 7-47 repair, 7-32 Network Bridge, described, 10-26 networks and networking, 10-1 to 10-44. See also ICMP (Internet Connection Message Protocol); workgroups components, installing, 1-20 deploying image from network startup disk, 2-50 disconnecting while working, 12-14 domains. See domains dropped packets, 7-23 files, network access to. See shared files and folders firewalls. See firewalls Home Network Setup checklist, 10-24 ICMP. See ICMP (Internet Connection Message Protocol) Internet connection sharing, 10-23, 10-25 to 10-27 logging network activity, 7-23 monitoring system information, 13-4 Network Bridge, 10-26 Network ID Wizard, 1-20 Network Setup Wizard, 10-24 configuring network settings, 10-28 to 10-29 connection sharing, 10-26 to 10-27 offline files for mobile workers, 12-10 to 12-16 operating system, installing over network, 1-21 to 1-22 reference computer configuration, 2-36 remote users. See remote users security. See security Setup Manager Wizard, 2-13, 2-14 shared network files. See shared files and folders Small Network Setup checklist, 10-24 subnet, defined, 7-2 synchronizing with mobile users, 12-18 to 12-19 Task Manager, monitoring connections with, 13-12 to 13-13 TCP/IP. See TCP/IP (Transmission Control Protocol/Internet Protocol) workgroups. See workgroups New Connection Wizard dial-up and broadband connections, 11-6 to 11-7 direct cable connections, 11-3 remote access connections, 11-3 VPN connections, 11-15, 11-18 non-Plug and Play devices, installing, 3-5 notification area, defined, 8-19 nslookup command, 7-60 to 7-61 Ntdetect.com files, 6-9 NTFS appropriate file system, choosing, 1-9 to 1-10, 5-7 compression best practices, 5-15 compression state, 5-10 to 5-12 copying and moving files and folders, 5-14 described, 5-2 Disk Defragmenter, 4-46 disk partitioning, 1-7 to 1-8 disk quotas, 5-5 EFS, using to secure data. See EFS (Encrypting File System) FAT or FAT32 volumes, converting from, 5-8 to 5-9 mount point placement, 4-33 partitions. See partitions security considerations, 5-7 troubleshooting tools, 5-6 upgrading Windows 2000 or Windows NT Workstation 4.0, 1-32 to 1-33

offline availability of files caching documents for offline use, 12-15 to 12-16 client computer configuration, 12-13 to 12-14 file configuration, 12-12 to 12-14 synchronizing files, 12-10 to 12-11, 12-18 to 12-19 web pages, 12-17 Offline Files Wizard, 12-14 on-with-no-exceptions mode, network security, 7-19 operating systems available on startup, 8-26 outbound connections, defined, 11-3

P3P privacy policy, 9-7 paging file, defined, 5-9 PAP (Password Authentication Protocol), 11-21 parallel port devices, removal, 3-33 partitions. See also volumes active partition, defined, 1-34 basic disk, 4-7 to 4-9 converting basic disk to dynamic disk, 4-15 to 4-16 defined, 1-4 deleting, 4-27 to 4-28, 4-31 Disk Defragmenter, 4-46 disk partitioning options, 1-7 to 1-8 extended creating, 4-9 defined, 4-7 extending, 4-29 to 4-30 formatting, 1-9 to 1-10 logical drives, 4-7 naming, 4-27 primary creating, 4-8 to 4-9 defined, 4-7 restoration, 6-34 to 6-35 size on dynamic vs. basic disk, 4-13 system partition, 6-9 passwords authenticating users in workgroups, 10-8 best practices, 11-40 configuring Administrator password in Setup Manager Wizard, 2-13 configuring Ctrl+Alt+Del options, 10-20 credentials, adding, 11-41 Password Policy configuration, 10-14 to 10-15 protecting computer during standby or hibernation, 12-9 remote access. See remote users remote assistance, 8-42 storing for remote access, 11-38 to 11-40 workgroup user accounts, 10-8 pathping command, 7-30 paths. See drive letters and paths PC Card, removal, 3-33 PCI (Peripheral Component Interconnect), 2-53 peer-to-peer networks. See workgroups performance and maintenance tools, 13-14 to 13-18. See also system performance advanced configurations, 13-17 to 13-18 described, 13-15 visual effects configurations, 13-16

remote users
performance logs. See events and event logs peripheral devices. See also specific names of peripherals docking station connections, 12-3 to 12-5 PCI (Peripheral Component Interconnect), 2-53 ping command HOSTS file, 7-46 security logs, 7-23 to 7-24 TCP/IP troubleshooting, 7-29, 7-33 to 7-34 piracy, anti-piracy measures, 1-49. See also activating Windows XP Plug and Play Add Hardware Wizard, 3-13 adding local printers, 3-13 to 3-14 changing resource settings, 3-34 default settings, lack of, 3-34 defined, 3-2 installing devices, 3-3 to 3-4 mobile computer users, 12-3 non-Plug and Play devices, installing, 3-3 Safe Removal, 3-33 surprise removal, 3-32 to 3-33 pop-ups managing, 9-6 to 9-15 Pop-Up Blocker, 9-13 to 9-15 portable computers. See mobile computing power and power management power scheme, defined, 12-6 saving power, 12-2, 12-8 to 12-9 standby, 12-8, 12-9 PPP (Point-to-Point Protocol), 11-8 to 11-12 bandwidth expansion, 11-11 to 11-12 data transport, 11-9 to 11-10 VPN configuration, 11-16 to 11-17 PPTP (Point-to-Point Tunneling Protocol), 11-16 to 11-17 printers and print devices adding Add Hardware Wizard, 3-13 Add Printer Wizard, 3-13 local printers, 3-13 to 3-14 answer file configuration, automated installation, 2-16 Printing Preferences, 3-14 sharing Windows XP Service Pack 2, Group Policy configuration, 7-18, 7-19 workgroup sharing, 10-23 privacy in Internet Explorer, 9-6 to 9-15 private keys, 5-30 to 5-31, 5-32 Problem Devices folder, 13-5 processes applications associated with, 13-6 computer performance monitoring, 13-11 definition, 13-2 monitoring with Task Manager, 13-7 to 13-9 process measures, 13-8 processor performance, optimizing, 13-17 product activation. See activating Windows XP product key configuring in Setup Manager Wizard, 2-11 Volume License Product Key, 1-50 programs, compatibility, 13-39 to 13-42. See also applications; software protocols. See specific names of protocols proxy server settings, 9-17 PSTN (Public Switched Telephone Network), 11-4, 11-6 to 11-7 public key, 5-26, 9-11. See also EFS (Encrypting File System) Public Switched Telephone Network (PSTN), 11-4, 11-6 to 11-7

Quick Launch, 8-19 to 8-20 quotas, disk space, 1-9, 5-5 RAM (random access memory), configuring for best performance, 13-18 RAS protocol, 11-10 raw data streams, defined, 5-25 recovery options. See also System Restore ASR (Automated System Recovery), 6-31, 6-34 to 6-37 configuring, 8-26 to 8-27 data recovery agent (DRA), 5-24, 5-30 to 5-32Data Recovery Field (DRF), 5-26 Recovery Console described, 5-6 using to start computer, 6-18 to 6-22 reference computers defined, 2-36 hard disk preparation, 2-42 image creation and deployment, 2-48 to 2-51 preparing, 2-35 to 2-43 preserving custom user settings, 2-38 regional options, 8-11 to 8-13 registry defined, 6-4 registry keys, 6-4, 6-6 remote access servers, 11-2 to 11-4 hardware connections, 11-4 Routing and Remote Access Service, 11-3 VPN connections, 11-14 remote assistance, 8-37 to 8-42 remote booting deploying disk image, 2-50 RIS (Remote Installation Services), 2-52 to 2-53 Remote Desktop configuration, 11-33 described, 11-32 remote hosts, connecting to, 7-69 to 7-76. See also remote access servers Remote Installation Services Setup Wizard, 2-53 remote users, 11-1 to 11-44. See also Remote Desktop authentication client protocols, 11-25 EAP (Extensible Authentication Protocol), 11-23 to 11-24 protocols and encryption, 11-20 to 11-27 smart cards, 11-23 to 11-24 standard protocols, 11-21 to 11-22 storing user names and passwords, 11-38 to 11-40 BAP (Bandwidth Allocation Protocol), 11-11 broadband connections, 11-6 to 11-7 CHAP (Challenge Handshake Authentication Protocol), 11-22 connections, 11-1 to 11-12 data encoding with TCP/IP, 11-8 data transport protocols, 11-9 to 11-10 described, 11-2 DHCP (Dynamic Host Configuration Protocol), 10-25, 11-19 dial-up connections, 11-6 direct cable connections, 11-5 EAP (Extensible Authentication Protocol), 11-23 to 11-24 event logs, 13-22 hardware options, 11-4 L2TP (Layer Two Tunneling Protocol), 11-16 to 11-17 LAN protocols, 11-8, 11-9 to 11-10

Q-R

10

removable storage devices


scanstate command-line tool, 1-40 screen resolution, desktop configuration, 8-6 screen savers, 8-4 SCSI (small computer system interface), dynamic disk support, 4-14 security Account Policies, 10-14 to 10-16 automatic updates, configuring, 2-58 cached credentials, 10-42 certificates. See certificates encryption. See encryption firewalls. See firewalls Internet Explorer configuration, 9-2 to 9-5 local security, 10-9 to 10-10 Account Policies, 10-14 to 10-16 consoles, customizing, 10-12 to 10-13 consoles, described, 10-11 Local Policies, 10-17 to 10-18 lockouts, 10-14, 10-16 monitoring security with event logs. See events and event logs networks, 1-19 configuring connection sharing, 10-25 to 10-27 domains. See domains encryption with EFS, 5-25 firewalls. See firewalls logs, 7-23 to 7-24 on-with-no-exceptions mode, 7-19 workgroup options, 10-23 workgroups. See workgroups NTFS vs. FAT or FAT32, 5-7 passwords. See passwords remote assistance, security concerns, 8-40, 8-42 remote desktop best practices, 11-33 Security Center, 2-55 to 2-58 security context, defined, 13-6 Security Options settings, 10-17 to 10-18 Security Policy, components missing or out of compliance, 2-55 SID (security identifier), 2-42 smart cards, 11-23 to 11-24 updates, 1-50 Windows Firewall configuration, 2-57 zones, 9-3 to 9-4 Select subkey, described, 6-6 SerialKeys, 8-10 servers DNS servers, 7-54 to 7-55 multicast server, deploying image from, 2-50 proxy server settings, 9-17 remote access. See remote access servers stand-alone servers, 10-3 UNIX hosts, connecting to, 7-69 to 7-76 settings transfer. See transferring files and settings setup. See also installing Windows XP automating. See automating installation wizards Mini-Setup Wizard, 2-40, 2-49 Remote Installation Services Setup Wizard, 2-53 Setup Manager Wizard, 2-8 to 2-16 Setup Wizard, 1-19 to 1-20 shared files and folders caching for offline use, 12-15 to 12-16 Group Policy configuration, 7-18, 7-19 My Documents Folder, 8-21, 8-22 shortcuts, 8-7 Windows Firewall, 7-18, 7-19

remote users, continued MD5-CHAP (Message Digest 5 Challenge Handshake Authentication Protocol), 11-23 MS-CHAP (Microsoft Challenge Handshake Authentication Protocol), 11-22 Multilink connections, 11-11 to 11-12 NWLink, 11-9 to 11-10 outbound connections, 11-2 to 11-3 multiple devices, 11-11 to 11-12 PAP (Password Authentication Protocol), 11-21 passwords credentials, adding, 11-41 storing to facilitate remote connections, 11-38 to 11-40 PPP. See PPP (Point-to-Point Protocol) PPTP (Point-to-Point Tunneling Protocol), 11-16 to 11-17 RAS protocol, 11-10 remote access servers. See remote access servers remote connections, enabling, 11-3 Remote Desktop feature, 11-31 to 11-33 SLIP (Serial Line Internet Protocol), 11-10 smart cards, 11-23 to 11-24 SPAP (Shiva Password Authentication Protocol), 11-21 TLS (Transport Layer Security), 11-23 VPN connections configuration, 11-15 described, 11-13 to 11-14 inbound connections, configuring, 11-18 to 11-19 VPN protocols, 11-16 to 11-17 removable storage devices CDs. See CDs and CD-ROMs deploying image from removable media, 2-50 surprise removal, 3-33 removing hardware devices, 3-32 to 3-33 notifying operating system of removal of Plug and Play device, 3-33 Safe Removal, 3-33 surprise removal, 3-33 residential gateway, described, 10-26 resolver, defined, 7-56 restart boot process. See boot process system failure recovery options, 8-27 restore points best practices, 6-36 defined, 6-32 restricted sites zones, 9-4 RIPrep (Remote Installation Preparation), 2-52 RIS (Remote Installation Services), 2-52 to 2-53 roaming user profiles, 8-35 routers, multiple IP addresses, 7-4 Routing and Remote Access Service data transport to and from remote users, 11-9 described, 11-3 Multilink feature, 11-11 to 11-12 remote users, connecting to remote access servers, 11-8 RPC, Windows XP Service Pack 2, 7-18

safe mode, described, 5-6 safe mode boot option, 6-15 to 6-16 Safe Removal of devices, 3-33 SAM (Security Account Manager) domain user accounts, 10-43 to 10-44 workgroup user accounts, 10-4, 10-5, 10-8

TCP/IP
shared printers Group Policy configuration, 7-18, 7-19 workgroup sharing, 10-23 shortcuts desktop, 8-7 to 8-8 start menu, 8-17 to 8-18 ShowSounds, 8-10 SID (Security Identifier) described, 10-43 to 10-44 removal from reference computer, 2-42 signatures. See digital signatures simple volumes, 4-18 to 4-19 SLIP (Serial Line Internet Protocol), 11-10 slow system performance. See system performance small computer system interface (SCSI), dynamic disk support, 4-14 Small Network Setup checklist, 10-24 smart cards, 11-23 to 11-24 snap-ins. See MMC (Microsoft Management Console) software applications software. See applications compatibility, 1-5 to 1-6, 13-39 to 13-42 Program Compatibility Wizard, 13-40 to 13-41 Windows 98 upgrades, 1-30 to 1-31 software distribution point, image creation and deployment, 2-34 Software Environment folder, 13-5 SoundSentry, 8-10 space. See disk space spanned volumes, 4-18 to 4-20, 4-24 to 4-25 SPAP (Shiva Password Authentication Protocol), 11-21 stand-alone computer installation, 1-11 stand-alone servers, 10-3 standby defined, 12-8 power saving configuration, 12-9 start menu, 8-15 to 8-17 all users, customizing for, 8-16 pinning programs, 8-17 shortcuts, 8-16 to 8-17 submenus, 8-16 to 8-17 system-based blue area, 8-15 user-based white area, 8-15 startup. See also boot process Boot.ini, changing startup behavior with, 6-9 to 6-14 common problems and solutions, 6-22 deploying image from startup CD, 2-50 operating systems, choosing among, 8-26 options, 8-26 to 8-27 static IP addresses, 7-4, 7-7 static ports TCP/IP (Transmission Control Protocol/Internet Protocol), 7-21 Windows XP Service Pack 2, 7-18 static tables, defined, 7-43 StickyKeys, 8-10 stop error defined, 8-27 recovery. See recovery options storage basic disks. See basic disks drivers, 3-24 removable storage. See removable storage devices Stored User Names and Passwords feature, 11-39 to 11-40 striped volumes, 4-18 to 4-20, 4-24 to 4-25 submenus on start menu, 8-16 to 8-17 subnet mask, defined, 7-4

11

subnets defined, 7-2 moving computers between subnets, 7-6 static IP addresses, 7-4 static port openings, 7-21 switch box, defined, 12-5 switches, Boot.ini files, 6-12, 6-14 Synchronization Manager for offline files, 12-10 to 12-11, 12-18 to 12-19 Sysprep.exe running, 2-42 testing disk imaging application with, 2-48 Sysprep.inf, 2-40 system failure. See also System Restore recovery. See recovery options stop error, 8-27 System Information, described, 13-4 to 13-5 system log, 8-27 system partitions, 6-9 system performance application compatibility, 13-39 to 13-42 configuring system settings, 8-23 to 8-27 environment variables, 8-24 to 8-25 event logs, 13-19 to 13-27 logs. See events and event logs monitoring performance, 13-1 to 13-27 optimizing performance, 8-23 to 8-27 startup and recovery options, 8-26 to 8-27 Task Manager, monitoring performance with, 13-6 to 13-13 tools. See performance and maintenance tools system preparation for upgrades, 1-27 to 1-28 system requirements for installation, 1-3 to 1-4 System Restore, 6-31 to 6-37 Automated System Recovery (ASR), 6-31, 6-34 to 6-37 Driver Rollback, 6-31, 6-36 driver rollback, defined, 3-23 LastKnownGood configuration, 6-31, 6-34 to 6-35 previous state, 6-31 to 6-37 restore points, 6-32, 6-36 System Summary folder, 13-4 system variables, 8-24 to 8-25

Task Manager applications monitoring, 13-6 computer performance monitoring, 13-10 to 13-11 configuring Ctrl+Alt+Del options, 10-20 defined, 13-2 network connectivity monitoring, 13-12 to 13-13 processes monitoring, 13-7 to 13-9 unresponsive applications, 13-6 taskbar, 8-18 to 8-20 TCP/IP (Transmission Control Protocol/Internet Protocol). See also DNS (Domain Name System); ICMP (Internet Connection Message Protocol) data transport protocols, 11-9 to 11-10 DNS clients and WINS clients, configuring, 7-52 to 7-63 dynamic addressing. See dynamic addressing Internet connections for workgroups, 10-27 mapping names to IP addresses. See name resolution media access control address, defined, 7-29 name resolution. See name resolution remote hosts, connecting to, 7-69 to 7-76 static IP addresses, 7-4, 7-7 static port openings, 7-21

12

Telnet
UPnP (Universal Plug and Play), network Internet connections, 10-26 USB (Universal Serial Bus), dynamic disks support, 4-14 user-friendly names. See name resolution users and user accounts Account Policies, configuring for local user workgroups, 10-14 to 10-16 adding authorized users to encrypted file, 5-28 authenticating users, 10-8, 10-41, 10-42 data recovery agent (DRA), 5-24, 5-30 to 5-32 defaults, 10-7 desktop configuration. See desktop settings domain accounts. See domains environment variables, 8-24 to 8-25 Fast User Switching, 10-22 passwords. See passwords preserving custom user settings, 2-38 security identifier, 10-43 to 10-44 Setup Manager Wizard, user interaction level, 2-10 user names credentials, adding, 11-41 storing for remote access, 11-38 to 11-40 user profiles, 8-34 to 8-36 user state command-line tools. transferring with, 1-40 defined, 1-35 Files and Settings Transfer Wizard, 1-38 to 1-39 User State Migration Tool. See USMT (User State Migration Tool) workgroups. See workgroups USMT (User State Migration Tool) defined, 1-35 file types transferred by default, 1-36 to 1-37 transferring files and settings, 1-35 to 1-48

TCP/IP, continued TCP/IP addressing, 7-1 to 7-76 Telnet, 7-73 to 7-76 troubleshooting IP addresses, 7-28 to 7-34 VPN connections, 11-19 Windows Firewall, configuring, 7-16 to 7-24 Telnet, 7-73 to 7-76 themes, desktop configuration, 8-3 thread, defined, 13-11 time desktop settings, 8-11 remote assistance, expiration time, 8-42 TLS (Transport Layer Security), authentication of remote user, 11-23 ToggleKeys, 8-10 tracert command security logs, 7-23 to 7-24 TCP/IP troubleshooting, 7-30 transferring files and settings automated installations, 2-1 to 2-59 Bluetooth File Transfer Wizard, 3-6 command-line tools, 1-40, 1-41 default settings, 1-36 to 1-37 File Transfer Protocol (FTP), 7-70 to 7-71 Files and Settings Transfer Wizard, 1-38 to 1-39 .inf files, modifying, 1-41 preserving custom user settings, 2-38 User State Migration Tool. See USMT (User State Migration Tool) traveling users. See mobile computing trusted domain users, adding to encrypted file, 5-28 trusted sites, security settings, 9-3 two-monitor configuration, 3-10 to 3-12, 8-6

UDF (Uniqueness Database Files). See also answer files benefits of using, 2-21 defined, 2-4 setup, using during, 2-29 to 20-30 unique IDs, 2-21, 2-22 unattended installation. See automating installation Unattend.udb, 2-21 uninstalling devices devices, 3-32 to 3-33 notifying operating system of removal of Plug and Play device, 3-33 Safe Removal, 3-33 surprise removal, 3-33 Universal Serial Bus (USB), dynamic disks support, 4-14 UNIX hosts, connecting to, 7-69 to 7-76 unsigned drivers, 3-20 unsigned files, 3-20 Unused Icons folder, 8-4 updates automatic updates, configuring, 2-58 driver updating, 3-21 to 3-22 security updates, 1-50 upgrades, 1-25 to 1-34 identifying paths, 1-26 installation type, choosing, 1-29 intermediate, 1-26 readiness of large number of computers, 1-6 system preparation, 1-27 to 1-28 Upgrade Advisor, 1-6 Windows 98, 1-30 to 1-31 Windows 2000, 1-32 to 1-33 Windows NT Workstation 4.0 SP 5, 1-32 to 1-33

video adapters for multiple monitors, 3-10 virtual memory described, 13-11 monitoring system information, 13-4 optimizing performance, 13-17 to 13-18 visual effects, configuring, 8-5, 13-16 voice communication in remote assistance, 8-39 Volume License Product Key, 1-50 volumes. See also dynamic disks; partitions basic, 4-7 boot, adding space, 4-30 compression best practices, 5-15 compression state, 5-10 to 5-12 copying and moving files and folders, 5-14 converting basic disk to dynamic disk, 4-15 to 4-16 creating, 4-19 to 4-20 defined, 4-13, 5-2 defragmenting, 4-45 to 4-48 deleting, 4-27 to 4-28, 4-31 Disk Defragmenter, 4-46 extending, 4-29 to 4-30 fault tolerance, creating, 4-18 file system, choosing appropriate, 5-7 naming, 4-27 repairing, 4-27 to 4-28 restoration, 6-34 to 6-35 simple volumes, 4-18 to 4-19 size on dynamic vs. basic disk, 4-13 spanned volumes, 4-18 to 4-20, 4-24 to 4-25 striped volumes, 4-18 to 4-20, 4-24 to 4-25 volume sets, 4-24

zones
VPNs (Virtual Private Networks) configuring connection using New Connection Wizard, 11-15 connections, 9-18, 11-14 to 11-15, 11-18 to 11-19 creating dial-up connections, 11-7 described, 11-13 inbound connections, configuring, 11-18 to 11-19 protocols for configuring VPNs, 11-16 to 11-17 remote access server and, 11-3 Windows Workstation 4.0 SP 5 upgrades, 1-32 to 1-33 Windows XP Service Pack 2, 7-18 to 7-21 winnt command for automating setup, 2-28 winnt32 command for automating setup, 2-28 WINS (Windows Internet Name Service) dynamic IP mapping, 7-44 to 7-45 name resolution, 7-48 repair, 7-32 temporary name registrations, 7-62 WINS clients, configuring, 7-62 to 7-63 wireless devices. See Bluetooth devices wizards. See specific names of wizards workgroups account types, 10-7 authenticating users, 10-8 configuring in Setup Manager Wizard, 2-14 creating local user accounts, 10-6 to 10-7 Ctrl+Alt+Del Options, 10-19 to 10-20 defined, 1-11, 10-3 domains vs. workgroups, 1-11 to 1-12. See also domains Fast User Switching, 10-22 logon options, 10-21 to 10-22 naming, 10-28 to 10-29 networking options, 10-23 to 10-29 security, 10-23 account types, 10-7 Active Directory, 10-4 passwords, 10-8 SAM (Security Account Manager), 10-4, 10-5 user rights, 10-17 to 10-18

13

warm docking, defined, 12-5 warnings in event logs, 13-21 web browser. See Internet Explorer Web Distributed Authoring and Versioning (WebDAV), 5-25 Web pages, offline use, 12-17 Windows 98 upgrades, 1-30 to 1-31 Windows 2000 upgrades, 1-32 to 1-33 Windows Explorer, FTP graphical client, 7-71 to 7-72 Windows Firewall. See also ICMP (Internet Connection Message Protocol) configuration, 2-57 configuring, 7-16 to 7-24 described, 2-57 dropped packets, 7-23 global configuration, 7-17 Group Policy configuration, 7-18 logging network activity, 7-23 on-with-no-exceptions mode, 7-19 to 7-20 security logs, 7-23 to 7-24 static port openings, 7-21 successful connections, logging, 7-23 Windows Internet Name Service. See WINS (Windows Internet Name Service) Windows Update. See updates

X-Z

X.25, remote access connections, 11-4 zones, security, 9-3, 9-3 to 9-4

Potrebbero piacerti anche