mcsa môn 270

595

description

Tài Liệu MCSA

Transcript of mcsa môn 270

  • SubAssy Part No. X11-03252Body Part No. X11-03253

    PUBLISHED BYMicrosoft PressA Division of Microsoft CorporationOne Microsoft WayRedmond, Washington 98052-6399

    Copyright 2005 by Microsoft Corporation

    All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any meanswithout the written permission of the publisher.

    Library of Congress Control Number 2004117425

    Printed and bound in the United States of America.

    1 2 3 4 5 6 7 8 9 QWT 9 8 7 6 5 4Distributed in Canada by H.B. Fenn and Company Ltd.

    A CIP catalogue record for this book is available from the British Library.

    Microsoft Press books are available through booksellers and distributors worldwide. For further information aboutinternational editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly atfax (425) 936-7329. Visit our Web site at www.microsoft.com/learning/. Send comments to [email protected].

    Microsoft, Active Desktop, Active Directory, ActiveX, Authenticode, IntelliMirror, MSDN, MS-DOS, MSN, NetMeeting,Outlook, PowerPoint, Visual Basic, Win32, Windows, Windows Media, Windows NT, and Windows Server are eitherregistered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

    The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depictedherein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person,place, or event is intended or should be inferred.

    Acquisitions Editor: Lori OviattProject Editor: Denise BankaitisTechnical Editor: James CauseyCopy Editor: Ina ChangProduction: Elizabeth HansfordIndexer: Julie Kawabata

  • iii

    CONTENTS AT A GLANCE

    CHAPTER 1: Introducing Windows XP Professional . . . . . . . . . . .1

    CHAPTER 2: Installing Windows XP Professional . . . . . . . . . . . .25

    CHAPTER 3: Managing Disks and File Systems . . . . . . . . . . . . . .75

    CHAPTER 4: Managing Devices and Peripherals. . . . . . . . . . . .119

    CHAPTER 5: Configuring and Managing the User Experience . . . . . . . . . . . . . . . . . . . . . . . . . . . .147

    CHAPTER 6: Configuring and Managing Printers and Fax Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . .183

    CHAPTER 7: Configuring and Managing NTFS Security . . . . .219

    CHAPTER 8: Configuring and Managing Shared Folder Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .253

    CHAPTER 9: Supporting Applications in Windows XP Professional. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .295

    CHAPTER 10: Connecting Windows XP Professional to a Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .317

    CHAPTER 11: Configuring TCP/IP Addressing and Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .353

    CHAPTER 12: Managing Internet Explorer Connections and Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .381

    CHAPTER 13: Managing Users and Groups . . . . . . . . . . . . . . . . .419

    CHAPTER 14: Configuring and Managing Computer Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .461

    CHAPTER 15: Backing Up and Restoring Systems and Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .491

    CHAPTER 16: Managing Performance . . . . . . . . . . . . . . . . . . . . .521

    Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .551

    Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .565

  • vCONTENTS

    About This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi

    Target Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviiPrerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviiThe Textbook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviiiThe Supplemental Course Materials CD-ROM . . . . . . . . . . . . . . . . . . . . . xix

    Readiness Review Suite Setup Instructions . . . . . . . . . . . . . . . . . . . . xixeBook Setup Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx

    The Lab Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxNotational Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiKeyboard Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiiCoverage of Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiiThe Microsoft Certified Professional Program . . . . . . . . . . . . . . . . . . . xxvii

    Certifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxviiMCP Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxviii

    About the Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxixFor Microsoft Official Academic Course Support . . . . . . . . . . . . . . . . . xxixEvaulation Edition Software Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxx

    CHAPTER 1: Introducing Windows XP Professional . . . . . . . . . . .1Overview of Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

    Windows XP Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2Intelligent User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Hardware Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    Comprehensive Help and Support Options . . . . . . . . . . . . . . . . . . . . . . . . 8Pick a Help Topic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Ask for Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Pick a Task . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Searching and Printing Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    Windows XP Security Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Windows Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Security Center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Attachment Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Encrypting File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Security Management Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

    Windows XP Organizational Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Workgroup Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Domain Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Logging On and Off Windows XP Professional . . . . . . . . . . . . . . . . 19

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

  • vi CONTENTS

    Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24Scenario 1.1: Securing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24Scenario 1.2: Assisting Remote Users . . . . . . . . . . . . . . . . . . . . . . . . . 24

    CHAPTER 2: Installing Windows XP Professional . . . . . . . . . . . .25Preinstallation Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    Verifying Hardware Compatibility. . . . . . . . . . . . . . . . . . . . . . . . . . . . 26Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26Storage Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27File Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28Domain or Workgroup Membership . . . . . . . . . . . . . . . . . . . . . . . . . 31

    Performing an Attended Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Windows XP Professional Setup Program . . . . . . . . . . . . . . . . . . . . . 33Running the Setup Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Running the Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Completing the Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

    Installing over the Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38Preparing for a Network Installation . . . . . . . . . . . . . . . . . . . . . . . . . 38Modifying the Setup Process Using Winnt.exe . . . . . . . . . . . . . . . . . 41Modifying the Setup Process Using Winnt32.exe. . . . . . . . . . . . . . . 42

    Automating Installations Using Windows Setup Manager. . . . . . . . . . . 44Installing Setup Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45Using Setup Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

    Upgrading to Windows XP Professional . . . . . . . . . . . . . . . . . . . . . . . . . . 47Identifying Client Upgrade Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48Generating a Hardware Compatibility Report. . . . . . . . . . . . . . . . . . 48Upgrading Compatible Windows 98 Computers . . . . . . . . . . . . . . . 49Upgrading a Windows 2000 Professional Computer. . . . . . . . . . . . 50Migrating User Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

    Understanding Remote Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53Installing and Configuring RIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54Client Requirements for Remote Installation. . . . . . . . . . . . . . . . . . . 55Creating Boot Floppies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56Installing Windows XP Using RIS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

    Using Disk Duplication to Deploy Windows XP Professional. . . . . . . . . 58Using the System Preparation Tool to Prepare the Master Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58Installing Windows XP Professional from a Master Disk Image . . . 60

    Applying System Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60Windows Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61Service Packs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63Automatic Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

    Slipstreaming Service Packs and Updates . . . . . . . . . . . . . . . . . . . . . . . . . 65Slipstreaming Service Packs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65Slipstreaming Windows Updates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

  • CONTENTS vii

    Using Windows Product Activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66How Windows Product Activation Works . . . . . . . . . . . . . . . . . . . . . 66Activating Windows XP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67Automating Windows Product Activation . . . . . . . . . . . . . . . . . . . . . 67

    Troubleshooting Windows XP Professional Setup . . . . . . . . . . . . . . . . . . 68Resolving Common Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68Setup Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

    Scenario 2-1: Dual-Booting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74Scenario 2-2: Automatic Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

    CHAPTER 3: Managing Disks and File Systems . . . . . . . . . . . . . .75Understanding Disk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

    Understanding Basic Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76Understanding Dynamic Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77Working with Simple Volumes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79Working with Spanned Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79Working with Striped Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80Adding Disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80Changing the Storage Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82Using Refresh and Rescan Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84Managing Disks on a Remote Computer. . . . . . . . . . . . . . . . . . . . . . 84

    Managing Removable Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85Using the Removable Storage Manager . . . . . . . . . . . . . . . . . . . . . . 85

    Managing Compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88Using Compressed Folders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88Using NTFS Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

    Increasing Security with the EFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93Understanding the EFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94Using the Cipher Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96Using a Recovery Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97Managing Recovery Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Disabling the EFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101EFS Best Practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

    Managing Disk Quotas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102Understanding Disk Quota Management . . . . . . . . . . . . . . . . . . . . 102Setting Disk Quotas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103Determining the Status of Disk Quotas . . . . . . . . . . . . . . . . . . . . . . 105Monitoring Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105Best Uses for Disk Quotas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

  • viii CONTENTS

    Using Disk Defragmenter, Chkdsk, and Disk Cleanup. . . . . . . . . . . . . . 106Defragmenting Disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106Using Disk Defragmenter Effectively . . . . . . . . . . . . . . . . . . . . . . . . 108Using Chkdsk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109Using Disk Cleanup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

    Scenario 3-1: Storage Choices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116Scenario 3-2: Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

    CHAPTER 4: Managing Devices and Peripherals. . . . . . . . . . . .119Using Device Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

    Configuring and Troubleshooting Devices . . . . . . . . . . . . . . . . . . . 120Viewing Hidden and Phantom Devices . . . . . . . . . . . . . . . . . . . . . . 122

    Managing and Troubleshooting I/O Devices . . . . . . . . . . . . . . . . . . . . . 123Scanners and Cameras . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123Mouse Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125Game Controllers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126IrDA and Wireless Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127Keyboards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

    Understanding Automatic and Manual Hardware Installation . . . . . . 128Confirming Hardware Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . 130Troubleshooting Device Installation . . . . . . . . . . . . . . . . . . . . . . . . . 131Installing Hardware Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

    Viewing and Configuring Hardware Profiles . . . . . . . . . . . . . . . . . . . . . 134Understanding Hardware Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . 135Creating or Modifying a Hardware Profile. . . . . . . . . . . . . . . . . . . . 135Activating a Hardware Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136Viewing Hardware Profile Properties . . . . . . . . . . . . . . . . . . . . . . . . 136

    Driver Signing and File Signature Verification . . . . . . . . . . . . . . . . . . . . 136Configuring Driver Signing Requirements. . . . . . . . . . . . . . . . . . . . 137Checking System File Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138Using the File Signature Verification Tool . . . . . . . . . . . . . . . . . . . . 138

    Configuring Computers with Multiple Processors . . . . . . . . . . . . . . . . . 139Multiprocessor Scaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

    Managing ACPI Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140Forcing Installation of a Specific HAL . . . . . . . . . . . . . . . . . . . . . . . . 141

    Troubleshooting ACPI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

    Scenario 4-1: Managing a Hardware Upgrade . . . . . . . . . . . . . . . . 144Scenario 4-2: Troubleshooting Problems with the HAL. . . . . . . . . 145

  • CONTENTS ix

    CHAPTER 5: Configuring and Managing the User Experience . . . . . . . . . . . . . . . . . . . . . . . . . . . .147

    Configuring and Managing Desktop Components . . . . . . . . . . . . . . . . 148Configuring Display Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148Using Multiple Displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157The Taskbar and Start Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

    Configuring Power Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165Selecting a Power Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165Configuring Advanced Power Options. . . . . . . . . . . . . . . . . . . . . . . 166Enabling Hibernate Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167Configuring Advanced Power Management. . . . . . . . . . . . . . . . . . 168Advanced Configuration and Power Interface (ACPI) . . . . . . . . . . 168Configuring an Uninterruptible Power Supply . . . . . . . . . . . . . . . . 168

    Configuring User Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170Local and Roaming User Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170User Profile Storage Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171

    Configuring Multiple Languages and Locations . . . . . . . . . . . . . . . . . . 172Configuring Accessibility Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

    Configuring Keyboard Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174Configuring Sound Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176Configuring Display Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177Configuring Mouse Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177Configuring General Tab Options . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

    Other Accessibility Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178The Magnifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179The Narrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

    Scenario 5-1: Time for Hibernation . . . . . . . . . . . . . . . . . . . . . . . . . 182Scenario 5-2: Power Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

    CHAPTER 6: Configuring and Managing Printers and Fax Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183

    Introduction to Windows XP Professional Printing . . . . . . . . . . . . . . . . 184Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184

    Adding a Local Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185Adding a Printer Connected to a Print Server . . . . . . . . . . . . . . . . . . . . 188

    Types of Print Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189Connecting to a Printer on a Windows Print Server . . . . . . . . . . . 190Using the Search Assistant to Find a Printer . . . . . . . . . . . . . . . . . . 191

    Adding a Network Interface Printer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192Standard TCP/IP Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192LPR Port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

    Connecting to an Internet Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194How Internet Printing Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

  • x CONTENTS

    Using Windows XP as a Print Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197Requirements for Network Print Services . . . . . . . . . . . . . . . . . . . . 198Sharing Printers During Installation . . . . . . . . . . . . . . . . . . . . . . . . . 199Sharing an Existing Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200Installing Additional Print Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . 201Creating Printer Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201Managing Printer Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203Managing Printer Priority. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205Scheduling Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

    Managing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207Assigning Forms to Paper Trays. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207Setting a Separator Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208Administering Printers with a Web Browser . . . . . . . . . . . . . . . . . . 209

    Managing Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210Pausing, Restarting, and Canceling a Document . . . . . . . . . . . . . . 210

    Troubleshooting Common Printing Problems . . . . . . . . . . . . . . . . . . . . 211Examining the Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211Common Troubleshooting Scenarios . . . . . . . . . . . . . . . . . . . . . . . . 212Printing Troubleshooters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213Additional Troubleshooting Options . . . . . . . . . . . . . . . . . . . . . . . . 214

    Configuring and Managing Windows XP Fax Support . . . . . . . . . . . . . 214The Fax Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215Fax Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

    Scenario 6-1: Printing in a Small Office . . . . . . . . . . . . . . . . . . . . . . 218Scenario 6-2: Printer Wars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

    CHAPTER 7: Configuring and Managing NTFS Security . . . . .219Understanding the NTFS File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . 220Understanding NTFS Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

    Components of NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . 222NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224NTFS Permissions Inheritance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

    Managing NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230Best Practices for Assigning Permissions . . . . . . . . . . . . . . . . . . . . . 230Setting NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231Using Command-Line Tools to View and Modify Permissions . . . 236Assigning Multiple NTFS Permissions. . . . . . . . . . . . . . . . . . . . . . . . 239

    Auditing NTFS Object Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241Enabling Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242Monitoring Security Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244

    Troubleshooting NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244Problems with Effective Permissions. . . . . . . . . . . . . . . . . . . . . . . . . 244Problems with Denied Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . 245Problems with Permission Inheritance . . . . . . . . . . . . . . . . . . . . . . . 245

  • CONTENTS xi

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250

    CHAPTER 8: Configuring and Managing Shared Folder Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .253

    Understanding Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254Shared Folder Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254Guidelines for Shared Folder Permissions . . . . . . . . . . . . . . . . . . . . 255How Shared Folder Permissions Are Applied . . . . . . . . . . . . . . . . . 256

    Planning Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257Requirements for Sharing Folders. . . . . . . . . . . . . . . . . . . . . . . . . . . 257Shared Application Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258Shared Data Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259Administrative Shared Folders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

    Sharing a Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261Sharing Folders in Computer Management . . . . . . . . . . . . . . . . . . 261Sharing Folders in Windows Explorer. . . . . . . . . . . . . . . . . . . . . . . . 264Using the NET Command to Share Folders . . . . . . . . . . . . . . . . . . . 265Sharing a Folder on a Remote Computer . . . . . . . . . . . . . . . . . . . . 268

    Managing Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268Assigning Shared Folder Permissions . . . . . . . . . . . . . . . . . . . . . . . . 268Creating Multiple Share Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270Modifying Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

    Connecting to Shared Folders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271Combining Shared Folder Permissions and NTFS Permissions . . . . . . 273Monitoring Access to Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

    Reasons for Monitoring Network Resources . . . . . . . . . . . . . . . . . . 275Requirements for Monitoring Network Resources . . . . . . . . . . . . . 275Monitoring Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

    Using Offline Folders and Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278Understanding Offline Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279Configuring Your Computer to Use Offline Folders and Files . . . 280

    Managing Internet Information Services . . . . . . . . . . . . . . . . . . . . . . . . 283Installing IIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284Using IIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284Sharing Web Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285NTFS Permissions and Web Folders . . . . . . . . . . . . . . . . . . . . . . . . . 287Using Web Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292

    Scenario 8-1: Shared Folder Tree. . . . . . . . . . . . . . . . . . . . . . . . . . . . 292Scenario 8-2: Command-Line Nirvana . . . . . . . . . . . . . . . . . . . . . . . 292

  • xii CONTENTS

    CHAPTER 9: Supporting Applications in Windows XP Professional. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .295

    Understanding Windows Installer Technologies . . . . . . . . . . . . . . . . . . 296Windows Installer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296Windows Installer Packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296

    Deploying Software Using Group Policy . . . . . . . . . . . . . . . . . . . . . . . . . 302Overview of Group Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302Software Installation Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302Removing Software Installation Policy . . . . . . . . . . . . . . . . . . . . . . . 304

    Understanding Application Compatibility . . . . . . . . . . . . . . . . . . . . . . . 305Windows Logo Program. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305Causes of Application Incompatibility . . . . . . . . . . . . . . . . . . . . . . . 306Application Compatibility Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307Advanced Compatibility Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309Troubleshooting Application Compatibility Issues . . . . . . . . . . . . . 310

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314

    Scenario 9-1: Windows Installer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314Scenario 9-2: Irreconcilable Differences? . . . . . . . . . . . . . . . . . . . . . 315

    CHAPTER 10: Connecting Windows XP Professional to a Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .317

    Configuring TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318The OSI Reference Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318The DARPA Reference Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320The TCP/IP Protocol Suite. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323Understanding IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323Managing Network Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330Troubleshooting TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

    Connecting to a Wireless Ethernet Network. . . . . . . . . . . . . . . . . . . . . . 335Understanding Wireless Specifications. . . . . . . . . . . . . . . . . . . . . . . 335Connecting Windows XP to a Wireless Network . . . . . . . . . . . . . . 336

    Configuring Other Network Connections . . . . . . . . . . . . . . . . . . . . . . . . 337Client Service for NetWare. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338Installing the NWLink Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338Installing Third-Party Clients and Protocols . . . . . . . . . . . . . . . . . . 339

    Connecting to Computers UsingDial-Up Networking . . . . . . . . . . . . . 340Connecting to the Internet Using Dial-Up Networking . . . . . . . . 340Connecting to a Network at Your Workplace . . . . . . . . . . . . . . . . . 341

    Configuring and Troubleshooting Internet Connection Sharing (ICS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342Using Remote Desktop and Remote Assistance. . . . . . . . . . . . . . . . . . . 344

    Remote Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346

  • CONTENTS xiii

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

    Scenario 10-1: Small Office Networking . . . . . . . . . . . . . . . . . . . . . 351Scenario 10-2: Help! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

    CHAPTER 11: Configuring TCP/IP Addressing and Security . . .353Understanding IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354

    Binary Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354Decoding IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359Local vs. Remote Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360

    Using Subnet Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361Subnetting and Supernetting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362

    Securing IP Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365Internet Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365Protective Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366Monitoring Internet Communications Security . . . . . . . . . . . . . . . 375

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380

    Case Scenario 11-1: A Growing Enterprise . . . . . . . . . . . . . . . . . . . 380Case Scenario 11-2: Security on a Shoestring . . . . . . . . . . . . . . . . . 380

    CHAPTER 12: Managing Internet Explorer Connections and Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .381

    Managing Internet Explorer Connections . . . . . . . . . . . . . . . . . . . . . . . . 382Using the New Connection Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . 382Managing Connection Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383

    Connecting to Resources Using Internet Explorer . . . . . . . . . . . . . . . . . 387Uniform Resource Locators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387Connecting to Web Site Resources . . . . . . . . . . . . . . . . . . . . . . . . . . 389Accessing FTP Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389Accessing Web Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390Connecting to Web ServerBased Applications . . . . . . . . . . . . . . . 391

    Managing Internet Explorer Security Settings . . . . . . . . . . . . . . . . . . . . 391Overview of Internet Explorer Security Features. . . . . . . . . . . . . . . 391Managing URL Actions for Web Content Zones. . . . . . . . . . . . . . . 393Web Content Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399Advanced Internet Security Options. . . . . . . . . . . . . . . . . . . . . . . . . 402

    Managing Internet Explorer Privacy Settings . . . . . . . . . . . . . . . . . . . . . 404Cookies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404Pop-Up Blocker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407Managing Internet Cache and History Data . . . . . . . . . . . . . . . . . . 408AutoComplete and Internet Explorer Password Caching . . . . . . . 411

    Using Add-On Manager to Control Add-On Programs . . . . . . . . . . . . 412Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414

  • xiv CONTENTS

    Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416Scenario 12-1: Getting Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416Scenario 12-2: Managing Internet ExplorerSecurity and Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417

    CHAPTER 13: Managing Users and Groups . . . . . . . . . . . . . . . . .419Overview of User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420

    Users and Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420User and Group Account Permissions . . . . . . . . . . . . . . . . . . . . . . . 420User Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421User Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421Built-In User Accounts and Groups. . . . . . . . . . . . . . . . . . . . . . . . . . 421Implicit Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422Service Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423Domain User Accounts and Groups . . . . . . . . . . . . . . . . . . . . . . . . . 424Tools for Managing Users and Groups . . . . . . . . . . . . . . . . . . . . . . . 425

    Planning User Accounts and Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429Mapping Out a User and Group Strategy . . . . . . . . . . . . . . . . . . . . 429User Account Naming Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 430Setting Requirements for Complex Passwords . . . . . . . . . . . . . . . . 431Changing the Way Users Log On or Log Off. . . . . . . . . . . . . . . . . . 432

    Creating and Managing User Accounts with Local Users and Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434

    Creating User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434Managing User Account Properties . . . . . . . . . . . . . . . . . . . . . . . . . 434Managing User Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436Managing User Rights Assignment. . . . . . . . . . . . . . . . . . . . . . . . . . 437

    Creating and Managing Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438Creating and Managing Groups Using Local Users and Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438Managing Groups Using Command-Line Tools . . . . . . . . . . . . . . . 441

    Creating and Managing User Accounts with the User Accounts Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442

    User Account Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442Creating a New User Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443Changing an Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444

    Best Practices for User Account Management . . . . . . . . . . . . . . . . . . . . 446Managing User AccountRelated System Policies . . . . . . . . . . . . . . . . . 447

    Managing User Rights with Group Policy . . . . . . . . . . . . . . . . . . . . 447Managing User Account Settings with Group Policy . . . . . . . . . . . 451

    Using Cached Credentials in Windows XP . . . . . . . . . . . . . . . . . . . . . . . 454Understanding Cached Credentials . . . . . . . . . . . . . . . . . . . . . . . . . 454Managing Cached Credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454Troubleshooting Cached Credentials . . . . . . . . . . . . . . . . . . . . . . . . 455

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456

  • CONTENTS xv

    Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458Scenario 13-1: Designing Accounts for a Field Office . . . . . . . . . . 458Scenario 13-2: Protecting Files on a Military System . . . . . . . . . . . 459

    CHAPTER 14: Configuring and Managing Computer Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .461

    Understanding Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462Local Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462Domain Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466

    Managing Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467Predefined Security Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467Creating a Custom Security Policy Management Console . . . . . . 468Viewing, Modifying, and Creating a Security Template. . . . . . . . . 470Analyzing and Configuring Security Settings . . . . . . . . . . . . . . . . . 472Exporting Security Templates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474Managing Security Policy with Secedit.exe . . . . . . . . . . . . . . . . . . . 475

    Managing Security Audit Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476Actions That Can Be Audited. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476Planning an Audit Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478Implementing and Managing an Audit Policy . . . . . . . . . . . . . . . . 479Monitoring Audit Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487

    Scenario 14-1: Designing a Security Policy . . . . . . . . . . . . . . . . . . . 487Scenario 14-2: Security Auditing. . . . . . . . . . . . . . . . . . . . . . . . . . . . 488

    CHAPTER 15: Backing Up and Restoring Systems and Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .491

    Understanding the Windows Backup Utility. . . . . . . . . . . . . . . . . . . . . . 492Features of the Backup Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492

    Planning a Backup and Recovery Strategy . . . . . . . . . . . . . . . . . . . . . . . 494Choosing a Backup Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494Determining What to Back Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496Selecting Backup Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496Choosing a Backup Schedule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497Planning for Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498

    Backing Up the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499Creating a New Backup Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499Modifying a Backup Job. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501Executing a Backup Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501Performing an ASR Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501

    Restoring a System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504Determining Which Backups to Restore . . . . . . . . . . . . . . . . . . . . . 504Creating a Restore Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504Using ASR to Recover a System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505

  • xvi CONTENTS

    Using System Restore to Recover Data and Settings. . . . . . . . . . . . . . . 507Configuring System Restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508Creating a Restore Point Manually . . . . . . . . . . . . . . . . . . . . . . . . . . 508Restoring Settings and Data from a Restore Point . . . . . . . . . . . . . 510

    Using Startup and Recovery Tools to Recover a System . . . . . . . . . . . . 511Using the Recovery Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511Using the Last Known Good Configuration. . . . . . . . . . . . . . . . . . . 513Starting a System in Safe Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518

    Scenario 15-1: Backup Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518Scenario 15-2: Power Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519

    CHAPTER 16: Managing Performance . . . . . . . . . . . . . . . . . . . . .521Designing a System for Performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . 522

    Factors Leading to Poor Performance . . . . . . . . . . . . . . . . . . . . . . . 522Determining Resource Requirements . . . . . . . . . . . . . . . . . . . . . . . . 523

    Monitoring Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523The Performance Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525Viewing Performance Charts with System Monitor . . . . . . . . . . . . 526Using Histograms and Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530Using Performance Logs to Spot Trends . . . . . . . . . . . . . . . . . . . . . 532Using Performance Alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534Monitoring Performance with Task Manager . . . . . . . . . . . . . . . . . 536

    Improving Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539Memory Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540Disk Performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540Adding CPUs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545Mobile System Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548

    Scenario 16-1: A Slow Application . . . . . . . . . . . . . . . . . . . . . . . . . . 548Scenario 16-2: Spotting the Cause of Performance Issues . . . . . . 549

    Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .551

    Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .565

  • xvii

    ABOUT THIS BOOK

    Welcome to Installing, Configuring, and Administering Microsoft Windows XP Profes-sional (70-270), Second Edition, a part of the Microsoft Official Academic Course (MOAC) series. Through lectures, discussions, demonstrations, textbook exer-cises, and classroom labs, this course teaches the skills and knowledge necessary to plan, install, configure, and support Windows XP in standalone, small net-work, and corporate network environments. In 16 chapters, students will learn how to install Windows XP Professional, connect to and share network resources, configure Internet services and applications, manage security settings and audit-ing, and evaluate system performance.

    TARGET AUDIENCE

    This textbook was developed for beginning information technology students who want to learn to configure and manage Windows XP in a variety of environ-ments so that they can provide corporate support and implementation of Windows XP on a direct-hire or consulting basis. Students who continue to study Microsoft server operating systems can go on to earn the Microsoft Certified System Administrator (MCSA) or Microsoft Certified Systems Engineer (MCSE) credential.

    PREREQUISITES

    The prerequisites for taking this course are:

    Familiarity with the use of Windows XP, including navigation and operation of major features.

    A fundamental knowledge of computer hardware, network construc-tion, and operating systems.

    Prerequisite knowledge and course work as defined by the learning institution and the instructor. Completion of the Supporting Users and Troubleshooting Microsoft Windows XP (Microsoft Learning) course or equivalent experience is recommended.

  • xviii INSTALLING, CONFIGURING, AND ADMINISTERING MICROSOFT WINDOWS XP PROFESSIONAL

    THE TEXTBOOK

    The textbook content has been crafted to provide a meaningful learning experi-ence to students in an academic classroom setting.

    Key features of the Microsoft Official Academic Course textbooks include the following:

    Learning objectives for each chapter that prepare the student for the topic areas covered in that chapter.

    Chapter introductions that explain why the information is important.

    An inviting design with screen shots, diagrams, tables, bulleted lists, and other graphical formats that makes the book easy to comprehend and supports a number of different learning styles.

    Clear explanations of concepts and principles, and frequent exposition of step-by-step procedures.

    A variety of reader aids that highlight a wealth of additional informa-tion, including:

    NoteReal-world application tips and alternative procedures, and explanations of complex procedures and concepts

    CautionWarnings about mistakes that can result in loss of data or that are difficult to resolve

    ImportantExplanations of essential setup steps before a procedure and other instructions

    More InfoCross-references and additional resources for students

    End-of-chapter review questions that assess knowledge and can serve as homework, quizzes, and review activities before or after lectures. (Answers to the textbook questions are available from your instructor.)

    Chapter summaries that distill the main ideas in a chapter and rein-force learning.

    Case scenarios, approximately two per chapter, that provide students with an opportunity to evaluate, analyze, synthesize, and apply infor-mation learned during the chapter.

    Comprehensive glossary that defines key terms introduced in the book.

  • ABOUT THIS BOOK xix

    THE SUPPLEMENTAL COURSE MATERIALS CD-ROM

    This book comes with a Supplemental Course Materials CD-ROM, which con-tains a variety of informational aids to complement the book content:

    An electronic version of this textbook (eBook). For information about using the eBook, see the section titled eBook Setup Instructions later in this introduction.

    The Microsoft Learning Readiness Review Suite built by MeasureUp. This suite of practice tests and objective reviews contains questions of varying complexity and offers multiple testing modes. You can assess your understanding of the concepts presented in this book and use the results to develop a learning plan that meets your needs.

    An eBook of the Microsoft Encyclopedia of Networking, Second Edition.

    Microsoft PowerPoint slides based on textbook chapters, for note-taking.

    Microsoft Word Viewer and Microsoft PowerPoint Viewer.

    A second CD contains a 120-day evaluation edition of Windows XP Professional with Service Pack 2.

    NOTE The 120-day evaluation edition of Windows XP Professional pro-vided with this book is not the full retail product; it is provided only for the purposes of training and evaluation. Microsoft Technical Support does not support evaluation editions.

    Readiness Review Suite Setup Instructions

    The Readiness Review Suite includes a practice test of 300 sample exam ques-tions and an objective review with an additional 125 questions. Use these tools to reinforce your learning and to identify areas in which you need to gain more expe-rience before taking your final exam for the course, or the certification exam if you choose to do so.

    Installing the Practice Test

    1. Insert the Supplemental Course Materials CD into your CD-ROM drive.

    NOTE If AutoRun is disabled on your machine, refer to the Readme.txt file on the Supplemental Course Materials CD.

    2. On the user interface menu, select Readiness Review Suite and follow the prompts.

  • xx INSTALLING, CONFIGURING, AND ADMINISTERING MICROSOFT WINDOWS XP PROFESSIONAL

    eBook Setup Instructions

    The eBook is in Portable Document Format (PDF) and must be viewed using Adobe Acrobat Reader.

    Using the eBooks

    1. Insert the Supplemental Course Materials CD into your CD-ROM drive.

    NOTE If AutoRun is disabled on your machine, refer to the Readme.txt file on the CD.

    2. On the user interface menu, select Textbook eBook and follow the prompts. You also can review any of the other eBooks provided for your use.

    NOTE You must have the Supplemental Course Materials CD in your CD-ROM drive to run the eBook.

    THE LAB MANUAL

    The Lab Manual is designed for use in either a combined lecture and lab situa-tion, or in a separate lecture and lab arrangement. The exercises in the Lab Man-ual correspond to textbook chapters and are for use in a classroom setting supervised by an instructor.

    The Lab Manual presents a rich, hands-on learning experience that encourages practical solutions and strengthens critical problem-solving skills:

    Lab Exercises teach procedures by using a step-by-step format. Ques-tions interspersed throughout Lab Exercises encourage reflection and critical thinking about the lab activity.

    Lab Review Questions appear at the end of each lab and ask questions about the lab. They are designed to promote critical reflection.

    Lab Challenges are review activities that either cover material in the text or ask students to perform a variation on a task they performed in the Lab Exercises, but without detailed instructions.

    Troubleshooting Labs appear after a number of regular labs; they con-sist of medium-length review projects and are based on true-to-life sce-narios. These labs challenge students to think like an expert to solve complex problems.

  • ABOUT THIS BOOK xxi

    Labs are based on realistic business settings and include an opening scenario and a list of learning objectives.

    Students who successfully complete the Lab Exercises, Lab Review Questions, Lab Challenges, and Troubleshooting Labs in the Lab Manual will have a richer learning experience and deeper understanding of the concepts and methods cov-ered in the course. They will be better able to answer and understand the test bank questions, especially the knowledge application and knowledge synthesis questions. They will also be much better prepared to pass the associated certifica-tion exams if they choose to take them.

    NOTATIONAL CONVENTIONS

    The following conventions are used throughout this textbook and the Lab Manual:

    Characters or commands that you type appear in bold type.

    Terms that appear in the glossary also appear in bold type.

    Italic in syntax statements indicates placeholders for variable informa-tion. Italic is also used for book titles and terms defined in the text.

    Names of files and folders appear in Title caps, except when you are to type them directly. Unless otherwise indicated, you can use all lower-case letters when you type a filename in a dialog box or at a command prompt.

    Filename extensions appear in all lowercase.

    Acronyms appear in all uppercase.

    Monospace type represents code samples, examples of screen text, or entries that you might type at a command prompt or in initialization files.

    Square brackets [ ] are used in syntax statements to enclose optional items. For example, [filename] in command syntax indicates that you can type a filename with the command. Type only the information within the brackets, not the brackets themselves.

    Braces { } are used in syntax statements to enclose required items. Type only the information within the braces, not the braces themselves.

  • xxii INSTALLING, CONFIGURING, AND ADMINISTERING MICROSOFT WINDOWS XP PROFESSIONAL

    KEYBOARD CONVENTIONS

    A plus sign (+) between two key names means that you must press those keys at the same time. For example, Press Alt+Tab means that you hold down Alt while you press Tab.

    A comma (,) between two or more key names means that you must press the keys consecutively, not at the same time. For example, Press Alt, F, X means that you press and release each key in sequence. Press Alt+W, L means that you first press Alt and W at the same time, and then you release them and press L.

    COVERAGE OF EXAM OBJECTIVES

    This book is intended to support a course that is structured around concepts and practical knowledge fundamental to this topic area, as well as the tasks that are covered in the objectives for the MCSE 70-270 exam. The following table correlates the exam objectives with the textbook chapters and Lab Manual lab exercises. You might also find this table useful if you decide to take the certification exam.

    NOTE The Microsoft Learning Web site describes the various MCP certi-fication exams and their corresponding courses. It provides up-to-date certification information and explains the certification process and the course options. See http://www.microsoft.com/learning/ for up-to-date information about MCP exam credentials for other certification programs offered by Microsoft.

    Textbook and Lab Manual Coverage of Exam Objectives for MCSE Exam 70-270

    Objective Textbook Chapter Lab Manual ContentInstalling Windows XP Professional

    Perform and troubleshoot an attended installation of Windows XP Professional.

    Chapter 2 Labs 1 and 2

    Perform and troubleshoot an unattended installation of Windows XP Professional. Install Windows XP Professional by

    using Remote Installation Services (RIS).

    Install Windows XP Professional by using the System Preparation Tool.

    Create unattended answer files by using Setup Manager to automate the installation of Windows XP Profes-sional.

    Chapter 2

    Chapter 2

    Chapter 2

    Chapter 2

    Lab 2

    Not covered

    Not Covered

    Lab 2

  • ABOUT THIS BOOK xxiii

    Installing Windows XP Professional

    Upgrade from a previous version of Win-dows to Windows XP Professional. Prepare a computer to meet upgrade

    requirements.

    Migrate existing user environ-ments to a new installation.

    Chapter 2

    Chapter 2

    Chapter 2

    Labs 1 and 2

    Labs 1 and 2

    Not Covered

    Perform post-installation updates and product activation.

    Chapter 2 Lab 2

    Troubleshoot failed installations. Chapter 2 Lab 2

    Implementing and Conducting Administration of Resources

    Monitor, manage, and troubleshoot access to files and folders. Configure, manage, and troubleshoot

    file compression.

    Control access to files and folders by using permissions.

    Optimize access to files and folders.

    Chapter 7

    Chapter 3

    Chapter 7

    Chapter 7

    Lab 7

    Lab 7

    Lab 7

    Lab 3Manage and troubleshoot access to shared folders. Create and remove shared folders.

    Control access to shared folders by using permissions.

    Manage and troubleshoot Web server resources.

    Chapter 8

    Chapter 8

    Chapter 8

    Chapter 8

    Lab 8

    Lab 8

    Lab 8

    Lab 8

    Connect to local and network print devices. Manage printers and print jobs.

    Control access to printers by using permissions.

    Connect to an Internet printer.

    Connect to a local print device.

    Chapter 6

    Chapter 6

    Chapter 6

    Chapter 6

    Chapter 6

    Lab 6

    Lab 6

    Lab 6

    Lab 6

    Lab 6Configure and manage file systems. Convert from one file system to

    another file system.

    Configure NTFS, FAT32, or FAT file systems.

    Chapter 3Chapter 3

    Chapter 3

    Lab 3Lab 3

    Lab 3

    Manage and troubleshoot access to and synchronization of offline files.

    Chapter 8 Lab 8

    Textbook and Lab Manual Coverage of Exam Objectives for MCSE Exam 70-270

    Objective Textbook Chapter Lab Manual Content

  • xxiv INSTALLING, CONFIGURING, AND ADMINISTERING MICROSOFT WINDOWS XP PROFESSIONAL

    Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers

    Implement, manage, and troubleshoot disk devices. Install, configure, and manage DVD

    and CD-ROM devices.

    Monitor and configure disks.

    Monitor, configure, and troubleshoot volumes.

    Monitor and configure removable media, such as tape devices.

    Chapter 3

    Chapter 3

    Chapter 3

    Chapter 3

    Chapter 3

    Lab 3

    Lab 4

    Lab 3

    Lab 3

    Not Covered

    Implement, manage, and troubleshoot dis-play devices. Configure multiple-display support.

    Install, configure, and troubleshoot a video adapter.

    Chapter 5

    Chapter 5

    Chapter 5

    Lab 5

    Not Covered

    Labs 4 and 5

    Configure Advanced Configuration Power Interface (ACPI).

    Chapter 4 Not Covered

    Implement, manage, and troubleshoot input and output (I/O) devices. Monitor, configure, and troubleshoot

    I/O devices, such as printers, scan-ners, multimedia devices, mice, key-boards, and smart card readers.

    Monitor, configure, and troubleshoot multimedia hardware, such as cameras.

    Install, configure, and manage modems.

    Install, configure, and manage Infra-red Data Association (IrDA) devices.

    Install, configure, and manage wire-less devices.

    Install, configure, and manage USB devices.

    Install, configure, and manage hand-held devices.

    Install, configure, and manage net-work adapters.

    Chapter 4

    Chapter 4

    Chapter 4

    Chapter 4

    Chapter 4

    Chapter 4

    Chapter 4

    Chapter 4

    Chapters 4, 10, and 11

    Lab 4

    Lab 4

    Lab 4

    Lab 4

    Not Covered

    Not Covered

    Lab 4

    Not Covered

    Labs 4, 10, and 11

    Textbook and Lab Manual Coverage of Exam Objectives for MCSE Exam 70-270

    Objective Textbook Chapter Lab Manual Content

  • ABOUT THIS BOOK xxv

    Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers

    Manage and troubleshoot drivers and driver signing.

    Chapter 4 Lab 4

    Monitor and configure multiprocessor computers.

    Chapter 4 Not Covered

    Monitoring and Optimizing System Performance and Reliability

    Monitor, optimize, and troubleshoot per-formance of the Windows XP Professional desktop. Optimize and troubleshoot memory

    performance.

    Optimize and troubleshoot processor utilization.

    Optimize and troubleshoot disk per-formance.

    Optimize and troubleshoot applica-tion performance.

    Configure, manage, and troubleshoot scheduled tasks.

    Chapter 16

    Chapter 16

    Chapter 16

    Chapter 16

    Chapter 16

    Chapter 16

    Lab 16

    Lab 16

    Lab 16

    Lab 16

    Lab 16

    Lab 15

    Manage, monitor, and optimize system per-formance for mobile users.

    Chapter 16 Lab 16

    Restore and back up the operating system, System State data, and user data. Recover System State data and user

    data by using Windows Backup.

    Troubleshoot system restoration by starting in Safe Mode.

    Recover System State data and user data by using the Recovery Console.

    Chapter 15

    Chapter 15

    Chapter 15

    Chapter 15

    Lab 15

    Lab 15

    Lab 15

    Lab 15

    Configuring and Troubleshooting the Desktop Environment

    Configure and manage user profiles and desktop settings.

    Chapters 5 and 13

    Labs 5 and 13

    Configure support for multiple languages or multiple locations. Enable multiple-language support.

    Configure multiple-language support for users.

    Configure local settings.

    Configure Windows XP Professional for multiple locations.

    Chapter 5

    Chapter 5

    Chapter 5

    Chapter 5

    Chapter 5

    Lab 5

    Lab 5

    Lab 5

    Lab 5

    Lab 5

    Textbook and Lab Manual Coverage of Exam Objectives for MCSE Exam 70-270

    Objective Textbook Chapter Lab Manual Content

  • xxvi INSTALLING, CONFIGURING, AND ADMINISTERING MICROSOFT WINDOWS XP PROFESSIONAL

    Configuring and Troubleshooting the Desktop Environment

    Manage applications by using Windows Installer packages.

    Chapter 9 Lab 9

    Implementing, Managing, and Troubleshooting Network Protocols and Services

    Configure and troubleshoot the TCP/IP protocol.

    Chapters 10 and 11

    Labs 10 and 11

    Connect to computers by using dial-up networking. Connect to computers by using a

    virtual private network (VPN) connection.

    Create a dial-up connection to connect to a remote access server.

    Connect to the Internet by using dial-up networking.

    Configure and troubleshoot Internet Connection Sharing (ICS).

    Chapter 10

    Chapter 10

    Chapter 10

    Chapter 10

    Chapter 10

    Lab 10

    Lab 10

    Lab 10

    Lab 10

    Lab 10

    Connect to resources by using Internet Explorer.

    Chapter 12 Lab 12

    Configure, manage, and implement Inter-net Information Services (IIS).

    Chapter 12 Labs 6, 8, and 12

    Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

    Chapter 10 Lab 10

    Configure, manage, and troubleshoot an Internet Connection Firewall (ICF).

    Chapter 11 Lab 11

    Configuring, Managing, and Troubleshooting Security

    Configure, manage, and troubleshoot the Encrypting File System (EFS).

    Chapter 3 Lab 3

    Configure, manage, and troubleshoot a security configuration and local security policy.

    Chapter 14 Lab 14

    Textbook and Lab Manual Coverage of Exam Objectives for MCSE Exam 70-270

    Objective Textbook Chapter Lab Manual Content

  • ABOUT THIS BOOK xxvii

    THE MICROSOFT CERTIFIED PROFESSIONAL PROGRAM

    The MCP program is one way to prove your proficiency with current Microsoft products and technologies. These exams and corresponding certifications are developed to validate your mastery of critical competencies as you design and develop, or implement and support, solutions using Microsoft products and tech-nologies. Computer professionals who become Microsoft certified are recognized as experts and are sought after industry-wide. Certification brings a variety of benefits to the individual and to employers and organizations.

    MORE INFO For a full list of MCP benefits, go to http://www.microsoft.com/learning/itpro/default.asp.

    Certifications

    The MCP program offers multiple certifications, based on specific areas of techni-cal expertise:

    Microsoft Certified Professional (MCP) In-depth knowledge of at least one Windows operating system or architecturally significant plat-form. An MCP is qualified to implement a Microsoft product or tech-nology as part of a business solution for an organization.

    Configuring, Managing, and Troubleshooting Security

    Configure, manage, and troubleshoot local user and group accounts. Configure, manage, and troubleshoot

    auditing.

    Configure, manage, and troubleshoot account settings.

    Configure, manage, and troubleshoot account policy.

    Configure, manage, and troubleshoot user and group rights.

    Troubleshoot cached credentials.

    Chapter 13

    Chapter 13

    Chapter 13

    Chapter 13

    Chapter 13

    Chapter 13

    Lab 13

    Lab 13

    Lab 13

    Lab 13

    Lab 13

    Not CoveredConfigure, manage, and troubleshoot Inter-net Explorer security settings.

    Chapter 12 Lab 12

    Textbook and Lab Manual Coverage of Exam Objectives for MCSE Exam 70-270

    Objective Textbook Chapter Lab Manual Content

  • xxviii INSTALLING, CONFIGURING, AND ADMINISTERING MICROSOFT WINDOWS XP PROFESSIONAL

    Microsoft Certified Systems Engineer (MCSE) Qualified to effec-tively analyze the business requirements for business solutions and design and implement the infrastructure based on the Windows and Windows Server 2003 operating systems.

    Microsoft Certified Systems Administrator (MCSA) Qualified to manage and troubleshoot existing network and system environments based on the Windows and Windows Server 2003 operating systems.

    Microsoft Certified Database Administrator (MCDBA) Qualified to design, implement, and administer Microsoft SQL Server databases.

    Microsoft Certified Desktop Support Technician (MCDST) Qualified to support end users and to troubleshoot desktop environments on the Microsoft Windows operating system.

    MCP Requirements

    Requirements differ for each certification and are specific to the products and job functions addressed by the certification. To become an MCP, you must pass rigor-ous certification exams that provide a valid and reliable measure of technical pro-ficiency and expertise. These exams are designed to test your expertise and ability to perform a role or task with a product, and they are developed with the input of industry professionals. Exam questions reflect how Microsoft products are used in actual organizations, giving them real-world relevance.

    Microsoft Certified Professional (MCP) candidates are required to pass one current Microsoft certification exam. Candidates can pass addi-tional Microsoft certification exams to validate their skills with other Microsoft products, development tools, or desktop applications.

    Microsoft Certified Systems Engineer (MCSE) candidates are required to pass five core exams and two elective exams.

    Microsoft Certified Systems Administrator (MCSA) candidates are required to pass three core exams and one elective exam.

    Microsoft Certified Database Administrator (MCDBA) candidates are required to pass three core exams and one elective exam.

    Microsoft Certified Desktop Support Technician (MCDST) candidates are required to pass two core exams.

  • ABOUT THIS BOOK xxix

    ABOUT THE AUTHORS

    The textbook, Lab Manual, pretest, testbank, and PowerPoint slides were devel-oped exclusively for an instructor-led classroom environment by two authors, Dave Field and Owen Fowler.

    Dave Field is an author, trainer, and presenter. An MCSE on Windows NT 4, Win-dows 2000, and Windows 2003, Dave is an expert on networking technologies and support desk topics. He has written consumer computer books such as How To Do Everything with Windows XP Home Networking (Osborne/McGraw-Hill) and has designed courses for Microsoft and Osborne/McGraw-Hill for the Microsoft MCSE, MCSA, and MCDST certifications.

    Dave is also the systems engineer at Camp Snoopy, a theme park in the Mall of America in Bloomington, Minnesota. In this role, he has directed the installation of entire network infrastructures using technologies such as Active Directory, Microsoft Exchange, and Microsoft SQL Server. He has been the principal archi-tect of point-of-sale implementations, ERP rollouts, and e-commerce initiatives.

    Owen Fowler has worked as a Tier II Support Agent for one of the largest elec-tronic tax filing centers in the United States. He has also run his own computer consulting business, covering networking and operating system issues, in Colo-rado and Washington. In 2003, he assisted Verizon Wireless in consolidating its nationwide network into a single domain. Owen has been an author, technical editor, and development editor on many titles for Microsoft Learning.

    FOR MICROSOFT OFFICIAL ACADEMIC COURSE SUPPORT

    Every effort has been made to ensure the accuracy of the material in this book and the contents of the CD-ROM. Microsoft Learning provides corrections for books through the World Wide Web at the following address:

    http://www.microsoft.com/learning/support/

    If you have comments, questions, or ideas regarding this book or the companion CD-ROM, please send them to Microsoft Learning using either of the following methods:

  • xxx INSTALLING, CONFIGURING, AND ADMINISTERING MICROSOFT WINDOWS XP PROFESSIONAL

    Postal Mail:

    Microsoft LearningAttn: Installing, Configuring, and Administering Microsoft Windows XP Professional (70-270), Second Edition, EditorOne Microsoft WayRedmond, WA 98052-6399

    E-mail: [email protected]

    Please note that product support is not offered through the above addresses.

    EVALUATION EDITION SOFTWARE SUPPORT

    A 120-day software evaluation edition of Windows XP Professional with Service Pack 2 is provided with this textbook. This is not the full retail product and is pro-vided only for training and evaluation purposes. Microsoft and Microsoft Techni-cal Support do not support this evaluation edition. It differs from the retail version only in that Microsoft and Microsoft Technical Support do not support it, and it expires after 120 days. For information about issues relating to the use of evaluation editions, go to the Support section of the Microsoft Learning Web site (http://www.microsoft.com/learning/support/).

    For online support information relating to the full version of Windows XP Professional that might also apply to the evaluation edition, go to http://support.microsoft.com. For information about ordering the full version of any Microsoft software, call Microsoft Sales at (800) 426-9400 or visit http://www.microsoft.com.

  • 1CHAPTER 1

    INTRODUCING WINDOWS XP PROFESSIONALUpon completion of this chapter, you will be able to:

    Describe the support features of Windows XP Professional

    Identify security technologies in Windows XP Professional

    Identify the role of Windows XP Professional in the enterprise

    Log on to a Windows XP Professional computer

    In this course, we introduce you to the installation, configuration, and manage-ment of Windows XP Professional. Students in this course are expected to come from all backgrounds and have varying levels of experience with Windows XP Professional. That said, you will get the most from this course if you have a good understanding of the Windows graphical environment. Those who have com-pleted Supporting Users and Troubleshooting Microsoft Windows XP (Microsoft Official Academic Curriculum Course 70-271) will have a firm basis for understanding this material.

    We have a lot of information to cover, but plenty of excellent resources are avail-able to help you understand this technology. Many will be provided with this textbook, and many more are available from your instructor or at Microsofts Windows XP Web site at www.microsoft.com/windowsxp.

  • 2 INSTALLING, CONFIGURING, AND ADMINISTERING MICROSOFT WINDOWS XP PROFESSIONAL

    OVERVIEW OF WINDOWS XP PROFESSIONAL

    Windows XP Professional is the Microsoft business-class desktop operating sys-tem. It is intended for those who require high performance, security, and reliable computer resources. It differs from the consumer-level Windows XP Home Edi-tion in its support for enterprise computing architectures, multiple processors, advanced security, and manageability. It is found in business, desktop publishing, banking and finance, and manufacturing environments, as well as other areas that require reliable and secure computer performance. In this section, we will examine the features of Windows XP Professional and describe many of the ele-ments of this operating system.

    Windows XP Architecture

    The Windows XP line of operating systems is based on the Windows NT kernel architecture. This architecture was designed to allow the central processesthose processes requiring the most privilegeto operate in a privileged environment, often referred to as the kernel (shown in Figure 1-1). This environment is insu-lated from direct manipulation by users or hardware resources. The kernel is also separated from the actual system hardware by the hardware abstraction layer (HAL). The HAL is a layer of code designed to interface the specific hardware with the more generic operating system. At one time, HALs existed for PowerPC and DEC Alpha processors, but today HALs mainly exist to support differing power management versions or multiple processors.

    User-mode applications run with less privilege, protecting the kernel from insta-bilities caused by failing or faulty applications. This separation of the critical pro-cesses allows the operating system to continue operation even when applications or noncritical hardware devices fail. Critical devicessuch as disk drives or moth-erboard componentscan still bring a system down, but the system most likely will not fail (for example, if a USB peripheral device fails).

    In addition, each application can be run in a protected memory space. This pre-vents a failing application from affecting other applications and the operating system itself.

  • CHAPTER 1: INTRODUCING WINDOWS XP PROFESSIONAL 3

    FT01HT01.TIF

    Figure 1-1 The Windows XP architecture

    Intelligent User Interface

    Windows XP represents Microsofts most advanced user interface. Building on the desktop metaphor of earlier Windows operating systems, Windows XP brings together the latest research in intuitive user interface design with new, attractive visual styles.

    The Start menuThe Windows XP Start button (first seen in Windows 95) has been linked to an all-new Start menu that displays a great variety of options within a single space (as shown in Figure 1-2). Users can access frequently used applications, recent documents, favorite applications, system settings, help, and much more within the same menu.

    Security Subsystem

    Logon Process

    Win32 Subsystem

    32-bitApplication

    32-bitApplication

    NTVDM

    16-bitApplication

    16-bitApplication

    Object ManagerExecutive

    Device Drivers Microkernel

    Hardware Abstraction Layer (HAL)

    Hardware

    I/OManager

    File Systems

    Windows Manager

    Graphics Device Drivers

    IPCManager

    MemoryManager

    ProcessManager

    Plug andPlay

    PowerManager

    Security Reference Monitor

    UserMode

    KernelMode

  • 4 INSTALLING, CONFIGURING, AND ADMINISTERING MICROSOFT WINDOWS XP PROFESSIONAL

    FT01HT02.bmp

    Figure 1-2 Windows XP Professional Start menu

    The left column in the figure is divided into the pinned items list above and the fre-quently used programs list below. Initially these lists have a few default programs listed, but as users work with the computer, the frequently used programs list begins to learn which programs are used most frequently and ranks them for quick access. Users also have the option of pinning any program or document to the pinned items list.

    The right column of the Start menu contains a list of special purpose folders, the Help and Support area, and configuration tools. This list can be customized to hide or expose folders such as My Documents, My Music, and My Recent Doc-uments. The system configuration items can also be customized to show or hide configuration tools, depending on the role of the user who is logged on to the system.

    Designated administrators can configure and lock down all Start menu settings by using the Group Policy management tools built into Windows XP and Win-dows Server products.

    The taskbarThe Windows XP taskbar has the ability to group similar applications to reduce clutter. You can then manage these groups together to maximize, minimize, or even close all applications in the group at once. Figure 1-3 shows a user closing a group of Microsoft Office Word 2003 documents.

  • CHAPTER 1: INTRODUCING WINDOWS XP PROFESSIONAL 5

    FT01HT03.bmp

    Figure 1-3 Closing a group of Microsoft Office Word 2003 documents

    The taskbar can also hold toolbars such as Quick Launch or Media Player to pro-vide quick access to these useful tools. You can copy icons to the Quick Launch bar so you can quickly launch applications or documents without having to open the Start menu. The Media Player toolbar activates a small Media Player control panel when Windows Media Player is minimized. Figure 1-4 shows the Quick Launch toolbar and the Media Player toolbar in use.

    FT01HT04.bmp

    Figure 1-4 Quick Launch and Media Player toolbars

    The right side of the taskbar is known as the notification area. This areacalled the system tray in earlier versions of Windowscontains icons that represent operat-ing system alerts, applications, or services that are running in the background on the system. Examples of these include an alert when operating system updates are available from Microsoft or an icon that represents a running antivirus appli-cation. Figure 1-5 shows the notification area with several icons displayed.

    FT01HT05.bmp

    Figure 1-5 The notification area

    The desktopMany people who are familiar with the previous versions of Microsoft desktop operating systems have found the default Windows XP desktop (the area above the taskbar in Figure 1-6) surprisingly bare.

    Quick LaunchToolbar

    Media PlayerToolbar

  • 6 INSTALLING, CONFIGURING, AND ADMINISTERING MICROSOFT WINDOWS XP PROFESSIONAL

    FT01HT06.bmp

    Figure 1-6 Windows XP Bliss desktop with a lone Recycle Bin icon

    Desktops in previous versions of Windows featured icons for My Computer, My Network Places, Internet Explorer, and other applications. Each application that users installed also offered to add its own icons to the desktop. The result was a desktop with dozens of icons. Windows XP, by default, does not place any icon other than the Recycle Bin on the desktop. You can put your icons back on the desktop by customizing the desktop settings.

    The Windows Classic desktopWhen Windows XP was first released, many users were uncomfortable with the new desktop technology (code-named Luna). To accommodate these users, Microsoft created a desktop theme that mimics many of the features of the earlier Windows interfaces. In this way, those who cant get a handle on the new inter-face can actually reinstate the entire Windows Classic theme. You get an interface similar to that of Windows 2000 Professional with all the colors and controls familiar to users of the older operating system (Figure 1-7).

    NOTE We will discuss desktop themes and how to configure them in Chapter 5.

  • CHAPTER 1: INTRODUCING WINDOWS XP PROFESSIONAL 7

    FT01HT07.bmp

    Figure 1-7 Selecting the Windows Classic theme

    Hardware Support

    Windows XP has better hardware installation and configuration support than previous Windows versions. Microsoft has combined the scalability, reliability, and performance of the corporate family of operating systems with the ease of configuration for many tasks of the consumer family of operating systems and formed a comprehensive driver model with the best traits of each.

    Enhanced device driver supportWindows XP fully implements Microsofts Plug and Play technology to allow sim-ple configuration of supported hardware devices.

    Driver signing Windows XP can be configured to require device drivers for new hardware to contain a di