|
|
|
|
Configure and Troubleshoot Wireless Networking (part 2) - Wireless Security |
Microsoft Windows Vista offers the full complement of wireless security. Wireless security presents the most troublesome aspect of wireless network configuration because the WCN wizards, along with a host of other wizards in the Network and Sharing Center, allow easy creation of a wireless connection. |
|
|
|
|
Configure and Troubleshoot Network Services at the Client Level |
The Network and Sharing Center is a new and improved user interface for managing network connections. Integrated into the Network and Sharing Center is the new Network Explorer, which has replaced My Network Places from previous Windows operating systems. |
|
|
Configure and Troubleshoot Network Protocols (part 2) - WINS & NAT |
NetBIOS has been the backbone service that has, in the past, tied Microsoft’s networking services and resources together. Starting with the Windows 2000 operating system, Microsoft has slowly extricated itself from its reliance on NetBIOS as the primary name service on its networks |
|
|
Reliability and Performance Monitor |
Whereas Event Viewer allows you to monitor system and application events, Reliability and Performance Monitor (RPM) allows you to monitor and log the reliability and performance of your computer |
|
Event Viewer and Event Forwarding |
Event Viewer is a tool used to monitor the health of the computer. Event Viewer has had a significant overhaul in Windows Vista and is now closely integrated with Task Scheduler and the Reliability and Performance Monitor |
|
Scheduling Tasks |
Often, the best time to perform maintenance for performance and disaster recovery is late, late at night, when all the users are at home and asleep, and the servers and the network are at their quietest. |
|
Troubleshooting Policy Settings |
With all the complexity of GPO processing through the series of L-S-D-OU-OU-OU, and with Block Inheritance and Enforced settings, you might easily recognize that, on occasion, what you get from your collection of GPOs isn’t exactly what you expected |
|
|
|
|
Group Policy Settings (part 2) - Software Restrictions |
These GPOs are used to deny all executables except those specifically allowed using the Restricted Default Rule, or used to allow all executables and then disallow specific executables using the Unrestricted Default Rule. |
|
|
|
|
User Account Control (UAC) |
User Account Control is enabled by default in Windows Vista and recognizes when more privilege is required to complete a task. When UAC detects that elevated privilege is needed, UAC first locks the desktop so no malicious activity can occur. |
|
Troubleshoot Authentication Issues - SmartCards |
Authentication is the process of having an authentication system validate a user’s identity. First, a user provides some sort of proof of identity and then requests an authentication system to validate that identity information is accurate. |
|
|
|
|
|
|
|
Windows Update (part 2) - Automatic Updates |
Windows Update can also be configured for automatic updates, where the computer downloads the list of all available updates, from the Windows Update website, on a predefined schedule. |
|
Windows Update (part 1) - Manual Updates |
Updates can be implemented manually or automatically in the consumer environment, or through an infrastructure-based system called Windows Server Update Services that is typically implemented in a larger, corporate environment where Active Directory is present. |
|
Windows Defender and Other Defenses Against Malware |
Microsoft’s Windows Defender is a free tool that gets installed automatically with Windows Vista. It finds and tries to remove malicious software and other unwanted programs, often called malware or spyware. |
|
Windows Firewall |
A firewall is a service on a computer or a device that isolates your computer from unsolicited network traffic and can be used to control the type and destination of outbound traffic sent from your computer. |
|
|
|
|
|
|
|
Troubleshooting Deployment Issues |
During any deployment of a new operating system, you are bound to run up against unforeseen obstacles. The key to overcoming these obstacles is to be armed to the teeth with lots and lots of knowledge. |
|
|
|
|
Deploy Windows Vista from a Custom Image |
Several configuration passes occur during the different phases of Windows Vista Setup. When performing unattended installations, you must heed the issues of each of these phases as well as what settings can or should be made during a specific configuration pass. |
|
|
Configuring Mobile Computers - Configuring Tablet PCs |
All Tablet PCs have several hardware buttons for common tasks, which can be programmed as needed. In addition, you can program the digital pen by assigning key commands or actions to simple pen gestures called flicks. |
|
Configuring Mobile Computers - Giving Presentations |
When presentation settings are turned on, your mobile PC stays awake, and system notifications are turned off. You can also choose to turn off the screen saver, adjust the speaker volume, and change your desktop background image |
|
Configuring Mobile Computers : File and Data Synchronization |
While using mobile computers, sometimes you are connected to a corporate network and other times you are not. Sometimes you might want to work on the files stored on a network server even when you are not connected to the network that holds the network server. |
|