Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Buy Now $49.99
Standard view
Full view
of .
Look up keyword or section
Like this
4Activity

Table Of Contents

Selecting Windows Vista Editions
Vista Home Basic
Vista Home Premium
Vista Business
Vista Enterprise
Vista Ultimate
Other options
Choosing a Deployment Type
Replacing computers
Upgrading computers
Refreshing computers
Deploying new computers
Understanding Windows Vista Installation
Investigating the Windows Imaging format
Leveraging Windows PE
Automating the installation of Windows Vista
Automating Application Installations
Customizing application installation commands
Creating transform files
Repackaging applications
Selecting a Distribution Media
USB drives
Network
Evaluating Hardware Requirements
Ensuring Application Compatibility
Understanding broken applications
Identifying application incompatibilities
Addressing application incompatibilities
Documenting the Deployment Plan
Summary
Building a Deployment Server
Introducing the Windows Automated Installation Kit
Creating Unattended Answer Files
Getting familiar with configuration passes
Navigating the Windows System Image Manager
Customizing the reference computer
Preparing the reference computer for imaging
Walkthrough: Preparing the computer for imaging
Capturing Custom Images
Windows PE
Walkthrough: Creating Windows PE boot media
ImageX
Walkthrough: Capturing a WIM file with ImageX
Deploying Custom Images
Preparing the hard disk
Walkthrough: Preparing a hard disk for an image
Applying the image
Walkthrough: Applying an image with ImageX
Automating the deployment
Licensing Windows
Understanding retail licensing
Understanding OEM licensing
Understanding volume licensing
Understanding virtual machine licensing
Managing Volume License Activation
Centralizing activation with KMS
Leveraging MAK activation
Comparing KMS and MAK activation
Managing licensing and activation
Implementing KMS activation
Implementing MAK independent activation
Implementing MAK proxy activation
Notification Experience and Reduced Functionality Mode (RFM)
Introducing the notifications-based experience
Experiencing Reduced Functionality Mode
Resolving the notification experience and Reduced Functionality Mode
Introducing Windows Installer
Integrating installations with the Windows Installer service
Examining the Windows Installer service
Windows security and software installations
Understanding the Capabilities of Windows Installer
Understanding the Windows Installer architecture
Managing the Windows Installer service
Changes to Windows Installer 4.0
Changes to Windows Installer 4.5
The MSI Package Lifecycle
Best Practices for Using Windows Installer
Understanding User Data
Identifying the migration scenario
Determining the data and settings to be managed
Determining where to store data during the migration process
Choosing migration tools
Windows Easy Transfer
Running Easy Transfer from DVD
Downloading Easy Transfer from Microsoft
Understanding the capabilities of Easy Transfer
Using Windows Easy Transfer
Working with the User State Migration Tool (USMT)
Requirements
Understanding USMT limitations
Customizing migration with USMT
Collecting files and settings with ScanState
Restoring files and settings with LoadState
Reviewing best practices
Investigating Third-Party Alternatives
n CA Desktop Migration Manager
n Tranxition Migration Studio
n PC Mover
CA Desktop Migration Manager
Tranxition Migration Studio
PC Mover
Introducing Windows Image File (WIM)
Exploring the benefits of WIM
Exploring the limitations of WIM
Introducing Windows PE
Understanding the benefits of Windows PE
Understanding the limitations of Windows PE
Meeting minimum requirements
Using the provided Windows PE image
Customizing Windows PE Boot Images
Working with ImageX
Working with an ImageX GUI
Working with PEImg
Working with OSCDImg
Working with vLite
Executing Common Tasks
Adding packages to a Windows PE image
VistaPE
Symantec Ghost
KBOX Systems Deployment Appliance
Introducing the Microsoft Deployment Toolkit
Going over documentation
Getting familiar with the tools of MDT
Installing and Configuring MDT
Installing components
Establishing a distribution share
Imaging with MDT
Creating task sequences
Investigating Task Sequencer options
Creating a deployment point
Preparing a reference computer
Client Management Suite
ZENworks Suite
KBOX Systems Management Appliances
LANDesk Management Suite
Introducing Windows Deployment Services
Replacing Remote Installation Services
Reviewing components of Windows Deployment Services
Installing Windows Deployment Services
Satisfying prerequisites
Setting up Windows Deployment Services for Server 2003
Setting up Windows Deployment Services for Server 2008
Configuring Windows Deployment Services
Working with Windows Deployment Services
n Creating a Capture image
Creating a Capture image
Creating a Custom Install image
Creating a Discover image
Preparing media for a Discover image
Deploying an Install image
Automating the installation of an Install image
Leveraging the Windows Deployment Services API
Managing Change through Group Policy
Working with Local Policies
Working with central policies
Working with GPO tools
Working with ADMX/ADML files
Assigning PC-Related GPOs
Troubleshooting and monitoring Group Policy
Tracking Change in Vista
Turning on the audit policy
Exploring the Vista Event Log
Exploring the Vista Task Scheduler
Automating Vista Events
Collecting Vista Events
Performing Local PC Administration
Working with workstation administration tools
Performing common workstation administration tasks
Performing Remote PC Administration
Working with the Remote Shell
Relying on Telnet
Automating Recurrent Tasks
Working with the Command Prompt
Working with Windows PowerShell
Scheduling automated tasks
Supporting Users
Helping users with Remote Assistance
Relying on the Remote Desktop
Beginning with Basic Security
Designing a security policy
Using the Castle Defense System
Building a security plan
Using the Windows Vista Security Guide
Learning Windows Vista security features
Applying the Castle Defense System
Layer 1: Protecting information
Layer 2: Working with protection
Layer 3: Hardening the system
Layer 4: Managing information access
Layer 5: Working with external access
Completing a data protection strategy
Putting data protection in place
Using the Encrypting File System
Understanding EFS
Interacting with EFS and PKI
Working with EFS
Running BitLocker Full Drive Encryption
Understanding BitLocker requirements
Integrating BitLocker with Active Directory
Relying on Group Policy to manage BitLocker
Supporting BitLocker
Recovering Systems
Level 1: Dealing with system instability
Level 2: Dealing with startup instability
Level 3: Dealing with total system instability
Recovering Data
Level 1: Dealing with minor data loss
Level 2: Automating data protection
Level 3: Protecting a complete PC
P. 1
Deploying and Administering Windows Vista Bible

Deploying and Administering Windows Vista Bible

Ratings: (0)|Views: 881 |Likes:
Published by Wiley
Although analysts expect the majority of enterprises to tread slowly into migration, there certainly will be early adopters, as there are with any system or device. Because Microsoft has announced that it will support Windows 2000 only until the year 2010, enterprises using older versions of Windows will not have much time for leisurely testing and pilot projects before they need to seriously consider migrating to and deploying Windows Vista. Deploying Windows Vista will require an entirely new set of skills for IT departments called on to migrate from older versions of Windows. Any IT professional looking to the future of their enterprise network deployment will benefit from the advice, tips, and reliable information contained in this resource. The book covers all the important security issues that are top of mind in today's IT world, as well as troubleshooting practices to help get issues resolved in less time. A valuable CD ROM contains tools and utilities to help IT professionals as they deploy Windows Vista for the first time.
Although analysts expect the majority of enterprises to tread slowly into migration, there certainly will be early adopters, as there are with any system or device. Because Microsoft has announced that it will support Windows 2000 only until the year 2010, enterprises using older versions of Windows will not have much time for leisurely testing and pilot projects before they need to seriously consider migrating to and deploying Windows Vista. Deploying Windows Vista will require an entirely new set of skills for IT departments called on to migrate from older versions of Windows. Any IT professional looking to the future of their enterprise network deployment will benefit from the advice, tips, and reliable information contained in this resource. The book covers all the important security issues that are top of mind in today's IT world, as well as troubleshooting practices to help get issues resolved in less time. A valuable CD ROM contains tools and utilities to help IT professionals as they deploy Windows Vista for the first time.

More info:

Publish date: Jan 1, 2008
Added to Scribd: Jan 27, 2010
Copyright:Traditional Copyright: All rights reservedISBN:9780470439999
List Price: $49.99 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
This book can be read on up to 6 mobile devices.
See more
See less

11/27/2014

575

9780470439999

$49.99

USD

You're Reading a Free Preview
Pages 12 to 85 are not shown in this preview.
You're Reading a Free Preview
Pages 97 to 236 are not shown in this preview.
You're Reading a Free Preview
Pages 248 to 279 are not shown in this preview.
You're Reading a Free Preview
Pages 291 to 469 are not shown in this preview.
You're Reading a Free Preview
Pages 481 to 575 are not shown in this preview.

Activity (4)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
a1a1a1s2s2 liked this
fbdjbfskjfb liked this

You're Reading a Free Preview

Download
scribd