You are on page 1of 69

*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

1. INSTALLING AND UPGRADING WINDOWS VISTA


1.1 IDENTIFY HARDWARE REQUIREMENTS
1.1.1 Minimum Requirements
Processor 800 MHz
RAM 512 MB min / 1 GB Recommended
HDD 20 GB min with 15 GB free / 40 GB rec
Graphics DirectX 9 minimum…
…WDDM Driver
…Hardware Pixel Shader 2.0
…32 bits per pixel
…Min. 128 MB graphics memory
Vista Starter Home Basic Home Prem. Business Enterprise Ultimate
CD ROM DVD ROM
800 MHz CPU 1 GHz 1 GHz & 32/64 bit
32/64 bit
VISTA FEATURES BY EDITION

512 MB RAM 512 MB RAM 1 GB RAM


20 GB HDD 20 GB HDD 40 GB HDD
SVGA DirectX 9 + DirectX 9 + 32 MB Graphics Memory+ WDDM Driver
32MB grphx mem. + Pixel Shader 2.0 + 128 MB Video memory
1 CPU Max 1 CPU Max 1 CPU Max 2 CPUs
8 GB RAM Max 16 GB Max 128 GB Max
NA Parental Controls Parental NA NA Parental Controls
Controls
NA NA NA IIS & Shadow Copy
NA NA NA Domain Support
NA NA Aero
NA NA Tablet PC
NA NA NA NA SUA (subsystem for Unix Apps)
NA NA NA NA HD Encryption
NA NA Media Center NA NA Media Center
1.1.2 WPA: Windows Product Activation
- Sends following info to Microsoft:
1. Hardware ID: based upon current hardware configuration
2. Product ID: from installation media
3. Installation ID: automatically made by Vista from Hardware ID & Product ID
1.1.3 WPA 30-day grace period
- DO NOT activate until system is confirmed settled & stable; can ONLY re-activate Vista
once before have to contact Microsoft to unlock it!
1.1.4 Definitions:
- Windows Vista Capable: meets or exceeds Vista minimum requirements (but may not
run Aero or run Aero at all)
- Windows Vista Premium Ready: exceeds Microsoft’s recommended specifications

1.2 PERFORM A CLEAN INSTALLATION


1.2.1 Installs COMPLETE operating system; boots off DVD-ROM
 Select Language & time/currency format & keyboard layout
 Click INSTALL NOW - DO NOT enter Product Key;
 CLEAR the “Automatically activate Windows when I’m online” checkbox
 When asked if you’re sure, click YES / OK
 Select your Vista Edition

PAGE 1 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

***NOTE: if you select an edition higher than your purchased license edition, you’ll have to
reinstall after the 30 day activation grace period
 Click on CUSTOM INSTALL
 “Where do you want to install Windows?”  click on drive to select
 Click on DRIVE OPTIONS (ADVANCED)
 IF desired, can create New Partition, Format, Extend, Load Driver…if you choose no
advanced options, Vista automatically creates & formats a partition
 Formatting / Partition-creation / etc. is performed
 Files are copied to the volume
 Features are installed
 Reboot
 Choose User Name & Password & Picture (account will be a local administrator)
 Computer Name
 Install Updates?
o Use recommended settings – impt. & recommended updates installed
o Install important updates only – self-explanatory
o Ask Me Later – get a warning you may be vulnerable…
 Time & Date settings / auto-adjust for DST
 Select your Computer’s Current Location
o Home – peer to peer communication assumed
o Work – assumes active directory/domain
o Public – limited network discovery
 Installation Completes
 Shows Rating (Windows Experience Index)
 VOILA – done!
1.2.2 Dual Booting
- Install XP first, THEN Vista (otherwise you won’t like the results)
- Select the default OS & time for dual boot menu:
Control Panel | System | Advanced Tab| Start Up & Recovery

1.3 UPGRADE TO WINDOWS VISTA FROM PREVIOUS VERSIONS OF


WINDOWS
1.3.1 Upgrade Procedure:
NOTE: this procedure assumes XP Pro to Vista Ultimate Upgrade
 Start XP Pro & insert Vista installation DVD – if doesn’t auto start, open up the DVD in My
Computer & click on setup.exe
 Click INSTALL NOW
 On the Get Important Updates For Installation page, select either:
o Go Online To Get The Latest Updates – OR –
o Do Not Get The Latest Updates For Installation
 DO NOT enter Product Key
 CLEAR the “Automatically activate Windows when I’m online” checkbox
 When asked if you’re sure, click YES / OK
 Select your Vista Edition
***NOTE: if you select an edition higher than your purchased license edition, you’ll have to
reinstall after the 30 day activation grace period
 Accept the License Terms
 Click on UPGRADE (can also choose CUSTOM INSTALL)
 Review the Compatibility Report & click NEXT
 Upgrade process begins…may reboot several times…
 At the Help Protect Widows Automatically page, click

PAGE 2 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

o Use recommended settings – impt. & recommended updates installed


o Install important updates only – self-explanatory
o Ask Me Later – get a warning you may be vulnerable…
 Time & Date settings / auto-adjust for DST – should be OK, imported from XP
 Select your Computer’s Current Location
o Home – peer to peer communication assumed
o Work – assumes active directory/domain
o Public – limited network discovery
 Inherits previous computer’s name & local user account settings
 Click START on the Thank You page
 Installation Completes
 Shows Rating (Windows Experience Index)
 VOILA – done!
1.3.2 Windows Easy Transfer
- Writes data ONLY to the Vista machine
- With 2000 SP4, can only transfer files – cannot use it to transfer other settings
- With XP SP2 & Vista, can transfer accounts, files, settings (bookmarks, mail, music, etc.)
- Does NOT migrate passwords
- Options for migrating account data to new computer:
o Migrate a user account on original PC to new user account on Vista destination
computer
o Migrate a user account on original PC to an existing local account on the Vista
destination computer (adds files to existing user instead of replaces)
- Using the Vista machine, can create CD to install Windows Easy Transfer on a computer
running Windows 2000 SP4 or Windows XP SP2
- General Procedure to transfer from XP to Vista:
 Run Windows Easy Transfer Tool on the destination OS (Vista)
 Click NEXT
 Click on START A NEW TRANSFER (vs. CONTINUE ONE IN PROGRESS)
 When asked Which Computer Are You Using Now, click MY NEW COMPUTER
 On the Do You Have An Easy Transfer Cable page, click NO SHOW ME MORE
OPTIONS
 When asked Is Windows Easy Transfer Installed On Your Old Computer, click NO I
NEED TO INSTALL IT NOW
 At the Choose How To Install Windows Easy Transfer On Your Old Computer page,
click Windows Installation Disc or Windows Easy Transfer CD
 On the Are Your Computers Connected To A Network page, click YES I’LL TRANSFER
FILES AND SETTINGS OVER THE NETWORK & unblock Windows Easy Transfer from
the firewall (or alternately, click NO and pick another method of transfer)
 On the Do You Have A Windows Easy Transfer Key page, click NO I NEED A KEY
 A Windows Easy Transfer Key is generated – make note of it
 Insert the Vista Install DVD into the XP machine
 At the Windows Vista screen, click TRANSFER FILES AND SETTINGS FROM ANOTHER
COMPUTER
 Click NEXT
 On the Choose How To Transfer Files And Settings To Your New Computer page,
click TRANSFER DIRECTLY USING A NETWORK CONNECTION (or other applicable
selection)
 On the Choose How To Transfer Files And Settings Over A Network page, click USE A
NETWORK CONNECTION
 Click YES at the firewall prompt

PAGE 3 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 On the Do You Have A Windows Easy Transfer Key page, click YES I HAVE A KEY
 Enter Windows Easy Transfer Key generated from Vista machine & Click NEXT
 Connection is attempted & prompts with What Do You Want To Transfer To Your
New Computer page – click ADVANCED OPTIONS
 Select User Accounts, Files, And Settings To Transfer page – use checkboxes to
select & click NEXT
 On the account mappings page, create new accounts for each user that is getting
migrated to Windows Vista & Click NEXT
 Transfer between computers finishes – DO NOT use either computer during this
process – shows message on the original computer that you’re ready to transfer files
& settings to the new computer
 Return to Vista/destination computer – WAIT until a summary is displayed on the
destination computer, indicating the transfer is complete & click on CLOSE
 Log off or Restart for changes to take effect
 On the XP machine, click CLOSE
WINDOWS EASY TRANSFER DATA MOVING METHODS:
Windows Easy Transfer Cable - USB
- If USB 2.0 on both, up to 1GB/min transfer rate
LAN
Optical Media - CDs, DVDs
Removable Storage - USB HD, etc.
Win NT 4 2000 Pro XP Home XP Pro XP Pro XP Media Windows XP
95/98/ ME Workstation 64-bit Center Tablet PC
Upgrade- NO NO NO YES to any YES to only YES to only YES only to YES to
able to 32-bit Vista 32-bit 64-bit 32-bit 32-bit Business,
Vista? Business, Business, Ultimate & Enterprise, &
Ultimate & Ultimate & Home Ultimate
Enterprise Enterprise Premium
Windows NO NO YES if SP4 YES YES YES YES YES
Easy installed, no
Transfer? settings transfer
User State NO YES but not YES, & transfers YES YES YES YES YES
Migration supported user settings
Available?

1.3.3 User State Migration Tool


- Can use Version 3 to automate migration of many user accounts on XP & Vista OSs
- Uses Migration Rules in XML format – specify which user accounts, settings & files are
migrated & how to migrate them
- Can migrate user data from Vista to XP
- Can migrate digital certificates if the destination computer is Vista
- Can migrate encrypted files & folders
- Does NOT work with a Windows Easy Transfer Cable
- Does NOT automatically detect its partner computer over the network
- Uses two command line utilities:
o Scanstate.exe: captures migration data on original computer
o Loadstate.exe: imports migration data on destination computer
1.3.4 Windows Vista Upgrade Advisor
- Only runs on 32-bit Vista & 32-bit XP
- Issues report at end of system check to advise of needed upgrades (if any)
1.3.5 Definitions & Notes:
- IF previously upgraded from XP to Vista & need to reload, just do a clean install of Vista
– BUT you will need the XP product key AND the Vista product key to reinstall
- Can roll back a failed upgrade to Vista IF you haven’t logged on successfully yet

PAGE 4 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- Upgrading – original OS is converted to Vista; data & user settings are retained
- Migrating – user settings & data are moved to a new Vista installation
- Side-by-Side Migration – migrate files from one computer to another
- Wipe-and-Load Migration – migrate data off; perform clean install; migrate data back
- Must have AT LEAST 11 GB free to upgrade from XP to Vista
VALID UPGRADE PATHS
XP Home Any Vista “flavor”
XP Pro Business / Ultimate
XP Tablet Business / Ultimate
Media Center Home Premium / Ultimate
VALID VISTA-TO-VISTA UPGRADE PATHS
Vista Home Basic Home Premium / Ultimate
Vista Home Ultimate
Premium
Vista Business Enterprise / Ultimate
Vista Enterprise Ultimate

1.4 UPGRADE FROM ONE EDITION OF WINDOWS VISTA TO ANOTHER


EDITION
1.4.1 Supported Upgrade Paths
**ONLY 32-bit to 32-bit & 64-bit to 64-bit** (SEE CHART ABOVE FOR DETAILS)
1.4.2 Upgrade Methods
- Windows Anytime Upgrade: purchase disc OR Start | All Programs | Extras & Upgrades |
Windows Anytime Upgrade |
o ONLY works if current copy of Vista is activated
- In Place Upgrade: requires full version of new edition; more expensive
o Requires min. 11 GB free space on HD to store temporary files & data
1.4.3 General In Place Upgrade Procedures:
**NOTE: Procedures assume upgrading from Vista Business to Vista Ultimate**
 Start up Vista machine & log on
 Insert installation DVD
 If AutoPlay runs, click RUN SETUP.EXE…if not, Start | Computer | double click on DVD…
 Click INSTALL NOW
 Select whether to updates for installation
 Clear the checkbox to automatically activate Windows when online
 Click NO to not enter the product key
 Select the edition & click NEXT
 Accept the License Terms & click NEXT
 Click on UPGRADE for the type of installation…and then wait…
 Make selections at the Help Protect Windows Automatically screen
 Time & Date settings & click NEXT
 Click START – Vista re-benchmarks the computer & gives it a new performance score
 Log On – VOILA, done!
1.5 TROUBLESHOOT WINDOWS VISTA INSTALLATION ISSUES
1.5.1 Application Compatibility
- If Vista detects problem running older program, uses the Program Compatibility
Assistant – automatically attempts to resolve conflicts with User Account Control or runs
the program in mode to simulate previous version of Windows
- But if Program Compatibility Assistant doesn’t get it right, need to set manually…
1.5.2 Configuring Application Compatibility Mode

PAGE 5 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- Allows an installed application to run in emulation of previous Windows version


- Can also change display options to boost performance
- Run the program as an Administrator
- To configure compatibility for a specific program:
 Start | Right-click Program (or navigate to directory in Computer)
 Click PROPERTIES
 Click on COMPATIBILITY tab
 Click on checkbox for Run This Program In Compatibility Mode For: & select a
previous OS from the drop-down menu
 Click OK to save settings
**NOTE** can also run via Windows Help | “Program Compatibility Wizard” | Wizard
runs & asks user location of program | enter OS to emulate | enter other display
settings…
Available Display Alternations: Vista Compatibility Modes:
Force the app to run in 256 color mode Windows 95
Force the app to run in 640 x 480 Windows 98 / Windows Me
Disable Vista visual themes for the app (useful if Windows NT 4.0 (SP5)
buttons or title bar not displayed correctly) Windows 2000
Disable Desktop Composition Windows XP SP2
Disable Display Scaling On High DPI Settings Windows Server 2003 SP1
1.5.3 General Troubleshooting
- Check HD space / capacity & other min. requirements (11GB for any upgrade!)
- For Upgrades, be sure to disable all antivirus & antispyware & such
- Check BIOS for boot configuration
- If HD doesn’t appear during install/upgrade, need to load a hardware device driver
1.5.4 System Recovery Options
- Usually can access System Recovery Options when boot off Vista install media; tho
sometimes installed on separate recovery partition
- When prompted, do not click on “Install Now”! Click on REPAIR YOUR COMPUTER
- Select the Vista installation to repair; load any drivers needed for HDs
- Make selection off System Recovery Options screen:
Startup Repair Automatically fixes problems that are preventing Windows from starting
System Restore Restore Windows to an earlier point in time
Windows Complete Restore your entire computer from a backup
PC Restore
Windows Memory Check your computer for memory hardware errors
Diagnostic Tool
Command Prompt Open a command prompt window
1.5.5 Startup Repair
- Fixes most startup problems, first line of defense when Vista not booting right
- Can restore missing system files or repair basic disk errors
- Automatic process, requires no user interaction once started
- NOT usually helpful to repair problems caused by viruses or worms…
1.5.6 System Restore
- Also accessible via: All Programs | Accessories | System Tools | System Restore
- System Restore Points automatically made before installation of drivers or applications
- To manually create Restore Point from within Vista:
 All Programs | Accessories | System Tools | System Restore | OPEN SYSTEM
PROTECTION
 (Or click on System Protection tab in System Properties dialog box)

PAGE 6 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Select the disk | click on CREATE


 OK, OK…close out of System Properties & System Restore Wizard
- To manually roll back to a previous System Restore Point:
 Insert Vista installation media
 Restart – press any key to boot from CD/DVD
 On Vista Language Preferences page, click NEXT
 Click REPAIR YOUR COMPUTER on the Install Windows page
 Select the proper Vista installation & click NEXT
 Click SYSTEM RESTORE in System Recovery Options box
 In the Restore System Files And Settings dialog box, click NEXT
 Select the restore point from the list & click NEXT
 Confirm Disks To Restore – NEXT
 Click FINISH & click YES in the warning box
 Restore proceeds – when complete, click RESTART to restart the computer
 Log On – System Restore dialog box states System Restore completed
successfully – click CLOSE
1.5.7 Windows Complete PC Restore
- Restores computer from complete backup
1.5.8 Windows Memory Diagnostic Tool
- Reboots computer & performs series of memory tests
- Generally good idea to run when seeing random crashing errors
1.5.9 Command Prompt
- Can use to replace corrupt or missing system files

1.6 INSTALL AND CONFIGURE WINDOWS VISTA DRIVERS


1.6.1 Device Manager: Control Panel | Classic View | Device Manager
-OR- Control Panel | Classic View | Device Manager
1.6.2 Driver Signing:
- Signed by Windows Signing Authority – WHQL tested
- Signed by Trusted Publisher – as chosen by the User
- Signed by Untrusted Publisher – as chosen by the User
- Altered – if changed since signed by Publisher
- Unsigned – no digital signature at all
1.6.3 Software/Driver installs & administrative privileges:
- IF User has no administrative privileges, Vista automatically installs software from
Trusted Publishers, & silently refuses all others
- Trusted Publishers are set by a User with admin rights via Certificate console
1.6.4 New / Updated Drivers
- New device drivers show as Optional Updates…go to:
Start | All Programs | Windows Updates | Check for Updates
1.6.5 Common Driver Issues
- Device not working
- Works erratically
- STOP error
- Warnings / error dialog boxes
- Unstable when new driver installed
o Roll Back Driver: Device Manager | Right-click device | Properties | Driver Tab |
ROLL BACK DRIVER | YES | CLOSE
o If that doesn’t work, try last known good

PAGE 7 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

2. CONFIGURING AND TROUBLESHOOTING POST-INSTALLATION


SYSTEM SETTINGS
2.1 TROUBLESHOOT POST-INSTALLATION CONFIGURATION ISSUES
2.1.1 Device Manager: Control Panel | Classic Menu | Device Manager |
- Can also access via Computer Management Console:
Right-Click Computer > Manage > opens CMC > click Device Manager in left pane
- To Install Non-Plug & Play device that’s not auto-detected:
 Device Manager
 Right-click computer name at top of device tree
 Click ADD LEGACY HARDWARE – starts Add Hardware Wizard
2.1.2 Device Properties & Settings
- ONLY users with admin privileges are able to modify device drivers / hardware
properties / uninstall devices
- Device Properties Tabs:
General Basic info about device
Device status shown (will reflect if any problems)
Driver View details; update/roll back/uninstall driver; disable device
Details Device properties – drop-down menu to select details to view
Resources I/O range & IRQ
Set basic configuration via drop-down list or manually enter;
can also use automatic settings to be on the safer side…
ETC. Tabs vary by device – some have power settings, etc.
- Hardware Resources
I/O Range Range of addresses thru which data is exchanged between device &
computer
IRQ Used to notify the CPU that it needs attention
APIC (Advanced Programmable Interrupt Controller) manages IRQ settings
Memory Range Specific area of computer’s memory allocated for that device to use
- Disabling Devices: Device Manager > Right-click device > Disable
o Disabled device shown with down-arrow icon next to the device
2.1.3 Reliability Monitor
 Start | Administrative Tools | Reliability & Performance Monitor | Reliability Monitor
 Control Panel | Classic View | Admin. Tools | Reliability & Performance Monitor | …
 Start | Computer | Right click | Manage | MMC Console Tree-navigate to Device Manager
- Reports on:
Software installation Information event or warning sign when software has been (un)installed
& removal Applies to updates & rollbacks too
Application Failures Red X icon shown when applications freeze or crash
Hardware Failures Records when hardware device becomes unavailable or has failed
Windows Failures Boot failures; OS crashes; STOP errors
Miscellaneous Failures Any failures not fitting into above categories
- Shows Stability Graph & Index (score on a scale of 10)
2.1.4 Problem Reports & Solutions
Start | All Programs | Maintenance | Problem Reports & Solutions | View Problem History
- Summary of all current & past issues & how they have been resolved
2.1.5 Display Settings
- Resolution
o Higher Resolution = smaller pixel
o Windows Recommended Resolutions (based on monitor size):

PAGE 8 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

Monitor Size (Diagonal) Recommended Resolution


15” 1024 x 768 pixels
17” – 19” 1280 x 1024 pixels
20” and larger 1600 x 1200 pixels
o Users without admin privileges can change monitor resolutions
o Changed globally for all users, not user-specific – same goes for monitor refresh
rates & number of colors displayed…
- Colors
o 16-bit = 65,536 colors
o 32-bit = 16,777,216 colors
o Some legacy apps need compatibility settings set to run in 256-color mode
- Multiple Monitor Settings
 Desktop | Right Click | Personalize | Display Settings
o Vista supports as many monitors as you have graphics adapters – BUT all
graphics adapters need to use same chipset & same WDDM driver…if have two
different types, will get following error message:
“Incompatible display driver has been disabled. At least one display adapter
on the system has been disabled because its driver is not compatible with the
driver for the VGA adapter
o Display Settings Items unique to 2+ display system:
Identify Monitors button Helps determine which is which (1 / 2)
This Is My Main Monitor checkbox When that monitor is selected, it is
used as primary display device
Extend The Desktop Onto This Can drag windows from one screen to
Monitor checkbox another
- Advanced Settings
Adapter Shows graphics adapter properties (as if viewing in Device Manager);
Properties Clicking LIST ALL MODES shows all output resolutions & monitor
frequencies available
Color Maintains color relationships between devices connected;
Management Configuring this may reduce # of colors displayed!!
Monitor Monitor Tab | Advanced | set refresh rate
Refresh Rate=how fast monitor updates image on screen
Higher Refresh Rate=Lower screen flicker=Lower screen resolution…
**SO generally want to set best preferred resolution & pick highest
available refresh rate
Troubleshoot **CHANGE SETTINGS button on Troubleshoot tab needs admin privileges
> opens Display Adapter Troubleshooter > adjust hardware acceleration
2.1.6 Visual Appearance Settings
Right Click Desktop | Personalize | > Windows Color & Appearance
> Desktop Background
> Screen Saver
> Mouse Pointers
> Theme
> Display Settings
***Personalizations apply ONLY to a single user’s profile, not globally on the machine
- Windows Color & Appearance
o Change color settings, color intensity, transparency OR
o Open classic appearance properties for more color options
- Desktop Background – set images to be desktop image…same old settings, nothing new

PAGE 9 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- Screen Saver
o No real need for them to protect screen, but can help with security…
o Can set to lock when goes into screen saver; need to enter password to unlock –
on resume, displays log on screen

2.2 CONFIGURE AND TROUBLESHOOT WINDOWS AERO


AERO HARDWARE REQUIREMENTS
DirectX 9 Capable Generally not a problem unless upgrading & using old adapter
Run DXDIAG.exe to check if running DirectX 9
WDDM Driver Windows Display Driver Modem – specifically written for Vista
Hardware Pixel Shader 2.0 Set of mathematical routines in graphics adapter’s
programming to create visual effects on a pixel-by-pixel basis
*MOST adapters released after 2006 include HPS 2.0
32 bits per pixel 32-bit color must be supported
If set 16-bit color, Vista auto-changes to Vista Basic interface
Min. 64 MB graphics memory Can only display low resolutions with 64 MB, so do want more
Can be shared memory, as is case on most laptops
2.2.1 Aero Features
- 3D Window Cascade – WINDOWS KEY + TAB KEY
- Transparency available in Aero; in Basic theme, title bar is always opaque
2.2.2 Setting Aero as Desktop Theme
o Right Click Desktop | Personalize
o Window Color And Appearance
o Open Classic Appearance Properties For More Color Options
o Select WINDOWS AERO in the Color Scheme box

2.3 WINDOWS GENUINE ADVANTAGE


2.3.1 WPA (Windows Product Activation) Required
- Start | Control Panel | System | Windows Activation | click CHANGE PRODUCT KEY
(forces immediate activation when clicked)
- Before WGA, Must have gone through WPA Process:
o Unique Hardware ID generated based on hardware configuration
o Product ID for Vista install media & Unique Hardware ID are sent to Microsoft
o Microsoft checks servers to verify Product ID not already used
 IF HAS been used before & is linked with different Hardware ID, WPA fails
 IF never been used, Hardware ID & Product ID are logged & WPA succeeds
 IF been used but Hardware IDs match, WPA succeeds BUT this only
happens once…any more than that & you need to contact the WPA hotline
o You CAN change computer components once without forcing a reactivation…if
you change multiple components at once, need to reactivate
- DO take the 30-day WPA grace period if you can & let the system configuration settle
- To Perform WPA:
 Start | Control Panel | System & Maintenance
 Click SEE THE NAME OF THIS COMPUTER
 Click ACTIVATE WINDOWS NOW
 Select method of activation (ACTIVATE WINDOWS ONLINE NOW -&- ASK ME
LATER -&- SHOW ME OTHER WAYS TO ACTIVATE)
 If Use The Automated Pone System, find the available phone numbers & follow
screen & phone prompts & enter the confirmation ID
2.3.2 WGA Process
- Initiated when download app or feature for Vista that requires a WGA check

PAGE 10 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- Add-on for IE is installed during WGA Process, which collects following info:
o Computer make & model
o OS version & any existing WGA software
o Region & language settings
o Unique WGA identifier created by add-on component
o Encrypted version of Product Key & Product ID
o BIOS info (name, revision number, revision date)
o Encrypted primary HD volume serial number
o DOES NOT collect personal info!!
- Once go through WGA Process, can download any Microsoft update from all categories:
o Critical – should be installed immediately; vulnerabilities that could be exploited
o Important – should be installed ASAP; no apparent exploits yet that take
advantage of the vulnerability associated with the update
o Moderate – fix usability problems, generally not security exploit related
- WGA is an ONGOING PROCESS – each time visit Update site, have to go through WGA!

2.4 SYSTEMS PERFORMANCE RATINGS TOOL


2.4.1 Windows Experience Index
- Control Panel | Classic View | System | Windows Experience Index | Update My Score |
Control Panel | Home | System & Maintenance | System | …
- Rating shown is based on lowest rated component, not an average!
Component Measurement
Processor Calculations per second
Physical memory (RAM) Memory operations per second
Graphics Windows Aero desktop performance
Gaming Graphics 3D graphics performance
Primary Hard Disk Disk data transfer rate

2.5 CONFIGURE AND TROUBLESHOOT PARENTAL CONTROLS


2.5.1 Parental Controls
- Limit web content, games, hours, & programs accessible on a per-user basis
- Cannot apply Parental Controls to an Administrator account
- Requires administrator password to bypass Parental Control’s blocks
- Parental Controls rundown:
 Control Panel | User Accounts and Family Safety |
 Set Up Parental Controls For Any User | click Continue in the UAC box
 In the Choose A User And set Up Parental Controls dialog box, click on the User
account to be configured
 Select ON, ENFORCE CURRENT SETTINGS to turn on Parental Controls
 Under Activity Reporting, select ON, COLLECT INFORMATIN ABOUT COMPUTER USAGE
 Click WINDOWS VISTA WEB FILTER
 Select BLOCK SOME WEBSITES OR CONTENT
 Choose Web Restriction Level (High, Medium, None, Custom)
 Block file downloads checkbox
 Check the box for ONLY ALLOW WEBSITES WHICH ARE ON THE ALLOW LIST to
further block content
 Can EDIT THE ALLOW AND BLOCK LIST to enter specific sites
 OK to exit Web Restrictions
 In User Controls dialog box, click on TIME LIMITS
 Click & drag to specify hours to block (shaded dark) – by default, all time is allowed
 OK to exit Time Restrictions

PAGE 11 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Click GAMES in the User Control dialog box | Click SET GAME RATINGS
 Block/Allow games with no rating
 Select ratings which are OK for user to play
• Early Childhood
• Everyone
• Everyone 10+
• Teen…
 Scroll down to see the Block These Types of Content list
• Can block all & then just allow “Some Adult Assistance May Be Needed”
 OK to exit Game Restrictions
 In Game Controls dialog box, click BLOCK OR ALLOW SPECIFIC GAMES
 For each game in the Game Overrides dialog box, select from:
• User Rating Setting
• Always Allow
• Always Block
 OK to exit Game Overrides, OK to exit Game Controls
 In User Controls, click ALLOW AND BLOCK SPECIFIC PROGRAMS
 In Application Restrictions dialog box, select from
• User can use all programs – OR –
• User can only us the programs I allow
 OK to close Applications Restrictions
 OK to close User Controls
 Close Parental Controls
2.5.2 Content Advisor
- Supervisor password is supplied/activated when configure Content Advisor – if enter the
password, can view web content that is being blocked
- To Configure Content Advisor (NOTE: settings apply per machine NOT per user):
 Internet Explorer | TOOLS button | Internet Options |
 Click Content tab
 Under Content Advisor, click ENABLE & click Continue in UAC
 Click General Tab – make sure “Supervisor Can Type A Password To Allow Users to
View Restricted Content” is selected
 Click CREATE PASSWORD – Enter password & confirm & OK
 OK to close the Content Advisor message box & Click APPLY
 Click the Ratings tab – automatically set with least likely to offend settings & blocks
unrated content as well…
 Set access level (None, Limited, Unrestricted) for various categories
 Click Apply & Click OK to close Content Advisor & save settings
 Click OK on any message boxes that pop up & OK to close out of Internet Options
2.5.3 Setting Up Users & Configuring System Access
Administrator Can make changes affecting other users
Accounts (i.e., change security settings, install hardware & software, access all files)
*NOTE: built-in administrator account also exists, but disabled by default,
as it’s not protected by UAC & no security prompts whatsoever!!
Standard Cannot make changes that may affect other users or computer security
Accounts without entry of administrator account credentials
Can’t install/uninstall software & hardware, change settings affecting other
users (outside of some display settings, that is…)
Guest Accounts Can use computer without access to other users’ personal files
Can’t install software or hardware, change settings, or create password
Disabled by default & should LEAVE DISABLED

PAGE 12 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

2.5.4 Web Browsing Issues


- Time Limits – specify logon hours to allow (select times/days of week) & rest blocked;
automatically logs user off at end of allotted time
- Activity Reports
o Control Panel | User Accounts & Family Safety | Parent Controls | View Activity
reports
o To turn ON activity report logging:
Control Panel … | Parental Controls | click/open User account | select: ON,
Collect Information about computer usage
o Can monitor child’s online activities
- Website Access
o Can restrict websites, select age ratings, block/allow downloads, set up content
filters, or block/allow specific websites
o Content Advisor – automatically blocks unrated websites (unless specifically
configured otherwise); checks website settings/ratings as users visit them;
o Can also use Parental Controls to control website access on a user- specific basis
2.5.5 Controlling Program Access
- Parental Controls – can specify programs a child can use
o Can select/permit ALL programs & then clear/block any unwanted programs…OR
o Can unselect/clear all & select ONLY the programs you want them to run
- Parental Controls | click child user’s account | ensure ON, ENFORCE CURRENT SETTINGS
is selected | click ALLOW AND BLOCK SPECIFIC PROGRAMS | select PERSON’S NAME CAN
ONLY USE THE PROGRAMS I ALLOW…
2.5.6 Addressing Gaming Issues
- Can block:
o All games
o Specific chosen games
o Specific games based on age ratings
o Specific games based on content ratings
- Can use blocks in combination (i.e., age rating & content rating)
2.5.7 Troubleshooting Parental Controls & Content Advisor
- Are all programs blocked & some allowed may block critical programs
- Advise clients of proper age ratings, etc.

2.6 CONFIGURE WINDOWS INTERNET EXPLORER


2.6.1 Managing RSS Subscriptions
- When subscribe to a feed, IE7 adds to common feed list; updated info is automatically
downloaded.
- Subscribing to a feed:
 Click FEEDS button
 If more than one feed provided by website, they will be listed
 Click on SUBSCRIBE TO THIS FEED link
 From the Create In drop-down list, select Microsoft Feeds
 Click NEW FOLDER & type new name for Feed
 Click CREATE
 Click SUBSCRIBE
2.6.2 Configuring RSS Feed Updates
- Aggregator – aka news aggregator or feed reader – client software that uses a
web feed to poll news feed sites & retrieve syndicated web content. Works in

PAGE 13 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

background while user is online. Push system. Checks for new content & regularly
downloads updates.
- Pull system – user receives email that feed is updated & then can go online to
download updates for later reading.
- Clouds – web service that notifies aggregator of feed updates & eliminates need for
periodic polling; should use bandwidth more efficiently.
2.6.3 Configuring Print & Viewing Controls
- Print Preview
 Page Setup – print vertically (portrait)
 Page Setup – print horizontally (landscape)
 Change paper size, orientation, margins; specify headers or footers
 Turn specified headers or footers on/off
 Stretch/shrink page size to fill printed page (replaces zoom in previous IE’s)
 Adjust margins by dragging horizontal or vertical markers
 Print webpage
- Print Preview-specific controls (only affect view, not printing)
 View Full Width / Full Page
 Show Multiple Pages
 Specify The Page To Display
 Display The First / Previous / Next / Last Page
- Specifying Headers & Footers
 Print Preview / Page Setup –user can change or turn off a website’s
header/footer
To Print This: Type This:
Window Title &w
Page address (URL) &u
Date in short format &d
Date in Long Format &D
Time &t
Time in 24-hour format &T
Current page number &p
Total number of pages &P
Right-aligned text &b <text to right align>
Centered text &b <text to center> &b
A single ampersand (&) &&
- Troubleshoot Print Preview Issues
 Check the Stretch/Shrink The Page Size to Fill The Printed Page default
 Margins dragged out of whack?
2.6.4 Configuring IE7+ Search Bar & Search Providers
* Type keyword/phrase into Search bar & press ALT+ENTER to open in new tab!
- Click arrow to right of Search Bar & select FIND MORE PROVIDERS to add/change
- To add a search provider to IE7+ beyond the current browsing session
 type TEST into the website’s search box on that page & copy the resulting URL
 Click arrow to right of Search bar
 Select Find More Providers
 Add Search Providers To Internet Explorer 7
 Paste the copied URL into the Create Your Own section
 Name the search provider
 Click on INSTALL

PAGE 14 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

3. CONFIGURING WINDOWS SECURITY FEATURES


3.1 CONFIGURE AND TROUBLESHOOT USER ACCOUNT CONTROL
- Increasing UAC security to always prompt for admin credentials:
 Log on with an Administrator account
 Start | All Programs | Administrative Tools | Local Security Policy
(OR Start | Run | SECPOL.MSC | OK )
 Continue
 Expand LOCAL POLICIES
 Select SECURITY OPTIONS
 Double-click USER ACCOUNT CONTROL: BEHAVIOR OF THE ELEVATION PROMPT
FOR ADMINISTRATORS IN ADMIN APPROVAL MODE
 Select PROMPT FOR CREDENTIALS & click OK
- To Enable the Built-In Administrator Account:
 Log on with an Administrator account
 Start | All Programs | Administrative Tools | Computer Management | Continue
TIP: can right click on right pane & click on CREATE NEW USER
 Expand LOCAL USERS AND GROUPS
 Click on USERS
 Right-click on the built-in Administrator account & select PROPERTIES
 In the GENERAL tab, clear the ACCOUNT IS DISABLED checkbox & click OK
- Configuring Legacy Software to run in Vista:
 Log on with an Administrator account
 Start | Control Panel | Category View | Programs | Programs & Features | “User
an older program with this version of Windows”
(OR in Windows Vista Help & Support, search for “Compatibility Wizard” | click
START THE PROGRAM COMPATIBILITY WIZARD link | Click the CLICK TO OPEN
THE PROGRAM COMPATIBILITY WIZARD link
 The Welcome screen appears – click NEXT
 Select an option – generally want to select “I WANT TO LOCATE THE PROGRAM
MANUALLY” from the list & click NEXT & then BROWSE
• Can select from:
o I want to choose from a list of programs
o I want to use the program in the CD-ROM drive
o I want to locate the program manually
 Select legacy program you want to run & click NEXT
 Select OS that is recommended for the program, OR OS on which it ran well
 Specify the display settings & click NEXT
• 256 colors
• 640x480 screen resolution
• Disable visual themes
• Disable desktop composition
• Disable display scaling on high DPI settings
 Select RUN THIS PROGRAM AS AD ADMINISTRATOR check box & click NEXT
 To finalize settings, click on NEXT & in the UAC dialog box, click ALLOW
 If configured correctly, legacy program should run
 When prompted by Vista as to whether the compatibility settings are
satisfactorily configured, if yes, select YES, SET THIS PROGRAM TO ALWAYS USE
THESE COMPATIBILITY SETTINGS & click NEXT
• Can also choose from:
o No, try different compatibility settings
o No, I am finished trying compatibility settings

PAGE 15 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 You can choose to send info about your settings to Microsoft (yes/no) & NEXT
 Click FINISH to close the wizard.
- UAC facts:
 If an admin tries to execute an application that’s NOT digitally signed or
validated, a UAC “an unidentified program wants to access your computer –
Cancel or Allow” window appears
 If application that IS digitally signed, a simple Continue/Cancel window shows
(or standard users are prompted for credentials)
 Secure Desktop – when a UAC window appears, Vista takes screenshot of
desktop & switches to Secure Desktop…you can’t do anything outside of the UAC
dialog box
3.1.1 Backward Compatibility
- Program Compatibility Assistant – feature of Vista that runs automatically if detects
compatibility problem when a legacy program is run
- Program Compatibility Wizard – has to be run manually on a program if compatibility
issues are noticed; usually run if the Program Compatibility Assistant doesn’t fix the
issue; NOT to be run for Antivirus programs, Backup programs, Disk utilities, or other
system programs
- Drivers – sometimes compatibility issues are due to drivers – update drivers, or roll back
- NOTE: Vista locks down registry & file system – UAC provides registry & file system
virtualization services that silently redirect read & write operations from protected
portions of the registry & file system to unprotected locations in the user’s profile.
3.1.2 Running User Accounts as Standard Users
- Standard users can perform most (but not all) administrator tasks by entering
administrator credentials when prompted
- Windows Vista Admin Approval Mode – both administrator & standard user accounts run
by default as standard users
3.1.3 Elevating User Privileges
- Standard users supply admin credentials (password of an admin account; when task is
completed, user returns to normal standard user status
- The built-in Guest account is a member of the Guests group – turned OFF by default;
when turned on, cannot perform administrator tasks.
- Administrator accounts belong to Administrators and Users groups – run as standard
users except when performing administrator tasks
- Standard accounts are members of the Users groups; run as standard users
- Built-in Administrator account is member of ONLY the Administrators group – does not
run as standard user account & ALWAYS has elevated privileges; does NOT prompt for
approval to run an administrator task
3.1.4 Using Local Security Policies to Configure User Account Control
 IF PC is not part of Active Directory & is a stand-alone or workgroup computer,
can use Local Security Policy console to configure UAC.
 Access via:
RUN | GPEDIT.MSC | CONTINUE | expand Computer Configuration | expand
Windows Settings | expand SECURITY SETTINGS | expand LOCAL POLICIES | click
SECURITY OPTIONS
-OR- ADMINISTRATIVE TOOLS | LOCAL SECURITY POLICY | LOCAL | SECURITY |
- Admin Approval Mode for Built-in Administrator Account
 Default is DISABLED – can run all apps by default
 If ENABLED, user logs on in Admin Approval mode, which prompts for consent
- Behavior of Elevation Prompt for Administrators in Admin Approval Mode
 Prompt For Consent (default) – prompts user to Continue or Cancel

PAGE 16 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Prompt for Credentials – prompts user to enter password


 Elevate Without Prompting – gives an administrator same privileges (ala XP) as
the built-in Administrator account, with no prompts for elevated tasks
- Behavior of Elevation Prompt for Standard users
 Prompt For Credentials (default) – prompts user to select admin account & enter
password
 Automatically Deny Elevation Requests – access denied message received when
standard user tries to perform an operation that requires administrative
privileges – generally used in an Active Directory domain
- Detect Application Installations & Prompt for Elevation
 Enabled (default for admin) – UAC detects application installation packages that
need elevated privileges to install & automatically triggers an elevation prompt
(type of which is dependent upon the type of user account logged on)
 Disabled – generally done in an enterprise environment to prevent standard
users from installing software or where GPSI/Group Policy Software Install or
SMS/Systems Management Servers are used
- Only Elevate Executables That Are Signed and Validated
 Determines whether UAC enforces PKI (public Key Infrastructure) signature
checks on any interactive app that requests privilege elevation
 Disabled – does not enforce PKI certificate chain validation before an executable
can run
 Enabled – PKI certificate chain validation is required to run an executable
- Only Elevate UIAccess Applications That Are Installed in Secure Locations
 Enabled – default setting; an application can launch with UIAccess integrity only
if it resides in a secure location in the file system, such as:
• xxx\Program Files\…including subdirectories
• xxx\Windows\system32\r-
• xxx\Program Files (x86)\…including subdirectories for 64-bit
versions of Windows
 Disabled – application can launch with UIAccess integrity even if it doesn’t reside
in a secure location in the file system
- Run All Administrators In Admin Approval Mode
 Enabled – default; turns on consent dialog boxes for administrator tasks
 Disabled – turns OFF UAC!!! Need to reboot to change this setting
- Control Switch to the Secure Desktop When Prompting for Elevation
 Enabled – default setting; turns off access to the desktop & rest of Vista until
deal with the UAC dialog box prompt
 Disabled – dangerous; can lose the UAC dialog box in the shuffle…but useful if
want to take screenshots of the UAC dialog boxes!
- Virtualize File and Registry Write Failures to Per-User Locations
 Enable – default – virtualized the registry & file system for legacy applications
that try to read or write from private parts of the system; redirects to locations in
the user’s profile; typical legacy write-to spots:
%Program Files%
%Windir%
%Windir%\system32
HKLM\Software\
 Disable – NOT RECOMMENDED
3.1.5 Troubleshooting UAC & Program Compatibility
- Check Group Membership
via: Computer Management | System Tools | Local Users & Groups |

PAGE 17 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Does the user’s group have sufficient privileges? Are they member of
Administrators group?
- Check Software Status
 If UAC set to only allow signed/validated executables & the exe is UNsigned…
- Check the UAC Settings
 UAC is configured on a PER-COMPUTER BASIS – user experience will vary from
PC to PC

3.2 CONFIGURE WINDOWS DEFENDER


3.2.1 Real-Time Protection
- Alerts users when spyware/potentially unwanted software tries to run
- Also alerts users when program tries to change important Windows settings
Alert Level What Has Been Detected What You Need To Do
Severe Widespread or exceptionally malicious programs Remove software
(viruses, worms, etc) that affect privacy & immediately
computer security & could damage computer
High Potentially collect personal info & affect privacy or Remove software
damage your computer (i.e., changing settings immediately
without knowledge/consent)
Medium Potentially affect privacy or make changes to Review alert details;
computer that could affect “computing experience” consider blocking or
settings removing software
Low Might collect info about you or computer or change Usually benign unless
how computer works BUT is operating according to installed without your
license terms you agreed to knowledge/consent
Not Yet Typically benign unless installed without your Usually OK unless you
Classified consent/knowledge don’t recognize it
Available alert level actions (depending on the alert level shown):
Ignore Allows software to be installed or run
Quarantine Moves software to another location on computer & prevents from running until
restored to original location or until removed
Remove Permanently deletes/removes software
Always Allow Adds to the Windows Defender allowed list & allows to run; no longer get alerts
from Windows Defender about this software; ONLY do this is you’re SURE it’s okay

Actions Available When Alerted that Software is Attempting to Change Important Windows Settings:
Permit Always allow software to change security-related settings
Deny Prevents software from changing security-related settings
- To Configure real-time protection:
 Control Panel | Programs | Windows Defender | Tools | Options
 Control Panel | Security | Windows Defender | Tools | Options
 Can choose software & settings you want Windows Defender to monitor BUT
Microsoft highly recommends you use all of the real time protection options or
AGENTS
Real-Time Protection Purpose
Agent
Auto Start Monitors programs allowed to automatically run when computer is started
System Configuration Monitors security-related Windows settings
(Settings)

PAGE 18 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

Internet Explorer Add- Monitors programs that automatically run when IE7+ is started
ons
Internet Explorer Manages browser security settings
Configuration
(Settings)
Internet Explorer Monitors files & programs designed to work with IE7+, i.e. ActiveX
Downloads controls & installers
Services & Drivers Monitors services & drivers, which may have access to important routings
in the OS
Application Execution Monitors when programs start & operations they make while running
Application Monitors tools & files in the OS
Registration
Windows Add-ons Monitors add-on programs, i.e. software utilities for security, browsing,
productivity, multimedia, etc.
 SpyNet – if join, Windows Defender automatically sends info to Microsoft about
spyware, potentially unwanted software, & software not yet analyzed for risks &
what actions you perform on them & shares this info with the community to
better understand the program/software and update their ratings for it
3.2.2 Internet Explorer Integration
- Integrates with IE7+ to scan files when downloaded; can block suspicious downloaded
files when user tries to execute them
- Defender also integrates with SpyNet & with Windows Live OneCare (subscription)
Windows Live One Care:
Automatically optimizes PC
Regularly backs up files & settings
Virus & spyware scanners
Managed 2-way firewall
Regularly defrags
Manages security updates
Runs continuously in background
Can also run/scan on demand
3.2.3 Configuring Custom Scans
- Windows Defender | click Arrow next to SCAN button | click CUSTOM SCAN | SCAN
SELECTED DRIVES AND FOLDERS | click SELECT | OK | SCAN NOW
- Choosing Advanced Scanning Options
 Windows Defender | TOOLS | OPTIONS | ADVANCED OPTIONS
Available Advanced Options:
Scan The Contents Of Archived Files And Increases scan-time, but spyware can install
Folders For Potential Threats itself in these locations too
Use Heuristics To Detect Potentially Harmful Uses Heuristics (educated guesses based on
Or Unwanted Behavior By Software That Has behavior patterns) to alert about software
Not Been Analyzed For Risks not yet listed in a definition file
Create A Restore Point Before Applying Can restore system settings if you
Actions To Detected Items accidentally remove software you wanted to
keep (or if Defender auto-removes it)
Do Not Scan These Files Or Locations Specify files/folders you don’t want Defender
to scan
- Configuring Administrator Options
 Located below the Advanced Scanning Options in Windows Defender Options

PAGE 19 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 If Select the USE WINDOWS DEFENDER check box, all users are alerted (if
Windows Defender is on) when spyware/potentially harmful software tries to
install/run on the computer…BUT…if ONLY this option is selected, elevated
privileges are required to configure Windows Defender & determine when scans
occur
 If you also select the ALLOW EVERYONE TO USE WINDOWS DEFENDER check box,
allows all users to scan, configure, and review Defender activities
- Scheduling Windows Defender Scans
 Windows Defender | TOOLS | OPTIONS
 Can’t schedule custom scans, but can schedule Quick Scans or Full System Scans
 Recommended to do a daily quick scan
 Based on alert level, can select to:
• Automatically remove spyware & other potentially harmful software if
detected during a scan
• Ignore items
• Perform a default action that Windows Defender determines based on the
definition of the software detected
 CANNOT select a default action for severe alert ratings because Defender
automatically removes it.
3.2.4 Working With Windows Defender Definitions
- Controlling Definition Downloads
 All Programs | Windows Updates | Change Settings | (settings apply to ALL
updates, not just Defender definition files) | Recommended Updates | Checkbox
for: Include Recommended Updates When Downloading, Installing, or Notifying
Me About Updates
 To check for new spyware definitions before performing scheduled scans:
Windows Defender | TOOLS | OPTIONS | scroll to AUTOMATIC SCANNING | make
sure checkbox is checked for CHECK FOR UPDATED DEFINITIONS BEFORE
SCANNING | SAVE | CONTINUE
- Troubleshooting Definition Update Issues
 Check scan times – during daytime with high computer usage = bad
performance experience for user
 Is computer turned off when scans or updates are scheduled?
 NOTE: optional updates are NOT downloaded or installed automatically – must
be done manually
 Check Defender Activities: Windows Defender | History |
 Check Defender updating & other security info via:
Control Panel | Security | Windows Security Center | Check Security Status |
• Firewall
• Automatic Updating
• Malware Protection
o Virus Protection
o Spyware & other malware protection
• Other Security Settings
o Internet security settings
o User Account Control
3.2.5 Troubleshooting Spyware Removal
- To perform manual uninstall:
 If Defender informs you that it can’t remove spyware automatically & you can’t
remove it manually by other instructions provided by Defender, click on
UNINSTALL A PROGRAM IN CONTROL PANEL & remove it from there

PAGE 20 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- If still see evidence of spyware after uninstall, remove, etc., try rolling back to Restore
Point OR might need to reinstall the OS
- Evidence of Spyware
 New toolbars, links, favorites you didn’t add on your browser
 Home page, mouse pointer, or search program changes
 Website redirection
 Pop-ups
 Computer running slower
3.2.6 Managing Applications by Using Software Explorer
- Windows Defender | TOOLS | SOFTWARE EXPLORER | CONTINUE | SHOW FOR ALL USERS
**NOTE: “SHOW FOR ALL USERS” button won’t appear if you only have one user account
enabled on your Vista PC
Software Explorer Category drop-down list:
Startup Programs Programs that run automatically when Windows starts
Currently Running Programs Programs currently running on the screen or in
background
Network Connected Programs Programs/processes that can connect to the internet or
to a home/office network
Windows Sockets (Winsock) Programs that perform low-level networking &
Service Providers communications services for Windows & programs that
run on Windows
- For each type of item, have following ratings:
 Permitted – has a link to learn more about the item
 Not Yet Classified – can submit the program to SpyNet for further analysis
 Potentially Unwanted – has a link to learn more about the item
- Displaying Software Explorer Details
Title Description
Auto Start Indicates whether program is registered to start automatically
when Windows starts
Startup Type Location where the program is registered to start automatically
(i.e., All Users Startup folder or Registry)
Ships With Operating System Indicates if program installed as part of Windows Vista
Classification Indicates whether program has been analyzed for risks to
privacy & security
Digitally Signed By Indicates if software is digitally signed and if so, by who

3.3 CONFIGURE DYNAMIC SECURITY FOR INTERNET EXPLORER 7


3.3.1 Resolving Protected Mode Issues
- Prompts user every time a program running in the browser needs to write to areas other
than Temporary Internet Files folder
- Enabled by default for Internet, Local Intranet & Restricted Sites BUT NOT for Trusted
Sites
- “Internet Protected Mode: ON” Icon appears in browser status bar (bottom right of
browser window) – double click this icon to change settings
- IE7+ also warns users when web pages try to install software outside of the browser
and outside protected mode
- NOTE: a browser that’s infected in Protect Mode does not stay infected – when you
close & restart the browser, it flushes the infection!

PAGE 21 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

3.3.2 Configuring the Phishing Filter


- Helps determine whether a website is legit or a phishing site – blocks websites &
cautions users about reported & suspected phishing sites
- Enabled by default: Internet Explorer | Tools | Phishing Filter Settings
- Checks known lists AND uses heuristics too
- When Automatic Web Checking is ENABLED & comes across a suspect site:
 RED warning – appears if site is confirmed phishing site – can CONTINUE or
CLOSE
• Can click on REPORT THAT THAIS IS NOT A PHISHING WEBSITE
 YELLOW warning – appears if site has characteristics similar to known phishing
sites (not yet confirmed as bad)
• Can click on REPORT WHETHER OR NOT THIS IS A PHISHING WEBSITE
3.3.3 Using the Pop-Up Blocker
- ENABLED by default; blocks most pop-ups – user can still see a pop-up by clicking the
IE7+ Information bar
- NOTE: some pop-ups are legit – needed for banking/payment websites & for Outlook
Web Access to reply to messages
- Internet Explorer | Tools | Pop Up Blocker | Pop Up Blocker Settings |
 Can enter exceptions on the Allowed sites list
 Can set Filter Level too
• High: Block All Pop-ups (CTRL+ALT to override & opens in a new window)
• Medium: Block Most Automatic Pop-ups (default)
• Low: Allow Pop-ups from Secure Sites
 Can set so opens pop-ups in a new tab in same window if you wish:
• Tools | Options | General tab | Tabs Section | Settings | Always Open Pop-
Ups In A New Tab
3.3.4 Utilizing Security Zones
- To add a site to Trusted Sites zone or Restricted Sites zone:
 Navigate to the Page
 Tools | Internet Options | Security tab |
• Internet
• Local Intranet | Advanced | can specify sites manually instead of
automatically detecting intranet network
• Trusted Sites | click on SITES | ADD | CLOSE | OK
o Check status of the “Require Server Verification (https:) For All Sites
In This Zone” – if checked, ONLY can add secure sites & not regular
http: sites – set to ON by default
• Restricted Sites | click on SITES | ADD | CLOSE | OK
- Five levels of predefined security settings for security zones:
 High – applies to Restricted Sites zone
 Medium-High – applies to Internet
 Medium – applies to Trusted Sites
 Medium-Low – applies to Local Intranet
 Low
- Can change default setting for a zone by dragging the slider control
- Can also click on RESET ALL ZONES TO DEFAULT LEVEL
- Can also set custom levels by clicking on zone & clicking on CUSTOM LEVEL
 Allows specific options/settings, but be careful…
- NOTE: IE7 Security Settings are PER USER & NOT PER PC!!
3.3.5 Configuring Privacy Settings
- Internet Explorer | Tools | Internet Options | Privacy Tab | (Default = MEDIUM)

PAGE 22 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

Cookie Types
Temporary/Session Cookies Removed from computer when browser closes – used to
store temp info (i.e. shopping cart)
Persistent/Saved Cookies Remain on computer after browser closes – used for sign on
info, password, etc.
First-Party Cookies Can be Persistent or Temporary; come directly from a
website a user is viewing
Third-Party cookies Come from other websites’ advertisements that are on the
website the user is viewing

Settings for Cookie Handling:


Block All Cookies Even ones already stored on a computer
High Blocks cookies from sites without compact privacy policy
Medium-High Block Third-Party & tracker cookies without explicit consent
Medium (Default) Block those with no privacy policy
Restricts private info collected
Low Restricts information collection without consent
Blocks sites without privacy policy
Accept All Cookies BAD!!!!!
 Can also block/allow cookies for specific sites: Tools | Internet Options | Privacy
Tab | Sites | type url & click BLOCK or ALLOW |
 To disable automatic cookie handling, click on ADVANCED | Advanced Privacy
Settings | select the OVERRIDE AUTOMATIC COOKIE HANDLING checkbox
- Privacy Policies
 To View a site’s Privacy Policy, click PAGE | Select WEB PAGE PRIVACY POLICY |
opens the Privacy Report dialog box
 Clicking the SETTINGS button from the Privacy Report dialog box shows you the
privacy settings on your computer
- Secure Websites
 Security Certificate – electronic document that identifies a website
 When access secure website in IE7+, display a lock in the Security Status bar at
top of browser window – clicking on the lock allows user to view security report
3.3.6 Managing Add-Ons
- Tools | Manage Add-Ons |
 Enable or Disable Add-Ons
 Find More Add-Ons
- Add-Ons can be: toolbars, ActiveX controls, Browser help objects, Browser extensions…
- Use the SHOW drop-down menu to select from following:
 Add-ons that have been used by Internet Explorer
 Add-ons currently loaded in Internet Explorer
 Add-ons that run without requiring permission
 Downloaded ActiveX Controls (32-bit)
- To temporarily disable Add-Ons:
 Start | All Programs | Accessories | System Tools | select INTERNET EXPLORER
(NO ADD-ONS)

3.4 CONFIGURE SECURITY SETTINGS IN WINDOWS FIREWALL


3.4.1 Firewall Basics
- When traffic reaches firewall, firewall analyzes & either drops traffic or allows to pass
- Vista Firewall functions in bidirectional manner

PAGE 23 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- Incoming traffic is dropped if no rule allows it to pass


- Full Stealth – feature that stops an external host from performing an OS fingerprint (one
of the first steps in an attack) – cannot be disabled
- Boot time filtering – new feature of Vista Firewall – network interfaces are protected as
soon as they become active
- Terms:
 Protocol: TCP & UDP
• TCP – more reliable & used for majority of internet traffic
• UDP – used for broadcast & multicast & online gaming
 Port – TCP or UDP info; used to map network traffic to particular services or
programs (i.e., 80 is used for internet traffic & 25 is used for email transmission)
 IPSec (Internet Protocol Security) – method of securing internet traffic using
encryption & digital signing; provides sender verification
 Network address – unique to each computer on a network
 Inbound traffic – network data that comes from an external computer & is
addressed to your computer
 Outbound traffic – network data your computer sends to other computers on
local or remote networks through a network interface
 Network interface – can be a LAN, wireless, modem, VPN, or FireWire connection
3.4.2 Profiles & Network Location Awareness
- NLA – assign profile based on network environment (Private – Public – Domain)
 Private Profile – becomes active when network types of all active network
connections are categorized as Private by NLA. “Home” = Private
 Public Profile – activated when Private or Domain profiles do not apply; firewall
rules are most restrictive with this setting
 Domain profile – activated when computer has authenticated with a domain
controller on all active network interfaces
3.4.3 Windows Firewall
- NOTE: can ONLY check the Firewall settings for the current network profile (whether
Public/Private/Domain)
- Checking & Modifying the State of Windows Firewall
 Can enable/disable Windows Firewall on a per-connection basis or completely
 Control Panel | Classic View | Windows Firewall | check details | click on CHANGE
SETTINGS |
 NOTE: if click “block all incoming connections” check box, trumps the exception
list and EVERYTHING is blocked
 If Click on the ADVANCED tab, can restore default settings
- Configuring Exceptions
 Windows Firewall | CHANGE SETTINGS | click on EXCEPTIONS tab |
 Can select program on the list OR Add Program OR Add Port
 When Add Program or Port, can Change Scope to apply to
• Any Computer
• My Network (subnet) only
• Custom List (enter IP addresses or MAC addresses)
 Click OK & Click OK to close Add a Program/Port dialog box
3.4.4 Windows Firewall With Advanced Security
- Main differences with advanced vs. regular
 Configure outbound & inbound exceptions
 Edit & apply firewall configuration for ALL network profiles
 Configure separate rules for IPSec traffic

PAGE 24 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- Access via:
 Start | Control Panel | Classic View | Admin Tools
(or All Programs | Admin Tools | )
 Open Windows Firewall With Advanced Security | Continue |
- To change settings for Windows Firewall With Advanced Security via MMC:
 Run | MMC | File | Add Snap In | Right Click Windows Firewall With Advanced
Security node at the top right of the console | Select PROPERTIES |
 Can turn off/on inbound & outbound connections on a per profile basis
 Clicking CUSTOMIZE opens the Customize Settings For The Selected Profile dialog
box | configure:
• Firewall notification
• Unicast response
• Rule merging (if applicable – if have group policy)
 Clicking on the IPSec Settings tab allows you to configure:
• Key Exchange – Default is recommended
• Data protection – Default is recommended
• Authentication Method settings – Default, Kerberos V5…
- Configuring Inbound and Outbound Rules
 Open Windows Firewall With Advanced Security | right click type of rule to
configure | select NEW RULE | opens New Inbound/Outbound Rule Wizard
(OR go to Action, New Rule)
 Select Rule Type – Program; Port; Predefined; Custom Rule – & click NEXT
 IF selected Program, presented with program page – select program & path for
which the rule will apply; also possible to choose ALL programs here
 IF selected Port, specify TCP or UDP & the port number(s); also possible to
choose ALL ports
 Specify what firewall should do when traffic meeting that criteria is encountered
• Allow The Connection
• Allow The Connection If It Is Secure
• Block The Connection
 Click NEXT & enter a Name & Description |
- Connection Security Rules
 Special rules that deal with IPSec traffic
Four Types of Connection Security Rules
Isolation Rule - Isolates Vista computers based on authentication credentials
such as a common domain
- Used to isolate groups of computers from others on the
network
Authentication - Prevents a Vista computer from authenticating connections
Exception Rule from computers specified in the rule
- Usually used in conjunction with an isolation rule to allow
exceptions to that rule
Server-To-Server Rule - Protect connections between servers (i.e., between web server
app & a database hosting credit card info)
Tunnel Rule - Creates encrypted tunnels across the internet
- Importing & Exporting Policies
 Windows Firewall With Advanced Security | click on that in the file tree | click
“Import Policy” or “Export Policy” in the Actions section on the right hand side of
the console

PAGE 25 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

4. CONFIGURING NETWORK CONNECTIVITY


4.1 CONFIGURING NETWORKING BY USING THE NETWORK AND SHARING
CENTER
4.1.1 Introduction to Networking & TCP/IP
Internet Protocol (IP) - Controls packet sorting & delivery (routing);
- Datagram = incoming/outgoing packets – each includes sender’s
source IP address & destination IP address of recipient
- IP examines destination address, compares to route table & decides
what action to take
- IPv6 is automatically configured
- Run | cmd | “ipconfig > ipconfig.txt” : displays
Connection-specific DNS Suffix
Link-Local IPv6 Address
IPv4 Address
Subnet Mask
Default Gateway – IP address of router connection on the
same subnet as the IP address of the host computer –
datagrams pass through the routing device
(router/server/wireless router) on their way to the internet
Subnetting - Subnets are connected by a router
- Each subnet has own subnet address within network & own gateway
or router connection
- SOME subnets can connect to more than one router
- If Subnet is 255.255.255.0 & IP address is 10.16.10.143, then
network address of subnet is 10.16.10.0 & broadcast address is
10.16.10.255
- By adding ones to the end of the ones in the subnet mask, can split
into smaller subnets (extra info)
Supernetting By changing one or more ones at the end of the ones in the subnet
mask to zero, can merge 2+ contiguous subnets (extra info, not on
test)
Internet Control Message - Provides maintenance & routing facilities for P
Protocol (ICMP) - Encapsulated within IP datagrams & can be routed throughout a
network
- Builds & maintains route tables; performs router discovery; adjusts
flow control to prevent link or router saturation; provides diagnostic
tools (ping, tracert)
- PING: Run | cmd | ping xxx.xxx.xxx.xxx – can ping your gateway IP
address to test connection
- TRACERT: checks connectivity to device on another network & gives
details of hops
- NOTE: ICMP may be blocked by firewall – might need to allow ICMP
in one or more firewalls or turn firewalls off
Internet Group Management - Supports IP multicasting (group of hosts ID’d by one multicast
Protocol (IGMP) address)
- For example, an Active Directory directory service domain controller
uses multicasting to replicate Active Directory information to other
domain controllers
Address Resolution Protocol - Resolves IP address to MAC addresses
(ARP) - MAC = 6 byte (48-bit)
- Can display MAC address using “ipconfig /all”

PAGE 26 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

IPv6 -128 bits vs. IPv4’s 32-bits


- Uses multicast Neighbor Solicitation messages in lieu of ARP
broadcasts
- Replaces IGMP with Multicast Listener Discovery (MLD) messages
Transmission Control Protocol - Connection based
(TCP) - Used for Log on, File & Print Sharing, etc.
- One to one communication with defined start & end points
- Uses handshake protocol
User Datagram Protocol (UDP) - Connectionless
- One-to-many communication
- Use broadcast & multicast IP datagrams
- Applications need own reliability monitoring, as UDP does not
guarantee delivery
- Commonly used for email, browsing, streaming video
Dynamic Host - Automatically assigns IP addresses to DHCP enabled hosts
Configuration Protocol - Assigns IP addresses & handles IP address leasing & renewal
(DHCP) - Can also specify IP address of default gateway(s) & DNS server(s)
Domain Name Service - Resolves local host names & fully qualified domain names to IP
(DNS) addresses (www.google.ca --> 1xx.x.x.x
- DDNS – Dynamic Domain Name Service – uses dynamic database &
enables dynamic updates
Automatic Private IP - Configures internal private network when DHCP not provided
Addressing (APIPA) - 169.254.0.1 – 169.254-255.254 with 255.255.0.0 subnet mask
- Does NOT send IP datagrams to, or receive them from, any other
network, sooooo…
- Does NOT configure a default gateway
Windows Internet Name - Resolves NetBIOS names to IP addresses
Network Services

Service (WINS) - Provides a dynamic database


- Used by NT & early Windows
Network Address - Use one public IP address for many devices on a private network
Translation (NAT) - Translates between private/internal addresses & public addresses
- Most often, are issued ONE public IP address for a whole network to
use
Reserved IPv4 addresses for Private Networks
10.0.0.0/8 10.0.0.1 –
10.255.255.254
172.16.0.0/12 172.16.0.1 –
172.31.255.254
192.168.0.0/16 192.138.0.1 –
192.168.255.255
169.254.0.0/16 169.254.0.1 –
169.254.255.254
- ICS (Internet Connection Sharing) uses 192.168.0.0/24 (192.168.0.1-192.168.0.254)
4.1.2 Connecting To A Network
- Most often, adding a computer to an existing network & DHCP service probably already
exists on network.
- If have ICS set up, the computer on your network that directly access the modem
automatically configures all the other computers on its LAN
- ICS: Internet Cable (DSL/Cable/phone) > Modem > PC > Router > Other PCs
- By Default, Windows set to receive IP configuration automatically…to check settings:

PAGE 27 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Control Panel | Network And Internet | Network And Sharing Center | Click VIEW
STATUS beside the Local Area Connection that connects to the SOHO network
 OR – Network And Sharing Center | click MANAGE NETWORK CONNECTIONS |
right click the Local Area Connection | click PROPERTIES
 Select “Internet Protocol Version 4” & click PROPERTIES
 Default is “Obtain IP Address Automatically” & “Obtain DNS Server Address
Automatically”
 SIDENOTE – need to install Link Layer Topology Discovery on XP systems if want
to see them/be seen by Vista
- Hybrid network = WAP typically connected to modem & computers are connecting using
wired connections to Ethernet ports on the WAP as well as wirelessly
- WAP – Wireless Access Point
 Provide internal DNS services
 Forwards any datagrams via modem to ISP for external DNS resolution
4.1.3 Setting Up A Network Connection
- To connect to the internet (for the first computer that’s connected to a modem)
 Network & Sharing Center | Set UP A Connection Or Network | Connect To The
Internet | Next |
 Select method (PPPoE for example)
 Enter User Name & Password
 Select “Allow Other People To Use This Connection” to share
 Enter a Connection Name
 Click CONNECT
- To specify name for your network:
 Network & Sharing Center | click CUSTOMIZE | select Private or Public | Type a
Network Name | Next | Close
- TYPICALLY, other computers on a wireless SOHO connect to the internet via the first
computer configured on the network…need to enable ICS on that computer
 Network & Sharing Center | click MANAGE NETWORK CONNECTIONS
 Right click the connection you want to share | Click PROPERTIES
 Continue
 Click the SHARING tab | select “Allow Other Users To Use This Connection”
 Can also click Allow Other Network Users To Control Or Disable The Shared
Internet Connection” box
 Can also allow other network users to use services running on your network by
clicking SETTING | select services you want to allow
- When configure ICS, your LAN connection is configured with a new static IP address
(192.168.0.1 perhaps) & other settings (subnet mask & default gateway & DNS Server
address). The static address (192.168.0.1) is used as the default gateway for the
subnet.
- If you’ve change the default workgroup name (WORKGROUP) on your network, might
need to also change that on any computers added to the network
- If want to set up a VPN:
 Windows Help & Support
 Search for “set up a connection to your workplace by using VPN”
 Opens the Connect To A Workplace Wizard
 Enter internet address & name…
4.1.4 Adding A Wireless Device to a Network
- If have a wireless network, can run the SET UP A WIRELESS ROUTER OR ACCESS POINT
WIZARD on one computer already on the network & save settings to a USB flash drive

PAGE 28 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Wireless Network Setup Wizard runs automatically when the USB flash drive is
inserted
 Control Panel | Network And Internet | Network & Sharing Center | Set Up A
Connection Or Network | Set UP A Wireless Router Or Access Point | NEXT |
NEXT| Continue | searches for wireless access device by running the Detecting
Network Hardware And Settings Utility | when prompted if you want to turn on
network discovery for all private networks, click NO, MAKE THE NETWORK I AM
CONNECTED TO A PRIVATE NETWORK (other choice is to turn on network
discovery for all public networks) | click CREATE WIRELESS NETWORK SETTINGS
AND SAVE TO USB FLASH DRIVE | Enter name for your wireless network (only
letters & numbers & underscores) | click NEXT | name specified becomes the
SSID | either accept the suggested passphrase or provide one of your own |
Continue | Specify file & printer sharing settings (typically use the custom
settings on your computer by default) | Click NEXT | plug USB device into
computer when prompted | specify drive location | instructions are shown on
how to add other devices to network | click CLOSE
- Can also manually add a wireless computer running Vista via:
 Start | Connect To | choose wireless network from the list | click CONNECT
 Type in network security key or passphrase (if prompted) & click OK
Common Wireless Network Technologies
802.11a Up to 54 Mbps
More simultaneous users than 802.11b
Smaller signal range than 802.11b
More easily disrupted signal
Not compatible with 802.11b adapters, routers, access points
5 GHz Frequency
50’ / 15 meters indoors
100’ / 30 meters indoors
802.11b Up to 11Mbps
Good signal range
Low Cost
Allows fewer simultaneous users than 802.11a & 802.11g
2.4 GHz Frequency
150’ / 46 meters indoors
300’ / 92 meters indoors
802.11g Up to 54 Mbps
More simultaneous users than 802.11b
Smaller signal range & not easily obstructed
Relatively expensive
Backward compatible with 802.11b adapters/routers/access
points
Uses 2.4 GHz Frequency
150’ / 46 meters indoors
300’ / 92 meters indoors
802.11n Up to 300 Mbps
Draft format currently, not on test…
4.1.5 Managing Network Connections
- Right click the Connection | click on STATUS | Network Connection Details are shown
 Shows info similar to ipconfig info

PAGE 29 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- Clicking CLOSE returns you to the Local Area Connect Status dialog box – clicking
PROPERTIES & then CONTINUE accesses the Local Area Connections Properties dialog
box
- In the Local Area Connection Status dialog box, typically see:
Client For Microsoft Networks Enables the computer to access resources on a
Microsoft network
Quality of Service (QoS) Packet Provides traffic control; can be vital if have high-
Scheduler bandwidth traffic (i.e., streaming video) on your
network
File And Printer Sharing for Enables other computers to access resources on
Microsoft Networks your computer in a Microsoft network (and other
networks)
Internet Protocol Version 6 IPv6 configuration
(TCP/IPv6)
Internet Protocol Version 4 IPv4 configuration
(TCP/IPv4)
Link-Layer Topology Discovery Discovers & location other computers, devices &
Mapper Input/Output (I/O) Driver network infrastructure components on network &
determines network bandwidth
Link-Layer Topology Discovery Allows computer to be discovered & located on
Mapper Responder the network
 IF an item listed above is configurable, can click on the PROPERTIES button
- Can also just click on CONFIGURE in the Local Area Connections Properties dialog box to
configure the adapter itself, i.e., update the driver…
- Can create a network bridge if have more than one network connection
4.1.6 Managing Preferred Wireless Connections
- See available networks via:
 Network & Sharing Center | Connect To A Network | select WIRELESS in the
Show list | select a network & click CONNECT |
 IF not shown, click SET UP A CONNECTION OR NETWORK in the Network &
Sharing Center | select from list of available options
- To see saved wireless networks:
 Control Panel | Manage Wireless Networks – click & drag to change order
- Preventing Your Computer From Switching Between Wireless Access Points
 Open Network & Sharing Center | click MANAGE WIRELESS NETWORKS
 Right click the preferred network | click PROPERTIES
 CLEAR the CONNECT TO A MORE PREFERRED NETWORK IF AVAILABLE checkbox
- Networks with the same Service Set Identifier (SSID)
 Best course of action is to change the default SSID (which is usually “Default”)
- Hardware & Interference Problems
 Typically see interference with 802.11b & g – phones & microwaves
 Can maybe change the WAP settings to use different wireless channel or
configure channel to be selected automatically
 In US & Canada, can use channels 1, 6, & 11
4.1.7 Sharing Files & Folders
- NOTE: sharing files & folders on a network from any folder on a computer requires
elevated privileges
 Can share regular files/folders OR can place them in the Public folder
 Users do NOT need elevated privileges to place files in the Public folder, BUT
elevated privileges ARE required to specify whether these files can be opened (or
opened & changed) by users logged onto other computers on the network

PAGE 30 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- Configuring File & Folder Sharing


 Via Network & Sharing Center, can enable or disable:
Network Discovery - Turn on/off network discovery
File Sharing - On/Off
Public Folder Sharing - Can configure to allow anyone logged onto any
computer on the network to open/change/create files
OR specify that only read access is permitted
Printer Sharing - On/Off
Password Protected Sharing - If Enabled, permits ONLY users who have an
account on the computer (and therefore can supply
credentials) to access shared resources
- If Disabled, grant access to users who don’t have
accounts on the computer(s) storing the files to be
accessed
Media Sharing - Allows sharing of music, pictures, video files
- Click CHANGE & allow sharing
- Configuring Sharing Permissions
 To Access Public Folder: Windows Explorer | Documents | Public
 Roles for sharing permissions:
• Owner – full permission on the share
• Reader – read-only
• Contributor – can amend
• Co-Owner – can also change sharing permissions
- Other Methods of Sharing Files
Ad-Hoc Networks - Temporary wireless connection between
computers & other devices
Windows Meeting Space - Automatically sets up an ad-hoc network
& requires wireless connections
Windows-compatible file-sharing programs Third-party software designed to share files
Websites File/photo sharing websites
Instant Messaging Can share files while chatting online via
Windows Live Messenger, etc.

4.2 TROUBLESHOOT CONNECTIVITY ISSUES


4.2.1 Basic Troubleshooting
- Run through normal procedures & checks first:
 Cable OK? Connected OK at port / socket?
 Dynamic/static settings?
 Bridge interface
 ICS
 WAP settings
 Faulty equipment
 ISP outage
 Unplug – replug – reboot – ping – view network map…
- Checking Computer-to-Computer Connectivity
 Ensure all computers are ON (duh) & check ICS settings; make sure WAP is on
- Troubleshooting Device Drivers
 Device Manager: Start | right click Computer | click PROPERTIES | click DEVICE
MANAGER | Expand NETWORK ADAPTERS | right click the adapter | click
PROPERTIES | go to General Tab | shows whether device is working properly

PAGE 31 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

4.2.2 Troubleshooting IP Configuration


ping 127.0.0.1 Ping loopback address
ping computer’s IP address
ping default gateway and Can get these from ipconfig /all
DNS servers
ipconfig /all Returns same info as the Network Connection Details dialog
box for all network interfaces
ipconfig /release & ipconfig
/renew
ipconfig /registerdns Forces registration
MUST be run as Administrator
ipconfig /flushdns Clears out the DNS cache to work around negative caching
MUST be run as Administrator
ipconfig /allcompartments When used before /all or /renew, applies to ALL network
adapter interfaces
Tracert Check for excessive delays & where they are (which “hop”)
- NOTE: to run Command Prompt Console as Administrator:
 Start | All Programs | Accessories | right click Command Prompt | click RUN AS
ADMINISTRATOR
4.2.3 Troubleshooting Wireless Network Settings
- Check if automatic switching is on/off for preferred networks
 Networking & Sharing Center | Manage Wireless Networks | right lick network
profile | select PROPERTIES |
- Change channel the WAP uses (can usually access via IE
4.2.4 Configuring Wireless Network Security
Change Default SSID Reduces interference & risk of multiple networks with
same SSID
Turn on Wi-Fi Protected Access Use the highest available encryption available on your
(WPA) or Wireless Equivalent WAP & devices
Privacy (WEP) encryption
Change default admin passwords Enough said…
Enable MAC address filtering Allows ONLY specified MAC addresses to use network
Disable SSID Broadcast No one can find the network unless already know it’s there
Do NOT auto-connect to open Auto-connecting exposes computer to security risks!
wireless networks
Enable firewalls Use the Windows firewall and/or WAP firewall
Position the WAP centrally Allows for best signal strength
Turn off the network during I.e., during holidays, closures – best defense is to turn it
extended periods of non-use off, so no one can access
Consider assigning status IP Most WAP’s allow you to disable DHCP…
addresses to wireless devices
- To connect to a network that does NOT broadcast its SSID:
 Network & Sharing Center | Set Up A Connection Or Network |
 Select MANUALLY CONNECT TO A WIRELESS NETWORK | click NEXT
 Type Network’s name & select the security type
 Type the security key or passphrase & decide whether to connect automatically
(if network is secure, auto-connect is the default)
 Click NEXT | Computer connects to the network
4.2.5 Using the Diagnose Internet Connection Tool to troubleshoot connectivity issues
- If enter a website address & IE can’t connect, can click on “Diagnose Connection
Problems” on the “Internet Explorer cannot display the webpage” screen in IE7+

PAGE 32 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Network Diagnostics returns a message that might help you diagnose the
problem
- Can also go to:
 Network & Sharing Center | Diagnose & Repair
- Can also run diagnostics on a specific interface via:
 Network & Sharing Center | Manage Network Connections | right click the
connection | click on DIAGNOSE
4.2.6 Configuring Network Settings in Windows Firewall
- By default, Windows Firewall is ENABLED & blocks all incoming traffic other than traffic
that meets criteria defined in exceptions
 Windows Firewall settings are dependent on the network location you defined
when installed Vista – is on for all locations, but with separate profiles for each
location
- Configuring Exceptions
 To restore default firewall settings:
• Windows Firewall | Change Settings | Advanced | Restore Defaults
• OR - Control Panel | Allow A Program Through Windows Firewall | in
Advanced Tab click Restore Defaults
 Control Panel | Allow A Program Through Windows Firewall | Continue | displays
the Exceptions tab of the Windows Firewall Settings
• Add Program | select or browse for program | can click CHANGE SCOPE &
define the range of computers the exception applies to
o Any Computer
o My Network (subnet) only
o Custom List
• Add Port | enter TCP or UDP Port | can click CHANGE SCOPE & define the
range of computers the exception applies to (same list as above)
• Clear/select checkboxes for Programs or Ports (can select a program or
port & then click on PROPERTIES to see the exception details)
- Examining Advanced Security Settings
 Start | Admin Tools | Windows Firewall With Advanced Security |
• Inbound Rules
• Outbound Rules
• Connection Security Rules

- Applying Public & Private Firewall Settings
 Open Windows Firewall with Advanced Security| click Windows Firewall
Properties in OVERVIEW pane | opens the Windows Firewall With Advanced
Security On Local Computer dialog box |
 Can change settings by profile (Domain Profile & Private Profile & Public Profile)
via individual tabs for each
• Firewall state (on/off)
• Inbound Connections (block/allow)
• Outbound Connections (block/allow)
• Customize settings for Firewall behavior
• Customize logging

4.3 CONFIGURE REMOTE ACCESS/SUPPORT


4.3.1 General Info
- Terms:
 Helper – the person providing the assistance

PAGE 33 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Host – the person asking for assistance/sending the invitation; must manually
allow the connection
- Improvements in Remove Assistance & Remote Desktop
 Use less bandwidth
 Can now work through NAT firewalls
 If host computer must be rebooted as part of troubleshooting process, Remote
Assistance session is automatically reestablished (COOL!)
4.3.2 Remote Assistance
- Activating and Securing Remote Assistance
 Start | Right click Computer | select PROPERTIES | in Tasks pane click REMOTE
SETTINGS | click CONTINUE | In REMOTE tab of System Properties dialog box
select/check the ALLOW REMOTE ASSISTANCE CONNECTIONS TO THIS COMPUTER
 ONLY users with elevated privileges can configure security settings for Remote
Assistance
 Three security options apply to Remote Assistance invitations issued from
computers running Vista…these settings control:
• Whether the person connecting from the remote computer can control
the host computer
• The length of time the invitation can remain open
• Whether invitations can be used only by Vista+ computers
 Remote Assistance settings CANNOT be configured individually each time an
assistance invitation is issued
 If the “Take Control” option is enabled, the host user can still control what’s
going on & must manually approve the helper taking control
 To Configure helper settings:
• Control Panel | Classic View | System |
• Click REMOTE SETTINGS | click CONTINUE
• Click ADVANCED | select “Allow This Computer To Be Controlled
Remotely”
• Set timeframe for invitations to remain open (minutes, hours, days) –
max is 30 days
• Select/Clear checkbox to “Create invitations that can only be used from
computers running Windows Vista or later”
 NOTE: if invitation period expires, Vista asks host if want to keep waiting – can
extend the invitation timeframe that way…
- Exploring a Remote Assistance Session
 Start | Help And Support | under the “Ask Someone” heading, select “USE
WINDOWS REMOTE ASSISTANCE TO GET HELP FROM A FRIEND OR OFFER HELP”
 Clicking the “INVITE” option opens screen to select method to invite someone to
help you:
• Use e-mail to send an invitation (If your email program is not configured yet,
choosing this option will start the configuration process)
• Save this invitation as a file (If you use web-based e-mail, choose this option)
 Invitations are protected with passwords, which are NOT automatically included
in the invites – can verbally give the password to the helper to keep more secure
• At least 6 characters long
• No enforcement of using mixed case letters, numbers and symbols
 Hosts need to keep the Remote Assistance panel open after they create the
invitation – if close it, will be necessary to generate a new invite.
- Using an Invitation to Make a Connection
 Helper can start connection by either

PAGE 34 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

• Double-clicking the invitation file & entering the password – OR


• Starting Windows Remote Assistance | selection option to offer help |
load the invitation file
 Host is prompted on whether they want to accept the connection from helper
(yes/no)
 When accepted, host switches from using Aero to Basic interface (Aero will be
restored when session is disconnected)
- The Remote Assistance Session
 Remote Assistance Panel Icons
• Disconnect – allows either host or helper to terminate session
• Request Control – allows helper to request ability to interact with host’s
desktop; when granting control, host can select whether to allow helper
to view UAC dialog boxes
• Stop Sharing – keeps helper from being able to interact with desktop –
does NOT stop helper from being able to see desktop though
• Pause – pauses session (i.e., if the host wants to open a sensitive
document without the helper seeing)
• Settings – most settings can only be configured on the host computer
o Use Esc key to stop sharing control
o Save a log of this session – available to both host & helper
 Log ONLY contains Remote Assistance-associated activity. I.e.,
info about when session was connected, duration, whether
request for control was granted…no info about actual tasks
carried out during the session.
 Session logs include chat activity done via Remote Assistance
o Bandwidth usage – only available to the host
• Chat – basic text-based chat program for host & helper to, well, chat!
• Send File – allows transmission of files
• Help – brings up Help And Support
Bandwidth Usage Features
Low Don’t allow full window drag; Turn off background
Use 8-bit color
Medium Don’t allow full window drag; Turn off background
Medium-High Don’t allow full widow drag
High No bandwidth optimization
- Troubleshooting Remote Assistance
 Vista uses TCP & UDP ports 49152-65535
 XP uses TCP port 3389
 If XP computer is used as a helper to a Vista host, ensure appropriate exceptions
configured in Windows Firewall and/or Windows Firewall With Advanced Security
 Always check the firewall settings if having issues with connectivity
4.3.3 Remote Desktop
- Does not require anyone to be logged on or to approve the session
 Only way to be kicked off is by user w/authority to log you off if locked normally
Remote Desktop - Only allows single inbound connection (two to server OS’s)
- Remote Desktop connections used to administer a server to
NOT require extra licenses
Terminal Services - Allows multiple inbound connections – each user presented with
his/her own separate desktop environment & most often not
aware that other users are logged on
- Terminal Services connections must be licensed

PAGE 35 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- Configuring Remote Desktop


 Start | Right click Computer | select PROPERTIES | in Tasks pane click REMOTE
SETTINGS | click CONTINUE | In REMOTE tab of System Properties dialog box
select an option for Remote Desktop:
• Don’t allow connections to this computer (default)
• Allow connections from computers running any version of Remote
Desktop (less secure)
• Allow connections only from computers running Remote Desktop with
Network Level Authentication (more secure) – XP SP2 & Vista & Longhorn
- The Remote Desktop Users Group
 To add user to Remote Desktop Users local group (must be a member in order to
connect remotely!)
• Log on as administrator
• Start | Right click Computer | Select MANAGE | CONTINUE |
• In The Computer Management Console, expand the LOCAL USERS AND
GROUPS node |
• Click the GROUPS folder |
• In the details pane of console, double-click the Remote Desktop Users
group | opens the Remote Desktop Users Properties dialog box
• Click ADD & add users to grant access to by typing user account names
• Close the Select Users dialog box | Click OK
- Remote Desktop Connection Application
 Start | All Programs | Accessories | Remote Desktop Connection | enter name or
IP address of remote computer
• Clicking OPTIONS enables more detailed configuration for the session
o General – computer name or IP; open a connection settings file
o Display – configure display settings:
 Display size: specific resolution to full screen
 Number of colors
 Connection bar – visible or not when connected in full screen
o Local Resources
 Sound – by default, sound on host is transmitted to remote
 Keyboard Shortcuts – can configure to work in full screen mode
only (default), on the host computer only, or on computer
making the Remote Desktop connection only
 Local Devices And Resources – can connect your local printer &
clipboard & other resources to the Remote Desktop session –
clicking the MORE button brings up a new dialog box, allows
connection to other volumes on your computer
o Programs tab
 Can configure an app to run right after a connection is
successfully established
o Experience
 Configure how responsive Remote Desktop will be at particular
bandwidths.
Modem 28.8 Kbps
Modem 56 Kbps
Broadband (128 Kbps – 1.5 Mbps)
LAN (10 Mbps or higher)
Custom. Allows you to specify own combo of features

PAGE 36 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

o Advanced
 Server Authentication – verifies the identity of the computer
you’re connecting to; ONLY computers running Vista or
Longhorn able to verify their identities properly. Options are:
• Connect Always
• Warn If Authentication Fails
• Do Not Connect If Authentication Fails
 Connect From Anywhere – configures Terminal Services
gateway settings
• Allows authorized users on the internet to connect to
remote computers on a protected network
• Alternative to creating a protected network through VPN
- Starting & Ending Sessions
 If user is logged on locally & same user tries to log on remotely, remote user will
automatically connect to the local session; can leave programs running at work &
continue working from home
 If user logged on remotely & same user account is used to log on locally, local
user will automatically connect to the remote session; can leave programs
running remotely from home & pick up where you left off at work the next day
 If Remote Desktop session disconnects, the session continues…i.e., if power
outage & didn’t log out, then can log back in to reconnect & don’t lose the
session
 If user tries to log on remotely while different user logged on locally, local user
will receive a prompt saying that a remote user wants to connect
• If local user clicks OK, he/she will be logged off & remote user can log on
• If click Cancel, remote connection attempt is rejected
 If user is logged on remotely and a user tries to log on locally, remote user will
be informed that a local user wants to connect
• If remote user clicks OK, he/she will be logged off & local user can log on
• If click Cancel, local connection attempt is rejected

- Troubleshooting Remote Desktop


 If only certain users cannot connect, check if they’re members of Remote
Desktop Users group
 If can connect via Remote Desktop to one computer & not another, check
firewall settings
 If cannot connect to any computers via Remote Desktop, check Windows Firewall
With Advanced Security settings
 If there’s an extra firewall between the computers trying to connect, that might
be the issue
 NOTE: Remote Desktop user can always respond to UAC dialog boxes

PAGE 37 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

5. CONFIGURING APPLICATIONS INCLUDED WITH WINDOWS VISTA


5.1 CONFIGURE WINDOWS MAIL
5.1.1 Using Windows Mail as an E-mail Client
- Starting Windows Mail for the First Time
 Setup wizard runs | enter Display Name | enter email address (first one entered
becomes primary, but can change this later) |
 On Setup Email Servers page
• Select Incoming email server type (POP3 or IMAP)
• Enter the incoming mail server address
• Enter outgoing SMTP email server address
• Click check box if Outgoing server requires authentication
• Click NEXT
 Enter mailbox name in the Email User Name text box & enter the mailbox
password (not necessary to enter a password)
• Clearing the Remember Password checkbox means Windows Mail will
prompt the user for a password each time they open the application
 By Default, Windows Mail is set to download any email stored in the configured
mailbox when wizard is completed BUT can turn this off by selecting the Do Not
Download My Email At This Time checkbox
- POP3, IMAP4, & SMTP
 POP3 – retrieves email stored on a POP3 server; used by most ISP’s
• Usually retrieve & delete the messages from the mail server
• Can configure to leave messages on the POP3 server
• Uses TCP/UDP port 110
• If used with SSL, uses port 995
 IMAP4
• More advanced than POP3
• Allows continuous connection to a mailbox on the incoming mail server
• Can connect multiple email clients to the same mailbox simultaneously
• Can create mail folders on incoming mail server & move messages
 SMTP
• Can only be used to send email, not retrieve
• Uses TCP/UDP port 25
- Windows Mail Settings
 Tools | Settings |
• Tabs: General; Read; Receipts; Send; Compose; Signatures; Spelling;
Security; Connection; Advanced
• Can change settings such as:
o Whether sound displayed when message arrives
o Whether Windows Mail synchronizes as startup
o How often Windows Mail checks for new messages
o Whether message sent immediately or next time synchronizes
o Signatures for outgoing messages
o Spell check
o Etc…
• Offline mode – allows you to use Windows Mail without synchronizing
- Multiple Accounts and Advanced E-Mail Account Settings
 To add new accounts
• Tools | Internet Accounts | Add | Email Account |
• Editing account properties allows for advanced configuration

PAGE 38 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

o General Tab
o Servers Tab
o Connection Tab – specify what type of connection to make when
synchronizing the account if different than IE Internet Options
settings; useful for VPN-only accounts
o Security Tab
o Advanced Tab – can configure account to use nonstandard ports,
configure timeouts, leave messages on server (can remove from
server after xx days), or break apart messages larger than xxx size
into smaller parts
• NOTE: IMAP accounts have different set of properties – main difference is
in the Advanced properties:
o Can set Windows Mail to check for new messages in all folders on an
IMAP server
o Can configure special folder properties for Sent Items, Drafts, Deleted
Items & Junk Email folders on the server
- Viewing the Windows Mail Inbox
 View Menu | Current View |
 Preconfigured message views:
• Show All Messages – default view; message that have been read are
displayed less prominently than unread (usually bolded)
• Hide Read Messages – after read message, “disappears”
• Hide Read Or Ignored Messages – hides read & also uses message rules
to designate less important messages & hide them from you
 NOTE: Grouping Messages – Message grouping my conversation can be used
with any of the preceding options for the message views…
 Creating Custom View via: Define Views | New View |
• Available Conditions for creating Custom Views:
o Message is from one of a group of listed emails
o Subject line contains one or more specific words
o Sender has marked the message as a priority
o Message received from a particular account (i.e. for when have 2+
email account set up in Windows Mail)
o Message was sent more than XX days ago
o Message is longer than XX lines
o Message has an attachment
o Message has been read
o Message body has been downloaded
o Message is flagged
o Message is watched or ignored
o Message is secure
 NOTE: cannot use views to move message between folders or copy/delete
- Message Rules & Folders
 Configure Windows Mail to process incoming mail prior to reaching the mailbox
 Can create folders for specific senders, topics, etc. & create rules to
• Move message to specific folder
• Copy message to specific folder
• Delete message
• Forward message to email address or set of emails
• Highlight message in chosen color
• Flag message

PAGE 39 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

• Automatically mark message as read


• Mark message as watched or ignored
• Send an automatic reply
• Not download message from the mail server
• Delete message from mail server
• Stop processing more rules – useful when there are multiple rules…
 Clicking APPLY NOW in the Message Rules dialog box applies new rules to a
chosen folder & subfolders immediately
- Junk Email Options
 Options tab
• No Automatic Filtering – mail from blocked senders still sent to Junk email
folder
• Low – move most obvious junk email to Junk email folder
• High – most junk email is caught, but some regular mail may be caught
as well. Check your Junk email folder often
• Safe List Only – only mail from people or domains on your Safe Senders
List will be delivered to your Inbox
• CLEAR the ‘Permanently delete suspected junk email instead of moving to
the Junk email folder’ box to be safe
 Safe Senders tab
• All messages from email addresses added here BYPASS junk email filters
• Can add domain names to Safe Senders list too
 Blocked Senders tab
• Can add email addresses & domains
 International tab
• Blocked Top-Level Domain List – can block based on origin country only,
not other top-level domains
 Phishing tab
• Protected by default but can disable protection here if so wish
- Searching Email
 Quickest way is to enter a query in the Search box at top right corner
 For more detailed search, use Edit | Find Message dialog box
• Searches through all mail folders on basis of sender, recipient, subject,
message, data received, message text, attachments, flagged status
- Importing and Exporting Messages
 Can import message from:
Microsoft Exchange 5.5, 2000, 2003 & 2007 Microsoft Outlook PST Files
Microsoft Outlook Express 6 Windows Mail
• Except for Exchange, MUST perform an export before importing into Mail
 To Import, go to File Menu | select Import | select Messages | select message
format from which to import
 NOTE: Windows Mail can also import contacts, mail account settings, & news
account settings
 Windows Mail can only export to a Microsoft Exchange Server through Message
Application Programming Interface (MAPI) or to Windows Mail
5.1.2 Using Newsgroups with Windows Mail
- Adding News Servers
 NNTP: Network News Transfer Protocol
 To add News Server:
• Open Windows Mail | Tools | Select ACCOUNTS | click ADD|
• On Select Account Type page, click NEWSGROUP ACCOUNT & NEXT

PAGE 40 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

• In Display Name text box, enter name (usually same as for mail account) &
click NEXT
• On Internet News Email Address Page, enter email address of account
configured in Windows Mail & Click NEXT
• On Internet News Server Name page, enter name of the NNTP server to
connect to; if required, check “My news server requires me to log on” & click
NEXT
• If selected the log on required checkbox, enter your authentication
credentials & click NEXT…otherwise click FINISH & the news server account is
displayed in the Internet Accounts dialog box
- Subscribing & Unsubscribing to Newsgroups
 When add a new news server, Windows Mail asks if you want to download list of
newsgroups that the server carries OR can use the Search box
 Access via Tools | Newsgroups |
 If want to see the contents, click on the newsgroup & click GO TO
 Clicking RESET LIST button to retrieve entire list of newsgroups from server
 Clicking NEW tab shows only newsgroups added since you last subscribed
- Downloading Articles
 When you open a newsgroup message, Windows Mail retrieves the content of
the message from the news server
 Can use filters to automatically download message that meet selected criteria
 Online & Offline Modes
• Online mode – opening a message downloads the body of the message from
the NNTP server & displays on the screen
• Offline mode – can connect, download headers, disconnect, mark message of
interest for download, go back online & download body of marked messages
• When right click a newsgroup under its newsgroup server, can configure
following Synchronization settings:
o All Messages – 300 messages at a time, including their content
o New Messages Only – only those posted since last synch with server
o Headers Only – downloads all headers currently stored on news
server; checked against headers you already have so no duplication
• Right clicking “CATCH UP” marks all articles in group as read
 Reading Newsgroups
• Flags – work on a per message basis & are usually applied via filters
• Watching – works on a per conversation basis
• Can ignore conversations (select conversation & select Ignore on Message
menu)
• To access large files that have been split into multiple attachments, need to
combine & decode them (Select messages | Message Menu | Combine &
Decode)
 Message Menu:
• Flag Message
• Watch Conversation
• Ignore Conversation
• Unscramble
• Combine & Decode
 Views and Newsgroups
• Default newsgroup views
o Show All Messages
o Hide Read Messages

PAGE 41 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

o Show Downloaded Messages


o Hide Read Or Ignored Messages
o Hide Answered Messages
o Show Only Useful Conversations
• Views apply to ALL newsgroups, vs. Rules which apply only to the
newsgroups that they are configured for
• Defining Custom Views
o In Windows Mail, click a newsgroup
o Select two message in the newsgroup
o On the Message menu, click FLAG MESSAGE
o Click YES to add the Flagged Message Column
o Click the VIEW menu | Click CURRENT VIEW | Click DEFINE VIEWS
o Click NEW; Where the Message is Flagged:
• Show/Hide
• Show Message
• Enter name of view
o Click OK | select the newly created view | click APPLY VIEW
o Click OK to close Define Views dialog box
 Newsgroup Rules
• Tools | Message Rules | News | New News Rules Window |
• Possible Conditions:
o Message is in a specified newsgroup
o From line contains people
o Subject line contains specific words
o Message is from specific account
o Message sent more than X days ago
o Where number of lines in message is not more than X lines
o All Messages
• Possible Actions
o Delete message
o Highlight message in chosen color
o Flag the message
o Mark the message as read
o Mark the message as watched or ignored
o Mark the message for download
o Stop processing rules
 Rating Posts
• Supported by some news servers, not all
• Need to be logged on with Microsoft Passport account
• Right click a post to rate | click RATE | click Please Sign In To Microsoft
Communities | enter Passport email & password | click SIGN IN
• Can rate as “useful” or “not useful”
• Can use ratings as view or rule criterion
 Posting and Replying
• NEW POST: Open newsgroup & click the New Message icon | verify the
Newsgroup field contains the group you want to post to | enter multiple
newsgroups separated with semicolon but discouraged | can also use CC field
to copy through email
• Selecting a Post Type – Comment / Question / Suggestion
• Format menu – can choose between Plain Text (generally used on Usenet) &
HTML

PAGE 42 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

• When replying, can Reply To Group (goes through newsgroup to all) or Reply
(goes through email to post originator)
• To Cancel a post, select it & from the Message menu, select Cancel Message
(can only cancel your own messages)
5.1.3 Troubleshooting Windows Mail
- Usually, problems caused by issues external to application
- Check that mail server supports POP3 or IMAP
- If can receive but not send, check SMTP server address
- Send test email to yourself from within Windows Mail
- Google the error messages received in Windows Mail
- If configure Windows Mail to leave mail on your server, check mailbox quota
- When creating view, double-check your view/hide options
- Check Junk folder for “missing” emails & place sender on Safe Senders list
 Tools | Junk Email Options | Safe Senders |
- If rule not functioning properly, check that message not being bounced by another rule
with higher priority

5.2 CONFIGURE WINDOWS MEETING SPACE


5.2.1 Windows Meeting Space Capabilities
- Does NOT broadcast audio, so need other means of oral communication (conference call
or at a meeting table)
- Private messaging is allowed
- Users can share:
 Desktops
 Documents
 Applications – including open documents!
- Uses peer-to-peer technology, not a centralized server – so can create meetings without
traditional network infrastructure – BONUS!
5.2.2 Configuring People Near Me
- Need Firewall exceptions, and hence Administrative privileges
- Broadcasts:
 Nickname
 Computer Name
 PC’s IPv6 address
 Port #
- When first run, get UAC prompt
- Control Panel | Classic View | People Near Me |
 Defaults to User Log On name (but can be changed)
 Clicking CHANGE PICTURE will change it for the User log on too
 Can set to only allow invitations from Trusted Contacts (with digital certificates)
 Blocking invitations does NOT block a user from joining Meeting Space meetings
– can still view available meetings or use an invite file to connect to a meeting
 Can allow People Near Me to automatically start when user logs onto Windows
• This is a PER USER setting
 Sign In Tab – sign into & out of People Near Me
5.2.3 Using Meeting Space
- When run Meeting space, given three options:
 Start A New Meeting |
• Enter meeting name & password (default is People With Me & current time)
• NOTE: if setting up an ad hoc meeting, name must be > 15 characters

PAGE 43 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

• NOTE: password must be 8 characters with mixed case, numbers, symbols


• Send passwords to participants prior to meeting via pone, SMS, email, IM…
 Joint A Meeting Near Me
 Open An Invitation File
- Sending Invitations
 Three methods of sending invites:
• Using People Near Me – used only if all users are logged onto People Near
Me
o In Meeting Space | Click INVITE PEOPLE |
o Select check box for each person you want to invite to the meeting
o Click SEND INVITATIONS
• Sending an email using the default email application – usually the winner
o Click INVITE PEOPLE |
o Click on INVITE OTHERS button |
o Click Send An Invitation In Email
o Launches default email client
• Generating an Invitation file – commonly used if have web based email
o Click INVITE PEOPLE |
o Click on INVITE OTHERS button |
o Click Create An Invitation File
o Asks for location to save Invitation File
 Once invites are sent, invited participants are dimmed in the Participants listing
• A RED X next to an invitee’s name indicates they declined the invite
 ANY user who is connected to a meeting can send invitations to other people, so
people you invite can add people you might not want & you can’t block them
 Meetings only finish when ALL participants leave
 Can reconnect after leaving, but need to reenter password
- Share an Application or Document or Desktop
 Only one person can interact with shared object at a given time
 Only one meeting user can share an application at a time
 Shared apps displayed with a modified title bar (states “Currently Sharing”)
 Can delegate control of a shared app to another participant if you’re the person
currently control of the app
• BUT original sharer can always interact with it even when someone else is
delegated control
• Can PAUSE & do a fix that you don’t want others to see & then resume
• To take back control
o Click Control menu | select TAKE CONTROL |
o OR – WINDOWS KEY + ESC
- Handouts
 To add a handout:
• Click Add Handout Icon in Handouts area |
• If handouts are currently distributed in the meeting, click the green Plus icon
• Click OK to reminder message
• Select handout & click OPEN
 Any meeting participant can delete handouts – removes from meeting only
- User Status & Passing Notes
User Status Busy
Options: Away
Be Right Back
Available

PAGE 44 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 To send another user a private note:


• Right click the user name | click SEND A NOTE | type message | Click SEND
- Ad Hoc Wireless Meetings
 To Start an Ad Hoc Meeting:
• Start Windows Meeting Space | click START A NEW MEETING
• Select a meeting name & password | click OPTIONS |
• Select the CREATE A PRIVATE AD HOC WIRELESS NETWORK checkbox
• Select your country/region from drop-down list
• When users with wireless adapters in range of convener’s computer open
Meeting Space, they will see the meeting listed under “Join A Meeting Near
Me” & can joint the meeting if provide the password
 NOTE: to join an Ad Hoc Meeting, need to manually disconnect form a wireless
network first, otherwise will fail!!
5.2.4 Troubleshooting Windows Meeting Space
- If participant can’t connect to meeting, check IPv6 address configuration & firewall
settings
- If client can’t connect, check that IPv6 has been enabled on all network interfaces
- If IPv6 enabled, users on separate IPv4 subnets can join the same meeting if one of the
following conditions is met:
 All routers between subnets must support IPv6
 An Intrasite Automatic Tunnel Addressing Protocol Deployment (ISATAP) server
is used on the network (Windows Server 2003 & later & can configured as
ISATAP servers – they lease global IPv6 addresses
 Clients are using Teredo, an IPv4/v6 transition technology that comes with Vista;
allows IPv6 connectivity across IPv4 internet even when two end-point
computers are located behind NAT devices
- Check for following firewall exceptions
 Windows Peer-To-Peer Collaboration Foundation
 Windows Meeting Space
 Connect To A Network Projector
- Limit participants to 10 or less for optimal performance
- Video, audio, & DirectX applications cannot be shared using Windows Meeting Space

5.3 CONFIGURE WINDOWS CALENDER & WINDOWS CONTACTS


5.3.1 Windows Contacts
- Stored in: Desktop > User Name > Contacts
- Access Via: Start | All Programs | Windows Contacts
- Each contacts stored in separate file in special directory
- Creating New contacts using emails stored in Windows Mail
 Can set Windows Mail to automatically add everyone you send emails to onto
your Contacts list (but can be a bit long then…)
- Creating a New Contact Manually
 New Email | To | New Contact
 Can also click the New Contact button & enter at least one piece of name
information (first name, middle name, last name, nickname) – generally put in a
name & email address…if synch with a mobile device, might include more info
 When open a new contact the Name And Email Tab is displayed; can Set
Preferred contact email if more than one exists
 Other tabs:
• Home – street address, city, state/province, post code, country/region,
phone, fax, cell, website

PAGE 45 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

• Work – ditto
• Family – gender, birthday, anniversary, spouse/partner, children
• Notes – can enter misc notes about a contact
• IDs – associate digital certificates with email accounts – NECESSARY to
have a certificate associated with a contact in order to become a Trusted
Contact for Windows Meeting Space
- Importing and Exporting Contacts
 Windows Contacts Toolbar | Import/Export buttons |
 Import:
• CSV
• LDIF (LDAP server)
• vCard (VCF file)
• Windows Address Book File (Outlook Express Contacts)
 Export:
• CSV – share all
• vCards – share some
- Using Contact Groups
 To Create New: click New Contact Group button | click Add to Contact Group |
enter individual emails without entering as contacts OR click Create New Contact
OR select an existing contact
5.3.2 Windows Calendar
- Can publish & subscribe to shared calendar without NOS or Server
- Creating a New Appointment Details to consider:
 Appointment title
 Location
 Calendar – if have multiple calendars, drop-down menu allows you to select one
 URL – can place URL for the meeting agenda to share the plan
 Appointment information – configure date & time of appointment (if attendees
are in different time zones, automatically adjusts when they import the item)
 Recurrence – how often the meeting will recur, if at all
 Reminder – display a dialog box as a reminder at a preset time before meeting
 Participants – enter contacts or email addresses
• Clicking the INVITE button generates an email addressed to meeting
participants
• Can also right click an existing appointment & select Send, manually adding
addresses you want to send it to using Windows Mail
 Notes area – add misc. info about the appointment.
- Sharing Calendars with Others
 To Publish a Calendar:
• Right click the calendar in the Calendars list on the left side of the screen
• Select PUBLISH | opens the Publish Calendar dialog box
• Enter a Calendar Name (no spaces, but can use underscores)
• Enter location to publish to (website or fileshare)
• Select whether to Automatically Publish Changes Made To This Calendar
• Select Calendar Details to Include (Notes / Reminders / Tasks)
• Click PUBLISH
 If Calendar not automatically set to publish updates, can right click & select SYNC
- Subscribing to Shared Calendars
 Must know location/URL – cannot browse to it
 Right click in the Calendars area & select SUBSCRIBE
 Can be located on Network Shares or on Websites

PAGE 46 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Must have permission to access the location where calendar is hosted


 After enter location, configure subscription settings
• Calendar Name
• Update interval (none / 15 min / hourly / daily / weekly)
• Include Reminders?
• Include Tasks?
• FINISH
- Importing and Exporting Calendar Files
 File | Export | File Name (*.ics) | …saved to users Documents folder
 File | Import |
• Can create new OR
• Merge with Existing
- Troubleshooting Shared Calendars
 For person sharing their calendar, check settings to automatically publish
changes when made
 Check if person sharing calendar has stopped publishing
 Check update interval for person subscribing

5.4 CONFIGURE & TROUBLESHOOT MEDIA APPLICATIONS


5.4.1 Configuring Windows Media Center
- Available with Home Premium & Ultimate editions
- Configuring TV Settings and Digital Cable Devices
 Should install TV Tuner PRIOR to setting up Media Center
 First time run Media Center, the Setup Wizard runs
• Privacy policy pages…blah blah blah
• Select whether Media Center periodically connects to internet to retrieve
album/DVD cover art & TV Program Guide listings & music/movie info
- Configuring TV Settings and Digital Cable Devices
 Media Center | Tasks | Settings | TV |
• Setup TV Signal | Next | Confirm Region | You Are Done! page | click on
SET UP GUIDE & click NEXT | click NEXT on Set Up Your TV Program Guide
page | click YES & NEXT on Guide Privacy Page | select I AGREE on Guide
Terms Of Service Page & click NEXT | Enter Your Postal Code & click NEXT
| guide listings downloaded | select TV signal provider & click NEXT | TV
Program Guide downloaded | click NEXT when download completed | On
Scan For Services page, click START SCAN | Click NEXT | Click FINISH
• Configure TV or Monitor
• Audio
• Closed Captioning
 When configuring Media Center for TV, scans for following Digital Signal Types:
Antenna Direct Cable Connection
Satellite Set Top Box
- Setting Up Media Center & Configuring a Windows Media Center Extender
 Can use a Media Center Extender to act as intermediary between computer & TV
 Commonly Xbox 360 – can connect to LAN, either wirelessly or via UTP cable
 If connect Media Center Extender to Media Center computer’s subnet:
• Dialog box is automatically displayed: this device was found on your
network, would you like to set it up now? – YES/NO
• YES launches Windows Media Center
• Optional Setup Page allows configuration of the Extender
o Can set up the Pictures, Music & Video libraries

PAGE 47 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

o NEED to configure libraries if want to show/display something other


than TV or DVD’s through your Media Center Extender
• If select option to SET UP EXTENDER, opens Extender Setup Page
• On the Xbox 360, navigate in the console to the Media section & use
controller to select the Media Center item – the Xbox then provides info
about how to complete the setup
o Performs a check on the network
o Displays an 8-digit key on the TV
• On the Vista Computer, enter the Setup Key – 8-digit key displayed on TV
that is connected to Windows Media Center Extender
 If Media Center Extender not automatically detected, check Firewall settings
• Should also determine whether want to have computer running Windows
Media Center using AWAY MODE – allows Extender to connect at any time,
even when computer appears shut down…can wake up computer remotely
with the Media Center Extender
• BUT increases power consumption
- Configuring Media Center Display
 Video Setup Wizard – queries you on which monitor you want to display content
if multiple monitors are connected
 User provides info about connection type; monitor aspect ratio; display resolution
 NOTE: when LCD monitor, configure to use native resolution for best results
- Troubleshooting Recording Issues
 Scheduling Recording issues – inaccurate schedule or Vista time settings
 Recording quality – use Advanced Recording function to reduce quality to use
less space
 Tasks | Settings | TV | Recorder | Recorder Storage | Recording Defaults | Keep Settings:
Until Space Needed Until I Delete
Until I Watch For One Week
 Tasks | Settings | TV | Recorder | Recorder Storage |
• Configure disk volume you’re recording to
• Configure max. amount of disk space to allocate to recorded programs
• Configure Live TV Pause Buffer (Stop When Possible – xx min. before/after)
 Parental Controls – cannot be applied on a per-user basis
• Media Center requires access code to view restricted content
 Configuring Region
• TV Signal | Confirm Your Region | (uses Vista install settings by default)
• Can select different region if so wish (i.e. if you move)
 Automatic vs. Manual signal configuration
• Can scan for services
• Easier to let Media Center perform automatic tuning than to perform
Manual one BUT may need Manual to add weak channel…
 Library Issues
• Media Center looks for content only in configured directories
• Add new directories: Media Center | Add Folder To Watch |
o Add folders on this computer
o Add shared folders from another computer
o Add folders from both locations
• Browse to location
5.4.2 Configuring Windows Media Player
- WMP facts:
 Available with all Vista editions

PAGE 48 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Media Player can only play back television broadcasts, cannot record like Media
Center
 WMP can be used to only display media through a Media Center Extender
Device, cannot share through one like Media Center
 Can be used to rip audio from CD; Media Center can only play
- Ripping & Digital Rights Management
 Click on Rip tab | hold down ALT key & select OPTIONS from TOOLS menu | click
RIP MUSIC tab to show ripping options |
• Rip music to this location – can change location & file name
• Rip Settings – format; copy protect music; rip CD when inserted; eject CD
when ripping complete
• Audio quality – slide bar from Smallest Size to Best Quality
 Can rip audio with following formats
Audio data type: CD consumes this much space:
Windows Media Audio 56 MB
Windows Media Audio Pro 28 MB
Windows Media Audio (Variable Bit Rate) 18-33 MB
Complex audio uses higher bit rate
Simple audio uses lower bit rate
Windows Media Audio (Lossless) 206-411 MB
Highest quality recording format
MP3 57 MB
WAV (Lossless) 600 MB
Older format, from earlier Windows
 NOTE: higher bit-rate = higher audio quality = higher disk space usage
 MP3 & WAV formats do not support copy protection technology
 Rights backup – WMP does NOT allow for backup of media usage rights
- Media Sharing Configuration: in WMP, click on ANY tab menu & click MORE OPTIONS
 Navigate to LIBRARY tab & click CONFIGURE SHARING
 Select the SHARE MY MEDIA checkbox & click OK
 When compatible device connected to network, select if share media with it
- Codecs
 Codec – Method of encoding data
 Each media format requires separate codec
 May need to obtain codec for WMP to play new media file type
 Options | Player Tab | check “Download codecs automatically”
- Adding MetaData
 Right click file in library | click ADVANCED TAG EDITOR | TABS:
Track Info Artist Info Lyrics Pictures Comments
Title Artist Language Picture types Language
Subtitle Lyricist Text Cover Text
Genre Album Artist Synchronize lyrics Description
Mood Conductor
Track No Orig. Artist
BPM Orig. Lyricist
Key Composer
Album Websites
Original Album
Set
Subgenre
Language

PAGE 49 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

5.5 CONFIGURE WINDOWS FAX AND SCAN


5.5.1 Setting Up Fax and Scan
- Fax Accounts
 Tools | Fax Accounts |
 Each account allows you to configure a separate fax device
- Multiple Fax Modems
 Tools | Fax Settings | Select Fax Device | select from drop-down menu
- Sending Faxes
 Print To Fax
• After you configure new fax account, a New Printer with the fax account’s
name is in the Printer list in Control Panel
 Windows Fax & Scan
• Click NEW FAX button | fill out recipient details | add attachment
 Send Cover Page Only
• Do not attach document, ONLY send cover page
- Configuring Scanners
 NOTE: fax resolution significantly lower than that of normally printed documents
 Therefore, don’t need to set scanner resolutions very high or in color
- Receiving Faxes
 Windows Fax & Scan | Tools | Fax Settings:
• Manually Answer – when incoming call detected, user is notified & user can
choose to receive the fax
• Automatically Answer after specified number of rings – does not require
user interaction to accept faxes
• Clicking MORE OPTIONS in General tab brings up ability to:
Configure TSID & TSID: Transmitting Subscriber Identification – info
CSID settings about you sent to fax machine you’re sending a fax to
CSID: Called Subscriber Identification – info sent back
to person who is sending you a fax
Specify what Fax Print each received fax automatically to a printer
& Scan should do Save copy of incoming fax to another location
when a fax is
received
- Advanced Fax Settings
 Tools | Fax Settings | Advanced Tab |
• Set Fax Archive location
• Chose whether to Include banner in sent faxes (TSID, page #, Recipient
Fax #)
• Redialing (# of attempts & dial again after xx minutes)
• Discount rates settings (times of day)
- Fax Options
 Windows Fax & Scan | Tools | Options |
• General tab
o Set sound played when message received
• Receipts tab
o Delivery Receipts
 NONE –or–
 Email To: enter address or select from address book
• Can use one rcpt. for delivery to multiple recipients
• Can Attach copy of sent fax
• Send tab

PAGE 50 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

o Whether original message included when fax is replied to


• Compose tab
o Font used

5.6 CONFIGURE WINDOWS SIDEBAR


5.6.1 Configuring Side Bar Settings
- Right click Sidebar | Select PROPERTIES | shows Windows Sidebar Properties dialog box,
where you can configure:
 Whether Windows Sidebar starts automatically when Vista starts
 Whether Sidebar is displayed on top of all other windows
 Which side of screen Sidebar is displayed on
 Which monitor Sidebar is displayed on if more than one installed
 A list of running gadgets that you can view
• NOTE: can uninstall a gadget ONLY from the Gadget Gallery
 If close Sidebar, can open via Start | All Programs | Windows Sidebar |
- Adding Gadgets to Windows Sidebar
 Click PLUS SIGN on top of the Sidebar | opens Gadget Gallery | drag gadget
directly to Sidebar OR double-click gadget
 Click GET MORE GADGETS ONLINE to launch browser & download more gadgets
5.6.2 Configuring Gadgets
- Click on the CONFIGURE GADGET ICON (the little tool) OR Right click & select OPTIONS
- Configuring Gadget Opacity
 Right click | Select OPACITY | 20% - 40% - 60% - 80% - 100% (default)
- Placing Gadgets on the Desktop
 Place on Sidebar & then drag to desktop position
 Often allows more info to be displayed
 Can move detached gadgets back to Sidebar from Desktop
 Can modify properties of detached gadgets by Right Clicking (modify opacity)
 Right click Sidebar | BRING GADGETS TO FRONT also displays detached gadgets
5.6.3 Troubleshooting Gadgets
- If Gadget displays “Service Unavailable”, can’t connect to service to display information
- Once connectivity restored, gadget automatically displays info
- Can restore gadget after it’s uninstalled by opening Windows Sidebar Properties &
clicking RESTORE GADGETS INSTALLED WITH WINDOWS (if installed from internet, will
have to download again)

PAGE 51 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

6. MAINTAINING & OPTIMIZING SYSTEMS THAT RUN VISTA


6.1 TROUBLESHOOT PERFORMANCE ISSUES
6.1.1 Implementing ReadyBoost
- Configuring a Flash memory Device for ReadyBoost
 Insert USB flash memory device (or other type of flash memory device)
 When autoplay dialog box appears, choose from
• Use the Device to Store Files
• Use the Device to Speed Up The System
 Select second option | user needs to specify (in ReadyBoost tab of device’s
Properties dialog box) that Vista should use device for this purpose & indicate
how much flash memory should be allocated
• By DEFAULT, 95% of available free space
• Recommended to set to be 1x – 3x physical RAM
- ReadyBoost Facts
 Needs fast & consistent random performance memory
• 2.5MBps for 4 KB random reads
• 1.75MBps for 512 KB random writes
 Can use up to 4GB flash memory for ReadyBoost (limitation due to FAT32) & as
small as 256 KB
 ReadyBoost does NOT put paging file onto flash memory – only used as cache;
paging file still stored on hard disk drive
 ReadyBoost reduces paging because increases amount of RAM system can use
for caching BUT ReadyBoost cache memory is NOT virtual memory
 If user pulls ReadyBoost USB device, Vista continues on – all pages on the USB
device are backed up by a page on hard disk
 Data written to ReadyBoost device is encrypted using AFS-128 algorithm
 Can use only one ReadyBoost device per machine; may change in future Vista’s
 USB HDDs are not currently fast enough to be used as ReadyBoost Devices
- ReadyBoost Considerations
 Cannot use ReadyBoost-allocated space to store data/files
- Improving Performance with ReadyBoost
 Control Panel | System & Maintenance | Performance Information & Tools | Click
on ADVANCED TOOLS | Click on GENERATE A SYSTEM HEALTH REPORT |
CONTINUE | Check if RAM warnings present / check RAM ratings
 Use flash memory device for ReadyBoost & rerun tool – check for improvement
- Transfer Rate Considerations
 Flash memory is NOT as fast as RAM – has good read speed, slower write speed
 USB 2.0 – 480 Mbps (but usually peaks at 300 Mbps in practice)
 Internal fiber channel HDD – 200 Mbps+
 External FireWire HDD – up to 400 Mbps
 7200 RPM SATA drives – up to 500 Mbps
- Page-File vs. Solid-State Hard Disk Drive
 Can use flash memory device to hold page file
 In addition to moving virtual memory to a second hard disk, can also allocate
flash memory for this purpose IF not already allocated for ReadyBoost – little
advantage to doing this, many disadvantages (doesn’t really boost performance)
- Hybrid Hard Disk Drives (HHDD)
 Can be SDRAM & require battery backup OR
 Flash memory so not lost if battery fails
 Vista ReadyDrive feature can take advantage of H-HDD by using built-in RAM to
intercept data & dispatch to hard disk for long-term storage…

PAGE 52 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

• Improves laptop battery life


• Reduces mechanical HD usage
• Allows for faster recovery from Sleep
- Solid State Hard Disk
 Built-in RAM
 4 GB – 64 GB+ flash memory devices
 Phase-change Random Access Memory (PRAM) may use SSDs
6.1.2 Using Performance Information & Tools to Troubleshoot Performance Issues
- Control Panel | Performance Information & Tools |
- Managing Startup Programs
 Opens Software Explorer – can disable programs in startup to speed up
- Adjusting Visual Effects
 Let Windows Vista select best (recommended)
 Best Appearance
 Best Performance
 Custom
 NOTE: in Data Execution Prevention Tab, can ensure that DEP is enabled for:
• Essential Windows programs & services OR
• For all programs & services except those specified
• DEP is security feature – helps prevent damage from virus or malware
attack that tries to execute code from system memory locations reserved
for Windows & other authorized programs; if DEP notices program using
memory incorrectly, shuts it down & notifies User
 Performance Options dialog box – shown here but NOT actually part of Visual
Effects, just accessible from here
• Advanced Tab
• (Also accessible via Control Panel | System & Maint. | System | Advanced
System Settings | Settings | )
• Click CHANGE in Virtual Memory Section | adjust virtual memory settings
- Adjusting Indexing Options
 Indexing options can speed up search functions – can narrow search to focus on
files & folders in common use
 Control Panel | System & Maintenance | Power & Indexing Options | Indexing
Options | Advanced Options | adjust indexing settings / restore defaults / specify
location for index / specify file types to be indexed
- Adjusting Power Settings (laptops & tablets)
 Control Panel | System & Maintenance | Power & Indexing Options | Adjust
Power Settings |
- Performing a Disk Cleanup
 When Click on OPEN DISK CLEANUP, prompted to select:
• Drive to clean up
• Specify whether want to clean up your own files only OR all users on
computer
- Control Panel | System & Maint. | Perf. Info & Tools | Advanced Tools |
Event Log Appearance/Performance
Reliability & Performance Monitor Disk Defrag
Task Manager System Health Report
System Information
6.1.3 Resolving Startup, Shutdown, and Hanging Issues
- Using the Problems Reports And Solutions tool
 Control Panel | System & Maintenance | Problem Reports & Solutions |

PAGE 53 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Displays problem solutions available & gives info on reported problems that don’t
have a solution yet
 Stores problem history so can check for solutions in future
- Dealing with Unresponsive Programs
 Vista usually fixes automatically
 Otherwise, can use Task Manager to close or restart program
 If IE hangs regularly, check for spyware or viruses or other malware

6.2 TROUBLESHOOT RELIABILITY ISSUES USING BUILT-IN DIAGNOSTIC


TOOLS
6.2.1 Using the Windows Experience Index Tool
- Access via: Control Panel | System & Maintenance | click CHECK YOUR COMPUTER’S
WINDOWS EXPERIENCE INDEX BASE SCORE under “System”
- OR via: Control Panel | Classic View | Performance Information & Tools | …
- Components Used to Determine System Performance
Component Measurement
Processor Calculations per second
Physical Memory (RAM) Memory operations per second
Graphics Windows Aero Desktop performance
Gaming graphics 3D graphics performance
Primary hard disk Disk date transfer rate
 Rating of 1-2: can usually perform basic tasks but shouldn’t be used for games
or multimedia
 Rating of 3: usually can run Aero & play DVDs, might have problem with HDTV
 Rating or 4+: will run software & multimedia apps well
 Rating of 5: high performance or customized computers; rare
6.2.2 Using Event Viewer
- Control Panel | System & Maint. | Perf. Info & Tools | Advanced Tools | Event Viewer |
Categories for Critical
recorded events: Error
Warning
Information
- Windows Logs
 Application Log – program events
• Errors – significant problem, i.e. data loss
• Warning – nothing bad yet, but maybe…
• Information – successful operation of a driver, program, or service
 Security Log:
• Audit Success
• Audit Failure
 Setup Log – stores setup events
 System Log – stores system events logged by Vista & Vista system services
• Critical
• Error
• Warning
• Information
 Forwarded Events – stores events forwarded by other computers
- Custom Views – To create custom view to show events from Network Diagnostics:
 Log on using Administrator account used to install Vista if possible

PAGE 54 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Control Panel | System & Maintenance | Click PERFORMANCE INFORAMTION &


TOOLS | click ADVANCEED TOOLS | click VIEW PERFORMANCE DETAILS IN
EVENT LOG | CONTINUE |
 In Event Viewer, right click Custom Views | select CREATE CUSTOM VIEW
 In Filter tab, select from any combo of: Critical & Error & Warning & Information
event level checkboxes
 Select BY SOURCE | in Event Sources drop-down list, select DIAGNOSTICS-
NETWORKING & TCP/IP & TCPIP checkboxes (or any combination thereof)
 Click OK | in Save Filter To Custom View dialog box, enter name & description
 Click OK
 In Event Viewer, expand CUSTOM VIEWS & select newly created view
- Applications & Services Logs
 Distributed file system (DFS) replication log
 Encrypted file system (EFS) debug log
 Function discovery provider host service tracing log
 Hardware events log
 Internet Explorer log
 Key management service log
 Media center log
 Windows logs
 Microsoft Windows services performance diagnostic provider diagnostic log
- Attaching Tasks to Events
 Event Viewer | click on an event in the Security Log or other log | click ACTION |
ATTACH TASK TO THIS EVENT |
 OR Right click event | select ATTACH TASK TO THIS EVENT
- Using Network Diagnostics with Event Viewer
 Windows Logs | System | can filter for “Source” = Diagnostics-Networking
6.2.3 Using the Problems Reports and Solutions tool
- Control Panel | System & Maintenance | Problem Reports & Solutions
- Click CHANGE SETTINGS in left pane | enable “Check for solutions automatically”
(recommended)
- Click ADVANCED SETTINGS | (requires elevated privileges)
 Specify whether all users can alter Problem Reports & Solutions Tool settings OR
 They can specify whether they want to send report to Microsoft
- Check Problem History: Problem Reports & Solutions |Click SEE PROBLEMS TO CHECK |
CHECK FOR SOLUTIONS TO THESE PROBLEMS
- Can click CHECK FOR NEW SOLUTIONS in left pane of Problem Reports & Solutions Tool
6.2.4 Using Advanced Diagnostics & Analysis Tools
- Available via: Control Panel | Classic View | Performance Information & Tools |
Advanced Tools dialog box |
 Reliability and Performance Monitor
• Resource View – Windows reliability & Performance Monitor home page
o Monitor CPU, disk, network, & memory resources in real time
• Monitoring Tools | Performance Monitor – provides visual display of built-in
Windows performance counters
o Add performance counters by dragging & dropping
o OR by creating custom data collector sets
o Multiple Views – report format or real time line graph/histogram
o Benchmarking with Performance Monitor – collect date from counters &
repeat later & compare
• Monitoring Tools | Reliability Monitor

PAGE 55 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

o Provides overview of system stability & trend analysis


o Software (Un)Installs
o Application Failures
o Hardware Failures
o Windows Failures
o Misc. Failures
 Task Manager | Tabs:
• Applications – lists currently running applications
• Processes
o Can end a processor OR set Process Priority
o To add columns to view memory usage: View | Select Columns | select
memory value from following (Memory - Private Working Set displayed
by default):
 Memory – Working Set: private + shared memory
 Memory – Peak Working Set: max working set amount
 Memory – Working Set Delta: change in working set memory
used by process
 Memory – Commit Size: amount of virtual memory reserved for
use by process
 Memory – Paged Pool: committed virtual memory for a process
that can be written to another storage medium, i.e., hard disk
 Memory – Nonpaged Pool: committed virtual memory for
processes that cannot be written to another storage medium
• Services – lists currently running services
• Performance
o CPU usage & CPU Usage History graph
o Memory & Physical Memory Usage History graph
o Physical Memory in MB
 Total – total installed physical RAM
 Cached – amount of physical memory used recently for system
resources
 Free – amount of memory current unused & available
o Kernel Memory in MB
 Total – amount of memory being used by core part of Windows,
aka the kernel
 Paged – amount of virtual memory kernel is using
 Non-Paged – amount of RAM memory used by kernel
o System
 Handles
 Threads
 Processes
 Up Time
 Page File
o If click on RESOURCE MONITOR displays Windows Reliability &
Performance Monitor Resource View described earlier in this section
• Networking
• Users
 System Information – categories:
• System Summary – general info about computer & OS (name, manufacturer,
BIOS, etc.)
• Hardware Resources – details about computer hardware

PAGE 56 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

o Conflicts/Sharing
o DMA
o Forced Hardware
o I/O
o IRQs
o Memory
• Components – info re disk drives, sound devices, modems, other components
• Software Environment – info about drivers & network connections; displays
other program-related info

6.3 CONFIGURE WINDOWS UPDATE


6.3.1 Configuring Windows Update Settings
- NOTE: updates apply to COMPUTER, not to USER
- Start | All Programs | Windows Updates | Click CHANGE SETTINGS |
 Choose how Windows can Install Updates:
• Install [recommended & important] updates automatically (recommended)
o Every Day (or other interval) at (TIME)
• Download updates but let me choose whether to install them
• Check for updates but let me choose whether to download & install them
• Never check for updates (not recommended)
o BUT useful if using Windows Server Update Services (WSUS) on a
network…
 Recommended Updates:
• Checkbox to Include recommended updates when downloading, installing, or
notifying me about updates
- Start | All Programs | Windows Updates | Get Updates For More Products | CONTINUE|
click on I ACCEPT TERMS OF USE checkbox | Click INSTALL | Click CONTINUE |
 Access Microsoft Update website & can set Windows Update to get Microsoft
updates too
 If performed Clean install, need to carry out this procedure
 If performed upgrade, no need to do this & won’t be visible
- Installing Updates
 All Programs | Windows Updates | indicates whether updates are available & can
click on INSTALL UPDATES
 If don’t, will install at next scheduled update install time
 Can click CHECK FOR UPDATES in left pane | View Available Updates
 MUST manually install optional updates
 Select updates & click INSTALL –OR– click INSTALL UPDATES in Windows
Update dialog box (home)
 Standard users can download & install recommended updates; BUT elevated
privileges required to stop a download or installation
- Terms
 Service Pack: collection of updates, fixes or enhancements (or all three) to an OS
or software program delivered in a single installable package
- Troubleshooting Update Problems
 User needs to provide credentials – can happen when computer uses proxy
server to connect to internet to get updates
• Get Windows Update Error 8024401B & user needs to click CHECK FOR
UPDATES & provide log on credentials
 Firewall settings are blocking downloads – non-Vista firewalls usually
• Check that Background Intelligent Transfer Service (BITS) is enabled/allowed

PAGE 57 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

• Also, if firewall blocks bitspeer port (UDP & TCP port 2178) can result in
problems
 User did not accept the Microsoft software license terms
• Open Windows Update & review error messages
 Insufficient free disk space – self-explanatory; will fail if this happens
 User cancelled installation process or computer disconnected from internet – if
interruption lasts for too long, download times out & update not downloaded
 User installs an update & device stops working
• Roll back to previous driver
• Access manufacturer website to obtain new driver
 Update cannot complete because restart is required – self-explanatory, restart!
 Computer turned off at time of scheduled update – change timing, otherwise
installed when next start computer
 Computer in power-saving state (sleep or hibernate) at time of scheduled update
• If plugged into power source, will wake & install
• If on battery power, new updates will not install
6.3.2 Windows Update Driver Settings
- Control Panel | System & Maintenance | Advanced System Settings | Hardware | Update
Settings
- Available Settings:
 Check automatically for drivers each time a device is connected
 Ask user whether to perform the check when a new device is connected
 Never check Windows Update for new drivers
6.3.3 Hiding & Restoring Hidden Updates
- Hiding an Update
 Right click update in View Available Updates dialog box | select HIDE UPDATE |
CONTINUE | press F5 to refresh view & VOILA it’s gone!
- Restoring Hidden Updates:
 All Programs | Windows Update | click RESTORE HIDDEN UPDATES | select
update(s) to be restored | Click RESTORE | Click CONTINUE | scans for updates |
restored updates listed in View Available Updates dialog box again
6.3.4 Viewing Update History
- Windows Update | Click on VIEW UPDATE HISTORY | Click INSTALLED UPDATES |
- OR via: Control Panel | Programs | Programs & Features | View Installed Updates |
- Opens Uninstall An Update dialog box
 Not all installed updates will be shown in the Uninstall An Update dialog box
 To uninstall, select update & click UNINSTALL | CONTINUE
6.3.5 Windows Ultimate Extras
- If running Ultimate, Windows Updates also displays link to “Windows Ultimate extras”
- Can download & install extras by selecting “Download Programs, Services, & Unique
Content From Windows Ultimate Extras” OR visit Vista Ultimate website directly

6.4 CONFIGURE DATA PROTECTION


6.4.1 Using Windows Backup & Restore
- Configuring Automatic Backup Settings
 Control Panel | System & Maint. | Backup & Restore Center
 Back up Files or your entire computer
• Click BACK UP FILES next to Create Backup copies of your files and folders |
Click CONTINUE | Back Up Files wizard starts | Specify location (Hard
disk/CD/DVD -OR- Network location) | Click NEXT |

PAGE 58 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

• Click BACK UP COMPUTER next to Create Windows Complete PC Backup &


Restore image of entire computer | Click CONTINUE |
- (Assuming selected “backup files”) Choosing Backup Media
 Another Fixed HD on computer
 Removable media (USB or FireWire HD)
 CD-R, CD-RW, DVD-R/RW
 Another computer on network
 Stand-alone network drive
 CANNOT use flash memory drives, USB sticks, tape drives.
 CANNOT use source disk as backup destination
- Files stored in FAT filing system
 Cannot backup files stored on FAT media – ergo usually cannot USB backup flash
memory since by default formatted using FAT
- FAT32 & NTFS
 FAT32 – no files larger than 4 GB; no partitions larger than 32 GB
 User “convert” command line utility to convert from FAT/FAT32 to NTFS with NO
data loss
- Choosing Files to Backup
 Pictures
 Music
 Videos
 Email
 Documents
 TV Shows
 Compressed Files
 “Additional Files”
 NO:
• System files
• Exe files
• Temp files
• EFS encrypted files (user has to copy these files directly) – can search for
“Create Recovery Certificate for Encrypted Files” in Windows Help & Support
o ONLY available on Vista Business & Enterprise & Ultimate
o To create Recovery Certificate: Insert Removable Media | Run | cmd |
navigate to chosen directory | type “cipher /r:filename” & press ENTER |
o To Install Recovery Certificate: Admin Tools | Local Security Policy |
Public Key Policy | Right click on “Encrypting File System” | Click on ADD
RECOVERY AGENT | NEXT | BROWSE | Select recovery certificate | YES to
install | NEXT | open Command Prompt | type “gpupdate”
o To view encrypted files with New Recovery Certificate: Log on with
account used to encrypt files | Command Prompt | “cipher /u” & click
ENTER (Files auto-update when next opened if not explicitly updated this
way)
• FAT files
• Recycle Bin
• User Profile settings
- Scheduling Backups
 Select how often to create backup
• How often: daily, weekly, monthly
• What day: S, M, Tu, etc.
• What time: whole hours only (10 am, 2 pm, etc.)

PAGE 59 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Click SAVE SETTINGS & START BACKUP if want to start immediately instead
6.4.2 Accessing & Encrypting Backup Files
- Saved in following format:
 <backup location> \ <computer name> \ Backup Set <year-month-day> <time>
 e.g., F:\Glasgow\Backup Set 2007-02-28 110830 (for Feb. 28, 2007 at 11:08:30 am
 Backup files are in ZIP format
- When make a full backup, backup folder is created & labeled with date for that day; as
you add updates, the folder name stays the same
- Encrypting Backed-up files
 Can use EFS to encrypt backup files with your personal encryption certificate
 NOT convenient if several users log onto computer, would need to decrypt files
before another user can carry out a restore
 For another Full Backup, do a Manual Backup
 EFS not included with Vista Starter, Basic, or Home Premium editions
 To Encrypt: Right click Parent folder | click on PROPERTIES | General tab |
Advanced | select “Encrypt contents to secure data” | Click on DETAILS for
further configuration | OK & OK
- Viewing Backup Files

6.4.3 Changing Backup Settings
- Backup & Control Center | Click CHANGE SETTINGS under the BACK UP FILES Button |
opens Backup Status & Configuration dialog box |
 View Backup Status – indicates if last backup was successful
 Can Click on BACK UP NOW | CONTINUE |
 Can click on CHANGE BACKUP SETTINGS (for scheduled backup) | CONTINUE |
 Can also TURN OFF automatic backup | Click CONTINUE |
6.4.4 Copying Files Manually
- Cannot save registry settings or other system settings (need to use Restore Points)
- Cannot create complete image
- Copies aren’t marked as previous versions & can’t be restored using Restore Previous
Versions feature described next
6.4.5 Restoring Files
- Backup & Restore Center | Click on RESTORE FILES | select Files From (latest/older)
Backup | select & click NEXT |
 Add Files
 Add Folders
 Search
- Select location to restore to
 In original location
 In following location: & specify
6.4.6 Advanced Restore
- Backup & Restore Center | Advanced Restore |
- OR – via Backup Status & Configuration | Restore Files | Advanced Restore |
 When using another PC as your backup medium
 Restore from backup older than most recent one
 Can restore files for all users
6.4.7 Using System Restore
- System Restore Points made:
 Daily
 Before major changes
 Manually

PAGE 60 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- Control Panel | System & Maintenance | System | System Protection | System Protection
Tab of System Properties | click on SYSTEM RESTORE |
- Also accessible via: Control Panel | Classic | System | System Protection |
- Also accessible via: Control Panel | Classic | System | System Protection |
- Click CREATE to manually create a restore point & name it
- Shadow copies are automatically saves as part of restore point in System Properties
 If System Protection is turned on, Windows automatically creates shadow copies
of files that had been modified since last restore point was made
 If TURN OFF System Protection on a disk, ALL RESTORE POINTS ARE DELETED
- Restore Points are made until 300 MB of reserve space is used; might use up to 15% of
HD capacity
 When reserve space is used up, deletes oldest…
- System Restore doesn’t work on HD’s smaller than 1 GB
6.4.8 Using Complete PC Backup
- To Create Windows Complete PC Backup Image:
 Control Panel | System & Maintenance | Backup & Restore Center | Click BACK
UP COMPUTER next to Create Windows Complete PC Backup & Restore image of
entire computer | Click CONTINUE | runs Complete PC Backup Wizard | configure
to save to a hard disk (internal or external but CANNOT contain system files) |
 Receive warning if have insufficient space
 Can save to CD-R, CD-RW, DVD-RW, HD
- Restoring a Computer from a Complete PC Backup
 Complete restoration of PC
 Insert Install media | Restart computer | select language | click NEXT | select
REPAIR YORU COMPUTER | OS | SYSTEM RECOVERY OPTIONS | select WINDOWS
COMPLETE PC RESTORE |
 IF have Recovery partition, Restart | Press F8 repeatedly | select REPAIR YOUR
COMPUTER from Advanced Boot Options Menu | press ENTER | select keyboard
layout & click NEXT | select User Name & type Password & click OK | on System
Recovery Options menu, select WINDOWS COMPLETE PC RESTORE |
 Backup image = large virtual hard disk (VHD file) + XML documents
- ONLY on Vista Business, Enterprise & Ultimate
6.4.9 Restoring Damaged or Deleted Files by Using Previous Versions
- Shadow Copies – automatically saved as part of restore point if System Protection
enabled
- Access previous versions of a file by: Right click file/folder in Windows Explorer | click
RESTORE PREVIOUS VERSIONS | goes to PREVIOUS VERSIONS tab of file/folder
PROPERTIES | select Previous Version & Click RESTORE |
- Can use shadow copies to recover previous versions of files, rather than from backup
- If some files do not have Shadow Copies, then maybe System Protection not turned on
for that HD or maybe files might be offline files (not available for offline files)
6.4.10 Summary of Backup Types & When to Use Them
- Backup Files Wizard – use to backup personal files like music or documents
- Create restore points to store system settings & create shadow copies
- Use Windows Complete PC Backup to create image of entire computer when new &
periodically (maybe every 6 months or so)
- Use Restore Files wizard to restore personal files like documents or pictures
- Use previous copies to restore personal files from shadow copy or backup OR if want to
go back to previous version

PAGE 61 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- Use System Restore if a change OS, a new program, or a new device driver causes
problems & want to restore system or registry settings; System Restore does NOT alter
personal files
- Use Windows Complete PC Restore if virus or hardware fault has corrupted OS & deleted
restore points
 Will likely need to run Restore Files wizard to restore more recent versions of
personal files
- Make copies of files stored on USB flash memory & of encrypted files; copy to NTFS
formatted HD or optical storage so remain encrypted!

PAGE 62 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

7. CONFIGURING AND TROUBLESHOOTING MOBILE COMPUTING


7.1 CONFIGURE MOBILE DISPLAY SETTINGS
7.1.1 Using Windows Mobility Center (settings shown vary by PC…)
- Brightness – temporarily adjusts brightness; to change brightness for your power plan to
go Control Panel | Power Options |
- Volume – adjust speaker volume for mobile PC & can select MUTE checkbox
- Battery Status
 Shows how much charge remains &
 Can select power plan from list
- Wireless Network
 Indicates status of wireless network
 Can select network to connect to
 Can turn wireless adapter on/off
- Screen Rotation – portrait or landscape
- External Display – Connect additional monitor & customize display settings
- Sync Center
 View status of in-progress file synchronization
 Start New synchronization
 Set up synchronization partnership
 Adjust synchronization settings
- Presentation Settings – adjust settings like speaker volume & desktop background image
7.1.2 Configuring Presentation Settings
- When turned ON, PC stays awake & system notifications and IM‘s are turned off
- Mobility Center | Presentation Settings |
o Can select I AM CURRENTLY GIVING A PRESENTATION
o When I am giving a presentation:
 Turn off screen saver
 Set Volume To:
 Show this Background:
o Settings turn OFF automatically when
 Disconnect from network projector
 Disconnect from additional monitor
 Shut down/log off mobile PC
7.1.3 Configuring Multiple Monitors
- Mobility Center | Turn On | Presentation Settings | click on CONNECTED DISPLAYS |
- Display options:
 Mirrored
 Extended
 External Display Only
- Can also set via: Control Panel | Appearance & Personalization | Personalization |
Display Settings |
 Select the 2nd monitor | click desired display settings (Can extend or use as main
monitor) | Apply | YES to keep settings |
 Click IDENTIFY MONITORS to be sure of which is which (labeled with 1 & 2) |
Configure colors for external monitor
• Low: 8-bit
• Medium: 16-bit
• High: 32-bit
 Move Resolution slider to desired resolution & click OK | YES to keep settings |
Open Windows Mobility Center – in Presentation Settings tile, Click TURN ON
 Advanced Settings

PAGE 63 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

7.1.4 Using a Network Projector


- NOTE: Uses RDP (Remote Desktop Protocol) over IP
- Connecting to a Network Projector
 Infrastructure Network Connection – projector can be on same subnet (use
connection wizard) or specify a UNC (Universal Naming Convention) path to
projector
 Ad Hoc Connection – can be included on ad hoc network, enabling your or other
participants in ad hoc network connection to connect to it
 Connection through a Network Projector Adapter – can use existing data
projector & connect through adapter (wirelessly or wired)
 Can be used for:
• Simple PowerPoint Presentations
• Displays to a single projector (one-to-one connection)
• Mirrored or extended display
 Start | All Programs | Accessories | Connect To A Network Projector | Search for
a projector (recommended) -OR- Enter projector address (if not on local subnet
& have UNC or URL) | Search | select from list of unsecured & secured projectors
| click NEXT |
 Network Presentation dialog box opens (regardless of whether search or enter
address) | & minimizes on the Windows taskbar
• Can use to resume or pause presentation
• Can use to disconnect from network projector
 Once a Network projector is selected & connected to, can open Mobility Center &
enable presentation settings for that projector
No projectors appear on list when search - Ensure PC connected to LAN
in Connect To A Network Projector Wizard - If connected to Network but none listed, none shared?
Troubleshooting Network Projector Problems

Connect to a network projector but - Turn off projector & restart


nothing happens - Check if someone else using it already
Entered correct network address, but - Turn off & restart projector
couldn’t find projector - Refresh DNS cache: Accessories | Right click
Command Prompt | Run As Administrator | Continue |
type “ipconfig /registerdns” | Restart projector | try
again
Click RESUME in Network Presentation - CPU might be busy with another system task; wait a
dialog box but presentation doesn’t few minutes & try again; if persists, examine CPU usage
restart
Video Clip in a presentation plays for a - Not designed to transmit video unless in VERY poor
few seconds & restarts quality…try using TV or other higher quality equipment
Firewall settings prevent connection - Configure Firewall settings on mobile PC
- If DNS not working, Search option will not find
projector and entering a UNC path or URL won’t work
either…try typing in the IP address

7.2 CONFIGURE MOBILE DEVICES


7.2.1 Using Sync Center to Synchronize Network Files
- All Programs | Accessories | Synch Center
- OR – Mobility Center | Synch Center | (for laptops only…)
- Synch Partnerships
 Open Synch Center | click on SETUP NEW SYNC PARTNERSHIP | click device on
list & click SET UP |
 OR can right click device & access PROPERTIES or click SET UP
 Select files & folders to synch

PAGE 64 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 Clicking VIEW SYNCH PARTNERSHIPS in Sync Center shows available partnerships


| can select device & click BROWSE to view synched files & synch additional files
- Synch Conflicts: in Synch Center | click VIEW CONFLICTS |
 NOTE: Also shows in notification area of taskbar of there’s a conflict…
 Conflict: you need to resolve
 Error: synch can’t be completed
 Warning: less severe than error, & doesn’t keep synch from finishing
- Offline Files
 Can use Sync Center to synch with network files you made available offline >
creates copy of offline/network files to your computer
 Offline files are located on the Mobile PC
 NOTE: using offline files is a TWO STAGE process
• First, make files on network server available offline
• Then need to sync files so copied to Mobile PC
- Network Servers
 ANY computer on the network that shares files/folders
 Windows Explorer | folder | Properties | Sharing Tab | Advanced Sharing |
Caching | Offline Settings dialog box shown
• Only the files & programs that users specify will be available offline (default)
• All files and programs that users open fro the share will be automatically
available offline
o Checkbox for “Optimized for performance”
• Files or programs from the share will not be made available offline
7.2.2 Using the Windows Mobile Device Center
- Replaces ActiveSync
- Features:
 Enhanced user interface
 Partnership wizard & improved partnership management
 Device browsing – can browse files/folders & open documents on your Mobile
Device from your PC
 Synchronization of email, calendars, contacts, tasks, favorites, files
 Synchronization & shuffling of Microsoft WMP music files
 Picture management, detects new photos on Windows Mobile device & tags
them for import into Windows Vista Photo Gallery
 Runs on Ultimate, Enterprise, Business, Home Premium, & Home Basic
 Compatible with Microsoft Outlook 2000, XP, 2003, 2007
 WMDC does NOT ship with Vista – when connect Mobile Device, Vista downloads
& installs the WMDC driver as an update
- Establishing a Partnership & Synchronizing Information
 Device can have sync relationships with at MOST 2 computers, but can set up
partnerships with multiple PCs
 Windows Mobile Device Center | Set up your Device | select content type to
synchronize
 Name device | click SETUP to Windows Mobile Partnership
 When connect device to computer, WMDC opens & can click
• Programs & services
• Pictures, Music & Video
• File Management
• MOBILE DEVICE SETTINGS

PAGE 65 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

o Click CHANGE CONTENT SYNC SETTINGS | select checkbox for type of


info you wish to sync & click SYNCH SETTINGS (if available) for each
content type
o Sync wirelessly with Exchange Server
o Manage a partnership
o Connection Settings
o End a Partnership
- Connecting Without Setting Up A Partnership
 Connect device & select QUICK CONNECT | Follow screen prompts |
- Opening WMDC
 All Programs | Windows Mobile Device Center
 Control Panel | Network & Internet | Windows Mobile Device Center |
 Opens automatically when connect Mobile Device
- Using Bluetooth
 Need Bluetooth enabled
 Control Panel | Hardware & Sound | Bluetooth Devices | Options tab | Allow
Bluetooth Devices to Find This Computer | OK |
 On Mobile Device, in ActiveSync, click Menu | click/tap Connect Via Bluetooth |
click YES to set up a partnership | (may need to click Add New Device) | when
computer name appears on list select it & click NEXT | enter passcode when
prompted & click NEXT |
 On computer will be prompted that Bluetooth Device is trying to connect | Click
To Allow This Connection | Click This Message | In Add Bluetooth Device Wizard
enter same passcode | Click NEXT |
 On Mobile Device ensure checkbox for the ActiveSynch service appears & is
selected on mobile device
 On computer complete Bluetooth Wizard
 On Mobile Device complete the Add Bluetooth Device Wizard
- Working With Device Files
 WMDC | File Management | opens Mobile Device folder | can browse files
 If running Windows Mobile 2003 or Windows Mobile Second Edition, can backup
files on mobile device to your computer (ONLY if have relationship established
with your computer):
• WMDC | Mobile Device Settings | Backup & restore | click on Backup Tab |
select Automatically Backup each Time The Device Connects | click CHANGE
to use different backup file than previously used | select file | select from
Full Backup or Incremental Backup | click BACK UP NOW |
 RESTORE: Mobile Device Settings | Backup & Restore | Backup | RESTORE NOW
|
- Synchronizing Music, Video & Pictures
 Connect device | WMDC starts | click Pictures, Music & Video | opens WMP &
click ADD MEDIA TO YOUR DEVICE | select files to synchronize
 ALL media file sync settings are in WMP

- Importing Pictures & Videos from your device


 Connect device | WMDC starts | Pictures, Music & Video | click Import
Pictures/Video From Your Device | automatically imports …
- Can access Windows Mobile Device Center from Synch Center; shows relationships &
partnerships & sync statuses…
- Adding & Removing Programs on a Mobile Device

PAGE 66 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

 WMDC | Programs & Services | More | Add/Remove Programs | select


programs(s) & click OK | follow screen prompts for further instructions as nec.
7.2.3 Configuring & Troubleshooting Windows SideShow Devices
- SideShow Gadgets & Devices
 Can be used to remotely control applications on main PC
- Using SideShow Gadgets
 Control Panel (home, not classic view) | Hardware & Sound | Windows SideShow
• View Gadgets By Name
• View Gadgets By Date Installed
- Uninstalling Devices & SideShow Gadgets
 Control Panel | Programs & Features | Uninstall or Change A Program |
- Changing Device & Side SideShow Gadget Settings
 Lock The Device – specify how long remains inactive before auto-locked
 Turn Off The Device Backlight Automatically – to save power, dims screen (not
all devices have this feature)
 Show Notifications For Gadgets On This Device – small pop up windows
displayed in notification area of device screen
• Can clear checkbox under Gadgets & click OK
 Change Order In Which SideShow Gadgets Appear
• Only Gadgets turned on & appearing in Windows SideShow dialog box can
be reordered
- Troubleshooting SideShow Devices
 Device not connected to computer – not connected or wrong driver or no driver
 Updated information doesn’t appear on Device – check if on, connected, make
sure logged on if set to autowake computer to update info…
 Some Device content is missing – Disable any SideShow gadgets not needed &
make sure have enough space
 Device failed – try restarting device
 Device screen dims – Configure the Off The Device Backlight Automatically
settings

7.3 CONFIGURE TABLET PC SOFTWARE


7.3.1 Tablet PC
- Settings available on Business, Enterprise, Home Premium & Ultimate editions
- Two general categories of Tablet PCs:
 Slate – no dedicated keyboards; often used in Portrait mode
 Convertible – looks like normal laptop & has keyboard
- Control Panel | Tablet PC Settings |
 General tab
• Handedness (right or left)
• Calibration – can calibrate touch screen & select orientation too
 Handwriting Recognition tab
• IF disable automatic learning & turn on again, PC begins learning again…
• Targeting Specific Recognition Errors
o Select specific character or word or set of characters w/similar shapes
• Teaching Recognizer your Handwriting Style
o Perform Handwriting Personalization & enter series of 50 sentences in
a single session
• Managing Handwriting Recognition Data
o Stored as part of User’s profile

PAGE 67 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

o Transfer handwriting recognition data via Windows Easy Transfer


Wizard | make sure “Handwriting Recognition selected when
performing step to Select User Accounts, Files & Settings to Transfer
 Display tab
• Four screen orientations
o Primary Landscape – default for most laptops
o Primary Portrait – default for slate mode on Tablets (convertibles shift
between Primary Landscape & Primary Portrait)
o Secondary Landscape – rotated 180 degrees from Primary Landscape
o Secondary Portrait – rotated 180 degrees from Primary Portrait
 Other tab
7.3.2 Configuring Pens & Input Devices
- Control Panel | Classic View | Pen & Input Devices | Customize how pen or stylus is used
 Pen Options: Can configure specific pen actions to mouse actions
 Pointer Options: single tap, double tap; tap & hold; press button & hold
 Flicks – customize flicks in up to 8 directions
7.3.3 Tablet PC Input Panel
- Primary method for Tablet PC users to input data
- Three ways to input info into Input Panel
 On-screen keyboard – shows full keyboard onscreen & use stylus or pen
 Character pad – letter by letter handwriting recognition routine
 Writing pad – can handwrite full words & have Vista recognize them
- Change dock location for PC Input Panel via TOOLS menu:
 Float
 Dock at top of screen
 Dock at bottom of screen

7.4 CONFIGURE POWER OPTIONS


7.4.1 Power Option Basics
- Three powered-down states:
 Shut down – without power
 Sleeping – requires small amount of power; keeps data that was in active
memory available…after 15 minutes, sleep process same as Hibernation
 Hibernating – data in active memory is written to HD & computer is powered off
completely; resumes MUCH faster than cold boot
7.4.2 Power Plans
- Balanced
 Balances battery life & performance
- Power Saver
 Great battery life; not so good performance
- High Performance
 Bad for battery life; great for performance
7.4.3 Advanced Settings
- Whether password required on wakeup
- How long to wait before turning off hard disk
- Power & performance settings for wireless adapters
- How much inactivity before sleep mode
- How much inactivity before hibernation mode
- How log to wait before suspending supported USB devices
- What action to take when press power button
- What action to take when shutting the lid

PAGE 68 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*

- PCI Express card power management


- Processor power management (power saver limits processor to 50% of normal capacity)
- Search & Index performance settings
- Display power settings
- Multimedia settings
- Battery warning thresholds
7.4.4 Custom Plans
- Power Settings | Create Your Own | Create Power Plan wizard
 Select an existing plan to use as template | rename & customize/edit away!
7.4.5 Configuring Button Behavior & Security
- Power Options | Power Options System Settings dialog box |
 Define Power Buttons & Turn On Password Protection dialog box opened when
click on:
• Require password on wakeup
• Choose what power buttons do
• Choose what closing the lid does
 Configures settings for Battery Power & Plugged In separately for:
• Power Button
• Sleep Button
• Close Lid
 Can set password protection on wakeup to require or not require from here too

PAGE 69 OF 69

You might also like